You log into a brand-new Ubuntu 24.04 VM. You type sudo. Nothing happens. Ten seconds pass.
Twenty. You start mentally pricing the hours you’re about to donate to “networking”, despite not having touched anything “networking”.
Or SSH works, but it’s slow in a way that feels personal: the password prompt appears late, and every new connection has that same awkward pause.
This is the kind of failure that makes competent people doubt themselves—because the fix is dull, local, and usually one line.
What actually breaks (and why it looks like DNS)
The punchline: sudo and sshd are not “doing DNS” because they’re bored. They call system library functions
that often resolve hostnames as part of logging, policy checks, and safety features. When your machine’s hostname doesn’t resolve
quickly to an address (or doesn’t resolve at all), you pay for it in timeouts.
On Ubuntu, hostname resolution is governed by Name Service Switch (NSS), configured in /etc/nsswitch.conf.
Most defaults check files (meaning /etc/hosts) before DNS. That’s good: it makes local lookups fast and predictable.
But if /etc/hosts doesn’t contain your current hostname, or it contains the wrong one, resolution falls through to DNS.
In a lab network with shaky DNS—or in a cloud VPC where reverse DNS is slow—you get the hanging behavior.
The classic error message is:
sudo: unable to resolve host somehost: Name or service not known
But you won’t always see it, because depending on your terminal, logging setup, and what exact call path is hit, it may just feel like “sudo is slow”.
The reason SSH is in the blast radius: the server often does reverse DNS for the client IP, and your host may do forward lookups too.
If UseDNS yes is enabled (or defaults differ across builds), the server may spend time waiting on DNS. Add mismatched local hostname
and you can end up with compounded delays—slow authentication prompts, slow session setup, slow logs.
This isn’t a glamorous outage. It’s a sand-in-the-gears outage. Those are the ones that steal your whole afternoon.
One quote that holds up in ops work: Hope is not a strategy.
(paraphrased idea commonly attributed to engineering leadership in reliability circles)
The boring fix is strategy. Do the boring fix.
Joke #1: DNS is the only system where “it’s probably just one line” is both true and still ruins your day.
Interesting facts and historical context (the stuff that explains the weirdness)
- /etc/hosts predates ubiquitous DNS. Local host files were the original “directory service” on early ARPANET-era systems. DNS arrived later to scale the problem.
- The “127.0.1.1” pattern is Debian/Ubuntu-specific culture. Debian historically used
127.0.1.1to map the system hostname without tying it to a specific network interface address. - glibc NSS is modular by design. The
hosts:line in/etc/nsswitch.confcontrols not just DNS vs files, but also mDNS and systemd’s resolver hooks. - Reverse DNS delays have been an SSH annoyance for decades. The SSH server can do PTR lookups for client IPs; if DNS is slow, it looks like “SSH is slow”.
- systemd changed how “hostname” is managed. With systemd,
hostnamectlis the front door, and the hostname is persisted in/etc/hostname(and sometimes influenced by cloud-init). - Cloud images love to rename themselves. Cloud-init and provider metadata can set hostnames at boot, sometimes without updating
/etc/hoststhe way you’d expect. - sudo tries to be safe, not fast. It logs, checks policy, and sometimes triggers hostname lookups for auditing and display. The delay is an emergent property, not a feature.
- “localhost” is not just a vibe.
127.0.0.1 localhost(and IPv6::1) are expected by a lot of software; breaking those mappings causes chaos in subtle ways.
Fast diagnosis playbook (check these in order)
When sudo hangs or SSH connections stall, you want signal fast. Here’s the order that minimizes thrash and maximizes clarity.
1) Confirm the symptom is name resolution latency, not CPU, disk, or entropy
If the delay is consistently ~5s, ~10s, ~30s, that screams timeout. CPU spikes and disk stalls look messier.
2) Check hostname vs /etc/hosts immediately
This is the 30-second check that saves three hours. If the system hostname is not present on a loopback line in /etc/hosts, fix it.
3) Validate NSS order and systemd-resolved state
If /etc/nsswitch.conf tries DNS before files (or is modified), you can manufacture latency even with a correct hosts file.
4) For SSH slowness: check server-side DNS behavior
If the server is waiting on reverse DNS for clients, you can fix it with configuration (UseDNS no) or with proper PTR records.
