On 03/09/2018 12:43 PM, Mark Atwood, Project Manager via devel wrote:
Ok, trying again.  We held the 1.0.1 release for a fix for a problem that Hal discovered and fixed.  Thank you, Hal!

Since we have a CVE fix in this release, and also a "make it work better on AWS AMIs" fix in, I do want to get this release out soonest.

Please chime in, is there any reason to not release?
I'm targeting Tuesday the 13th of March.

..m

There was a showstopping ntpsnmpd bug from Jason Azze on the 6th. I pushed a fix that I think deals with the problem but I have not heard back yet; pinging him now.

What kind of special labeling does ntpsnmpd require? Is putting "experimental" in the documentation sufficient? Does it need to give a warning on launch?

In theory the logging system isn't really up to snuff. However this is not important enough to block a release, and I'm waiting till after the release to do some major refactoring which will change logging requirements anyway.

--
/"In the end; what separates a Man, from a Slave? Money? Power? No. A Man Chooses, a Slave Obeys."/ -- Andrew Ryan

/"Utopia cannot precede the Utopian. It will exist the moment we are fit to occupy it."/ -- Sophia Lamb

_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to