Bug 1147277

Summary: ntpd is not a default ntp client since fedora 16
Product: [Fedora] Fedora Reporter: Petr Lautrbach <plautrba>
Component: scap-security-guideAssignee: Jan Lieskovsky <jlieskov>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 22CC: jlieskov, pvrabec, slukasik
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: scap-security-guide-0.1.29-1.fc24 scap-security-guide-0.1.29-1.fc22 scap-security-guide-0.1.29-1.fc23 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-05-12 01:30:48 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Petr Lautrbach 2014-09-28 19:27:31 UTC
Description of problem:
Since Fedora 16, chrony is used as a default ntp client instead of ntpd, see
https://fedoraproject.org/wiki/Features/ChronyDefaultNTP

$ oscap xccdf eval --profile common /usr/share/xml/scap/ssg/fedora/ssg-fedora-xccdf.xml
...
Title   NTP Daemon Enabled
Rule    service_ntpd_enabled
Result  fail

Comment 1 Jaroslav Reznik 2015-03-03 16:19:54 UTC
This bug appears to have been reported against 'rawhide' during the Fedora 22 development cycle.
Changing version to '22'.

More information and reason for this action is here:
https://fedoraproject.org/wiki/Fedora_Program_Management/HouseKeeping/Fedora22

Comment 2 Fedora Update System 2016-05-05 15:43:27 UTC
scap-security-guide-0.1.29-1.fc24 has been submitted as an update to Fedora 24. https://bodhi.fedoraproject.org/updates/FEDORA-2016-e7317348b1

Comment 3 Fedora Update System 2016-05-05 15:45:04 UTC
scap-security-guide-0.1.29-1.fc23 has been submitted as an update to Fedora 23. https://bodhi.fedoraproject.org/updates/FEDORA-2016-2a44222037

Comment 4 Fedora Update System 2016-05-05 15:49:53 UTC
scap-security-guide-0.1.29-1.fc22 has been submitted as an update to Fedora 22. https://bodhi.fedoraproject.org/updates/FEDORA-2016-bcb9f10316

Comment 5 Fedora Update System 2016-05-06 11:26:58 UTC
scap-security-guide-0.1.29-1.fc24 has been pushed to the Fedora 24 testing repository. If problems still persist, please make note of it in this bug report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-e7317348b1

Comment 6 Fedora Update System 2016-05-06 20:51:53 UTC
scap-security-guide-0.1.29-1.fc22 has been pushed to the Fedora 22 testing repository. If problems still persist, please make note of it in this bug report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-bcb9f10316

Comment 7 Fedora Update System 2016-05-06 20:55:26 UTC
scap-security-guide-0.1.29-1.fc23 has been pushed to the Fedora 23 testing repository. If problems still persist, please make note of it in this bug report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-2a44222037

Comment 8 Fedora Update System 2016-05-12 01:30:42 UTC
scap-security-guide-0.1.29-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.

Comment 9 Fedora Update System 2016-05-16 22:24:23 UTC
scap-security-guide-0.1.29-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.

Comment 10 Fedora Update System 2016-05-16 22:27:20 UTC
scap-security-guide-0.1.29-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.