Prefer real DNS in stable corporate environments; prefer UseDNS no in disposable environments.
5) Only then chase upstream DNS, firewalls, split-horizon, VPN clients, and cloud metadata
Those are real problems—but they’re the expensive branch of the decision tree. Earn the right to go there.
Practical tasks: commands, outputs, and decisions (12+)
These are the exact checks I run on-call. Each task has: command, plausible output, what it means, and the decision it drives.
Run them as a normal user unless noted.
Task 1: Measure how bad the delay is (sudo)
cr0x@server:~$ time sudo -n true
real 0m12.184s
user 0m0.014s
sys 0m0.010s
What it means: sudo took 12 seconds to do essentially nothing. That’s almost never “CPU”.
This is classic lookup timeout territory.
Decision: Pivot to hostname resolution checks before touching packages, disks, or kernel parameters.
Task 2: See the current hostname (and whether it looks like a cloud rename)
cr0x@server:~$ hostname
ip-10-24-3-17
What it means: That pattern looks provider-assigned. It might have been set by cloud-init or metadata.
Decision: Verify that /etc/hosts contains this name. If not, fix locally first.
Task 3: Check the “official” hostname source via systemd
cr0x@server:~$ hostnamectl
Static hostname: ip-10-24-3-17
Icon name: computer-vm
Chassis: vm
Machine ID: 3b9f6a0c6f2847b7a62c1234c77d9a1e
Boot ID: 1bd3b7d21f7f48f1bdf7c7fcb43b17a2
Virtualization: kvm
Operating System: Ubuntu 24.04.1 LTS
Kernel: Linux 6.8.0-41-generic
Architecture: x86-64
What it means: The hostname the system thinks it has is ip-10-24-3-17. That’s what services will try to resolve.
Decision: Make sure this name resolves quickly via files (hosts), not DNS.
Task 4: Inspect /etc/hosts for the mismatch
cr0x@server:~$ cat /etc/hosts
127.0.0.1 localhost
127.0.1.1 ubuntu-template
# The following lines are desirable for IPv6 capable hosts
::1 localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
What it means: The hostname is ip-10-24-3-17, but /etc/hosts still maps ubuntu-template.
So when something tries to resolve the current hostname, it falls through to DNS.
Decision: Update the 127.0.1.1 line (or add one) to include the current hostname and optional FQDN.
Task 5: Prove resolution is slow (getent is your friend)
cr0x@server:~$ time getent hosts "$(hostname)"
10.24.3.17 ip-10-24-3-17
real 0m10.008s
user 0m0.000s
sys 0m0.004s
What it means: Even a simple lookup takes 10 seconds. That’s an NSS path waiting on something (often DNS).
Decision: Fix /etc/hosts so this lookup becomes instantaneous. If it remains slow, inspect nsswitch.conf and DNS.
Task 6: Check NSS order (the actual resolution policy)
cr0x@server:~$ grep -E '^hosts:' /etc/nsswitch.conf
hosts: files mdns4_minimal [NOTFOUND=return] dns
What it means: The system should consult files first. Good. So a correct /etc/hosts entry will short-circuit the problem.
Decision: If files isn’t first, put it first unless you have a very specific reason not to (and you probably don’t).
Task 7: See what sudo is waiting on (strace, fast and surgical)
cr0x@server:~$ sudo strace -f -tt -o /tmp/sudo.strace sudo -n true
sudo: unable to resolve host ip-10-24-3-17: Name or service not known
What it means: You got the explicit error. The trace file will show calls like getaddrinfo() and the time spent.
Decision: Stop guessing. Fix hostname resolution locally. If policy requires DNS correctness, fix DNS next—but don’t skip the local mapping.
Task 8: Confirm what /etc/hostname contains (persistence across boots)
cr0x@server:~$ cat /etc/hostname
ip-10-24-3-17
What it means: The persistent hostname matches hostnamectl. Good. The mismatch is specifically in /etc/hosts.
Decision: Edit /etc/hosts, not /etc/hostname, unless you actually want to rename the box.
Task 9: Check systemd-resolved status (are you even using it?)
cr0x@server:~$ systemctl is-active systemd-resolved
active
What it means: Resolved is active, so DNS configuration might be managed via /run/systemd/resolve and /etc/resolv.conf may be a stub.
