tags -1 +confirmed +upstream
thanks
Hi Vincent!
I'm double-checking this with upstream, since the implementation of
openntpd goes far on resctricting quite a lot some security concerns on
this socket file.
Moreover, the code seems to have been approaching this socket as a
control socket,
Package: openntpd
Version: 1:5.7p4-1
Severity: wishlist
The ntpd.sock file is created with only user and group rw permissions
(for root:root), so that for the end user, ntpctl fails:
$ ntpctl -s all
ntpctl: connect: /var/lib/openntpd/run/ntpd.sock: Permission denied
There's no good reason to
2 matches
Mail list logo