Nick Coghlan added the comment:

This RFE is unfortunately based on some incorrect assumptions about the way 
Linux kernels use CSPRNGs and entropy pools. Using /dev/random isn't magically 
more secure than /dev/urandom, it just makes your applications less reliable 
for no good reason.

Folks are free to do that through an extension module if they really wish to do 
so, but it's not an option we're interested in supporting in the standard 
library.

This is a good article providing some additional background on that topic: 
http://www.2uo.de/myths-about-urandom/

There was one genuine problem with /dev/urandom (it could return potentially 
predictable values if the entropy pool hadn't been adequately seeded), but 
Victor addressed that in PEP 524 by switching to the blocking variant of the 
getrandom() syscall (when available) rather than using the file descriptor 
interface.

----------
resolution:  -> rejected
stage:  -> resolved
status: open -> closed

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue29790>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to