[tor-commits] [tor/master] Allow a single trailing `.` when validating FQDNs from SOCKS.

nickm at torproject.org nickm at torproject.org
Mon Jul 27 13:21:38 UTC 2015


commit da6aa7bfa5014b980a93b38024d16b32720dc67a
Author: Yawning Angel <yawning at schwanenlied.me>
Date:   Mon Jul 27 12:58:40 2015 +0000

    Allow a single trailing `.` when validating FQDNs from SOCKS.
    
    URI syntax (and DNS syntax) allows for a single trailing `.` to
    explicitly distinguish between a relative and absolute
    (fully-qualified) domain name. While this is redundant in that RFC 1928
    DOMAINNAME addresses are *always* fully-qualified, certain clients
    blindly pass the trailing `.` along in the request.
    
    Fixes bug 16674; bugfix on 0.2.6.2-alpha.
---
 changes/bug16674     |    5 +++++
 src/common/util.c    |    6 ++++++
 src/test/test_util.c |   12 ++++++++++++
 3 files changed, 23 insertions(+)

diff --git a/changes/bug16674 b/changes/bug16674
new file mode 100644
index 0000000..de55523
--- /dev/null
+++ b/changes/bug16674
@@ -0,0 +1,5 @@
+  o Minor features (client):
+    - Relax the validation done to hostnames in SOCKS5 requests, and allow
+      a single trailing '.' to cope with clients that pass FQDNs using that
+      syntax to explicitly indicate that the domain name is
+      fully-qualified. Fixes bug 16674; bugfix on 0.2.6.2-alpha.
diff --git a/src/common/util.c b/src/common/util.c
index 618e6a1..1aac4fc 100644
--- a/src/common/util.c
+++ b/src/common/util.c
@@ -1056,6 +1056,12 @@ string_is_valid_hostname(const char *string)
       break;
     }
 
+    /* Allow a single terminating '.' used rarely to indicate domains
+     * are FQDNs rather than relative. */
+    if ((c_sl_idx > 0) && (c_sl_idx + 1 == c_sl_len) && !*c) {
+      continue;
+    }
+
     do {
       if ((*c >= 'a' && *c <= 'z') ||
           (*c >= 'A' && *c <= 'Z') ||
diff --git a/src/test/test_util.c b/src/test/test_util.c
index 0f64c26..2bffb17 100644
--- a/src/test/test_util.c
+++ b/src/test/test_util.c
@@ -4285,7 +4285,19 @@ test_util_hostname_validation(void *arg)
   // comply with a ~30 year old standard.
   tt_assert(string_is_valid_hostname("core3_euw1.fabrik.nytimes.com"));
 
+  // Firefox passes FQDNs with trailing '.'s  directly to the SOCKS proxy,
+  // which is redundant since the spec states DOMAINNAME addresses are fully
+  // qualified.  While unusual, this should be tollerated.
+  tt_assert(string_is_valid_hostname("core9_euw1.fabrik.nytimes.com."));
+  tt_assert(!string_is_valid_hostname("..washingtonpost.is.better.com"));
+  tt_assert(!string_is_valid_hostname("so.is..ft.com"));
+  tt_assert(!string_is_valid_hostname("..."));
+
   // XXX: do we allow single-label DNS names?
+  // We shouldn't for SOCKS (spec says "contains a fully-qualified domain name"
+  // but only test pathologically malformed traling '.' cases for now.
+  tt_assert(!string_is_valid_hostname("."));
+  tt_assert(!string_is_valid_hostname(".."));
 
   done:
   return;





More information about the tor-commits mailing list