[Bug 3979] udhcpc should filter out malicious hostnames passed in option 0x0c

bugzilla at busybox.net bugzilla at busybox.net
Mon May 19 16:10:18 UTC 2014


https://bugs.busybox.net/show_bug.cgi?id=3979

--- Comment #18 from danny at mellanox.com 2014-05-19 16:10:17 UTC ---
(In reply to comment #17)
> Hi,
> 
> > Option 119 is not a string option, it uses "\003foo\004blah\003com\000"
> > encoding (RFC 1035).
> > 
> > > So, following advices to use "right options", we hitting even more problems and incompatibilities in different OS.
> 
> Everywhere in man's it written as "string"...
> 
> > 
> > Because many clients have bugs in handling more recently introduced options.
> > Such is life. Bugs needs to be filed in bugzillas to get them fixed.
> > 
> 
> Here you too optimistic. Nobody bother to fix old stuff, especially on old
> systems...
> 
> > 
> > > Can't provide you with tcpdump yet, but you already know what is there.
> > 
> > I do want tcpdump, because I in fact don't know what _exactly_ is there. For
> > example, trailing dot problem can exist in bbox's DHCP client, udhcpc, and in
> > order to test it, I want to see a real-world example of the packed, instead of
> > assuming what's there.
> 
> Sent you by email.
> 
> Anyway, there is a way, which can be acceptable by all parties:
> 
> if (ch == '\0' || ch == ' ' || ch == '.' )
>                                return label;
> 
> Here you will get domain name in any case + ' ' is not evil + RFC conformant +
> nothing broken.

Hi again,

Any acknowledgement?

Thanks,
D.

-- 
Configure bugmail: https://bugs.busybox.net/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.


More information about the busybox-cvs mailing list