From nobody Wed May 03 15:14:32 2023 X-Original-To: questions@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4QBL8b4kqKz48wdN for ; Wed, 3 May 2023 15:14:39 +0000 (UTC) (envelope-from doug@safeport.com) Received: from fledge.watson.org (fledge.watson.org [147.160.157.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "A1-48603", Issuer "A1-48603" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4QBL8Z43xJz43xq for ; Wed, 3 May 2023 15:14:38 +0000 (UTC) (envelope-from doug@safeport.com) Authentication-Results: mx1.freebsd.org; dkim=none; spf=fail (mx1.freebsd.org: domain of doug@safeport.com does not designate 147.160.157.40 as permitted sender) smtp.mailfrom=doug@safeport.com; dmarc=none Received: from fledge.watson.org (doug@localhost [127.0.0.1]) by fledge.watson.org (8.16.1/8.16.1) with ESMTPS id 343FEWba017674 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO) for ; Wed, 3 May 2023 15:14:32 GMT (envelope-from doug@safeport.com) Received: from localhost (doug@localhost) by fledge.watson.org (8.16.1/8.16.1/Submit) with ESMTP id 343FEWSs017671 for ; Wed, 3 May 2023 15:14:32 GMT (envelope-from doug@safeport.com) X-Authentication-Warning: fledge.watson.org: doug owned process doing -bs Date: Wed, 3 May 2023 15:14:32 +0000 (UTC) From: doug Reply-To: doug@safeport.com To: questions@freebsd.org Subject: Re: ntpd error on a bridged network - solved In-Reply-To: Message-ID: <1fd48f26-ca84-ab40-5a2b-23afa3e8af1@safeport.com> References: List-Id: User questions List-Archive: https://lists.freebsd.org/archives/freebsd-questions List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-questions@freebsd.org X-BeenThere: freebsd-questions@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed X-Spamd-Result: default: False [-2.04 / 15.00]; R_SPF_FAIL(1.00)[-all]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-0.98)[-0.979]; NEURAL_HAM_SHORT(-0.96)[-0.965]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[safeport.com]; MLMMJ_DEST(0.00)[questions@freebsd.org]; FROM_EQ_ENVFROM(0.00)[]; HAS_REPLYTO(0.00)[doug@safeport.com]; MIME_TRACE(0.00)[0:+]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:6405, ipnet:147.160.157.0/24, country:US]; TO_DN_NONE(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; RCPT_COUNT_ONE(0.00)[1]; FROM_HAS_DN(0.00)[]; ARC_NA(0.00)[]; RCVD_TLS_LAST(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; HAS_XAW(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[questions@freebsd.org]; REPLYTO_ADDR_EQ_FROM(0.00)[]; MID_RHS_MATCH_FROM(0.00)[] X-Rspamd-Queue-Id: 4QBL8Z43xJz43xq X-Spamd-Bar: -- X-ThisMailContainsUnwantedMimeParts: N On Tue, 2 May 2023, Doug Denault wrote: > We replaced an old apple router with a Linksys Velop router. The apple router > was behind a Verizon router and we used DHCP from Verizon on the apple > device. To duplicate the setup we configured the Linksys in bridge mode. > > ntpd starts with the error: > ntpd: error resolving pool 0.freebsd.pool.ntp.org: Name does not resolve (8) > > however: > > host -t a 0.freebsd.pool.ntp.org > 0.freebsd.pool.ntp.org has address 174.53.169.69 > 0.freebsd.pool.ntp.org has address 192.241.155.186 > 0.freebsd.pool.ntp.org has address 38.229.53.9 > 0.freebsd.pool.ntp.org has address 38.229.57.9 > > ping -c 2 0.freebsd.pool.ntp.org > PING 0.freebsd.pool.ntp.org (94.237.120.208): 56 data bytes > 64 bytes from 94.237.120.208: icmp_seq=0 ttl=53 time=78.773 ms > 64 bytes from 94.237.120.208: icmp_seq=1 ttl=53 time=79.012 ms > > /etc/resolv.conf > # Generated by resolvconf > search boltsys.com > nameserver 192.168.2.1 > > Other than ntpd I see no DNS or connectivity issues. So far the time has been > holding at 2 seconds difference from the servers not on the office LAN. Well sorta. I was able to configure ntpd to bypass what I am pretty sure is is all do to Linksys bugs. Setting the ntpd start flag to "-4" keeps it from uselessly trying IPV6. In ntpd.conf I changed the pool setting to be: pool 0.north-america.pool.ntp.org iburst minpoll 5 maxpoll 12 With this ntpd works and keeps time with our internet facing servers.