[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #4900 [Tor]: Use a more randomized hash function for our hash tables



#4900: Use a more randomized hash function for our hash tables
-----------------------------+------------------------------------
     Reporter:  nickm        |      Owner:
         Type:  enhancement  |     Status:  new
     Priority:  major        |  Milestone:  Tor: 0.2.5.x-final
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:  dos security tor-relay
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+------------------------------------

Comment (by nickm):

 bug4900_siphash in my public repository has an incomplete siphash-based
 implementation for initial poking-at.  Initially, it looks a little
 costly, but I didn't use a screamingly optimized implementation or
 anything.  It doesn't randomize its keys yet, so it's not ready for prime-
 time.

 Possibly, we should also consider crit-bit trees, though those have
 potential timing issues that we would need to consider hard.  And whatever
 else about them I forgot.  I wonder where I put my incomplete critbit-
 based HT_* replacement code, and whether it's worth finishing.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4900#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs