Your message dated Tue, 18 Sep 2018 11:55:35 +0200
with message-id <[email protected]>
and subject line Closing ntpdate ifupdown related bugs, removed from Buster
has caused the Debian Bug report #818846,
regarding ntpd failed at boot (unable to bind to wildcard address :: - another 
process may be running)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
818846: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818846
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: ntp
Version: 1:4.2.8p4+dfsg-3+b1
Severity: normal

ntp failed at boot:

Mar 18 14:39:13 ypig ntpd[1956]: ntpd [email protected] Tue Nov  3 02:26:54 UTC 
2015 (1): Starting
Mar 18 14:39:13 ypig ntpd[1956]: Command line: /usr/sbin/ntpd -p 
/var/run/ntpd.pid -g -c /var/lib/ntp/ntp.conf.dhcp -u 113:121
Mar 18 14:39:14 ypig ntpd[2210]: proto: precision = 0.072 usec (-24)
Mar 18 14:39:14 ypig ntpd[2210]: unable to bind to wildcard address :: - 
another process may be running - EXITING

I had to start it manually.

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'stable-updates'), (500, 
'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.4.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=POSIX, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages ntp depends on:
ii  adduser      3.114
ii  dpkg         1.18.4
ii  libc6        2.22-3
ii  libcap2      1:2.24-12
ii  libedit2     3.1-20150325-1+b1
ii  libopts25    1:5.18.7-3
ii  libssl1.0.2  1.0.2g-1
ii  lsb-base     9.20160110
ii  netbase      5.3

Versions of packages ntp recommends:
ii  perl  5.22.1-9

Versions of packages ntp suggests:
ii  ntp-doc  1:4.2.8p4+dfsg-3

-- no debconf information

--- End Message ---
--- Begin Message ---
Version: 1:4.2.8p12+dfsg-2

Dear user,

the bug you have submitted is related to the ifupdown triggers shipped
by the ntpdate package that did a one-shot time sync every time an
interface managed by ifupdown was configured.

The hooks have been removed from the ntpdate package in version
1:4.2.8p12+dfsg-2, which will be part of the Buster release.

ntpdate.NEWS reads:

  TL;DR: The ntpdate package does NOT ship triggers for ifupdown to run
  a one-time sync every time an interface comes up anymore. These hooks
  will also be removed on upgrades to Buster. It is strongly recommended
  to switch to a permanent NTP daemon like ntp, systemd-timesyncd or chrony.
  If you need a one-time sync in your setup please arrange for it
  yourselves, i.e. by calling sntp with the appropriate parameters in
  /etc/network/interfaces(.d) .

  Historically the package ntpdate has included both /usr/bin/ntpdate
(which is
  the historic go-to program for one-shot NTP querying) and ifupdown
hooks to
  execute a one-shot NTP query on every interface up event.

  The ifupdown hooks have introduced buggy behaviour by syncing too often
  (on every ifup), too seldom (never again) and are likely to interfere with
  other time-keeping measures on the same system including ntpd. The hooks
  frequently caused dependency problems with local DNS resolvers or uncommon
  network configurations. They have therefor been dropped from the ntpdate
  package.

  For time synchronisation purpose please use one of the many timekeeping
  daemons in Debian (ntp, systemd-timesyncd, chrony).

  For the manual use, /usr/bin/ntpdate has been deprecated upstream and
  replaced by /usr/bin/sntp (in the sntp binary package). If you want a
  proper one-shot sync against a pool of servers you may also consider the
  -q option of ntpd.

Best Regards,
The NTP maintainers

--- End Message ---

Reply via email to