This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author ncoghlan
Recipients IvanAnishchuk, ncoghlan, steven.daprano, vstinner
Date 2017-03-11.13:45:17
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1489239918.11.0.651479809369.issue29790@psf.upfronthosting.co.za>
In-reply-to
Content
To provide some additional context to that answer: the problem isn't with folks wanting direct access to their hardware entropy devices as such.

There are plenty of options for that (such as exposing it as a file descriptor distinct from both /dev/random and /dev/urandom), but going through /dev/random (or calling "os.getrandom(n, os.GRND_RANDOM)") isn't one of them.

Instead, /dev/random consumes the same kernel CSPRNG that /dev/urandom does, it just adds an extra check to make it block when the kernel's collected entropy estimate happens to be low.

So this isn't something we want to expose or explain to Python users in general - instead, it's something that only folks doing highly specialised work involving hardware security modules might be interested in, and hence can be safely left to third party tools and frameworks, rather than being something that would ever be shipped by default as part of the reference interpreter and standard library.
History
Date User Action Args
2017-03-11 13:45:18ncoghlansetrecipients: + ncoghlan, vstinner, steven.daprano, IvanAnishchuk
2017-03-11 13:45:18ncoghlansetmessageid: <1489239918.11.0.651479809369.issue29790@psf.upfronthosting.co.za>
2017-03-11 13:45:18ncoghlanlinkissue29790 messages
2017-03-11 13:45:17ncoghlancreate