Date: Wed, 17 Mar 2010 14:23:22 +0100 From: Ludwig Nussel <ludwig.nussel@...e.de> To: oss-security@...ts.openwall.com Cc: Brian Stafford <brian@...fford.uklinux.net>, libesmtp@...fford.uklinux.net, security@...ntu.com, Pawel Salek <pawsa@...ochem.kth.se>, jskarvad@...hat.com Subject: Re: CVE Request: libesmtp does not check NULL bytes in commonName Brian Stafford wrote: > Since both the original and patched versions of match_component() > implement wildcards rather less liberally than RFC 2818 implies, I > decided to move towards the approach in the I-D. match_component() now > accepts either a string or a single wildcard '*'. Matched characters > are validated against the set of valid domain name component characters > , that is, *.example.org will not match %.example.org, nor for that > matter will the pattern %.example.org. Question: should underline '_' > be in the set of valid characters? AFAIK underlines are not allowed in DNS. I'm sure someone knows the RFC for that too :-) cu Ludwig -- (o_ Ludwig Nussel //\ V_/_ http://www.suse.de/ SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.