Can we stop the discussion please? I have picked a winner. The loser
may not like it, but the discussion is OVER.

On Sun, Aug 7, 2016 at 9:33 AM, Donald Stufft <don...@stufft.io> wrote:
>
>> On Aug 7, 2016, at 12:28 PM, Ethan Furman <et...@stoneleaf.us> wrote:
>>
>> At this point we have concrete examples of the harm caused by blocking on 
>> os.urandom -- do we have any actual use-cases where it is hurtful to raise 
>> instead?
>
> The use cases there are basically any time it would have only blocked for 
> say, half a second or so. It’s hard to point out a specific use case because  
> we’ve never had an error raising there, we’ve either just silently given them 
> bad data because /dev/urandom wasn’t initialized or we blocked and they 
> didn’t notice because it only blocked for a short time.
>
> I suspect that the “can block for a short time” will be the dominant case, 
> because the system generally gets entropy quite quickly in most scenarios. 
> The only time it can’t really is if Python is the only thing running early 
> enough in the boot process *and* that thing is calling os.urandom. The 
> problem we had that started this thread was SipHash initialization calling a 
> blocking urandom by a script called by systemd prior to the point where 
> systemd would attempt to reseed urandom from previous boots and prior to the 
> point that systemd parallelizes the boot process.
>
> Basically any other time the time to block will be relatively short (and in 
> fact, you see daemons like OpenSSH blocking on start up for similar reasons).
>
> —
> Donald Stufft
>
>
>



-- 
--Guido van Rossum (python.org/~guido)
_______________________________________________
Security-SIG mailing list
Security-SIG@python.org
https://mail.python.org/mailman/listinfo/security-sig

Reply via email to