mirror of
https://git.freebsd.org/ports.git
synced 2025-06-07 22:00:31 -04:00
Now that a port dns/p5-Net-DNS has been upgraded to version 1.01, this revealed an incompatibility with DNS resolving in SpamAssassin. In short: Net::DNS::Packet->new no longer sets the RD (recursion desired) bit in new packets, so essentially DNS queries no longer work. Details at: https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7223 To bridge the time until SpamAssassin 3.4.2 gets released, the attached patch is needed ( equivalent to https://svn.apache.org/viewvc?view=rev&rev=1691992 ). For earlier version of dns/p5-Net-DNS this patch is redundant, but does no harm. PR: 201741 Submitted by: Mark.Martinec@ijs.si
12 lines
468 B
Perl
12 lines
468 B
Perl
--- lib/Mail/SpamAssassin/DnsResolver.pm 2015/07/20 18:23:18 1691991
|
|
+++ lib/Mail/SpamAssassin/DnsResolver.pm 2015/07/20 18:24:48 1691992
|
|
@@ -592,6 +592,9 @@
|
|
};
|
|
|
|
if ($packet) {
|
|
+ # RD flag needs to be set explicitly since Net::DNS 1.01, Bug 7223
|
|
+ $packet->header->rd(1);
|
|
+
|
|
# my $udp_payload_size = $self->{res}->udppacketsize;
|
|
my $udp_payload_size = $self->{conf}->{dns_options}->{edns};
|
|
if ($udp_payload_size && $udp_payload_size > 512) {
|