Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    kea-dhcp6 crashes

    Scheduled Pinned Locked Moved Plus 24.11 Development Snapshots (Retired)
    25 Posts 6 Posters 3.1k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B Offline
      behemyth @stephenw10
      last edited by

      @stephenw10 said in kea-dhcp6 crashes:

      Well releasing something broken would be the worst thing we could do IMO!

      I'm not saying release broken images, that is bad.

      We were told there would be 4 releases a year, this (if it happens) will only be the second.

      N 1 Reply Last reply Reply Quote 0
      • stephenw10S Online
        stephenw10 Netgate Administrator
        last edited by

        3 a year is the target but when the changes are as significant as they are for this release it can take longer.

        1 Reply Last reply Reply Quote 5
        • N Offline
          netblues @behemyth
          last edited by

          @behemyth said in kea-dhcp6 crashes:

          We were told there would be 4 releases a year, this (if it happens) wi

          And why is this important ? Keeping infrastructure at current version isn't exactly easy.
          Two releases is already a lot for production.

          Firewalls are not meant to be rebooted or migrated often, since they are cornerstone to many other things.

          B 1 Reply Last reply Reply Quote 0
          • B Offline
            behemyth @netblues
            last edited by

            @netblues said in kea-dhcp6 crashes:

            And why is this important ? Keeping infrastructure at current version isn't exactly easy.
            Two releases is already a lot for production.

            Firewalls are not meant to be rebooted or migrated often, since they are cornerstone to many other things.

            This is not true. My team and I reboot hundreds of firewalls in my corporate environment monthly, sometimes weekly depending on vulnerabilities that are found.

            I'm also sure I am not alone in this aspect. Firewalls are just another piece of network gear, and should be treated as such. They just serve a different role than a router/switch.

            If your following good design, and building out HA, rebooting production equipment doesn't matter.

            N 1 Reply Last reply Reply Quote 1
            • N Offline
              netblues @behemyth
              last edited by

              @behemyth said in kea-dhcp6 crashes:

              sometimes weekly depending on vulnerabilities that are found.

              Yes, of course. But vulnerabilities in pfsense are addressed as patches and NOT versions.
              Testing out a patch is rather trivial.
              Testing a new version with new functionality is another. And quite often, its not the bug, its the feature than makes things go flaky.

              No one professional enough, is running mission critical workloads without HA, BUT HA must also be tested.
              Changing major versions sometimes incur new things, for example single cast for carp instead if multicast.
              What I'm saying is that patching is something that a network team does and just needs small maintenance windows for that.
              Changing versions and introducing new functionality is another story.

              So, again, why 4 (or) 3 versions per year is important for you?

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.