1.Dd June 6 2023 2.Dt NTPDC 1ntpdcmdoc User Commands 3.Os 4.\" EDIT THIS FILE WITH CAUTION (ntpdc-opts.mdoc) 5.\" 6.\" It has been AutoGen-ed June 6, 2023 at 04:37:57 AM by AutoGen 5.18.16 7.\" From the definitions ntpdc-opts.def 8.\" and the template file agmdoc-cmd.tpl 9.Sh NAME 10.Nm ntpdc 11.Nd vendor-specific NTPD control program 12.Sh SYNOPSIS 13.Nm 14.\" Mixture of short (flag) options and long options 15.Op Fl flags 16.Op Fl flag Op Ar value 17.Op Fl \-option\-name Ns Oo Oo Ns "=| " Oc Ns Ar value Oc 18[ host ...] 19.Pp 20.Sh DESCRIPTION 21.Nm 22is deprecated. 23Please use 24.Xr ntpq 1ntpqmdoc instead \- it can do everything 25.Nm 26used to do, and it does so using a much more sane interface. 27.Pp 28.Nm 29is a utility program used to query 30.Xr ntpd 1ntpdmdoc 31about its 32current state and to request changes in that state. 33It uses NTP mode 7 control message formats described in the source code. 34The program may 35be run either in interactive mode or controlled using command line 36arguments. 37Extensive state and statistics information is available 38through the 39.Nm 40interface. 41In addition, nearly all the 42configuration options which can be specified at startup using 43ntpd's configuration file may also be specified at run time using 44.Nm . 45.Sh "OPTIONS" 46.Bl -tag 47.It Fl 4 , Fl \-ipv4 48Force IPv4 DNS name resolution. 49This option must not appear in combination with any of the following options: 50ipv6. 51.sp 52Force DNS resolution of following host names on the command line 53to the IPv4 namespace. 54.It Fl 6 , Fl \-ipv6 55Force IPv6 DNS name resolution. 56This option must not appear in combination with any of the following options: 57ipv4. 58.sp 59Force DNS resolution of following host names on the command line 60to the IPv6 namespace. 61.It Fl c Ar cmd , Fl \-command Ns = Ns Ar cmd 62run a command and exit. 63This option may appear an unlimited number of times. 64.sp 65The following argument is interpreted as an interactive format command 66and is added to the list of commands to be executed on the specified 67host(s). 68.It Fl d , Fl \-debug\-level 69Increase debug verbosity level. 70This option may appear an unlimited number of times. 71.sp 72.It Fl D Ar number , Fl \-set\-debug\-level Ns = Ns Ar number 73Set the debug verbosity level. 74This option may appear an unlimited number of times. 75This option takes an integer number as its argument. 76.sp 77.It Fl i , Fl \-interactive 78Force ntpq to operate in interactive mode. 79This option must not appear in combination with any of the following options: 80command, listpeers, peers, showpeers. 81.sp 82Force ntpq to operate in interactive mode. Prompts will be written 83to the standard output and commands read from the standard input. 84.It Fl l , Fl \-listpeers 85Print a list of the peers. 86This option must not appear in combination with any of the following options: 87command. 88.sp 89Print a list of the peers known to the server as well as a summary of 90their state. This is equivalent to the 'listpeers' interactive command. 91.It Fl n , Fl \-numeric 92numeric host addresses. 93.sp 94Output all host addresses in dotted\-quad numeric format rather than 95converting to the canonical host names. 96.It Fl p , Fl \-peers 97Print a list of the peers. 98This option must not appear in combination with any of the following options: 99command. 100.sp 101Print a list of the peers known to the server as well as a summary 102of their state. This is equivalent to the 'peers' interactive command. 103.It Fl s , Fl \-showpeers 104Show a list of the peers. 105This option must not appear in combination with any of the following options: 106command. 107.sp 108Print a list of the peers known to the server as well as a summary 109of their state. This is equivalent to the 'dmpeers' interactive command. 110.It Fl u , Fl \-unconnected 111Use unconnected UDP to communicate with ntpd (default on Windows). 112.sp 113Open an unconnected UDP association to ntpd (the default 114on Windows). 115.It Fl \&? , Fl \-help 116Display usage information and exit. 117.It Fl \&! , Fl \-more\-help 118Pass the extended usage information through a pager. 119.It Fl > Oo Ar cfgfile Oc , Fl \-save\-opts Oo Ns = Ns Ar cfgfile Oc 120Save the option state to \fIcfgfile\fP. The default is the \fIlast\fP 121configuration file listed in the \fBOPTION PRESETS\fP section, below. 122The command will exit after updating the config file. 123.It Fl < Ar cfgfile , Fl \-load\-opts Ns = Ns Ar cfgfile , Fl \-no\-load\-opts 124Load options from \fIcfgfile\fP. 125The \fIno\-load\-opts\fP form will disable the loading 126of earlier config/rc/ini files. \fI\-\-no\-load\-opts\fP is handled early, 127out of order. 128.It Fl \-version Op Brq Ar v|c|n 129Output version of program and exit. The default mode is `v', a simple 130version. The `c' mode will print copyright information and `n' will 131print the full copyright notice. 132.El 133.Sh "OPTION PRESETS" 134Any option that is not marked as \fInot presettable\fP may be preset 135by loading values from configuration ("RC" or ".INI") file(s) and values from 136environment variables named: 137.nf 138 \fBNTPDC_<option\-name>\fP or \fBNTPDC\fP 139.fi 140.ad 141The environmental presets take precedence (are processed later than) 142the configuration files. 143The \fIhomerc\fP files are "\fI$HOME\fP", and "\fI.\fP". 144If any of these are directories, then the file \fI.ntprc\fP 145is searched for within those directories. 146.Sh USAGE 147If one or more request options are included on the command line 148when 149.Nm 150is executed, each of the requests will be sent 151to the NTP servers running on each of the hosts given as command 152line arguments, or on localhost by default. 153If no request options 154are given, 155.Nm 156will attempt to read commands from the 157standard input and execute these on the NTP server running on the 158first host given on the command line, again defaulting to localhost 159when no other host is specified. 160The 161.Nm 162utility will prompt for 163commands if the standard input is a terminal device. 164.Pp 165The 166.Nm 167utility uses NTP mode 7 packets to communicate with the 168NTP server, and hence can be used to query any compatible server on 169the network which permits it. 170Note that since NTP is a UDP protocol 171this communication will be somewhat unreliable, especially over 172large distances in terms of network topology. 173The 174.Nm 175utility makes 176no attempt to retransmit requests, and will time requests out if 177the remote host is not heard from within a suitable timeout 178time. 179.Pp 180The operation of 181.Nm 182are specific to the particular 183implementation of the 184.Xr ntpd 1ntpdmdoc 185daemon and can be expected to 186work only with this and maybe some previous versions of the daemon. 187Requests from a remote 188.Nm 189utility which affect the 190state of the local server must be authenticated, which requires 191both the remote program and local server share a common key and key 192identifier. 193.Pp 194Note that in contexts where a host name is expected, a 195.Fl 4 196qualifier preceding the host name forces DNS resolution to the IPv4 namespace, 197while a 198.Fl 6 199qualifier forces DNS resolution to the IPv6 namespace. 200Specifying a command line option other than 201.Fl i 202or 203.Fl n 204will cause the specified query (queries) to be sent to 205the indicated host(s) immediately. 206Otherwise, 207.Nm 208will 209attempt to read interactive format commands from the standard 210input. 211.Ss "Interactive Commands" 212Interactive format commands consist of a keyword followed by zero 213to four arguments. 214Only enough characters of the full keyword to 215uniquely identify the command need be typed. 216The output of a 217command is normally sent to the standard output, but optionally the 218output of individual commands may be sent to a file by appending a 219.Ql \&> , 220followed by a file name, to the command line. 221.Pp 222A number of interactive format commands are executed entirely 223within the 224.Nm 225utility itself and do not result in NTP 226mode 7 requests being sent to a server. 227These are described 228following. 229.Bl -tag -width indent 230.It Ic \&? Ar command_keyword 231.It Ic help Ar command_keyword 232A 233.Sq Ic \&? 234will print a list of all the command 235keywords known to this incarnation of 236.Nm . 237A 238.Sq Ic \&? 239followed by a command keyword will print function and usage 240information about the command. 241This command is probably a better 242source of information about 243.Xr ntpq 1ntpqmdoc 244than this manual 245page. 246.It Ic delay Ar milliseconds 247Specify a time interval to be added to timestamps included in 248requests which require authentication. 249This is used to enable 250(unreliable) server reconfiguration over long delay network paths 251or between machines whose clocks are unsynchronized. 252Actually the 253server does not now require timestamps in authenticated requests, 254so this command may be obsolete. 255.It Ic host Ar hostname 256Set the host to which future queries will be sent. 257Hostname may 258be either a host name or a numeric address. 259.It Ic hostnames Op Cm yes | Cm no 260If 261.Cm yes 262is specified, host names are printed in 263information displays. 264If 265.Cm no 266is specified, numeric 267addresses are printed instead. 268The default is 269.Cm yes , 270unless 271modified using the command line 272.Fl n 273switch. 274.It Ic keyid Ar keyid 275This command allows the specification of a key number to be 276used to authenticate configuration requests. 277This must correspond 278to a key number the server has been configured to use for this 279purpose. 280.It Ic quit 281Exit 282.Nm . 283.It Ic passwd 284This command prompts you to type in a password (which will not 285be echoed) which will be used to authenticate configuration 286requests. 287The password must correspond to the key configured for 288use by the NTP server for this purpose if such requests are to be 289successful. 290.It Ic timeout Ar milliseconds 291Specify a timeout period for responses to server queries. 292The 293default is about 8000 milliseconds. 294Note that since 295.Nm 296retries each query once after a timeout, the total waiting time for 297a timeout will be twice the timeout value set. 298.El 299.Ss "Control Message Commands" 300Query commands result in NTP mode 7 packets containing requests for 301information being sent to the server. 302These are read\-only commands 303in that they make no modification of the server configuration 304state. 305.Bl -tag -width indent 306.It Ic listpeers 307Obtains and prints a brief list of the peers for which the 308server is maintaining state. 309These should include all configured 310peer associations as well as those peers whose stratum is such that 311they are considered by the server to be possible future 312synchronization candidates. 313.It Ic peers 314Obtains a list of peers for which the server is maintaining 315state, along with a summary of that state. 316Summary information 317includes the address of the remote peer, the local interface 318address (0.0.0.0 if a local address has yet to be determined), the 319stratum of the remote peer (a stratum of 16 indicates the remote 320peer is unsynchronized), the polling interval, in seconds, the 321reachability register, in octal, and the current estimated delay, 322offset and dispersion of the peer, all in seconds. 323.Pp 324The character in the left margin indicates the mode this peer 325entry is operating in. 326A 327.Ql \&+ 328denotes symmetric active, a 329.Ql \&\- 330indicates symmetric passive, a 331.Ql \&= 332means the 333remote server is being polled in client mode, a 334.Ql \&^ 335indicates that the server is broadcasting to this address, a 336.Ql \&~ 337denotes that the remote peer is sending broadcasts and a 338.Ql \&~ 339denotes that the remote peer is sending broadcasts and a 340.Ql \&* 341marks the peer the server is currently synchronizing 342to. 343.Pp 344The contents of the host field may be one of four forms. 345It may 346be a host name, an IP address, a reference clock implementation 347name with its parameter or 348.Fn REFCLK "implementation_number" "parameter" . 349On 350.Ic hostnames 351.Cm no 352only IP\-addresses 353will be displayed. 354.It Ic dmpeers 355A slightly different peer summary list. 356Identical to the output 357of the 358.Ic peers 359command, except for the character in the 360leftmost column. 361Characters only appear beside peers which were 362included in the final stage of the clock selection algorithm. 363A 364.Ql \&. 365indicates that this peer was cast off in the falseticker 366detection, while a 367.Ql \&+ 368indicates that the peer made it 369through. 370A 371.Ql \&* 372denotes the peer the server is currently 373synchronizing with. 374.It Ic showpeer Ar peer_address Oo Ar ... Oc 375Shows a detailed display of the current peer variables for one 376or more peers. 377Most of these values are described in the NTP 378Version 2 specification. 379.It Ic pstats Ar peer_address Oo Ar ... Oc 380Show per\-peer statistic counters associated with the specified 381peer(s). 382.It Ic clockstat Ar clock_peer_address Oo Ar ... Oc 383Obtain and print information concerning a peer clock. 384The 385values obtained provide information on the setting of fudge factors 386and other clock performance information. 387.It Ic kerninfo 388Obtain and print kernel phase\-lock loop operating parameters. 389This information is available only if the kernel has been specially 390modified for a precision timekeeping function. 391.It Ic loopinfo Op Cm oneline | Cm multiline 392Print the values of selected loop filter variables. 393The loop 394filter is the part of NTP which deals with adjusting the local 395system clock. 396The 397.Sq offset 398is the last offset given to the 399loop filter by the packet processing code. 400The 401.Sq frequency 402is the frequency error of the local clock in parts\-per\-million 403(ppm). 404The 405.Sq time_const 406controls the stiffness of the 407phase\-lock loop and thus the speed at which it can adapt to 408oscillator drift. 409The 410.Sq watchdog timer 411value is the number 412of seconds which have elapsed since the last sample offset was 413given to the loop filter. 414The 415.Cm oneline 416and 417.Cm multiline 418options specify the format in which this 419information is to be printed, with 420.Cm multiline 421as the 422default. 423.It Ic sysinfo 424Print a variety of system state variables, i.e., state related 425to the local server. 426All except the last four lines are described 427in the NTP Version 3 specification, RFC\-1305. 428.Pp 429The 430.Sq system flags 431show various system flags, some of 432which can be set and cleared by the 433.Ic enable 434and 435.Ic disable 436configuration commands, respectively. 437These are 438the 439.Cm auth , 440.Cm bclient , 441.Cm monitor , 442.Cm pll , 443.Cm pps 444and 445.Cm stats 446flags. 447See the 448.Xr ntpd 1ntpdmdoc 449documentation for the meaning of these flags. 450There 451are two additional flags which are read only, the 452.Cm kernel_pll 453and 454.Cm kernel_pps . 455These flags indicate 456the synchronization status when the precision time kernel 457modifications are in use. 458The 459.Sq kernel_pll 460indicates that 461the local clock is being disciplined by the kernel, while the 462.Sq kernel_pps 463indicates the kernel discipline is provided by the PPS 464signal. 465.Pp 466The 467.Sq stability 468is the residual frequency error remaining 469after the system frequency correction is applied and is intended for 470maintenance and debugging. 471In most architectures, this value will 472initially decrease from as high as 500 ppm to a nominal value in 473the range .01 to 0.1 ppm. 474If it remains high for some time after 475starting the daemon, something may be wrong with the local clock, 476or the value of the kernel variable 477.Va kern.clockrate.tick 478may be 479incorrect. 480.Pp 481The 482.Sq broadcastdelay 483shows the default broadcast delay, 484as set by the 485.Ic broadcastdelay 486configuration command. 487.Pp 488The 489.Sq authdelay 490shows the default authentication delay, 491as set by the 492.Ic authdelay 493configuration command. 494.It Ic sysstats 495Print statistics counters maintained in the protocol 496module. 497.It Ic memstats 498Print statistics counters related to memory allocation 499code. 500.It Ic iostats 501Print statistics counters maintained in the input\-output 502module. 503.It Ic timerstats 504Print statistics counters maintained in the timer/event queue 505support code. 506.It Ic reslist 507Obtain and print the server's restriction list. 508This list is 509(usually) printed in sorted order and may help to understand how 510the restrictions are applied. 511.It Ic monlist Op Ar version 512Obtain and print traffic counts collected and maintained by the 513monitor facility. 514The version number should not normally need to be 515specified. 516.It Ic clkbug Ar clock_peer_address Oo Ar ... Oc 517Obtain debugging information for a reference clock driver. 518This 519information is provided only by some clock drivers and is mostly 520undecodable without a copy of the driver source in hand. 521.El 522.Ss "Runtime Configuration Requests" 523All requests which cause state changes in the server are 524authenticated by the server using a configured NTP key (the 525facility can also be disabled by the server by not configuring a 526key). 527The key number and the corresponding key must also be made 528known to 529.Nm . 530This can be done using the 531.Ic keyid 532and 533.Ic passwd 534commands, the latter of which will prompt at the terminal for a 535password to use as the encryption key. 536You will also be prompted 537automatically for both the key number and password the first time a 538command which would result in an authenticated request to the 539server is given. 540Authentication not only provides verification that 541the requester has permission to make such changes, but also gives 542an extra degree of protection again transmission errors. 543.Pp 544Authenticated requests always include a timestamp in the packet 545data, which is included in the computation of the authentication 546code. 547This timestamp is compared by the server to its receive time 548stamp. 549If they differ by more than a small amount the request is 550rejected. 551This is done for two reasons. 552First, it makes simple 553replay attacks on the server, by someone who might be able to 554overhear traffic on your LAN, much more difficult. 555Second, it makes 556it more difficult to request configuration changes to your server 557from topologically remote hosts. 558While the reconfiguration facility 559will work well with a server on the local host, and may work 560adequately between time\-synchronized hosts on the same LAN, it will 561work very poorly for more distant hosts. 562As such, if reasonable 563passwords are chosen, care is taken in the distribution and 564protection of keys and appropriate source address restrictions are 565applied, the run time reconfiguration facility should provide an 566adequate level of security. 567.Pp 568The following commands all make authenticated requests. 569.Bl -tag -width indent 570.It Xo Ic addpeer Ar peer_address 571.Op Ar keyid 572.Op Ar version 573.Op Cm prefer 574.Xc 575Add a configured peer association at the given address and 576operating in symmetric active mode. 577Note that an existing 578association with the same peer may be deleted when this command is 579executed, or may simply be converted to conform to the new 580configuration, as appropriate. 581If the optional 582.Ar keyid 583is a 584nonzero integer, all outgoing packets to the remote server will 585have an authentication field attached encrypted with this key. 586If 587the value is 0 (or not given) no authentication will be done. 588The 589.Ar version 590can be 1, 2 or 3 and defaults to 3. 591The 592.Cm prefer 593keyword indicates a preferred peer (and thus will 594be used primarily for clock synchronisation if possible). 595The 596preferred peer also determines the validity of the PPS signal \- if 597the preferred peer is suitable for synchronisation so is the PPS 598signal. 599.It Xo Ic addserver Ar peer_address 600.Op Ar keyid 601.Op Ar version 602.Op Cm prefer 603.Xc 604Identical to the addpeer command, except that the operating 605mode is client. 606.It Xo Ic broadcast Ar peer_address 607.Op Ar keyid 608.Op Ar version 609.Op Cm prefer 610.Xc 611Identical to the addpeer command, except that the operating 612mode is broadcast. 613In this case a valid key identifier and key are 614required. 615The 616.Ar peer_address 617parameter can be the broadcast 618address of the local network or a multicast group address assigned 619to NTP. 620If a multicast address, a multicast\-capable kernel is 621required. 622.It Ic unconfig Ar peer_address Oo Ar ... Oc 623This command causes the configured bit to be removed from the 624specified peer(s). 625In many cases this will cause the peer 626association to be deleted. 627When appropriate, however, the 628association may persist in an unconfigured mode if the remote peer 629is willing to continue on in this fashion. 630.It Xo Ic fudge Ar peer_address 631.Op Cm time1 632.Op Cm time2 633.Op Ar stratum 634.Op Ar refid 635.Xc 636This command provides a way to set certain data for a reference 637clock. 638See the source listing for further information. 639.It Xo Ic enable 640.Oo 641.Cm auth | Cm bclient | 642.Cm calibrate | Cm kernel | 643.Cm monitor | Cm ntp | 644.Cm pps | Cm stats 645.Oc 646.Xc 647.It Xo Ic disable 648.Oo 649.Cm auth | Cm bclient | 650.Cm calibrate | Cm kernel | 651.Cm monitor | Cm ntp | 652.Cm pps | Cm stats 653.Oc 654.Xc 655These commands operate in the same way as the 656.Ic enable 657and 658.Ic disable 659configuration file commands of 660.Xr ntpd 1ntpdmdoc . 661.Bl -tag -width indent 662.It Cm auth 663Enables the server to synchronize with unconfigured peers only 664if the peer has been correctly authenticated using either public key 665or private key cryptography. 666The default for this flag is enable. 667.It Cm bclient 668Enables the server to listen for a message from a broadcast or 669multicast server, as in the multicastclient command with 670default address. 671The default for this flag is disable. 672.It Cm calibrate 673Enables the calibrate feature for reference clocks. 674The default for this flag is disable. 675.It Cm kernel 676Enables the kernel time discipline, if available. 677The default for this flag is enable if support is available, otherwise disable. 678.It Cm monitor 679Enables the monitoring facility. 680See the documentation here about the 681.Cm monlist 682command or further information. 683The default for this flag is enable. 684.It Cm ntp 685Enables time and frequency discipline. 686In effect, this switch opens and closes the feedback loop, 687which is useful for testing. 688The default for this flag is enable. 689.It Cm pps 690Enables the pulse\-per\-second (PPS) signal when frequency 691and time is disciplined by the precision time kernel modifications. 692See the 693.Qq A Kernel Model for Precision Timekeeping 694(available as part of the HTML documentation 695provided in 696.Pa /usr/share/doc/ntp ) 697page for further information. 698The default for this flag is disable. 699.It Cm stats 700Enables the statistics facility. 701See the 702.Sx Monitoring Options 703section of 704.Xr ntp.conf 5 705for further information. 706The default for this flag is disable. 707.El 708.It Xo Ic restrict Ar address Ar mask 709.Ar flag Oo Ar ... Oc 710.Xc 711This command operates in the same way as the 712.Ic restrict 713configuration file commands of 714.Xr ntpd 1ntpdmdoc . 715.It Xo Ic unrestrict Ar address Ar mask 716.Ar flag Oo Ar ... Oc 717.Xc 718Unrestrict the matching entry from the restrict list. 719.It Xo Ic delrestrict Ar address Ar mask 720.Op Cm ntpport 721.Xc 722Delete the matching entry from the restrict list. 723.It Ic readkeys 724Causes the current set of authentication keys to be purged and 725a new set to be obtained by rereading the keys file (which must 726have been specified in the 727.Xr ntpd 1ntpdmdoc 728configuration file). 729This 730allows encryption keys to be changed without restarting the 731server. 732.It Ic trustedkey Ar keyid Oo Ar ... Oc 733.It Ic untrustedkey Ar keyid Oo Ar ... Oc 734These commands operate in the same way as the 735.Ic trustedkey 736and 737.Ic untrustedkey 738configuration file 739commands of 740.Xr ntpd 1ntpdmdoc . 741.It Ic authinfo 742Returns information concerning the authentication module, 743including known keys and counts of encryptions and decryptions 744which have been done. 745.It Ic traps 746Display the traps set in the server. 747See the source listing for 748further information. 749.It Xo Ic addtrap Ar address 750.Op Ar port 751.Op Ar interface 752.Xc 753Set a trap for asynchronous messages. 754See the source listing 755for further information. 756.It Xo Ic clrtrap Ar address 757.Op Ar port 758.Op Ar interface 759.Xc 760Clear a trap for asynchronous messages. 761See the source listing 762for further information. 763.It Ic reset 764Clear the statistics counters in various modules of the server. 765See the source listing for further information. 766.El 767.Sh "ENVIRONMENT" 768See \fBOPTION PRESETS\fP for configuration environment variables. 769.Sh "FILES" 770See \fBOPTION PRESETS\fP for configuration files. 771.Sh "EXIT STATUS" 772One of the following exit values will be returned: 773.Bl -tag 774.It 0 " (EXIT_SUCCESS)" 775Successful program execution. 776.It 1 " (EXIT_FAILURE)" 777The operation failed or the command syntax was not valid. 778.It 66 " (EX_NOINPUT)" 779A specified configuration file could not be loaded. 780.It 70 " (EX_SOFTWARE)" 781libopts had an internal operational error. Please report 782it to autogen\-users@lists.sourceforge.net. Thank you. 783.El 784.Sh "SEE ALSO" 785.Xr ntp.conf 5 , 786.Xr ntpd 1ntpdmdoc 787.Rs 788.%A David L. Mills 789.%T Network Time Protocol (Version 3) 790.%O RFC1305 791.Re 792.Sh AUTHORS 793The formatting directives in this document came from FreeBSD. 794.Sh "COPYRIGHT" 795Copyright (C) 1992\-2023 The University of Delaware and Network Time Foundation all rights reserved. 796This program is released under the terms of the NTP license, <http://ntp.org/license>. 797.Sh BUGS 798The 799.Nm 800utility is a crude hack. 801Much of the information it shows is 802deadly boring and could only be loved by its implementer. 803The 804program was designed so that new (and temporary) features were easy 805to hack in, at great expense to the program's ease of use. 806Despite 807this, the program is occasionally useful. 808.Pp 809Please report bugs to http://bugs.ntp.org . 810.Pp 811Please send bug reports to: https://bugs.ntp.org, bugs@ntp.org 812.Sh "NOTES" 813This manual page was \fIAutoGen\fP\-erated from the \fBntpdc\fP 814option definitions. 815