> Am 28.05.2017 um 12:16 schrieb Robert Moskowitz <r...@htt-consult.com>: > > > > On 05/28/2017 04:24 AM, Tony Mountifield wrote: >> In article <792718e8-f403-1dea-367d-977b157af...@htt-consult.com>, >> Robert Moskowitz <r...@htt-consult.com> wrote: >>> >>> On 05/26/2017 08:35 PM, Leon Fauster wrote: >>> drops back to 30! for a few minutes. Sigh. >>>> http://issihosts.com/haveged/ >>>> >>>> EPEL: yum install haveged >>> WOW!!! >>> >>> installed, enabled, and started. >>> >>> Entropy jumped from ~130 bits to ~2000 bits >>> >>> thanks >>> >>> Note to anyone running a web server, or creating certs. You need >>> entropy. Without it your keys are weak and attackable. Probably even >>> known already. >> Interesting. I just did a quick check of the various servers I support, >> and have noticed that all the CentOS 5 and 6 systems report entropy in >> the low hundreds of bits, but all the CentOS 4 systems and the one old >> FC3 system all report over 3000 bits. >> >> Since they were all pretty much stock installs, what difference between >> the versions might explain what I observed? > > This is partly why so many certs found in the U of Mich study are weak and > factorable. So many systems have inadequate entropy for the generation of > key pairs to use in TLS certs. Worst are certs created in firstboot process > where at times there is no entropy, but the firstboot still creates its certs.
/var/lib/random-seed and $HOME/.rnd are approaches to mitigate this scenario. -- LF _______________________________________________ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos