On 26/03/2024 02:48, Patrice Duroux wrote:
1. Using CodeSearch, it is not clear to me when to use one or the other.
Some additions to Greg's answer.
From (info "(libc) Standard-Environment")
https://www.gnu.org/software/libc/manual/html_node/Standard-Environment.html
25.4.2 Standard Environmen
On Mon, Mar 25, 2024 at 4:33 PM Björn Persson wrote:
>
> In a quest to acquire hardware random number generators for seeding
> /dev/random on servers that lack a built-in entropy source, I'm
> investigating how random data can be obtained from a security key such
> as a Nitrokey, Yubikey or a simi
On 3/25/24 15:05, Gareth Evans wrote:
On Fri 22/03/2024 at 21:01, Gareth Evans wrote:
As anyone interested can see from the ref to #15933 in the below, there seems
to have been considerable effort in getting to grips with this bug (actually
multiple bugs), and it looks like a fix may be forth
Andy Smith wrote:
> EntropyKey is a dead product that can no longer be obtained
I've seen several like that. They're permanently sold out, or the
webshops are abandoned and half-broken. Pure random number generators
that are actually possible to buy are rare. That's why I'm
investigating whether s
On Mon, Mar 25, 2024 at 06:09:02PM -0400, e...@gmx.us wrote:
> On 3/25/24 17:27, Andy Smith wrote:
> > The thread covers how to make rngd feed /dev/random from a OneRNG in
> > Debian 12, but it is no longer possible to tell if that does
> > anything useful.
>
> If not from devices like this, from
On 3/25/24 17:27, Andy Smith wrote:
The thread covers how to make rngd feed /dev/random from a OneRNG in
Debian 12, but it is no longer possible to tell if that does
anything useful.
If not from devices like this, from where does Debian get its randomness?
--
For is it not written, wheresoever
On Fri 22/03/2024 at 21:01, Gareth Evans wrote:
> As anyone interested can see from the ref to #15933 in the below, there seems
> to have been considerable effort in getting to grips with this bug (actually
> multiple bugs), and it looks like a fix may be forthcoming, though not sure
> at the t
Hi,
On Mon, Mar 25, 2024 at 09:24:23PM +0100, Björn Persson wrote:
> Does anyone know of another way to obtain random data from devices of
> this kind?
I have some EntropyKeys and some OneRNGs. I have the rngd packaged
in Debian feeding /dev/random from them.
This had an actual noticeable effect
On Mon, Mar 25, 2024 at 08:48:04PM +0100, Patrice Duroux wrote:
> Hi,
>
> 1. Using CodeSearch, it is not clear to me when to use one or the other.
Your original Subject: header mentions $USER and $LOGNAME so I assume
you're asking about these.
$LOGNAME is the standard variable which is set by th
Hello!
In a quest to acquire hardware random number generators for seeding
/dev/random on servers that lack a built-in entropy source, I'm
investigating how random data can be obtained from a security key such
as a Nitrokey, Yubikey or a similar device.
RNGD version 6 from https://github.com/nhor
Hi,
1. Using CodeSearch, it is not clear to me when to use one or the other.
2. Would it be nice if the EnvironmentVariables page were linked to a
new page named EnvironmentVariablesList (the same way as DotFiles and
DotFilesList)?
Best,
Patrice
On Mon, Mar 25, 2024 at 11:05:44AM -0400, Cindy Sue Causey wrote:
[...]
> apt-cache search kernel filesystem doc
>
> Which brought up two docs appropriate for my own Trixie setup: linux-doc-6.5
> and linux-doc-6.6. The description for 6.6 is:
>
> Description-en: Linux kernel specific documentat
On Sun, Mar 24, 2024 at 11:42 PM Sirius wrote:
>
> In days of yore (Sun, 24 Mar 2024), fxkl4...@protonmail.com thus quoth:
> > when i type mount i see many different filesystem names
> >
> > sysfs, proc, udev, devpts, tmpfs, securityfs, cgroup2, pstore, none,
> > systemd-1, hugetlbfs, mqueue, debu
13 matches
Mail list logo