This bug has been open two years and it's still occurring. I've noticed it during development of an open-source network security sensor I'm planning to publish in the next few weeks:
{ "source": "dns", "port_id": 0, "direction": 1, "self": 0, "length": 76, "eth_type": 2048, "smac": "50:e5:49:36:0a:db", "dmac": "78:96:84:71:ea:c0", "sip": "192.168.1.5", "dip": "192.168.1.254", "ip_protocol": 17, "ttl": 0, "l4_length": 42, "icmp_type": 255, "icmp_code": 255, "sport": 37657, "dport": 53, "dns_name": "daisy.ubuntu.com." }
It's a little unbelievable it's been open this long with no concrete plan taking shape.
This bug has been open two years and it's still occurring. I've noticed it during development of an open-source network security sensor I'm planning to publish in the next few weeks:
{ "source": "dns", "port_id": 0, "direction": 1, "self": 0, "length": 76, "eth_type": 2048, "smac": "50:e5: 49:36:0a: db", "dmac": "78:96: 84:71:ea: c0", "sip": "192.168.1.5", "dip": "192.168.1.254", "ip_protocol": 17, "ttl": 0, "l4_length": 42, "icmp_type": 255, "icmp_code": 255, "sport": 37657, "dport": 53, "dns_name": "daisy.ubuntu.com." }
It's a little unbelievable it's been open this long with no concrete plan taking shape.