Defensive programming

Aahz aahz at pythoncraft.com
Sun Jun 1 20:20:09 EDT 2003


In article <7xn0h11gpu.fsf at ruckus.brouhaha.com>,
Paul Rubin  <http://phr.cx@NOSPAM.invalid> wrote:
>
>The paper proposed a good solution, which is use a hash function that
>the attacker doesn't have enough information to manipulate.

As Uncle Timmy pointed out on python-dev, some Python programs run for
literally months -- enough time to deduce the characteristics of the
hash function if someone is inclined.  Please read the thread on
python-dev before making further comments in this thread.
-- 
Aahz (aahz at pythoncraft.com)           <*>         http://www.pythoncraft.com/

"If you don't know what your program is supposed to do, you'd better not
start writing it."  --Dijkstra




More information about the Python-list mailing list