http://www.ntp.org/ntpfaq/NTP-s-config.htm
szerint:
6.1.3.5. What are all the different Keys used for?
In addition to the example given in Q: 6.1.3.3., Professor David L. Mills states:
Control keys are for the ntpq program and request keys are for the ntpdc program.
The key file(s) define the cryptographic keys, but these must be activated individually
using the trustedkey command. That last is so a single key file can be shared among a bunch of
servers, but only certain ones used between pairwise symmetric mode servers. You are invited
to cut this paragraph and paste it on the refrigerator door if it eases confusion.
Hogyan tudnam tesztelni az /etc/ntp.conf fajlban definialt
### Authentication section ###
keys /etc/ntp.keys
trustedkey 1 2 15
requestkey 15
controlkey 15
controlkey illetve a requestkey kulcsokat ntpq illetve ntpdc programokra?
Ardi
Hozzászólások
Sziasztok,
tudna nekem valaki peldan megmagyarazni a controlkey mukodeset ntpq eseteben?
Sehol sem talalok erre tippet a neten.
Elore is koszi a segitseget.
Ardi