1995-10-04 - Re: New Netscape bug (in version 1.12)

Header Data

From: sameer <sameer@c2.org>
To: jsw@neon.netscape.com (Jeff Weinstein)
Message Hash: 8f6e08f1435aa4c8b08fa7a8f1da6207ae9b991f1ea129431e20ac2cc6f7d4df
Message ID: <199510041800.LAA07074@infinity.c2.org>
Reply To: <44td0c$3um@tera.mcom.com>
UTC Datetime: 1995-10-04 18:05:49 UTC
Raw Date: Wed, 4 Oct 95 11:05:49 PDT

Raw message

From: sameer <sameer@c2.org>
Date: Wed, 4 Oct 95 11:05:49 PDT
To: jsw@neon.netscape.com (Jeff Weinstein)
Subject: Re: New Netscape bug (in version 1.12)
In-Reply-To: <44td0c$3um@tera.mcom.com>
Message-ID: <199510041800.LAA07074@infinity.c2.org>
MIME-Version: 1.0
Content-Type: text/plain

> How do I decide what is too long?  For example, when tracking down buffer
> overflow problems for the security patch, we found an undocumented
> static buffer limit of 64 bytes for the hostname passed to gethostbyname()
> on IRIX.  Before we stumbled across this problem, we had a discussion
> about what length we should truncate host names to.  People thought
> that 128 characters was a reasonable limit, but it turned out that it
> was too long.

	Isn't there a resolver #define or something in limits.h called
MAXHOSTNAMELEN ? Something like that? (Perhaps not, but that's what I

> latent bugs.  We are also beefing up our QA to try to find more
> of these types of bugs.

sameer						Voice:   510-601-9777
Community ConneXion				FAX:	 510-601-9734
An Internet Privacy Provider			Dialin:  510-658-6376
http://www.c2.org (or login as "guest")			sameer@c2.org