On 30 December 2011 15:21, Nicholas Clark <nick@ccl4.org> wrote: > On Thu, Dec 29, 2011 at 02:25:37PM -0800, Greg Lindahl wrote: >> The researchers concluded that the best way of avoiding the problem is >> to use randomised hash functions such as those used in Perl, which >> were included after a security conference paper on the technique was >> published in 2003PDF. CRuby 1.9 has used a similar randomisation >> technique since 2008. >> >> http://www.h-online.com/open/news/item/28C3-Denial-of-Service-attacks-on-web-applications-made-easy-1401863.html > > It's really strange watching what seems to be general mass panic* about > something that we calmly fixed the better part of a decade ago. Strange wasnt the word I thought of. More like "amusing". Pat on the back to you and the others who fixed this so many years ago. What I find ironic is that at the time folks from other languages were using this against us... Yves -- perl -Mre=debug -e "/just|another|perl|hacker/"Thread Previous | Thread Next