On Saturday, 8 February 2014 at 21:59:24 UTC, Walter Bright wrote:
On 2/7/2014 6:50 AM, "Marc Schütz" <[email protected]>" wrote:
The specific problem was that it was possible to provoke hash collisions by sending carefully crafted input, causing the hash-tables to degrade to linked lists. The small performance penalty of using collision-resistant hashes is
certainly worth it in this case.

That has nothing to do with needing exceptions in the control flow path (and the performance penalty for using exceptions in this manner is certainly not small).

Huh? I responded to this discussion:

On Friday, 7 February 2014 at 08:30:35 UTC, Walter Bright wrote:
On 2/6/2014 7:08 PM, bearophile wrote:
That's why some languages have changed their sorting and hashing routines to
make them a little slower but safer on default.

DoS attack resistance requires faster code, not slower code.

I was merely clarifying why in this specific case making the average code path slower _did_ help DoS attack resistance.

Reply via email to