08-21-2008
ntpd does not handle the SIGHUP signal. This means when ntpd receives HUP, it is terminated. The ntpd script might wrap the ntpd call in a while loop, so that it restarts the daemon after HUP is received.
At any rate, there's no way to reload the ntpd daemon without restarting it.
See
NTP home page for more info.
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi there!
Does anybody know if HP-UX 11.i supports NTP? If yes, what version on NTP should be used?
Thanx (1 Reply)
Discussion started by: penguin-friend
1 Replies
2. IP Networking
How can I install ntp on AIX (4.3-5.1) ?
thnx (1 Reply)
Discussion started by: Gismo
1 Replies
3. Solaris
All,
How do you set a Solaris 9 server which received ntp updates from a ntp server to broadcast them on a local subnet. I have created a /etc/inet/ntp.conf file to receive the updates from a server on network and need to make this server become like a ntp relay from the main server.
Any... (1 Reply)
Discussion started by: bubba112557
1 Replies
4. Solaris
Hello
I use Solaris 10 and I have NTP packages arlrady installed
pkginfo | grep -i ntp
system SUNWntpr NTP, (Root)
system SUNWntpu NTP, (Usr)
How to configure NTP?
thanks (2 Replies)
Discussion started by: melanie_pfefer
2 Replies
5. Red Hat
Hi,
This may be a dumb question, but here goes. While I have been using Linux for some time, I am wondering if a certain capability exists within Red Hat that I have found within SUSE.
Cool stuff you might not know that AutoYast can do ? Part 1 Linux In Novell’s East Region
points to... (0 Replies)
Discussion started by: mark54g
0 Replies
6. Linux
All here, thank you for listening. Now I've set up a Linux NTP server by adding a external windows NTP server in /etc/ntp.conf. Then I start the ntpd daemon. But how often does the Linux NTP server update its time with the external NTP server? I've looked up everywhere but found no information... (1 Reply)
Discussion started by: MichaelLi
1 Replies
7. HP-UX
Hi
I wonder if its possible to setup NTP clients running HP-UX o.s. from a solaris 10 NTP server?
FR (3 Replies)
Discussion started by: fretagi
3 Replies
8. Solaris
Hi All,
server was down with hardware issue and we couldn't took the LDOM configuration backup. Now system-board replaced and we need to get recreate OLD LDOM configuration. please advice with me the possible solution. :mad::(
Thanks
N (1 Reply)
Discussion started by: Naveen.6025
1 Replies
9. Red Hat
Hi,
I have two ntp servers in my cluster and I want all the nodes in my cluster to sync with either of the ntp servers or just one. Unfortunately it keep rotating the sync, between my ntp server 1, ntp server 2 and local. Is there anyway I can change the sync to avoid local?
# ntpq -p
... (3 Replies)
Discussion started by: pjeedu2247
3 Replies
LEARN ABOUT OSF1
ntp.keys
ntp.keys(4) Kernel Interfaces Manual ntp.keys(4)
NAME
ntp.keys - Network Time Protocol (NTP) authentication key file
DESCRIPTION
The NTP standard specifies an extension to allow verification of the authenticity of received NTP packets and to provide an indication of
authenticity in outgoing packets. This is implemented in xntpd using the MD5 algorithm to compute the message-digest. The specification
allows any one of possibly 4 billion keys, numbered with 32-bit key identifiers, to be used to authenticate an association. The servers
involved in an association must agree on the key and key identifier used to authenticate their data, though they must each learn the key
and key identifier independently. In MD5, the keys are 64 bits (8 bytes). The xntpd daemon reads its keys from a file specified using the
-k command line option, or the keys statement in the configuration file. While key number 0 is fixed by the NTP standard (as 56 zero bits)
and may not be changed, one or more of the keys numbered 1 through 15 may be arbitrarily set in the keys file.
One of the keys may be chosen, by way of the configuration file requestkey statement, to authenticate run time configuration requests made
using the xntpdc(8) program. The latter program obtains the key from the terminal as a password, so it is generally appropriate to specify
the key chosen to be used for this purpose in ASCII format.
The NTP key file uses the same comment conventions as the configuration file. Key entries use a fixed format of the form: keyno type key
In this format: Is a positive integer. Is a single character that defines the format the key is given in. This is always M, representing
Message Digest (MD5) on Tru64 UNIX systems. Is the key itself. The MD5 algorithm key is a 1-to-8 character ASCII string. Because of the
simple tokenizing routine, you cannot use the following characters in an ASCII key: " " (space), "#" (number sign), "", "0, and " ". Note
that both the keys and the authentication scheme (MD5) must be identical between a set of peers sharing the same key number.
EXAMPLES
The following sample key file shows two defined NTP keys: 2 M RIrop8KPPvQvYotM # MD5 key as a random ASCII string 14 M sundial
# MD5 key as an ASCII string
FILES
Conventional name of the key file
RELATED INFORMATION
Commands: ntpdate(8), ntpq(8), xntpd(8), xntpdc(8)
Files: ntp.conf(4)
Network Administration delim off
ntp.keys(4)