Dashkal <dashkal at ...> writes:

> 
> Ok, strange thing
> 
> This time I didn't kill freenet when it appeared to hang when asking me 
> to enter the port number.
> 
> When I took the time to start this email, it eventually unhanged itself 
> and started to work.

--snip for over-zealous gmane filter--

> 'freenet/support/CPUInformation/libjcpuid-x86-linux.so' loaded from resource
> INFO: Optimized native BigInteger library 
> 'net/i2p/util/libjbigi-linux-athlon.so' loaded from resource
> <<<--- This is where it hung --->>>
> 62734
> listenPort [19934]

Don't disclose your listenPort, since it can be used to identify your node with
some degree of confidence :) I'd change it now if I were you.

--snip for over-zealous gmane filter--

> tail -f freenet.log <<<--- My input to that $ prompt above --->>>
> Apr 10, 2006 4:30:52 PM (freenet.node.Main, main, NORMAL): Starting 
> Freenet (Fred) 0.5 node, build #5106 on JVM Blackdown Java-Linux 
> Team:Java HotSpot(TM) Client VM:Blackdown-1.4.2-03
> <<<--- Hangs here --->>>
> Apr 10, 2006 4:33:35 PM (freenet.node.Main, main, NORMAL): loading node 
> keys: node
> Apr 10, 2006 4:33:35 PM (freenet.node.Main, main, NORMAL): Creating node 
> keys: node
> <<<--- SNIP --->>>
> 
>  From there it appears to work.  I am able to connect to the proxy port 
> as normal.

Yeah, this is actually a known issue with 0.5 but it's supposed to be kind of
fixed. I thought it was only people like with weird setups (blackdown 1.4.1 /
sparc64) who still saw huge pauses. A similar problem seems to be affecting 0.7
judging by recent posts.

What's actually happening is that the Yarrow PRNG is blocking whilst waiting for
enough entropy to be collected, so that it can generate somewhat "strong"
psuedo-random numbers (important to stop attacks on encryption.) If you have a
true hardware RNG e.g. a VIA C7 processor or dedicated crypto card then IIRC it
just reads /dev/hwrandom and off it goes, but most people don't. So it has to
read /dev/urandom or /dev/random (forget which) which generate psuedo-random
numbers based on unpredictable 'entropy' activity like mouse movements,
keypresses, and hard disk activity. Therefore you should be able to speed it up
by opening a text editor and mashing the keyboard randomly, waving the mouse
around, doing disk searches etc.

This is a bit daft but there's no real way around it, short of everyone buying
proper RNGs. Other crypto apps like GPG have the same problem at key generation
time and likewise ask you to type randomly / wave the mouse around.

Bob



Reply via email to