Windows Active Directory, AD (kerberos) ±5 min
SSL/TLS/HTTPS Certificate validity window is checked. Browsers check the certificate's "Not Before" and "Not After" timestamps against your system clock (converted to UTC). example ERR_CERT_DATE_INVALID
e.g. digital modes (WSJT-X)
FT4 & FT8 +/- 1-2 sec
(add detail)
JT65 1-2
JS8Call +/- 5 sec
PSK31 N/A
RTTY N/A
| Mode | Tolerance |
|---|---|
| FT8 | |
| FT4 | |
| JT65 |
When Windows detects a time update of greater than _, it will _
Registry Keys: MaxPosPhaseCorrection and MaxNegPhaseCorrection
And HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config
≤ MaxAllowedPhaseOffset (default ~54,000s/15hrs for clients)
Gradual adjustment via clock rate slewing
> MaxAllowedPhaseOffset but ≤ 48hrs (DCs) or unlimited (clients)
Logs event, may step clock or reject sample
Huge offsets (>48hrs on DCs)
Rejects sample, requires manual config to accept
Sources: