Thread overview | |||||
---|---|---|---|---|---|
|
May 29, 2017 [Semi-OT] DoS with hashing | ||||
---|---|---|---|---|
| ||||
Interesting article: https://emboss.github.io/blog/2012/12/14/breaking-murmur-hash-flooding-dos-reloaded/ I remember seeing some discussion on this previously on the forums. https://issues.dlang.org/show_bug.cgi?id=7179 Any update on this issue? |
May 29, 2017 Re: [Semi-OT] DoS with hashing | ||||
---|---|---|---|---|
| ||||
Posted in reply to Random-dev | On Monday, 29 May 2017 at 09:08:45 UTC, Random-dev wrote: > Interesting article: > https://emboss.github.io/blog/2012/12/14/breaking-murmur-hash-flooding-dos-reloaded/ > > I remember seeing some discussion on this previously on the forums. > > https://issues.dlang.org/show_bug.cgi?id=7179 > > Any update on this issue? I was curious about that Marvin32 hash mentioned at the end, looks like MS open-sourced it with .Net a couple years later,though patented: https://www.reddit.com/r/programming/comments/4jpve5/marvin32_net_hash_function_simple_safe_and/ |
May 30, 2017 Re: [Semi-OT] DoS with hashing | ||||
---|---|---|---|---|
| ||||
Posted in reply to Random-dev | The attack relies on many collisions. I wonder if it would be enough to just count the number of collisions and rehash the hashtable with new hash seed on some threshold number. |
Copyright © 1999-2021 by the D Language Foundation