components/ntp/manpages/ntpdc.8
changeset 5007 0052258cbb9d
parent 466 89ddfe5a3a92
equal deleted inserted replaced
5006:f2592e203a2a 5007:0052258cbb9d
       
     1 '\" te
       
     2 .\" CDDL HEADER START
       
     3 .\"
       
     4 .\" The contents of this file are subject to the terms of the
       
     5 .\" Common Development and Distribution License (the "License").
       
     6 .\" You may not use this file except in compliance with the License.
       
     7 .\"
       
     8 .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
       
     9 .\" or http://www.opensolaris.org/os/licensing.
       
    10 .\" See the License for the specific language governing permissions
       
    11 .\" and limitations under the License.
       
    12 .\"
       
    13 .\" When distributing Covered Code, include this CDDL HEADER in each
       
    14 .\" file and include the License file at usr/src/OPENSOLARIS.LICENSE.
       
    15 .\" If applicable, add the following below this CDDL HEADER, with the
       
    16 .\" fields enclosed by brackets "[]" replaced with your own identifying
       
    17 .\" information: Portions Copyright [yyyy] [name of copyright owner]
       
    18 .\"
       
    19 .\" CDDL HEADER END
       
    20 .\"
       
    21 .\" Copyright (c) 2009, 2015, Oracle and/or its affiliates. All rights reserved.
       
    22 .\"
       
    23 .TH "ntpdc" "8" "" "" "System Administration Commands"
       
    24 .SH NAME
       
    25 ntpdc \- Network Time Protocol special query program
       
    26 .SH SYNOPSIS
       
    27 .LP
       
    28 .B /usr/sbin/ntpdc
       
    29 [\fB-46lpsidnv?!\fR] [\fB-c\fR \fIcommand\fR] [\fB-D\fR \fIdebuglvl\fR]
       
    30 [\fB-<\fR \fIoptfile\fR] [\fB->\fR \fIoptfile\fR]  [\fIhost\fR] [...]
       
    31 .fi
       
    32 .SH "OPTIONS"
       
    33 Specifying a command line option other than \fB-i\fP or \fB-n\fP will cause the specified query (queries) to be sent to the indicated host(s) immediately. Otherwise, \fBntpdc\fP will attempt to read interactive format commands from the standard input.
       
    34 .LP
       
    35 .TP
       
    36 .BR "-4"
       
    37 Force DNS resolution of following host names on the command line to the IPv4 namespace.
       
    38 .TP
       
    39 .BR "-6"
       
    40 Force DNS resolution of following host names on the command line to the IPv6 namespace.
       
    41 .TP
       
    42 .BR "-c \fIcommand\fP"
       
    43 The argument \fIcommand\fP is interpreted as an interactive command and is added to the list of commands to be executed on the specified host(s). Multiple -c options may be given.
       
    44 .TP
       
    45 .BR "-i"
       
    46 Force \fBntpdc\fP to operate in interactive mode. Prompts will be written to the standard output and commands read from the standard input.
       
    47 .TP
       
    48 .BR "-l"
       
    49 Obtain a list of peers which are known to the server(s). This switch is equivalent to \fB-c listpeers\fP.
       
    50 .TP
       
    51 .BR "-n"
       
    52 Output all host addresses in numeric format rather than converting to the canonical host names.
       
    53 .TP
       
    54 .BR "-p"
       
    55 Print a list of the peers known to the server as well as a summary of their state. This is equivalent to \fB-c peers\fP.
       
    56 .TP
       
    57 .BR "-s"
       
    58 Print a list of the peers known to the server as well as a summary of their state, but in a slightly different format than the -p switch. This is equivalent to \fB-c dmpeers\fP.
       
    59 .SH "DESCRIPTION"
       
    60 \fBntpdc\fP is used to query the \fBntpd\fP daemon about its current state and to request changes in that state. The program may be run either in interactive mode or controlled using command line arguments. Extensive state and statistics information is available through the \fBntpdc\fP interface. In addition, nearly all the configuration options which can be specified at startup using ntpd's configuration file may also be specified at run time using \fBntpdc\fP.
       
    61 If one or more request options are included on the command line when \fBntpdc\fP is executed, each of the requests will be sent to the NTP servers running on each of the hosts given as command line arguments, or on localhost by default. If no request options are given, \fBntpdc\fP will attempt to read commands from the standard input and execute these on the NTP server running on the first host given on the command line, again defaulting to localhost when no other host is specified. \fBntpdc\fP will prompt for commands if the standard input is a terminal device.
       
