This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author neologix
Recipients alex, benjamin.peterson, christian.heimes, dstufft, giampaolo.rodola, janssen, josh.r, ncoghlan, neologix, tshepang
Date 2014-04-28.11:51:11
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <CAH_1eM2a_SizNXx=G9L6g1Rm+o=vcw5vrWMwtnZUCDkiGSnXMQ@mail.gmail.com>
In-reply-to <1398684077.46.0.486877556167.issue21305@psf.upfronthosting.co.za>
Content
> "Depleting" /dev/urandom isn't actually a thing. /dev/urandom on all modern *nix OSs uses a fast PRNG which is secure as long as it has received enough bytes of initial entropy.

I didn't say "deplete /dev/urandom", I said that when reading from
/dev/urandom "you're depleting your entropy pool". So reading from
/dev/urandom won't block, but it can starve processes that read from
/dev/random, and that's a problem.

See https://groups.google.com/forum/#!msg/fa.linux.kernel/Ocl01d8TzT0/KDCon2ZUm1AJ

I think since 2.6 Linux uses two different entropy pools for
/dev/random and /dev/urandom, but that might not be true for every OS.
History
Date User Action Args
2014-04-28 11:51:11neologixsetrecipients: + neologix, ncoghlan, janssen, giampaolo.rodola, christian.heimes, benjamin.peterson, alex, tshepang, dstufft, josh.r
2014-04-28 11:51:11neologixlinkissue21305 messages
2014-04-28 11:51:11neologixcreate