Message264126
Python 3 uses os.urandom() at startup to randomize the hash function. os.urandom() now uses the new Linux getrandom() function which blocks until the Linux kernel is feeded with enough entropy. It's a deliberate choice.
The workaround is simple: set the PYTHONHASHSEED environment variable to use a fixed seed. For example, PYTHONHASHSEED=0 disables hash randomization.
If you use virtualization and Linux is not feeded with enough entropy, you have security issues.
> I just debugged the adt-virt-qemu failure (...)
If you use qemu, you can use virt-rng to provide good entropy to the VM from the host kernel. |
|
Date |
User |
Action |
Args |
2016-04-24 19:37:03 | vstinner | set | recipients:
+ vstinner, doko |
2016-04-24 19:37:03 | vstinner | set | messageid: <1461526623.68.0.323010815969.issue26839@psf.upfronthosting.co.za> |
2016-04-24 19:37:03 | vstinner | link | issue26839 messages |
2016-04-24 19:37:03 | vstinner | create | |
|