On 04/02/2015 02:10 PM, Kagamin wrote:
> 
> The vulnerability presentation suggests perl solution (random hash seed)
> is good enough, it doesn't slow down anything. The seed can be left zero
> and initialized by an application as needed. One can also use a longer
> key and add more its bits every, say, 10 bytes of hashed data, not sure
> if it will make any difference.

A global random hash seed would work, but it needs to be accessible for
reproducing test cases (druntime DRT option or in core.runtime).

Reply via email to