This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author neologix
Recipients Jon.Oberheide, neologix, sbt, vstinner
Date 2012-04-11.14:41:04
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <CAH_1eM1QSJRbT5JPLTjsqqs74g9sWYmvmXGwSsXqE9L7hLPmSA@mail.gmail.com>
In-reply-to <1334154468.6.0.277890641342.issue14532@psf.upfronthosting.co.za>
Content
> You call it obfuscating, I call it security correctness and developer education. Tomayto, tomahto. ;-)

Well, I'd be prompt to changing to a more robust digest check
algorithm if the current one had a flaw, but AFAICT, it's not the case
(but I'm no security expert).

> Anywho, your call of course, feel free to close.

Being a core Python developer doesn't mean I'm right ;-)

I just don't think that "set an example for other hmac module users"
is a good reason on its own to complicate the code, which is currently
readable and - AFICT - safe (complexity usually introduces bugs).
Furthermore, I somehow doubt that hmac users will go and have a look
at the multiprocessing connection challenge code when looking for an
example.

One thing that could definitely be interesting is to look through the
code base and example to see if a similar - but vulnerable - pattern
is used, and fix such occurrences.
History
Date User Action Args
2012-04-11 14:41:04neologixsetrecipients: + neologix, vstinner, sbt, Jon.Oberheide
2012-04-11 14:41:04neologixlinkissue14532 messages
2012-04-11 14:41:04neologixcreate