Message268147
In 3.5.0 and 3.5.1 os.urandom will, where available, use the getrandom() to block rather than get insecure random from the urandom pool on Linux. In 3.5.2 this change is reverted so that os.urandom will return possibly predictable random numbers instead of blocking waiting for /dev/urandom to be intialized.
However, secrets.py is a module which is explicitly for getting cryptographically safe data for, and reverting that change means that the functions in this module are no longer cryptographically safe on Linux if they are called early enough in the boot process. Thus, secrets.py should be modified so that it no longer uses os.urandom on systems where there is a better source of randomness available-- namely getrandom() set to block on Linux. |
|
Date |
User |
Action |
Args |
2016-06-10 19:56:39 | dstufft | set | recipients:
+ dstufft, brett.cannon, ned.deily |
2016-06-10 19:56:39 | dstufft | set | messageid: <1465588599.3.0.867244099768.issue27288@psf.upfronthosting.co.za> |
2016-06-10 19:56:39 | dstufft | link | issue27288 messages |
2016-06-10 19:56:38 | dstufft | create | |
|