Package: dropbear
Severity: normal

This is the same problem as in #310732. In other words, dropbear
depends on /dev/random having enough entropy, but not all systems have
enough entropy in there. This causes logins to hang.

This is true especially for embedded systems where dropbear is likely
to be used due to its smaller memory footprint. Debian is now running
on many such systems (especially some of the architectures), so I
don't think it's fair to dismiss the bug by saying that /dev/random
can be expected to have enough entropy.

I'm not sure what the solution would be though. Some ideas:

- Run-time option to choose random device (/dev/random or
/dev/urandom).
- Run-time option to use PRNGD or EGD.
- Better documentation of this problem.

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable'), (1, 
'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-1-686
Locale: LANG=sv_SE.UTF-8, LC_CTYPE=sv_SE.UTF-8 (charmap=UTF-8)



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to