From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail2.tohojo.dk (mail2.tohojo.dk [IPv6:2a01:4f8:200:3141::101]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by huchra.bufferbloat.net (Postfix) with ESMTPS id D290321F21E for ; Fri, 28 Mar 2014 03:48:17 -0700 (PDT) X-Virus-Scanned: amavisd-new at example.com Received: by alrua-kau.localdomain (Postfix, from userid 1000) id 840C6A1662; Fri, 28 Mar 2014 11:48:09 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=toke.dk; s=201310; t=1396003690; bh=Errjkaqw9JTK8rq1A+qL/2amwL9Ndzluw+5TGRUYOU8=; h=From:To:Cc:Subject:References:Date:In-Reply-To; b=oLE5Wz2J87EMWMr1bm3H9DnI6V98AQYNmUncNCzOvtndV8qsKkxTozidMFZ/hI2mK pd6EI+yR3rYXAajJJPoHblyi7fNo6MS5Lx189HnB/dMiWhbpVKe+LisDR4Qr7jh1RJ Sbh6M/KI1+VWYHEt7rp5kHuSwHWg3glsS1dlQEFs= From: =?utf-8?Q?Toke_H=C3=B8iland-J=C3=B8rgensen?= To: Simon Kelley References: <532DD9DD.8040301@thekelleys.org.uk> <871txut453.fsf@alrua-x1.karlstad.toke.dk> <532DE7A8.3010504@thekelleys.org.uk> <87ppleroks.fsf@alrua-x1.karlstad.toke.dk> <53348C32.4040907@thekelleys.org.uk> <87ha6idabz.fsf@alrua-x1.karlstad.toke.dk> <53353C07.9030000@thekelleys.org.uk> <87eh1madfy.fsf@toke.dk> <533551F6.9010402@thekelleys.org.uk> Date: Fri, 28 Mar 2014 11:48:05 +0100 In-Reply-To: <533551F6.9010402@thekelleys.org.uk> (Simon Kelley's message of "Fri, 28 Mar 2014 10:41:58 +0000") Message-ID: <87lhvu8uqi.fsf@toke.dk> Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha256; protocol="application/pgp-signature" Cc: cerowrt-devel@lists.bufferbloat.net Subject: Re: [Cerowrt-devel] DNSSEC & NTP Bootstrapping X-BeenThere: cerowrt-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: Development issues regarding the cerowrt test router project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Mar 2014 10:48:18 -0000 --=-=-= Content-Type: text/plain Simon Kelley writes: > Understood, my suggestion is that the dnsmasq startup script somehow > interrogate NTP as to if it's running, and if it has a time lock. Only > setting the flag if it isn't or doesn't. Of course that depends on NTP > being able to answer the question. Right. Pretty sure busybox ntpd isn't able to answer that. But since dnsmasq is spawned from a hotplug script on boot, that script can presumably do something clever... -Toke --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBCAAGBQJTNVNlAAoJEENeEGz1+utPQHEH/09p0iS+kqsgWROJwqqKaD0z nDDJDImtHQWvW71PvethNvENI07wmEE+B4X6Av5eKGgbWz/seItdifZ4A8o7gsOC HJH8v47hJ6dTXsvQttboq2VkVdGdHFhh9UX6hM/7o7g0fZSBtwaJyXaWiKET04Z5 MvFXbMi21WdnFQziCooSjLBvwXc1Uw+rImGEQUSCb1HOHnMkIri/40oXM6+KY268 E8cJo6ow7G1wxBQa+tTO+izz3snCmTWzU39Bbc8ouZAQjzsi1jS2uZEPjHoEehX6 kWOUUg5ebKdHzUgjH2j1zdUgp8z3u9HEkUehEUUVmNroS0q/mfVwpqKigvZj5t8= =1jCX -----END PGP SIGNATURE----- --=-=-=--