Decision: Don’t hand-edit /etc/resolv.conf blindly; check what it points to first.
Task 10: Confirm whether /etc/resolv.conf is a stub symlink
cr0x@server:~$ ls -l /etc/resolv.conf
lrwxrwxrwx 1 root root 39 Oct 12 09:14 /etc/resolv.conf -> ../run/systemd/resolve/stub-resolv.conf
What it means: DNS is mediated by systemd-resolved. Your “DNS is slow” might be upstream, but your hostname mismatch can still be fixed locally.
Decision: Treat DNS as a separate issue. First, ensure local hostname resolves without DNS.
Task 11: Check the local hosts mapping quickly (what does localhost resolve to?)
cr0x@server:~$ getent hosts localhost
127.0.0.1 localhost
::1 localhost ip6-localhost ip6-loopback
What it means: Localhost is sane. Your problem is not “someone deleted localhost”. Good news.
Decision: Focus on mapping your actual hostname, not rebuilding the whole file.
Task 12: Fix /etc/hosts (safely) and verify lookup speed
cr0x@server:~$ sudo cp -a /etc/hosts /etc/hosts.bak.$(date +%F-%H%M%S)
cr0x@server:~$ sudo sed -i 's/^127\.0\.1\.1\s\+.*/127.0.1.1 ip-10-24-3-17/' /etc/hosts
cr0x@server:~$ cat /etc/hosts
127.0.0.1 localhost
127.0.1.1 ip-10-24-3-17
# The following lines are desirable for IPv6 capable hosts
::1 localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
What it means: You replaced the stale template hostname with the real one. Minimal change, maximal effect.
Decision: Re-run the slow commands. If they’re now instant, stop. Don’t “also tweak DNS” out of superstition.
Task 13: Validate the fix with getent and sudo timing
cr0x@server:~$ time getent hosts "$(hostname)"
127.0.1.1 ip-10-24-3-17
real 0m0.003s
user 0m0.000s
sys 0m0.003s
cr0x@server:~$ time sudo -n true
real 0m0.118s
user 0m0.012s
sys 0m0.011s
What it means: The lookup is now local and instant; sudo returns to normal human timescales.
Decision: Close the incident. If SSH is still slow, handle it separately with server-side DNS settings.
Task 14: If SSH is slow, test from the server’s perspective (auth log timing)
cr0x@server:~$ sudo tail -n 20 /var/log/auth.log
Dec 30 10:22:11 server sshd[2194]: Connection from 10.24.3.50 port 51344 on 10.24.3.17 port 22 rdomain ""
Dec 30 10:22:21 server sshd[2194]: Accepted publickey for cr0x from 10.24.3.50 port 51344 ssh2: ED25519 SHA256:1q2w3e4r5t...
Dec 30 10:22:21 server sshd[2194]: pam_unix(sshd:session): session opened for user cr0x(uid=1000) by (uid=0)
What it means: There’s a 10-second gap between connection and acceptance. That often points to DNS or GSSAPI delays.
Decision: Inspect sshd_config for UseDNS and GSSAPIAuthentication if your environment doesn’t need them.
Task 15: Check SSH daemon config for DNS-related slow paths
cr0x@server:~$ sudo sshd -T | egrep 'usedns|gssapiauthentication'
usedns yes
gssapiauthentication no
What it means: Reverse DNS is enabled. In some networks that’s fine; in others it’s a guaranteed stall.
Decision: If you don’t rely on PTR-based logging or access controls, set UseDNS no and restart SSH.
Task 16: Apply UseDNS no (if appropriate) and confirm reload
cr0x@server:~$ sudo cp -a /etc/ssh/sshd_config /etc/ssh/sshd_config.bak.$(date +%F-%H%M%S)
cr0x@server:~$ echo 'UseDNS no' | sudo tee -a /etc/ssh/sshd_config
UseDNS no
cr0x@server:~$ sudo systemctl restart ssh
cr0x@server:~$ sudo systemctl is-active ssh
active
What it means: SSH has been restarted with the new setting. New connections should no longer wait on reverse DNS.
Decision: If you’re in a corporate environment where reverse DNS is mandated, fix PTR records instead of disabling it.
