Control: severity -1 important

Nope, the plan to follow upstream releases was acked by both the security and 
release teams, so I am not doing anything really surprising here. BIND 9 
packages are following the patch releases for each minor release (in the 
traditional major.minor.patch version triplet).

So, let’s focus on what could be improved here. I don’t think anything like 
this will happen ever again in 9.16, but I’ll try to be more vigilant about 
possibly breaking changes next time.

Also Steinar, while I understand this has caused you some distress, this is not 
really a grave bug. It does not make: the package in question unusable or 
mostly so, or causes data loss, or introduces a security hole allowing access 
to the accounts of users who use the package.

As I said in the other email, I’ll take a look if I can soften the requirement 
for the configuration in the Debian package tomorrow. Perhaps just downgrade it 
to a prominent warning instead of hard error.

Ondřej
--
Ondřej Surý <ond...@sury.org> (He/Him)

> On 22. 9. 2022, at 23:16, Steinar H. Gunderson <se...@debian.org> wrote:
> 
> On Thu, Sep 22, 2022 at 08:13:53PM +0200, Ondřej Surý wrote:
>> I am sorry this has caused inconvenience for you, but the original problem 
>> here was that the implicit inline-signing with the dnssec-policy was also 
>> problematic and causing other problems, see the upstream issue: 
>> https://gitlab.isc.org/isc-projects/bind9/-/issues/3381
>> 
>> Especially this: 
>> https://gitlab.isc.org/isc-projects/bind9/-/issues/3381#note_308893
> 
> Sure, but that's not appropriate to change in a stable-security update.
> You can ask the SRMs whether it is applicable for a stable update
> (I would say no; the point of stable is that you know what issues
> you have and don't get new ones), but you cannot just put it into
> a security update unless they are positively required for the security
> issues in question.
> 
> /* Steinar */
> -- 
> Homepage: https://www.sesse.net/

Reply via email to