New submission from Donald Stufft:

In 3.5.0 and 3.5.1 os.urandom will, where available, use the getrandom() to 
block rather than get insecure random from the urandom pool on Linux. In 3.5.2 
this change is reverted so that os.urandom will return possibly predictable 
random numbers instead of blocking waiting for /dev/urandom to be intialized.

However, secrets.py is a module which is explicitly for getting 
cryptographically safe data for, and reverting that change means that the 
functions in this module are no longer cryptographically safe on Linux if they 
are called early enough in the boot process. Thus, secrets.py should be 
modified so that it no longer uses os.urandom on systems where there is a 
better source of randomness available-- namely getrandom() set to block on 
Linux.

----------
messages: 268147
nosy: brett.cannon, dstufft, ned.deily
priority: release blocker
severity: normal
status: open
title: secrets should use getrandom() on Linux
type: security
versions: Python 3.6

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue27288>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to