This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author vstinner
Recipients Colm Buckley, Lukasa, alex, doko, dstufft, larry, lemburg, martin.panter, matejcik, ned.deily, python-dev, rhettinger, skrah, thomas-petazzoni, vstinner, ztane
Date 2016-06-07.12:02:51
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <CAMpsgwaeHGukudrzeSZHwMOvDaA6pT=JvuWZKXnSR_7udMPTJA@mail.gmail.com>
In-reply-to <1465300486.01.0.146709962465.issue26839@psf.upfronthosting.co.za>
Content
Donald Stufft: "As far as I know, all other modern OSs *ALWAYS* block
until their entropy pool is intialized. It's Linux that refuses to get
with the program."

Ah? I didn't know. Anyway, it doesn't change anything to the problem.

I don't think that security matters enough to block Python at startup.
Python has a long history of being a thin wrapper on top of the OS.
Usually, Python doesn't workaround design issues of OSes, but expose
functions as they are.

If you think that Linux is broken, please fix Linux, not Python.

--

If security matters in your application, you should works around the
Linux behaviour (bug?) in your application, but not in Python. For
example, raise a fatal error with an error written in capital letters.
Or block. Python *cannot* make this choice for you. It's part of
Python design to not take such decision for you.

Python is used in various areas, and in many areas, security don't
matter at all.

To me, it's just a major bug that python3 -c 'print("Hello World")
blocks until Linux has enough entropy. In some embedded devices, you
can wait forever, you will *never* get enough entropy to see the hello
world message...

--

Trying to decide if os.urandom() and /dev/urnadom are "secure" or not
is a waste of time. To me it's now clear that it's impossible to
decide :-) It depends on your expectation from security. Don't start
to loose time on discussion this forever ;-)
History
Date User Action Args
2016-06-07 12:02:52vstinnersetrecipients: + vstinner, lemburg, rhettinger, doko, larry, matejcik, ned.deily, alex, skrah, python-dev, martin.panter, ztane, dstufft, Lukasa, thomas-petazzoni, Colm Buckley
2016-06-07 12:02:52vstinnerlinkissue26839 messages
2016-06-07 12:02:51vstinnercreate