develooper Front page | perl.perl5.porters | Postings from December 2011

Re: perl's hash randomization in the news

Thread Previous | Thread Next
From:
demerphq
Date:
December 30, 2011 06:37
Subject:
Re: perl's hash randomization in the news
Message ID:
CANgJU+UkDMtRSySU1E1kB8X5vwX8b-RUXxi+3yqh1UnLDdKdLw@mail.gmail.com
On 30 December 2011 15:21, Nicholas Clark <nick@ccl4.org> wrote:
> On Thu, Dec 29, 2011 at 02:25:37PM -0800, Greg Lindahl wrote:
>>  The researchers concluded that the best way of avoiding the problem is
>>  to use randomised hash functions such as those used in Perl, which
>>  were included after a security conference paper on the technique was
>>  published in 2003PDF. CRuby 1.9 has used a similar randomisation
>>  technique since 2008.
>>
>> http://www.h-online.com/open/news/item/28C3-Denial-of-Service-attacks-on-web-applications-made-easy-1401863.html
>
> It's really strange watching what seems to be general mass panic* about
> something that we calmly fixed the better part of a decade ago.

Strange wasnt the word I thought of. More like "amusing".

Pat on the back to you and the others who fixed this so many years ago.

What I find ironic is that at the time folks from other languages were
using this against us...

Yves


-- 
perl -Mre=debug -e "/just|another|perl|hacker/"

Thread Previous | Thread Next


nntp.perl.org: Perl Programming lists via nntp and http.
Comments to Ask Bjørn Hansen at ask@perl.org | Group listing | About