Just a simple: $find / > /dev/null I think this might do the trick.
Just to add three cents to the question of entropy vs. bug, bear in mind here that whatever goes into generating that key is as strong as its weakest link. Someone might go to a great deal of effort to generate the key pair in question but eventually it will reside on a filesystem whose controls likely do not rely on such a high degree of entropy. To analogize, the safe in your home may be protected by an unguessable combination, but since it is so complex, so entropic, it must be recorded somewhere. So the thief doesn't try to guess the unguessable; he simply seeks the place in which the key has been recorded. And while that key may be protected with its own combination, it intrinsically has to be one easily remembered (and that means easily guessed). I do lean toward identifying this as a bug as there are ways of a system generating the necessary entropy for the keys. These typically are more or in addition to the guidance of moving the cursor or typing random keys. One should remember as well that not all users have a mouse, keyboard or or full (or any) use of hands and fingers for that matter. Hence, sound development practices would seek out such routines rather than simply ask the user to do something random - after all if the user were truly random we wouldn't need key-pair generation to begin with ;-) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/706011 Title: gpg --key-gen doesn't have enough entropy and rng-tools install/start fails To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnupg/+bug/706011/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs