[EMAIL PROTECTED] wrote: > > On Eigerstein, ipsec 1.5 > > ipsec rsasigkey 1024 > > takes FOREVER, sometimes 20 minutes > > I've used python to calculate millions of floating point no's > and cat ted /dev/random and urandom to /dev/null > trying to generate entropy. nothing helps. > > Any ideas??
In addition to that which guitarlynn mentions, notice that this process -- generating the key -- is *extremely* cpu intensive! The reverse process -- using the key during authentication -- is many orders of magnitude faster! So, if at all possible, generate the key on a faster box, especially if your firewall is running a 486. There is nothing system specific to the generated keys, except hostname that can be edited later, in the resulting output. In my case, my DCD is a 486dx50 -- generating keys on a pentium pro 200 was at least twenty (20) times faster and the resulting keys are working flawlessly on the 486 . . . HTH -- Best Regards, mds mds resource 888.250.3987 Dare to fix things before they break . . . Our capacity for understanding is inversely proportional to how much we think we know. The more I know, the more I know I don't know . . . _______________________________________________ Leaf-user mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user