homepage

This issue tracker has been migrated to GitHub , and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author lemburg
Recipients Arfrever, amaury.forgeotdarc, asvetlov, christian.heimes, georg.brandl, grahamd, gregory.p.smith, jcea, lemburg, pitrou, sbt, twouters, vstinner
Date 2013年01月14日.15:49:36
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <50F4290D.6090702@egenix.com>
In-reply-to <1358033855.49.0.878450514405.issue16500@psf.upfronthosting.co.za>
Content
On 13.01.2013 00:37, STINNER Victor wrote:
> By the way, OpenSSL expects that its PRNG is reseed somehow (call RNG_add) after a fork. I wrote a patch for OpenSSL, but I don't remember if I sent it to OpenSSL.
> https://bitbucket.org/haypo/hasard/src/4a1be69a47eb1b2ec7ca95a341d4ca953a77f8c6/patches/openssl_rand_fork.patch?at=default
Apparently not, and according to this thread, they don't think
this is an OpenSSL problem to solve:
http://openssl.6102.n7.nabble.com/recycled-pids-causes-PRNG-to-repeat-td41669.html
Note that you don't have to reseed the RNG just make sure that the
two forks use different sequences. Simply adding some extra data
in each process will suffice, e.g. by adding the PID of the new process
to the RNG pool. This is certainly doable without any major CPU
overhead :-)
History
Date User Action Args
2013年01月14日 15:49:37lemburgsetrecipients: + lemburg, twouters, georg.brandl, gregory.p.smith, jcea, amaury.forgeotdarc, pitrou, vstinner, christian.heimes, grahamd, Arfrever, asvetlov, sbt
2013年01月14日 15:49:37lemburglinkissue16500 messages
2013年01月14日 15:49:36lemburgcreate

AltStyle によって変換されたページ (->オリジナル) /