Received: with ECARTIS (v1.0.0; list gopher); Mon, 22 Jul 2002 18:09:03 -0500 (EST) Return-Path: Delivered-To: gopher@complete.org Received: from smtp-send.myrealbox.com (smtp-send.myrealbox.com [192.108.102.143]) (using TLSv1 with cipher EDH-RSA-DES-CBC3-SHA (168/168 bits)) (Client CN "*.myrealbox.com", Issuer "Thawte Server CA" (not verified)) by pi.glockenspiel.complete.org (Postfix) with ESMTP id 613DF3B85E for ; Mon, 22 Jul 2002 18:09:03 -0500 (EST) Received: from transa.aquarius.null aangel@smtp-send.myrealbox.com [24.171.111.62] by smtp-send.myrealbox.com with NetMail SMTP Agent $Revision: 3.9 $ on Novell NetWare via secured & encrypted transport (TLS); Mon, 22 Jul 2002 17:09:01 -0600 Subject: [gopher] Re: Gopher+ Suggestion From: "Aaron J. Angel" To: gopher@complete.org In-Reply-To: References: Content-type: text/plain Content-Transfer-Encoding: 8bit X-Mailer: Ximian Evolution 1.0.5 Date: 22 Jul 2002 18:08:39 -0500 Message-Id: <1027379320.16025.17.camel@transa.aquarius.null> Mime-Version: 1.0 X-archive-position: 661 X-ecartis-version: Ecartis v1.0.0 Sender: gopher-bounce@complete.org Errors-to: gopher-bounce@complete.org X-original-sender: aangel@myrealbox.com Precedence: bulk Reply-to: gopher@complete.org List-help: List-unsubscribe: List-software: Ecartis version 1.0.0 List-ID: Gopher X-List-ID: Gopher List-subscribe: List-owner: List-post: List-archive: X-list: gopher > It's difficult to see how to stop such attacks on the server side. Fix the overflows. (-: > Maybe you could reopen the bug and suggest it be reversed? I've been > wanting for a while to improve Mozilla's gopher capabilities, and as part > of that I'd be happy to upload a patch reversing this change (it's merely > a matter of uncommenting a few lines) if there was general consensus that > it was a bad idea. Looks like the bug is locked at resolved/fixed and can't be reopenned by anyone else besides developers. Maybe I'll submit a bug found with their so-called bug ``fix''. -- Aaron J. Angel