Your message dated Sat, 14 Feb 2026 22:19:03 +0000
with message-id <[email protected]>
and subject line Bug#1127000: fixed in ntpsec 1.2.4+dfsg-1
has caused the Debian Bug report #1127000,
regarding ntpsec: Please package ntpsec version 1.2.4
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1127000: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127000
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: ntpsec
Severity: wishlist
X-Debbugs-Cc: [email protected]
Dear maintainer,
Upstream released ntpsec version 1.2.4 [1]. This release includes
features that are of interest to DSA, in particular the possibility to
listen on a second port.
Would it be possible to package this new version?
Regards
Aurelien
[1] https://blog.ntpsec.org/2025/04/18/version-1.2.4.html
--- End Message ---
--- Begin Message ---
Source: ntpsec
Source-Version: 1.2.4+dfsg-1
Done: Richard Laager <[email protected]>
We believe that the bug you reported is fixed in the latest version of
ntpsec, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Richard Laager <[email protected]> (supplier of updated ntpsec package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 07 Feb 2026 23:22:59 -0600
Source: ntpsec
Architecture: source
Version: 1.2.4+dfsg-1
Distribution: unstable
Urgency: low
Maintainer: Richard Laager <[email protected]>
Changed-By: Richard Laager <[email protected]>
Closes: 1108327 1108417 1121536 1127000
Changes:
ntpsec (1.2.4+dfsg-1) unstable; urgency=low
.
* New upstream version (Closes: 1127000)
- Fix ntpviz's skewness and kurtosis formulas. Fix suggested by
Frank Davis.
- ntpd now runs on FIPS mode systems.
- Clock fuzzing is gone.
- Fix distinct rpeers mode in PeerSummary.summary.
- ntpd can now listen on a second port. Add either "nts port xxxx"
or "extra port xxxx" in your config file. If either is specified,
the NTS-KE server will tell the client to use that port. Client
requests will also be sent from that port.
- NTPsec now builds on Linux armhf.
- Remove some remnant broadcast/multicast cruft.
- Add a ntpdig option to bind to a specific address.
- Add an ntpd config file option for the NTS-KE server's preferred TLS
ciphers.
- Remove unused holdover, LOOP_KERN_CLEAR and timetoa from ntpd.
- Add and revise exponential timing decay and MS-SNTP testing tools.
* ntpsec-systemd-netif.service: Simplify /bin/sh
Thanks to Christoph Anton Mitterer <[email protected]>
(Closes: 1121536)
* ntpsec-systemd-netif.service: Conditionalize on the existence of the hook
(Closes: 1121536)
* ntp.conf: Add nomrulist to "restrict default"
Thanks to Dave Hart <[email protected]> (Closes: 1108327)
* Build the gpsd JSON driver (Closes: 1108417)
* Update to Standards-Version 4.7.3
Checksums-Sha1:
6a06272a923f9aa40510427875cf61e886df74ac 2442 ntpsec_1.2.4+dfsg-1.dsc
2827a4ab1dd215f2de9a696d8ab0df3f73782a1a 2334200 ntpsec_1.2.4+dfsg.orig.tar.xz
741b33e1ad9ee0c4fa1fc28d72e089f4a7b6fb4b 58852
ntpsec_1.2.4+dfsg-1.debian.tar.xz
c3101108efaff87c04487ae1eed954ca38c798d7 8699
ntpsec_1.2.4+dfsg-1_source.buildinfo
Checksums-Sha256:
fd8acccf64e74aa147efeb722fb0d518f68c1772841cb4ab666462eda7e75e5a 2442
ntpsec_1.2.4+dfsg-1.dsc
2eb997ee8f6c93737fcced6f14c796b4bcb05cd15a39d07b085f6374fcb8737e 2334200
ntpsec_1.2.4+dfsg.orig.tar.xz
67766b2a264c4d3f9529aee8c9e85a923155b57fe6f79f311868d2591db9adcd 58852
ntpsec_1.2.4+dfsg-1.debian.tar.xz
187ded96c2e95e36767f788f2b6721c163212fb512578cb5de7943b81049fe9b 8699
ntpsec_1.2.4+dfsg-1_source.buildinfo
Files:
004a7c0bb3c466e4a3952af58b809cad 2442 net optional ntpsec_1.2.4+dfsg-1.dsc
a363e1520c1a47922b2d879ce8c6b807 2334200 net optional
ntpsec_1.2.4+dfsg.orig.tar.xz
522e979146fa3d3eb2ac4556a0bebfb9 58852 net optional
ntpsec_1.2.4+dfsg-1.debian.tar.xz
72d332b6d2eb0ed8295be6b8ffc81939 8699 net optional
ntpsec_1.2.4+dfsg-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=E7qE
-----END PGP SIGNATURE-----
pgpRZk0ZS5n7c.pgp
Description: PGP signature
--- End Message ---