Delivered-To: bind9-confidential@bugs.isc.org From: "Mark Andrews" X-RT-Original-Encoding: utf-8 X-Original-To: bind9-confidential@bugs.isc.org X-RT-Incoming-Encryption: Not encrypted Message-ID: <20170629232627.A473E7D38B1B@rock.dv.isc.org> X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00, RP_MATCHES_RCVD autolearn=ham autolearn_force=no version=3.4.0 In-Reply-To: Your message of "Thu, 29 Jun 2017 16:32:31 +0000." content-type: text/plain; charset="utf-8" Received: from mx.pao1.isc.org (mx.pao1.isc.org [149.20.64.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx.pao1.isc.org", Issuer "COMODO RSA Organization Validation Secure Server CA" (not verified)) by bugs.isc.org (Postfix) with ESMTPS id 58A3ED78A9E for ; Thu, 29 Jun 2017 23:26:34 +0000 (UTC) Received: from zmx1.isc.org (zmx1.isc.org [149.20.0.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.pao1.isc.org (Postfix) with ESMTPS id C58D6349420 for ; Thu, 29 Jun 2017 23:26:31 +0000 (UTC) Received: from zmx1.isc.org (localhost [127.0.0.1]) by zmx1.isc.org (Postfix) with ESMTPS id AFD9A1600BB for ; Thu, 29 Jun 2017 23:26:31 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by zmx1.isc.org (Postfix) with ESMTP id 98A531600B9 for ; Thu, 29 Jun 2017 23:26:31 +0000 (UTC) Received: from zmx1.isc.org ([127.0.0.1]) by localhost (zmx1.isc.org [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Osbj2kvRyaJi for ; Thu, 29 Jun 2017 23:26:31 +0000 (UTC) Received: from rock.dv.isc.org (c27-253-115-14.carlnfd2.nsw.optusnet.com.au [27.253.115.14]) by zmx1.isc.org (Postfix) with ESMTPSA id 50BF2160053 for ; Thu, 29 Jun 2017 23:26:31 +0000 (UTC) Received: from rock.dv.isc.org (localhost [IPv6:::1]) by rock.dv.isc.org (Postfix) with ESMTP id A473E7D38B1B for ; Fri, 30 Jun 2017 09:26:27 +1000 (AEST) From marka@isc.org Thu Jun 29 23:26:34 2017 To: bind9-confidential@isc.org References: <4E39ADB9-C954-4FCC-9DEB-1652186C6676@dotat.at> Subject: Re: [ISC-Bugs #45481] iOS dig crashes when given an oversize label Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on mx.pao1.isc.org X-RT-Interface: Email Date: Fri, 30 Jun 2017 09:26:27 +1000 RT-Message-ID: Content-Length: 555 In message , "Tony Finch via RT" writes: > If you enter a domain name with an over-long label into the iOS dig query box, the app bombs out. > > (I am not sure if this is the right place for iOS dig bug reports but the app doesn't seem > to have an about / contact page) > > Tony. > -- > f.anthony.n.finch http://dotat.at Well assign this to Ray. -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: marka@isc.org