Discussion:
Nistime
(too old to reply)
j***@nospam.com.au
2012-02-03 00:37:20 UTC
Permalink
Nistime has exhausted my list of time servers without connecting to any.

Do you know of a time server that responds to Nistime?
Dave Yeo
2012-02-03 05:31:27 UTC
Permalink
Post by j***@nospam.com.au
Nistime has exhausted my list of time servers without connecting to any.
Do you know of a time server that responds to Nistime?
I use
0.north-america.pool.ntp.org
1.north-america.pool.ntp.org
0.ca.pool.ntp.org
1.ca.pool.ntp.org

There should be *.pool.ntp.org servers for your location, see
http://support.ntp.org/bin/view/Servers/NTPPoolServers
Dave
j***@nospam.com.au
2012-02-03 19:43:55 UTC
Permalink
Post by Dave Yeo
Post by j***@nospam.com.au
Nistime has exhausted my list of time servers without connecting to any.
Do you know of a time server that responds to Nistime?
I use
0.north-america.pool.ntp.org
1.north-america.pool.ntp.org
0.ca.pool.ntp.org
1.ca.pool.ntp.org
There should be *.pool.ntp.org servers for your location, see
http://support.ntp.org/bin/view/Servers/NTPPoolServers
Dave
Nothing was received from any of the pool servers.
One specific server refused to connect.
All other specific servers timed out.

I have not changed my software so am at a loss to understand why it no longer
works.

The same software works on another machine.
t***@antispam.ham
2012-02-04 00:14:09 UTC
Permalink
Post by j***@nospam.com.au
Nothing was received from any of the pool servers.
One specific server refused to connect.
All other specific servers timed out.
I have not changed my software so am at a loss to understand why it no longer
works.
The same software works on another machine.
With the same time servers?

I use a different clock synchronization program, and I've
had cases where time servers that used to work no longer
work. It may be that the people in charge of that time
server decided to end the service, or perhaps limit it to
just a certain range of IP addresses to serve a particular
community rather than just anyone.
j***@nospam.com.au
2012-02-06 00:25:09 UTC
Permalink
Post by t***@antispam.ham
Post by j***@nospam.com.au
Nothing was received from any of the pool servers.
One specific server refused to connect.
All other specific servers timed out.
I have not changed my software so am at a loss to understand why it no longer
works.
The same software works on another machine.
With the same time servers?
I use a different clock synchronization program, and I've
had cases where time servers that used to work no longer
work. It may be that the people in charge of that time
server decided to end the service, or perhaps limit it to
just a certain range of IP addresses to serve a particular
community rather than just anyone.
I wrongly reported Nistime working on another machine; it does not.

Here is my server list:-

File: nist-srv.lst

This file contains information about all of the time servers
operated by NIST. You may get a copy of this file from the
/pub directory on any NIST time server.

Server name ip address Note Location
$
au.pool.ntp.org
0.pool.ntp.org
1.pool.ntp.org
2.pool.ntp.org
3.pool.ntp.org
ntp.cs.mu.oz.au 128.250.37.1
ntp.mel.nml.csiro.au 138.194.21.154
ntp.per.nml.csiro.au 130.95.156.206
clock.tl.fukuoka-u.ac.jp 133.100.11.8
tick.usno.navy.mil 192.5.41.40
lerc-dns.lerc.nasa.gov 128.156.1.43
ntp.nml.csiro.au 130.155.98.1
$
Notes:
Steve
2012-02-06 12:40:40 UTC
Permalink
Post by j***@nospam.com.au
I wrongly reported Nistime working on another machine; it does not.
Here is my server list:-
File: nist-srv.lst
Hi,

NISTIME2 is workig here with the following:

6-10-01 7:19p 62464 0 nistime.exe
6-11-01 7:18p 4910 5001 nistime2.cmd
4-01-11 3:45p 2678 35 nist-srv.lst

With the first part of nist-srv.lst:

File: nist-srv.lst

This file contains information about all of the time servers
operated by NIST. You may get a copy of this file from the
/pub directory on any NIST time server.

Server name ip address Note Location
$
utcnist.colorado.edu 128.138.140.44 2 Colorado
utcnist2.colorado.edu 128.138.188.172 5 Colorado
nist1.aol-ca.truetime.com 207.200.81.113 2 California
nist1-ny.ustiming.org 64.90.182.55 5 NY
nist1-nj.ustiming.org 96.47.67.105 5 NJ
nist1-pa.ustiming.org 206.246.122.250 5 PA
nist.netservicesgroup.com 64.113.32.5 5 Michigan
nisttime.carsoncity.k12.mi.us 66.219.116.140 5 Michigan

Regards,

Steve N.
Steven Levine
2012-02-06 17:58:37 UTC
Permalink
On Mon, 6 Feb 2012 00:25:09 UTC, ***@nospam.com.au wrote:

Hi John,
Post by j***@nospam.com.au
Server name ip address Note Location
$
au.pool.ntp.org
0.pool.ntp.org
1.pool.ntp.org
2.pool.ntp.org
3.pool.ntp.org
ntp.cs.mu.oz.au 128.250.37.1
ntp.mel.nml.csiro.au 138.194.21.154
ntp.per.nml.csiro.au 130.95.156.206
clock.tl.fukuoka-u.ac.jp 133.100.11.8
tick.usno.navy.mil 192.5.41.40
lerc-dns.lerc.nasa.gov 128.156.1.43
ntp.nml.csiro.au 130.155.98.1
$
You need to figure out what is failing and where.

- Run iptrace in a command line session with
iptrace
- Run nistime in another command line session with
nistime.exe -s0 au.pool.ntp.org
- Press enter in the iptrace session window
- Run ipformat in the iptrace session window with
ipformat >nistime.out

Nistime.out should report a DNS lookup and a UDP transaction.

Steven
--
---------------------------------------------------------------------
Steven Levine <***@earthlink.bogus.net>
eCS/Warp/DIY etc. www.scoug.com www.ecomstation.com
---------------------------------------------------------------------
j***@nospam.com.au
2012-02-06 20:50:48 UTC
Permalink
Post by Steven Levine
Hi John,
You need to figure out what is failing and where.
- Run iptrace in a command line session with
iptrace
- Run nistime in another command line session with
nistime.exe -s0 au.pool.ntp.org
- Press enter in the iptrace session window
- Run ipformat in the iptrace session window with
ipformat >nistime.out
Nistime.out should report a DNS lookup and a UDP transaction.
Experiments with Nistime options confirm that the DNS is working.

Is it significant that ping 127.0.0.0 fails? I am sure it used to work.

Here is the nistime.out file:-

Opening IPTRACE.DMP ... Sucessful
Reading packet headers ... 14 headers read.
PreProcess packet info

-------------------------- #:1 --------------------------
Delta Time: 0.000sec Packet Length: 212 bytes (D4 hex)
IP: Dest: 192.168.100.255 Source: 192.168.100.002
----------------------- IP HEADER -----------------------
IP: Version: 4 Correct Header Length: 20 bytes
IP: Type Of Service: 00
IP: 000. .... Routine
IP: ...0 .... Normal Delay
IP: .... 0... Normal Throughput
IP: .... .0.. Normal Reliability
IP: Total Len: 212 (xD4) bytes Id: 0B98
IP: Flags: 0
IP: .0.. May Fragment
IP: ..0. Last Fragment
IP: Fragment Offset: 000
IP: Time To Live: 64 sec Protocol: 17 UDP
IP: Header Checksum: 242F (Correct)
IP: No Options

---------------------- UDP HEADER ----------------------
UDP: Source Port: 138 (NETBIOS Datagram) Dest Port: 138 (NETBIOS Datagram)
UDP: Length: 192 (xC0)
UDP: Checksum: ECBC (Correct)
--------------------------------- DATA -----------------------------------
0000 11 02 00 29 C0 A8 64 02 00 8A 00 AA 00 00 20 46 ...)..d....... F
0010 41 45 44 44 42 43 41 43 41 43 41 43 41 43 41 43 AEDDBCACACACACAC
0020 41 43 41 43 41 43 41 43 41 43 41 43 41 41 41 00 ACACACACACACAAA.
0030 20 45 4B 45 50 45 49 45 4F 46 44 46 46 46 45 45 EKEPEIEOFDFFFEE
0040 49 43 41 43 41 43 41 43 41 43 41 43 41 43 41 41 ICACACACACACACAA
0050 41 00 FF 53 4D 42 25 00 00 00 00 00 00 00 00 00 A..SMB%.........
0060 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0070 00 00 11 00 00 0F 00 00 00 00 00 00 00 00 00 E8 ................
0080 03 00 00 00 00 00 00 00 00 0F 00 56 00 03 00 01 ...........V....
0090 00 00 00 02 00 20 00 5C 4D 41 49 4C 53 4C 4F 54 ..... .\MAILSLOT
00A0 5C 4C 41 4E 4D 41 4E 00 01 00 03 00 00 00 25 00 \LANMAN.......%.
00B0 3C 00 50 43 31 00 00 00 <.PC1...


-------------------------- #:2 --------------------------
Delta Time: 0.000sec Packet Length: 226 bytes (E2 hex)
DIX: Dest: FF:FF:FF:FF:FF:FF Source: 00:20:ED:4A:08:96
DIX: Dest: 192.168.100.255 Source: 192.168.100.002
----------------------- IP HEADER -----------------------
IP: Version: 4 Correct Header Length: 20 bytes
IP: Type Of Service: 00
IP: 000. .... Routine
IP: ...0 .... Normal Delay
IP: .... 0... Normal Throughput
IP: .... .0.. Normal Reliability
IP: Total Len: 212 (xD4) bytes Id: 0B98
IP: Flags: 0
IP: .0.. May Fragment
IP: ..0. Last Fragment
IP: Fragment Offset: 000
IP: Time To Live: 64 sec Protocol: 17 UDP
IP: Header Checksum: 242F (Correct)
IP: No Options

