Hi John,
thanks again for your feedback - so I think after the discussion we agree that
this is the expected behaviour (see the explanation of racb) and thereby I set
the bug status to invalid instead of new.
Please feel free to set it back to new if I misunderstood you and try to
explain the
@Robie Basak (racb):
Thanks for your response and sorry I responded late.
I didn't know it wasn't a problem.
All I knew is that DNS port is 53.. so naturally I thought that something weird
happens..
** Changed in: dnsmasq (Ubuntu)
Status: Incomplete => New
--
You received this bug
Thank you for your report.
Please can you explain why this is a problem? As far as I can see, it is
expected behaviour, since for security "DNS source port randomization"
is the recommended way to avoid DNS spoofing.
Once you have answered, please change the bug status back to New.
** Changed
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
4 matches
Mail list logo