ntpdate will unnecessarily trigger rate limit response from server
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
NTP Charm |
New
|
Undecided
|
Unassigned |
Bug Description
With verify_
Instead of generating a new set of packets in update-status hook, the charm can check the daemon's status with `chronyc sources`, `chronyc tracking` or something just to read the existing data.
$ ntpdate -qd ntp.ubuntu.com
27 Nov 06:45:31 ntpdate[244351]: ntpdate 4.2.8p12@1.3728-o (1)
Looking for host ntp.ubuntu.com and service ntp
91.189.89.198 reversed to chilipepper.
host found : chilipepper.
transmit(
transmit(
receive(
27 Nov 06:45:32 ntpdate[244351]: 91.189.89.199 rate limit response from server.
transmit(
receive(
27 Nov 06:45:32 ntpdate[244351]: 91.189.94.4 rate limit response from server.
transmit(
receive(
27 Nov 06:45:32 ntpdate[244351]: 91.189.91.157 rate limit response from server.
91.189.89.198: Server dropped: no data
91.189.89.199: Server dropped: no data
91.189.94.4: Server dropped: no data
91.189.91.157: Server dropped: no data
27 Nov 06:45:33 ntpdate[244351]: no server suitable for synchronization found
Yes, please don't DoS our NTP servers...