From 5391ceb21a29374b5d591fb7bd94777d841f59a4 Mon Sep 17 00:00:00 2001
From: Nick Mathewson <nickm@torproject.org>
Date: Wed, 4 Oct 2006 05:19:40 +0000
Subject: [PATCH]  r9087@Kushana:  nickm | 2006-10-04 01:19:15 -0400  We're
 trying to catch the kind of jerk who'd hijack zy6pzwohtnlq.test,  not the
 kind of lunatic who'd hijack zy6pzwohtnlq%s.test, though  apparently those
 exist too.

svn:r8595
---
 src/or/dns.c | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/src/or/dns.c b/src/or/dns.c
index 8b0df84e15..710985d48d 100644
--- a/src/or/dns.c
+++ b/src/or/dns.c
@@ -1736,8 +1736,8 @@ dns_launch_wildcard_checks(void)
      * This is the standards-compliance equivalent of making sure that your
      * crackhouse's elevator inspection certificate is up to date.
      */
-    launch_wildcard_check(2, 16, "%s.invalid");
-    launch_wildcard_check(2, 16, "%s.test");
+    launch_wildcard_check(2, 16, ".invalid");
+    launch_wildcard_check(2, 16, ".test");
 
     /* These will break specs if there are ever any number of
      * 8+-character top-level domains. */
@@ -1745,9 +1745,9 @@ dns_launch_wildcard_checks(void)
 
     /* Try some random .com/org/net domains. This will work fine so long as
      * not too many resolve to the same place. */
-    launch_wildcard_check(8, 16, "%s.com");
-    launch_wildcard_check(8, 16, "%s.org");
-    launch_wildcard_check(8, 16, "%s.net");
+    launch_wildcard_check(8, 16, ".com");
+    launch_wildcard_check(8, 16, ".org");
+    launch_wildcard_check(8, 16, ".net");
   }
 }
 
-- 
GitLab