mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-27 22:03:31 +01:00
r9087@Kushana: nickm | 2006-10-04 01:19:15 -0400
We're trying to catch the kind of jerk who'd hijack zy6pzwohtnlq.test, not the kind of lunatic who'd hijack zy6pzwohtnlq%s.test, though apparently those exist too. svn:r8595
This commit is contained in:
parent
3e65ebbb52
commit
5391ceb21a
10
src/or/dns.c
10
src/or/dns.c
@ -1736,8 +1736,8 @@ dns_launch_wildcard_checks(void)
|
||||
* This is the standards-compliance equivalent of making sure that your
|
||||
* crackhouse's elevator inspection certificate is up to date.
|
||||
*/
|
||||
launch_wildcard_check(2, 16, "%s.invalid");
|
||||
launch_wildcard_check(2, 16, "%s.test");
|
||||
launch_wildcard_check(2, 16, ".invalid");
|
||||
launch_wildcard_check(2, 16, ".test");
|
||||
|
||||
/* These will break specs if there are ever any number of
|
||||
* 8+-character top-level domains. */
|
||||
@ -1745,9 +1745,9 @@ dns_launch_wildcard_checks(void)
|
||||
|
||||
/* Try some random .com/org/net domains. This will work fine so long as
|
||||
* not too many resolve to the same place. */
|
||||
launch_wildcard_check(8, 16, "%s.com");
|
||||
launch_wildcard_check(8, 16, "%s.org");
|
||||
launch_wildcard_check(8, 16, "%s.net");
|
||||
launch_wildcard_check(8, 16, ".com");
|
||||
launch_wildcard_check(8, 16, ".org");
|
||||
launch_wildcard_check(8, 16, ".net");
|
||||
}
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user