Three corporate mini-stories from real life
Mini-story 1: The incident caused by a wrong assumption
A mid-sized SaaS team rolled out Ubuntu 24.04 for a set of internal runners. These machines weren’t serving customer traffic directly,
but they were the grease in the pipeline: CI jobs, artifact signing, container builds. Nobody paid attention until deployments started timing out.
The assumption was simple and very human: “If SSH works, the machine is fine.” Engineers could log in eventually, so the story became
“the network is slow today” and then “the VPN is acting up” and then “maybe the new kernel is weird.” People love a fashionable root cause.
The killer detail was that every privileged command—installing packages, restarting services, fetching logs as root—had a 10–15 second delay.
Multiplied across automation steps, the CI job time blew up. Someone finally timed sudo -n true and saw the pattern: consistent delay, no CPU spike.
The fix was a two-line edit in /etc/hosts. The cloud image had been templated with 127.0.1.1 ubuntu-template,
and cloud-init renamed the host at boot without updating that line. The system fell through to DNS every time it tried to resolve itself.
The lesson wasn’t “be smarter”. It was “stop assuming the symptom tells you the layer.” SSH being “available” doesn’t mean name resolution
isn’t killing you inside privileged tooling.
Mini-story 2: The optimization that backfired
A finance-adjacent enterprise had a “latency reduction initiative” that included trimming boot-time services from base images.
Someone decided that local host entries were “legacy” and that everything should be “real DNS”, because “we have DNS”.
The golden image got a minimalist /etc/hosts with just localhost and IPv6 boilerplate.
In the lab, it worked. In production, the network team had split-horizon DNS with different views for different segments,
and some segments didn’t have forward records for ephemeral hostnames. Reverse DNS existed for audit, but forward DNS was incomplete by design.
Suddenly, random servers would pause on sudo and occasional services would start slowly because their startup scripts did host lookups.
The “optimization” also made troubleshooting worse. When a server couldn’t reach the corporate DNS resolvers (a firewall drift issue),
basic admin commands started stalling. Operators had to fight the machine to fix the machine. That’s the operational equivalent of stepping on rakes.
They reverted to the boring practice: keep a correct local hostname mapping in /etc/hosts. DNS stayed authoritative for real names,
but the machine could always resolve itself instantly. That one local entry became a reliability feature.
The takeaway: removing local name resolution is not “modernization”. It’s outsourcing your bootstrapping to the network and praying the network is perfect.
The network is never perfect.
Mini-story 3: The boring practice that saved the day
A large company with a mixed fleet (physical, VMs, containers) had a simple rule baked into their build pipeline:
every node must pass a “self-resolution” check before being declared healthy. It was unfancy and universally disliked by people who equate
policy with bureaucracy.
The check was literally: confirm getent hosts $(hostname) returns in under 100ms and maps to loopback or the primary interface,
depending on role. If it didn’t, the instance failed provisioning and got recycled.
During a DNS maintenance window, a bad change increased resolver latency for a subset of segments. Plenty of systems had issues.
But the newly provisioned Ubuntu 24.04 nodes did not add to the fire because they always had working local self-resolution.
The on-call team still had a night. They did not have the additional night they would have had if every newly autoscaled node
joined the outage party by hanging on sudo and slow SSH.
The boring practice didn’t prevent DNS incidents. It prevented DNS incidents from turning into “everything is slow and nobody can administer anything.”
That distinction is where your sleep lives.
Joke #2: The most reliable part of many infrastructures is still a text file edited in 1983.
The boring fix: make hostname and /etc/hosts agree
Your goal is simple: when the system asks “who am I?”, it should get an answer instantly without touching DNS.
That means the current hostname must be present in /etc/hosts on a loopback mapping (or an appropriate local address).
What “correct” looks like on Ubuntu
For most Ubuntu servers, the conservative, low-drama approach is:
- Keep
127.0.0.1 localhostand IPv6 loopback entries intact. - Use
127.0.1.1for the system hostname (and optionally its FQDN). - Ensure
$(hostname)appears on that line.
Example pattern:
cr0x@server:~$ sudo sed -n '1,5p' /etc/hosts
127.0.0.1 localhost
127.0.1.1 ip-10-24-3-17 ip-10-24-3-17.internal
Why 127.0.1.1 and not 127.0.0.1? Ubuntu/Debian historically keep localhost reserved for localhost and map the hostname to 127.0.1.1.
