This issue tracker has been migrated to GitHub ,
and is currently read-only.
For more information,
see the GitHub FAQs in the Python's Developer Guide.
| Author | lemburg |
|---|---|
| Recipients | Arfrever, amaury.forgeotdarc, asvetlov, christian.heimes, georg.brandl, grahamd, gregory.p.smith, jcea, lemburg, pitrou, sbt, twouters, vstinner |
| Date | 2013年01月14日.15:49:36 |
| SpamBayes Score | -1.0 |
| Marked as misclassified | Yes |
| Message-id | <50F4290D.6090702@egenix.com> |
| In-reply-to | <1358033855.49.0.878450514405.issue16500@psf.upfronthosting.co.za> |
| Content | |
|---|---|
On 13.01.2013 00:37, STINNER Victor wrote: > By the way, OpenSSL expects that its PRNG is reseed somehow (call RNG_add) after a fork. I wrote a patch for OpenSSL, but I don't remember if I sent it to OpenSSL. > https://bitbucket.org/haypo/hasard/src/4a1be69a47eb1b2ec7ca95a341d4ca953a77f8c6/patches/openssl_rand_fork.patch?at=default Apparently not, and according to this thread, they don't think this is an OpenSSL problem to solve: http://openssl.6102.n7.nabble.com/recycled-pids-causes-PRNG-to-repeat-td41669.html Note that you don't have to reseed the RNG just make sure that the two forks use different sequences. Simply adding some extra data in each process will suffice, e.g. by adding the PID of the new process to the RNG pool. This is certainly doable without any major CPU overhead :-) |
|
| History | |||
|---|---|---|---|
| Date | User | Action | Args |
| 2013年01月14日 15:49:37 | lemburg | set | recipients: + lemburg, twouters, georg.brandl, gregory.p.smith, jcea, amaury.forgeotdarc, pitrou, vstinner, christian.heimes, grahamd, Arfrever, asvetlov, sbt |
| 2013年01月14日 15:49:37 | lemburg | link | issue16500 messages |
| 2013年01月14日 15:49:36 | lemburg | create | |