[ntp:questions] ntpdate.c unsafe buffer write
stenn at ntp.org
Tue Feb 12 05:31:08 UTC 2008
>>> In article <for4r3$82o$1 at scrotar.nss.udel.edu>, "David L. Mills" <mills at udel.edu> writes:
David> Serge, I didn't believe what you said until I checked the code and it
David> does increase the correction by 50%, but limits the overshoot to 50
David> ms. Why in the would it overshoot at all?
Dave, this is one of the many problem with ntpdate and why we wanted to
kill it off since nobody was maintaining it.
As I recall, somebody said "For folks who want to run ntpdate out of cron,
we should do a bit of overshoot so we can home in on the right adjustment."
As I recall, the thought was "If we start off with no overshoot and make our
adjustment, the next time we run ntpdate we will make the same adjustment
that we just did. So let's overshoot so next time we will be a bit closer".
I didn't say the idea makes a lot of sense, but hey.
Harlan Stenn <stenn at ntp.org>
http://ntpforum.isc.org - be a member!
More information about the questions