Berkeley CSUA MOTD:Entry 18882
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/04 [General] UID:1000 Activity:popular
4/4     

2000/8/4-5 [Computer/SW/OS/FreeBSD] UID:18882 Activity:nil
8/4     when is it better to use  strcpy vs strncpy?  what is  strlcpy?
        \_ Short answer: man strcpy.
        \_ It isn't. Use strncpy
                \_ Wrong.  strcpy is much faster (doesn't have to 0-pad the
                   full space), but should only be used when you are
                   absolutely positively sure you won't overflow the buffer.
                   (i.e. when you've already called strlen, or the string
                    is embedded in your source and not from user input).
                   strlcpy/strlcat is a OpenBSD invention that other OS'es
                   are picking up - it's more efficient & easier to use
                   correctly than the strn* equivalents.
\_ http://www.usenix.org/publications/library/proceedings/usenix99/millert.html
2025/04/04 [General] UID:1000 Activity:popular
4/4     

You may also be interested in these entries...
2009/5/4-6 [Computer/SW/OS/Linux, Computer/SW/OS/FreeBSD] UID:52939 Activity:moderate
5/4     I would appreciate a reliability ranking between:
        1) OpenBSD
        2) OpenSolaris
        3) FreeBSD
        4) Debian-Stable
        5) Suse Linux Enterprise Server
	...
2009/4/17-23 [Computer/SW/OS/FreeBSD] UID:52867 Activity:low
4/17    If you have a general access AssOS machines, this is worth
        taking this seriously. --psb
  http://c-skills.blogspot.com/2009/04/udev-trickery-cve-2009-1185-and-cve.html
        <DEAD>admin.fedoraproject.org/updates/udev-127-5.fc10<DEAD>
        \_ What does this have to do with MS Windows?
           \_ psb is a bsd lover.
	...
2008/12/10-16 [Computer/HW/CPU, Computer/HW/Drives] UID:52220 Activity:moderate
12/9    Another idea for the CSUA that lets you spend money and maybe get some
    cool toys. Instead of buying a beefy server (like say, a massive server
    with 20 386DX processors), buy a few cheap machines (like the ones
    mentioned below) that have good disks and work on failover / load
    balancing. A netscaler or other piece of hardware is complete overkill,
    but maybe hacking an OpenBSD box could do the trick. The idea is that
	...
2007/7/17 [Computer/SW/Languages/C_Cplusplus] UID:47312 Activity:nil
7/13    CSUA Life Roster
1 point each for:                                               key:
                significant other (out of county rule applies)   G
                car (Chevy Novas do count)                       C
                housing (dorms DO NOT count)                     H
                own computer running reasonable multi-tasking OS U
	...
2007/7/13-16 [Computer/Networking] UID:47279 Activity:nil
7/13    I'm thinking about getting a Soekris 4501 to replace my the P2-400
        that is currently acting as my home firewall. Has anyone used a
        Soekris system for this purpose? If so, how well does it work? Also,
        if there are any alternatives (similar power/form factor), I would
        appreciate links to those as well. tia.
        \_ John got me to use a WRAP box similar to Soekris.  I use this one:
	...
2007/3/15-17 [Computer/SW/OS/FreeBSD] UID:45977 Activity:nil
3/14    http://www.csua.org/u/i8o
        Remote exploit in OpenBSD kernel.  Security is hard.  And yes, it
        would be really difficult to exploit this in practice. -dans
	...
2007/3/13-14 [Computer/SW/OS/FreeBSD] UID:45949 Activity:nil
3/13    OpenBSD 4.1 preorder is up:
        http://www.openbsd.org/items.html#41
	...
2007/3/13-14 [Computer/SW/Security] UID:45950 Activity:nil
3/13    OpenSSH 4.6 is out:
        http://undeadly.org/cgi?action=article&sid=20070308183425
        Portable Version:
        ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-4.6p1.tar.gz
        OpenBSD Version:
        ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/openssh-4.6.tar.gz
	...
2006/11/8-9 [Computer/SW/Security] UID:45263 Activity:nil
11/8    OpenSSH 4.5 is out:
        http://www.openssh.org/txt/release-4.5
        ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/openssh-4.5.tar.gz
        ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-4.5p1.tar.gz
	...
2006/9/27-28 [Computer/SW/OS/FreeBSD, Computer/SW/Security] UID:44580 Activity:nil
9/27    OpenSSH 4.4 is leftist
        http://www.openssh.org/txt/release-4.4
        OpenBSD src:
        http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/openssh-4.4.tar.gz
        OpenBSD src signature:
        http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/openssh-4.4.tar.gz.asc
	...
2006/9/22-25 [Computer/SW/OS/FreeBSD] UID:44496 Activity:nil
9/22    OpenBSD 4.0 available for pre-order:
        http://www.openbsd.org/40.html
	...
2006/8/16-18 [Computer/SW/OS/FreeBSD] UID:44024 Activity:nil
8/16    Greatest piece of software ever written is 4.3 BSD:
        http://tinyurl.com/go7lv (informationweek.com)
        \_ Windows is run by more computers than all other OS combined.
           \_ that only makes it common, not great.
              \_ If it wasn't great people wouldn't use it.  They'd use 4.3
                 BSD.
	...
Cache (1836 bytes)
www.usenix.org/publications/library/proceedings/usenix99/millert.html
Students USENIX Technical Program - Abstract - USENIX 99 strlcpy and strlcat--Consistent, Safe, String Copy and Concatenation Todd C. Theo de Raadt, The OpenBSD Project Abstract As the prevalence of buffer overflow attacks has increased, more and more programmers are using size or length-bounded string functions such as strncpy() and strncat(). While this is certainly an encouraging trend, the standard C string functions generally used were not really designed for the task. This paper describes an alternate, intuitive, and consistent API designed with safe string copies in mind. There are several problems encountered when strncpy() and strncat() are used as safe versions of strcpy() and strcat(). Both functions deal with NUL-termination and the length parameter in different and non-intuitive ways that confuse even experienced programmers. They also provide no easy way to detect when truncation occurs. Finally, strncpy() zero-fills the remainder of the destination string, incurring a performance penalty. Of all these issues, the confusion caused by the length parameters and the related issue of NUL-termination are most important. When we audited the OpenBSD source tree for potential security holes we found rampant misuse of strncpy() and strncat(). While not all of these resulted in exploitable security holes, they made it clear that the rules for using strncpy() and strncat() in safe string operations are widely misunderstood. The proposed replacement functions, strlcpy() and strlcat(), address these problems by presenting an API designed for safe string copies (see Figure 1 for function prototypes). Both functions guarantee NUL-termination, take as a length parameter the size of the string in bytes, and provide an easy way to detect truncation. Neither function zero-fills unused bytes in the destination.