From owner-man-jp-reviewer@jp.freebsd.org  Tue Apr 11 10:56:50 2000
Received: (from daemon@localhost)
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) id KAA68612;
	Tue, 11 Apr 2000 10:56:50 +0900 (JST)
	(envelope-from owner-man-jp-reviewer@jp.FreeBSD.org)
Received: from ns4.sony.co.jp (ns4.Sony.CO.JP [202.238.80.4])
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) with ESMTP id KAA68607
	for <man-jp-reviewer@jp.FreeBSD.org>; Tue, 11 Apr 2000 10:56:49 +0900 (JST)
	(envelope-from sarumaru@ssd.sony.co.jp)
Received: from mail3.sony.co.jp (gatekeeper7.Sony.CO.JP [202.238.80.21])
	by ns4.sony.co.jp (03/30/00) with ESMTP id KAA49350
	for <man-jp-reviewer@jp.FreeBSD.org>; Tue, 11 Apr 2000 10:56:49 +0900 (JST)
Received: from mistral.wind.prv ([43.1.172.41])
	by mail3.sony.co.jp (3.7W99051310c) with ESMTP id KAA20255
	for <man-jp-reviewer@jp.FreeBSD.org>; Tue, 11 Apr 2000 10:56:48 +0900 (JST)
Received: from ssd.sony.co.jp (localhost [127.0.0.1])
	by mistral.wind.prv (8.9.3/3.7Wpl2-990626) with ESMTP id KAA07315
	for <man-jp-reviewer@jp.FreeBSD.org>; Tue, 11 Apr 2000 10:56:10 +0900 (JST)
Message-ID: <38F28637.8970F8D3@ssd.sony.co.jp>
Date: Tue, 11 Apr 2000 10:56:07 +0900
From: Yoshihiko SARUMARU <sarumaru@ssd.sony.co.jp>
X-Mailer: Mozilla 4.72C-ja  [ja] (X11; I; FreeBSD 3.4-RELEASE i386)
X-Accept-Language: ja, en
MIME-Version: 1.0
To: man-jp-reviewer@jp.FreeBSD.org
Content-Type: multipart/mixed;
 boundary="------------BA6F0746CAC5EAC3DDF16E61"
Reply-To: man-jp-reviewer@jp.freebsd.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+000315
X-Sequence: man-jp-reviewer 2176
Subject: [man-jp-reviewer 2176] NTP =?ISO-2022-JP?B?GyRCNFhPIhsoQg==?= 
Errors-To: owner-man-jp-reviewer@jp.freebsd.org
Sender: owner-man-jp-reviewer@jp.freebsd.org
X-Originator: mistral@imasy.or.jp

This is a multi-part message in MIME format.
--------------BA6F0746CAC5EAC3DDF16E61
Content-Type: text/plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit

$B!!1n4]$G$9!#(B
$B!!$@$$$VCH$a$F$7$^$$$^$7$?$,!"(BNTP$B4XO"$rEj9F$7$^$9!#$^$@3F%^%K%e%"%k$G$NF14|(B
$B$,40A4$G$J$$$H$3$m$b$"$k$+$b$7$l$^$;$s$,!"$A$g$C$H$3$l0J>e;~4V$,$H$l$J$5$=$&(B
$B$J$N$G!"$H$j$"$($:Ej$2$5$;$F$$$?$@$-$^$9!#(B
# $B$G$b2V8+$K$$$/2K$O$"$k$N$M!"$J$s$F$$$o$J$$$G$/$@$5$$(B ^_^;;

$B!!$J$*C18l$O0J2<$N$h$&$J46$8$GB7$($^$7$?!#$*$+$7$$$H$3$m$,$"$C$?$i;XE&$r$*4j(B
$B$$$7$^$9!#$J$+$K$O(B xntpd $B$J$I0JA0$N%^%K%e%"%k$+$i$=$N$^$^7Q>5$7$F$$$kC18l$b(B
$B$"$j$^$9!#:#8+$k$H!"(Bcommon key $B$N(B key $B$@$180$HLu$7$F$$$k$N$,5$$K$J$j$^$9$M!#(B

.\" WORD: The following options are available:
.\" WORD:     $B0J2<$N%*%W%7%g%s$,;HMQ2DG=$G$9(B:
.\" WORD: association		$B%"%=%7%(!<%7%g%s(B
.\" WORD: association identifier	$B%"%=%7%(!<%7%g%sHV9f(B ($BLu$7$9$.$+(B?)
.\" WORD: authentication	$BG'>Z(B
.\" WORD: clock	$B;~7W(B
.\" WORD: common key	$B6&DL80(B
.\" WORD: discipline	$B5,N'(B
.\" WORD: dispersion	$B$P$i$D$-(B
.\" WORD: falsetick	$B56;~7W(B
.\" WORD: fuzzball	fuzzball ($B8GM-L>;l(B; ntpd $B%Y!<%9$G$J$$(B NTP $B%5!<%P(B)
.\" WORD: intersection algorithm	$B8r:9%"%k%4%j%:%`(B
.\" WORD: key identifier	$B%-!<<1JL;R(B
.\" WORD: local clock	$B%m!<%+%k;~7W(B
.\" WORD: offset	$B$:$l(B
.\" WORD: peer		peer $B$N$^$^(B
.\" WORD: poll		$B%]!<%j%s%0$9$k(B
.\" WORD: query		$BLd$$9g$o$;(B
.\" WORD: reference clock	$B;2>H;~7W(B
.\" WORD: request	$B%j%/%(%9%H(B ($BL>;l$N>l9g(B)
.\" WORD: seconds and fraction	$BIC?t(B ($B>.?t$b2D(B) 
.\" WORD: slew	$BHyD4@0$9$k(B(slue $B$N2a5n!&2a5nJ,;l7A(B)
.\" WORD: status word		$B>uBV%o!<%I(B
.\" WORD: step	$B9g$o$;$k(B
.\" WORD: the precision time kernel modifications are in use
.\" WORD:     $B%+!<%M%k$K9b@:EY$J;~9oJ];}$N$?$a$NJQ99$,$J$5$l$F$$$k(B
.\" WORD: time	$B;~9o(B
.\" WORD: time constant		$B;~Dj?t(B
.\" WORD: time out ($BF0;l(B)	$B;~4V@Z$l(B
.\" WORD: time out ($BL>;l(B)	$B@)8B;~4V(B


--
$B1n4]K'I'(B / Yoshihiko SARUMARU    <sarumaru@ssd.sony.co.jp>
TEL: 03-5782-5406 (9-315-5406)   FAX: 03-5782-5448 (9-315-5448)
$B%=%K!<(B PNC $B%G%8%?%k%F%l%3%_%e%K%1!<%7%g%s%+%s%Q%K!<(B (DTC) $B4XO"5;=QIt(B $B>pJs5;=Q2](B
$B%=%K!<%7%9%F%`%G%6%$%s3t<02q<R(B $B5;=Q%7%9%F%`It(B $B%7%9%F%`(B1$B2](B
--------------BA6F0746CAC5EAC3DDF16E61
Content-Type: text/plain; charset=iso-2022-jp;
 name="ntp.keys.5.diff"
Content-Transfer-Encoding: 8bit
Content-Disposition: inline;
 filename="ntp.keys.5.diff"

--- ntp.keys.5.orig	Mon Apr 10 23:55:37 2000
+++ ntp.keys.5	Tue Apr 11 00:52:51 2000
@@ -5,131 +5,113 @@
 .\" jpman %Id: ntp.keys.5,v 0.0 2000/02/06 08:09:50 horikawa Stab %
 .Dt NTP.KEYS 5
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm ntp.keys
-.Nd NTP daemon key file format
-.Sh SYNOPSIS
+.Nd NTP $B%G!<%b%s!&%-!<%U%!%$%k!&%U%)!<%^%C%H(B
+.Sh $B=q<0(B
 .Nm /etc/ntp.keys
-.Sh DESCRIPTION
-Following is a description of the format of NTP key files.
-For a description of the use of these files, see the
-.Qq Authentication Support
-section of the
+.Sh $B2r@b(B
+$B0J2<$O(B NTP $B%-!<%U%!%$%k$N7A<0$N2r@b$G$9!#(B
+$B$3$l$i$N%U%!%$%k$N;HMQ$K4X$9$k2r@b$O!"(B
 .Xr ntp.conf 5
-page.
-.Pp
-In the case of DES, the keys are 56 bits long with,
-depending on type, a parity check on each byte.
-In the case of MD5, the keys are 64 bits (8 bytes).
+$BJ8=q$N(B
+.Qq $BG'>Z%5%]!<%H(B
+$B@a$r;2>H$7$F$/$@$5$$!#(B
+.Pp
+DES $B$N>l9g!"(B
+$B%-!<$O(B 56 $B%S%C%HD9$G!"7?$K$h$C$F$O3F%P%$%H$K%Q%j%F%#$,$D$-$^$9!#(BMD5
+$B$N>l9g!"%-!<$O(B 64 $B%S%C%H(B (8 $B%P%$%H(B) $B$G$9!#(B
 .Xr ntpd 8
-reads its keys from a file specified using the
+$B$O!"(B
+$B%3%^%s%I%i%$%s%*%W%7%g%s(B
 .Fl k
-command line option or the
-.Ic keys
-statement in the configuration file.
-While key number 0 is fixed by the NTP standard
-(as 56 zero bits)
-and may not be changed,
-one or more of the keys numbered 1 through 15
-may be arbitrarily set in the keys file.
-.Pp
-The key file uses the same comment conventions
-as the configuration file.
-Key entries use a fixed format of the form
+$B$b$7$/$O@_Dj%U%!%$%kCf$N(B
+.Ar keys
+$BJ8$r;HMQ$7$F;XDj$5$l$k%U%!%$%k$+$i%-!<$rFI$_9~$_$^$9!#%-!<HV9f(B 0 $B$O!"(BNTP
+$BI8=`$K$h$C$F(B (56 $B%S%C%H$N(B 0 $B$H$7$F(B) $B7hDj$5$l$F$*$j!"JQ99$G$-$^$;$s$,!"(B
+$B0lJ}!"(B1 $B$+$i(B 15 $B$N%-!<HV9f$NFb$N(B 1 $B$D0J>e$,%-!<%U%!%$%kCf$GG$0U$K(B
+$B%;%C%H$G$-$^$9!#(B
+.Pp
+$B%-!<%U%!%$%k$O!"@_Dj%U%!%$%k$HF1MM$N%3%a%s%H5-=RK!(B
+$B$r;HMQ$7$F$$$^$9!#%-!<%(%s%H%j$O(B
 .Pp
 .Dl keyno type key
 .Pp
-where
+$B$N7A<0$N8GDj$5$l$?%U%)!<%^%C%H$r;HMQ$7$^$9!#$3$3$G!"(B
 .Ar keyno
-is a positive integer,
+$B$O@5$N?t!"(B
 .Ar type
-is a single character which defines the key format,
-and
+$B$O%-!<7A<0$rDj5A$9$kC10lJ8;z!"(B 
 .Ar key
-is the key itself.
+$B$O%-!<$=$l<+?H$G$9!#(B
 .Pp
-The
 .Ar key
-may be given in one of three different formats,
-controlled by the
+$B$O!"(B
 .Ar type
-character.
-The three key types, and corresponding formats,
-are listed following.
+$BJ8;z$K$h$k@)8f$G!"(B3 $B$D$N0[$J$k%U%)!<%^%C%H$N(B
+$BFb$N(B 1$B$D$GM?$($i$l$^$9!#(B3 $B$D$N%-!<$N7?$H$=$l$KBP1~$9$k%U%)!<%^%C%H$O!"(B
+$B<!$K$"$2$k$H$*$j$G$9!#(B
 .Bl -tag -width indent
 .It S
-The
 .Ar key
-is a 64-bit hexadecimal number in the format
-specified in the DES specification;
-that is, the high order seven bits of each octet are used
-to form the 56-bit key
-while the low order bit of each octet is given a value
-such that odd parity is maintained for the octet.
-Leading zeroes must be specified
-(i.e. the key must be exactly 16 hex digits long)
-and odd parity must be maintained.
-Hence a zero
-.Ar key ,
-in standard format, would be given as
-.Li 0101010101010101 .
+$B$O!"(B DES $B;EMM$KDj$a$i$l$?%U%)!<%^%C%H$N(B 64-$B%S%C%H$N(B
+16$B?J?t$G!"3F%*%/%F%C%H$N>e0L(B 7 $B%S%C%H$,;HMQ$5$l$?(B 56-$B%S%C%H(B
+$B%-!<$G$9!#3F%*%/%F%C%H$N2<0L(B 1 $B%S%C%H$O!"%*%/%F%C%H$r4q?t%Q%j%F%#$K(B
+$BJ]$D$h$&$KM?$($i$l$^$9!#@hF,$N(B 0 $B$O>JN,$G$-$^$;$s(B ($B$9$J$o$A!"%-!<$O(B
+$B@53N$K(B 16 $B7e$N(B 16 $B?J?t$G$"$kI,MW$,$"$j$^$9(B) $B!#$^$?!"4q?t%Q%j%F%#$,J](B
+$B$?$l$M$P$J$j$^$;$s!#$=$l$f$(!"(B0
+.Ar key
+$B$O!"I8=`%U%)!<%^%C%H$G!"(B
+.Li 0101010101010101 
+$B$H$7$FM?$($i$l$^$9!#(B
 .It N
-The
-.Ar key
-is a 64-bit hexadecimal number in the format
-specified in the NTP standard.
-This is the same as the DES format,
-except the bits in each octet have been rotated one bit right
-so that the parity bit is now the high order bit of the octet.
-Leading zeroes must be specified and odd parity must be maintained.
-A zero
 .Ar key
-in NTP format would be specified as
-.Li 8080808080808080 .
+$B$O!"(BNTP $BI8=`$GDj$a$i$l$?%U%)!<%^%C%H$N(B 64-$B%S%C%H$N(B 16$B?J?t$G$9!#(B
+$B$3$l$O!"3F%*%/%F%C%H$r(B 1 $B%S%C%H1&(B rotate $B$7$F!"%Q%j%F%#%S%C%H$,(B
+$B%*%/%F%C%H$N>e0L%S%C%H$K$J$C$?$3$H$r=|$$$F$O!"(BDES $B%U%)!<%^%C%H(B
+$B$HF1$8$G$9!#@hF,$N(B 0 $B$O>JN,$G$-$:!"4q?t%Q%j%F%#$,J]$?$l$M$P$J$j$^$;$s!#(B
+0 $B%-!<$O!"(B NTP $B%U%)!<%^%C%H$G!"(B
+.Ar 8080808080808080 
+$B$N$h$&$K;XDj$5$l$^$9!#(B
 .It A
-The
 .Ar key
-is a 1-to-8 character ASCII string.
-A key is formed from this by using the low order 7 bits
-of each ASCII character in the string,
-with zeroes added on the right
-when necessary to form a full width 56-bit key,
-in the same way that encryption keys are formed from Unix passwords.
+$B$O(B 1 $B$+$i(B 8 $BJ8;z$N(B ASCII $BJ8;zNs$G$9!#%-!<$O!"J8;zNsCf$N3FJ8;z$N(B
+ASCII $B$N2<0L(B 7 $B%S%C%H$r;HMQ$7$F9=@.$5$l$^$9!#(B56-$B%S%C%HI}$N(B
+$B%-!<$r:n$k$?$a$K!"(B Unix $B%Q%9%o!<%I$+$i0E9f2=%-!<$r:n$k$N$H(B
+$BF1$8J}K!$G!"I,MW$J$i(B 0 $B$,1&C<$KIU2C$5$l$^$9!#(B
 .It M
-The
 .Ar key
-is a 1-to-8 character ASCII string,
-using the MD5 authentication scheme.
-Note that both the keys and the authentication schemes (DES or MD5)
-must be identical between a set of peers sharing the same key number.
+$B$O(B 1$B$+$i(B 8 $BJ8;z$N(B ASCII $BJ8;zNs$G!"(B MD5 $B$NG'>ZJ}<0$r(B
+$B;HMQ$7$F$$$^$9!#%-!<$HG'>ZJ}<0(B (DES $B$^$?$O(B MD5) $B$NN>J}$,!"F1$8%-!<(B
+$BHV9f$r6&M-$9$k0lAH$N8r?.Aj<j$N4V$G0l0U$G$"$k$3$H$,!"I,MW$G$"$k$3$H$K(B
+$BCm0U$7$F$/$@$5$$!#(B
 .El
 .Pp
-Note that the keys used by the
 .Xr ntpq 8
-and
+$B$H(B
 .Xr ntpdc 8
-programs are checked against passwords
-requested by the programs and entered by hand,
-so it is generally appropriate to specify these keys in ASCII format.
-.Sh FILES
+$B%W%m%0%i%`$G;HMQ$5$l$k%-!<$O!"(B
+$B%W%m%0%i%`$K$h$C$FMW5a$5$l$k%Q%9%o!<%I$KBP$7$F%A%'%C%/$5$l!"(B
+$B$^$?<jF0$GF~NO$5$l$k$?$a!"(BASCII $B7A<0$G$3$l$i$N%-!<$r;XDj$9$k$3$H$O(B
+$BDL>o$OE,@Z$G$9!#(B
+.Sh $B4XO"%U%!%$%k(B
 .Bl -tag -width /etc/ntp.drift -compact
 .It Pa /etc/ntp.keys
-the default name of the configuration file
+$B%G%U%)%k%H$N@_Dj%U%!%$%kL>(B
 .El
-.Sh SEE ALSO
+.Sh $B4XO"9`L\(B
 .Xr ntp.conf 5 ,
 .Xr ntpd 8 ,
 .Xr ntpdc 8 ,
 .Xr ntpdate 8
-.Sh HISTORY
-Written by
+.Sh $BNr;K(B
+Delaware $BBg3X$N(B
 .An David Mills
-at the University of Delaware.
-.Sh BUGS
+$B$K$h$C$F=q$+$l$^$7$?!#(B
+.Sh $B%P%0(B
 .Xr ntpd 8
-has gotten rather fat.
-While not huge, it has gotten larger than might
-be desireable for an elevated-priority daemon running on a workstation,
-particularly since many of the fancy features which consume the space
-were designed more with a busy primary server, rather than a high
-stratum workstation, in mind.
+$B$O$+$J$jBg$-$/$J$C$F$7$^$$$^$7$?!#5pBg$H$O8@$$$^$;$s$,!"%o!<%/%9%F!<%7%g%s$G(B
+$B<B9T$5$l$k2DJQ%W%i%$%*%j%F%#$N%G!<%b%s$H$7$F$NK>$^$7$$Bg$-$5$r(B
+$BD6$($F$7$^$$$^$7$?!#$=$l$OFC$K!"$+$5$P$k6E$C$?FCD'$NB?$/$,!"9b$$(B 
+stratum $B$N%o!<%/%9%F!<%7%g%s$h$j$O!"9bIi2Y$N<gMW(B (primary) $B%5!<%P$K(B
+$B$"$o$;$F@_7W$5$l$F$$$k$+$i$G$9!#(B

--------------BA6F0746CAC5EAC3DDF16E61
Content-Type: text/plain; charset=iso-2022-jp;
 name="ntpd.8.diff"
Content-Transfer-Encoding: 8bit
Content-Disposition: inline;
 filename="ntpd.8.diff"

--- ntpd.8.orig	Tue Feb 15 22:54:23 2000
+++ ntpd.8	Mon Apr 10 23:40:31 2000
@@ -5,10 +5,10 @@
 .\" jpman %Id: ntpd.8,v 0.0 2000/02/06 08:09:52 horikawa Stab %
 .Dt NTPD 8
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm ntpd
-.Nd Network Time Protocol (NTP) daemon
-.Sh SYNOPSIS
+.Nd Network Time Protocol (NTP) $B%G!<%b%s(B
+.Sh $B=q<0(B
 .Nm ntpd
 .Op Fl aAbdm
 .Op Fl c Ar conffile
@@ -21,201 +21,183 @@
 .Op Fl t Ar trustedkey
 .Op Fl v Ar variable
 .Op Fl V Ar variable
-.Sh DESCRIPTION
+.Sh $B2r@b(B
 .Nm
-is an operating system daemon
-which sets and maintains the system time-of-day
-in synchronism with Internet standard time servers.
-.Nm
-is a complete implementation of the Network Time Protocol (NTP)
-version 4,
-but also retains compatibility with version 3,
-as defined by RFC 1305,
-and version 1 and 2,
-as defined by RFC 1059 and RFC 1119,
-respectively.
-.Nm
-does most computations in 64-bit floating point arithmetic
-and does relatively clumsy 64-bit fixed point operations
-only when necessary to preserve the ultimate precision,
-about 232 picoseconds.
-While the ultimate precision is not achievable
-with ordinary workstations and networks of today,
-it may be required with future nanosecond CPU clocks and gigabit LANs.
-.Pp
-The daemon can operate in any of several modes,
-including symmetric active/passive,
-client/server broadcast/multicast and manycast.
-A broadcast/multicast or manycast client can discover remote servers,
-compute server-client propagation delay correction factors
-and configure itself automatically.
-This makes it possible to deploy a fleet of workstations
-without specifying configuration details
-specific to the local environment.
+$B$O!"%$%s%?!<%M%C%H$NI8=`;~4V%5!<%P$HF14|$r$H$C$F!"(B $B%7%9%F%`;~9o(B 
+(time-of-day) $B$r@_Dj$70];}$9$k!"%*%Z%l!<%F%#%s%0%7%9%F%`%G!<%b%s$G$9!#(B
+.Nm
+$B$O!"(BNetwork Time Protocol (NTP) $B%P!<%8%g%s(B 
+4 $B$N40A4$J<BAu$H$J$C$F$$$^$9$,!"(BRFC 1305 $B$GDj5A$5$l$F$$$k%P!<%8%g%s(B 3
+$B$KBP$9$k8_49@-$bJ]$C$F$*$j!"$^$?(B
+$B3F!9(B RFC 1059 $B$H(B RFC 1119 $B$GDj5A(B
+$B$5$l$F$$$k%P!<%8%g%s(B 1 $B$H%P!<%8%g%s(B 2 $B$KBP$9$k8_49@-$bJ]$C$F$$$^$9!#(B
+.Nm
+$B$OB?$/$N7W;;$r(B 64-bit $BIbF0>.?tE@1i;;$G9T$J$$!"Ls(B 232 $B%T%3IC$N(B
+$B@dBPE*$J@:EY$rJ]$DI,MW$,$"$k$H$-$@$1!"Hf3SE*07$$$K$/$$(B
+64-bit $B8GDj>.?tE@A`:n$r9T$J$$$^$9!#(B
+$B8=:_$NIaDL$N%o!<%/%9%F!<%7%g%s$d%M%C%H%o!<%/$G$O@dBPE*$J@:EY$O(B
+$BC#@.$G$-$^$;$s$,!"$3$N@:EY$O>-Mh$N%J%NIC(B CPU $B%/%m%C%/$d%.%,%S%C%H(B LAN
+$B$K$*$$$FI,MW$H$J$k$G$7$g$&!#(B
+.Pp
+$B%G!<%b%s$O%"%/%F%#%V(B/$B%Q%C%7%V!"%/%i%$%"%s%H(B/$B%5!<%P!"%V%m!<%I%-%c%9%H(B
+/$B%^%k%A%-%c%9%H(B/$B%(%K!<%-%c%9%HEy$NBP>NE*$J%b!<%I$r4^$`$$$:$l$+$N%b!<%I$G(B
+$BF/$/$3$H$,(B
+$B$G$-$^$9!#%V%m!<%I%-%c%9%H$b$7$/$O%^%k%A%-%c%9%H%/%i%$%"%s%H$O!"(B
+$B%j%b!<%H%5!<%P$rC5$7=P$7!"%5!<%P(B-$B%/%i%$%"%s%H4V$NEAGECY1dJd@50x;R$r7W;;$7$F!"(B
+$B<+F0E*(B
+$B$K<+?H$KBP$9$k@_Dj$r9T$$$^$9!#$3$l$K$h$j!"%m!<%+%k$J4D6-$K8GM-$N>\:Y$J@_Dj(B
+$B$d@_Dj%U%!%$%k$J$7$K!"0l72$N%o!<%/%9%F!<%7%g%s$r(B
+$BG[CV$9$k$3$H$,2DG=$K$J$j$^$9!#(B
 .Pp
-Ordinarily,
+$BDL>o!"(B
 .Nm
-reads the
+$B$O!"5/F0;~$K@_Dj%U%!%$%k(B
 .Xr ntp.conf 5
-configuration file at startup time
-in order to determine the synchronization sources and operating modes.
-It is also possible to specify a working, although limited,
-configuration entirely on the command line,
-obviating the need for a configuration file.
-This may be particularly appropriate
-when the local host is to be configured
-as a broadcast/multicast client or manycast client,
-with all peers being determined
-by listening to broadcasts at run time.
-.Pp
-If NetInfo support is built into
-.Nm Ns ,
-then
-.Nm
-will attempt to read its configuration from the NetInfo
-if the default configuration file cannot be read
-and no file is specified by the
+$B$+$iF14|%=!<%9$dF0:n%b!<%I$r7h$a$k$?$a$KFI9~$_$^$9!#(B
+$B$^$?!"%3%^%s%I%i%$%s$+$iA4$F$N!"8BDj$5$l$^$9$,!"F0:n$r;XDj$9$k$3$H$K$h$j!"(B
+$B@_Dj%U%!%$%k$rITMW$K$9$k$3$H$b$G$-$^$9!#(B
+$B$3$l$O!"(B
+$B%m!<%+%k%[%9%H(B
+$B$,!"<B9T;~$K%V%m!<%I%-%c%9%H$rBT<u$1$k(B (listen) $B$3$H$G7hDj$5$l$kA4$F(B
+$B$NDL?.Aj<j(B (peer) $B$KBP$7$F!"%V%m!<%I%-%c%9%H$"$k$$$O%^%k%A%-%c%9%H(B
+$B!"%a%K!<%-%c%9%H%/%i%$%"%s%H$H$7$F@_Dj$5$l$k$Y$-;~$K$O!"FC$KE,$7$F$$$^$9!#(B
+.Pp
+.Nm
+$B$O(B
+NetInfo $B%5%]!<%H$,AH$_9~$^$l$F$$$k>l9g$K$O!"(B
+$B%G%U%)%k%H$N@_(B$BDj%U%!%$%k$,FI$_9~$a$:!"(B
 .Fl c
-option.
+$B%*%W%7%g%s$K$h$k%U%!%$%k$N;XDj$b$5$l$F$$$J$$>l9g$K$O!"(B
+$B@_Dj$r(B NetInfo $B$h$jFI$_9~$b$&$H$7$^$9!#(B
 .Pp
-Various
-internal
 .Nm
-variables can be displayed and configuration options altered
-while the daemon is running
-through use of the
+$B%G!<%b%s$N<B9TCf$O!"(B
 .Xr ntpq 8
-and
+$B$*$h$S(B
 .Xr ntpdc 8
-programs.
+$B$r;HMQ$9$k$3$H$G!"%G!<%b%s$N$5$^$6$^$JFbItJQ?t$rI=<($7$?$j(B
+$B@_Dj%*%W%7%g%s$rJQ99$G$-$^$9!#(B
 .Pp
-When
 .Nm
-starts it looks at the value of
+$B$O5/F0;~$K(B
 .Xr umask 2
-and if it is zero,
-.Nm
-will set it to 022.
+$B$NCM$rD4$Y!"$b$7$=$l$,(B 0 $B$J$i$P!"(B
+022 $B$K@_Dj$7$^$9!#(B
 .Pp
-The following command line options are available:
+$B0J2<$K$"$2$k%3%^%s%I%i%$%s0z?t$,;HMQ2DG=$G$9(B:
 .Bl -tag -width indent
 .It Fl a
-Enable authentication mode (default).
+$BG'>Z%b!<%I$rM-8z$K$7$^$9(B ($B%G%U%)%k%H(B)$B!#(B
 .It Fl A
-Disable authentication mode.
+$BG'>Z%b!<%IL58z$K$7$^$9!#(B
 .It Fl b
-Synchronize using NTP broadcast messages.
+NTP $B$N%V%m!<%I%-%c%9%H%a%C%;!<%8$r;H$C$FF14|$7$^$9!#(B
 .It Fl c Ar conffile
-Specify the name and path of the configuration file.
+$B@_Dj%U%!%$%k$NL>A0$H%Q%9$r;XDj$7$^$9!#(B
 .It Fl d
-Specify debugging mode.
-This flag may occur multiple times,
-with each occurrence indicating greater detail of display.
+$B%G%P%C%0%b!<%I$r;XDj$7$^$9!#$3$N%U%i%0$O2?2s;XDj$7$F$b$+$^$$$^$;$s$,!"(B
+$B2s?t$,B?$$$[$II=<($,$h$j>\:Y$K$J$j$^$9!#(B
 .It Fl D Ar level
-Specify debugging level directly.
+$B%G%P%C%0%l%Y%k$rD>@\;XDj$7$^$9!#(B
 .It Fl f Ar driftfile
-Specify the name and path of the drift file.
+$B%I%j%U%H%U%!%$%k$NL>A0$H%Q%9$r;XDj$7$^$9!#(B
 .It Fl g
-Normally, the daemon exits
-if the offset exceeds a 1000 s sanity limit.
-This option overrides this limit
-and allows the time to be set to any value without restriction.
+$BDL>o!"%G!<%b%s$O%*%U%;%C%H$,(B
+1000 $BIC$N@55$8B3&(B (sanity limit)$B$r1[$($F$$$k>l9g$O=*N;$7$^$9!#(B
+$B$3$N%*%W%7%g%s$O$3$N@)8B$rL5;k$7!"(B
+$B$I$N;~9o$K$b@)8B$J$/@_Dj$G$-$k$h$&$K$7$^$9!#(B
 .It Fl k Ar keyfile
-Specify the name and path of the file
-containing the NTP authentication keys.
+NTP $B$NG'>Z%-!<$r4^$`%U%!%$%k$NL>A0$H%Q%9$r;XDj$7$^$9!#(B
 .It Fl l Ar logfile
-Specify the name and path of the log file.
-The default is the system log facility.
+$B%m%0%U%!%$%k$NL>A0$H%Q%9$r;XDj$7$^$9!#(B
+$B%G%U%)%k%H$O%7%9%F%`%m%05!G=$G$9!#(B
 .It Fl m
-Synchronize using NTP multicast messages
-on the IP multicast group address 224.0.1.1
-(requires multicast kernel).
+224.0.1.1 $B$N(B IP $B%^%k%A%-%c%9%H%0%k!<%W%"%I%l%9>e$N(B
+NTP $B%^%k%A%-%c%9%H%a%C%;!<%8$rMxMQ$7$FF14|$7$^$9(B
+($B%^%k%A%-%c%9%H%+!<%M%k$,I,MW$K$J$j$^$9(B)$B!#(B
 .It Fl p Ar pidfile
-Specify the name and path to record the daemon's process ID.
+$B%G!<%b%s$N%W%m%;%9(B ID $B$r5-O?$9$k$?$a$N%U%!%$%kL>$H%Q%9$r;XDj$7$^$9!#(B
 .It Fl P
-Override the priority limit set by the operating system.
-Not recommended for sissies.
+$B%*%Z%l!<%F%#%s%0%7%9%F%`$K$h$C$F@_Dj$5$l$kM%@hEY@)8B$rL5;k$7$^$9!#(B
+$B0U5$CO$J$7$K$O?d>)$5$l$^$;$s!#(B
 .It Fl r Ar broadcastdelay
-Specify the default propagation delay
-between the broadcast/multicast server and this computer.
-This is necessary
-only if the delay cannot be computed automatically by the protocol.
+$B%V%m!<%I%-%c%9%H(B/$B%^%k%A%-%c%9%H%5!<%P$H$3$N%3%s%T%e!<%?4V$N(B
+$B%G%U%)%k%HEAGECY1d$r;XDj$7$^$9!#(B
+$B$3$N%*%W%7%g%s$O%W%m%H%3%k$K$h$C$F<+F0E*$KCY1d$r7W;;$G$-$J$$>l9g$K$N$_(B
+$BI,MW$H$J$j$^$9!#(B
 .It Fl s Ar statsdir
-Specify the directory path for files created by the statistics
-facility.
+$BE}7W5!G=$K$h$C$F:n@.$5$l$k%U%!%$%k$N%G%#%l%/%H%j%Q%9$r;XDj$7$^$9!#(B
 .It Fl t Ar key
-Add a key number to the trusted key list.
+$B%-!<HV9f$r?.Mj$G$-$k%-!<(B (trusted key) $B$N%j%9%H$KIU$12C$($^$9!#(B
 .It Fl v Ar variable
 .It Fl V Ar variable
-Add a system variable listed by default.
+$B%G%U%)%k%H$G%j%9%H$5$l$k%7%9%F%`JQ?t$rDI2C$7$^$9!#(B
 .It Fl x
-Ordinarily, if the time is to be adjusted more than 128 ms,
-it is stepped, not gradually slewed.
-This option forces the time to be slewed in all cases.
-Note: since the slew rate is limited to 0.5 ms/s,
-each second of adjustment requires an amortization interval of 2000 s.
-Thus, an adjustment of many seconds can take hours or days to amortize.
+$BDL>o!";~9o$r(B 128 ms $B$h$j$bB?$/D4@a$9$k>l9g$O!"(B
+$B=y!9$KHyD4@0$9$k$N$G$O$J$/!"C1$K9g$o$;$^$9!#(B
+$B$3$N%*%W%7%g%s$OA4$F$N>l9g$K$*$$$FHyD4@0$9$k$h$&$K6/@)$7$^$9!#(B
+$BCm0U(B: $BHyD4@0$NB.EY$O(B 0.5 ms/s $B$J$N$G!"(B1 $BICD4@a$9$k$N$K(B 2000 $BIC$N(B
+$B=~5Q4|4V$,I,MW$G$9!#(B
+$B$3$N$?$a!"$?$/$5$s$NIC?t$rD4@a$9$k$K$O!"(B
+$B=~5Q$K?t;~4V$d?tF|$rMW$9$k$3$H$b$"$j$^$9!#(B
 .El
-.Ss Variables
-Most variables used by the NTP protocol
-can be examined with
+.Ss $BJQ?t(B
+NTP
+$B%W%m%H%3%k$K$h$jMQ$$$i$l$k$?$$$F$$$NJQ?t$O!"(B
 .Xr ntpdc 8
-(mode 7 messages) and
-.Xr ntpq 8 (mode 6 messages).
-Currently, very few variables can be modified via mode 6 messages.
-These variables are either created with the
+($B%b!<%I(B 7 $B%a%C%;!<%8(B) $B$H(B
+.Xr ntpq 8 ($B%b!<%I(B 6 $B%a%C%;!<%8(B)
+$B$G!"D4$Y$k$3$H$,$G$-$^$9!#(B
+$B8=:_$O!"$4$/$o$:$+$NJQ?t$,%b!<%I(B 6 $B%a%C%;!<%8$rDL$7$FJQ992DG=$G$9!#(B
+$B$3$l$i$NJQ?t$O!"(B
 .Ic setvar
-directive
-(described in the
-.Qq Miscellaneous Options
-section of the
+$B%G%#%l%/%F%#%V(B
+(
 .Xr ntp.conf 5
-page)
-or the leap warning bits.
-The leap warning bits can be set in the
+$BJ8=q$N(B
+.Qq $B;(B?$J%*%W%7%g%s(B
+$B@a$G5-=R$5$l$F$$$^$9(B)
+$B$G:n$i$l$?JQ?t$+!"%j!<%W7Y9p(B (leap warning) $B%S%C%H$N$I$A$i$+$G$9!#(B
+$B%j!<%W7Y9p%S%C%H$O!"(B
 .Va leapwarning
-variable up to one month ahead.
-Both the
+$BJQ?t$G(B 1 $B%v7n@h$^$G%;%C%H$G$-$^$9!#(B
 .Va leapwarning
-and
+$B$H(B
 .Va leapindication
-variables have a slightly different encoding
-than the usual leap bits interpretation:
-.Pp
-.Bl -tag -width indent -compact
+$BJQ?t$NN>J}$,DL>o$N%j!<%W%S%C%H2r<a$H>/$70c$C$?%(%s%3!<%G%#%s%0$K$J$C$F$$$^$9(B:
+.Bl -tag -width indent
 .It 00
-The daemon passes the leap bits of its synchronization source
-(usual mode of operation).
+$B%G!<%b%s$O!"F14|8;$N%j!<%W%S%C%H$rEO$7$^$9(B ($BDL>o%b!<%I$NF0:n(B) $B!#(B
 .It 01
 .It 10
-A leap second is added/deleted (operator forced leap second).
+$B$&$k$&IC(B (leap second) $B$,!"IU2C(B/$B:o=|$5$l$^$9(B ($B%*%Z%l!<%?$K$h$k$&$k$&IC$N6/@)(B)$B!#(B
 .It 11
-Leap information from the synchronizations source is ignored
-(thus
+$BF14|8;$+$i$N%j!<%W>pJs$O!"L5;k$5$l$^$9(B ($B$=$l$f$((B
 .Dv LEAP_NOWARNING
-is passed on).
+$B$,M?$($i$l$^$9(B) $B!#(B
 .El
-.Sh FILES
+.Sh $B4XO"%U%!%$%k(B
 .Bl -tag -width /etc/ntp.drift -compact
 .It Pa /etc/ntp.conf
-the default name of the configuration file
+$B%G%U%)%k%H$N@_Dj%U%!%$%kL>(B
 .It Pa /etc/ntp.drift
-the default name of the drift file
+$B%G%U%)%k%H$N%I%j%U%H%U%!%$%kL>(B
 .It Pa /etc/ntp.keys
-the default name of the key file
+$B%G%U%)%k%H$N%-!<%U%!%$%kL>(B
 .El
-.Sh SEE ALSO
+.Sh $B4XO"9`L\(B
 .Xr ntp.conf 5 ,
 .Xr ntpdate 8 ,
 .Xr ntpdc 8 ,
 .Xr ntpq 8
 .Pp
-In addition to the manual pages provided,
-comprehensive documentation is available on the world wide web
-at
-.Li http://www.ntp.org/ .
-A snapshot of this documentation is available in HTML format in
-.Pa /usr/share/doc/ntp .
+$BDs6!$5$l$?%^%K%e%"%k%Z!<%8$K2C$($F!"(B
+$BJq3gE*$J$J%I%-%e%a%s%H$,(B
+.Li http://www.ntp.org/
+$B$N%o!<%k%I!&%o%$%I!&%&%'%V$K$"$j$^$9!#(B
+$B$3$N%I%-%e%a%s%H$N%9%J%C%W%7%g%C%H$,(B HTML $B7A<0$G(B
+.Pa /usr/share/doc/ntp
+$B$K$"$j$^$9!#(B
 .Rs
 .%A David L. Mills
 .%T Network Time Protocol (Version 1)
@@ -231,18 +213,18 @@
 .%T Network Time Protocol (Version 3)
 .%O RFC1305
 .Re
-.Sh HISTORY
-Written by
+.Sh $BNr;K(B
+$B%3%^%s%I$O(B
+Toronto $BBg3X$N(B
 .An Dennis Ferguson
-at the University of Toronto.
-Text amended by
+$B$K$h$C$F=q$+$l$^$7$?!#(B
+$BK\J8$O(B Delaware $BBg3X$N(B
 .An David Mills
-at the University of Delaware.
-.Sh BUGS
+$B$K$h$j=$@5$5$l$^$7$?!#(B
+.Sh $B%P%0(B
 .Nm
-has gotten rather fat.
-While not huge, it has gotten larger than might
-be desireable for an elevated-priority daemon running on a workstation,
-particularly since many of the fancy features which consume the space
-were designed more with a busy primary server, rather than a high
-stratum workstation, in mind.
+$B$O$+$J$jBg$-$/$J$C$F$7$^$$$^$7$?!#5pBg$H$O8@$$$^$;$s$,!"%o!<%/%9%F!<%7%g%s$G(B
+$B<B9T$5$l$k2DJQ%W%i%$%*%j%F%#$N%G!<%b%s$H$7$F$NK>$^$7$$Bg$-$5$r(B
+$BD6$($F$7$^$$$^$7$?!#$=$l$OFC$K!"$+$5$P$k6E$C$?FCD'$NB?$/$,!"9b$$(B 
+stratum $B$N%o!<%/%9%F!<%7%g%s$h$j$O!"9bIi2Y$N<gMW(B (primary) $B%5!<%P$K(B
+$B$"$o$;$F@_7W$5$l$F$$$k$+$i$G$9!#(B

--------------BA6F0746CAC5EAC3DDF16E61
Content-Type: text/plain; charset=iso-2022-jp;
 name="ntpdate.8.diff"
Content-Transfer-Encoding: 8bit
Content-Disposition: inline;
 filename="ntpdate.8.diff"

--- ntpdate.8.orig	Tue Feb 15 22:51:43 2000
+++ ntpdate.8	Tue Apr 11 09:46:32 2000
@@ -3,12 +3,17 @@
 .\"
 .Dd January 6, 2000
 .\" jpman %Id: ntpdate.8,v 0.0 2000/02/06 08:09:52 horikawa Stab %
+.\" WORD: slew	$BHyD4@0$9$k(B(slue $B$N2a5n!&2a5nJ,;l7A(B)
+.\" WORD: step	$B9g$o$;$k(B
+.\" WORD: clock	$B;~7W(B
+.\" WORD: time	$B;~9o(B
+.\" WORD: seconds and fraction	$BIC?t(B ($B>.?t$b2D(B) 
 .Dt NTPDATE 8
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm ntpdate
-.Nd set the date and time via NTP
-.Sh SYNOPSIS
+.Nd NTP $B$r2p$7$FF|IU$H;~9o$r@_Dj$9$k(B
+.Sh $B=q<0(B
 .Nm
 .Op Fl bBdqsuv
 .Op Fl a Ar key
@@ -19,214 +24,199 @@
 .Op Fl t Ar timeout
 .Ar server
 .Op Ar ...
-.Sh DESCRIPTION
-.Nm
-sets the local date and time by polling the Network Time Protocol (NTP)
-server(s) given as the
+.Sh $B2r@b(B
+.Nm 
+$B$O!"@53N$J;~9o$r7h$a$k$?$a$K(B
 .Ar server
-arguments to determine
-the correct time.  It must be run as root on the local host.  A number
-of samples are obtained from each of the servers specified
-and a subset of the NTP clock filter and selection algorithms
-are applied to select the best of these.
-Note that the accuracy and reliability of
-.Nm
-depends on the number of servers,
-the number of polls each time it is run
-and the interval between runs.
+$B0z?t$GM?$($i$l$?(B
+$B%M%C%H%o!<%/%?%$%`%W%m%H%3%k(B (Network Time Protocol; NTP)
+$B%5!<%P(B ($BJ#?t2D(B) $B$rD4$Y$k$3$H$K$h$C$F!"(B
+$B%m!<%+%k$JF|IU$H;~9o$r@_Dj$7$^$9!#(B
+$B$3$N%3%^%s%I$O!"%m!<%+%k%[%9%H$N(B root $B$H$7$F5/F0$5$l$J$1$l$P$J$j$^$;$s!#(B
+$B;XDj$5$l$?3F%5!<%P$+$i$?$/$5$s$N%5%s%W%k$rF@$F!"(B
+NTP $B;~7W%U%#%k%?$N%5%V%;%C%H$HA*Br%"%k%4%j%:%`$rE,MQ$7!"(B
+$B$=$NCf$+$i:GNI$N$b$N$rA*Br$7$^$9!#(B
+.Nm
+$B$N@53N$5$H?.Mj@-$O(B
+$B%5!<%P$N?t!"0l<B9T$"$?$j$ND4::?t!"$=$7$F<B9T4V3V$G7h$^$k$3$H$K(B
+$BCm0U$7$F$/$@$5$$!#(B
 .Pp
 .Nm
-can be run manually as necessary to set the host clock,
-or it can be run from the host startup script
-to set the clock at boot time.
-This is useful in some cases to set the clock initially
-before starting the NTP daemon
-.Xr ntpd 8 .
-It is also possible to run
+$B%3%^%s%I$O!"I,MW$K1~$8$F%[%9%H$N;~7W$r9g$o$;$k$?$a$K<jF0$GF0$+$7$?$j!"(B
+$B%V!<%H;~$K;~7W$r@_Dj$9$k$?$a$K5/F0;~%9%/%j%W%H(B
+$B$NCf$+$iF0$+$9$3$H$,$G$-$^$9!#(B
+$B$3$N$3$H$O(B NTP $B%G!<%b%s(B
+.Xr ntpd 8
+$B$r5/F0$9$kA0$K=i4|;~7W$r@_Dj$9$k>l9g$KJXMx$G$9!#(B
 .Nm
-from a
+$B$O(B
 .Xr cron 8
-script.
-However, it is important to note that
+$B%9%/%j%W%H$+$i5/F0$9$k$3$H$b2DG=$G$9!#(B
+$B$7$+$7!"(B
 .Nm
-with contrived cron scripts is no substitute for the NTP daemon,
-which uses sophisticated algorithms to maximize accuracy and reliability
-while minimizing resource use.
-Finally, since
-.Nm
-does not discipline the host clock frequency as does
-.Xr ntpd 8 ,
-the accuracy using
+$B$rMQ$$$?(B cron $B%9%/%j%W%H$r9)IW$7$F$b!"(B
+$B:G>.8B$N%j%=!<%9>CHq$G:GBg$N@53N$5$H?.Mj@-$rF@$k(B
+$B@vN}$5$l$?%"%k%4%j%:%`$rMQ$$$k!"(BNTP $B%G!<%b%s$NJQ$o$j$K$O$J$i$J$$$3$H$K(B
+$BCm0U$9$k$3$H$,=EMW$G$9!#(B
+$B:G8e$K!"(B
+.Nm
+$B$O(B
+.Xr ntpd 8
+$B$,$9$k$h$&$J%[%9%H$N%/%m%C%/<~GH?t$N3X=,$r$7$J$$$N$G!"(B
 .Nm
-is limited.
+$B$rMQ$$$k$3$H$K$h$k@53N$5$O8BDj$5$l$^$9!#(B
 .Pp
-Time adjustments are made by
 .Nm
-in one of two ways.  If
+$B$O(B 2 $B$D$NJ}K!$N$&$A$N(B 1 $B$D$G;~9o$ND4@0$r9T$$$^$9!#(B
 .Nm
-determines the clock is in error more than 0.5 second it will simply
-step the time by calling the system
+$B$O!";~7W$,(B 0.5 $BIC0J>e$:$l$F$$$k$HH=CG$9$k$H!"%7%9%F%`$N(B
 .Xr settimeofday 2
-routine.
-If the error is less than 0.5 seconds, it will slew the time
-by calling the system
+$B%k!<%A%s$r8F$V$3$H$GC1$K;~9o$r9g$o$;D>$7$^$9!#(B
+$B$7$+$7!"(B
+$B8m:9$,(B 0.5 $BIC0JFb$N$H$-$O!"%7%9%F%`$N(B
 .Xr adjtime 2
-routine.
-The latter technique is less disruptive and more
-accurate when the error is small, and works quite well when
+$B%k!<%A%s$r8F$V$3$H$G!";~9o$rHyD4@0$7$^$9!#(B
+$B8e<T$N%F%/%K%C%/$O!"8m:9$,>.$5$$$H$-$K$O!"$h$j3j$i$+$J>e$K@53N$G$"$j!"(B
 .Nm
-is run by
+$B$r(B
 .Xr cron 8
-every hour or two.
+$B$G(B 1 $B!A(B 2 $B;~4V$K0l2sF0$+$9$H$-$K$O!"$+$J$j$&$^$/F/$-$^$9!#(B
 .Pp
 .Nm
-will decline to set the date if an NTP server daemon
-(e.g.,
+$B$OF1$8%[%9%H$G(B HTP $B%5!<%P%G!<%b%s(B ($BNc$($P(B
 .Xr ntpd 8 )
-is running on the same host.
-When running
+$B$,F0$$$F$$$k>l9g$O!"F|IU$N@_Dj$r5qH]$7$^$9!#(B
+$B%G!<%b%s$r5/F0$9$kBe$o$j$K(B
 .Nm
-on a regular basis from
+$B$r(B
 .Xr cron 8
-as an alternative to running a daemon,
-doing so once every hour or two
-will result in precise enough timekeeping
-to avoid stepping the clock.
+$B$+$iDj4|E*$K(B
+.Nm
+$B$r8F$S=P$9>l9g$O!"(B
+1 $B!A(B 2 $B;~4V$K0l2s9T$J$&$H;~7W$N$:$l$rM^;_$9$k$N$K==J,$J(B
+$B@53N$J;~9o$rJ];}$G$-$^$9!#(B
 .Pp
-If NetInfo support is compiled into
-.Nm Ns ,
-then the server argument is optional if
 .Nm
-can find a time server in the NetInfo configuration for
-.Xr ntpd 8 .
+$B$,(B NetInfo $B%5%]!<%H$r4^$`7A$G%3%s%Q%$%k$5$l$F$$$?>l9g!"(B
+.Nm
+$B$,(B
+.Xr ntpd 8
+$BMQ$N(B NetInfo $B@_Dj$+$i;~9o%5!<%P$r8+$D$1$i$l$k>l9g$O(B
+$B%5!<%P0z?t$O%*%W%7%g%s$H$J$j$^$9!#(B
 .Pp
-The following options are available:
+$B0J2<$N%*%W%7%g%s$,;HMQ2DG=$G$9(B:
 .Bl -tag -width indent
 .It Fl a Ar key
-Enable the authentication function
-and specify the key identifier to be used
-for authentication as the argument
-.Ar key .
-The keys and key identifiers must match
-in both the client and server key files.
-The default is to disable the authentication function.
+$BG'>Z5!G=$rM-8z$K$7!"G'>Z$N%-!<<1JL;R$r(B
+.Ar key
+$B0z?t$K;XDj$7$^$9!#(B
+$B%-!<$H%-!<<1JL;R$O%/%i%$%"%s%H$H%5!<%PAPJ}$N%-!<%U%!%$%k$G(B
+$B9gCW$9$kI,MW$,$"$j$^$9!#(B
+$B%G%U%)%k%H$G$OG'>Z5!G=$OL58z$K$J$C$F$$$^$9!#(B
 .It Fl B
-Force the time to always be slewed using the
+$B7WB,$5$l$?%*%U%;%C%H$,!^(B 128 ms $B$h$jBg$-$/$F$b!"(B
+$B;~9o$r>o$K(B
 .Xr adjtime 2
-system call,
-even if the measured offset is greater than +-128 ms.
-The default is to step the time using
+$B%7%9%F%`%3!<%k$rMQ$$$FHyD4@0$9$k$h$&!"6/@)$7$^$9!#(B
+$B%G%U%)%k%H$G$O%*%U%;%C%H$,!^(B 128 ms $B$h$jBg$-$$>l9g$O!"(B
 .Xr settimeofday 2
-if the offset is greater than +-128 ms.
-Note that,
-if the offset is much greater than +-128 ms in this case,
-it can take a long time (hours)
-to slew the clock to the correct value.
-During this time,
-the host should not be used to synchronize clients.
+$B$rMQ$$$F$:$i$7$^$9!#(B
+$B%*%U%;%C%H$,!^(B 128 ms $B$h$jBg$-$$>l9g$O!"(B
+$B;~7W$r@5$7$$CM$KHyD4@0$G9g$o$;$k$N$KD9$$;~4V(B ($B?t;~4V(B) $B3]$+$k$3$H$,$"$k$3$H$K(B
+$BCm0U$7$F$/$@$5$$!#(B
+$B$3$N4V$O!"%[%9%H$O%/%i%$%"%s%H$rF14|$9$k$?$a$K;H$C$F$O$$$1$^$;$s!#(B
 .It Fl b
-Force the time to be stepped using the
-.Xr settimeofday 2
-system call,
-rather than slewed (default) using the
+($B%G%U%)%k%H$N(B)
 .Xr adjtime 2
-system call.
-This option should be used
-when called from a startup file at boot time.
+$B%7%9%F%`%3!<%k$rMQ$$$F;~9o$rHyD4@0$9$k$N$G$O$J$/!"(B
+.Xr settimeofday 2
+$B%7%9%F%`%3!<%k$rMQ$$$F;~9o$r9g$o$;$k$h$&!"6/@)$7$^$9!#(B
+$B$3$N%*%W%7%g%s$O%V!<%H;~$K5/F0%U%!%$%k$+$i8F$S=P$9$H$-$K$O;HMQ$9$k$Y$-$G$9!#(B
 .It Fl d
-Enable the debugging mode,
-in which
+$B%G%P%C%0%b!<%I$rM-8z$K$7$^$9!#(B
 .Nm
-will go through all the steps,
-but not adjust the local clock.
-Information useful for general debugging will also be printed.
+$B$OA4$F$N%9%F%C%W$r<B9T$7$^$9$,!"%m!<%+%k;~7W$r9g$o$;$k$3$H$O$7$^$;$s!#(B
+$B0lHLE*$J%G%P%C%0$KLrN)$D>pJs$bI=<($7$^$9!#(B
 .It Fl e Ar authdelay
-Specify the processing delay
-to perform an authentication function as the value
-.Ar authdelay ,
-in seconds and fraction
-(see
-.Xr ntpd 8
-for details).
-This number is usually small enough
-to be negligible for most purposes,
-though specifying a value
-may improve timekeeping on very slow CPU's.
+$BG'>Z5!G=$N=hM}$K3]$+$kCY$l$r(B
+.Ar authdelay
+$B$KCM$rIC?t(B ($B>.?t$b2D(B) $B$G;XDj$7$^$9(B
+($B>\:Y$O(B
+.Xr ntpd 8
+$B$r;2>H$7$F$/$@$5$$(B)$B!#(B
+$B$3$NCM$ODL>oB?$/$NMQES$G$OL5;k$7F@$k$[$I$o$:$+$G$9$,!"(B
+$BHs>o$KCY$$(B CPU $B$G$O$3$N?t$r;XDj$9$k$3$H$G!"(B
+$B;~4V$N@53N$5$,2~A1$5$l$k$+$b$7$l$^$;$s!#(B
 .It Fl k Ar keyfile
-Specify the path for the authentication key file
-as the string
-.Ar keyfile .
-The default is
-.Pa /etc/ntp.keys .
-This file should be in the format described in
-.Xr ntpd 8 .
+$BG'>Z%-!<$N%U%!%$%k$X$N%Q%9$rJ8;zNs$G(B
+.Ar keyfile
+$B$K;XDj$7$^$9!#(B
+$B%G%U%)%k%H$O(B
+.Pa /etc/ntp.keys
+$B$G$9!#(B
+$B$3$N%U%!%$%k$O(B
+.Xr ntpd 8
+$B$K5-=R$5$l$F$$$k7A<0$G=q$/I,MW$,$"$j$^$9!#(B
 .It Fl o Ar version
-Specify the NTP version for outgoing packets as the integer
-.Ar version ,
-which can be 1 or 2.
-The default is 3.
-This allows
+$B30$X=P$9%Q%1%C%H$N(B NTP $B%P!<%8%g%s$r(B
+.Ar version
+$B$K(B 1 $B$+(B 2 $B$N@0?t$G;XDj$7$^$9!#(B
+$B%G%U%)%k%H$O(B 3 $B$G$9!#(B
+$B$3$N%*%W%7%g%s$O(B
 .Nm
-to be used with older NTP versions.
+$B$r8E$$%P!<%8%g%s$N(B NTP $B$KBP$7$F;HMQ$G$-$k$h$&$K$7$^$9!#(B
 .It Fl p Ar samples
-Specify the number of samples to be acquired from each server
-as the integer
-.Ar samples ,
-with values from 1 to 8 inclusive.
-The default is 4.
+$B3F%5!<%P$+$iF@$k%5%s%W%k$N?t$r(B
+.Ar samples
+$B$K(B 1 $B$+$i(B 8 $B$^$G$N@0?t$G;XDj$7$^$9!#(B
+$B%G%U%)%k%H$O(B 4 $B$G$9!#(B
 .It Fl q
-Query only - don't set the clock.
+$BLd$$9g$o$;$r$9$k$@$1$G!";~7W$r@_Dj$7$^$;$s!#(B
 .It Fl s
-Divert logging output from the standard output (default)
-to the system
+($B%G%U%)%k%H$N(B) $BI8=`=PNO$G$O$J$/!"(B
 .Xr syslog 3
-facility.
-This is designed primarily for convenience of
+$B5!G=$r;HMQ$7$F%m%0=PNO$r9T$J$$$^$9!#(B
+$B$3$N5!G=$O<g$K(B
 .Xr cron 8
-scripts.
+$B%9%/%j%W%H$G$NMxJX@-$r9M$($F:n$i$l$^$7$?!#(B
 .It Fl t timeout
-Specify the maximum time waiting for a server response
-as the value
-.Ar timeout ,
-in seconds and fraction.
-The value is rounded to a multiple of 0.2 seconds.
-The default is 1 second,
-a value suitable for polling across a LAN.
+$B%5!<%P$N1~Ez$rBT$D:GBg;~4V$r(B
+.Ar timeout
+$B$KIC?t(B ($B>.?t$b2D(B) $B$G;XDj$7$^$9!#(B
+$BCM$O(B 0.2 $BIC$NG\?t$K4]$a$i$l$^$9!#(B
+$B%G%U%)%k%H$O(B 1 $BIC$G!"$3$l$O(B LAN $B$rDL$8$FD4$Y$k$N$KE,Ev$JCM$G$9!#(B
 .It Fl u
-Direct
 .Nm
-to use an unprivileged port for outgoing packets.
-This is most useful when behind a firewall
-that blocks incoming traffic to privileged ports,
-and you want to synchronise with hosts beyond the firewall.
-Note that the
+$B$,30$X=P$9%Q%1%C%H$rHsFC8"%]!<%H$+$i=P$9$h$&$KL?Na$7$^$9!#(B
+$B$3$N5!G=$OKI2PJI$,30$+$iMh$?FC8"%]!<%H$X$N%H%i%U%#%C%/$r(B
+$B%V%m%C%/$7$F$$$k>l9g$K!"KI2PJI$r1[$($?8~$3$&$N%[%9%H$HF14|$9$k:]$K(B
+$B:G$bJXMx$G$9!#(B
 .Fl d
-option always uses unprivileged ports.
+$B%*%W%7%g%s$O>o$KHsFC8"%]!<%H$r;HMQ$9$k$3$H$KCm0U$7$F$/$@$5$$!#(B
 .It Fl v
-Be verbose.
-This option will cause
-.Nm Ns 's
-version identification string to be logged.
+$B>iD9$K$J$j$^$9!#(B
+$B$3$N%*%W%7%g%s$O(B
+.Nm
+$B$N%P!<%8%g%s<1JLJ8;zNs$r%m%0$9$k$h$&$K$J$j$^$9!#(B
 .El
-.Sh FILES
+.Sh $B4XO"%U%!%$%k(B
 .Bl -tag -width /etc/ntp.keys -compact
 .It Pa /etc/ntp.keys
-contains the encryption keys used by
-.Nm Ns .
+.Nm
+$B$G;H$o$l$k0E9f%-!<$r4^$_$^$9!#(B
 .El
-.Sh SEE ALSO
+.Sh $B4XO"9`L\(B
 .Xr ntpd 8
-.Sh HISTORY
-Written by
+.Sh $BNr;K(B
+Toronto $BBg3X$N(B 
 .An Dennis Ferguson
-at the University of Toronto
-.Sh BUGS
-The slew adjustment is actually 50% larger than the measured offset,
-since this (it is argued)
-will tend to keep a badly drifting clock more accurate.
-This is probably not a good idea
-and may cause a troubling hunt
-for some values of the kernel variables
+$B$K$h$C$F=q$+$l$^$7$?!#(B
+.Sh $B%P%0(B
+$BHyD4@0$K$h$kD4@0$O!"<B:]$K$O!"7WB,$5$l$?$:$l$h$j$b(B 50% $BBg$-$/$J$j$^$9!#(B
+$B$3$l$O!"$R$I$/%U%i%U%i$9$k;~7W$r$h$j@53N$KJ];}$9$k$N$KLrN)$D$+$i$G$9(B
+($B$H<gD%$5$l$F$$$^$9(B)$B!#(B
+$B$3$N$3$H$ONI$$9M$($G$O$J$$$+$b$7$l$:!"%+!<%M%kJQ?t(B
 .Va tick
-and
-.Va tickadj .
+$B$H(B
+.Va tickadj
+$B$NCM$r$*$+$7$/$9$k$+$b$7$l$^$;$s!#(B

--------------BA6F0746CAC5EAC3DDF16E61
Content-Type: text/plain; charset=iso-2022-jp;
 name="ntpdc.8.diff"
Content-Transfer-Encoding: 8bit
Content-Disposition: inline;
 filename="ntpdc.8.diff"

--- ntpdc.8.orig	Tue Feb 15 22:52:17 2000
+++ ntpdc.8	Tue Apr 11 10:41:33 2000
@@ -3,456 +3,386 @@
 .\"
 .Dd January 7, 2000
 .\" jpman %Id: ntpdc.8,v 0.0 2000/02/06 08:09:52 horikawa Stab %
+.\" WORD: local clock	$B%m!<%+%k;~7W(B
+.\" WORD: request	$B%j%/%(%9%H(B ($BL>;l$N>l9g(B)
+.\" WORD: common key	$B6&DL80(B
+.\" WORD: key identifier	$B%-!<<1JL;R(B
+.\" WORD: The following options are available:
+.\" WORD:     $B0J2<$N%*%W%7%g%s$,;HMQ2DG=$G$9(B:
+.\" WORD: peer		peer
+.\" WORD: falsetick	$B56;~7W(B
+.\" WORD: the precision time kernel modifications are in use
+.\" WORD:     $B%+!<%M%k$K9b@:EY$J;~9oJ];}$N$?$a$NJQ99$,$J$5$l$F$$$k(B
+.\" WORD: discipline	$B5,N'(B
+.\" WORD: association	$BL5M}$KLu$5$J$+$C$?(B (ntpq.8 $B$H$OIT@09g(B)
 .Dt NTPDC 8
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm ntpdc
-.Nd special NTP query program
-.Sh SYNOPSIS
+.Nd NTP $B$N(B $BFCJL$JLd$$9g$o$;%W%m%0%i%`(B
+.Sh $B=q<0(B
 .Nm ntpdc
 .Op Fl ilnps
 .Op Fl c Ar command
 .Op Ar host ...
-.Sh DESCRIPTION
+.Sh $B2r@b(B
 .Nm
-is used to query the
+$B$O(B
 .Xr ntpd 8
-daemon about its current state and to request changes in that state.
-The program may be run either in interactive mode or controlled using
-command line arguments.
-Extensive state and statistics information is
-available through the
-.Nm
-interface.
-In addition, nearly all the configuration options which can
-be specified at start up using
-.Xr ntpd 8 Ns 's
-configuration file may also be specified at run time using
-.Nm Ns .
+$B%G!<%b%s$N8=:_$N>uBV$K$D$$$F$NLd$$9g$o$;$d!">uBV$NJQ99$rMW5a$9$k:]$K;H(B
+$B$o$l$^$9!#$3$N%W%m%0%i%`$O!"BPOCE*$J%b!<%I$G$b%3%^%s%I%i%$%s0z?t$r(B
+$B;H$C$?@)8f$G$bF0:n$5$;$k$3$H$,$G$-$^$9!#(B
+$B9-HO0O$K$o$?$k>uBV$dE}7W$N>pJs$,!"(B
+.Nm
+$B$N%$%s%?%U%'!<%9$rDL$8$FDs6!$5$l$F$$$^$9!#(B
+$B$=$l$K2C$($F!"(B
+.Xr ntpd 8
+$B$N@_Dj%U%!%$%k$r;H$C$F5/F0;~$K;XDj$G$-$k$[$H$s$I$9$Y$F(B
+$B$N%*%W%7%g%s$,!"(B
+.Nm
+$B$r;H$C$F!"<B9T;~$K$b;XDj$G$-$^$9!#(B
 .Pp
-If one or more request options is included on the command line when
 .Nm
-is executed, each of the requests will be sent to the NTP servers
-running on each of the hosts given as command line arguments, or on
+$B$,<B9T$5$l$?$H$-!"(B1 $B$D0J>e$N%j%/%(%9%H%*%W%7%g%s$,!"(B
+$B%3%^%s%I%i%$%s$K4^$^$l$k>l9g$O!"$=$l$>$l$N%j%/%(%9%H$O!"%3%^%s%I%i%$%s(B
+$B0z?t$GM?$($i$l$k%[%9%H!"$^$?$O%G%U%)%k%H$G$"$k(B
 .Dq localhost
-by default.
-If no request options are given,
+$B$GF0$$$F$$$k(B NTP $B%5!<%P$KAw$i$l$^$9!#(B
+$B%j%/%(%9%H%*%W%7%g%s$,M?$($i$l$J$+$C$?>l9g!"(B
 .Nm
-will attempt to read commands from the standard input and execute these
-on the NTP server running on the first host given on the command line,
-again defaulting to
+$B$O!"%3%^%s%I$rI8=`F~NO$+$iFI$_9~$_!"(B
+$B%3%^%s%I%i%$%s$G;XDj$5$l$?:G=i$N%[%9%H$GF0$$$F$$$k(B
+NTP $B%5!<%P$KBP$7$F<B9T$7$h$&$H$7$^$9!#(B
+$B$3$N$H$-$b!"(B
+$B%[%9%H$,;XDj$5$l$F$$$J$$$H$-$O!"%G%U%)%k%H$G(B
 .Dq localhost
-when no other host is specified.
+$B$K$J$j$^$9!#(B
 .Nm
-will prompt for commands if the standard input is a terminal device.
+$B$O!"I8=`F~NO$,C<Kv$G$"$k>l9g$@$1!"%W%m%s%W%H$r=P$7$F%3%^%s%I$r<u$1IU$1$^$9!#(B
 .Pp
 .Nm
-uses NTP mode 7 packets to communicate with the NTP server,
-and hence can be used to query any compatible server on the network
-which permits it.
-Note that since NTP is a UDP protocol
-this communication will be
-somewhat unreliable, especially over large distances in terms of network
-topology.
+$B$O!"(BNTP $B%5!<%P$H$NDL?.$K(B NTP $B%b!<%I(B 7 $B%Q%1%C%H$r;H$&$?$a!"(B
+$B%M%C%H%o!<%/>e$G$=$l$r5v$9$h$&$J8_49%5!<%P$X$NLd$$9g$o$;$K;HMQ$G$-$^$9!#(B
+NTP $B$O(B UDP $B$N%W%m%H%3%k$J$N$G!"FC$K%M%C%H%o!<%/%H%]%m%8E*$K(B
+$B1s$/$K$"$k>l9g$O!"$3$NDL?.$O$d$d?.Mj@-$K7g$1$k$H$$$&$3$H$KCm0U$7$F(B
+$B$/$@$5$$!#(B
 .Nm
-makes no attempt to retransmit requests, and will time requests out if
-the remote host is not heard from within a suitable timeout time.
+$B$O!"%j%/%(%9%H$r:FAw$9$k;n$_$r9T$J$$$^$;$s!#E,Ev$J@)8B;~4V$N(B
+$BHO0OFb$G%j%b!<%H%[%9%H$+$iJVEz$,$J$+$C$?$H$-$O!";~4V@Z$l$H$J$j$^$9!#(B
 .Pp
-The operation of
 .Nm
-is specific to the particular implementation of the
+$B$NA`:n$O(B
 .Xr ntpd 8
-daemon and can be expected to work only with this
-and maybe some previous versions of the daemon.
-Requests from a remote
-.Nm
-program which affect the state of the local server
-must be authenticated,
-which requires both the remote program
-and local server
-share a common key and key identifier.
+$B$KFCM-$J<BAu$KFC2=$7$F$*$j!"$3$N%G!<%b%s$d$$$/$D$+$N8E$$%P!<%8%g%s$N$b$N(B
+$B$XBP$7$F$7$+F0$+$J$$$+$b$7$l$^$;$s!#(B
+$B%j%b!<%H$N(B
+.Nm
+$B$+$i$N%j%/%(%9%H$,%m!<%+%k%5!<%P$N>uBV$rJQ99$9$k>l9g$O!"(B
+$B%j%b!<%H%W%m%0%i%`$H%m!<%+%k%5!<%P$NN>J}$,6&DL80$H%-!<<1JL;R$r6&M-$7!"(B
+$B$=$l$,G'>Z$5$l$kI,MW$,$"$j$^$9!#(B
 .Pp
-Specifying a command line option other than
 .Fl i
-or
+$B$^$?$O(B
 .Fl n
-will cause the specified query (queries)
-to be sent to the indicated host(s) immediately.
-Otherwise,
-.Nm
-will attempt to read interactive format commands from the standard
-input.
-The following options are available:
+$B0J30$N%3%^%s%I%i%$%s%*%W%7%g%s$r;XDj$9$k$H!";XDj$7$?%[%9%H(B ($B72(B) $B$K!"(B
+$B;XDj$7$?Ld$$9g$o$;(B ($B$^$?$OJ#?t$NLd$$9g$o$;(B) $B$rD>$A$KAw$k$3$H$K$J$j$^$9!#(B
+$B;XDj$7$J$+$C$?>l9g!"(B
+.Nm
+$B$OI8=`F~NO$+$iBPOCE*$J%U%)!<%^%C%H$N%3%^%s%I$rFI$_9~$b$&$H$7$^$9!#(B
+$B0J2<$N%*%W%7%g%s$,;HMQ2DG=$G$9(B:
 .Bl -tag -width indent
 .It Fl c Ar command
-The
 .Ar command
-argument is interpreted as an interactive format command
-and is added to the list of commands to be executed on the specified
-host(s).
-Multiple
+$B0z?t$,BPOCE*$J%U%)!<%^%C%H$N%3%^%s%I$H$7$F2r<a$5$l!"(B
+$B;XDj$5$l$?%[%9%H(B ($B72(B) $B$KBP$7$F<B9T$9$Y$-%3%^%s%I$N%j%9%H$K(B
+$BIU$12C$($i$l$^$9!#(B
+$BJ#?t$N(B
 .Fl c
-options may be given.
+$B%*%W%7%g%s$rM?$($k$3$H$b$G$-$^$9!#(B
 .It Fl i
-Force
 .Nm
-to operate in interactive mode.
-Prompts will be written to the standard
-output and commands read from the standard input.
+$B$r6/@)E*$KBPOCE*%b!<%I$GF0:n$5$;$^$9!#I8=`=PNO$K%W%m%s%W%H$,(B
+$BI=<($5$l!"I8=`F~NO$+$i%3%^%s%I$,FI$_9~$^$l$^$9!#(B
 .It Fl l
-Obtain a list of peers which are known to the server(s).
-This switch is equivalent to
-.Dq Li -c listpeers .
+$B%5!<%P$K4{CN$J(B peer $B$N%j%9%H$r<hF@$7$^$9!#$3$N%9%$%C%A$O!"(B
+.Dq Li -c listpeers
+$B$HF1Ey$G$9!#(B
 .It Fl n
-Output all host addresses in dotted-quad numeric format rather than
-converting to the canonical host names.
+$B$9$Y$F$N%[%9%H%"%I%l%9$r?t;z(B 4 $B$D$rE@$G6h@Z$C$?7A<0$G=PNO$7!"(B
+$B@55,$N%[%9%HL>$KJQ49$7$^$;$s!#(B
 .It Fl p
-Print a list of the peers known to the server as well as a summary of
-their state.
-This is equivalent to
-.Dq Li -c peers .
+$B%5!<%P$K4{CN$J(B peer $B$N%j%9%H$H!"$=$l$i$N>uBV$N35MW$r=PNO$7$^$9!#(B
+$B$3$l$O!"(B
+.Dq Li -c peers
+$B$HF1Ey$G$9!#(B
 .It Fl s
-Print a list of the peers known to the server as well as a summary of
-their state, but in a slightly different format than the
+$B%5!<%P$K4{CN$J(B peer $B$N%j%9%H$H!"$=$l$i$N>uBV$N35MW$r!"(B
 .Fl p
-switch.
-This is equivalent to
-.Dq Li -c dmpeers .
+$B%9%$%C%A$H$O>/$70[$J$k%U%)!<%^%C%H$G=PNO$7$^$9!#(B
+$B$3$l$O(B
+.Dq Li -c dmpeers
+$B$HF1Ey$G$9!#(B
 .El
-.Ss Interactive Commands
-Interactive format commands consist of a keyword followed by zero to
-four arguments.
-Only enough characters of the full keyword to uniquely
-identify the command need be typed.
-The output of a command is normally
-sent to the standard output, but optionally the output of individual
-commands may be sent to a file by appending a
-.Qq > ,
-followed by a
-file name, to the command line.
+.Ss $BBPOCE*%3%^%s%I(B
+$BBPOCE*$J%U%)!<%^%C%H$N%3%^%s%I$O!"%-!<%o!<%I$H$=$l$KB3$/(B 0 $B$+$i(B 4 $B8D$N(B
+$B0z?t$+$i9=@.$5$l$^$9!#%-!<%o!<%IA4D9$N$&$A!"B>$H6hJL$G$-$kJ8;z?t$,(B
+$B%?%$%W$5$l$l$P!"M-8z$K$J$j$^$9!#(B
+$B%3%^%s%I$N=PNO$ODL>oI8=`=PNO$KAw$i$l$^$9$,!"%3%^%s%I%i%$%s>e$G(B
+.Qq >
+$B$KB3$1$F%U%!%$%kL>$r;XDj$9$k$3$H$G!"8D!9$N%3%^%s%I$N=PNO$r(B
+$B%U%!%$%k$KAw$k$3$H$,$G$-$^$9!#(B
 .Pp
-A number of interactive format commands are executed entirely within the
+$B$$$/$D$+$NBPOCE*%U%)!<%^%C%H$N%3%^%s%I$O!"(B
 .Nm
-program itself and do not result in
-NTP mode 7 requests being sent to a server.
-These are described following:
+$B%W%m%0%i%`<+?H$NCf$GA4BN$,<B9T$5$l!"%5!<%P$X$N(B NTP $B%b!<%I(B 7 $B%j%/%(%9%H$O(B
+$BAw$i$l$^$;$s!#$3$N<oN`$N%3%^%s%I$K$O0J2<$N$b$N$,$"$j$^$9(B:
 .Bl -tag -width indent
 .It Ic ? Op Ar command_keyword
 .It Ic help Op Ar command_keyword
-A
+$BC1FH$N(B
 .Ic ?
-by itself will print a list of all the command keywords
-known to this incarnation of
-.Nm Ns .
-A
+$B$O!"(B
+.Nm
+$B$,CN$C$F$$$k$9$Y$F$N%3%^%s%I%-!<%o!<%I$N%j%9%H$r=PNO(B$B$7$^$9!#(B
 .Ic ?
-followed by a command keyword will print function and
-usage information about the command.
-This command is probably a better
-source of information about
+$B$N8e$K%3%^%s%I%-!<%o!<%I$,B3$/$H$-$O!"%3%^%s%I$N5!G=$HMQK!$r=PNO$7$^$9!#$3$N(B
+$B%3%^%s%I$O!"(B
 .Nm
-than this manual page.
+$B$K4X$7$F!"B?J,$3$N%^%K%e%"%k$h$j$bNI$$>pJs8;$H$J$k$G$7$g$&!#(B
 .It Ic delay Ar milliseconds
-Specify a time interval to be added to timestamps included in requests
-which require authentication.
-This is used to enable (unreliable) server
-reconfiguration over long delay network paths or between machines whose
-clocks are unsynchronized.
-Actually the server does not now require
-timestamps in authenticated requests,
-so this command may be obsolete.
+$BG'>Z$r5a$a$k%j%/%(%9%H$K4^$^$l$k%?%$%`%9%?%s%W$K2C$($i$l$k;~4V4V3V$r(B
+$B;XDj$7$^$9!#$3$l$O!"D9$$CY1d$N$"$k%M%C%H%o!<%/7PO)$d;~7W$NF14|$7$F$$$J$$(B
+$B%^%7%s4V$G(B ($B?.Mj$G$-$J$$(B) $B%5!<%P$N:F@_Dj$,$G$-$k$h$&$K$9$k$?$a$K(B
+$B;H$o$l$^$9!#(B
+$B<B:]$K$O$b$&%5!<%P$OG'>Z%j%/%(%9%H$K$*$$$F%?%$%`%9%?%s%W$rMW5a$7$^$;$s$N$G!"(B
+$B$3$N%3%^%s%I$O$b$O$dMQ$$$i$l$J$$$+$b$7$l$^$;$s!#(B
 .It Ic host Ar hostname
-Set the host to which future queries will be sent.
-The
+$B:#8eLd$$9g$o$;$rAw$k%[%9%H$r;XDj$7$^$9!#(B
+$BM?$($k(B
 .Ar hostname
-supplied
-may be either a host name or a numeric
-address.
+$B$O!"%[%9%HL>$G$b?tCM%"%I%l%9$G$b$+$^$$$^$;$s!#(B
 .It Ic hostnames Ar yes | Ar no
-If
 .Ar yes
-is specified, host names are printed in information
-displays.
-If
+$B$,;XDj$5$l$k$H!">pJs$NI=<($N:]!"%[%9%HL>$,;HMQ$5$l$^$9!#(B
 .Ar no
-is given, numeric addresses are printed
-instead.
-The default is
-.Ar yes
-unless modified using the command line
+$B$,M?$($i$l$k$H!"Be$o$j$K?tCM%"%I%l%9$,;HMQ$5$l$^$9!#(B
+$B%3%^%s%I%i%$%s$N(B
 .Fl n
-switch.
+$B%9%$%C%A$K$h$C$FJQ$($i$l$F$$$J$1$l$P!"(B
+$B%G%U%)%k%H$O(B
+.Ar yes
+$B$K$J$j$^$9!#(B
 .It Ic keyid Ar keyid
-This command allows the specification of a key number to be used to
-authenticate configuration requests.
-This must correspond to a key
-number the server has been configured to use for this purpose.
+$B$3$N%3%^%s%I$G!"G'>Z@_Dj%j%/%(%9%H$K;H$o$l$k%-!<HV9f$r;XDj$G$-$^$9!#(B
+$B$3$NHV9f$O!"$3$NL\E*$G;H$&$?$a$K%5!<%P$,@_Dj$7$?%-!<HV9f$KBP1~$7$F(B
+$B$$$J$1$l$P$J$j$^$;$s!#(B
 .It Ic quit
-Exit
-.Nm Ns .
+.Nm
+$B$r=*N;$7$^$9!#(B
 .It Ic passwd
-This command prompts you to type in a password (which will not be
-echoed) which will be used to authenticate configuration requests.
-The
-password must correspond to the key configured for use by the NTP server
-for this purpose if such requests are to be successful.
+$B$3$N%3%^%s%I$O!"G'>Z@_Dj%j%/%(%9%H$K;H$o$l$k%Q%9%o!<%I$NF~NO(B
+($B2hLL$KI=<($5$l$^$;$s(B) $B$r5a$a$k%W%m%s%W%H$r=P$7$^$9!#(B
+$B$3$N%j%/%(%9%H$,@.8y$9$k$?$a$K$O!"(BNTP $B%5!<%P$,G'>Z$N$?$a$K;H$&$h$&(B
+$B@_Dj$7$?%-!<$K!"%Q%9%o!<%I$,BP1~$7$F$$$J$1$l$P$J$j$^$;$s!#(B
 .It Ic timeout Ar milliseconds
-Specify a timeout period for responses to server queries.
-The default
-is about 5000 milliseconds.
-Note that since
+$B%5!<%P$X$NLd$$9g$o$;$KBP$9$k1~Ez$N@)8B;~4V$r;XDj$7$^$9!#%G%U%)%k%H(B
+$B$O!"Ls(B 5000 $B%_%jIC$G$9!#(B
 .Nm
-retries each query once after a timeout, the total waiting time for a
-timeout will be twice the timeout value set.
+$B$O$=$l$>$l$NLd$$9g$o$;$KBP$7$F;~4V@Z$l$rBT$C$?$"$H:F;n9T$9$k$?$a!"(B
+$B9g7W$NBT$A;~4V$O@_Dj$5$l$?@)8B;~4V$NCM$N(B 2 $BG\$K$J$k$3$H$KCm0U$7$F$/$@$5$$!#(B
+.\" XXX retry $B$7$J$$$s$8$c$J$+$C$?$N!)(B
 .El
-.Ss Control Message Commands
-Query commands result in
-NTP mode 7 packets containing requests for
-information being sent to the server.
-These are
-.Qq read-only
-commands in that they make no modification of the server configuration
-state.
+.Ss $B@)8f%a%C%;!<%8%3%^%s%I(B
+$BLd$$9g$o$;%3%^%s%I$O!">pJs$rMW5a$9$k(B NTP $B%b!<%I(B 7 $B%Q%1%C%H$r%5!<%P$KAw$j$^$9!#(B
+$B$3$l$i$O!"%5!<%P$N@_Dj>uBV$rJQ99$7$J$$(B
+.Qq $BFI$_9~$_@lMQ(B
+$B%3%^%s%I$G$9!#(B
 .Bl -tag -width indent
 .It Ic listpeers
-Obtain and print a brief list of the peers for which the server is
-maintaining state.
-These should include all configured peer associations
-as well as those peers whose stratum is such that they are considered by
-the server to be possible future synchronization candidates.
+$B%5!<%P$,(B$B>uBV$r4IM}$9$k(B peer $B$N4JN,$J%j%9%H$rF@$F!"=PNO$7$^$9!#(B
+$B$3$l$K$O!"%5!<%P$,F14|$9$kM=Dj$N8uJd$G$"$k$H$_$J$93,AX$N(B peer $B$r4^$a$?!"(B
+$B$9$Y$F$N@_Dj$5$l$?(B peer $B$r4^$s$G$$$k$O$:$G$9!#(B
 .It Ic peers
-Obtain a list of peers for which the server is maintaining state, along
-with a summary of that state.
-Summary information includes the address
-of the remote peer, the local interface address (0.0.0.0 if a local
-address has yet to be determined), the stratum of the remote peer (a
-stratum of 16 indicates the remote peer is unsynchronized), the polling
-interval, in seconds, the reachability register, in octal, and the
-current estimated delay, offset and dispersion of the peer, all in
-seconds.
-In addition, the character in the left margin indicates the
-mode this peer entry is operating in.
-A
+$B%5!<%P$,>uBV$r4IM}$9$k(B peer $B$H!"$=$N>uBV$N35MW$r=PNO$7$^$9!#(B
+$B>uBV$N35MW$O!"0J2<$N$b$N$r4^$_$^$9!#$9$J$o$A!"%j%b!<%H(B peer $B$N%"%I%l%9!"(B
+$B%m!<%+%k%$%s%?%U%'!<%9%"%I%l%9(B ($B%m!<%+%k%"%I%l%9$,7h$^$C$F$$$J$$$J$i(B 
+0.0.0.0) $B!"%j%b!<%H(B peer $B$N3,AX(B ($B3,AX(B 16 $B$O!"%j%b!<%H$N(B peer $B$,F14|$7$F$$$J$$(B
+$B;v$r<($7$^$9(B)$B!"IC$GI=$9%]!<%j%s%04V3V!"(B8 $B?J$GI=$9E~C#2DG=@-%l%8%9%?!"(B
+peer $B$NCY$l!"%*%U%;%C%H!"$P$i$D$-$NIC$GI=$7$?8=:_$N?dDjCM$G$9!#(B
+$B99$K!":8C<$NJ8;z$O!"$3$N(B peer $B%(%s%H%j$,A`:n$7$F$$$k%b!<%I$r(B
+$B<($7$^$9!#(B
 .Qq +
-denotes symmetric
-active, a
+$B$O(B symmetric active $B$r!"(B
 .Qq -
-indicates symmetric passive, a
+$B$O(B symmetric passive $B$rI=$7!"(B
 .Qq =
-means
-the remote server is being polled in client mode, a
+$B$O!"%j%b!<%H%5!<%P$,%/%i%$%"%s%H%b!<%I$G%]!<%j%s%0$5$l$F$$$k$3$H$r0UL#$7!"(B
 .Qq ^
-indicates that the server is broadcasting to this address, a
+$B$O!"%5!<%P$,$3$N%"%I%l%9$K%V%m!<%I%-%c%9%H%V%m!<%I%-%c%9%H$7$F$$$k$3$H$r<($7!"(B
 .Qq ~
-denotes that the remote peer is sending broadcasts and a
+$B$O!"%j%b!<%H(B peer $B$,%V%m!<%I%-%c%9%H$rAw$C$F$$$k$3$H$r<($7!"(B
 .Qq *
-marks the peer the server is currently synchronizing to.
+$B$O!"%5!<%P$,8=:_F14|$7$F$$$k(B peer $B$G$"$k$3$H$r<($7$^$9!#(B
 .Pp
-The contents of the host field may be one of four forms.
-It may be a
-host name, an IP address, a reference clock implementation name with its
-parameter or
-.Dq Li REFCLK(<implementation number>, <parameter>) .
-On hostnames no
-only IP addresses will be displayed.
+$B%[%9%H%U%#!<%k%I$NFbMF$O!"%[%9%HL>!"(BIP $B%"%I%l%9!"%Q%i%a!<%?$H;2>H;~7W<BAuL>!"(B
+.Dq Li REFCLK(<implementation number>, <parameter>)
+$B$N(B 4 $B$D$N7A$N$&$A(B 1 $B$D$G$9!#(B
+.Qq hostnames no
+$B$N>uBV$G$O!"(BIP $B%"%I%l%9$@$1$,I=<($5$l$^$9!#(B
 .It Ic dmpeers
-A slightly different peer summary list.
-Identical to the output of the
+$B>/!90[$J$k(B peer $B35MW%j%9%H$G$9!#(B
+$B9T$N:8C<$NJ8;z0J30$O(B
 .Em peers
-command except for the character in the leftmost column.
-Characters only
-appear beside peers which were included in the final stage of the clock
-selection algorithm.
-A
+$B$HF1$8=PNO$K$J$j$^$9!#(B
+$BJ8;z$O!";~7WA*Br%"%k%4%j%:%`$N:G8e$N%9%F!<%8$K4^$^$l$k(B peer $B$NNY$K$@$1(B
+$B8=$l$^$9!#(B
 .Qq \&.
-indicates that this peer was cast off
-in the falseticker detection, while a
+$B$O!"56;~7W8!=P$G$3$N(B peer $B$,<N$F$i$l$?$3$H$r!"(B
 .Qq +
-indicates that the
-peer made it through.
-A
+$B$O8!=P$K$h$jF14|BP>]$H$7$FE,@Z$G$"$k$HH=CG$5$l$?$3$H$r<($7$^$9!#(B
 .Qq *
-denotes the peer the server is
-currently synchronizing with.
+$B$O!"(Bpeer $B$G$"$k%5!<%P$O8=:_F14|$7$F$$$k%5!<%P$G$"$k$3$H$r<($7$F$$$^$9!#(B
 .It Xo Ic showpeer
 .Ar peer_address
 .Op Ar ...
 .Xc
-Show a detailed display of the current peer variables for one or more
-peers.
-Most of these values are described in the
-NTP Version 2 specification.
+1 $B$D0J>e$N(B peer $B$KBP$7$F!"8=:_$N(B peer $B$NJQ?t$K4X$9$k>\:Y$JFbMF$rI=<($7$^$9!#(B
+$BCM$NB?$/$K4X$7$F$O!"(BNTP $B%P!<%8%g%s(B 2 $B;EMM=q$K>\$7$/=R$Y$i$l$F$$$^$9!#(B
 .It Xo Ic pstats
 .Ar peer_address
 .Op Ar ...
 .Xc
-Show per-peer statistic counters associated with the specified peer(s).
+$B;XDj$7$?(B peer $B$K4XO"$9$kE}7W%+%&%s%?$r(B peer $BKh$KI=<($7$^$9!#(B
 .It Xo Ic clockinfo
 .Ar clock_peer_address
 .Op Ar ...
 .Xc
-Obtain and print information concerning a peer clock.
-The values
-obtained provide information on the setting of fudge factors and other
-clock performance information.
+peer $B$N;~7W$K4X(B$B$9$k>pJs$rF@$F!"$=$l$rI=<($7$^$9!#F@$i$l$?CM$O!"(B
+$B@_Dj>e$N$"$$$^$$$JMW0x$N>pJs$HB>$N;~7W@-G=$N>pJs$r(B
+$BDs6!$7$F$/$l$^$9!#(B
 .It Ic kerninfo
-Obtain and print kernel phase-lock loop operating parameters.
-This information is available
-only if the kernel has been specially modified
-for a precision timekeeping function.
+$B%+!<%M%k$N%U%'!<%:%m%C%/%k!<%WA`:n%Q%i%a!<%?$rF@$F!"$=$l$rI=<($7$^$9!#(B
+$B$3$N>pJs$O!"@:EY$N9b$$;~9oJ];}5!G=$N$?$a$K!"%+!<%M%k$,FC$K(B
+$B=$@5$5$l$F$$$k>l9g$K$@$1F@$i$l$^$9!#(B
 .It Ic loopinfo Op Ar oneline | Ar multiline
-Print the values of selected loop filter variables.
-The loop filter is
-the part of
-NTP which deals with adjusting the local system clock.
-The
+$BA*Br$5$l$?%k!<%W%U%#%k%?JQ?t$NCM$rI=<($7$^$9!#%k!<%W%U%#%k%?$H$O!"(B
+$B%m!<%+%k%7%9%F%`;~7W$ND4@a$r9T$J$&(B NTP $B$N0lIt$G$9!#(B 
 .Qq offset
-is the last offset given to the loop filter by the
-packet processing code.
-The
+$B$O!"%Q%1%C%H=hM}%3!<%I$K$h$C$F%k!<%W%U%#%k%?$KM?$($i$l$?:G8e$N%*%U%;%C%H$G$9!#(B
 .Qq frequency
-is the frequency error
-of the local clock in parts-per-million (ppm).
-The
+$B$O!"(B100 $BK|J,$N(B 1 (ppm) $B$GI=$o$5$l$k%m!<%+%k;~7W$N<~GH?t8m:9$G$9!#(B
 .Qq time_const
-controls the
-.Qq stiffness
-of the phase-lock loop and thus the speed at
-which it can adapt to oscillator drift.
-The
+$B$O!"%U%'!<%:%m%C%/%k!<%W$N(B
+.Qq $B7x8G$5(B (stiffness)
+$B$r@)8f$7!"$=$NB.EY$GH/?64o$N$f$i$.$rD4@a$7$^$9!#(B
 .Qq watchdog timer
-value is the number of seconds which have elapsed since the last sample
-offset was given to the loop filter.
-The
+$B$NCM$O!"%k!<%W%U%#%k%?$K:G8e$N%5%s%W%k$N%*%U%;%C%H$,M?$($i$l$F$+$i(B
+$B7P2a$7$?IC?t$G$9!#(B
 .Ar oneline
-and
+$B$H(B
 .Ar multiline
-options specify the format in which this information
-is to be printed, with
+$B%*%W%7%g%s$O$3$N>pJs$,(B
+$B=PNO$5$l$k%U%)!<%^%C%H$N;XDj$G!"(B
 .Ar multiline
-as the default.
+ $B$,%G%U%)%k%H$G$9!#(B
 .It Ic sysinfo
-Print a variety of system state variables, i.e. state related to the
-local server.
-All except the last four lines are described in the
-NTP Version 3 specification, RFC 1305.
-The
+$B%7%9%F%`>uBVJQ?t!"$9$J$o$A!"%m!<%+%k%5!<%P$K4X$9$k$5$^$6$^$J>uBV$rI=<($7$^$9!#(B
+$B:G8e$N(B 4 $B9T0J30$O!"3'(B NTP $B%P!<%8%g%s(B 3 $B;EMM$G$"$k(B RFC 1305 $B$G=R$Y$i$l$F$$$^$9!#(B
 .Qq system flags
-show various system flags, some of which can be set and cleared by the
+$B$O!"$$$m$$$m$J%7%9%F%`%U%i%0$rI=<($7!"0lIt$O(B
 .Ic enable
-and
+$B5Z$S(B
 .Ic disable
-configuration commands,
-respectively.
-These are the auth, bclient, monitor, pll, pps and stats flags,
-as described below under the
-.Ic enable
-command in the
+$B@_Dj%3%^%s%I$G!"$=$l$>$l$N@_Dj$d%/%j%"$,$G$-$^$9!#(B
+$B$=$l$i$N%U%i%0$O(B auth, bclient, monitor, pll, pps, stats $B$G!"(B
+$B8e=R$9$k(B
 .Sx Runtime Configuration Requests
-section.
-There are two additional flags which are read only,
-the kernel_pll and kernel_pps.
-These flags indicate the synchronization status
-when the precision time kernel modifications are in use.
