From: Romain Bardou <bardou@lsv.ens-cachan.fr>
To: Xavier Leroy <Xavier.Leroy@inria.fr>
Cc: caml-list@inria.fr
Subject: Re: [Caml-list] Re: [oss-security] CVE request: Hash DoS vulnerability (ocert-2011-003)
Date: Tue, 13 Mar 2012 10:54:48 +0100 [thread overview]
Message-ID: <4F5F1968.20600@lsv.ens-cachan.fr> (raw)
In-Reply-To: <4F5E3A6E.4010406@inria.fr>
Hi,
> As you and Gerd said, the new Hashtbl implementation in the upcoming
> major release has everything needed to randomize hash tables by
> seeding. The question at this point is whether randomization should
> be the default or not: some of our big users who don't do Web stuff
> value reproducibility highly... We (OCaml core developers) will take
> a decision soon.
FWIW, as a developer I do not expect reproducibility from Hash tables
(nor from the Random module actually) but I do expect some way to
control reproducibility (i.e. read the current seed, give my own seed).
Maybe it's better to assume that the programmer will not be aware of
attacks, and provide him with a safer environment.
On the other hand, when you find a bug and need reproducibility, it's
too late if you have used a random seed without recording it. And could
it break some existing applications?
I guess you('re) already had(having) this discussion though.
Cheers,
--
Romain
next prev parent reply other threads:[~2012-03-13 10:04 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <4F3078F1.8070105@redhat.com>
2012-02-07 1:10 ` Kurt Seifried
2012-02-07 8:34 ` Richard W.M. Jones
2012-03-10 7:31 ` Richard W.M. Jones
2012-03-10 12:31 ` Gerd Stolpmann
2012-03-12 18:03 ` Xavier Leroy
2012-03-13 9:54 ` Romain Bardou [this message]
2012-03-13 11:58 ` Paolo Donadeo
2012-03-13 12:31 ` Philippe Veber
2012-03-13 13:23 ` Gerd Stolpmann
2012-03-13 15:39 ` Romain Bardou
2012-03-13 18:27 ` David Allsopp
2012-03-13 18:58 ` Alain Frisch
2012-03-13 18:08 ` Dario Teixeira
2012-03-13 18:28 ` David Allsopp
2012-03-14 9:23 ` Xavier Leroy
2012-03-13 16:52 ` Richard W.M. Jones
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4F5F1968.20600@lsv.ens-cachan.fr \
--to=bardou@lsv.ens-cachan.fr \
--cc=Xavier.Leroy@inria.fr \
--cc=caml-list@inria.fr \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox