I found the thread on the Debian Developers' Mailing List that Richard Laager (rlaager) mentioned. https://lists.debian.org/debian- devel/2022/01/msg00172.html
I read through all of the replies in the aforementioned thread. There is this devastating nugget that is not expounded upon and is the same crux I am bringing to the Ubuntu community's attention: "Sounds good, I'd like to have a few more reviewers though. ntp is aged, but according to popcon the transition could affect ~25% of the Debian installations." https://lists.debian.org/debian-devel/2022/01/msg00211.html I believe that it is critical that Ubuntu makes available the most feature complete standards complying NTP daemon. https://www.rfc- editor.org/rfc/rfc5905 The present LTS, 22.04, has the original ntp package. To advert disaster for a substantial number of users, Ubuntu will need the original ntp package available when 24.04LTS is released. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to ntp in Ubuntu. https://bugs.launchpad.net/bugs/2039252 Title: [needs-packaging] The packages ntp and ntpsec are not equivalent Status in NTP: New Status in ntp package in Ubuntu: Confirmed Status in ntp package in Debian: Confirmed Bug description: I recently did an install of Ubuntu 23.04 and then configured ntp as I have been doing so for more than 8 years. With previous versions of Debian and Ubuntu using the real ntp package, the details at https://wiki.ubuntu.com/JonathanFerguson/NTP?action=recall&rev=38 created the desired results. I updated the details at https://wiki.ubuntu.com/JonathanFerguson/NTP with the new location of ntp.conf, after restarting I noticed that the resultant output was missing requisite details. Compare the following and the lack of ".MCST." and ".ACST.": Original ntp on Apollo-Lake-N3150 jonathan@Apollo-Lake-N3450:~$ lsb_release -rd Description: Ubuntu 22.04.3 LTS Release: 22.04 jonathan@Apollo-Lake-N3450:~$ ntpq -p remote refid st t when poll reach delay offset jitter ============================================================================== 0.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 +0.000 0.000 1.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 +0.000 0.000 2.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 +0.000 0.000 3.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 +0.000 0.000 ntp.ubuntu.com .POOL. 16 p - 64 0 0.000 +0.000 0.000 ntp.mcast.net .MCST. 16 M - 64 0 0.000 +0.000 0.000 ff0e::101 .MCST. 16 M - 64 0 0.000 +0.000 0.000 ntp.mcast.net .ACST. 16 a - 64 0 0.000 +0.000 0.000 ff0e::101 .ACST. 16 a - 64 0 0.000 +0.000 0.000 *time.cloudflare 10.242.8.77 3 u 469 1024 367 234.691 -0.929 67.380 +2001-44b8-2100- 42.3.115.79 2 u 581 1024 377 487.209 +55.669 57.154 +2001-44b8-2100- 4.179.66.17 3 u 215 1024 377 489.637 +57.002 35.399 jonathan@Apollo-Lake-N3450:~$ NTPsec on Braswell-N3150 jonathan@Braswell-N3150:~$ lsb_release -rd No LSB modules are available. Description: Ubuntu 23.04 Release: 23.04 jonathan@Braswell-N3150:~$ ntpq -p remote refid st t when poll reach delay offset jitter ======================================================================================================= 0.ubuntu.pool.ntp.org .POOL. 16 p - 256 0 0.0000 0.0000 0.0002 1.ubuntu.pool.ntp.org .POOL. 16 p - 256 0 0.0000 0.0000 0.0002 2.ubuntu.pool.ntp.org .POOL. 16 p - 256 0 0.0000 0.0000 0.0002 3.ubuntu.pool.ntp.org .POOL. 16 p - 64 0 0.0000 0.0000 0.0002 +prod-ntp-5.ntp1.ps5.canonical.com 37.15.221.189 2 u 141 1024 367 383.4932 -19.6895 35.0534 *time.tfmcloud.au 203.35.83.242 2 u 325 1024 367 325.9317 -0.1496 43.0522 +any.time.nl 133.243.238.243 2 u 158 1024 373 300.7941 -20.8962 136.1422 +ntp2.its.waikato.ac.nz .GPS. 1 u 363 1024 377 356.5361 -18.2740 140.5984 +2001-44b8-2100-3f00-0000-0000-007b-0004 42.3.115.79 2 u 214 1024 367 490.3898 28.3416 2.7728 +tic.ntp.telstra.net 203.35.83.242 2 u 13 1024 367 566.0744 -14.1332 6.0377 +863xqmprtfqv69pv7nwc.ip6.superloop.au 192.168.1.1 2 u 79 1024 367 330.2658 -14.3483 16.2172 +gps-ads.10mrlp.juneks.com.au .PPS. 1 u 271 1024 367 443.4812 -71.8020 44.6332 +x.ns.gin.ntt.net 129.250.35.222 2 u 57 1024 367 22.4974 41.3055 6.0639 jonathan@Braswell-N3150:~$ This behaviour will affect the following: Ubuntu 22.10, 23.04 and 23.10 Debian 12, 13 and 14 NTPsec have documented their reasoning for lacking support. https://docs.ntpsec.org/latest/discover.html https://docs.ntpsec.org/latest/ntpsec.html https://docs.ntpsec.org/latest/assoc.html#broad https://docs.ntpsec.org/latest/assoc.html#many The issue remains that ntp and ntpsec are not capability equivalent. I foresee two means of rectifying this predicament, if NTPsec is going to be the default implementation of NTP then ntpsec needs to implement all of the capabilities of ntp, or the easier alternative is that the real ntp https://www.ntp.org/downloads/ is packaged as ntp-classic for instances where its capabilities are required. ProblemType: Bug DistroRelease: Ubuntu 23.04 Package: ntp 1:4.2.8p15+dfsg-2~1.2.2+dfsg1-1 ProcVersionSignature: Ubuntu 6.2.0-34.34-generic 6.2.16 Uname: Linux 6.2.0-34-generic x86_64 ApportVersion: 2.26.1-0ubuntu2 Architecture: amd64 CasperMD5CheckResult: pass Date: Fri Oct 13 18:13:27 2023 InstallationDate: Installed on 2023-09-15 (27 days ago) InstallationMedia: Ubuntu-Unity 23.04 "Lunar Lobster" - Release amd64 (20230419) PackageArchitecture: all SourcePackage: ntpsec UpgradeStatus: No upgrade log present (probably fresh install) modified.conffile..etc.ntpsec.ntp.conf: [modified] mtime.conffile..etc.ntpsec.ntp.conf: 2023-10-12T21:59:03.557719 To manage notifications about this bug go to: https://bugs.launchpad.net/ntp/+bug/2039252/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp