On Mon, 5 Jul 2021 at 03:11, Mark Andrews <[email protected]> wrote:
>8
>
> Opaque key form isn’t subject to double parsing despite the hint6 having
> commas in the presentation form. That’s about the only way you could be
> seeing that difference. The opaque key form knows nothing about the
> internal structure, you don’t double parse opaque key form. It’s
>
My current analysis model certainly does not rely upon double-parsing
of the opaque form.
Whatever else we might disagree about, there is one feature we can depend upon.
The devout double-escapologist believes that "standard string
processing" occurs before any SVCB-specific code is reached.
This introduces plenty of weaknesses to be exploited.
1) Chuck in an extra digit
example.com. SVCB 1 foo.example.com. port=1234\053
produces
example.com. IN SVCB ( \# 25 0001 ; 1
03666f6f076578616d706c6503636f6d 00 ; foo.example.com.
0003 0002 3039 )
instead of the expected error message.
2) Break number parsing
example.com. SVCB 1 foo.example.com. port=1234\078
Argument "1234N" isn't numeric in pack at
blib/lib/Net/DNS/RR/SVCB.pm line 192, <DATA> line 2.
file GLOB(0x556193c89ea0) line 2
at test.pl line 23.
3) Break argument parsing
example.com. SVCB 1 foo.example.com. port=12\04434
SVCB: unexpected number of values for "key3" at
blib/lib/Net/DNS/ZoneFile.pm line 531.
file GLOB(0x559fdbb90d80) line 2
at test.pl line 23.
--rwf
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop