Package: ntpsec
Followup-For: Bug #901439
Dear Maintainer,
*** Reporter, please consider answering these questions, where appropriate ***
* What led up to the situation?
* What exactly did you do (or not do) that was effective (or
ineffective)?
Upgraded kernel to:
https://github.com/torvalds/linux/commit/9215310cf13bccfe777500986d562d53bdb63537
which includes:
5) Revert SO_REUSE{ADDR,PORT} change, it regresses various things
including Avahi mDNS. From Bart Van Assche.
* What was the outcome of this action?
It appears that ntpsec runs now, but I had to restart it as the process that
was started at boot time had died.
* What outcome did you expect instead?
*** End of the template - remove these template lines ***
-- System Information:
Debian Release: buster/sid
APT prefers experimental
APT policy: (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 4.17.0+ (SMP w/4 CPU cores; PREEMPT)
Locale: LANG=en_AU.UTF-8, LC_CTYPE= (charmap=UTF-8), LANGUAGE=en_GB
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: sysvinit (via /sbin/init)
Versions of packages ntpsec depends on:
ii adduser 3.117
ii libc6 2.27-3
ii libcap2 1:2.25-1.2
ii libssl1.1 1.1.0h-4
ii lsb-base 9.20170808
ii netbase 5.4
ii python3 3.6.5-3
ii python3-ntp 1.1.0+dfsg1-1
ii tzdata 2018e-1
Versions of packages ntpsec recommends:
ii cron [cron-daemon] 3.0pl1-130
Versions of packages ntpsec suggests:
ii apparmor 2.12-4
pn ntpsec-doc <none>
pn ntpsec-ntpviz <none>
-- no debconf information