On Fri, Apr 08, 2011 at 04:33:27PM +0200, Stevan Baji?? wrote:
>   
> 
> On Fri, 8 Apr 2011 09:27:11 -0500, Kenneth Marshall wrote: 
> 
> > On
> Fri, Apr 08, 2011 at 04:03:07PM +0200, Stevan Baji?? wrote:
> >> On Fri, 8
> Apr 2011 08:57:19 -0500, Kenneth Marshall wrote: 
> >> 
> >>> On
> >> Fri, Apr
> 08, 2011 at 03:12:25PM +0200, Stevan Baji?? wrote: 
> >> 
> >>>> On Fri,
> 8
> >> Apr 2011 14:35:32 +0300, Ibrahim Harrani wrote: > 
> >>> 
> >>>>
> Hi,
> >>> 
> >>>> Is
> >>> there any way to decode tokens(tokenizer osb) in
> the
> >> r-left:#1010ff 2px solid; margin-left:5px;
> width:100%">dspam_token_data table? 
> >> 00%">lockquote type=
> "padding-left:5px; border-left:#1010ff 2px solid; margin-left:5px;
> width:100%"> Xperia(TM) PLAY #1010ff 2px solid; margin-left:5px;
> width:100%"> https://lists.sourceforge.net/lists/li [1]
> >> e"
> style="padding-left:5px; border-left:#1010ff 2px solid; margin-left:5px;
> width:100%"> user [3] The token is nothing else than a CRC64 ISO hash.
> Assuming you have insane amount of memory
> >> 
> >>> t:#1010ff 2px solid;
> margin-left:5px; width:100%">
> >> left:5px; width:100%"> Actually, you
> would only be able to find A token that generated the same hash, not
> neccessarily the token that WAS USED to generate the hash value. That is
> so because
> >> 
> >>> right. Especially with that weak CRC64-ISO that DSPAM
> is using. Better would be to use CRC64 ECMA-182, but that is another
> >>
> ay... even that CRC64 ECMA-182 is not collision free. -- Kind Regards
> from Switzerland, Stevan Baji?? 
> >> 
> >>> 
> > I checked into different
> hashes and the CRC64 was good enough in the collision domain to make it
> not worth pursuing and alternative since then you could not upgrade your
> existing instances. Ken
> 
> The CRC64-ISO is considered weak for hashing.
> Read this document here if you need more info ->
> http://www.cs.ucl.ac.uk/staff/d.jones/crcnote.pdf 
> 
> -- 
> Kind Regards
> from Switzerland,
> 
> Stevan Baji??
>   
> 
> Links:
> ------
> [1]
> https://lists.sourceforge.net/lists/li


The hash that I have worked with is Bob Jenkins' lookup3.c hash. Here is
his evaluation of a number of hash functions:

http://www.burtleburtle.net/bob/hash/doobs.html

He does a good job of analyzing the various usual choices. The question
is are the collisions with the hash function used in DSPAM impacting its
effectiveness to a degree in which it would make sense to change the
function?

Cheers,
Ken

------------------------------------------------------------------------------
Xperia(TM) PLAY
It's a major breakthrough. An authentic gaming
smartphone on the nation's most reliable network.
And it wants your games.
http://p.sf.net/sfu/verizon-sfdev
_______________________________________________
Dspam-user mailing list
Dspam-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/dspam-user

Reply via email to