#9687: Use more randomness in secret key generation
-----------------------------------------+----------------------------------
          Reporter:  [EMAIL PROTECTED]  |         Owner:  nobody           
            Status:  closed              |     Milestone:                   
         Component:  Core framework      |       Version:  1.0              
        Resolution:  wontfix             |      Keywords:  SECRET_KEY random
             Stage:  Unreviewed          |     Has_patch:  0                
        Needs_docs:  0                   |   Needs_tests:  0                
Needs_better_patch:  0                   |  
-----------------------------------------+----------------------------------
Comment (by [EMAIL PROTECTED]):

 Whatever.

 The issue shouldn't be whether it's "good enough", the issue should be
 whether it improves things.  You've got someone else not only noticing a
 problem, but actually supplying you with source code, and it's not
 acceptable simply because the current system meets your own standards for
 'fitness'.

 I could point to [http://code.djangoproject.com/ticket/1180] as an example
 of the "works for me" approach breaking, as well as being an example of
 Django developers not really getting basic cryptographic randomness
 issues, but then I'd get accused of being petty.

 The question of whether your accepting reasonable patches or not is your
 own problem.

-- 
Ticket URL: <http://code.djangoproject.com/ticket/9687#comment:2>
Django <http://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/django-updates?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to