    62 .LP
       
    63 \fBntpdc\fP uses NTP mode 7 packets to communicate with the NTP server, and hence can be used to query any compatible server on the network which permits it. Note that since NTP is a UDP protocol this communication will be somewhat unreliable, especially over large distances in terms of network topology. \fBntpdc\fP makes no attempt to retransmit requests, and will time requests out if the remote host is not heard from within a suitable timeout time.
       
    64 .LP
       
    65 The operation of \fBntpdc\fP are specific to the particular implementation of the \fBntpd\fP daemon and can be expected to work only with this and maybe some previous versions of the daemon. Requests from a remote \fBntpdc\fP program which affect the state of the local server must be authenticated, which requires both the remote program and local server share a common key and key identifier.
       
    66 .LP
       
    67 Note that in contexts where a host name is expected, a \fB-4\fP qualifier preceding the host name forces DNS resolution to the IPv4 namespace, while a \fB-6\fP qualifier forces DNS resolution to the IPv6 namespace.
       
    68 .LP
       
    69 .SS "Interactive Commands"
       
    70 Interactive format commands consist of a keyword followed by zero to four arguments. Only enough characters of the full keyword to uniquely identify the command need be typed. The output of a command is normally sent to the standard output, but optionally the output of individual commands may be sent to a file by appending a \fB>\fP, followed by a file name, to the command line.
       
    71 .LP
       
    72 A number of interactive format commands are executed entirely within the \fBntpdc\fP program itself and do not result in NTP mode 7 requests being sent to a server. These are described following.
       
    73 .LP
       
    74 .TP
       
    75 .BR "? [ \fIcommand_keyword\fP ], help [ \fIcommand_keyword\fP ]"
       
    76 A \fB?\fP by itself will print a list of all the command keywords known to this incarnation of \fBntpq\fP. A \fB?\fP followed by a command keyword will print function and usage information about the command. This command is probably a better source of information about \fBntpq\fP than this manual page.
       
    77 .TP
       
    78 .BR "delay \fImilliseconds\fP"
       
    79 Specify a time interval to be added to timestamps included in requests which require authentication. This is used to enable (unreliable) server reconfiguration over long delay network paths or between machines whose clocks are unsynchronized. Actually the server does not now require timestamps in authenticated requests, so this command may be obsolete.
       
    80 .TP
       
    81 .BR "host \fIhostname\fP"
       
    82 Set the host to which future queries will be sent. Hostname may be either a host name or a numeric address.
       
    83 .TP
       
    84 .BR "hostnames [ yes | no ]"
       
    85 If \fByes\fP is specified, host names are printed in information displays. If \fBno\fP is specified, numeric addresses are printed instead. The default is \fByes\fP, unless modified using the command line \fB-n\fP switch.
       
    86 .TP
       
    87 .BR "keyid \fIkeyid\fP"
       
    88 This command allows the specification of a
       
    89 key number to be used to authenticate configuration
       
    90 requests from ntpdc to the host(s). This must
       
    91 correspond to a key number which the host/server has
       
    92 been configured to use for this purpose (server
       
    93 options: \fBtrustedkey\fP, and
       
    94 \fBrequestkey\fP).  If authentication is not
       
    95 enabled on the host(s) for ntpdc
       
    96 commands, the command
       
    97 \fB"keyid 0"\fP should be given; otherwise the
       
    98 \fIkeyid\fP of the next subsequent \fBaddpeer/addserver/broadcast
       
    99 \fP command will
       
   100 be used.  
       
   101 .TP
       
   102 .BR "quit"
       
   103 .TP
       
   104 .BR "exit"
       
   105 Exit \fBntpdc\fP.
       
   106 .TP
       
   107 .BR "debug [ no | more | less ]"
       
   108 With no parameter displays the current \fBntpdc\fP debug level. The \fBno\fP flag turns off all debugging, 
       
   109 while \fBmore\fP and \fBless\fP increase and decrease the level respectively.
       
   110 .TP
       
   111 .BR "passwd"
       
   112 This command prompts you to type in a password (which will not be echoed) which will be used to authenticate configuration requests. The password must correspond to the key configured for use by the NTP server for this purpose if such requests are to be successful.
       