-The kernel_pll indicates
-that the local clock is being disciplined by the kernel,
-while the kernel_pps indicates
-the kernel discipline is provided by the PPS signal.
+$B@a$N(B
+.Ic enable
+$B%3%^%s%I$K$F@bL@$5$l$F$$$^$9!#(B
+$B$=$NB>$K(B kernel_pll $B$H(B kernel_pps $B$H$$$&(B
+$BFI$_9~$_@lMQ$N%U%i%0$,(B 2 $B$D$"$j$^$9!#(B
+$B%+!<%M%k$K9b@:EY$J;~9oJ];}$N$?$a$NJQ99$,$J$5$l$F$$$k;~$K!"(B
+$B$3$l$i$N%U%i%0$OF14|>uBV$r<($7$^$9!#(B
+kernel_pll $B$O%m!<%+%k;~7W$,(B kernel $B$K$h$C$F5,N'$5$l$F$$$k$3$H$r<($7!"(B
+kernel_pps $B$O(B kernel $B$K$h$k5,N'$,(B PPS $B?.9f$K$h$C$F$b$?$i$5$l$F$$$k$3$H$r(B
+$B<($7$^$9!#(B
 .Pp
-The
 .Qq stability
-is the residual frequency error
-remaining after the system frequency correction is applied and is
-intended for maintenance and debugging.
-In most architectures, this
-value will initially decrease from as high as 500 ppm to a nominal value
-in the range .01 to 0.1 ppm.
-If it remains high for some time after
-starting the daemon, something may be wrong with the local clock, or the
-value of the kernel variable
+$B$O!"%7%9%F%`<~GH?t$N=$@5$,$5$l$?8e$K;D$k;DN1<~GH?t8m:9$G!"(B
+$BJ]<i$d%G%P%C%0$K;H$o$l$^$9!#(B
+$BB?$/$N%"!<%-%F%/%A%c$G$O!"$3$NCM$O=i4|$N(B 500 ppm $BDxEY$+$i!"(B.01 $B$+$i(B 0.1 ppm
+$B$H$$$&Dc$$HO0O$K$^$G8:>/$7$^$9!#(B
+$B$b$7%G!<%b%s(B$B$,5/F0$5$l$F$+$i$b!"$3$NCM$,9b$$$^$^$G$"$k>l9g$O!"(B
+$B%m!<%+%k$J;~7W$,$I$3$+$*$+$7$$$+!"%+!<%M%kJQ?t(B
 .Qq tick
-may be incorrect.
+$B$,@5$7$/$J$$$+$b$7$l$^$;$s!#(B
 .Pp
-The
 .Qq broadcastdelay
-shows the default broadcast delay, as set by
-the
+$B$O!"(B
 .Qq broadcastdelay
-configuration option, while the
+$B@_Dj%*%W%7%g%s$G@_Dj$5$l$k%G%U%)%k%H$N%V%m!<%I%-%c%9%HCY1d;~4V$rI=<($7!"(B
 .Qq authdelay
-shows the default authentication delay, as set by
-the
+$B$O!"(B
 .Qq authdelay
-configuration option.
+$B@_Dj%*%W%7%g%s$G@_Dj$5$l$k%G%U%)%k%H$NG'>ZCY1d;~4V$rI=<($7$^$9!#(B
 .It Ic sysstats
-Print statistics counters maintained in the protocol module.
+$B%W%m%H%3%k%b%8%e!<%k$G4IM}$5$l$kE}7W%+%&%s%?$rI=<($7$^$9!#(B
 .It Ic memstats
-Print statistics counters related to memory allocation
-code.
+$B%a%b%j3d$jEv$F%3!<%I$K4X$9$kE}7W%+%&%s%?$rI=<($7$^$9!#(B
 .It Ic iostats
-Print statistics counters maintained in the input-output module.
+$BF~NO(B-$B=PNO%b%8%e!<%k$G4IM}$5$l$kE}7W%+%&%s%?$rI=<($7$^$9!#(B
 .It Ic timerstats
-Print statistics counters maintained in the timer/event queue support
-code.
+$B%?%$%^(B/$B%$%Y%s%H%-%e!<$r%5%]!<%H$9$k%3!<%I$G4IM}$5$l$kE}7W%+%&%s%?$rI=<($7$^$9!#(B
 .It Ic reslist
-Obtain and print the server's restriction list.
-This list is (usually)
-printed in sorted order and may help to understand how the restrictions
-are applied.
+$B%5!<%P$N@)8B%j%9%H$rF@$F!"I=<($7$^$9!#$3$N%j%9%H$O!"(B
+($BDL>o(B) $B%=!<%H$5$l$?=g$G=PNO$5$l!"@)8B$,$I$N$h$&$KE,MQ$5$l$k$+$r(B
+$BM}2r$9$k=u$1$K$J$k$+$b$7$l$^$;$s!#(B
 .It Ic monlist Op Ar version
-Obtain and print traffic counts collected and maintained by the monitor
-facility.
-The version number should not normally need to be specified.
+$B%b%K%?5!G=$K$h$j<}=8!"4IM}$5$l$k%H%i%U%#%C%/%+%&%s%H$NCM$rF@$F!"I=<($7$^$9!#(B
+$BDL>o!"%P!<%8%g%sHV9f$O;XDj$9$kI,MW$,$"$j$^$;$s!#(B
 .It Xo Ic clkbug
 .Ar clock_peer_address
 .Op Ar ...
 .Xc
-Obtain debugging information for a reference clock driver.
-This information is provided only by some clock drivers and is mostly
-undecodable without a copy of the driver source in hand.
+$B;~7W;2>H%I%i%$%P$N%G%P%C%0>pJs$rF@$^$9!#$3$N>pJs$O!"(B
+$B0lIt$N;~7W%I%i%$%P$G$N$_Ds6!$5$l!"(B
+$B%I%i%$%P$N%=!<%9$N%3%T!<$,<j85$KL5$$>l9g!"$[$H$s$I%G%3!<%I$G$-$^$;$s!#(B
 .El
-.Ss Runtime Configuration Requests
-All requests which cause state changes in the server are authenticated
-by the server using a configured
-NTP key (the facility can also be
-disabled by the server by not configuring a key).
-The key number and the
-corresponding key must also be made known to
-.Nm Ns .
-This can be done using the
+.Ss $B<B9T;~@_Dj%j%/%(%9%H(B
+$B%5!<%PFb$G>uBV$rJQ99$9$k$h$&$J%j%/%(%9%H$O!"$9$Y$F%5!<%P$,@_Dj$7$?(B
+NTP $B%-!<$r;H$C$FG'>Z$5$l$^$9(B
+($B$3$N5!G=$O%5!<%PB&$G%-!<$r@_Dj$7$J$$$3$H$K$h$j!"L58z$K$9$k$3$H$b$G$-$^$9(B) $B!#(B
+$B%-!<HV9f$H$=$l$KBP1~$9$k%-!<$b!"(B
+.Nm
+$B$,CN$C$F$$$J$1$l$P$J$j$^$;$s!#(B
+$B$3$l$O!"(B
 .Ic keyid
-and
+$B$H(B
 .Ic passwd
-commands, the latter of which will prompt at the terminal for a password
-to use as the encryption key.
-You will also be prompted automatically
-for both the key number and password the first time a command which
-would result in an authenticated request to the server is given.
-Authentication not only provides verification that the requester has
-permission to make such changes, but also gives an extra degree of
-protection again transmission errors.
+$B%3%^%s%I$r;H$($P2DG=$G!"8e<T$G$O!"0E9f2=$5$l$?%-!<$r;H$&$?$a$K(B
+$B%Q%9%o!<%I$r5a$a$k%W%m%s%W%H$rC<Kv$K=P$7$^$9!#(B
+$B%5!<%P$X$NG'>Z$5$l$?%j%/%(%9%H$r7k2LE*$KI,MW$H$9$k%3%^%s%I$,:G=i$KM?$($i$l$?(B
+$B;~E@$G$b!"<+F0E*$K%-!<HV9f$H%Q%9%o!<%IN>J}$NF~NO$,MW5a$5$l$^$9!#(B
+$BG'>Z$O!"$=$N$h$&$JJQ99$r$9$k8"8B$r;}$C$F$$$k%j%/%(%9%H$G$"$k$+$r(B
+$B8!>Z$9$k$@$1$G$J$/!"Aw?.%(%i!<$KBP$9$k$h$j0lAX$NJ]8n$r9T$&;v$K$J$j$^$9!#(B
 .Pp
-Authenticated requests always include a timestamp in the packet data,
-which is included in the computation of the authentication code.
-This timestamp is compared by the server to its receive time stamp.
-If they differ by more than a small amount the request is rejected.
-This is done for two reasons.
-First, it makes simple replay attacks on the server, by
-someone who might be able to overhear traffic on your LAN, much more
-difficult.
-Second, it makes it more difficult to request configuration
-changes to your server from topologically remote hosts.
-While the
-reconfiguration facility will work well with a server on the local host,
-and may work adequately between time-synchronized hosts on the same
-LAN, it will work very poorly for more distant hosts.
-As such, if
-reasonable passwords are chosen, care is taken in the distribution and
-protection of keys and appropriate source address restrictions are
-applied, the run time reconfiguration facility should provide an
-adequate level of security.
+$BG'>Z$5$l$?%j%/%(%9%H$O!">o$K%Q%1%C%H%G!<%?$NCf$K!"G'>Z%3!<%I$N7W;;$K(B
+$B4^$^$l$F$$$k%?%$%`%9%?%s%W$r4^$s$G$$$^$9!#(B
+$B$3$N%?%$%`%9%?%s%W$O!"%5!<%P$K$h$C$F<u?.;~9o$HHf3S$5$l$^$9!#$3$N:9$,$"$k>.$5$J(B
+$BCM$h$jBg$-$1$l$P!"%j%/%(%9%H$O5qH]$5$l$^$9!#$3$l$K$O(B 2 $B$D$NM}M3$,$"$j$^$9!#(B
+1 $B$DL\$O!"$"$J$?$N(B LAN $B$N%H%i%U%#%C%/$rEp$_J9$-$G$-$kC/$+$K$h$k%5!<%P$X$N(B
+$BC1=c$J7+$jJV$7$K$h$k967b$r$h$j:$Fq$K$7$^$9!#(B2 $B$DL\$O!"%M%C%H%o!<%/E*$K(B
+$BN%$l$?%[%9%H$+$i!"$"$J$?$N%5!<%P$X@_DjJQ99%j%/%(%9%H$r9T$J$&$3$H$r(B
+$B$h$j:$Fq$K$7$^$9!#(B
+$B:F@_Dj5!G=$O!"%m!<%+%k%[%9%H$N%5!<%P$KBP$7$F$O4JC1$G!";~9oF14|$7$?(B
+$BF1$8(B LAN $B>e$N%[%9%H$G$bIaDL$K9T$J$($^$9$,!"$h$jN%$l$?%[%9%H$G$O(B
+$BHs>o$K$d$j$K$/$/$J$C$F$$$^$9!#(B
+$B$7$?$,$C$F!"E,Ev$J%Q%9%o!<%I$rA*Br$7!"%-!<$NG[I[$HKI8n$KCm0U$rJ'$$!"(B
+$BE,@Z$JAw?.85%"%I%l%9@)8B$,;\$5$l$l$P!"<B9T;~:F@_Dj$N5!G=$K$D$$$F$O(B
+$BE,@Z$J%;%-%e%j%F%#%l%Y%k$K$"$k$3$H$K$J$j$^$9!#(B
 .Pp
-The following commands all make authenticated requests.
+$B0J2<$N%3%^%s%I$O3'!"G'>Z$rI,MW$H$9$k%j%/%(%9%H$G$9!#(B
 .Bl -tag -width indent
 .It Xo Ic addpeer
 .Ar peer_address
@@ -460,64 +390,54 @@
 .Op Ar version
 .Op Ar prefer
 .Xc
-Add a configured peer association at the given address and operating in
-symmetric active mode.
-Note that an existing association with the same
-peer may be deleted when this command is executed, or may simply be
-converted to conform to the new configuration, as appropriate.
-If the
-optional
+$BM?$($i$l$?%"%I%l%9$r@_Dj$5$l$?(B peer $B$H$7$FDI2C$7!"(B
+symmetric active $B%b!<%I$GF0:n$7$^$9!#(B
+$B4{$K(B peer $B$H$7$F@_Dj$5$l$F$$$k(B peer $B$r;XDj$7$?>l9g!"$=$N(B peer $B$O(B
+$B$3$N%3%^%s%I$,<B9T$5$l$?$H$-$K:o=|(B
+$B$5$l$k$+!"C1$K?7$7$$@_Dj$K=>$&$h$&E,Ev$KJQ99$5$l$k$3$H$KCm0U$7$F$/$@$5$$!#(B
+$B%*%W%7%g%s$N(B
 .Ar keyid
-is a nonzero integer, all outgoing packets to
-the remote server will have an authentication field attached encrypted
-with this key.
-If the value is 0 (or not given) no authentication will
-be done.
-The
+$B$,(B 0 $B$G$J$$@0?t$N>l9g!"%j%b!<%H%5!<%P$K(B
+$B=P$F$$$/$9$Y$F$N%Q%1%C%H$O!"$3$N%-!<$K$h$j0E9f2=$5$l$?(B
+$BG'>Z%U%#!<%k%I$r;}$D$3$H$K$J$j$^$9!#CM$,(B 0 $B$N>l9g(B
+($B$^$?$O;XDj$5$l$J$+$C$?>l9g(B)$B!"G'>Z$O9T$J$o$l$^$;$s!#(B
 .Ar version
-can be 1, 2 or 3 and defaults to 3.
-The
+$B$O!"(B1, 2, 3 $B$N$I$l$G$b$h$/!"%G%U%)%k%H$G$O(B 3 $B$K$J$j$^$9!#(B
 .Ar prefer
-keyword indicates a preferred peer (and thus will be
-used primarily for clock synchronisation if possible).
-The preferred
-peer also determines the validity of the PPS signal - if the preferred
-peer is suitable for synchronisation so is the PPS signal.
+$B%-!<%o!<%I$O!"M%@h$9$k(B peer $B$r<($7$^$9(B
+($B$=$N7k2L!"2DG=$G$"$l$P;~7WF14|$N<gMW85$H$7$F;HMQ$5$l$^$9(B)$B!#(B
+$BM%@h$9$k(B peer $B$O!"(B PPS $B?.9f$N?.Mj@-$b7h$a$^$9!#M%@h$9$k(B peer $B$,F14|$K(B
+$BE,$7$F$$$k>l9g!"(BPPS $B?.9f$b?.Mj$G$-$k$HH=CG$5$l$^$9!#(B
 .It Xo Ic addserver
 .Ar peer_address
 .Op Ar keyid
 .Op Ar version
 .Op Ar prefer
 .Xc
-Identical to the
+$BA`:n%b!<%I$,%/%i%$%"%s%H$G$"$k$3$H0J30$O!"(B
 .Ic addpeer
-command, except that the operating mode is client.
+$B%3%^%s%I$HF1Ey$G$9!#(B
 .It Xo Ic broadcast
 .Ar peer_address
 .Op Ar keyid
 .Op Ar version
 .Xc
-Identical to the
+$BA`:n%b!<%I$,%V%m!<%I%-%c%9%H$G$"$k$3$H0J30$O!"(B
 .Ic addpeer
-command, except that the operating mode is broadcast.
-In this case a valid key identifier and key are required.
-The
+$B%3%^%s%I$HF1Ey$G$9!#$3$N>l9g!"@5Ev$J%-!<<1JL;R$H%-!<$,I,MW$K$J$j$^$9!#(B
 .Ar peer_address
-parameter can be the broadcast address of the local network or a
-multicast group address assigned to
-NTP.
-If a multicast address, a
-multicast-capable kernel is required.
+$B%Q%i%a!<%?$O!"%m!<%+%k%M%C%H%o!<%/$N%V%m!<%I%-%c%9%H%"%I%l%9$+!"$^$?$O(B
+NTP $B$K3d$jEv$F$i$l$?%^%k%A%-%c%9%H%0%k!<%W%"%I%l%9$K$G$-$^$9!#(B
+$B%^%k%A%-%c%9%H%"%I%l%9$N>l9g!"%^%k%A%-%c%9%H$KBP1~$7$?%+!<%M%k$,(B
+$BI,MW$K$J$j$^$9!#(B
 .It Xo Ic unconfig
 .Ar peer_address
 .Op Ar ...
 .Xc
-This command causes the configured bit to be removed from the specified
-peer(s).
-In many cases this will cause the peer association to be deleted.
-When appropriate, however, the association may persist in an
-unconfigured mode if the remote peer is willing to continue on in this
-fashion.
+$B$3$N%3%^%s%I$O!";XDj$7$?(B peer ($B72(B) $B$+$i@_Dj:Q$_$rI=$9%S%C%H$r=|5n$7$^$9!#(B
+$BB?$/$N>l9g!"$3$l$K$h$C$F(Bpeer $B$N@_Dj$,:o=|$5$l$k$3$H$K$J$j$^$9!#(B
+$B$7$+$7$J$,$i!"%j%b!<%H$N(B peer $B$,L$@_Dj>uBV$N7QB3$r4uK>$7!"(B
+$B$=$l$,E,@Z$G$"$k>l9g$O!"NY@\4X78$OL$@_Dj%b!<%I$N$^$^;D$k>l9g$b$"$j$^$9!#(B
 .It Xo Ic fudge
 .Ar peer_address
 .Op Ar time1
@@ -525,8 +445,8 @@
 .Op Ar stratum
 .Op Ar refid
 .Xc
-This command provides a way to set certain data for a reference clock.
-See the source listing for further information.
+$B$3$N%3%^%s%I$O!"$"$k%G!<%?$r;2>H;~7W$H$7$F%;%C%H$G$-$k$h$&$K$7$^$9!#(B
+$B>\:Y$J>pJs$O!"%=!<%9%j%9%H$r;2>H$7$F$/$@$5$$!#(B
 .It Xo Ic enable
 .Ar flag
 .Op Ar ...
@@ -535,101 +455,82 @@
 .Ar flag
 .Op Ar ...
 .Xc
-These commands operate in the same way as the
+$B$3$l$i$N%3%^%s%I$O(B
+.Xr ntpd 8
+$B$N@_Dj%U%!%$%k$K$*$1$k(B
 .Qq enable
-and   
+$B$d(B
 .Qq disable
-configuration file commands of
-.Xr ntpd 8 .
-Following is a description of the flags.
-Note that only the auth, bclient, monitor, pll, pps and stats flags
-can be set by
-.Nm Ns ;
-the pll_kernel and pps_kernel flags are read-only.
+$B$HF1$8J}K!$GA`:n$7$^$9!#(B
+$B0J2<$O%U%i%0$N@bL@$G$9!#(B
+auth, bclient, monitor, pll, pps, stats $B%U%i%0$N$_$,(B
+.Nm
+$B$G@_Dj$G$-!"(Bpll_kernel, pps_kernel $B%U%i%0$OFI$_9~$_@lMQ$G$"$k$3$H$K(B
+$BCm0U$7$F$/$@$5$$!#(B
 .Bl -tag -width indent
 .It auth
-Enables the server to synchronize
-with unconfigured peers only if the peer has been correctly
-authenticated using a trusted key and key identifier.
-The default for this flag is enable.
+peer $B$,?.Mj$G$-$k%-!<$H(B
+$B%-!<<1JL;R$r;H$C$F@5$7$/G'>Z$5$l$?$H$-$@$1!"L$@_Dj$N(B
+peer $B$K%5!<%P$rF14|$5$;$k$h$&$K$7$^$9!#(B
+$B%G%U%)%k%H$G$OM-8z$K$J$C$F$$$^$9!#(B
 .It bclient
-Enables the server
-to listen for a message from a broadcast or multicast server,
-as in the
 .Qq mutlicastclient
-configuration option with default address.
-The default for this flag is disable.
-.It pll
-Enables
-the server to adjust its local clock by means of NTP.
-If disabled,
-the local clock free-runs at its intrinsic time and frequency
-offset.
-This flag is useful in case the local clock is controlled by
-some other device or protocol and
-NTP is used only to provide
-synchronization to other clients.
-In this case, the local clock driver is used.
-See the
-.Qo
-Reference Clock Drivers
-.Qc
-page
-(available as part of the HTML documentation
-provided in
-.Pa /usr/share/doc/ntp )
-for further information.
-The default for this flag is enable.
+$B@_Dj%*%W%7%g%s$G$N%G%U%)%k%H%"%I%l%9$HF1$8$h$&$K!"(B
+$B%V%m!<%I%-%c%9%H%5!<%P$d%^%k%A%-%c%9%H%5!<%P$+$i$N%a%C%;!<%8$r(B
+$BJ9$/(B (listen) $B$h$&$K$7$^$9!#(B
+$B%G%U%)%k%H$G$OL58z$K$J$C$F$$$^$9!#(B
+.\" .It pll $B$N:o=|(B (send-pr docs/17500)
 .It monitor
-Enables the monitoring facility for the
 .Ic monlist
-command.
-The default for this flag is enable.
-.Ic pll
-Enables the server to adjust its local clock by means of NTP.
-If disabled,
-the local clock free-runs at its intrinsic time and frequency offset.
-This flag is useful
-in case the local clock is controlled
-by some other device or protocol
-and NTP is used only to provide synchronization to other clients.
-In this case, the local clock driver is used.
-See the
+$B%3%^%s%I$KBP$7$F(B
+$B%b%K%?5!G=$rM-8z$K$7$^$9!#(B
+$B%G%U%)%k%H$G$OM-8z$K$J$C$F$$$^$9!#(B
+.\" .Ic -> .It $B$NJQ99(B (send-pr docs/17500)
+.It pll
+$B%5!<%P$,(B NTP $B$r;H$C$F%m!<%+%k;~7W$r9g$o$;$k$h$&$K$7$^$9!#(B
+$BL58z$N>l9g$O!"%m!<%+%k;~7W$O(B
+$BFbIt$N;~4V$*$h$S<~GH?t%*%U%;%C%H$K$h$C$F>!<j$KF0:n$9$k$3$H$K$J$j$^$9!#(B
+$B$3$N%U%i%0$O!"%m!<%+%k;~7W$,B>$N%G%P%$%9$d%W%m%H%3%k$K$h$j@)8f$5$l$F(B$B$$$F!"(B
+NTP $B$OB>$N%/%i%$%"%s%H$,F14|$9$k$?$a$@$1$K;H$o$l$k$h$&$J>l9g$KJXMx$G$9!#(B 
+$B$3$N>l9g!"%m!<%+%k;~7W%I%i%$%P$,;HMQ$5$l$^$9!#(B
+$B$h$j>\:Y$J>pJs$O(B
 .Qo
-Reference Clock Drivers
+$B;2>H;~7W%I%i%$%P(B
 .Qc
-page for further information.
-The default for this flag is enable.
-.Ic pps
-Enables the pulse-per-second (PPS) signal
-when frequency and time is disciplined
-by the precision time kernel modifications.
-See the
+$BJ8=q$r;2>H$7$F$/$@$5$$!#(B
+$B%G%U%)%k%H$G$OM-8z$K$J$C$F$$$^$9!#(B
+.\" .Ic -> .It $B$NJQ99(B (send-pr docs/17500)
+.It pps
+$B9b@:EY$J;~9oJ];}$N$?$a$NJQ99$,$J$5$l$?%+!<%M%k$K$h$j(B
+$B<~GH?t$H;~9o$,5,N'$5$l$F$$$k>l9g$K!"(B
+1 $BIC$4$H$N%Q%k%9?.9f(B (PPS) $B$rM-8z$K$7$^$9!#(B
+$B$h$j>\:Y$J>pJs$O(B
 .Qo
-A Kernel Model for Precision Timekeeping
+$B9b@:EY$J;~9oJ];}$N$?$a$N%+!<%M%k%b%G%k(B
 .Qc
-page
-for further information.
-The default for this flag is disable.
-.Ic stats
-Enables the statistics facility.
-See the
-.Qq Monitoring Support
-section of the
+$BJ8=q$r;2>H$7$F$/$@$5$$!#(B
+$B%G%U%)%k%H$G$OL58z$K$J$C$F$$$^$9!#(B
+.\" .Ic -> .It $B$NJQ99(B (send-pr docs/17500)
+.It stats
+$BE}7W5!G=$rM-8z$K$7$^$9!#(B
+$B$h$j>\:Y$J>pJs$O(B
 .Xr ntp.conf 5
-page
-for further information.
-The default for this flag is enable.
-.Ic pll_kernel
-When the precision time kernel modifications are installed,
-this indicates the kernel controls the clock discipline;
-otherwise, the daemon controls the clock discipline.
-.Ic pps_kernel
-When the precision time kernel modifications are installed
-and a pulse-per-second (PPS) signal is available,
-this indicates the PPS signal controls the clock discipline;
-otherwise, the daemon or kernel controls the clock discipline,
-as indicated by the pll_kernel flag.
+$BJ8=q$N(B
+.Qq $B%b%K%?%5%]!<%H(B
+$B@a$r;2>H$7$F$/$@$5$$!#(B
+$B%G%U%)%k%H$G$OM-8z$K$J$C$F$$$^$9!#(B
+.\" .Ic -> .It $B$NJQ99(B (send-pr docs/17500)
+.It pll_kernel
+$B9b@:EY$J;~9oJ];}$N$?$a$NJQ99$,%+!<%M%k$K$J$5$l$F$$$k>l9g!"(B
+$B%+!<%M%k$,;~7W$N5,N'$r@)8f$7$F$$$k$3$H$r<($7$^$9!#(B
+$B$=$&$G$J$$>l9g$O%G!<%b%s$,;~7W$N5,N'$r@)8f$7$F$$$^$9!#(B
+.\" .Ic -> .It $B$NJQ99(B (send-pr docs/17500)
+.It pps_kernel
+$B9b@:EY$J;~9oJ];}$N$?$a$NJQ99$,%+!<%M%k$J$5$l$F$*$j!"(B
+$B$^$?(B1 $BIC$4$H$N%Q%k%9?.9f(B (PPS) $B$,B8:_$7$F$$$k>l9g!"(B
+PPS $B?.9f$,;~7W$N5,N'$r@)8f$7$F$$$k$3$H$r<($7$^$9!#(B
+$B$=$&$G$J$$>l9g$O(B pll_kernel $B%U%i%0$N<($9$H$*$j!"(B
+$B%G!<%b%s$^$?$O%+!<%M%k$,;~7W$N5,N'$r@)8f$7$F$$$^$9!#(B
 .El
 .It Xo Ic restrict
 .Ar address
@@ -637,31 +538,30 @@
 .Ar flag
 .Op Ar flag
 .Xc
-This command operates in the same was as the
+$B$3$N%3%^%s%I$O(B
+.Xr ntpd 8
+$B$N(B
 .Qq restrict
-configuration option of
-.Xr ntpd 8 .
+$B@_Dj%*%W%7%g%s$HF1$8J}K!$GA`:n$7$^$9!#(B
 .It Xo Ic unrestrict
 .Ar address
 .Ar mask
 .Ar flag
 .Op Ar flag
 .Xc
-Unrestrict the matching entry from the restrict list.
+$B@)8B%j%9%H$K$*$$$F!"%^%C%A$7$?%(%s%H%j$rL5@)8B$K$7$^$9!#(B
 .It Xo Ic delrestrict
 .Ar address
 .Ar mask
 .Op Ar ntpport
 .Xc
-Delete the matching entry from the restrict list.
+$B@)8B%j%9%H$+$i0lCW$9$k%(%s%H%j$r:o=|$7$^$9!#(B
 .It Ic readkeys
-Cause the current set of authentication keys to be purged and a new set
-to be obtained by rereading the keys file (which must have been
-specified in the
+$B8=:_$NG'>Z%-!<$N%;%C%H$r0lA]$7!"%-!<%U%!%$%k(B ($B$3$l$O(B
 .Xr ntpd 8
-configuration file).
-This allows encryption keys to be changed without
-restarting the server.
+$B@_Dj%U%!%$%k$NCf$G;XDj$5$l$F$$$J$1$l$P$J$j$^$;$s(B) $B$N(B
+$B:FFI$_9~$_$r9T$J$C$F?7$7$$%;%C%H$K$7$^$9!#(B
+$B$3$&$9$k$3$H$G!"%5!<%P$r:F%9%?!<%H$5$;$:$K0E9f2=%-!<$NJQ99$,$G$-$^$9!#(B
 .It Xo Ic trustkey
 .Ar keyid
 .Op Ar ...
@@ -670,38 +570,39 @@
 .Ar keyid
 .Op Ar ...
 .Xc
-These commands operate in the same way as the
+$B$3$l$i$N%3%^%s%I$O(B
+.Xr ntpd 8
+$B$N(B
 .Qq trustedkey
-and
+$B$d(B
 .Qq untrustkey
-configuration options of
-.Xr ntpd 8 .
+$B@_Dj%*%W%7%g%s$HF1$8J}K!$GA`:n$7$^$9!#(B
 .It Ic authinfo
-Returns information concerning the authentication module, including
-known keys and counts of encryptions and decryptions which have been
-done.
+$B4{CN$N%-!<$d<B9T$7$?0E9f2=!"I|9f2=$N?t$r4^$`!"G'>Z%b%8%e!<%k$K4X$9$k(B
+$B>pJs$rJV$7$^$9!#(B
 .It Ic traps
-Display the traps set in the server.
-See the source listing for further information.
+$B%5!<%P$K@_Dj$5$l$F$$$k(B$B%H%i%C%W$rI=<($7$^$9!#(B
+$B>\:Y$O%=!<%9%j%9%H$r;2>H$7$F$/$@$5$$!#(B
 .It Xo Ic addtrap
 .Ar address
 .Op Ar port
 .Op Ar interface
 .Xc
-Set a trap for asynchronous messages.
-See the source listing for further information.
+$BHsF14|%a%C%;!<%8$KBP$9$k%H%i%C%W$r%;%C%H$7$^$9!#(B
+$B>\:Y$O%=!<%9%j%9%H$r;2>H$7$F$/$@$5$$!#(B
 .It Xo Ic clrtrap
 .Ar address
 .Op Ar port
 .Op Ar interface
 .Xc
-Clear a trap for asynchronous messages.
-See the source listing for further information.
-.It reset Ar counter Op Ar ...
-Clear the statistics counters in various modules of the server.
-See the source listing for further information.
+$BHsF14|%a%C%;!<%8$KBP$9$k%H%i%C%W$r2r=|$7$^$9!#(B
+$B>\:Y$O%=!<%9%j%9%H$r;2>H$7$F$/$@$5$$!#(B
+.\" Ic $B$NDI2C(B (send-pr docs/17500)
+.It Ic reset Ar counter Op Ar ...
+$B%5!<%P$N$$$m$$$m$J%b%8%e!<%k$N$J$+$NE}7W%+%&%s%?$r%/%j%"$7$^$9!#(B
+$B>\:Y$O%=!<%9%j%9%H$r;2>H$7$F$/$@$5$$!#(B
 .El
-.Sh SEE ALSO
+.Sh $B4XO"9`L\(B
 .Xr ntp.conf 5 ,
 .Xr ntpd 8
 .Rs
@@ -709,16 +610,13 @@
 .%T Network Time Protocol (Version 3)
 .%O RFC1305
 .Re
-.Sh HISTORY
-Written by
+.Sh $BNr;K(B
+Toronto $BBg3X$N(B
 .An Dennis Ferguson
-at the University of Toronto.
-.Sh BUGS
+$B$K$h$C$F=q$+$l$^$7$?!#(B
+.Sh $B%P%0(B
 .Nm
-is a crude hack.
-Much of the information it shows is deadly boring
-and could only be loved by its implementer.
-The program was designed so that new (and temporary) features
-were easy to hack in,
-at great expense to the program's ease of use.
-Despite this, the program is occasionally useful.
+$B$O!"L$40@.$N%O%C%/$G$9!#I=<($5$l$k>pJs$NB?$/$O;`$L$[$IB`6~$G!"<BAu$7$?(B
+$B?M4V$@$1$K5$$KF~$i$l$k$b$N$G$9!#$3$N%W%m%0%i%`$O!"?7$7$$(B ($B$=$7$F0l;~E*$J(B)
+$B;EMM$rDI2C$7$d$9$$$h$&%G%6%$%s$5$l$F$*$j!";H$$$d$9$/$9$k$K$O<j4V$,(B
+$B$+$+$j$^$9!#$=$l$G$b!"$3$N%W%m%0%i%`$O!">l9g$K$h$C$F$OM-MQ$G$9!#(B

--------------BA6F0746CAC5EAC3DDF16E61
Content-Type: text/plain; charset=iso-2022-jp;
 name="ntpq.8.diff"
Content-Transfer-Encoding: 8bit
Content-Disposition: inline;
 filename="ntpq.8.diff"

--- ntpq.8.orig	Tue Feb 15 22:52:45 2000
+++ ntpq.8	Tue Apr 11 10:47:14 2000
@@ -3,126 +3,132 @@
 .\"
 .Dd January 7, 2000
 .\" jpman %Id: ntpq.8,v 0.0 2000/02/06 08:09:52 horikawa Stab %
+.\" $BBPLu3P$(=q$-(B (seki@sysrap.cs.fujitsu.co.jp $B:n@.(B)
+.\" WORD: association		$B%"%=%7%(!<%7%g%s(B
+.\" WORD: association identifier	$B%"%=%7%(!<%7%g%sHV9f(B ($BLu$7$9$.$+(B?)
+.\" WORD: authentication	$BG'>Z(B
+.\" WORD: clock		$B;~7W(B
+.\" WORD: dispersion	$B$P$i$D$-(B
+.\" WORD: fuzzball	fuzzball ($B8GM-L>;l(B; ntpd $B%Y!<%9$G$J$$(B NTP $B%5!<%P(B)
+.\" WORD: offset	$B$:$l(B
+.\" WORD: peer		peer $B$N$^$^(B
+.\" WORD: poll		$B%]!<%j%s%0$9$k(B
+.\" WORD: query		$BLd$$9g$o$;(B
+.\" WORD: reference clock	$B;2>H;~7W(B
+.\" WORD: status word		$B>uBV%o!<%I(B
+.\" WORD: time out ($BL>;l(B)	$B@)8B;~4V(B
+.\" WORD: time out ($BF0;l(B)	$B;~4V@Z$l(B
+.\" WORD: intersection algorithm	$B8r:9%"%k%4%j%:%`(B
 .Dt NTPQ 8
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm ntpq
-.Nd standard NTP query program
-.Sh SYNOPSIS
+.Nd NTP $B$NI8=`Ld$$9g$o$;%W%m%0%i%`(B
+.Sh $B=q<0(B
 .Nm
 .Op Fl inp
 .Op Fl c Ar command
 .Op Ar host ...
-.Sh DESCRIPTION
+.Sh $B2r@b(B
 .Nm
-is used to query NTP servers which implement the recommended NTP mode 6
-control message format about current state and to request changes in
-that state.
-The program may be run either in interactive mode or
-controlled using command line arguments.
-Requests to read and write
-arbitrary variables can be assembled, with raw and pretty-printed
-output options being available.
+$B$O!"(B
+$B?d>)$5$l$F$$$k(B NTP $B%b!<%I(B 6 $B@)8f%a%C%;!<%8%U%)!<%^%C%H$r<BAu$9$k(B NTP $B%5!<%P$K!"(B
+$B8=:_$N>uBV$K$D$$$FLd$$9g$o$;$r9T$J$C$?$j!"(B
+$B>uBV$NJQ99$rMW5a$9$k$?$a$K;H$$$^$9!#(B
+$B$3$N%W%m%0%i%`$O!"BPOCE*%b!<%I$G$b%3%^%s%I%i%$%s0z?t$r(B
+$B;H$C$?@)8f$G$bF0:n$5$;$k$3$H$,$G$-$^$9!#(B
+$BG$0U$NJQ?t$rFI$_=q$-$9$k%j%/%(%9%H$rAH$_N)$F$k$3$H$,$G$-!"(B
+$B@8$N$^$^!"$^$?$Oe:No$K@07A$7$F=PNO$9$k%*%W%7%g%s$,$"$j$^$9!#(B
 .Nm
-can also obtain and print a list of peers in a common format by sending
-multiple queries to the server.
+$B$O!"%5!<%P$KJ#?t$NLd$$9g$o$;$rAw$k$3$H$G(B
+peer $B$N%j%9%H$rF@$F!"6&DL$J%U%)!<%^%C%H$G=PNO$9$k$3$H$,$G$-$^$9!#(B
 .Pp
-If one or more request options is included on the command line when
 .Nm
-is executed, each of the requests will be sent to the NTP servers
-running on each of the hosts given as command line arguments, or on
+$B$,<B9T$5$l$?$H$-!"(B1 $B$D0J>e$N%j%/%(%9%H%*%W%7%g%s$,!"(B
+$B%3%^%s%I%i%$%s$K4^$^$l$k>l9g$O!"$=$l$>$l$N%j%/%(%9%H$O!"%3%^%s%I%i%$%s(B
+$B0z?t$GM?$($i$l$k%[%9%H!"$^$?$O%G%U%)%k%H$G$"$k(B
 .Dq localhost
-by default.
-If no request options are given,
+$B$GF0$$$F$$$k(B NTP $B%5!<%P$KAw$i$l$^$9!#(B
+$B%j%/%(%9%H%*%W%7%g%s$,M?$($i$l$J$+$C$?>l9g!"(B
 .Nm
-will attempt to read commands from the standard input and execute these
-on the NTP server running on the first host given on the command line,
-again
-defaulting to
+$B$O!"%3%^%s%I$rI8=`F~NO$+$iFI$_9~$_!"(B
+$B%3%^%s%I%i%$%s$G;XDj$5$l$?:G=i$N%[%9%H$GF0$$$F$$$k(B
+NTP $B%5!<%P$KBP$7$F<B9T$7$h$&$H$7$^$9!#(B
+$B$3$N$H$-$b!"(B
+$B%[%9%H$,;XDj$5$l$F$$$J$$$H$-$O!"%G%U%)%k%H$G(B
 .Dq localhost
-when no other host is specified.
+$B$K$J$j$^$9!#(B
 .Nm
-will prompt for commands if the standard input is a terminal device.
+$B$OI8=`F~NO$,C<Kv$G$"$k>l9g$O!"%W%m%s%W%H$r=P$7$F%3%^%s%I$r<u$1IU$1$^$9!#(B
 .Pp
 .Nm
-uses NTP mode 6 packets to communicate with the NTP server, and hence
-can be used to query any compatible server on the network which permits
-it.
-Note that since NTP is a UDP protocol this communication will be
-somewhat unreliable, especially over large distances in terms of network
-topology.
-.Nm
-makes one attempt to retransmit requests, and will time requests out if
-the remote host is not heard from within a suitable timeout time.
+$B$O(B NTP $B%5!<%P$H$NDL?.$K!"(BNTP $B%b!<%I(B 6 $B%Q%1%C%H$r;H$&$?$a!"(B
+$B%M%C%H%o!<%/>e$G$=$l$r5v$9$h$&$J8_49%5!<%P$X$NLd$$9g$o$;$K;HMQ$G$-$^$9!#(B
+NTP $B$O(B UDP $B$N%W%m%H%3%k$J$N$G!"FC$K%M%C%H%o!<%/%H%]%m%8E*$K(B
+$B1s$/$K$"$k>l9g$O!"$3$NDL?.$O$d$d?.Mj@-$K7g$1$k$H$$$&$3$H$KCm0U$7$F(B
+$B$/$@$5$$!#(B
+.Nm
+$B$O!"%j%/%(%9%H$r:FAw$9$k;n$_$r0lEY9T$J$$!"(B
+$BE,Ev$J@)8B;~4V$NHO0OFb$G%j%b!<%H%[%9%H$+$iJV;v$,$J$+$C$?$H$-$O!"(B
+$B$=$N%j%/%(%9%H$O;~4V@Z$l$H$J$j$^$9!#(B
 .Pp
-Command line options are described following. Specifying a command line
-option other than
+$B%3%^%s%I%i%$%s%*%W%7%g%s$O0J2<$NDL$j$G$9!#(B
 .Fl i
-or
+$B$^$?$O(B
 .Fl n
-will cause the specified query (queries) to be sent to the indicated
-host(s) immediately.
-Otherwise,
-.Nm
-will attempt to read interactive format commands from the standard
-input.
-The following options are available:
+$B0J30$N%3%^%s%I%i%$%s%*%W%7%g%s$r;XDj$9$k$H!";XDj$7$?%[%9%H(B ($B72(B) $B$K!"(B
+$B;XDj$7$?Ld$$9g$o$;(B ($B$^$?$OJ#?t$NLd$$9g$o$;(B) $B$rD>$A$KAw$k$3$H$K$J$j$^$9!#(B
+$B;XDj$7$J$+$C$?>l9g!"(B
+.Nm
+$B$OI8=`F~NO$+$iBPOCE*$J%U%)!<%^%C%H$N%3%^%s%I$rFI$_9~$b$&$H$7$^$9!#(B
+$B0J2<$N%*%W%7%g%s$,;HMQ2DG=$G$9(B:
 .Bl -tag -width indent
 .It Fl c Ar command
-The following argument is interpreted
-as an interactive format command
-and is added to the list of commands to be executed on the specified
-host(s).
-Multiple
+$B8e$KB3$/0z?t$O!"BPOCE*$J%U%)!<%^%C%H$N%3%^%s%I$H$7$F2r<a$5$l!"(B
+$B;XDj$5$l$?%[%9%H(B ($B72(B) $B$KBP$7$F<B9T$9$Y$-%3%^%s%I$N%j%9%H$K(B
+$BIU$12C$($i$l$^$9!#(B
+$BJ#?t$N(B
 .Fl c
-options may be given.
+$B%*%W%7%g%s$rM?$($k$3$H$b$G$-$^$9!#(B
 .It Fl i
-Force
 .Nm
-to operate in interactive mode.
-Prompts will be written to the standard
-output and commands read from the standard input.
+$B$r6/@)E*$KBPOCE*%b!<%I$GF0:n$5$;$^$9!#I8=`=PNO$K%W%m%s%W%H$,(B
+$BI=<($5$l!"I8=`F~NO$+$i%3%^%s%I$,FI$_9~$^$l$^$9!#(B
 .It Fl n
-Output all host addresses in dotted-quad numeric format rather than
-converting to the canonical host names.
+$B$9$Y$F$N%[%9%H%"%I%l%9$r?t;z(B 4 $B$D$rE@$G6h@Z$C$?7A<0$G=PNO$7!"(B
+$B@55,$N%[%9%HL>$KJQ49$7$^$;$s!#(B
 .It Fl p
-Print a list of the peers known to the server as well as a summary of
-their state.
-This is equivalent to the
+$B%5!<%P$K4{CN$J(B peer $B$N%j%9%H$H!"$=$l$i$N>uBV$N35MW$r=PNO$7$^$9!#(B
+$B$3$l$O!"BPOC%3%^%s%I(B
 .Ic peers
-interactive command.
+$B$HF1Ey$G$9!#(B
 .El
-.Ss Internal Commands
-Interactive format commands consist of a keyword followed by zero to
-four arguments.
-Only enough characters of the full keyword to uniquely
-identify the command need be typed.
-The output of a command is normally
-sent to the standard output, but optionally the output of individual
-commands may be sent to a file by appending a
-.Qq > ,
-followed by a file name, to the command line.
-A number of interactive format commands are executed entirely within the
-.Nm
-program itself and do not result in NTP mode 6 requests being sent to a
-server.
-These are described following.
+.Ss $BFbIt%3%^%s%I(B
+$BBPOCE*$J%U%)!<%^%C%H$N%3%^%s%I$O!"%-!<%o!<%I$H$=$l$KB3$/(B 0 $B$+$i(B 4 $B8D$N(B
+$B0z?t$+$i9=@.$5$l$^$9!#%-!<%o!<%IA4D9$N$&$A!"B>$H6hJL$G$-$kJ8;z?t$,(B
+$B%?%$%W$5$l$l$P!"M-8z$K$J$j$^$9!#(B
+$B%3%^%s%I$N=PNO$ODL>oI8=`=PNO$KAw$i$l$^$9$,!"%3%^%s%I%i%$%s>e$G(B
+.Qq >
+$B$KB3$1$F%U%!%$%kL>$r;XDj$9$k$3$H$G!"8D!9$N%3%^%s%I$N=PNO$r(B
+$B%U%!%$%k$KAw$k$3$H$,$G$-$^$9!#(B
+.Pp
+$B$$$/$D$+$NBPOCE*%U%)!<%^%C%H$N%3%^%s%I$O!"(B
+.Nm
+$B%W%m%0%i%`<+?H$NCf$GA4BN$,<B9T$5$l!"%5!<%P$X$N(B NTP $B%b!<%I(B 6 $B%j%/%(%9%H$O(B
+$BAw$i$l$^$;$s!#$3$N<oN`$N%3%^%s%I$K$O0J2<$N$b$N$,$"$j$^$9!#(B
 .Bl -tag -width indent
 .It Ic ? Op Ar command_keyword
 .It Ic help Op Ar command_keyword
-A
+$BC1FH$N(B
 .Ic ?
-by itself will print a list of all the command keywords
-known to this incarnation of
-.Nm Ns .
-A
+$B$O!"(B
+.Nm
+$B$,CN$C$F$$$k$9$Y$F$N%3%^%s%I%-!<%o!<%I$N%j%9%H$r=PNO$7$^$9!#(B
 .Ic ?
-followed by a command keyword will print function and
-usage information about the command.
-This command is probably a better
-source of information about
+$B$N8e$K%3%^%s%I%-!<%o!<%I$,B3$/$H$-$O!"%3%^%s%I$N5!G=$HMQK!$r=PNO$7$^$9!#$3$N(B
+$B%3%^%s%I$O!"(B
 .Nm
-than this manual page.
+$B$K4X$7$F!"B?J,$3$N%^%K%e%"%k$h$j$bNI$$>pJs8;$H$J$k$G$7$g$&!#(B
 .\"
 .\" XXX Both variable_name and value below should be arguments,
 .\"	not angle-quoted text.
@@ -137,170 +143,157 @@
 .Op ,...
 .Xc
 .It Ic clearvars
-The data carried by NTP mode 6 messages consists of a list of items of
-the form
+NTP $B%b!<%I(B 6 $B%a%C%;!<%8$,1?$V%G!<%?$O!"<!$N7A$N(B
+$B9`L\$N%j%9%H$+$i@.$j$^$9!#(B
 .Xo Aq variable_name Ns
 .Pf = Aq value
 .Xc
-where the
+$B$3$3$G!"%5!<%P$NJQ?t$rFI$_<h$k%j%/%(%9%H$G$O!"$3$N(B
 .Qq = Ns Aq value
-is ignored, and can be omitted, in requests
-to the server to read variables.
+$B$OL5;k$5$l$k$N$G!">JN,$9$k$3$H$,$G$-$^$9!#(B
 .Nm
-maintains an internal list in which data to be included in control
-messages can be assembled, and sent using the
+$B$O!"@)8f%a%C%;!<%8$K4^$^$l$k%G!<%?$rAH$_N)$F$k$?$a$NFbIt%j%9%H$rJ];}$7$F$*$j!"(B
+$B0J2<$K=R$Y$k(B
 .Ic readlist
-and
+$B$d(B
 .Ic writelist
-commands described below. The
+$B%3%^%s%I$r;H$C$FAw$j$^$9!#(B
 .Ic addvars
-command allows variables and their optional values to be added to the
-list.
-If more than one variable is to be added, the list should be
-comma-separated and not contain white space.
-The
+$B%3%^%s%I$G!"$3$N%j%9%H$K!"JQ?t$H>JN,2DG=$JCM$rDI2C$9$k$3$H$,$G$-$^$9!#(B
+1 $B$D$h$jB?$/$NJQ?t$rDI2C$9$k$H$-$K$O!"%j%9%H$O%3%s%^$G6h@Z$j!"(B
+$B6uGr$r4^$s$G$O$$$1$^$;$s!#(B
 .Ic rmvars
-command can be used to remove individual variables from the list, while
-the
+$B%3%^%s%I$O!"8D!9$NJQ?t$r%j%9%H$+$i:o=|$9$k$?$a$KMQ$$!"(B
 .Ic clearvars
-command removes all variables from the list.
+$B%3%^%s%I$O!"%j%9%H$+$i$9$Y$F$NJQ?t$r:o=|$7$^$9!#(B
 .It Ic authenticate Ar yes | Ar no
-Normally
+$BDL>o!"(B
 .Nm
-does not authenticate requests unless they are write requests.
-The command
+$B$O!"(B
+$B=q$-9~$_%j%/%(%9%H$G$J$$8B$j%j%/%(%9%H$rG'>Z$7$^$;$s!#(B
+$B%3%^%s%I(B 
 .Dq Li authenticate yes
-causes
+$B$O!"(B
 .Nm
-to send authentication with all requests it makes.
-Authenticated requests cause some servers
-to handle requests slightly differently,
-and can occasionally melt the CPU in fuzzballs if you turn
-authentication on before doing a peer display.
+$B$,@8@.$9$k$9$Y$F$N%j%/%(%9%H$KG'>Z$r$D$1$FAw$k$h$&$K$7$^$9!#(B
+$BG'>Z$5$l$?%j%/%(%9%H!"%5!<%P$K$h$C$F$O>/$70[$J$C$F07$o$l$^$9!#(B
+$B$b$7$b(B peer $BI=<($r9T$&A0$KG'>Z$r%*%s$K$9$k$H!"(B
+$B;~!9(B fuzzball $B$N(B CPU $B$rMO$+$7$F$7$^$&$+$b$7$l$^$;$s!#(B
 .It Ic cooked
-Causes output from query commands to be
-.Qq cooked Ns .
-Variables
-which are recognized by the server will have their values reformatted
-for human consumption.
-Variables which
-.Nm
-thinks should have a decodeable value but didn't are marked with a
-trailing
-.Qq ? Ns .
+$BLd$$9g$o$;%3%^%s%I$+$i$N=PNO$r!"(B 
+.Qq $B2C9):Q$_(B (cooked)
+$B7A<0$K$7$^$9!#(B
+$B%5!<%P$KG'<1$5$l$?JQ?t$O!"?M4V$K;H$($k7A$K:F@07A$5$l$?CM$K(B
+$B$J$j$^$9!#(B
+.Nm
+$B$,!"$=$NJQ?t$OK\Mh%G%3!<%I$G$-$kCM$r;}$C$F$$$k$HH=CG$7$?$N$K!"(B
+$B%G%3!<%I$5$l$F$$$J$$$b$N$K$O!"$=$N8e$K(B
+.Qq ?
+$B$,IU$1$i$l$^$9!#(B
 .It Ic debug Ar more | Ar less | Ar off
-Turn internal query program debugging on and off.
+$BLd$$9g$o$;%W%m%0%i%`$NFbIt$N%G%P%C%0$r%*%s$^$?$O%*%U$K$7$^$9!#(B
 .It Ic delay Ar milliseconds
-Specify a time interval to be added to timestamps included in requests
-which require authentication.
-This is used to enable (unreliable) server
-reconfiguration over long delay network paths or between machines whose
-clocks are unsynchronized.
-Actually the server does not now require
-timestamps in authenticated requests,
-so this command may be obsolete.
+$BG'>Z$r5a$a$k%j%/%(%9%H$K4^$^$l$k%?%$%`%9%?%s%W$K2C$($i$l$k;~4V4V3V$r(B
+$B;XDj$7$^$9!#$3$l$O!"D9$$CY1d$N$"$k%M%C%H%o!<%/7PO)$d;~7W$NF14|$7$F$$$J$$(B
+$B%^%7%s4V$G(B ($B?.Mj$G$-$J$$(B) $B%5!<%P$N:F@_Dj$,$G$-$k$h$&$K$9$k$?$a$K(B
+$B;H$o$l$^$9!#(B
+$B<B:]$K$O$b$&%5!<%P$OG'>Z%j%/%(%9%H$K$*$$$F%?%$%`%9%?%s%W$rMW5a$7$^$;$s$N$G!"(B
+$B$3$N%3%^%s%I$O$b$O$dMQ$$$i$l$J$$$+$b$7$l$^$;$s!#(B
 .It Ic host Ar hostname
-Set the host to which future queries will be sent.
-The
+$B:#8eLd$$9g$o$;$rAw$k%[%9%H$r;XDj$7$^$9!#(B
+$BM?$($k(B
 .Ar hostname
-supplied
-may be either a host name or a numeric
-address.
+$B$O!"%[%9%HL>$G$b?tCM%"%I%l%9$G$b$+$^$$$^$;$s!#(B
 .It Ic hostnames Ar yes | Ar no
-If
 .Ar yes
-is specified, host names are printed in information
-displays.
-If
+$B$,;XDj$5$l$k$H!">pJs$NI=<($N:]!"%[%9%HL>$,;HMQ$5$l$^$9!#(B
 .Ar no
-is given, numeric addresses are printed
-instead.
-The default is
-.Ar yes
-unless modified using the command line
+$B$,M?$($i$l$k$H!"Be$o$j$K?tCM%"%I%l%9$,;HMQ$5$l$^$9!#(B
+$B%3%^%s%I%i%$%s$N(B
 .Fl n
-switch.
+$B%9%$%C%A$K$h$C$FJQ$($i$l$F$$$J$1$l$P!"(B
+$B%G%U%)%k%H$O(B
+.Ar yes
+$B$K$J$j$^$9!#(B
 .It Ic keyid Ar keyid
-This command allows the specification of a key number to be used to
-authenticate configuration requests.
-This must correspond to a key
-number the server has been configured to use for this purpose.
+$B$3$N%3%^%s%I$G!"G'>Z@_(B$BDj%j%/%(%9%H$K;H$o$l$k%-!<HV9f$r;XDj$G$-$^$9!#(B
+$B$3$NHV9f$O!"$3$NL\E*$G;H$&$?$a$K%5!<%P$,@_Dj$7$?%-!<HV9f$KBP1~$7$F(B
+$B$$$J$1$l$P$J$j$^$;$s!#(B
 .It Ic ntpversion Ar 1 | Ar 2 | Ar 3 | Ar 4
-Set the NTP version number which
 .Nm
-claims in packets.
-Defaults to 3.
-Note that mode 6 control messages
-(and modes, for that matter)
-didn't exist in NTP version 1.
-There appear to be no servers left which demand version 1.
+$B$,%Q%1%C%H$NCf$G<+>N$9$k(B NTP $B$N%P!<%8%g%sHV9f$r%;%C%H$7$^$9!#(B
+$B%G%U%)%k%H$G$O(B 3 $B$K$J$j$^$9!#(B
+$B%b!<%I(B 6 $B@)8f%a%C%;!<%8(B ($B>\$7$/8@$&$H%b!<%I$b(B) $B$O!"(B 
+NTP $B%P!<%8%g%s(B 1 $B$K$OB8:_$7$J$+$C$?$3$H$KCm0U$7$F$/$@$5$$!#(B
+$B%P!<%8%g%s(B 1 $B$rI,MW$H$9$k%5!<%P$O;D$C$F$$$J$$$h$&$G$9$,!#(B
 .It Ic quit
-Exit
-.Nm Ns .
+.Nm
+$B$r=*N;$7$^$9!#(B
 .It Ic passwd
-This command prompts you to type in a password (which will not be
-echoed) which will be used to authenticate configuration requests.
-The
-password must correspond to the key configured for use by the NTP server
-for this purpose if such requests are to be successful.
+$B$3$N%3%^%s%I$O!"G'>Z@_Dj%j%/%(%9%H$K;H$o$l$k%Q%9%o!<%I$NF~NO(B
+($B2hLL$KI=<($5$l$^$;$s(B) $B$r5a$a$k%W%m%s%W%H$r=P$7$^$9!#(B
+$B$3$N%j%/%(%9%H$,@.8y$9$k$?$a$K$O!"(BNTP $B%5!<%P$,G'>Z$N$?$a$K;H$&$h$&(B
+$B@_Dj$7$?%-!<$K!"%Q%9%o!<%I$,BP1~$7$F$$$J$1$l$P$J$j$^$;$s!#(B
 .It Ic raw
-Cause all output from query commands
-to be printed as received from the remote server.
-The only formatting and intepretation done on the data is to
-transform non-ASCII data into a printable (but barely understandable)
-form.
+$BLd$$9g$o$;%3%^%s%I$KBP$9$k$9$Y$F$N=PNO$r!"%j%b!<%H%5!<%P$+$i<u$1<h$C$?(B
+$BDL$j$K=PNO$7$^$9!#(B
+$B%G!<%?$KBP$7$F9T$J$o$l$kM#0l$N@07A$H2r<a$O!"0u;z$G$-$k(B
+($B$7$+$7$a$C$?$KM}2r$G$-$J$$(B) $B7A$K$J$k$h$&$K!"(BASCII $BJ8;z$G$J$$%G!<%?$r(B
+$BJQ49$9$k$3$H$@$1$G$9!#(B
 .It Ic timeout Ar milliseconds
-Specify a timeout period for responses to server queries. The default
-is about 5000 milliseconds.
-Note that since
+$B%5!<%P$X$NLd$$9g$o$;$KBP$9$k1~Ez$N@)8B;~4V$r;XDj$7$^$9!#%G%U%)%k%H(B
+$B$O!"Ls(B 5000 $B%_%jIC$G$9!#(B
 .Nm
-retries each query once after a timeout, the total waiting time for a
-timeout will be twice the timeout value set.
+$B$O$=$l$>$l$NLd$$9g$o$;$KBP$7$F;~4V@Z$l$rBT$C$?$"$H:F;n9T$9$k$?$a!"(B
+$B9g7W$NBT$A;~4V$O@_Dj$5$l$?@)8B;~4V$NCM$N(B 2 $BG\$K$J$k$3$H$KCm0U$7$F$/$@$5$$!#(B
 .El
-.Ss Control Message Commands
-Each peer known to an NTP server has a 16 bit integer
-association identifier
-assigned to it.
-NTP control messages which carry peer variables must
-identify the peer the values correspond to by including its association
-ID.
-An association ID of 0 is special, and indicates the variables are
-system variables, whose names are drawn from a separate name space.
+.Ss $B@)8f%a%C%;!<%8%3%^%s%I(B
+$B$"$k(B NTP $B%5!<%P$,CN$C$F$$$k3F(B peer $B$K$O!"(B
+$B%"%=%7%(!<%7%g%sHV9f(B
+(association identifier)
+$B$H$$$&(B 16 $B%S%C%H@0?t$,3d$jEv$F$i$l$F$$$^$9!#(B
+peer $BJQ?t$r;H$&(B NTP $B@)8f%a%C%;!<%8$O!"(B
+$B%"%=%7%(!<%7%g%sHV9f$r4^$a$k$3$H$K$h$C$F!"(B
+$B$=$NCM$,BP1~$9$k(B peer $B$r<1JL$7$J$1$l$P$J$j$^$;$s!#(B
+0 $B$H$$$&%"%=%7%(!<%7%g%sHV9f$OFCJL$G!"(B
+$B$=$NJQ?t$,%7%9%F%`JQ?t$G$"$k$3$H$rI=$7$^$9!#(B
+$B%7%9%F%`JQ?t$NL>A0$O!"FHN)$7$?L>A06u4V$+$i<h$j$@$5$l$^$9!#(B
 .Pp
-Control message commands result in one or more NTP mode 6 messages being
-sent to the server, and cause the data returned to be printed in some
-format.
-Most commands currently implemented send a single message and
-expect a single response.
-The current exceptions are the
+$B@)8f%a%C%;!<%8%3%^%s%I$O!"(B
+$B%5!<%P$K(B 1 $B$D0J>e$N(B NTP $B%b!<%I(B 6 $B%a%C%;!<%8$rAw$j!"(B
+$BLa$C$F$-$?%G!<%?$r2?$i$+$N=q<0$G=PNO$7$^$9!#(B
+$B8=:_<BAu$5$l$F$$$k$[$H$s$I$N%3%^%s%I$O!"(B
+1 $B$D$N%a%C%;!<%8$rAw$C$F!"(B1 $B$D$N1~Ez$r<u$1<h$j$^$9!#(B
+$B:#$N$H$3$mNc30$O!"I,MW$J%G!<%?$rF@$k$?$a$K$"$i$+$8$a%W%m%0%i%`$5$l$?0lO"$N(B
+$B%a%C%;!<%8$rAw$k(B
 .Ic peers
-command,
-which will send a preprogrammed series of messages to obtain
-the data it needs, and the
+$B%3%^%s%I$H!"(B
+$B%"%=%7%(!<%7%g%s$r1[$($?HO0O$G7+$jJV$9(B
 .Ic mreadlist
-and
+$B$H(B
 .Ic mreadvar
-commands, which will iterate over a range of associations.
+$B%3%^%s%I$G$9!#(B
 .Bl -tag -width indent
 .It Ic associations
-Obtains and prints a list of association identifiers and peer statuses
-for in-spec peers of the server being queried.
-The list is printed in columns.
-The first of these is an index numbering the associations from
-1 for internal use, the second the actual association identifier
-returned by the server and the third the status word for the peer.
-This is followed by a number of columns
