https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6221
Simon Arlott <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |spamassassin.bugzilla.apach | |[email protected] --- Comment #2 from Simon Arlott <[email protected]> 2009-10-15 11:02:26 UTC --- (In reply to comment #1) > While I agree in general, I think there was some underlying reason for the > current hack, but I can't find a reference now. Possibly something to do > with mismatching DNS replies with queries. Moving to 3.3.0 target. According to the SVN log for revision 161778, it is the Net::DNS code that mismatched DNS replies. The original bug that introduced this "select a random port" behaviour is 4260. -- Configure bugmail: https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug.
