https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6221

Mark Martinec <[email protected]> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Target Milestone|Undefined                   |3.3.0

--- Comment #1 from Mark Martinec <[email protected]> 2009-10-15 10:18:26 
UTC ---
> Created an attachment (id=4551)
 --> (https://issues.apache.org/SpamAssassin/attachment.cgi?id=4551) [details]
> Patch to always use port 0 instead of trying ports at random
> 
> DnsResolver.pm attempts to bind UDP ports at random. This causes numerous
> errors if listening on specific ports is restricted to specific
> applications/users.
> 
> The correct way to acquire a UDP socket to listen for responses is to bind to
> port 0 instead. The OS will automatically allocate an appropriate free port
> from the range defined for local allocation (net.ipv4.ip_local_port_range on
> Linux).

While I agree in general, I think there was some underlying reason for the
current hack, but I can't find a reference now. Possibly something to do
with mismatching DNS replies with queries. Moving to 3.3.0 target.

Related to Bug 5264.

-- 
Configure bugmail: 
https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

Reply via email to