Bug 1147277 - ntpd is not a default ntp client since fedora 16
Summary: ntpd is not a default ntp client since fedora 16
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: scap-security-guide
Version: 22
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Jan Lieskovsky
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-09-28 19:27 UTC by Petr Lautrbach
Modified: 2016-05-16 22:27 UTC (History)
3 users (show)

Fixed In Version: scap-security-guide-0.1.29-1.fc24 scap-security-guide-0.1.29-1.fc22 scap-security-guide-0.1.29-1.fc23
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-05-12 01:30:48 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Petr Lautrbach 2014-09-28 19:27:31 UTC
Description of problem:
Since Fedora 16, chrony is used as a default ntp client instead of ntpd, see
https://fedoraproject.org/wiki/Features/ChronyDefaultNTP

$ oscap xccdf eval --profile common /usr/share/xml/scap/ssg/fedora/ssg-fedora-xccdf.xml
...
Title   NTP Daemon Enabled
Rule    service_ntpd_enabled
Result  fail

Comment 1 Jaroslav Reznik 2015-03-03 16:19:54 UTC
This bug appears to have been reported against 'rawhide' during the Fedora 22 development cycle.
Changing version to '22'.

More information and reason for this action is here:
https://fedoraproject.org/wiki/Fedora_Program_Management/HouseKeeping/Fedora22

Comment 2 Fedora Update System 2016-05-05 15:43:27 UTC
scap-security-guide-0.1.29-1.fc24 has been submitted as an update to Fedora 24. https://bodhi.fedoraproject.org/updates/FEDORA-2016-e7317348b1

Comment 3 Fedora Update System 2016-05-05 15:45:04 UTC
scap-security-guide-0.1.29-1.fc23 has been submitted as an update to Fedora 23. https://bodhi.fedoraproject.org/updates/FEDORA-2016-2a44222037

Comment 4 Fedora Update System 2016-05-05 15:49:53 UTC
scap-security-guide-0.1.29-1.fc22 has been submitted as an update to Fedora 22. https://bodhi.fedoraproject.org/updates/FEDORA-2016-bcb9f10316

Comment 5 Fedora Update System 2016-05-06 11:26:58 UTC
scap-security-guide-0.1.29-1.fc24 has been pushed to the Fedora 24 testing repository. If problems still persist, please make note of it in this bug report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-e7317348b1

Comment 6 Fedora Update System 2016-05-06 20:51:53 UTC
scap-security-guide-0.1.29-1.fc22 has been pushed to the Fedora 22 testing repository. If problems still persist, please make note of it in this bug report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-bcb9f10316

Comment 7 Fedora Update System 2016-05-06 20:55:26 UTC
scap-security-guide-0.1.29-1.fc23 has been pushed to the Fedora 23 testing repository. If problems still persist, please make note of it in this bug report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-2a44222037

Comment 8 Fedora Update System 2016-05-12 01:30:42 UTC
scap-security-guide-0.1.29-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.

Comment 9 Fedora Update System 2016-05-16 22:24:23 UTC
scap-security-guide-0.1.29-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.

Comment 10 Fedora Update System 2016-05-16 22:27:20 UTC
scap-security-guide-0.1.29-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.