This one time, at band camp, Stephen Gran said:
> This is essentially a 'me-too' type post, so sorry about that :)
> 
> I just wanted to let you know it's not isolated.  This is happening on
> two machines I administer as well, and I have had to make the same
> kludge as the OP.  If I can help in any way with debugging, I would be
> happy to.

A little more investigation today shows that both machines that have a
problem with this are also very low on entropy.  They are fairly idle
servers, so perhaps this is why - not enough events or something to
generate the needed entropy.  So perhaps this is an implementation
detail in gnutls, that it blocks on /dev/random?  I am not sure that I
want gnutls to use /dev/urandom at all times, but maybe there is a way
to make a quick-n-dirty key using /dev/urandom if system entropy is low,
and another to do the right thing and block on /dev/random?

I am going to investigate the gnutls sources for a while, but as I am
no cryptographer, I don't expect inspiration.

Thanks,
-- 
 -----------------------------------------------------------------
|   ,''`.                                            Stephen Gran |
|  : :' :                                        [EMAIL PROTECTED] |
|  `. `'                        Debian user, admin, and developer |
|    `-                                     http://www.debian.org |
 -----------------------------------------------------------------

Attachment: pgp1Xfdvivyjy.pgp
Description: PGP signature

Reply via email to