---------------------- UDP HEADER ----------------------
UDP: Source Port: 138 (NETBIOS Datagram) Dest Port: 138 (NETBIOS Datagram)
UDP: Length: 192 (xC0)
UDP: Checksum: ECBC (Correct)
--------------------------------- DATA -----------------------------------
0000 11 02 00 29 C0 A8 64 02 00 8A 00 AA 00 00 20 46 ...)..d....... F
0010 41 45 44 44 42 43 41 43 41 43 41 43 41 43 41 43 AEDDBCACACACACAC
0020 41 43 41 43 41 43 41 43 41 43 41 43 41 41 41 00 ACACACACACACAAA.
0030 20 45 4B 45 50 45 49 45 4F 46 44 46 46 46 45 45 EKEPEIEOFDFFFEE
0040 49 43 41 43 41 43 41 43 41 43 41 43 41 43 41 41 ICACACACACACACAA
0050 41 00 FF 53 4D 42 25 00 00 00 00 00 00 00 00 00 A..SMB%.........
0060 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0070 00 00 11 00 00 0F 00 00 00 00 00 00 00 00 00 E8 ................
0080 03 00 00 00 00 00 00 00 00 0F 00 56 00 03 00 01 ...........V....
0090 00 00 00 02 00 20 00 5C 4D 41 49 4C 53 4C 4F 54 ..... .\MAILSLOT
00A0 5C 4C 41 4E 4D 41 4E 00 01 00 03 00 00 00 25 00 \LANMAN.......%.
00B0 3C 00 50 43 31 00 00 00 <.PC1...


-------------------------- #:3 --------------------------
Delta Time: 0.000sec Packet Length: 212 bytes (D4 hex)
IP: Dest: 192.168.100.255 Source: 192.168.100.002
----------------------- IP HEADER -----------------------
IP: Version: 4 Correct Header Length: 20 bytes
IP: Type Of Service: 00
IP: 000. .... Routine
IP: ...0 .... Normal Delay
IP: .... 0... Normal Throughput
IP: .... .0.. Normal Reliability
IP: Total Len: 212 (xD4) bytes Id: 0B98
IP: Flags: 0
IP: .0.. May Fragment
IP: ..0. Last Fragment
IP: Fragment Offset: 000
IP: Time To Live: 64 sec Protocol: 17 UDP
IP: Header Checksum: 242F (Correct)
IP: No Options

---------------------- UDP HEADER ----------------------
UDP: Source Port: 138 (NETBIOS Datagram) Dest Port: 138 (NETBIOS Datagram)
UDP: Length: 192 (xC0)
UDP: Checksum: ECBC (Correct)
--------------------------------- DATA -----------------------------------
0000 11 02 00 29 C0 A8 64 02 00 8A 00 AA 00 00 20 46 ...)..d....... F
0010 41 45 44 44 42 43 41 43 41 43 41 43 41 43 41 43 AEDDBCACACACACAC
0020 41 43 41 43 41 43 41 43 41 43 41 43 41 41 41 00 ACACACACACACAAA.
0030 20 45 4B 45 50 45 49 45 4F 46 44 46 46 46 45 45 EKEPEIEOFDFFFEE
0040 49 43 41 43 41 43 41 43 41 43 41 43 41 43 41 41 ICACACACACACACAA
0050 41 00 FF 53 4D 42 25 00 00 00 00 00 00 00 00 00 A..SMB%.........
0060 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0070 00 00 11 00 00 0F 00 00 00 00 00 00 00 00 00 E8 ................
0080 03 00 00 00 00 00 00 00 00 0F 00 56 00 03 00 01 ...........V....
0090 00 00 00 02 00 20 00 5C 4D 41 49 4C 53 4C 4F 54 ..... .\MAILSLOT
00A0 5C 4C 41 4E 4D 41 4E 00 01 00 03 00 00 00 25 00 \LANMAN.......%.
00B0 3C 00 50 43 31 00 00 00 <.PC1...


-------------------------- #:4 --------------------------
Delta Time: 8.672sec Packet Length: 75 bytes (4B hex)
DIX: Dest: 00:13:F7:53:9E:58 Source: 00:20:ED:4A:08:96
DIX: Dest: 139.134.005.051 Source: 192.168.100.002
----------------------- IP HEADER -----------------------
IP: Version: 4 Correct Header Length: 20 bytes
IP: Type Of Service: 00
IP: 000. .... Routine
IP: ...0 .... Normal Delay
IP: .... 0... Normal Throughput
IP: .... .0.. Normal Reliability
IP: Total Len: 61 (x3D) bytes Id: 0B99
IP: Flags: 0
IP: .0.. May Fragment
IP: ..0. Last Fragment
IP: Fragment Offset: 000
IP: Time To Live: 64 sec Protocol: 17 UDP
IP: Header Checksum: B9B3 (Correct)
IP: No Options

---------------------- UDP HEADER ----------------------
UDP: Source Port: 49228 (Unassigned port) Dest Port: 53 (Domain NameServer)
UDP: Length: 41 (x29)
UDP: Checksum: 414E (Correct)
------------------------ DNS ----------------------------
DNS: ID:113
DNS: Query Standard Query
DNS: FLAGS: 10
DNS: .0. .... = No Truncation
DNS: ..1 .... = Recursion Desired
DNS: Return Code: 0 No Error
DNS: Question Cnt: 1, Answer Cnt: 0
DNS: Authority Cnt: 0, Additional Cnt: 0
DNS: Question Section
DNS: Name: au.pool.ntp.org
DNS: Type: 01 Class: 01

-------------------------- #:5 --------------------------
Delta Time: 0.000sec Packet Length: 60 bytes (3C hex)
DIX: Dest: FF:FF:FF:FF:FF:FF Source: 00:13:F7:53:9E:58
-------------------------- ARP --------------------------
ARP: Hardware Type:1 (Ethernet 10Mb)
ARP: Protocol Type:0800 (IP Address)
ARP: Hardware Len:6
ARP: Protocol Len:4
ARP: Operation:1 (ARP Request)
ARP: Sender HW address: 0013F7539E58
ARP: Sender PA: 192.168.100.001.
ARP: Target HW address: 000000000000
ARP: Target PA: 192.168.100.002.

-------------------------- #:6 --------------------------
Delta Time: 0.000sec Packet Length: 70 bytes (46 hex)
DIX: Dest: 00:20:ED:4A:08:96 Source: 00:13:F7:53:9E:58
DIX: Dest: 192.168.100.002 Source: 192.168.100.001
----------------------- IP HEADER -----------------------
IP: Version: 4 Correct Header Length: 20 bytes
IP: Type Of Service: 00
IP: 000. .... Routine
IP: ...0 .... Normal Delay
IP: .... 0... Normal Throughput
IP: .... .0.. Normal Reliability
IP: Total Len: 56 (x38) bytes Id: 0061
IP: Flags: 0
IP: .0.. May Fragment
IP: ..0. Last Fragment
IP: Fragment Offset: 000
IP: Time To Live: 64 sec Protocol: 1 ICMP
IP: Header Checksum: 3110 (Correct)
IP: No Options
---------------------- ICMP HEADER ----------------------
ICMP: Type: 03 Dest unreach
ICMP: Code: 00 Network Unreachable
ICMP: Checksum: FB06 (Correct)
--------------------------------- DATA -----------------------------------
0000 45 00 00 3D 0B 99 00 00 3F 11 BA B3 C0 A8 64 02 E..=....?.....d.
0010 8B 86 05 33 C0 4C 00 35 00 29 41 4E ...3.L.5.)AN


-------------------------- #:7 --------------------------
Delta Time: 0.000sec Packet Length: 60 bytes (3C hex)
DIX: Dest: 00:13:F7:53:9E:58 Source: 00:20:ED:4A:08:96
-------------------------- ARP --------------------------
ARP: Hardware Type:1 (Ethernet 10Mb)
ARP: Protocol Type:0800 (IP Address)
ARP: Hardware Len:6
ARP: Protocol Len:4
ARP: Operation:2 (ARP Response)
ARP: Sender HW address: 0020ED4A0896
ARP: Sender PA: 192.168.100.002.
ARP: Target HW address: 0013F7539E58
ARP: Target PA: 192.168.100.001.

-------------------------- #:8 --------------------------
Delta Time: 0.000sec Packet Length: 75 bytes (4B hex)
DIX: Dest: 00:13:F7:53:9E:58 Source: 00:20:ED:4A:08:96
DIX: Dest: 203.189.080.075 Source: 192.168.100.002
----------------------- IP HEADER -----------------------
IP: Version: 4 Correct Header Length: 20 bytes
IP: Type Of Service: 00
IP: 000. .... Routine
IP: ...0 .... Normal Delay
IP: .... 0... Normal Throughput
IP: .... .0.. Normal Reliability
IP: Total Len: 61 (x3D) bytes Id: 0B9A
IP: Flags: 0
IP: .0.. May Fragment
IP: ..0. Last Fragment
IP: Fragment Offset: 000
IP: Time To Live: 64 sec Protocol: 17 UDP
IP: Header Checksum: 2E63 (Correct)
IP: No Options

---------------------- UDP HEADER ----------------------
UDP: Source Port: 49229 (Unassigned port) Dest Port: 53 (Domain NameServer)
UDP: Length: 41 (x29)
UDP: Checksum: B5FD (Correct)
------------------------ DNS ----------------------------
DNS: ID:113
DNS: Query Standard Query
DNS: FLAGS: 10
DNS: .0. .... = No Truncation
DNS: ..1 .... = Recursion Desired
DNS: Return Code: 0 No Error
DNS: Question Cnt: 1, Answer Cnt: 0
DNS: Authority Cnt: 0, Additional Cnt: 0
DNS: Question Section
DNS: Name: au.pool.ntp.org
DNS: Type: 01 Class: 01

-------------------------- #:9 --------------------------
Delta Time: 0.002sec Packet Length: 70 bytes (46 hex)
DIX: Dest: 00:20:ED:4A:08:96 Source: 00:13:F7:53:9E:58
DIX: Dest: 192.168.100.002 Source: 192.168.100.001
----------------------- IP HEADER -----------------------
IP: Version: 4 Correct Header Length: 20 bytes
IP: Type Of Service: 00
IP: 000. .... Routine
IP: ...0 .... Normal Delay
IP: .... 0... Normal Throughput
IP: .... .0.. Normal Reliability
IP: Total Len: 56 (x38) bytes Id: 0062
IP: Flags: 0
IP: .0.. May Fragment
IP: ..0. Last Fragment
IP: Fragment Offset: 000
IP: Time To Live: 64 sec Protocol: 1 ICMP
IP: Header Checksum: 310F (Correct)
IP: No Options
---------------------- ICMP HEADER ----------------------
ICMP: Type: 03 Dest unreach
ICMP: Code: 00 Network Unreachable
ICMP: Checksum: 8656 (Correct)
--------------------------------- DATA -----------------------------------
0000 45 00 00 3D 0B 9A 00 00 3F 11 2F 63 C0 A8 64 02 E..=....?./c..d.
0010 CB BD 50 4B C0 4D 00 35 00 29 B5 FD ..PK.M.5.)..


-------------------------- #:10 --------------------------
Delta Time: 4.014sec Packet Length: 75 bytes (4B hex)
DIX: Dest: 00:13:F7:53:9E:58 Source: 00:20:ED:4A:08:96
DIX: Dest: 139.134.005.051 Source: 192.168.100.002
----------------------- IP HEADER -----------------------
IP: Version: 4 Correct Header Length: 20 bytes
IP: Type Of Service: 00
IP: 000. .... Routine
IP: ...0 .... Normal Delay
IP: .... 0... Normal Throughput
IP: .... .0.. Normal Reliability
IP: Total Len: 61 (x3D) bytes Id: 0B9B
IP: Flags: 0
IP: .0.. May Fragment
IP: ..0. Last Fragment
IP: Fragment Offset: 000
IP: Time To Live: 64 sec Protocol: 17 UDP
IP: Header Checksum: B9B1 (Correct)
IP: No Options

---------------------- UDP HEADER ----------------------
UDP: Source Port: 49230 (Unassigned port) Dest Port: 53 (Domain NameServer)
UDP: Length: 41 (x29)
UDP: Checksum: 414C (Correct)
------------------------ DNS ----------------------------
DNS: ID:113
DNS: Query Standard Query
DNS: FLAGS: 10
DNS: .0. .... = No Truncation
DNS: ..1 .... = Recursion Desired
DNS: Return Code: 0 No Error
DNS: Question Cnt: 1, Answer Cnt: 0
DNS: Authority Cnt: 0, Additional Cnt: 0
DNS: Question Section
DNS: Name: au.pool.ntp.org
DNS: Type: 01 Class: 01

-------------------------- #:11 --------------------------
Delta Time: 4.029sec Packet Length: 75 bytes (4B hex)
DIX: Dest: 00:13:F7:53:9E:58 Source: 00:20:ED:4A:08:96
DIX: Dest: 203.189.080.075 Source: 192.168.100.002
----------------------- IP HEADER -----------------------
IP: Version: 4 Correct Header Length: 20 bytes
IP: Type Of Service: 00
IP: 000. .... Routine
IP: ...0 .... Normal Delay
IP: .... 0... Normal Throughput
IP: .... .0.. Normal Reliability
IP: Total Len: 61 (x3D) bytes Id: 0B9C
IP: Flags: 0
IP: .0.. May Fragment
IP: ..0. Last Fragment
IP: Fragment Offset: 000
IP: Time To Live: 64 sec Protocol: 17 UDP
IP: Header Checksum: 2E61 (Correct)
IP: No Options

---------------------- UDP HEADER ----------------------
UDP: Source Port: 49231 (Unassigned port) Dest Port: 53 (Domain NameServer)
UDP: Length: 41 (x29)
UDP: Checksum: B5FB (Correct)
------------------------ DNS ----------------------------
DNS: ID:113
DNS: Query Standard Query
DNS: FLAGS: 10
DNS: .0. .... = No Truncation
DNS: ..1 .... = Recursion Desired
DNS: Return Code: 0 No Error
DNS: Question Cnt: 1, Answer Cnt: 0
DNS: Authority Cnt: 0, Additional Cnt: 0
DNS: Question Section
DNS: Name: au.pool.ntp.org
DNS: Type: 01 Class: 01

-------------------------- #:12 --------------------------
Delta Time: 0.047sec Packet Length: 493 bytes (1ED hex)
DIX: Dest: 00:20:ED:4A:08:96 Source: 00:13:F7:53:9E:58
DIX: Dest: 192.168.100.002 Source: 203.189.080.075
----------------------- IP HEADER -----------------------
IP: Version: 4 Correct Header Length: 20 bytes
IP: Type Of Service: 00
IP: 000. .... Routine
IP: ...0 .... Normal Delay
IP: .... 0... Normal Throughput
IP: .... .0.. Normal Reliability
IP: Total Len: 479 (x1DF) bytes Id: 0000
IP: Flags: 2
IP: .1.. Don't Fragment
IP: ..0. Last Fragment
IP: Fragment Offset: 000
IP: Time To Live: 51 sec Protocol: 17 UDP
IP: Header Checksum: 055B (Correct)
IP: No Options

---------------------- UDP HEADER ----------------------
UDP: Source Port: 53 (Domain NameServer) Dest Port: 49231 (Unassigned port)
UDP: Length: 459 (x1CB)
UDP: Checksum: 8E3 (Correct)
------------------------ DNS ----------------------------
DNS: ID:113
DNS: Query Response Standard Query
DNS: FLAGS: 18
DNS: .0. .... = No Truncation
DNS: ..1 .... = Recursion Desired
DNS: ... 1... = Recursion Available
DNS: Return Code: 0 No Error
DNS: Question Cnt: 1, Answer Cnt: 3
DNS: Authority Cnt: 9, Additional Cnt: 13
DNS: Question Section
DNS: Name: au.pool.ntp.org
DNS: Type: 01 Class: 01
DNS: Answer Section
DNS: Name: au.pool.ntp.org
DNS: Type: 1 Class: 1
DNS: TTL: 207 Len: 0004
DNS: Address: 203.082.209.217

DNS: Name: au.pool.ntp.org
DNS: Type: 1 Class: 1
DNS: TTL: 207 Len: 0004
DNS: Address: 121.000.000.042

DNS: Name: au.pool.ntp.org
DNS: Type: 1 Class: 1
DNS: TTL: 207 Len: 0004
DNS: Address: 130.102.128.023

DNS: Authority Section
DNS: Domain Name: pool.ntp.org
DNS: Type: 2 Class: 1
DNS: TTL: 2378 Len: 0010
DNS: Name Server: f.ntpns.org

DNS: Domain Name: pool.ntp.org
DNS: Type: 2 Class: 1
DNS: TTL: 2378 Len: 0004
DNS: Name Server: g.ntpns.org

DNS: Domain Name: pool.ntp.org
DNS: Type: 2 Class: 1
DNS: TTL: 2378 Len: 0004
DNS: Name Server: h.ntpns.org

DNS: Domain Name: pool.ntp.org
DNS: Type: 2 Class: 1
DNS: TTL: 2378 Len: 0004
DNS: Name Server: i.ntpns.org

DNS: Domain Name: pool.ntp.org
DNS: Type: 2 Class: 1
DNS: TTL: 2378 Len: 0004
DNS: Name Server: a.ntpns.org

DNS: Domain Name: pool.ntp.org
DNS: Type: 2 Class: 1
DNS: TTL: 2378 Len: 0004
DNS: Name Server: b.ntpns.org

DNS: Domain Name: pool.ntp.org
DNS: Type: 2 Class: 1
DNS: TTL: 2378 Len: 0004
DNS: Name Server: c.ntpns.org

DNS: Domain Name: pool.ntp.org
DNS: Type: 2 Class: 1
DNS: TTL: 2378 Len: 0004
DNS: Name Server: d.ntpns.org

DNS: Domain Name: pool.ntp.org
DNS: Type: 2 Class: 1
DNS: TTL: 2378 Len: 0004
DNS: Name Server: e.ntpns.org

DNS: Additional Section
DNS: Domain Name: a.ntpns.org
DNS: Type: 1 Class: 1
DNS: TTL: 27928 Len: 0004
DNS: Address: 207.171.017.042

DNS: Domain Name: a.ntpns.org
DNS: Type: 28 Class: 1
DNS: TTL: 27928 Len: 0016
--------------------------------- DATA -----------------------------------
0000 26 20 01 01 D0 07 00 00 00 00 00 00 00 00 00 42 & .............B


DNS: Domain Name: b.ntpns.org
DNS: Type: 1 Class: 1
DNS: TTL: 27193 Len: 0004
DNS: Address: 080.097.054.200

DNS: Domain Name: c.ntpns.org
DNS: Type: 1 Class: 1
DNS: TTL: 27193 Len: 0004
DNS: Address: 212.200.082.148

DNS: Domain Name: d.ntpns.org
DNS: Type: 1 Class: 1
DNS: TTL: 27193 Len: 0004
DNS: Address: 204.235.060.178

DNS: Domain Name: e.ntpns.org
DNS: Type: 1 Class: 1
DNS: TTL: 27193 Len: 0004
DNS: Address: 069.041.163.030

DNS: Domain Name: e.ntpns.org
DNS: Type: 1 Class: 1
DNS: TTL: 27193 Len: 0004
DNS: Address: 070.085.157.108

DNS: Domain Name: f.ntpns.org
DNS: Type: 1 Class: 1
DNS: TTL: 27193 Len: 0004
DNS: Address: 202.191.108.134

DNS: Domain Name: g.ntpns.org
DNS: Type: 1 Class: 1
DNS: TTL: 5416 Len: 0004
DNS: Address: 207.171.007.084

DNS: Domain Name: h.ntpns.org
DNS: Type: 1 Class: 1
DNS: TTL: 27193 Len: 0004
DNS: Address: 064.142.113.008

DNS: Domain Name: h.ntpns.org
DNS: Type: 1 Class: 1
DNS: TTL: 27193 Len: 0004
DNS: Address: 085.214.025.217

DNS: Domain Name: h.ntpns.org
DNS: Type: 1 Class: 1
DNS: TTL: 27193 Len: 0004
DNS: Address: 212.012.050.229

DNS: Domain Name: i.ntpns.org
DNS: Type: 1 Class: 1
DNS: TTL: 27193 Len: 0004
DNS: Address: 194.106.223.156


-------------------------- #:13 --------------------------
Delta Time: 0.000sec Packet Length: 62 bytes (3E hex)
DIX: Dest: 00:13:F7:53:9E:58 Source: 00:20:ED:4A:08:96
DIX: Dest: 203.082.209.217 Source: 192.168.100.002
----------------------- IP HEADER -----------------------
IP: Version: 4 Correct Header Length: 20 bytes
IP: Type Of Service: 00
IP: 000. .... Routine
IP: ...0 .... Normal Delay
IP: .... 0... Normal Throughput
IP: .... .0.. Normal Reliability
IP: Total Len: 48 (x30) bytes Id: 0B9D
IP: Flags: 2
IP: .1.. Don't Fragment
IP: ..0. Last Fragment
IP: Fragment Offset: 000
IP: Time To Live: 64 sec Protocol: 6 TCP
IP: Header Checksum: 6D54 (Correct)
IP: No Options
---------------------- TCP HEADER ----------------------
TCP: Source Port: 64336 (Unassigned port) Dest Port: 13 (Unassigned port)
TCP: Sequence #: 2417633773
TCP: Ack #: 0
TCP: Offset: 28 bytes
TCP: Flags: 02
TCP: ..0. .... Urgent bit Off
TCP: ...0 .... Ack bit Off
TCP: .... 0... Push bit Off
TCP: .... .0.. Reset bit Off
TCP: .... ..1. <SYN> Synchronize bit On
TCP: .... ...0 Finish bit Off
TCP: Window: 32768 Checksum: 8CEA (Correct)
TCP: Option Code: 02 Length: 4 bytes [MSS]
TCP: Max Segment Size 1452 (x5AC)
TCP: Option Code: 01 Length: 1 bytes [NOP]
TCP: No Operation
TCP: Option Code: 03 Length: 3 bytes [WIN_SCALE]
TCP: Window scale factor 0 (x0)
TCP: No data or not output.

-------------------------- #:14 --------------------------
Delta Time: 0.080sec Packet Length: 60 bytes (3C hex)
DIX: Dest: 00:20:ED:4A:08:96 Source: 00:13:F7:53:9E:58
DIX: Dest: 192.168.100.002 Source: 203.082.209.217
----------------------- IP HEADER -----------------------
IP: Version: 4 Correct Header Length: 20 bytes
IP: Type Of Service: 00
IP: 000. .... Routine
IP: ...0 .... Normal Delay
IP: .... 0... Normal Throughput
IP: .... .0.. Normal Reliability
IP: Total Len: 40 (x28) bytes Error?? Id: 0000
IP: Flags: 2
IP: .1.. Don't Fragment
IP: ..0. Last Fragment
IP: Fragment Offset: 000
IP: Time To Live: 45 sec Protocol: 6 TCP
IP: Header Checksum: 8BF9 (Correct)
IP: No Options
---------------------- TCP HEADER ----------------------
TCP: Source Port: 13 (Unassigned port) Dest Port: 64336 (Unassigned port)
TCP: Sequence #: 0
TCP: Ack #: 2417633774
TCP: Offset: 20 bytes
TCP: Flags: 14
TCP: ..0. .... Urgent bit Off
TCP: ...1 .... <ACK> Ack bit On
TCP: .... 0... Push bit Off
TCP: .... .1.. <RST> Reset bit On
TCP: .... ..0. Synchronize bit Off
TCP: .... ...0 Finish bit Off
TCP: Window: 0 Checksum: 3893 (Correct)
TCP: No Options
TCP: No data or not output.
Finished
Steven Levine
2012-02-06 22:54:40 UTC
Permalink
On Mon, 6 Feb 2012 20:50:48 UTC, ***@nospam.com.au wrote:

Hi John,
Post by j***@nospam.com.au
Experiments with Nistime options confirm that the DNS is working.
Not really. You have at least one bad name server configured. Note
the huge (i.e. 4 and 8 second) delta times. Check RESOLV2 compared to
what your ISP recommends.
Post by j***@nospam.com.au
Is it significant that ping 127.0.0.0 fails? I am sure it used to work.
Take a look at your setup.cmd. It's configures localhost.

The ARP packets may also indicate a problem with your router. You
really should not see ARP packets except at boot time. What does

arp -a

report? A typical report will be

ARP table contents:

interface hardware address IP address minutes since
last use
lan0 0 :16:41:e7:86:6c 192.168.10.6 1
lan0 0 :14:bf:17:10:d1 192.168.10.251 4

In this case, 192.168.10.6 is the host and 192.168.10.251 is the
router.

Steven
--
---------------------------------------------------------------------
Steven Levine <***@earthlink.bogus.net>
eCS/Warp/DIY etc. www.scoug.com www.ecomstation.com
---------------------------------------------------------------------
Allan
2012-02-07 01:01:54 UTC
Permalink
Post by Steven Levine
Post by Steven Levine
Hi John,
You need to figure out what is failing and where.
- Run iptrace in a command line session with
iptrace
- Run nistime in another command line session with
nistime.exe -s0 au.pool.ntp.org
- Press enter in the iptrace session window
- Run ipformat in the iptrace session window with
ipformat >nistime.out
Nistime.out should report a DNS lookup
Surre, working....
Post by Steven Levine
and a UDP transaction.
yes, trying to connect using the old deprecated DAYTIME protocol,
and getting rejected.

No one uses DAYTIME anymore, and support is removed from
almost all servers.

You need to use an app, that uses NTP protocol. Maybe you can configure
the one you use to use NTP, or get a better one.

I'd recommend:
http://hobbes.nmsu.edu/download/pub/os2/apps/internet/time/clkmgr_08b.zip

which is the best app for this for OS/2 - and it is free
It keeps your clock always @ msec precise.
--
Allan.

It is better to close your mouth, and look like a fool,
than to open it, and remove all doubt.
Dave Yeo
2012-02-07 03:27:53 UTC
Permalink
Post by Allan
You need to use an app, that uses NTP protocol. Maybe you can configure
the one you use to use NTP, or get a better one.
http://hobbes.nmsu.edu/download/pub/os2/apps/internet/time/clkmgr_08b.zip
which is the best app for this for OS/2 - and it is free
Best of course is subjective. Another recommendation,
http://hobbes.nmsu.edu/download/pub/os2/apps/clock/os2ntp12.zip
Dave
Allan
2012-02-08 00:53:08 UTC
Permalink
Post by Dave Yeo
Post by Allan
You need to use an app, that uses NTP protocol. Maybe you can configure
the one you use to use NTP, or get a better one.
http://hobbes.nmsu.edu/download/pub/os2/apps/internet/time/clkmgr_08b.zip
which is the best app for this for OS/2 - and it is free
Best of course is subjective.
Of course it is :-)

I'm not sure I've tried your suggestion; but I tried a bunch of NTP apps (long time ago)
and no other app could do what clkmgr does.
Keeping your system within msec precision at all times, and even working
as NTP server if you want for all your local machines are very nice features,
that are very usefull to me.
--
Allan.

It is better to close your mouth, and look like a fool,
than to open it, and remove all doubt.
Alex Taylor
2012-02-08 13:53:01 UTC
Permalink
Post by Allan
yes, trying to connect using the old deprecated DAYTIME protocol,
and getting rejected.
No one uses DAYTIME anymore, and support is removed from
almost all servers.
Not in my experience. That's true of the TIME protocol (RFC 868),
maybe you're thinking of that. TIME is officially deprecated, and
its use is indeed discouraged. However, DAYTIME (RFC 867) still
has many servers providing it.

What DOES seem to be the case is that most DAYTIME servers appear to
have changed their data format slightly such that older clients don't
always work with it anymore. I know this necessitated an update to
daytime.exe in recent years as the DAYTIME protocol was broken with
almost all servers until the protocol parser was modified.
--
Alex Taylor
Fukushima, Japan
http://www.socis.ca/~ataylo00

Please take off hat when replying.
j***@nospam.com.au
2012-02-13 08:32:42 UTC
Permalink
Post by Allan
Post by Steven Levine
Post by Steven Levine
Hi John,
You need to figure out what is failing and where.
- Run iptrace in a command line session with
iptrace
- Run nistime in another command line session with
nistime.exe -s0 au.pool.ntp.org
- Press enter in the iptrace session window
- Run ipformat in the iptrace session window with
ipformat >nistime.out
Nistime.out should report a DNS lookup
Surre, working....
Post by Steven Levine
and a UDP transaction.
yes, trying to connect using the old deprecated DAYTIME protocol,
and getting rejected.
No one uses DAYTIME anymore, and support is removed from
almost all servers.
You need to use an app, that uses NTP protocol. Maybe you can configure
the one you use to use NTP, or get a better one.
http://hobbes.nmsu.edu/download/pub/os2/apps/internet/time/clkmgr_08b.zip
which is the best app for this for OS/2 - and it is free
The Clkmgr package includes Makelist.cmd and a newer version of Nistime which,
together with updated DNS addresses and pool urls, is all that was required to
make it work as it used to.

I have not bothered with the new clock01.sys or clkmgr.exe.

Loading...