Hi Leland,

> nohup time /usr/bin/openssl genrsa -rand /dev/urandom
> 1024 > /tmp/server.key &

Two things occur to me; it's waiting for you to enter a password to
protect the key, as the process is bg it's blocked. The other thing that
can occur (very rarely) on linux is that the urandom system is not
getting enough entropy to generate random numbers needed by OpenSSL.
This can be tested by using:

        dd if=/dev/urandom of=/tmp/rand bs=2k count=1

This should return almost immediately and generate a 2k file
/tmp/urandom.bin, if it does not return but blocks, then you have an
entropy gathering problem. I doubt it will be a prob. but this is the
way to check.



Several suggestions:

1. remove the '-rand /dev/urandom' statement, it reads this  by default
(under Linux). On SUN machines there is no /dev/urandom, PRNGd is used
instead. Unless you need an alternate random source, you don't to
specify and scripts transport easily between OS's.

2. Use '-out /tmp/server.key' instead of piping the key, it's easier to
separate the key from any errors.

3. The keygen process requires you to enter a passwd for the key, which
is why it is never completes. if you 'fg' the process and then type in
the passwd+ENTER, repeated twice, the process will complete.


4. If you are unsure of the syntax, run openssl in interactive mode and
use '?' to get help:

        # openssl
        OpenSSL> ?
        OpenSSL> genrsa ?

The docs are often outdated, this is the only sure way to know what is
compiled in.
  

Rgds, 
  

Simon Thornton
---------------------------------------------------------------
BTW, FWIW, IMHO, AFAIK, yes. OTOH, AAMOF, maybe not. YMMV

Attachment: smime.p7s
Description: application/pkcs7-signature

Reply via email to