STINNER Victor <victor.stin...@gmail.com> added the comment:

It was decided to leave the hash randomization disabled by default for backward 
compatibility. It's a deliberate choice.

I don't think that we need to go further for Python 2.7. I never considered 
this denial of service attach as major, there are many other ways to trigger a 
DoS, and fixing the dict type is not the right way to prevent this class of 
attacks.

HTTP clients and frameworks like http.client and Django implemented other 
countermeasures like limiting the number of HTTP headers.

The problem was correctly fixed in Python 3: randomization enabled by default 
since Python 3.3, and Python 3.4 now uses SipHash which better hides the hash 
secret.

More info at:
* http://python-security.readthedocs.io/vuln/cve-2012-1150_hash_dos.html
* 
http://python-security.readthedocs.io/vuln/cve-2013-7040_hash_not_properly_randomized.html

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue32175>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to