This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author vstinner
Recipients doko, vstinner
Date 2016-04-24.19:37:03
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1461526623.68.0.323010815969.issue26839@psf.upfronthosting.co.za>
In-reply-to
Content
Python 3 uses os.urandom() at startup to randomize the hash function. os.urandom() now uses the new Linux getrandom() function which blocks until the Linux kernel is feeded with enough entropy. It's a deliberate choice.

The workaround is simple: set the PYTHONHASHSEED environment variable to use a fixed seed. For example, PYTHONHASHSEED=0 disables hash randomization.

If you use virtualization and Linux is not feeded with enough entropy, you have security issues.

> I just debugged the adt-virt-qemu failure (...)

If you use qemu, you can use virt-rng to provide good entropy to the VM from the host kernel.
History
Date User Action Args
2016-04-24 19:37:03vstinnersetrecipients: + vstinner, doko
2016-04-24 19:37:03vstinnersetmessageid: <1461526623.68.0.323010815969.issue26839@psf.upfronthosting.co.za>
2016-04-24 19:37:03vstinnerlinkissue26839 messages
2016-04-24 19:37:03vstinnercreate