Semi-closing a hole
Semi-closing a hole
Posted Apr 12, 2012 8:00 UTC (Thu) by man_ls (guest, #15091)In reply to: Semi-closing a hole by wahern
Parent article: Python 2.6.8, 2.7.3, 3.1.5, and 3.2.3 security release
The correct behavior would be to throw an exception, of course. Instead of collapsing the machine the program would just stop servicing that particular request which has the (n+1)th hash collision.
I don't know much about Python web servers, but I would presume that they are coded so that an exception in a request is caught somewhere and does not affect other requests. (Otherwise the server code is really, really broken: any silly coding mistake becomes a DoS.) If this is the case then you are not back at square one: instead of denying responses for all users you are denying service only to the malicious user, without affecting others. This technique might be called "denial of malicious service".
