As I said above, I may have been to overenthusiastic closing this bug,
and I apologize for that, but there is no need to accuse me of knowing
little of encryption. Please don't get personal and keep this here on a
professional level.

/dev/random and /dev/urandom are both random number generators, but
/dev/urandom is only a _pseudo_ random number generator, its generated
output is still hard to predict. If you are paranoid (and I can
understand that, because I'm paranoid sometimes, too), then /dev/urandom
is not secure enough for you, but for other people it may be sufficient.

Since /dev/random/ can run out of usable entropy, it is not a bug, but
expected behavior that you have to press keys or move the mouse or
whatsoever to generate new random numbers, which will speed up the boot
process.

When encrypting the swap partition, /dev/urandom can be used to generate
a random key file, so you still had to reconstruct the exact sequence
that was generated at the moment of initializing the encrypted swap
partition, which is very, very hard.

Some links about this topic:
https://help.ubuntu.com/community/EncryptedFilesystemHowto5
https://www.antagonism.org/privacy/encrypted-swap-linux.shtml

Buttom line:
I fully agree with you that using /dev/urandom raises security questions. As 
you can see, both tutorials prefer /dev/random, but they also states that this 
might require you to press some keys, which strengthens my positions that this 
is NOT a bug.

Btw: I found an earlier bug report and I think, this one here is a
duplicate of Bug #223072

-- 
[jaunty] encrypted swap breaks (or slows a lot) the boot
https://bugs.launchpad.net/bugs/367260
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to