> -----Original Message----- > I am aware of the implications, but unfortunately it did > not help either. > > # ls -l /dev/*random* > crw-rw-rw- 1 root root 1, 8 2008-08-05 17:41 /dev/oldrandom > lrwxrwxrwx 1 root root 7 2008-08-05 17:41 /dev/random -> urandom > crw-rw-rw- 1 root root 1, 9 2008-08-05 17:42 /dev/urandom > > # grep random /var/log/auth.log > Aug 5 19:53:50 dirk sshd[3117]: fatal: Couldn't obtain random bytes > (error 604389476) > > # cat /proc/sys/kernel/random/entropy_avail > 335 > > I am now talking to the host owner - he is running quite > a few UML guests, each in chroot environment, and one of the > problems is that his entropy gets sucked out... > > Now he has replaced random with urandom in my chroot jail, > so the UML's random is his urandom. Let's see what happens...
Please keep me appraised of what you find. Our servers never had this problem until upgrading to a 2.6.2x version of the kernel. SSHD, Apache and several other software packages worked fine under previous versions (and still do when we downgrade them). Its also worth noting that this behavior has never been exhibited on the host system. We've only seen it on our virtual systems. I keep meaning to go back and search for exactly which version introduced the changed behavior, but I don't have time. Instead we now have scripts that automatically restart processes that use OpenSSL when they die. We tried shifting to urandom earlier to see if it would resolve the issue, but didn't see a change in behavior. I'm interested in knowing if your approach will function better. Tony ------------------------------------------------------------------------- This SF.Net email is sponsored by the Moblin Your Move Developer's challenge Build the coolest Linux based applications with Moblin SDK & win great prizes Grand prize is a trip for two to an Open Source event anywhere in the world http://moblin-contest.org/redirect.php?banner_id=100&url=/ _______________________________________________ User-mode-linux-devel mailing list User-mode-linux-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/user-mode-linux-devel