Nick Coghlan added the comment:

On modern Intel chips, one of the entropy sources is the CPU itself, and so 
this problem is mostly theoretical on such systems unless you're worried about 
the quality of Intel's entropy generation (in which case you're well and truly 
into sovereign espionage and advanced persistent threat territory, and really 
shouldn't be blindly trusting operating systems and programming language 
runtimes to already be doing the right thing).

So the main ways to get bad entropy from /dev/urandom on Linux are:

- a misconfigured VM that has been cut off from all decent entropy sources, and 
doesn't have any persistent storage attached
- an embedded non-Intel chip that doesn't have any decent entropy sources or 
persistent storage attached

If you're not doing either of those things, you're probably fine. If you're 
worried that you might be, try running Python 3.6 and calling os.getrandom() 
explicitly to see what happens.

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue27292>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to