From: sameer <sameer@c2.org>
To: jsw@neon.netscape.com (Jeff Weinstein)
Message Hash: 8f6e08f1435aa4c8b08fa7a8f1da6207ae9b991f1ea129431e20ac2cc6f7d4df
Message ID: <199510041800.LAA07074@infinity.c2.org>
Reply To: <44td0c$3um@tera.mcom.com>
UTC Datetime: 1995-10-04 18:05:49 UTC
Raw Date: Wed, 4 Oct 95 11:05:49 PDT
From: sameer <sameer@c2.org>
Date: Wed, 4 Oct 95 11:05:49 PDT
To: jsw@neon.netscape.com (Jeff Weinstein)
Subject: Re: New Netscape bug (in version 1.12)
In-Reply-To: <44td0c$3um@tera.mcom.com>
Message-ID: <199510041800.LAA07074@infinity.c2.org>
MIME-Version: 1.0
Content-Type: text/plain
> How do I decide what is too long? For example, when tracking down buffer
> overflow problems for the security patch, we found an undocumented
> static buffer limit of 64 bytes for the hostname passed to gethostbyname()
> on IRIX. Before we stumbled across this problem, we had a discussion
> about what length we should truncate host names to. People thought
> that 128 characters was a reasonable limit, but it turned out that it
> was too long.
Isn't there a resolver #define or something in limits.h called
MAXHOSTNAMELEN ? Something like that? (Perhaps not, but that's what I
recall..)
> latent bugs. We are also beefing up our QA to try to find more
> of these types of bugs.
>
great!
--
sameer Voice: 510-601-9777
Community ConneXion FAX: 510-601-9734
An Internet Privacy Provider Dialin: 510-658-6376
http://www.c2.org (or login as "guest") sameer@c2.org
Return to October 1995
Return to “tomw@orac.engr.sgi.com (Tom Weinstein)”