/dev/random blocks if there is not enough entropy to return the requested number of bytes, and this turns out to hang our AWS servers. When generating random bytes for Jabber passwords, use /dev/urandom instead. We figure that this will be "secure enough," since we'll have bigger problems if someone manages to get ahold of our /dev/urandom's seed value.
Name |
Last commit
|
Last update |
---|---|---|
.. | ||
branding | Loading commit data... | |
certificates | Loading commit data... | |
circuit | Loading commit data... | |
course_wiki | Loading commit data... | |
courseware | Loading commit data... | |
dashboard | Loading commit data... | |
debug | Loading commit data... | |
django_comment_client | Loading commit data... | |
foldit | Loading commit data... | |
instructor | Loading commit data... | |
jabber | Loading commit data... | |
licenses | Loading commit data... | |
lms_migration | Loading commit data... | |
multicourse | Loading commit data... | |
notes | Loading commit data... | |
open_ended_grading | Loading commit data... | |
psychometrics | Loading commit data... | |
simplewiki | Loading commit data... | |
static_template_view | Loading commit data... | |
staticbook | Loading commit data... |