   113 .TP
       
   114 .BR "timeout \fImilliseconds\fP"
       
   115 Specify a timeout period for responses to server queries. The default is about 8000 milliseconds. Note that since \fBntpdc\fP retries each query once after a timeout, the total waiting time for a timeout will be twice the timeout value set.
       
   116 .TP
       
   117 .BR "version"
       
   118 Display the version of the \fBntpdc\fP command.
       
   119 .SS "Control Message Commands"
       
   120 Query commands result in NTP mode 7 packets containing requests for information being sent to the server. These are read-only commands in that they make no modification of the server configuration state.
       
   121 .LP
       
   122 .TP
       
   123 .BR "listpeers"
       
   124 Obtains and prints a brief list of the peers for which the server is maintaining state. These should include all configured peer associations as well as those peers whose stratum is such that they are considered by the server to be possible future synchronization candidates.
       
   125 .TP
       
   126 .BR "peers"
       
   127 Obtains a list of peers for which the server is maintaining state, along with a summary of that state. Summary information includes the address of the remote peer, the local interface address (0.0.0.0 if a local address has yet to be determined), the stratum of the remote peer (a stratum of 16 indicates the remote peer is unsynchronized), the polling interval, in seconds, the reachability register, in octal, and the current estimated delay, offset and dispersion of the peer, all in seconds.
       
   128 The character in the left margin indicates the mode this peer entry is operating in. A \fB+\fP denotes symmetric active, a \fB-\fP indicates symmetric passive, a \fB=\fP means the remote server is being polled in client mode, a \fB^\fP indicates that the server is broadcasting to this address, a \fB~\fP denotes that the remote peer is sending broadcasts and a \fB*\fP marks the peer the server is currently synchronizing to.
       
   129 The contents of the host field may be one of four forms. It may be a host name, an IP address, a reference clock implementation name with its parameter or
       
   130 .BR "REFCLK(\fIimplementation number\fP, \fIparameter\fP)".
       
   131 If the "\fBhostnames no\fP" command has been given only IP-addresses will be displayed.
       
   132 .LP
       
   133 .TP
       
   134 .BR "dmpeers"
       
   135 A slightly different peer summary list. Identical to the output of the \fBpeers\fP command, except for the character in the leftmost column. Characters only appear beside peers which were included in the final stage of the clock selection algorithm. A \fB.\fP indicates that this peer was cast off in the falseticker detection, while a \fB+\fP indicates that the peer made it through. A \fB*\fP denotes the peer the server is currently synchronizing with.
       
   136 .TP
       
   137 .BR "showpeer \fIpeer_address\fP [...]"
       
   138 Shows a detailed display of the current peer variables for one or more peers. Most of these values are described in the NTP Version 2 specification.
       
   139 .TP
       
   140 .BR "pstats \fIpeer_address\fP [...]"
       
   141 Show per-peer statistic counters associated with the specified peer(s).
       
   142 .TP
       
   143 .BR "clockstat \fIclock_peer_address\fP [...]"
       
   144 Obtain and print information concerning a peer clock. The values obtained provide information on the setting of fudge factors and other clock performance information.
       
   145 .TP
       
   146 .BR "kerninfo"
       
   147 Obtain and print kernel phase-lock loop operating parameters. This information is available if the host supports the \fBntp_adjtime\fP system call.
       
   148 .TP
       
   149 .BR "loopinfo [ oneline | multiline ]"
       
   150 Print the values of selected loop filter variables. The loop filter is the part of NTP which deals with adjusting the local system clock. The \fBoffset\fP is the last offset given to the loop filter by the packet processing code. The \fBfrequency\fP is the frequency error of the local clock in parts-per-million (ppm). The \fBtime_const\fP controls the stiffness of the phase-lock loop and thus the speed at which it can adapt to oscillator drift. The \fBwatchdog timer\fP value is the number of seconds which have elapsed since the last sample offset was given to the loop filter. The \fBoneline\fP and \fBmultiline\fP options specify the format in which this information is to be printed, with \fBmultiline\fP as the default.
       
   151 .TP
       
   152 .BR "sysinfo"
       
   153 Print a variety of system state variables, i.e., state related to the local server. All except the last four lines are described in the NTP Version 3 specification, RFC-1305.
       
