1ntpd(8)                     System Manager's Manual                    ntpd(8)
2
3
4

NAME

6       ntpd - Network Time Protocol (NTP) daemon
7
8

SYNOPSIS

10       ntpd  [ -46aAbdDgLmnNqx ] [ -c conffile ] [ -f driftfile ] [ -i jaildir
11       ] [ -I iface ] [ -k keyfile ] [ -l logfile ] [ -p pidfile ] [ -P prior‐
12       ity  ]  [  -r  broadcastdelay  ]  [  -s  statsdir  ]  [  -t  key ] [ -u
13       user[:group] ] [ -U interface_update_interval ] [ -v variable  ]  [  -V
14       variable ]
15
16

DESCRIPTION

18       The  ntpd  program  is an operating system daemon that synchronises the
19       system clock with remote NTP time servers or local reference clocks. It
20       is a complete implementation of the Network Time Protocol (NTP) version
21       4, but also  retains  compatibility  with  version  3,  as  defined  by
22       RFC-1305,  and  version  1  and 2, as defined by RFC-1059 and RFC-1119,
23       respectively. The program can operate  in  any  of  several  modes,  as
24       described  on  the Association Management page, and with both symmetric
25       key and public key cryptography, as  described  on  the  Authentication
26       Options page.
27
28       The  ntpd program ordinarily requires a configuration file as described
29       on the Configuration Commands and Options collection above.  However  a
30       client  can  discover  remote servers and configure them automatically.
31       This makes it possible to deploy a fleet of workstations without speci‐
32       fying  configuration details specific to the local environment. Further
33       details are on the Automatic Server Discovery page.
34
35       Once the NTP software distribution has been compiled and installed  and
36       the  configuration file constructed, the next step is to verify correct
37       operation and fix any bugs that may result. Usually, the  command  line
38       that starts the daemon is included in the system startup file, so it is
39       executed only at system boot time; however, the daemon can  be  stopped
40       and  restarted  from  root  at  any time. Once started, the daemon will
41       begin sending and receiving messages, as specified in the configuration
42       file.
43
44

SETTING THE TIME AND FREQUENCY

46       The  ntpd  program  operates  by  exchanging  messages with one or more
47       servers at designated intervals ranging from about one minute to  about
48       17  minutes. When started, the program requires several exchanges while
49       the algorithms accumulate and groom the data before setting the  clock.
50       The  initial delay to set the clock can be reduced using options on the
51       Server Options page.
52
53       Most computers today incorporate a time-of-year (TOY) chip to  maintain
54       the  time  during  periods  when  the power is off. When the machine is
55       booted, the chip is used to initialize the operating  system  time.  In
56       case  there is no TOY chip or the TOY time is more than 1000 s from the
57       server time, ntpd assumes something must be terribly  wrong  and  exits
58       with  a  panic  message  to the system operator. With the -g option the
59       clock will be initially set to the server time regardless of  the  chip
60       time.  However, once the clock has been set, an error greater than 1000
61       s will cause ntpd to exit anyway.
62
63       Under ordinary conditions, ntpd slews the clock so  that  the  time  is
64       effectively continuous and never runs backwards. If due to extreme net‐
65       work congestion an error spike exceeds the step threshold,  by  default
66       128 ms, the spike is discarded. However, if the error persists for more
67       than the stepout threshold, by default  900  s,  the  system  clock  is
68       stepped  to  the  correct  value.  In  practice  the need for a step is
69       extremely rare and is almost always the result of a  hardware  failure.
70       With  the  -x  option  the  step threshold is increased to 600 s. Other
71       options are available using the tinker  command  on  the  Miscellaneous
72       Options page.
73
74       The  issues  should be carefully considered before using these options.
75       The maximum slew rate possible  is  limited  to  500  parts-per-million
76       (PPM)  by  the  Unix kernel. As a result, the clock can take 2000 s for
77       each second the clock is outside  the  acceptable  range.  During  this
78       interval  the clock will not be consistent with any other network clock
79       and the system cannot be used for distributed applications that require
80       correctly synchronized network time.
81
82       The frequency file, usually called ntp.drift, contains the latest esti‐
83       mate of clock frequency. If this file  does  not  exist  when  ntpd  is
84       started,  it  enters  a special mode designed to measure the particular
85       frequency directly. The measurement takes 15 minutes, after  which  the
86       frequency  is  set and ntpd resumes normal mode where the time and fre‐
87       quency are continuously adjusted. The  frequency  file  is  updated  at
88       intervals of an hour or more depending on the measured clock stability.
89
90