This avoids some older software assumptions and keeps the semantics tidy. Is it the only way? No. Is it the way that avoids surprising corner cases on Ubuntu? Yes.
When you should map to a real interface IP instead
If the machine runs software that binds to hostname-resolved addresses (some Java apps, some clustered systems, some storage daemons),
mapping the hostname to loopback can be wrong. In those cases:
- Map the FQDN to the primary interface IP (the one services should advertise).
- Keep a loopback alias entry for the short hostname if you need local speed, but do it intentionally.
This is where storage clusters and distributed systems get picky. You don’t want your cluster nodes “discovering” themselves on loopback.
If you’re running Ceph, Kubernetes node identities, or anything with gossip/peer advertisements, confirm what it expects before you pick the mapping.
Hostnames in cloud: decide who is allowed to rename the machine
Ubuntu in cloud often involves cloud-init. If cloud-init is allowed to set the hostname at boot, you need to ensure
the rest of your configuration is consistent:
- If the hostname changes,
/etc/hostsmust track it. - Automation should either set both at provision time or disable provider-driven hostname changes.
The failure mode is predictable: golden image has ubuntu-template, instance becomes ip-10-..., and now name resolution hits DNS.
Your incident ticket will call it “sudo broken” because humans are honest like that.
Common mistakes: symptom → root cause → fix
1) Symptom: “sudo takes 10–30 seconds”
Root cause: $(hostname) does not resolve locally; NSS falls through to DNS and waits on timeouts.
Fix: Add/update 127.0.1.1 your-hostname (and optionally FQDN) in /etc/hosts, then retest with time sudo -n true.
2) Symptom: “sudo: unable to resolve host …” appears after renaming
Root cause: /etc/hostname or hostnamectl changed, but /etc/hosts still contains the old name.
Fix: Edit /etc/hosts to include the new hostname; don’t revert the rename unless you meant to.
3) Symptom: SSH login prompt appears slowly, but once logged in it’s fine
Root cause: Server-side reverse DNS lookups for the client IP are slow (UseDNS yes) or DNS resolvers are unreachable.
Fix: In disposable environments, set UseDNS no. In audited environments, fix PTR records and resolver reachability instead.
4) Symptom: Local services start slowly at boot; logs show “Temporary failure in name resolution”
Root cause: Services call hostname resolution early; if DNS is used and not ready, they stall.
Fix: Ensure hostname resolves via /etc/hosts and that hosts: in nsswitch.conf has files first.
5) Symptom: Everything works on one network, breaks on another (VPN vs office vs cloud)
Root cause: Your system is depending on upstream DNS to resolve its own hostname; different networks provide different DNS views/latency.
Fix: Make self-resolution local. Then decide whether DNS for the hostname is also required for external systems.
6) Symptom: You “fixed” /etc/hosts, but it still hangs
Root cause: NSS order was modified, or the hostname being resolved is not what you think (FQDN vs short name), or the lookup is for the client IP reverse DNS (SSH).
Fix: Check hostnamectl, sudo sshd -T, and grep '^hosts:' /etc/nsswitch.conf. Use time getent hosts ... to isolate which name is slow.
7) Symptom: “sudo” is fast, but some storage/cluster component can’t bind or advertises 127.0.1.1
Root cause: You mapped a service identity hostname to loopback, but the service expects a routable address.
Fix: Map the service/FQDN to the real interface IP. Keep loopback mapping only for a local-only alias if needed.
Checklists / step-by-step plan
Checklist A: Fix sudo slowness caused by hostname/hosts mismatch (safe and fast)
- Measure:
time sudo -n true. If it’s consistently slow, proceed. - Identify hostname:
hostnameandhostnamectl. Write it down. - Check local mapping:
grep -n '127.0.1.1' /etc/hostsandcat /etc/hosts. - Back up: copy
/etc/hoststo a timestamped file. - Edit: ensure a line like
127.0.1.1 your-hostnameexists (optionally add FQDN). - Validate:
time getent hosts "$(hostname)"must be < 0.1s in normal conditions. - Validate again:
time sudo -n trueshould drop to sub-second. - Stop. Don’t touch DNS unless you still have symptoms.
