[Disclaimer: I don't know anything about OAuth, or python-oauth2.]

* Paul Wise <p...@debian.org>, 2013-10-09, 07:41:
On Wed, Oct 9, 2013 at 5:46 AM, Philippe Makowski wrote:

do you think that for fixing that, using

return ''.join(random.choice('abcdefghijklmnopqrstuvwxyz123456789') for i in xrange(length))
...
would be an acceptable fix ?

No, from the announcement of this issue on oss-sec:

... the Python 'random' documentation clearly states the results are repeatable ...

http://www.openwall.com/lists/oss-security/2013/09/12/5

Yeah, the oss-sec mail is about using a RNG that is not suitable for cryptographic purposes. This can be easily fixed by using "random.SystemRandom" (which uses /dev/urandom) instead of the "random" module directly (which has a Mersenne Twister under the hood).

Confusingly, the mail also points to upstream bug report[0], which is about an (almost) orthogonal problem. Philippe's fix would make birthday attacks harder. Note however that make_nonce() and generate_nonce() docstrings say "generate pseudorandom number", so they would have to be updated accordingly.


[0] https://github.com/simplegeo/python-oauth2/issues/9

--
Jakub Wilk


--
To UNSUBSCRIBE, email to debian-python-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20131009064018.ga3...@jwilk.net

Reply via email to