> I have found that if you create a jail in FreeBSD 4.6.2, and then log into 
> that jail ... if you are root you can scp and ssh just fine.  However if you 
> are not root and you attempt to ssh or scp, you get this error:
> 
> PRNG is not seeded

Hmmm.

> A few details - first, I created my jail by simply using the dump command to 
> dump my / filesystem, and then restoring that inside the jail.  Not elegant, 
> but it works - so the jail in question has a full /dev and everything.
> 
> Second, I used the exact same method in 4.6.1 and did not have problems.
> 
> I saw a usenet post that recommended solving the problem with this:
> 
> "chmod a+r /dev/*rand*"

You seem to be on the right track in assuming it is a /dev/[u]random
problem.

Can you confirm this by (as a pleb user) dumping some random output?

$ dd if=/dev/random of=/dev/stdout bs=512 count=1 | hexdump -C

(and same for /dev/urandom).

Please also give a ls -l /dev/*random.

> however I tried that, and now when I try to ssh or scp from a non root user 
> inside the jail, I get:
> 
> "Host key verification failed"
> 
> Does anyone know why this happens, why it didn't happen prior to 4.6.2, and 
> how I can fix it ?

The random device has not changed, but the OpenSSL code has. Maybe OpenSSL's
internal PRNG is doing something naughty.

M
-- 
o       Mark Murray
\_
O.\_    Warning: this .sig is umop ap!sdn

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to