OPERATING MODES

92       The  ntpd  program  normally  operates continuously while adjusting the
93       time and frequency, but in some cases it may not be practical to run it
94       continuously.  With  the  -q option ntpd operates as in continous mode,
95       but exits just after setting the clock for the first time with the con‐
96       figured  servers.  Most  applications will probably want to specify the
97       iburst option with the server command. With this  option  a  volley  of
98       messages  is  exchanged to groom the data and set the clock in about 10
99       s. If nothing is heard after a few minutes, the daemon  times  out  and
100       exits.
101
102

POLL INTERVAL CONTROL

104       NTP  uses an intricate heuristic algorithm to automatically control the
105       poll interval for maximum  accuracy  consistent  with  minimum  network
106       overhead.  The  algorithm  measures the incidental offset and jitter to
107       determine the best poll interval. When ntpd starts, the interval is the
108       default minimum 64 s. Under normal conditions when the clock discipline
109       has stabilized, the interval increases in steps to the default  maximum
110       1024  s.  In  addition,  should  a server become unreachable after some
111       time, the interval increases in steps to the maximum in order to reduce
112       network overhead.
113
114       The  default  poll  interval range is suitable for most conditions, but
115       can be changed using options on the Server  Options  and  Miscellaneous
116       Options  pages.  However, when using maximum intervals much larger than
117       the default, the residual clock frequency error must  be  small  enough
118       for  the  discipline  loop to capture and correct. The capture range is
119       500 PPM with a 64-s interval decreasing by a factor  of  two  for  each
120       interval  doubling. At a 36-hr interval, for example, the capture range
121       is only 0.24 PPM.
122
123

THE HUFF-N'-PUFF FILTER

125       In scenarios where a considerable amount of data are to  be  downloaded
126       or uploaded over telephone modems, timekeeping quality can be seriously
127       degraded. This occurs because the differential delays on the two direc‐
128       tions  of  transmission  can be quite large. In many cases the apparent
129       time errors are so large as to exceed the step  threshold  and  a  step
130       correction can occur during and after the data transfer.
131
132       The huff-n'-puff filter is designed to correct the apparent time offset
133       in these cases. It depends on knowledge of the propagation  delay  when
134       no  other traffic is present, such as during other than work hours. The
135       filter remembers the minimum delay over the most recent  interval  mea‐
136       sured  usually  in  hours. Under conditions of severe delay, the filter
137       corrects the apparent offset using the sign of the offset and the  dif‐
138       ference  between  the apparent delay and minimum delay. The name of the
139       filter reflects the negative (huff)  and  positive  (puff)  correction,
140       which depends on the sign of the offset. The filter is activated by the
141       tinker huffpuff command, as  described  in  the  Miscellaneous  Options
142       page.
143
144

LEAP SECOND PROCESSING

146       As  provided  by  international agreement, an extra second is sometimes
147       inserted in Coordinated Universal Time (UTC) at the end of  a  selected
148       month,  usually  June or December. The National Institutes of Standards
149       and  Technology  (NIST)  provides  an  historic  leapseconds  file   at
150       time.nist.gov  for  retrieval  via  FTP. When this file, usually called
151       ntp-leapseconds.list, is copied and installed in a directory. The leap‐
152       file configuration command specifies the path to this file. At startup,
153       ntpd reads it and initializes three leapsecond values: the NTP  seconds
154       at  the  next  leap  event, the offset of UTC relative to International
155       Atomic Time (TAI) after the leap and the NTP seconds when the  leapsec‐
156       onds file expires and should be retrieved again.
157
158       If  a  host  does  not have the leapsecond values, they can be obtained
159       over the net using  the  Autokey  security  protocol.  Ordinarily,  the
160       leapseconds  file  is  installed  on the primary servers and the values
161       flow from them via secondary servers  to  the  clients.  When  multiple
162       servers  are  involved,  the values with the latest expiration time are
163       used.
164
165       If the latest leap is in the past, nothing further is done  other  than
166       to  install  the  TAI offset. If the leap is in the future less than 28
167       days, the leap warning bits are set. If in  the  future  less  than  23
168       hours,  the kernel is armed to insert one second at the end of the cur‐
169       rent day. If the kernel is enabled, the leap is done  automatically  at
170       that  time;  otherwise, the clock is effectively stopped for one second
171       at the leap. Additional details are in the The NTP Timescale  and  Leap
172       Seconds white paper
173
174       If  none  of the above provisions are available, dsependent servers and
175       clients tally the leap warning bits of surviving servers and  reference
176       clocks.  When  a majority of the survivors show warning, a leap is pro‐
177       grammed at the end of the current month. During the month  and  day  of
178       insertion, they operate as above. In this way the leap is propagated at
179       all dependent servers and clients.
180
181

ADDITIONAL FEATURES

183       A new experimental feature called interleaved modes can be used in  NTP
184       symmetric  or  broadcast  modes.  It is designed to improve accuracy by
185       avoiding kernel latency and queueing delay, as  described  on  the  NTP
186       Interleaved  Modes  page. It is activated by the xleave option with the
187       peer or broadcast configuration commands. The  NTP  protocol  automati‐
188       cally  reconfigures in normal or interleaved mode as required. Ordinary
189       broadcast clients can use the same servers as  interleaved  clients  at
190       the  same  time. Further details are in the white paper NTP Interleaved
191       On-Wire Protocol and the briefing Interleaved Synchronization Protocols
192       for LANs and Space Data Links.
193
194       If  ntpd,  is  configured with NetInfo support, it will attempt to read
195       its configuration from the NetInfo service if the default ntp.conf file
196       cannot be read and no file is specified by the -c option.
197
198       In contexts where a host name is expected, a -4 qualifier preceding the
199       host name forces DNS resolution to the IPv4 namespace, while a -6 qual‐
200       ifier forces DNS resolution to the IPv6 namespace.
201
202       Various  internal  ntpd  variables  can  be displayed and configuration
203       options altered while the ntpd is running  using  the  ntpq  and  ntpdc
204       utility programs.
205
206       When  ntpd starts it looks at the value of umask, and if zero ntpd will
207       set the umask to 022.
208
209       Unless the -n, -d or -D option is used, ntpd changes the current  work‐
210       ing  directory to the root directory, so any options or commands speci‐
211       fying paths need to use an absolute path or  a  path  relative  to  the
212       root.
213
214

