Need an iptable rule which randomizes the sourceport, this rule should have worked but for some reason it doesn't: $IPT -t nat -A POSTROUTING -p udp -s 1.1.1.1 --dport 53 -j SNAT --to 1.1.1.1:1024-65535 -m statistic --mode random Point is to make sure that DNS requests have random ports , this is for the recent discovered security issue with dns on many systems. Read here more: [login to view URL] the iptables rule they give does not work or at least not aware it works on a 2.6.22+ kernel. Please only react if you have a decent understanding of iptables and firewalls related to linux. If it works then the test of this site should say the dns service is not vulnerable: [login to view URL] (test button at the right)
## Deliverables
1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done.
2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables):
a) For web sites or other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condition in the Buyer's environment.
b) For all others including desktop software or software the buyer intends to distribute: A software installation package that will install the software in ready-to-run condition on the platform(s) specified in this bid request.
3) All deliverables will be considered "work made for hire" under U.S. Copyright law. Buyer will receive exclusive and complete copyrights to all work purchased. (No GPL, GNU, 3rd party components, etc. unless all copyright ramifications are explained AND AGREED TO by the buyer on the site per the coder's Seller Legal Agreement).
## Platform
working iptables rule