Message264126
| Author |
vstinner |
| Recipients |
doko, vstinner |
| Date |
2016年04月24日.19:37:03 |
| SpamBayes Score |
-1.0 |
| Marked as misclassified |
Yes |
| Message-id |
<1461526623.68.0.323010815969.issue26839@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
Python 3 uses os.urandom() at startup to randomize the hash function. os.urandom() now uses the new Linux getrandom() function which blocks until the Linux kernel is feeded with enough entropy. It's a deliberate choice.
The workaround is simple: set the PYTHONHASHSEED environment variable to use a fixed seed. For example, PYTHONHASHSEED=0 disables hash randomization.
If you use virtualization and Linux is not feeded with enough entropy, you have security issues.
> I just debugged the adt-virt-qemu failure (...)
If you use qemu, you can use virt-rng to provide good entropy to the VM from the host kernel. |
|
History
|
|---|
| Date |
User |
Action |
Args |
| 2016年04月24日 19:37:03 | vstinner | set | recipients:
+ vstinner, doko |
| 2016年04月24日 19:37:03 | vstinner | set | messageid: <1461526623.68.0.323010815969.issue26839@psf.upfronthosting.co.za> |
| 2016年04月24日 19:37:03 | vstinner | link | issue26839 messages |
| 2016年04月24日 19:37:03 | vstinner | create |
|