[tor-bugs] #4900 [Tor Relay]: Use a more randomized hash function for our hash tables
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Fri Jan 13 15:56:28 UTC 2012
#4900: Use a more randomized hash function for our hash tables
--------------------------+-------------------------------------------------
Reporter: nickm | Owner:
Type: defect | Status: new
Priority: normal | Milestone: Tor: 0.2.3.x-final
Component: Tor Relay | Version:
Keywords: dos security | Parent:
Points: | Actualpoints:
--------------------------+-------------------------------------------------
(This is NOT about using a new cryptographic hashing algorithm.)
There's been some good work recently [1] about the class of DOS attacks
where you know the hash algorithm that's going to be used for putting data
into a hash table, so you provide a whole bunch of known-to-collide inputs
so that the hashtable operations will become O(N) rather than O(1).
To avoid this class of attacks, we ought to have some sort of a per-run
random tweak on the data-hashing functions we use for our hash tables.
[1] http://events.ccc.de/congress/2011/Fahrplan/events/4680.en.html
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4900>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list