COMMAND LINE OPTIONS

216       -4      Force DNS resolution of host names to the IPv4 namespace.
217
218       -6      Force DNS resolution of host names to the IPv6 namespace.
219
220       -a      Require cryptographic authentication for broadcast client, mul‐
221               ticast client and symmetric passive associations. This  is  the
222               same operation as the enable auth command and is the default.
223
224       -A      Do  not  require  cryptographic  authentication  for  broadcast
225               client, multicast client and  symmetric  passive  associations.
226               This  is  the  same  operation  as the disable auth command and
227               almost never a good idea.
228
229       -b      Enable the client to synchronize to broadcast servers.
230
231       -c conffile
232               Specify the name and path of the  configuration  file,  default
233               /etc/ntp.conf.
234
235       -d      Specify  debugging  mode. This option may occur more than once,
236               with each occurrence indicating greater detail of display.
237
238       -D level
239               Specify debugging level directly.
240
241       -f driftfile
242               Specify the name and path of the frequency file.  This  is  the
243               same operation as the driftfile driftfile command.
244
245       -g      Normally,  ntpd  exits  with a message to the system log if the
246               offset exceeds the panic threshold, which is 1000 s by default.
247               This  option  allows  the  time  to be set to any value without
248               restriction; however, this can happen only once. If the thresh‐
249               old  is  exceeded  after that, ntpd will exit with a message to
250               the system log. This option can be used  with  the  -q  and  -x
251               options. See the tinker command for other options.
252
253       -i jaildir
254               Chroot  the  server  to the directory jaildir. This option also
255               implies that the server attempts to  drop  root  privileges  at
256               startup  (otherwise,  chroot gives very little additional secu‐
257               rity), and it is only available if the OS supports to  run  the
258               server without full root privileges. You may need to also spec‐
259               ify a -u option.
260
261       -I [address | interface name]
262               Open the network address given, or all the addresses associated
263               with  the given interface name. This option may appear multiple
264               times. This option also implies not  opening  other  addresses,
265               except  wildcard  and  localhost.  This  option  is deprecated.
266               Please consider using the configuration file interface command,
267               which is more versatile.
268
269       -k keyfile
270               Specify  the  name  and path of the symmetric key file. This is
271               the same operation as the keys keyfile command.
272
273       -l logfile
274               Specify the name and path of the log file. The default  is  the
275               system log file. This is the same operation as the logfile log‐
276               file command.
277
278       -L      Do not listen to virtual  interfaces,  defined  as  those  with
279               names  containing  a  colon.  This option is deprecated. Please
280               consider using the configuration file interface command,  which
281               is more versatile.
282
283       -M      Raise scheduler precision to its maximum (1 msec) using timeBe‐
284               ginPeriod. (Windows only)
285
286       -m      Lock memory.
287
288       -n      Don't fork.
289
290       -N      To the extent permitted by the operating system, run  the  ntpd
291               at the highest priority.
292
293       -p pidfile
294               Specify  the  name and path of the file used to record the ntpd
295               process ID. This is the same operation as the  pidfile  pidfile
296               command.
297
298       -P priority
299               To  the  extent permitted by the operating system, run the ntpd
300               at the specified priority.
301
302       -q      Exit the ntpd just after the first time the clock is set.  This
303               behavior  mimics  that  of  the ntpdate program, which is to be
304               retired. The -g and -x options can be used  with  this  option.
305               Note: The kernel time discipline is disabled with this option.
306
307       -r broadcastdelay
308               Specify the default propagation delay from the broadcast/multi‐
309               cast server to this client. This is necessary only if the delay
310               cannot be computed automatically by the protocol.
311
312       -s statsdir
313               Specify  the directory path for files created by the statistics
314               facility. This is the same operation as the  statsdir  statsdir
315               command.
316
317       -t key  Add a key number to the trusted key list. This option can occur
318               more than once. This is the same operation  as  the  trustedkey
319               key command.
320
321       -u user[:group]
322               Specify  a  user,  and  optionally  a group, to switch to. This
323               option is only available if the OS supports running the  server
324               without  full  root  privileges. Currently, this option is sup‐
325               ported under  NetBSD  (configure  with  --enable-clockctl)  and
326               Linux (configure with --enable-linuxcaps).
327
328       -U interface update interval
329               Number  of seconds to wait between interface list scans to pick
330               up new and delete  network  interface.  Set  to  0  to  disable
331               dynamic interface list updating. The default is to scan every 5
332               minutes.
333
334       -x      Normally, the time is slewed if the offset  is  less  than  the
335               step  threshold,  which  is  128  ms by default, and stepped if
336               above the threshold. This option sets the threshold to  600  s,
337               which is well within the accuracy window to set the clock manu‐
338               ally. Note: Since the slew rate of typical Unix kernels is lim‐
339               ited to 0.5 ms/s, each second of adjustment requires an amorti‐
340               zation interval of 2000 s. Thus, an adjustment as much as 600 s
341               will  take  almost 14 days to complete. This option can be used
342               with the -g and -q options. See the tinker  command  for  other
343               options. Note: The kernel time discipline is disabled with this
344               option and the step threshold is applied also  to  leap  second
345               corrections.
346
347

