This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author lemburg
Recipients Arfrever, alex, dstufft, ezio.melotti, lemburg, mark.dickinson, neologix, pitrou, rhettinger, tim.peters, vstinner
Date 2014-05-13.09:04:12
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1399971853.52.0.130318213066.issue21470@psf.upfronthosting.co.za>
In-reply-to
Content
neologix:

According to man rand(3ssl), OpenSSL uses an internal state of 1023 bytes for the RNG.

You only see it reading 32 bytes from /dev/urandom in the strace because it has already loaded 1024 bytes from the RNG state file ~/.rng before adding another 32 bytes:

open("/home/lemburg/.rnd", O_RDONLY)    = 3
read(3, "..."..., 4096) = 1024
read(3, "", 4096)                       = 0
Generating RSA private key, 512 bit long modulus
open("/dev/urandom", O_RDONLY|O_NOCTTY|O_NONBLOCK) = 3
read(3, "...", 32) = 32

FWIW: I'm with Raymond and Tim on this one. I prefer to have a good seed in an RNG per default, simply because most application don't bother to reseed RNGs every now and then, so having a good start into the day is important :-)
History
Date User Action Args
2014-05-13 09:04:13lemburgsetrecipients: + lemburg, tim.peters, rhettinger, mark.dickinson, pitrou, vstinner, ezio.melotti, Arfrever, alex, neologix, dstufft
2014-05-13 09:04:13lemburgsetmessageid: <1399971853.52.0.130318213066.issue21470@psf.upfronthosting.co.za>
2014-05-13 09:04:13lemburglinkissue21470 messages
2014-05-13 09:04:12lemburgcreate