You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@spamassassin.apache.org by bu...@bugzilla.spamassassin.org on 2009/10/11 12:45:36 UTC

[Bug 5264] Specification of DNS-query source port range

https://issues.apache.org/SpamAssassin/show_bug.cgi?id=5264

Simon Arlott <sp...@arlott.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |spamassassin.bugzilla.apach
                   |                            |e.simon@arlott.org

--- Comment #4 from Simon Arlott <sp...@arlott.org> 2009-10-11 03:45:34 UTC ---
(In reply to comment #0)
> The file DnsResolver.pm contains code (sub conenct sock) which selects a random
> unprivileged (1024-65535) source port for DNS-queries.
> 
> I propose two enhancements:
> 
> 1) Source port range should be a config file option
> 2) Evaluate /proc/sys/net/ipv4/ip_local_ports if no range is specified in config
> file
> 
> This should avoid problems with local firewalls/port filter which allows
> outbound traffic only from local_ports, but not from all unprivileged ports.

The patch to Bug 6221 should fix this for you as it'll cause the
ip_local_port_range to be used.

-- 
Configure bugmail: https://issues.apache.org/SpamAssassin/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.