   154 The \fBsystem flags\fP show various system flags, some of which can be set and cleared by the \fBenable\fP and \fBdisable\fP configuration commands, respectively. These are the \fBauth\fP, \fBbclient\fP, \fBmonitor\fP, \fBpll\fP, \fBpps\fP and \fBstats\fP flags. See the \fBntpd\fP documentation for the meaning of these flags. There are two additional flags which are read only, the \fBkernel_pll\fP and \fBkernel_pps\fP. These flags indicate the synchronization status when the precision time kernel modifications are in use. The \fBkernel_pll\fP indicates that the local clock is being disciplined by the kernel, while the kernel_pps indicates the kernel discipline is provided by the PPS signal.
       
   155 The \fBstability\fP is the residual frequency error remaining after the system frequency correction is applied and is intended for maintenance and debugging. In most architectures, this value will initially decrease from as high as 500 ppm to a nominal value in the range .01 to 0.1 ppm. If it remains high for some time after starting the daemon, something may be wrong with the local clock, or the value of the kernel variable \fBtick\fP may be incorrect.
       
   156 The \fBbroadcastdelay\fP shows the default broadcast delay, as set by the \fBbroadcastdelay\fP configuration command.
       
   157 The \fBauthdelay\fP shows the default authentication delay, as set by the \fBauthdelay\fP configuration command.
       
   158 .TP
       
   159 .BR "sysstats"
       
   160 Print statistics counters maintained in the protocol module.
       
   161 .TP
       
   162 .BR "ctlstats"
       
   163 Print statistics counters maintained in the control module.
       
   164 .TP
       
   165 .BR "memstats"
       
   166 Print statistics counters related to memory allocation code.
       
   167 .TP
       
   168 .BR "iostats"
       
   169 Print statistics counters maintained in the input-output module.
       
   170 .TP
       
   171 .BR "timerstats"
       
   172 Print statistics counters maintained in the timer/event queue support code.
       
   173 .TP
       
   174 .BR "reslist"
       
   175 Obtain and print the server's restriction list. This list is (usually) printed in sorted order and may help to understand how the restrictions are applied.
       
   176 .TP
       
   177 .BR "ifstats"
       
   178 List interface statistics for interfaces used by ntpd for network communication.
       
   179 .TP
       
   180 .BR "ifreload"
       
   181 Force rescan of current system interfaces. Outputs interface statistics for interfaces that could possibly change. Marks unchanged interfaces with \fB.\fP, added interfaces with \fB+\fP and deleted interfaces with \fB-\fP.
       
   182 .TP
       
   183 .BR "monlist [ \fIversion\fP ]"
       
   184 Obtain and print traffic counts collected and maintained by the monitor facility. The version number should not normally need to be specified.
       
   185 .TP
       
   186 .BR "clkbug \fIclock_peer_address\fP [...]"
       
   187 Obtain debugging information for a reference clock driver. This information is provided only by some clock drivers and is mostly undecodable without a copy of the driver source in hand.
       
   188 .SS "Runtime Configuration Requests"
       
   189 All requests which cause state changes in the server are authenticated by the server using a configured NTP key (the facility can also be disabled by the server by not configuring a key). The key number and the corresponding key must also be made known to \fBntpdc\fP. This can be done using the \fBkeyid\fP and \fBpasswd\fP commands, the latter of which will prompt at the terminal for a password to use as the encryption key. You will also be prompted automatically for both the key number and password the first time a command which would result in an authenticated request to the server is given. Authentication not only provides verification that the requester has permission to make such changes, but also gives an extra degree of protection against transmission errors.
       
   190 .LP
       
   191 Authenticated requests always include a timestamp in the packet data, which is included in the computation of the authentication code. This timestamp is compared by the server to its receive time stamp. If they differ by more than a small amount the request is rejected. This is done for two reasons. First, it makes simple replay attacks on the server, by someone who might be able to overhear traffic on your LAN, much more difficult. Second, it makes it more difficult to request configuration changes to your server from topologically remote hosts. While the reconfiguration facility will work well with a server on the local host, and may work adequately between time-synchronized hosts on the same LAN, it will work very poorly for more distant hosts. As such, if reasonable passwords are chosen, care is taken in the distribution and protection of keys and appropriate source address restrictions are applied, the run time reconfiguration facility should provide an adequate level of security.
       
   192 .LP
       
   193 The following commands all make authenticated requests.
       
   194 .LP
       
   195 .TP
       
   196 .BR "addpeer \fIpeer_address\fP [ \fIkeyid\fP ] [ \fIversion\fP ] "
       
   197 .BR "[ \fIminpoll#\fP | prefer | iburst  | burst | minpoll \fIN\fP | \fBmaxpoll\fP \fIN\fP [ \fIdynamic\fP ] [...] ]\fP"
       
   198 .TP
       
   199 .BR "addpeer \fIpeer_address\fP [ \fBprefer | iburst | burst | minpoll \fIN\fP"
       
   200 .BR "| \fBmaxpoll\fP \fIN\fP | \fBkeyid\fP \fIN\fP | \fBversion\fP \fIN\fP [...] ]"
       
   201 .sp
       
   202 Add a configured peer association at the
       
   203 given address and operating in symmetric
       
   204 active mode. Note that an existing association
       
   205 with the same peer may be deleted when this
       
   206 command is executed, or may simply be
       
   207 converted to conform to the new configuration,
       
   208 as appropriate. If the \fBkeyid\fP
       
   209 is nonzero, all outgoing packets to
       
   210 the remote server will have an authentication
       
   211 field attached encrypted with this key. If the
       
   212 value is 0 (or not given) no authentication
       
   213 will be done. If ntpdc's key number has not
       
   214 yet been set (\fIe.g.,\fP by the keyid
       
   215 command), it will be set to this value.
       
   216 The \fBversion#\fP can be 1 through 4 and defaults to 3.  The remaining
       
   217 options are either a numeric value for \fIminpoll#\fP or
       
   218 literals \fBprefer\fP, \fBiburst\fP, 
       
   219 \fBburst\fP, \fBminpoll  \fP\fIN\fP,
       
   220 \fBkeyid \fP\fIN\fP, \fBversion \fP \fIN\fP, or
       
   221 \fBmaxpoll  \fP\fIN\fP (where \fIN\fP is a numeric value), and have the action as specified in the
       
   222 \fBpeer\fP configuration file command of
       
   223 ntpd.  See the  server options page  at file:///usr/share/doc/ntp/confopt.html for further information.
       
   224 Each flag (or its absence) replaces the
       
   225 previous setting. The \fBprefer\fP keyword indicates a preferred peer (and thus will be used primarily for clock synchronisation if possible). The preferred peer also determines the validity of the PPS signal - if the preferred peer is suitable for synchronisation so is the PPS signal.
       
   226 The \fBdynamic\fP keyword allows association configuration even when no suitable network interface is found at configuration time. The dynamic interface update mechanism may complete the configuration when new interfaces appear (e.g. WLAN/PPP interfaces) at a later time and thus render the association operable.
       
   227 .TP
       
   228 .BR "addserver \fIpeer_address\fP [ \fIkeyid\fP ] [ \fIversion\fP ] [\fIminpoll#\fP"
       
   229 .BR "| prefer | iburst  | burst | minpoll \fIN\fP | maxpoll \fIN\fP [...] ]"
       
   230 .TP
       
   231 .BR "addserver \fIpeer_address\fP [ \fBprefer | iburst | burst | minpoll \fIN\fP"
       
   232 .BR "| maxpoll \fIN\fP | keyid \fIN\fP | version \fIN\fP [...] [ dynamic ] ]"
       
   233 .sp
       
   234 Identical to the addpeer command, except that the operating mode is client.
       
   235 .TP
       
   236 .BR "addrefclock \fIclock_address\fP [  \fImode\fP [ \fBprefer | burst | minpoll \fIN\fP"
       
   237 .BR "| \fBmaxpoll\fP \fIN\fP  ...]]"
       
   238 .sp
       
   239 Identical to the addpeer command, except that the address is a REFCLOCK designator and it configures a hardware refclock
       
   240 instead of a remote server.
       
   241 .TP
       
   242 .BR "broadcast \fIpeer_address\fP [ \fIkeyid\fP ] [ \fIversion\fP ] [ prefer ]"
       
   243 Identical to the addpeer command, except
       
   244 that the operating mode is broadcast. In this
       
   245 case a valid non-zero key identifier and key are required. The \fBpeer_address\fP parameter can be the broadcast address of the local network or a multicast group address assigned to NTP. If a multicast address, a multicast-capable kernel is required.
       
   246 .TP
       
   247 .BR "unconfig \fIpeer_address\fP [...]"
       
   248 This command causes the configured bit to be removed from the specified peer(s). In many cases this will cause the peer association to be deleted. When appropriate, however, the association may persist in an unconfigured mode if the remote peer is willing to continue on in this fashion.
       
   249 .TP
       
   250 .BR "fudge \fIpeer_address\fP [ \fItime1\fP ] [ \fItime2\fP ] [ \fIstratum\fP ] [ \fIrefid\fP ]"
       
   251 This command provides a way to set certain data for a reference clock. See the source listing for further information.
       
   252 .TP
       
   253 .BR "enable [ auth | bclient | calibrate | kernel | monitor | ntp | pps | stats]"
       
   254 .TP
       
   255 .BR "disable [ auth | bclient | calibrate | kernel | monitor | ntp | pps | stats]"
       
   256 These commands operate in the same way as the \fBenable\fP and \fBdisable\fP configuration file commands of \fBntpd\fP. See the <a href="miscopt.html">Miscellaneous Options</a> page for further information.
       
   257 .TP
       
   258 .BR "restrict \fIaddress mask flag\fP [ \fIflag\fP ]"
       
   259 This command operates in the same way as the \fBrestrict\fP configuration file commands of \fBntpd\fP.
       
   260 .TP
       
   261 .BR "unrestrict \fIaddress mask flag\fP [ \fIflag\fP ]"
       
   262 Unrestrict the matching entry from the restrict list.
       
   263 .TP
       
   264 .BR "delrestrict \fIaddress mask [ ntpport ]\fP"
       
   265 Delete the matching entry from the restrict list.
       
   266 .TP
       
   267 .BR "readkeys"
       
   268 Causes the current set of authentication keys to be purged and a new set to be obtained by rereading the keys file (which must have been specified in the \fBntpd\fP configuration file). This allows encryption keys to be changed without restarting the server.
       
   269 .TP
       
   270 .BR "trustedkey \fIkeyid\fP [...]"
       
   271 .TP
       
   272 .BR "untrustedkey \fIkeyid\fP [...]"
       
   273 .TP
       
   274 .BR "controlkey \fIkeyid\fP [...]"
       
   275 .TP
       
   276 .BR "requestkey \fIkeyid\fP [...]"
       
   277 These commands operate in the same way as the corresponding configuration file commands of \fBntpd\fP.
       
   278 .TP
       
   279 .BR "keytype md5"
       
   280 This command specifies the default keytype. Since the only type currently support is md5, this is a nop.
       
   281 .TP
       
   282 .BR "authinfo"
       
   283 Returns information concerning the authentication module, including known keys and counts of encryptions and decryptions which have been done.
       
   284 .TP
       
   285 .BR "traps"
       
   286 Display the traps set in the server. See the source listing for further information.
       
   287 .TP
       
   288 .BR "addtrap [ \fIaddress\fP [ \fIport\fP ] [ \fIinterface\fP ]"
       
   289 Set a trap for asynchronous messages. See the source listing for further information.
       
   290 .TP
       
   291 .BR "clrtrap [ \fIaddress\fP [ \fIport\fP ] [ \fIinterface\fP]"
       
   292 Clear a trap for asynchronous messages. See the source listing for further information.
       
   293 .TP
       
   294 .BR "reset"
       
   295 Clear the statistics counters in various modules of the server. See the source listing for further information.
       
   296 .TP
       
   297 .BR "preset [\fIpeer_address\fP [...]]"
       
   298 Clear the statistics counters in various modules of the server with respect to the indicated peers.
       
   299 .SS OPTION PRESETS
       
   300 Most options may be preset by loading values from configuration file(s) and values from
       
   301 environment variables named:
       
   302 .nf
       
   303   \fBNTPDC_<option-name>\fP or \fBNTPDC\fP
       
   304 .fi
       
   305 .aj
       
   306 The environmental presets take precedence (are processed later than)
       
   307 the configuration files. The option-name should be in all capital letters.
       
   308 For example, to set the --command option, you would set the NTPDC_COMMAND environment
       
   309 variable.
       
   310 The users home directory and the current directory are searched for a file named .ntprc.
       
   311 .PP
       
   312 .SH SEE ALSO
       
   313 .LP
       
   314 \fBntpd\fR(8), \fBntpq\fR(8), \fBntprc\fR(5), \fBattributes\fR(7)
       
   315