Anything higher then 1024 key fails to create....
------- ERROR OUTPUT -----------
Failed to create backup key :
Key generation failed : :
Repeat passphrase:
You don't want a passphrase - this is probably a *bad* idea! I will do it anyway. You can change your passphrase at any time, using this program with the option "--edit-key".
We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy.
........+++++ ....+++++
We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy.
..+++++
Comments
Submitted by sgrayban on Sun, 07/08/2012 - 07:42 Comment #1
Actually even a 1024 key will fail if there isn't much cpu cycles being used.
Must be a way to bypass this and use the /dev/random device or something like it.
Submitted by sgrayban on Sun, 07/08/2012 - 07:48 Comment #2
In debian we have a program called urandom that does provide a random seed, maybe that can be used ?
It creates /var/lib/urandom/random-seed with how big the kernel poolsize is, /proc/sys/kernel/random/poolsize
Submitted by sgrayban on Sun, 07/08/2012 - 08:00 Comment #3
Ohh actually I found exactly what debian users need which works like a charm.
http://www.howtoforge.com/helping-the-random-number-generator-to-gain-en...
Submitted by JamieCameron on Sun, 07/08/2012 - 12:27 Comment #4
Is the system you are seeing this issue on actually a VM? I've seen problems in the past with their lack of random entropy...
Submitted by sgrayban on Mon, 07/09/2012 - 05:48 Comment #5
Both types of servers I am seeing this issue.
The only thing I found that fixes this issue 100% is using rng-tools --> http://www.howtoforge.com/helping-the-random-number-generator-to-gain-en...
Submitted by JamieCameron on Mon, 07/09/2012 - 11:25 Comment #6
We attempt to deal with this lack of entropy in Virtualmin already by running the
find /
command in the background to traverse the whole filesystem when a key is generated - this is supposed to create enough entropy due to random disk IO for the kernel to use. But I guess it doesn't work as well as your solution ..Submitted by sgrayban on Mon, 07/09/2012 - 11:57 Comment #7
At least we know that rng-tools can be used. Something to add to solving this issue..