Bug 450679
Summary: | certtool get timeout | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Edouard Bourguignon <madko> |
Component: | gnutls | Assignee: | Tomas Mraz <tmraz> |
Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | high | Docs Contact: | |
Priority: | low | ||
Version: | 8 | CC: | jorton |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2008-06-10 12:21:16 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Edouard Bourguignon
2008-06-10 12:05:29 UTC
gnutls uses /dev/random for generating the most security critical random material such as private keys. You need to have some source of entropy on the system where you're generating private keys. The timeout is on the /dev/random access? The /dev/random works on my system, how can I get more entropy to be able to use gnutls? openssl doesn't use /dev/random? I'm just trying to understand why I can't use certtool. OpenSSL uses /dev/urandom for seeding the internal RNG. You can get more entropy into the system by pressing random keystrokes or moving mouse randomly. If it is a server without attached keyboard and mouse it is a problem though. There are some specialized RNG devices in some CPUs or motherboard chipsets though. thank you for all this information You guess right I don't have physical access to the servers. I have no choice and will use OpenSSL |