On 3 Aug 2000, H. Peter Anvin wrote:
> > ...The potential for security holes comes when you
> > attempt to use the raw input, *without* decoding it.  It is the
> > *non-decoding* users who are vulnerable.
> 
> Great.  Now you have a datastream with may contain, say, embedded '/'
> in filenames, or null characters.  If you then convert them back to
> UTF-8 you now have a string referring to a potentially completely
> different file than you started with.

If you're not using the raw input, why does this matter?  My point stands: 
it's only people who try to use the raw input -- that is, users who are
*not* decoding -- who are vulnerable.  If you always decode the input
before processing it, checking it, filtering it, etc., then games played
with non-minimal encodings *cannot* affect you. 

                                                          Henry Spencer
                                                       [EMAIL PROTECTED]

-
Linux-UTF8:   i18n of Linux on all levels
Archive:      http://mail.nl.linux.org/lists/

Reply via email to