On Tue, Apr 16, 2019 at 11:45:08PM +0200, Cyril Brulebois wrote:
>Cyril Brulebois (2019-04-16):
>> The former was on my list of things to try; thanks for mentioning the
>> latter.
...
>My initial thought would be to launch it on demand when one is about to
>get to wget calls that needs HTTPS;
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 16 Apr 2019 23:26:01 +0200
Source: partman-basicfilesystems
Architecture: source
Version: 147
Distribution: unstable
Urgency: medium
Maintainer: Debian Install System Team
Changed-By: Holger Wansing
Changes:
partman-basicfilesystems_147_source.changes uploaded successfully to localhost
along with the files:
partman-basicfilesystems_147.dsc
partman-basicfilesystems_147.tar.xz
partman-basicfilesystems_147_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on host
Processing control commands:
> retitle -1 debian-installer: consider using haveged to gather entropy
Bug #923675 [debian-installer] debian-installer: delays when using an https
mirror due to rng
Changed Bug title to 'debian-installer: consider using haveged to gather
entropy' from
Control: retitle -1 debian-installer: consider using haveged to gather entropy
Cyril Brulebois (2019-04-16):
> The former was on my list of things to try; thanks for mentioning the
> latter.
I'm no cryptographer so I cannot judge haveged from that angle.
But from a
[Ben Hutchings]
> haveged or jitterentropy-rngd are likely to be better.
Is there any hope to run them within d-i in Buster before /target/ is
set up?
--
Happy hacking
Petter Reinholdtsen
Hi,
Cyril Brulebois wrote:
> Hi,
>
> Holger Wansing (2019-04-16):
> > Cyril Brulebois wrote:
> > > The Debian Installer team[1] is pleased to announce the first release
> > > candidate of the installer for Debian 10 "Buster".
> >
> > Sadly, the latest version of tasksel has not been
Ben Hutchings (2019-04-16):
> On Tue, 2019-04-16 at 13:57 +0200, Petter Reinholdtsen wrote:
> > [Ben Hutchings]
> > > This is a pretty terrible approach. Especially as the world has moved
> > > on to SSDs and they provide very little entropy from interrupts.
> >
> > Absolutely. But it has
Hi,
Holger Wansing (2019-04-16):
> Cyril Brulebois wrote:
> > The Debian Installer team[1] is pleased to announce the first release
> > candidate of the installer for Debian 10 "Buster".
>
> Sadly, the latest version of tasksel has not been unblocked for
> migration to Buster.
> (I have been
Hi,
Cyril Brulebois wrote:
> The Debian Installer team[1] is pleased to announce the first release
> candidate of the installer for Debian 10 "Buster".
Sadly, the latest version of tasksel has not been unblocked for migration to
Buster.
(I have been pointed on this by Wolfgang, subscriber of
On Tue, 2019-04-16 at 13:57 +0200, Petter Reinholdtsen wrote:
> [Ben Hutchings]
> > This is a pretty terrible approach. Especially as the world has moved
> > on to SSDs and they provide very little entropy from interrupts.
>
> Absolutely. But it has solved the problem with too little entropy
Daniel Lange dixit:
> Thorsten Glaser (CC) has produced a prototype early-rng-init-tools (cf.
> https://lists.debian.org/debian-devel/2019/02/msg00327.html) which could be
> extended to try reading entropy off the network when it doesn't have a
> carried-over seed (as in the Debian Installer
[Ben Hutchings]
> This is a pretty terrible approach. Especially as the world has moved
> on to SSDs and they provide very little entropy from interrupts.
Absolutely. But it has solved the problem with too little entropy since 2011.
Do you have any better ways to force the kernel to add some
Processing commands for cont...@bugs.debian.org:
> severity 926315 serious
Bug #926315 [openssl] openssl: wget https://google.com fails in d-i
Severity set to 'serious' from 'important'
> severity 927165 serious
Bug #927165 [debian-installer] debian-installer: improve support for LUKS
Severity
On 4/16/19 1:16 PM, Ben Hutchings wrote:
>> Do you think we could carry a patch in src:linux for the time being?
> [...]
>
> I would rather not do that until it's accepted, as if it that doesn't
> happen we either have to switch back or carry it forever.
Hmm, okay. Then I don't really have a way
On Tue, 2019-04-16 at 11:47 +0200, John Paul Adrian Glaubitz wrote:
> Hi Ben!
>
> On 4/7/19 1:53 AM, Ben Hutchings wrote:
> > > root@landau:~# cat /proc/consoles
> > > ttyHV0 -W- (EC p )4:64
> > > tty0 -WU (E )4:1
> > > root@landau:~# readlink
On Tue, 2019-04-16 at 12:19 +0200, Petter Reinholdtsen wrote:
> Debian Edu ran into this problem when installing Kerberos as a server from
> d-i,
> and solved it by running a process in the background to monitor the entropy
> level,
> and when it was running low, it would flush the file
Debian Edu ran into this problem when installing Kerberos as a server from d-i,
and solved it by running a process in the background to monitor the entropy
level,
and when it was running low, it would flush the file buffers and run 'find
/target' to force some IO operations that would add
Hi Ben!
On 4/7/19 1:53 AM, Ben Hutchings wrote:
>> root@landau:~# cat /proc/consoles
>> ttyHV0 -W- (EC p )4:64
>> tty0 -WU (E )4:1
>> root@landau:~# readlink /sys/dev/char/4:64
>> ../../devices/root/f0299a70/f029b788/tty/ttyS0
>
> The inconsistent name
This is related to #916690.
getrandom() essentially blocks during many use cases where the system
does not have enough entropy. This is somewhat mitigated by the Debian
kernel now trusting the RDRAND (CONFIG_RANDOM_TRUST_CPU) for AMD64
Your message dated Tue, 16 Apr 2019 15:16:03 +0800
with message-id <87d0lma098.8@jidanni.org>
and subject line Re: Bug#927045: ^C doesn't work when booting into recovery mode
has caused the Debian Bug report #927045,
regarding ^C doesn't work when booting into recovery mode
to be marked as
21 matches
Mail list logo