That should do it....

Upstream reviewed a previous version of this patch (some of it comes
from their CVS repository, but they only did TID randomization, not
source port randomization).  This version addresses their comment, but I
haven't heard back from them on it.

I tested this on Dapper (which has a kernel that does not randomize
ports) and captured DNS data using ethereal and observed that the source
port and TID changed in an apparently random fashion each time.

-- 
Python-dns does not randomize TID causing DNS poisoning risk
https://bugs.launchpad.net/bugs/247409
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to