The only difference is venv creates link to python, it does not copy binary
itself.
You now have
python3 -> /usr/local/bin/python3
in your venv.

Since /usr/local/ has wxallowed by default (see your /etc/fstab) it works.

Does it affect security?

In theory -- yes, because python can now create WX pages.
One may say that it sounds paranoic, and in fact it is,
but OpenBSD is _paranoic_ about security.
That is why it has W^X.

They left wxallowed for /usr/local because there are a lot
of software in ports, written by less "secure paranoics" than openbsd
developers, and
this software needs WX.

Some python packages are good examples.

Python port maintainer added wxneeded to python because
of these packages.

But if you do not use any of these packages, you can
disable wxneeded removing any (theoretical) threat that may use WX.

That will make python more secure and (as side-effect) fix virtualenv
problems.

It is less important for developer laptop, but if you can improve security,
why
not?

You will not create "big security hole"  with your current approach.
You will not create it even by adding wxallowed to /home.
So, it is not a critical issue.

But I feel that decreasing security by running wxneeded app with
out of good reason(if you do not need these packages of course) is not
"OpenBSD way":)

Reply via email to