Hi,

this is just to let you know that the /dev/random problems
are still not solved in the 2.6.26 version. A small dictionary
attack on sshd (in my case 260 tries over 12 minutes)
are able to produce

auth.log.0:Aug  3 05:30:35 dirk sshd[1825]: fatal: Couldn't obtain random bytes 
(error 
604389476)

and the sshd dies (followed by apache on the first subsequent
SSL request and so on).


Unfortunately I can't help you in tracing the uml process
or trying patches - this is a virtual server at my provider
and I don't have any access there. I could try to get
the .config file.


# uname -a
Linux dirk 2.6.26 #1 Wed Jul 30 10:56:10 CEST 2008 i686 GNU/Linux

# cat /proc/cpuinfo
processor       : 0
vendor_id       : User Mode Linux
model name      : UML
mode            : skas
host            : Linux seldon-base 2.6.23.17 #2 SMP Sat Jun 21 15:04:22 CEST 
2008 i686
bogomips        : 4771.02

# cat /proc/sys/kernel/random/entropy_avail
293

After exhausting the entropy with

   cat /dev/random | od -cx

the entropy only slooowly gets up, one byte per several
seconds or so with me typing in the ssh console...


Regards
-- 
                                 Stano


-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
User-mode-linux-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/user-mode-linux-devel

Reply via email to