Package: ntpsec Followup-For: Bug #901439 Dear Maintainer,
*** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? * What exactly did you do (or not do) that was effective (or ineffective)? Upgraded kernel to: https://github.com/torvalds/linux/commit/9215310cf13bccfe777500986d562d53bdb63537 which includes: 5) Revert SO_REUSE{ADDR,PORT} change, it regresses various things including Avahi mDNS. From Bart Van Assche. * What was the outcome of this action? It appears that ntpsec runs now, but I had to restart it as the process that was started at boot time had died. * What outcome did you expect instead? *** End of the template - remove these template lines *** -- System Information: Debian Release: buster/sid APT prefers experimental APT policy: (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 4.17.0+ (SMP w/4 CPU cores; PREEMPT) Locale: LANG=en_AU.UTF-8, LC_CTYPE= (charmap=UTF-8), LANGUAGE=en_GB (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Init: sysvinit (via /sbin/init) Versions of packages ntpsec depends on: ii adduser 3.117 ii libc6 2.27-3 ii libcap2 1:2.25-1.2 ii libssl1.1 1.1.0h-4 ii lsb-base 9.20170808 ii netbase 5.4 ii python3 3.6.5-3 ii python3-ntp 1.1.0+dfsg1-1 ii tzdata 2018e-1 Versions of packages ntpsec recommends: ii cron [cron-daemon] 3.0pl1-130 Versions of packages ntpsec suggests: ii apparmor 2.12-4 pn ntpsec-doc <none> pn ntpsec-ntpviz <none> -- no debconf information