Message 151754 - Python tracker (original) (raw)

On Sat, Jan 21, 2012 at 5:42 PM, Gregory P. Smith <report@bugs.python.org>wrote:

Gregory P. Smith <greg@krypto.org> added the comment:

On Sat, Jan 21, 2012 at 2:45 PM, Antoine Pitrou <report@bugs.python.org> wrote:

Antoine Pitrou <pitrou@free.fr> added the comment:

You said above that it should be hardcoded; if so, how can it be changed at run-time from an environment variable? Or am I misunderstanding.

You're right, I used the wrong word. I meant it should be a constant independently of the dict size. But, indeed, not hard-coded in the source.

BTW, presumably if we do it, we should do it for sets as well?

Yeah, and use the same env var / sys function.

Despite the "DICT" in the title? OK.

Well, dict is the most likely target for these attacks.

While true I wouldn't make that claim as there will be applications using a set in a vulnerable manner. I'd prefer to see any such environment variable name used to configure this behavior not mention DICT or SET but just say HASHTABLE. That is a much better bikeshed color. ;)

I'm still in the hash seed randomization camp but I'm finding it interesting all of the creative ways others are trying to "solve" this problem in a way that could be enabled by default in stable versions regardless. :)

-gps



Python tracker <report@bugs.python.org> <http://bugs.python.org/issue13703>


I'm a little slow, so bear with me, but David, does this counting scheme in any way address the issue of:

I'm able to put N pieces of data into the database on successive requests, but then rendering that data puts it in a dictionary, which renders that page unviewable by anyone.