[time-nuts] Leap-second capture on laptop
magnus at rubidium.dyndns.org
Sat Dec 31 20:55:37 EST 2016
Good evening David,
On 01/01/2017 02:27 AM, Dr. David Kirkby (Kirkby Microwave Ltd) wrote:
> On 1 January 2017 at 01:00, Magnus Danielson <magnus at rubidium.dyndns.org>
>> Fellow time-nuts,
>> While not fancy by any means, my laptop captured the leap-second being
>> inserted by this message in the /var/log/syslog:
>> Jan 1 00:59:59 greytop kernel: [78458.839942] Clock: inserting leap
>> second 23:59:60 UTC
> Noting reported on my Sun Ultra 27 running OpenSolaris.
> Dec 31 23:55:02 hawk sendmail: [ID 801593 mail.info] uBVNt2jv004015:
> to=<root at hawk.local>, ctladdr=<root at hawk.local> (0/0), delay=00:00:00,
> xdelay=00:00:00, mailer=local, pri=30730, relay=local, dsn=2.0.0, stat=Sent
> Jan 1 00:00:02 hawk sendmail: [ID 801593 mail.info] v01002rm004055:
> from=root, size=319, class=0, nrcpts=1,
> msgid=<201701010000.v01002rm004055 at hawk.local>, relay=root at localhost
What NTP is this?
There is security patches to be made to older NTPs.
I had to shut down xntpd on several solaris machines to make them safe,
as there was no way of configure them to become safe. That was a couple
of years ago.
> This OS has not been updated for years
> drkirkby at hawk:~$ cat /etc/release
> OpenSolaris Development snv_134 X86
> Copyright 2010 Sun Microsystems, Inc. All Rights Reserved.
> Use is subject to license terms.
> Assembled 01 March 2010
Ehm. While off-topic, let me tell you that we had to shut down the last
Solaris machine we had on the computer club because we concluded that
there where tools designed to target that generation of Solaris machines
and take them over. It should not see public internet if powered on.
The network is increasingly hostile, so patch your machines, and don't
let any machines sit on public network unless you can patch them
regularly and also do that.
More information about the time-nuts