File: use-ntpsec-as-the-user.patch

package info (click to toggle)
ntpsec 1.2.3%2Bdfsg1-8
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 10,960 kB
  • sloc: ansic: 62,004; python: 32,017; sh: 1,553; yacc: 1,293; makefile: 190; javascript: 138
file content (29 lines) | stat: -rw-r--r-- 1,328 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Description: Use ntpsec as the user
 This is the user used in the ntpsec packaging, to stay out of the namespace
 of the ntp package.
Forwarded: not-needed
Origin: vendor
Author: Richard Laager <rlaager@debian.org>
Last-Update: 2023-01-16
--- a/docs/includes/ntpkeygen-body.adoc
+++ b/docs/includes/ntpkeygen-body.adoc
@@ -32,7 +32,7 @@
 The simplest way to run the +ntpkeygen+ program is logged in directly as
 root. The recommended procedure is to change to the keys directory,
 usually +/etc/ntp/+, then run the program.  Then chown the output
-file to ntp:ntp.  It should be mode 400.
+file to ntpsec:ntpsec.  It should be mode 400.
 
 WARNING: +ntpkeygen+ uses the system randomness source.  On a POSIX
 system, this is usually /dev/urandom.  Immediately after a reboot, on any
--- a/docs/NTS-QuickStart.adoc
+++ b/docs/NTS-QuickStart.adoc
@@ -126,7 +126,7 @@
 Note that `ntpd` must be able to read both files and you want to
 make sure that the bad guys can't read your private key.  It may
 be simpler to copy those files over to `/etc/ntp/` and adjust
-their owner and mode so `ntpd` running as user `ntp` can read them.
+their owner and mode so `ntpd` running as user `ntpsec` can read them.
 
 You may need to tell your system where to store the keys used
 to encrypt cookies.  The default is `/var/lib/ntp/nts-keys`.