-containing data decoded from the status word.
-Note that the data returned by the 
+$BLd$$9g$o$;BP>]$N%5!<%P$N5,3JFb(B (in-spec) $B$N(B peer $B$K$D$$$F$N!"(B
+$B%"%=%7%(!<%7%g%sHV9f$H(B peer $B$N>uBV$N0lMw$rF@$F=PNO$7$^$9!#(B
+$B0lMw$OJ#?t$NMs$+$i@.$C$F$$$^$9!#(B
+$B:G=i$NMs$O!"FbIt;HMQ$N$?$a$K(B 1 $B$+$i?6$C$?%"%=%7%(!<%7%g%s$N:w0zHV9f(B (index)$B!"(B
+2 $BHVL\$O%5!<%P$+$iJV$C$FMh$?<B:]$N%"%=%7%(!<%7%g%sHV9f!"(B
+3 $BHVL\$O(B peer $B$N>uBV%o!<%I$G$9!#(B
+$B$=$N8e$K!">uBV%o!<%I$r%G%3!<%I$7$?%G!<%?$r4^$`Ms$,$$$/$D$+B3$-$^$9!#(B
 .Ic associations
-command is cached internally in
-.Nm Ns .
-The index is then of use when dealing with stupid servers which use
-association identifiers which are hard for humans to type, in that for
-any subsequent commands which require an association identifier as an
-argument, the form
+$B%3%^%s%I$K$h$C$FJV$5$l$?%G!<%?$O(B
+.Nm
+$B$NFbIt$G%-%c%C%7%e$5$l$k$H$$$&$3$H$KCm0U$7$F$/$@$5$$!#(B
+$B$3$N$?$a!":w0zHV9f$O!"(B
+$B?M4V$K$O$[$H$s$IBG$A9~$`$k$3$H$,$G$-$J$$%"%=%7%(!<%7%g%sHV9f$r;H$&(B
+$B6r$+$J%5!<%P$rAj<j$K$9$k$H$-$KLrN)$A$^$9!#(B
+$B$9$J$o$A!"(B
+$B$=$l0J9_$NG$0U$N%3%^%s%I$,0z?t$H$7$F%"%=%7%(!<%7%g%sHV9f$rI,MW$H$9$k$H$-$K!"(B
+$BBe$o$j$K(B
 .Dq Li &index
-may be used as an alternative.
+$B$H$$$&7A$r;H$&$3$H$,$G$-$^$9!#(B
 .\"
 .\" XXX Both variable_name and value below should be arguments,
 .\"	not angle-quoted text.
@@ -317,57 +310,55 @@
 .Op = Ns Aq value Ns
 .Op ,...]
 .Xc
-Requests that a list of the server's clock variables be sent.
-Servers which have a radio clock
-or other external synchronization will respond positively to this.
-If the association identifier is omitted or zero the
-request is for the variables of the
-.Qq system clock
-and will
-generally get a positive response from all servers with a clock.
-If the server treats clocks as pseudo-peers,
-and hence can possibly have more than one clock connected at once,
-referencing the appropriate peer association ID
-will show the variables of a particular clock.
-Omitting the variable list
-will cause the server to return a default variable display.
-.It Ic lassocations
-Obtains and prints a list of association identifiers and peer statuses
-for all associations for which the server is maintaining state.
-This command differs from the
+$B%5!<%P$N;~7WJQ?t(B (clock variable) $B$N0lMw$rAw$k$h$&$KMW5a$7$^$9!#(B
+$B%i%8%*;~7W$dB>$N30ItF14|5!9=$r;}$C$F$$$k%5!<%P$O!"(B
+$B$3$N%3%^%s%I$K9NDjE*$K1~Ez$7$^$9!#(B
+$B%"%=%7%(!<%7%g%sHV9f$,>JN,$5$l$k$+(B 0 $B$@$H!"(B
+$B%j%/%(%9%H$O(B
+.Qq $B%7%9%F%`;~7W(B
+$B$NJQ?t$KBP$9$k$b$N$H$J$j!"(B
+$B0lHL$K!";~7W$r;}$D$9$Y$F$N%5!<%P$+$i9NDjE*$J1~Ez$,F@$i$l$k$G$7$g$&!#(B
+$B%5!<%P$,;~7W$r5<;wE*$J(B peer $B$H$7$F07$$!"(B
+$B7k2L$H$7$F0lEY$K(B 2 $B$D0J>e$N;~7W$r@\B3$9$k$3$H$,$G$-$k$h$&$K$J$C$F$$$l$P!"(B
+$BE,@Z$J(B peer $B$N%"%=%7%(!<%7%g%sHV9f$r;2>H$9$l$P(B
+$BFCDj$N;~7W$NJQ?t$,I=<($5$l$^$9!#(B
+$BJQ?t$N%j%9%H$r>JN,$9$k$H!"%5!<%P$O%G%U%)%k%H$NJQ?t$NI=<($r(B
+$BJV$9$3$H$K$J$j$^$9!#(B
+.\" assocation -> association (send-pr docs/17501)
+.It Ic lassociations
+$B%5!<%P$,>uBV$rJ];}$7$F$$$k$9$Y$F$N%"%=%7%(!<%7%g%s$K$D$$$F(B
+$B%"%=%7%(!<%7%g%sHV9f$H(B peer $B$N>uBV$N0lMw$rF@$F!"=PNO$7$^$9!#(B
+$B$3$N%3%^%s%I$H(B
 .Ic associations
-command only for servers
-which retain state for out-of-spec client associations
-(i.e.  fuzzballs).
-Such associations are normally omitted from the display when
-the
+$B%3%^%s%I$O!"(B
+$B5,3J30(B (out-of-spec) $B$N%/%i%$%"%s%H$N%"%=%7%(!<%7%g%s(B
+$B$N>uBV$rJ];}$9$k%5!<%P(B ($B$D$^$j(B fuzzball) $B$N>l9g$K$@$10[$J$j$^$9!#(B
 .Ic associations
-command is used, but are included in the
-output of
-.Ic lassociations Ns .
+$B%3%^%s%I$,;H$o$l$?$H$-!"DL>o$=$&$$$&4X78$O(B
+$BI=<($+$i>JN,$5$l$^$9$,!"(B
+.Ic lassociations
+$B$N=PNO$K$O4^$^$l$^$9!#(B
 .It Ic lpassociations
-Print data for all associations, including out-of-spec client
-associations, from the internally cached list of associations.
-This command differs from
+$B5,3J30(B (out-of-spec) $B$N%/%i%$%"%s%H$H$N%"%=%7%(!<%7%g%s$r4^(B$B$`(B
+$BA4$F$N%"%=%7%(!<%7%g%s$K4X$9$k%G!<%?$r!"(B
+$BFbIt$K%-%c%C%7%e$5$l$?%"%=%7%(!<%7%g%s$N0lMw$+$i=PNO$7$^$9!#(B
+$B$3$N%3%^%s%I$O!"(Bfuzzball $B$r07$&>l9g$@$1!"(B
 .Ic passociations
-only when dealing with fuzzballs.
+$B$H0[$J$j$^$9!#(B
 .It Ic lpeers
-Like
-.Ic peers ,
-except a summary of all associations for which the server is maintaining
-state is printed.
-This can produce a much longer list of peers from
-fuzzball servers.
+.Ic peers
+$B$H;w$F$$$^$9$,!"(B
+$B%5!<%P$,>uBV$rJ];}$7$F$$$k$9$Y$F$N%"%=%7%(!<%7%g%s$N35MW$r=PNO$7$^$9!#(B
+$B$3$l$O(B fuzzball $B%5!<%P$N!"$h$jD9$$(B peer $B$N%j%9%H$r@8@.$9$k$3$H$,$"$j$^$9!#(B
 .It Ic mreadlist Ar assocID assocID
 .It Ic mrl Ar assocID assocID
-Like the
 .Ic readlist
-command except the query is done for each of a range of (nonzero)
-association IDs.
-This range is determined from the association list
-cached by the most recent
+$B%3%^%s%I$H;w$F$$$^$9$,!"(B
+$BLd$$9g$o$;$r(B (0 $B$G$J$$(B) $B%"%=%7%(!<%7%g%sHV9f$NHO0O$N$=$l$>$l$K(B
+$B9T$J$$$^$9!#(B
+$B$3$3$G8@$&HO0O$O!"D>A0$K<B9T$5$l$?(B
 .Ic associations
-command.
+$B%3%^%s%I$G%-%c%C%7%e$5$l$?%"%=%7%(!<%7%g%s$N0lMw$+$i7h$a$i$l$^$9!#(B
 .It Xo Ic mreadvar
 .Ar assocID assocID [
 .Aq variable_name Ns
@@ -380,160 +371,156 @@
 .Op = Ns Aq value Ns
 .Op ,...]
 .Xc
-Like the
 .Ic readvar
-command except the query is done for each of a range of (nonzero)
-association IDs. This range is determined from the association list
-cached by the most recent
+$B%3%^%s%I$H;w$F$$$^$9$,!"(B
+$BLd$$9g$o$;$r(B (0$B$G$J$$(B) $B%"%=%7%(!<%7%g%sHV9f$NHO0O$N$=$l$>$l$K(B
+$B9T$J$$$^$9!#(B
+$B$3$3$G8@$&HO0O$O!"D>A0$K<B9T$5$l$?(B
 .Ic associations
-command.
+$B%3%^%s%I$G%-%c%C%7%e$5$l$?%"%=%7%(!<%7%g%s$N0lMw$+$i7h$a$^$i$l$9!#(B
 .It Ic opeers
-An old form of the
+$B8E$$7A<0$N(B
 .Ic peers
-command with the reference ID
-replaced by the local interface address.
+$B%3%^%s%I$G!"(B
+$B;2>H(B ID $B$NBe$o$j$K%m!<%+%k$N%$%s%?%U%'!<%9%"%I%l%9$r;HMQ$7$^$9!#(B
 .It Ic passociations
-Print association data concerning in-spec peers from the internally
-cached list of associations.
-This command performs identically to the
+$BFbIt$G%-%c%C%7%e$5$l$?%"%=%7%(!<%7%g%s$N0lMw$+$i!"(B
+$B5,3JFb(B (in-spec) $B$N(B peer $B$K4X$9$k(B 
+$B%"%=%7%(!<%7%g%s$N%G!<%?$r=PNO$7$^$9!#(B
+$B$3$N%3%^%s%I$O!"?7$7$$Ld$$9g$o$;$r$9$k$N$G$O$J$/(B
+$BFbIt$KC_$($i$l$?%G!<%?$rI=<($9$k$H$$$&$3$H$r=|$1$P!"(B
 .Ic associations
-except that it displays the internally stored
-data rather than making a new query.
+$B$HF1$8$KF/$-$^$9!#(B
 .It Ic peers
-Obtains a list of in-spec peers of the server, along with a summary of
-each peer's state.
-Summary information includes the address of the
-remote peer, the reference ID (0.0.0.0 if this is unknown), the
-stratum of the remote peer, the type of the peer (local, unicast,
-multicast or broadcast), when the last packet was received, the polling
-interval, in seconds, the reachability register, in octal, and the
-current estimated delay, offset and dispersion of the peer, all in
-milliseconds.
+$B%5!<%P$N5,3JFb$N(B peer $B$N0lMw$r!"3F(B peer $B$N>uBV$N35MW$H6&$KF@$^$9!#(B
+$B35MW$N>pJs$K$O!"%j%b!<%H(B peer $B$N%"%I%l%9!"(B
+$B;2>H(B ID ($BITL@$N$H$-$O(B 0.0.0.0)$B!"(B
+$B%j%b!<%H(B peer $B$N3,AX(B (stratum)$B!"(B
+peer $B$N<oN`(B
+($B%m!<%+%k!"%f%K%-%c%9%H!"%^%k%A%-%c%9%H!"%V%m!<%I%-%c%9%H$N$$$:$l$+(B)$B!"(B
+$B:G8e$N%Q%1%C%H$r<u?.$7$?;~4V!"(B
+$BICC10L$N%]!<%j%s%04V3V!"(B
+8 $B?J?tI=5-$NE~C#2DG=@-%l%8%9%?(B
+$B$=$7$F!"$=$N(B peer $B$K4X$9$k(B
+peer $B$NCY$l!"%*%U%;%C%H!"$P$i$D$-$NIC$GI=$7$?8=:_$N?dDjCM$r4^$s$G$$$^$9!#(B
 .Pp
-The character in the left margin indicates the fate of this peer in the
-clock selection process.
-Following is a list of these characters,
-the pidgeon used in the
+$B:8C<$NJ8;z$O!";~7WA*Br=hM}$K$*$1$k$3$N(B peer $B$N1?L?$r<($7$^$9!#(B
+$B0J2<$O$3$l$i$NJ8;z$N%j%9%H$H!"(B
 .Ic rv
-command,
-and a short explanation of the condition revealed.
+.\" pidgeon $B"+(B pidgin ?  $B$b$H$b$H8mMQ$J$N$G<-=q$K:\$C$F$J$$DV$G$b$$$$$3$H$K(B
+.\" $B$9$k(B
+$B%3%^%s%I$G;HMQ$5$l$kJR8@$N1Q8l!"$*$h$S(B
+$B>uBV$rL@$i$+$K$9$kC;$$@bL@J8$G$9!#(B
 .Bl -tag -width indent
-.It space
+.It $B6uGr(B
 .Pq reject
-The peer is discarded as unreachable,
-synchronized to this server (synch loop)
-or outrageous synchronization distance.
+peer $B$OE~C#$G$-$J$$$+!"$3$N%5!<%P$KF14|$7$F$$$k$+(B ($BF14|%k!<%W(B)$B!"$"$k$$$O(B
+$BL5Cc$JF14|(B$B5wN%$N$?$a$K<N$F$i$l$^$7$?!#(B
 .It x
 .Pq falsetick
-The peer is discarded by the intersection algorithm
-as a falseticker.
+peer $B$O8r:9%"%k%4%j%9%`$K$h$j56;~7W$H$7$F<N$F$i$l$^$7$?!#(B
 .It .
 .Pq excess
-The peer is discarded as not among the first ten peers
-sorted by synchronization distance
-and so is probably a poor candidate for further consideration.
+peer $B$OF14|5wN%$K$h$C$FJB$Y49$($i$l$?$J$+$G!"(B
+$B:G=i$N(B 10 peer $B$KF~$i$J$+$C$?$?$a<N$F$i$l$^$7$?!#(B
+$B$3$N$?$a$3$l0J>e8!F$$9$k$K$OIT==J,$J8uJd$G$9!#(B
 .It -
 .Pq outlyer
-The peer is discarded by the clustering algorithm as an outlyer.
+peer $B$O%/%i%9%?%j%s%0%"%k%4%j%:%`$K$h$j1s$/$K$"$k$b$N$H$7$F<N$F$i$l$^$7$?!#(B
 .It +
 .Pq candidate
-The peer is a survivor and a candidate for the combining algorithm.
+peer $B$O@8$-;D$j!"7k9g%"%k%4%j%:%`$X$N8uJd$H$J$j$^$7$?!#(B
 .It #
 .Pq selected
-The peer is a survivor,
-but not among the first six peers sorted by synchronization distance.
-If the assocation is ephemeral,
-it may be demobilized to conserve resources.
+peer $B$O@8$-;D$j$^$7$?$,!"(B
+$BF14|5wN%$K$h$C$FJB$Y49$($i$l$?$J$+$G:G=i$N(B 6 peer $B$KF~$j$^$;$s$G$7$?!#(B
+$BO"9g$,C;L?$@$C$?>l9g!"%j%=!<%9$r@aLs$9$k$?$a$KI|3h$5$;$i$l$k$+$b$7$l$^$;$s!#(B
+.\" assocation -> association (send-pr docs/17501)
 .It *
-.Pq sys.peer
-The peer has been declared the system peer
-and lends its variables to the system variables.
+.Pq sys.peer 
+peer $B$O%7%9%F%`(B peer $B$H$7$F@k8@$5$l$F$*$j!"(B
+$B$=$NJQ?t$r%7%9%F%`JQ?t$KM?$($F$$$^$9!#(B
 .It o
 .Pq pps.peer
-The peer has been declared the system peer
-and lends its variables to the system variables.
-However, the actual system synchronization
-is derived from a pulse-per-second (PPS) signal,
-either indirectly via the PPS reference clock driver
-or directly via kernel interface.
+peer $B$O%7%9%F%`(B peer $B$H$7$F@k8@$5$l$F$*$j!"(B
+$B$=$NJQ?t$r%7%9%F%`JQ?t$KM?$($F$$$^$9!#(B
+$B$7$+$7!"%7%9%F%`$N<B:]$NF14|$O(B
+1 $BIC$4$H$N%Q%k%9(B (PPS) $B;2>H;~7W%I%i%$%P$h$j4V@\E*$K!"(B
+$B$"$k$$$O%+!<%M%k%$%s%?%U%'!<%9$h$jD>@\!"(B
+PPS $B?.9f$GF@$F$$$^$9!#(B
 .El
 .Pp
-The flash variable is not defined in the NTP specification,
-but is included as a valuable debugging aid.
-It displays the results of the packet sanity checks
-defined in the NTP specification TEST1 through TEST9.
-The bits for each test read in increasing sequency
-from the least significant bit
-and are defined as follows.
+flash $BJQ?t$O(B NTP $B;EMM=q$G$ODj5A$5$l$F$$$^$;$s$,!"(B
+$B%G%P%C%0$r=u$1$k5.=E$J$b$N$H$7$F4^$a$i$l$F$$$^$9!#(B
+$B$3$NJQ?t$O(B NTP $B;EMM=q$G(B TEST1 $B$+$i(B TEST9 $B$^$GDj5A$5$l$F$$$k(B
+$B%Q%1%C%H@55$%A%'%C%/$N7k2L$rI=<($7$^$9!#(B
+$B3F%F%9%H$N%S%C%H$O:G$b=EMW$G$J$$%S%C%H$+$i=gHV$KA}$(!"(B
+$B$^$?0J2<$N$h$&$KDj5A$5$l$F$$$^$9!#(B
 .Pp
-The following TEST1 through TEST4 enumerate procedure errors.
-The packet timestamps may or may not be believed,
-but the remaining header data are ignored.
+$B0J2<$N(B TEST1 $B$+$i(B TEST4 $B$O=gHV%(%i!<$rNs5s$7$^$9!#(B
+$B%Q%1%C%H$N%?%$%`%9%?%s%W$O?.MQ$5$l$?$j$5$l$J$+$C$?$j$7$^$9$,!"(B
+$B;D$C$F$$$k%X%C%@%G!<%?$OL5;k$5$l$^$9!#(B
 .Bl -tag -width indent
 .It TEST1
-Duplicate packet.
-A copy from somewhere.
+$B%Q%1%C%H$,=EJ#$7$F$$$^$9!#(B
+$B$I$3$+$+$i$N%3%T!<$G$9!#(B
 .It TEST2
-Bogus packet.
-It is not a reply to a message previously sent.
-This can happen when the NTP daemon is restarted
-and before a peer notices.
+$B>iD9$J%Q%1%C%H$G$9!#(B
+$B0JA0Aw$C$?%a%C%;!<%8$KBP$9$kJVEz$G$O$"$j$^$;$s!#(B
+NTP $B%G!<%b%s$,:F5/F0$7$5$l$F$*$j!"$^$?(B peer $B$,DLCN$9$kA0$@$C$?$H$-$K(B
+$B5/$3$j$^$9!#(B
 .It TEST3
-Unsynchronized.
-One or more timestamp fields are missing.
-This normally happens when the first packet from a peer is received.
+$BF14|$7$F$$$^$;$s!#(B
+1 $B$D0J>e$N%?%$%`%9%?%s%W!&%U%#!<%k%I$,$"$j$^$;$s!#(B
+$BDL>o!"(Bpeer $B$+$i$N:G=i$N%Q%1%C%H$,<u$1$H$i$l$?;~$K5/$3$j$^$9!#(B
 .It TEST4
-Either peer delay or peer dispersion is greater than one second.
-You must be joking.
+peer $B$NCY1d$^$?$O(B peer $B$N$P$i$D$-$N$I$A$i$+$,(B 1 $BIC$h$j$bD9$$$G$9!#(B
+$B>iCL$O$d$a$F$/$@$5$$!#(B
 .El
 .Pp
-The following TEST5 through TEST10
-enumerate errors in the packet header.
-The packet is discarded without inspecting its contents.
+$B0J2<$N(B TEST5 $B$+$i(B TEST10 $B$O%Q%1%C%H%X%C%@$N%(%i!<$rNs5s$7$^$9!#(B
+$B%Q%1%C%H$OCf?H$rD4$Y$k$3$H$J$/<N$F(B$B$i$l$^$9!#(B
 .Bl -tag -width indent
 .It TEST5
-Cryptographic authentication fails.
-See the
-.Qq Authentication Support
-section of the
+$B0E9fG'>Z$K<:GT$7$^$7$?!#(B
 .Xr ntp.conf 5
-page.
+$BJ8=q$N(B
+.Qq $BG'>Z%5%]!<%H(B
+$B@a$r;2>H$7$F$/$@$5$$!#(B
 .It TEST6
-Peer is unsynchronized.
-Wind up its clock first.
+peer $B$OF14|$7$F$$$^$;$s!#(B
+$B@h$K(B peer $B$N;~7W$N%M%8$r4,$$$F$/$@$5$$!#(B
 .It TEST7
-Peer stratum is greater than 15.
-The peer is probably unsynchronized.
+peer $B$N3,AX(B (stratum) $B$,(B 15 $B$h$j$bBg$-$$$G$9!#(B
+peer $B$O$*$=$i$/F14|$7$F$$$^$;$s!#(B
 .It TEST8
-Either root delay or root dispersion is greater than one second.
-Too far from home.
+root $B$NCY1d$^$?$O(B root $B$N$P$i$D$-$,(B 1 $BIC$h$j$bD9$$$G$9!#(B
+$B2H$+$i1s$9$.$^$9!#(B
 .It TEST9
-Peer cryptographic authentication fails.
-Either the key identifier or key is wrong
-or somebody trashed our packet.
+peer $B$N0E9fG'>Z$K<:GT$7$^$7$?!#(B
+key $B<1JL;R$^$?$O(B key $B$,4V0c$C$F$$$k$+!"C/$+$,%Q%1%C%H$r2u$7$F$$$^$9!#(B
 .It TEST10
-Access is denied.
-See the
-.Qq Access Control Support
-section of the
+$B%"%/%;%9$,5qH]$5$l$^$7$?!#(B
 .Xr ntp.conf 5
-page.
+$BJ8=q$N(B
+.Qq $B%"%/%;%9@)8f%5%]!<%H(B
+$B@a$r;2>H$7$F$/$@$5$$(B
 .El
 .It Ic pstatus Ar assocID
-Send a read status request to the server for the given association.
-The names and values of the peer variables returned will be printed.
-Note that the status word from the header is displayed preceding the
-variables, both in hexadecimal and in pidgeon English.
+$BM?$($i$l$?%"%=%7%(!<%7%g%s$KBP1~$9$k%5!<%P$KBP$7!"(B
+$B>uBVFI$_<h$j%j%/%(%9%H$rAw$j$^$9!#(B
+$BJV$5$l$?(B peer $BJQ?t$NL>A0$HCM$r=PNO$7$^$9!#(B
+$BJQ?t$NA0$K!"%X%C%@$+$iF@$?>uBV%o!<%I$,(B 16 $B?J?t$HJR8@$N1Q8l$G(B
+$BI=<($5$l$k$3$H$KCm0U$7$F$/$@$5$$!#(B
 .It Ic readlist Op Ar assocID
 .It Ic rl Op Ar assocID
-Requests that the values of the variables in the internal variable list
-be returned by the server.
-If the association ID is omitted or is 0
-the variables are assumed to be system variables.
-Otherwise they are treated as peer variables.
-If the internal variable list is empty a request is
-sent without data, which should induce the remote server to return a
-default display.
+$BFbItJQ?t%j%9%H$NCf$NJQ?t$NCM$rJV$9$h$&$K%5!<%P$KMW5a$7$^$9!#(B
+$B%"%=%7%(!<%7%g%sHV9f$,>JN,$5$l$k$+(B 0 $B$N>l9g!"(B
+$BJQ?t$O%7%9%F%`JQ?t$G$"$k$H$_$J$5$l$^$9!#(B
+$B$=$&$G$J$1$l$P!"(B peer $BJQ?t$H$7$F07$o$l$^$9!#(B
+$BFbIt$NJQ?t%j%9%H$,6u$N>l9g$O!"(B
+$B%j%/%(%9%H$O%G!<%?L5$7$GAw$i$l$^$9!#(B
+$B$3$l$O!"%j%b!<%H%5!<%P$K%G%U%)%k%H$N%G%#%9%W%l%$$rJV$5$;$^$9!#(B
 .\"
 .\" XXX Both variable_name and value below should be arguments,
 .\"	not angle-quoted text.
@@ -550,45 +537,45 @@
 .Op = Ns Aq value Ns
 .Op ,...]
 .Xc 
-Requests that the values of the specified variables be returned by the
-server by sending a read variables request.
-If the association ID is
-omitted or is given as zero the variables are system variables,
-otherwise they are peer variables and the values returned will be those
-of the corresponding peer.
-Omitting the variable list will send a
-request with no data which should induce the server to return a default
-display.
+$BJQ?tFI$_<h$j%j%/%(%9%H$rAw$k$3$H$G!"(B
+$B;XDj$7$?JQ?t$NCM$rJV$9$h$&$K%5!<%P$KMW5a$7$^$9!#(B
+$B%"%=%7%(!<%7%g%sHV9f$r>JN,$9$k$+(B 0 $B$r;XDj$7$?>l9g!"(B
+$BJQ?t$O%7%9%F%`JQ?t$G$9!#(B
+$B$=$&$G$J$1$l$P(B peer $BJQ?t$G$"$j!"(B
+$BJV$5$l$kCM$OBP1~$9$k(B peer $B$N$b$N$H$J$j$^$9!#(B
+$BJQ?t$N%j%9%H$r>JN,$9$k$H!"%G!<%?L5$7$N%j%/%(%9%H$rAw$j$^$9!#(B
+$B$3$l$O!"%5!<%P$K%G%U%)%k%H$N%G%#%9%W%l%$$rJV$5$;$^$9!#(B
 .It Xo Ic writevar
 .Ar assocID
 .Aq variable_name Ns
 .Pf = Ns Aq value Ns
 .Op ,...
 .Xc
-Like the
 .Ic readvar
-request, except the specified variables are written instead of read.
+$B%j%/%(%9%H$H;w$F$$$^$9$,!"(B
+$B;XDj$7$?JQ?t$rFI$_<h$kBe$o$j$K=q$-9~$_$^$9!#(B
 .It Ic writelist Op Ar assocID
-Like the
-.Ic readlist
-request, except the internal list variables are written instead of read.
+.Em readlist
+$B%j%/%(%9%H$H;w$F$$$^$9$,!"(B
+$BFbIt$N%j%9%H$NJQ?t$rFI$_<h$kBe$o$j$K=q$-9~$_$^$9!#(B
 .El
-.Sh SEE ALSO
+.Sh $B4XO"9`L\(B
 .Xr ntp.conf 5 ,
 .Xr ntpd 8 ,
 .Xr ntpdc 8
-.Sh HISTORY
-Written by
+.Sh $BNr;K(B
+Toronto $BBg3X$N(B
 .An Dennis Ferguson
-at the University of Toronto.
-.Sh BUGS
-The
+$B$K$h$C$F=q$+$l$^$7$?!#(B
+.Sh $B%P%0(B
 .Ic peers
-command is non-atomic and may occasionally result in spurious error
-messages about invalid associations occurring and terminating the
-command.
-The timeout time is a fixed constant, which means you wait a long time
-for timeouts since it assumes sort of a worst case.
-The program should
-improve the timeout estimate as it sends queries to a particular host,
-but doesn't.
+$B%3%^%s%I$OIT2DJ,(B (atomic) $B$G$O$J$$$?$a!"(B
+$BIT@5$J%"%=%7%(!<%7%g%s$H$$$&8m$C$?%(%i!<%a%C%;!<%8$,H/@8$7(B
+$B%3%^%s%I$,=*N;$9$k$3$H$,$"$j$^$9!#(B
+$B;~4V@Z$l$^$G$N;~4V$O8GDj$5$l$?Dj?t$G$9!#(B
+$B$3$l$O!"$"$k<o$N:G0-$N>l9g$r9M$($F$"$k$?$a!"(B
+$B;~4V@Z$l$K$J$k$^$GD9;~4VBT$?$5$l$k$3$H$K$J$j$^$9!#(B
+$B$3$N%W%m%0%i%`$O!"(B
+$BFCDj$N%[%9%H$X2?2s$bLd$$9g$o$;$rAw$k4V$K(B
+$B@)8B;~4V$N8+@Q$b$j$r2~A1$9$Y$-$G$9$,!"(B
+$B<B:]$K$O9T$J$C$F$$$^$;$s!#(B

--------------BA6F0746CAC5EAC3DDF16E61
Content-Type: text/plain; charset=iso-2022-jp;
 name="ntptime.8.diff"
Content-Transfer-Encoding: 8bit
Content-Disposition: inline;
 filename="ntptime.8.diff"

--- ntptime.8.orig	Tue Feb 15 22:53:15 2000
+++ ntptime.8	Tue Apr 11 10:47:57 2000
@@ -3,12 +3,13 @@
 .\"
 .Dd January 7, 2000
 .\" jpman %Id: ntptime.8,v 0.0 2000/02/06 08:09:52 horikawa Stab %
+.\" WORD: time constant		$B;~Dj?t(B
 .Dt NTPTIME 8
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm ntptime
-.Nd read kernel time variables
-.Sh SYNOPSIS
+.Nd $B%+!<%M%k$N;~9oJQ?t$rFI$_=P$9(B
+.Sh $B=q<0(B
 .Nm ntptime
 .Op Fl chr
 .Op Fl e Ar est_error
@@ -17,53 +18,50 @@
 .Op Fl o Ar offset
 .Op Fl s Ar status
 .Op Fl t Ar time_constant
-.Sh DESCRIPTION
-This program is useful only with special kernels
-described in the
+.Sh $B2r@b(B
+$B$3$N%W%m%0%i%`$O(B
 .Qo
-A Kernel Model for Precision Timekeeping
+$B9b@:EY$J;~9oJ];}$N$?$a$N%+!<%M%k%b%G%k(B
 .Qc
-page
-(available as part of the HTML documentation
-provided in
-.Pa /usr/share/doc/ntp ) .
-It reads and displays time-related kernel variables
-using the
+$BJ8=q(B (
+.Pa /usr/share/doc/ntp
+$B$K$"$k(B HTML $BJ8=q$N0lIt(B)
+$B$K5-:\$5$l$F$$$kFCJL$J%+!<%M%k$KBP$7$FMQ$$$k;~$K$N$_!"Lr$KN)$A$^$9!#(B
+$B$3$N%W%m%0%i%`$O$b$7;HMQ2DG=$G$"$l$P%7%9%F%`%3!<%k(B
 .Xr ntp_gettime 2
-and
+$B$H(B
 .Xr ntp_adjtime 2
-system calls if available.
-A similar display can be obtained using the
+$B$rMQ$$$F;~9o$K4X$9$k%+!<%M%kJQ?t$rFI$_=P$7$FI=<($7$^$9!#(B
+$B;w$?$h$&$JI=<($O(B
 .Xr ntpdc 8
-program's
+$B%W%m%0%i%`$N(B
 .Ic kerninfo
-command.
-The following options are available:
+$B%3%^%s%I$r;HMQ$9$k$3$H$K$h$jF@$i$l$^$9!#(B
+$B0J2<$N%*%W%7%g%s$,;HMQ2DG=$G$9(B:
 .Bl -tag -width indent
 .It Fl c
-Display the execution time of
 .Nm
-itself.
+$B$N<B9T;~9o<+?H$rI=<($7$^$9!#(B
 .It Fl e Ar est_error
-Specify estimated error, in microseconds.
+$B?dDj8m:9$r%^%$%/%mIC$G;XDj$7$^$9!#(B
 .It Fl f Ar frequency
-Specify frequency offset, in parts per million.
+$B<~GH?t%*%U%;%C%H$r(B 100 $BK|J,$N(B 1 $B$G;XDj$7$^$9!#(B
 .It Fl h
-Display times in Unix timeval format.
-Default is NTP format.
+$B;~9o$r(B Unix $B$N(B timeval $B7A<0$GI=<($7$^$9!#(B
+$B%G%U%)%k%H$G$O(B NTP $B7A<0$G$9!#(B
 .It Fl l
-Specify the leap bits as a code from 0 to 3.
+$B%j!<%W%S%C%H$r(B 0 $B$+$i(B 3 $B$N%3!<%I$G;XDj$7$^$9!#(B
 .It Fl m Ar max_error
-Display help information.
+$B%X%k%W>pJs$rI=<($7$^$9!#(B
 .It Fl o Ar offset
-Specify clock offset, in microseconds.
+$B;~7W$N%*%U%;%C%H$r%^%$%/%mIC$G;XDj$7$^$9!#(B
 .It Fl r
-Display Unix and NTP times in raw format.
+Unix $B$*$h$S(B NTP $B;~9o$r(B raw $B7A<0$GI=<($7$^$9!#(B
 .It Fl s Ar status
 .It Fl t Ar time_constant
-Specify time constant, an integer in the range 0-4.
+$B;~Dj?t$r(B 0 $B$+$i(B 4 $B$N@0?t$G;XDj$7$^$9!#(B
 .El
-.Sh SEE ALSO
+.Sh $B4XO"9`L\(B
 .Xr ntp_adjtime 2 ,
 .Xr ntp_gettime 2 ,
 .Xr ntpdc 8

--------------BA6F0746CAC5EAC3DDF16E61
Content-Type: text/plain; charset=iso-2022-jp;
 name="ntptrace.8.diff"
Content-Transfer-Encoding: 8bit
Content-Disposition: inline;
 filename="ntptrace.8.diff"

--- ntptrace.8.orig	Tue Feb 15 22:53:44 2000
+++ ntptrace.8	Mon Apr 10 23:45:23 2000
@@ -1,29 +1,33 @@
 .\"
 .\" $FreeBSD: src/usr.sbin/ntp/doc/ntptrace.8,v 1.1 2000/01/12 14:41:00 sheldonh Exp $
+.\" jpman %Id: ntptrace.8,v 1.3 1997/09/12 02:34:26 seki Stab %
 .\"
 .Dd January 6, 2000
 .\" jpman %Id: ntptrace.8,v 0.0 2000/02/06 08:09:52 horikawa Stab %
 .Dt NTPTRACE 8
 .Os
-.Sh NAME
+.Sh $BL>>N(B
 .Nm ntptrace
-.Nd trace a chain of NTP servers back to the primary source
-.Sh SYNOPSIS
+.Nd NTP $B%5!<%PO":?$r$?$I$j%W%i%$%^%j%=!<%9$^$GDI@W$9$k(B
+.Sh $B=q<0(B
 .Nm ntptrace
 .Op Fl vdn
 .Op Fl r Ar retries
 .Op Fl t Ar timeout
 .Op Ar server
-.Sh DESCRIPTION
-.Nm
-determines where a given Network Time Protocol (NTP) server gets
-its time from, and follows the chain of NTP servers back to their
-master time source.
-If given no arguments, it starts with
-.Dq localhost .
+.Sh $B2r@b(B
+.Nm 
+$B$O!"M?$($i$l$?(B
+$B%M%C%H%o!<%/%?%$%`%W%m%H%3%k(B (NTP) $B%5!<%P$,(B
+$B$I$3$+$i;~9o$r<hF@$9$k$N$+$r7hDj$7!"(B
+NTP $B%5!<%P$NO":?$r$?$I$C$F%^%9%?;~9o%=!<%9$^$GLa$j$^$9!#(B
+$B0z?t$,M?$($i$l$J$+$C$?$H$-$O!"(B
+.Dq localhost
+$B$+$i;O$a$^$9!#(B
 .Pp
-Here is an example of the output from
-.Nm Ns :
+$B0J2<$O!"(B
+.Nm
+$B$N=PNO$NNc$G$9(B:
 .Bd -literal
 % ntptrace
 localhost: stratum 4, offset 0.0019529, synch distance 0.144135
@@ -31,37 +35,38 @@
 usndh.edu: stratum 1, offset 0.0019298, synch distance 0.011993, refid 'WWVB'
 .Ed
 .Pp
-On each line, the fields are (left to right): the host name, the
-host stratum,
-the time offset between that host and the local host
-(as measured by
-.Nm Ns ;
-this is why it is not always zero for
-.Dq localhost ) ,
-the host
-synchronization distance ,
-and (only for stratum-1 servers) the reference clock ID.  All times
-are given in seconds.
-Note that the stratum is the server hop count to the primary source,
-while the synchronization distance is the estimated error
-relative to the primary source.
-These terms are precisely defined in RFC 1305.
+$B3F9T$N%U%#!<%k%I$O(B ($B:8$+$i1&$X(B) $B<!$N$h$&$K$J$j$^$9(B:
+$B%[%9%HL>!"%[%9%H$N3,AX(B (stratum)$B!"(B
+$B$=$N%[%9%H$H%m!<%+%k%[%9%H$N4V$N;~9o$N%*%U%;%C%H(B
+(
+.Nm
+$B$K$h$C$FB,Dj$5$l$?$b$N(B;
+$B$3$l$,(B
+.Dq localhost 
+$B$KBP$7$F$$$D$b(B 0 $B$K$J$k$H$O8B$i$J$$M}M3$G$9(B )$B!"(B
+$B%[%9%H$N(B
+$BF14|5wN%!"(B
+$B$=$7$F(B ($B3,AX$,(B 1 $B$N%5!<%P$N$_$G$9$,(B)$B!";2>H;~7W(B ID $B!#(B
+$B$9$Y$F$N;~4V$OICC10L$G$9!#(B
+$BF14|5wN%$H$O!";~7W$N;~9o$N@:EY$rB,$C$?$b$N$G$"$k$N$KBP$7$F!"(B
+$B3,AX$H$O%W%i%$%^%j%=!<%9$XBP$9$k%5!<%P$N%[%C%W?t$G$"$k$3$H$KCm0U$7$F$/$@$5$$!#(B
+$B$3$l$i$NMQ8l$O$^$5$K(B RFC 1305 $B$K$*$$$FDj5A$5$l$F$$$^$9!#(B
 .Pp
-The following options are available:
+$B0J2<$N%*%W%7%g%s$,;HMQ2DG=$G$9(B:
 .Bl -tag -width indent
 .It Fl d
-Turn on some debugging output.
+$B%G%P%C%0=PNO$r%*%s$K$7$^$9!#(B
 .It Fl n
-Turn off the printing of host names; instead, host IP addresses
-are given.  This may be necessary if a nameserver is down.
+$B%[%9%HL>$NI=<($r%*%U$K$7$^$9(B; $BBe$o$j$K!"%[%9%H$N(B IP $B%"%I%l%9$,(B
+$BI=<($5$l$^$9!#$3$l$O!"%M!<%`%5!<%P$,Mn$A$F$$$k$H$-$KI,MW$K$J$k$G$7$g$&!#(B
 .It Fl r Ar retries
-Set the number of retransmission attempts for each host; the default is 5.
+$B%[%9%HKh$N:FAw?.$N2s?t$r%;%C%H$7$^$9!#%G%U%)%k%H$O(B 5 $B$G$9!#(B
 .It Fl t Ar timeout
-Set the retransmission timeout (in seconds); the default is 2.
+$B:FAw?.$N@)8B;~4V(B ($BICC10L(B) $B$r%;%C%H$7$^$9!#%G%U%)%k%H(B $B$O(B 2 $B$G$9!#(B
 .It Fl v
-Print verbose information about the NTP servers.
+NTP $B%5!<%P$K4X$9$k>\:Y$J>pJs$r=PNO$7$^$9!#(B
 .El
-.Sh SEE ALSO
+.Sh $B4XO"9`L\(B
 .Xr xntpd 8 ,
 .Xr xntpdc 8
 .Rs
@@ -69,6 +74,5 @@
 .%T Network Time Protocol (Version 3)
 .%O RFC1305
 .Re
-.Sh BUGS
-This program makes no attempt to improve accuracy by doing multiple
-samples.
+.Sh $B%P%0(B
+$B$3$N%W%m%0%i%`$O!"J#?t$N%5%s%W%k$r<h$C$F@:EY$r9b$a$k$h$&$J;n$_$r$7$^$;$s!#(B

--------------BA6F0746CAC5EAC3DDF16E61--

