Your message dated Sun, 22 Oct 2017 13:19:11 +0200
with message-id
<1508671151.815349.1146906880.773a8...@webmail.messagingengine.com>
and subject line Closing bugs in old-old-stable bind9 versions
has caused the Debian Bug report #479686,
regarding bind9: NEWS.Debian should mention that the new allow-recursion
default will override "recursion yes"
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
479686: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=479686
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: bind9
Version: 1:9.4.2-10
Severity: wishlist
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I have been using views with "recursion yes" and "recursion no" to
control which clients that are allowed to do recursive queries. It
came as a surprise to me that all clients were denied after upgrading
til bind 9.4.2, even after reading about the new allow-recursion
default in NEWS.Debian. I thought that my "internal" view with a
proper acl and "recursion yes" would ensure that all internal clients
were allowed. It would have been helpful if the text in the
NEWS.Debian mentioned something about the priority of the recursion,
allow-recursion and allow-query-cache. Maybe something like
http://www.isc.org/sw/bind/docs/support_bulletin_200707.php
Thanks.
Bjorn
- -- System Information:
Debian Release: lenny/sid
APT prefers stable
APT policy: (700, 'stable'), (650, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.24-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash
Versions of packages bind9 depends on:
ii adduser 3.102 Add and remove users and groups
ii libbind9-30 1:9.4.2-10 BIND9 Shared Library used by BIND
ii libc6 2.7-10 GNU C Library: Shared libraries
ii libdns32 1:9.4.2-10 DNS Shared Library used by BIND
ii libisc32 1:9.4.2-10 ISC Shared Library used by BIND
ii libisccc30 1:9.4.2-10 Command Channel Library used by BI
ii libisccfg30 1:9.4.2-10 Config File Handling Library used
ii liblwres30 1:9.4.2-10 Lightweight Resolver Library used
ii libssl0.9.8 0.9.8g-8 SSL shared libraries
ii lsb-base 3.1-23.2etch1 Linux Standard Base 3.1 init scrip
ii netbase 4.29 Basic TCP/IP networking system
bind9 recommends no packages.
- -- no debconf information
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFIH/6510rqkowbIskRAqJFAJwNzl+QdpRgdnQkf+hx1/OWubQ0jQCaA+/I
+ibeaqTuHgREC8Y3IjohJqI=
=uFeF
-----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---
Version: 1:9.10.3.dfsg.P4-12.3
Hi,
the bind9 bug list grew too much and the Debian BIND team cannot
simply test all the reported bugs against versions not in stable, so
this is mass bug close, as either the version is no longer relevant
(because of old-old-stable 9.8.x or old-stable 9.9.5 or even older
version of bind9) or the bug was already fixed.
However, if you can reproduce the bug with a current version in stable,
please use Debian BTS 'found <bug> <version_you_reproduced_the_issue>'
command to retag the bug and reopen it.
Cheers,
Ondrej
signature.asc
Description: PGP signature
--- End Message ---