Hi,
this is just to let you know that the /dev/random problems
are still not solved in the 2.6.26 version. A small dictionary
attack on sshd (in my case 260 tries over 12 minutes)
are able to produce
auth.log.0:Aug 3 05:30:35 dirk sshd[1825]: fatal: Couldn't obtain random bytes
(error
604389476)
and the sshd dies (followed by apache on the first subsequent
SSL request and so on).
Unfortunately I can't help you in tracing the uml process
or trying patches - this is a virtual server at my provider
and I don't have any access there. I could try to get
the .config file.
# uname -a
Linux dirk 2.6.26 #1 Wed Jul 30 10:56:10 CEST 2008 i686 GNU/Linux
# cat /proc/cpuinfo
processor : 0
vendor_id : User Mode Linux
model name : UML
mode : skas
host : Linux seldon-base 2.6.23.17 #2 SMP Sat Jun 21 15:04:22 CEST
2008 i686
bogomips : 4771.02
# cat /proc/sys/kernel/random/entropy_avail
293
After exhausting the entropy with
cat /dev/random | od -cx
the entropy only slooowly gets up, one byte per several
seconds or so with me typing in the ssh console...
Regards
--
Stano
-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
User-mode-linux-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/user-mode-linux-devel