On Fri, Mar 30, 2012 at 12:07 PM, Éric Araujo <mer...@netwok.org> wrote:
> Le 29/03/2012 22:04, Nick Coghlan a écrit :
>> On Fri, Mar 30, 2012 at 4:26 AM, Carl Meyer <c...@oddbird.net> wrote:
>>> I've added this option as a comment on bug 14444. The title of that bug
>>> is worded such that it could be reasonably resolved either with the
>>> backwards-compatibility fix or the release notes addition, the release
>>> managers can decide what seems appropriate to them.
>> +1 for restoring the fallback code in os.py. A security release
>> definitely shouldn't be breaking that kind of thing.
>
> The RMs have already agreed not to restore the fallback, and the
> maintainer of virtualenv agreed.  See report for more details.

The details are pretty short (and make sense), so I'll repeat the most
salient points here for the benefit of others:

- if the binary in a virtualenv isn't updated, then projects running
in a virtualenv won't receive the security fix when the updated
version of Python is installed
- restoring the fallback in os.py would make this failure mode
*silent*, so a user could upgrade Python, set PYTHONHASHSEED, but fail
to realise they also need to update the binary in the virtualenv in
order to benefit from the hash protection
- with the current behaviour, failing to upgrade the binary results in
a noisy ImportError or AttributeError related to os.urandom, which the
release notes and virtualenv help channels can instruct people on
handling. This approach explicitly covers the additional steps needed
to fully deploy the security fix when using virtualenv.

That rationale makes sense to me, too.

Cheers,
Nick.

-- 
Nick Coghlan   |   ncogh...@gmail.com   |   Brisbane, Australia
_______________________________________________
Python-Dev mailing list
Python-Dev@python.org
http://mail.python.org/mailman/listinfo/python-dev
Unsubscribe: 
http://mail.python.org/mailman/options/python-dev/archive%40mail-archive.com

Reply via email to