Checklist B: Fix slow SSH session setup (server-side)
- Confirm the delay: check timestamps in
/var/log/auth.logaround connection and authentication. - Inspect effective config:
sudo sshd -T | egrep 'usedns|gssapiauthentication'. - If reverse DNS is not required: set
UseDNS no, restartssh, retest. - If reverse DNS is required: fix PTR records and make sure resolvers are reachable with low latency from the server.
- Retest from a client and watch logs again.
Checklist C: Prevent it in automation (the part future-you will thank you for)
- In your provisioning pipeline, add a health check:
getent hosts $(hostname)must return quickly. - Enforce
/etc/hostscorrectness in the image build (template hostnames are fine; leaving them uncorrected is not). - Decide whether cloud-init is allowed to rename the host; if yes, ensure it also updates hosts or your tooling does.
- Standardize on short name vs FQDN usage; mixed expectations create phantom bugs.
- Document the exception cases (clusters that must resolve to routable IPs).
FAQ (the questions you’ll get asked five minutes after you fix it)
1) Why does a hostname mismatch affect sudo at all?
Because sudo (and libraries it uses) may resolve the local hostname for logging, audit records, policy evaluation, or display.
If resolution falls through to slow DNS, sudo inherits the wait.
2) Why is this showing up on Ubuntu 24.04 specifically?
The behavior isn’t new, but 24.04 deployments often involve cloud-init, templated images, and systemd-resolved defaults.
That combination makes hostname drift more common, and the resulting timeouts more visible.
3) Do I need to reboot after fixing /etc/hosts?
No. Name resolution via /etc/hosts is read at lookup time. Once the file is corrected, lookups should be immediately fast.
If you changed the hostname itself, services may need restarts, but the hosts fix doesn’t require rebooting.
4) Should the hostname map to 127.0.1.1 or 127.0.0.1?
On Ubuntu/Debian, mapping it to 127.0.1.1 is the conventional, low-surprise choice.
Keep 127.0.0.1 for localhost.
5) Should I put the hostname on the machine’s real IP instead of loopback?
Sometimes. If the hostname represents a network identity used by other hosts or cluster members, map it to the real interface IP and ensure DNS matches.
If the hostname is mostly local identity and you just want sudo fast, loopback mapping is fine.
6) If I add the hostname to /etc/hosts, am I “lying” to DNS?
You’re providing a local override for local correctness. That’s not lying; it’s bootstrapping.
If other systems need to reach this host by name, you still need proper DNS. Local hosts entries don’t replace that.
7) SSH is slow only for some client networks. Is that still hostname mismatch?
It could be, but it’s more commonly reverse DNS on the server for the client IP. Different client subnets have different PTR behavior.
Check server logs for gaps and confirm UseDNS behavior.
8) What’s the safest way to rename an Ubuntu server without breaking sudo?
Use hostnamectl set-hostname (or edit /etc/hostname carefully), then immediately update /etc/hosts
so the new name resolves locally. Verify with getent hosts $(hostname).
9) Can systemd-resolved cache the wrong thing and keep it slow?
Caching can affect DNS lookups, but a correct /etc/hosts entry with files first in NSS should bypass DNS entirely.
If it’s still slow, your NSS order or the name being looked up is different than you think.
10) Is disabling SSH reverse DNS (UseDNS no) always safe?
Safe enough in many environments, but not always appropriate. If you rely on host-based controls, auditing that requires PTR, or strict logging policies,
fix DNS instead of disabling checks.
Next steps that prevent the repeat
The operational truth: hostname/hosts mismatch is not a “rare bug”. It’s a routine outcome of templating, cloud metadata, and humans renaming servers
without finishing the paperwork.
Do the boring fix: ensure $(hostname) resolves instantly via /etc/hosts. Validate with getent.
Then, and only then, chase DNS quality issues or SSH reverse DNS behavior if you still have symptoms.
Practical next steps I’d actually put in a runbook:
- Add an automated “self-resolution” check to provisioning pipelines.
- Standardize your base image: correct
/etc/hostsline, no stale template hostname left behind. - Decide whether SSH should do reverse DNS in your environment; pick a policy, document it, enforce it.
- When you rename a host, treat
/etc/hostsas part of the rename, not an optional accessory.
You don’t get medals for fixing this. You get your afternoon back. That’s the better prize.