THE CONFIGURATION FILE

349       Ordinarily,  ntpd  reads  the ntp.conf configuration file at startup in
350       order to determine the synchronization sources and operating modes.  It
351       is  also possible to specify a working, although limited, configuration
352       entirely on the command line, obviating the need  for  a  configuration
353       file. This may be particularly useful when the local host is to be con‐
354       figured as a broadcast client, with servers determined by listening  to
355       broadcasts at run time.
356
357       Usually, the configuration file is installed as/etc/ntp.conf, but could
358       be installed elsewhere (see the -c conffile command line  option).  The
359       file  format  is  similar  to other Unix configuration files - comments
360       begin with a # character and extend to the end of the line; blank lines
361       are ignored.
362
363       Configuration  commands  consist of an initial command keyword followed
364       by a list of option keywords separated by whitespace. Commands may  not
365       be  continued  over  multiple  lines.  Options  may be host names, host
366       addresses written in  numeric,  dotted-quad  form,  integers,  floating
367       point  numbers  (when  specifying  times  in seconds) and text strings.
368       Optional arguments are delimited by [ ] in  the  options  pages,  while
369       alternatives  are  separated  by  |.  The  notation  [  ...  ] means an
370       optional, indefinite repetition of the last item before the [ ... ].
371
372

FILES

374       ┌─────────────────────┬──────────────────────┬──────────┬──────────────┐
375       │File                 │ Default              │  Option  │  Command     │
376       ├─────────────────────┼──────────────────────┼──────────┼──────────────┤
377       │configuration file   │ /etc/ntp.conf        -c      │  none        │
378       ├─────────────────────┼──────────────────────┼──────────┼──────────────┤
379       │frequency file       │ none                 │  -f      driftfile   
380       ├─────────────────────┼──────────────────────┼──────────┼──────────────┤
381       │leapseconds file     │ none                 │          │  leapfile    
382       ├─────────────────────┼──────────────────────┼──────────┼──────────────┤
383       │process ID file      │ none                 │  -p      pidfile     
384       ├─────────────────────┼──────────────────────┼──────────┼──────────────┤
385       │log file             │ system log           │  -l      logfile     
386       ├─────────────────────┼──────────────────────┼──────────┼──────────────┤
387       │include file         │ none                 │  none    │  includefile 
388       ├─────────────────────┼──────────────────────┼──────────┼──────────────┤
389       │statistics path      │ /var/log/ntpstats/   -s      statsdir    
390       ├─────────────────────┼──────────────────────┼──────────┼──────────────┤
391       │keys path            │ /etc/ntp/crypto      none    keysdir     
392       └─────────────────────┴──────────────────────┴──────────┴──────────────┘
393

EXIT CODES

395       A non-zero exit code indicates an error. Any error messages are  logged
396       to the system log by default.
397
398       The  exit  code  is 0 only when ntpd is terminated by a signal, or when
399       the -q option is used and ntpd successfully sets the system clock.
400
401

SEE ALSO

403       ntp.conf(5), ntpq(8), ntpdc(8)
404
405       The official HTML documentation.
406
407       This file was automatically generated from HTML source.
408
409
410
411
412                                                                       ntpd(8)
Impressum