On Fri, Sep 23, 2022 at 12:09:45AM +0200, Ondřej Surý wrote:
> Nope, the plan to follow upstream releases was acked by both the security
> and release teams, so I am not doing anything really surprising here.

Well, it is really surprising to users :-) Other packages that have been
doing the same thing (e.g. firefox and chromium) have been explicit about
fixing-by-wholesale-upgrading in the advisory in the past.

> So, let’s focus on what could be improved here. I don’t think anything like
> this will happen ever again in 9.16, but I’ll try to be more vigilant about
> possibly breaking changes next time.
> 
> Also Steinar, while I understand this has caused you some distress, this is
> not really a grave bug. It does not make: the package in question unusable
> or mostly so, or causes data loss, or introduces a security hole allowing
> access to the accounts of users who use the package.

I'm fine with downgrading the severity (it's mostly semantics anyway);
but do note that security updates are treated differently from nearly every
other update. In particular, unattended-upgrades will install them by
default, and administrators are urged to install them as quickly as possible
on their production servers without testing in a staging environment first.
This makes them much more sensitive than a normal stable update, which goes
through proposed-stable-updates first.

In our case, it happened to break the entire system; it uses 127.0.0.1
in resolv.conf, and login uses Kerberos, which is dependent on DNS...

Note that if we add “inline-signing yes;” on all of the zones with
dnssec-policy on, BIND crashes with an assertion failure on reloading the
config:

  Sep 22 22:32:52 cirkus named[3064511]: rbtdb.c:6837: REQUIRE(((rbtnode->nsec 
== DNS_RBT_NSEC_NSEC3 && (rdataset->type == 
((dns_rdatatype_t)dns_rdatatype_nsec3) || rdataset->covers == 
((dns_rdatatype_t)dns_rdatatype_nsec3))) || (rbtnode->nsec != 
DNS_RBT_NSEC_NSEC3 && rdataset->type != ((dns_rdatatype_t)dns_rdatatype_nsec3) 
&& rdataset->covers != ((dns_rdatatype_t)dns_rdatatype_nsec3)))) failed, back 
trace
  Sep 22 22:32:52 cirkus named[3064511]: #0 0x55dd86375f1d in ??
  Sep 22 22:32:52 cirkus named[3064511]: #1 0x7fddb899090a in ??
  Sep 22 22:32:52 cirkus named[3064511]: #2 0x7fddb8ac981c in ??
  Sep 22 22:32:52 cirkus named[3064511]: #3 0x7fddb8b9a461 in ??
  Sep 22 22:32:52 cirkus named[3064511]: #4 0x7fddb89c36bd in ??
  Sep 22 22:32:52 cirkus named[3064511]: #5 0x7fddb89ac6a9 in ??
  Sep 22 22:32:52 cirkus named[3064511]: #6 0x7fddb89ac825 in ??
  Sep 22 22:32:52 cirkus named[3064511]: #7 0x7fddb89ad003 in ??
  Sep 22 22:32:52 cirkus named[3064511]: #8 0x7fddb876ee7d in ??
  Sep 22 22:32:52 cirkus named[3064511]: #9 0x7fddb8780a23 in ??
  Sep 22 22:32:52 cirkus named[3064511]: #10 0x7fddb876f714 in ??
  Sep 22 22:32:52 cirkus named[3064511]: #11 0x7fddb89ac8d7 in ??
  Sep 22 22:32:52 cirkus named[3064511]: #12 0x7fddb89c5ec6 in ??
  Sep 22 22:32:52 cirkus named[3064511]: #13 0x7fddb8745ea7 in ??
  Sep 22 22:32:52 cirkus named[3064511]: #14 0x7fddb8327aef in ??
  Sep 22 22:32:52 cirkus named[3064511]: exiting (due to assertion failure)

This is the old version, though, so it might be better with the new one.

> As I said in the other email, I’ll take a look if I can soften the
> requirement for the configuration in the Debian package tomorrow. Perhaps
> just downgrade it to a prominent warning instead of hard error.

That would be most appreciated, yes.

/* Steinar */
-- 
Homepage: https://www.sesse.net/

Reply via email to