[sr-dev] Re: [kamailio/kamailio] Less predictive algorithm for carrierroute hashing (Issue #3786)

2024-06-07 Thread github-actions[bot] via sr-dev
Closed #3786 as not planned. -- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/3786#event-13086806531 You are receiving this because you are subscribed to this thread. Message ID: ___ Kamailio (SER) - Dev

[sr-dev] Re: [kamailio/kamailio] Less predictive algorithm for carrierroute hashing (Issue #3786)

2024-05-24 Thread github-actions[bot] via sr-dev
This issue is stale because it has been open 6 weeks with no activity. Remove stale label or comment or this will be closed in 2 weeks. -- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/3786#issuecomment-2130693792 You are receiving this because yo

[sr-dev] Re: [kamailio/kamailio] Less predictive algorithm for carrierroute hashing (Issue #3786)

2024-04-12 Thread Ben Kaufman via sr-dev
My guess is that md5 would be sufficient. It's still odd feeling that CRC32 wasn't getting sufficient randomization against the actual Call-Ids I was receiving. Anything requiring OpenSSL and actual cryptographic-quality algorithms seems overkill, though. -- Reply to this email directly or v

[sr-dev] Re: [kamailio/kamailio] Less predictive algorithm for carrierroute hashing (Issue #3786)

2024-04-11 Thread Henning Westerholt via sr-dev
The hashing algorithm could be changed, sure. There are some internal hashing algorithms available (e.g. MD5) in the Kamailio core, there is of course also the possibility to use OpenSSL, but we might not want to introduce this depencency for that module. -- Reply to this email directly or vie