[EMAIL PROTECTED] wrote:
> 
> On Eigerstein, ipsec 1.5
> 
>    ipsec  rsasigkey  1024
> 
>       takes FOREVER, sometimes  20 minutes
> 
> I've used python to calculate millions of floating point no's
>   and  cat ted  /dev/random  and urandom to /dev/null
> trying to generate  entropy.    nothing helps.
> 
> Any ideas??

In addition to that which guitarlynn mentions, notice that this process
-- generating the key -- is *extremely* cpu intensive!  The reverse
process -- using the key during authentication -- is many orders of
magnitude faster!

So, if at all possible, generate the key on a faster box, especially if
your firewall is running a 486.  There is nothing system specific to the
generated keys, except hostname that can be edited later, in the
resulting output.  In my case, my DCD is a 486dx50 -- generating keys on
a pentium pro 200 was at least twenty (20) times faster and the
resulting keys are working flawlessly on the 486 . . .

HTH

-- 

Best Regards,

mds
mds resource
888.250.3987

Dare to fix things before they break . . .

Our capacity for understanding is inversely proportional to how much we
think we know.  The more I know, the more I know I don't know . . .

_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to