https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6221

Simon Arlott <[email protected]> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |spamassassin.bugzilla.apach
                   |                            |[email protected]

--- Comment #2 from Simon Arlott 
<[email protected]> 2009-10-15 11:02:26 UTC ---
(In reply to comment #1)
> While I agree in general, I think there was some underlying reason for the
> current hack, but I can't find a reference now. Possibly something to do
> with mismatching DNS replies with queries. Moving to 3.3.0 target.

According to the SVN log for revision 161778, it is the Net::DNS code that
mismatched DNS replies. The original bug that introduced this "select a random
port" behaviour is 4260.

-- 
Configure bugmail: 
https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

Reply via email to