That should do it.... Upstream reviewed a previous version of this patch (some of it comes from their CVS repository, but they only did TID randomization, not source port randomization). This version addresses their comment, but I haven't heard back from them on it.
I tested this on Dapper (which has a kernel that does not randomize ports) and captured DNS data using ethereal and observed that the source port and TID changed in an apparently random fashion each time. -- Python-dns does not randomize TID causing DNS poisoning risk https://bugs.launchpad.net/bugs/247409 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs