Your message dated Tue, 17 Jan 2023 04:20:02 +0000
with message-id <[email protected]>
and subject line Bug#1023023: fixed in ntpsec 1.2.2+dfsg1-1
has caused the Debian Bug report #1023023,
regarding systemd[1]: ntpsec.service: Can't open PID file /run/ntpd.pid (yet?)
after start: Operation not permitted
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1023023: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023023
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: ntpsec
Version: 1.2.1+dfsg1-8
Severity: minor
Hi,
on my systems, systemd logs when starting up ntpsec:
systemd[1]: ntpsec.service: Can't open PID file /run/ntpd.pid (yet?) after
start: Operation not permitted
The pidfile seems to be written okay though.
This is misleading when debugging ntp. The message shouldnt be there.
Greetings
Marc
-- System Information:
Debian Release: bookworm/sid
APT prefers stable-security
APT policy: (500, 'stable-security'), (500, 'unstable'), (500, 'testing'),
(500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 6.0.3-zgsrv20080 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=de_DE.utf8, LC_CTYPE=de_DE.utf8 (charmap=UTF-8), LANGUAGE=en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
Versions of packages ntpsec depends on:
ii adduser 3.129
ii init-system-helpers 1.65.2
ii libbsd0 0.11.7-1
ii libc6 2.35-3
ii libcap2 1:2.44-1
ii libssl3 3.0.5-4
ii lsb-base 11.4
ii netbase 6.4
ii python3 3.10.6-1
ii python3-ntp 1.2.1+dfsg1-8
ii sysvinit-utils [lsb-base] 3.05-6
ii tzdata 2022e-1
Versions of packages ntpsec recommends:
ii cron [cron-daemon] 3.0pl1-150+b1
ii systemd 251.6-1
Versions of packages ntpsec suggests:
pn apparmor <none>
pn certbot <none>
pn ntpsec-doc <none>
pn ntpsec-ntpviz <none>
-- Configuration Files:
/etc/ntpsec/ntp.conf changed [not included]
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: ntpsec
Source-Version: 1.2.2+dfsg1-1
Done: Richard Laager <[email protected]>
We believe that the bug you reported is fixed in the latest version of
ntpsec, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Richard Laager <[email protected]> (supplier of updated ntpsec package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 16 Jan 2023 21:50:45 -0600
Source: ntpsec
Architecture: source
Version: 1.2.2+dfsg1-1
Distribution: unstable
Urgency: medium
Maintainer: Richard Laager <[email protected]>
Changed-By: Richard Laager <[email protected]>
Closes: 1023023
Changes:
ntpsec (1.2.2+dfsg1-1) unstable; urgency=medium
.
* New upstream version
- Restore/cleanup NTPv1 support
- NTS supports partial wildcards, for example *.example.com
- Work on documentation, ntpdate, ntpheat, ntploggpg, ntpq’s sysstats,
ntpviz, and seccomp.
- NTP auth no longer breaks on NULs.
- The NTS server now saves 10 days worth of cookie keys. This will allow
clients that only poll once a day to use NTS without using NTS-KE to
keep cookies up to date.
- rawstats now logs dropped packets and their BOGON code
- Add 4 or 6 to DNS/NTS RefID tags to indicate that the DNS or NTS-KE has
succeeded but NTP has not worked yet.
- Fix hash validation in ntpleapfetch again
* Update Standards-Version to 4.6.2 (no changes)
* Write pidfile in parent (Closes: 1023023)
Checksums-Sha1:
f44505f62f9b315b999e4ae0c12dc5660be002d6 2593 ntpsec_1.2.2+dfsg1-1.dsc
bc8d5a18dcebc470360a640df530849f7d58461e 2317956 ntpsec_1.2.2+dfsg1.orig.tar.xz
34d3d46b18bea48294e985becf23e028bafd10c9 57628
ntpsec_1.2.2+dfsg1-1.debian.tar.xz
c994388f06b4d39f0289193b0d647d75a233289d 8697
ntpsec_1.2.2+dfsg1-1_source.buildinfo
Checksums-Sha256:
61b0c575eddeb61bb34e14cbf5d6081f51c47f369c1cef028ffa40c7e12a7238 2593
ntpsec_1.2.2+dfsg1-1.dsc
53e527e3d04d551d41af2d359c2715c2de5f5bfa2a695d4ec1a811b3e9137f63 2317956
ntpsec_1.2.2+dfsg1.orig.tar.xz
5690df97be061677437c9bdda68ef8f94f376219af1454e4344f0fcef346b539 57628
ntpsec_1.2.2+dfsg1-1.debian.tar.xz
e15dd417c94cc8f838f8b5ec5a8f2cb02eb2cde6a1b0f777a5419e3ec30e06c4 8697
ntpsec_1.2.2+dfsg1-1_source.buildinfo
Files:
427270d39cf549b3a56d77f7bb09c3ab 2593 net optional ntpsec_1.2.2+dfsg1-1.dsc
2787c8145e6ba35c52967d020b38ade0 2317956 net optional
ntpsec_1.2.2+dfsg1.orig.tar.xz
09d40bd3555b34c895967929b1f973ef 57628 net optional
ntpsec_1.2.2+dfsg1-1.debian.tar.xz
ab54dad3fcd01f93f2154124700891ec 8697 net optional
ntpsec_1.2.2+dfsg1-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=Wbqd
-----END PGP SIGNATURE-----
--- End Message ---