On Wednesday, 1 April 2015 at 12:05:37 UTC, Johannes Pfau wrote:
It's probably more a problem for vibe-d or other
server-like applications. Those should make sure to use DOS-safe hash tables. For most applications there's no possibility for DOS attacks using hash tables and we indeed shouldn't make these applications
slower.

The vulnerability presentation suggests perl solution (random hash seed) is good enough, it doesn't slow down anything. The seed can be left zero and initialized by an application as needed. One can also use a longer key and add more its bits every, say, 10 bytes of hashed data, not sure if it will make any difference.

Reply via email to