Movatterモバイル変換


[0]ホーム

URL:


[Python-Dev] hash randomization in 3.3

Stephen J. Turnbullstephen at xemacs.org
Thu Feb 23 08:12:39 CET 2012


Antoine Pitrou writes: > How is it a "false sense of security" at all? It's the same as > setting a private secret for e.g. session cookies in Web applications. > As long as you don't leak the seed, it's (should be) secure.That's true.  The problem is, the precondition that you won't leak theseed is all too often false.  If a user takes advantage of the abilityto set the seed, she can leak it, or a coworker (or a virus) can stealit from her source or keystroke logging, etc.And it's not the same, at least not for a highly secure application.In high-quality security, session keys are generated for each session(and changed frequently); the user doesn't know them (of course, hecan always find out if he really wants to know, and sometimes that'snecessary -- Hello, Debian OpenSSH maintainer!), and so can't leakthem.


More information about the Python-Devmailing list

[8]ページ先頭

©2009-2025 Movatter.jp