From owner-freebsd-hackers@FreeBSD.ORG Sun Jun 26 14:28:04 2011 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id BF072106566C for ; Sun, 26 Jun 2011 14:28:04 +0000 (UTC) (envelope-from cjr@cruwe.de) Received: from cruwe.de (cruwe.de [188.40.164.98]) by mx1.freebsd.org (Postfix) with ESMTP id 779908FC12 for ; Sun, 26 Jun 2011 14:28:04 +0000 (UTC) Received: from cruwe.de (unknown [127.0.0.4]) by cruwe.de (Postfix) with ESMTP id F0A371AEBD for ; Sun, 26 Jun 2011 14:08:50 +0000 (UTC) Received: by cruwe.de (Postfix, from userid 65534) id D420F1AEBC; Sun, 26 Jun 2011 14:08:50 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.cruwe.de X-Spam-Level: X-Spam-Status: No, score=-1.0 required=4.0 tests=ALL_TRUSTED autolearn=unavailable version=3.3.1 Received: from dijkstra (p5B37B1DE.dip.t-dialin.net [91.55.177.222]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by cruwe.de (Postfix) with ESMTPSA id ADABF1AEB1 for ; Sun, 26 Jun 2011 14:08:48 +0000 (UTC) Date: Sun, 26 Jun 2011 16:08:45 +0200 From: "Christopher J. Ruwe" To: freebsd-hackers@freebsd.org Message-ID: <20110626160845.01de58cf@dijkstra> X-Mailer: Claws Mail 3.7.9 (GTK+ 2.22.1; amd64-portbld-freebsd8.2) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Virus-Scanned: ClamAV on mail.cruwe.de using ClamSMTP Subject: PR bin/157732 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jun 2011 14:28:04 -0000 In reaction to PR bin/157732 (http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/157732) I am investigating why traceroute does not trace hostnames greater in length than 64 chars. It turned out that a limit of 64 chars is coded into traceroute.c. From RFC2181 (http://tools.ietf.org/html/rfc2181#section-11) follows that a limit of 254 chars needs to be supported by software conforming to standard. traceroute calls gethostbyname(). It would be easiest (and results in a working program, I tried) to remove the part which checks against the limit of 64 chars completely. Another option would be to check against 254 chars. Now, I try to investigate whether removing the check altogether would result in any harmful effects in gethostbyname() or other functions. I have not found any possibilites of gethostbyname() buffer-overflowing. I consider my abilities readning and coding C beginner-level, so I am not sure and asking about opinions. Am I turning to the right forum with my request or should I post somewhere else? Thanks for your input, cheers -- Christopher J. Ruwe TZ GMT + 2