Message267730
| Author |
larry |
| Recipients |
Colm Buckley, Lukasa, alex, christian.heimes, doko, dstufft, larry, lemburg, martin.panter, matejcik, ned.deily, python-dev, rhettinger, skrah, thomas-petazzoni, vstinner, ztane |
| Date |
2016年06月07日.19:10:18 |
| SpamBayes Score |
-1.0 |
| Marked as misclassified |
Yes |
| Message-id |
<1465326618.72.0.718273103565.issue26839@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
> This is only a DoS vector if you can hit the server so early in the boot process that it doesn't have enough entropy.
Python hash randomization only happens once. So it's not a matter of how early we try the attack, it's a matter of how early we seed Python hash randomization. |
|
History
|
|---|
| Date |
User |
Action |
Args |
| 2016年06月07日 19:10:18 | larry | set | recipients:
+ larry, lemburg, rhettinger, doko, vstinner, christian.heimes, matejcik, ned.deily, alex, skrah, python-dev, martin.panter, ztane, dstufft, Lukasa, thomas-petazzoni, Colm Buckley |
| 2016年06月07日 19:10:18 | larry | set | messageid: <1465326618.72.0.718273103565.issue26839@psf.upfronthosting.co.za> |
| 2016年06月07日 19:10:18 | larry | link | issue26839 messages |
| 2016年06月07日 19:10:18 | larry | create |
|