From 5391ceb21a29374b5d591fb7bd94777d841f59a4 Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Wed, 4 Oct 2006 05:19:40 +0000 Subject: [PATCH] r9087@Kushana: nickm | 2006-10-04 01:19:15 -0400 We're trying to catch the kind of jerk who'd hijack zy6pzwohtnlq.test, not the kind of lunatic who'd hijack zy6pzwohtnlq%s.test, though apparently those exist too. svn:r8595 --- src/or/dns.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/src/or/dns.c b/src/or/dns.c index 8b0df84e15..710985d48d 100644 --- a/src/or/dns.c +++ b/src/or/dns.c @@ -1736,8 +1736,8 @@ dns_launch_wildcard_checks(void) * This is the standards-compliance equivalent of making sure that your * crackhouse's elevator inspection certificate is up to date. */ - launch_wildcard_check(2, 16, "%s.invalid"); - launch_wildcard_check(2, 16, "%s.test"); + launch_wildcard_check(2, 16, ".invalid"); + launch_wildcard_check(2, 16, ".test"); /* These will break specs if there are ever any number of * 8+-character top-level domains. */ @@ -1745,9 +1745,9 @@ dns_launch_wildcard_checks(void) /* Try some random .com/org/net domains. This will work fine so long as * not too many resolve to the same place. */ - launch_wildcard_check(8, 16, "%s.com"); - launch_wildcard_check(8, 16, "%s.org"); - launch_wildcard_check(8, 16, "%s.net"); + launch_wildcard_check(8, 16, ".com"); + launch_wildcard_check(8, 16, ".org"); + launch_wildcard_check(8, 16, ".net"); } }