Date: Tue, 11 Dec 2001 13:08:03 +0000 From: Thomas Hurst <freaky@aagh.net> To: FreeBSD-gnats-submit@freebsd.org Subject: ports/32694: security/gnupg fails to generate keys Message-ID: <E16Dmdf-000PsG-00@voi.aagh.net>
next in thread | raw e-mail | index | archive | help
>Number: 32694 >Category: ports >Synopsis: security/gnupg fails to generate keys >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Dec 11 05:10:00 PST 2001 >Closed-Date: >Last-Modified: >Originator: Thomas Hurst >Release: FreeBSD 4.4-STABLE i386 >Organization: None whatsoever >Environment: System: FreeBSD voi.freak.lan 4.4-STABLE FreeBSD 4.4-STABLE #0: Sun Nov 11 19:47:37 GMT 2001 root@sploo.freak.lan:/usr/obj/usr/src/sys/SPLOO i386 (Yes, I renamed my machine, although maybe my first choice of 'ione' would be better :) The system is monitor and keyboard-less. >Description: gpg --gen-key always ends up sitting there with: We need to generate a lot of random bytes. It is a good idea to perform [snip] Not enough random bytes available. Please do some other work to give the OS a chance to collect more entropy! (Need 300 more bytes) Despite a constant stream of random data from /dev/random, and leaving it there 10 minutes. Even doing a find / and exporting X sessions doesn't help (although the progress display proceeds further in this case). Similar tools, such as ssh-keygen have no problems. >How-To-Repeat: gpg --gen-key, answer prompts >Fix: Don't use encryption, only terrorists use encryption!!!!!111 >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E16Dmdf-000PsG-00>