Just a simple: 
$find / > /dev/null 

I think this might do the trick.

Just to add three cents to the question of entropy vs. bug, bear in mind
here that whatever goes into generating that key is as strong as its
weakest link. Someone might go to a great deal of effort to generate the
key pair in question but eventually it will reside on a filesystem whose
controls likely do not rely on such a high degree of entropy. To
analogize, the safe in your home may be protected by an unguessable
combination, but since it is so complex, so entropic, it must be
recorded somewhere. So the thief doesn't try to guess the unguessable;
he simply seeks the place in which the key has been recorded. And while
that key may be protected with its own combination, it intrinsically has
to be one easily remembered (and that means easily guessed).

I do lean toward identifying this as a bug as there are ways of a system
generating the necessary entropy for the keys. These typically are more
or in addition to the guidance of moving the cursor or typing random
keys. One should remember as well that not all users have a mouse,
keyboard or or full (or any) use of hands and fingers for that matter.
Hence, sound development practices would seek out such routines rather
than simply ask the user to do something random - after all if the user
were truly random we wouldn't need key-pair generation to begin with ;-)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/706011

Title:
  gpg --key-gen doesn't have enough entropy and rng-tools install/start
  fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnupg/+bug/706011/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to