On Thu, Dec 23, 2010 at 10:43:49AM +0100, olli hauer wrote:

> On 2010-12-23 09:44, Clint Pachl wrote:
> > Salvador Fandiqo wrote:
> >> On 12/23/2010 06:39 AM, Marsh Ray wrote:
> >>> On 12/22/2010 03:49 PM, Clint Pachl wrote:
> >>>> Salvador Fandiqo wrote:
> >>>>>
> >>>>> Could a random seed be patched into the kernel image at installation
> >>>>> time?
> >>>>> Admittedly this is not entropy, this is a just secret key and anyone
> >>>>> with access to the machine would be able to read it,
> >>>
> >>> How is it different than any other installation file then?
> >>
> >> because it is accessible *before* any filesystem is mounted, from second 0 
> >> of
> >> the boot process.
> >>
> >>
> > This reminds me of something.
> > 
> > The last time I installed FreeBSD about 5 years ago, it asked me to pound 
> > on the
> > keyboard for like 60 seconds during installation (or at first boot, can't
> > remember) in order to build up some "randomness". I wonder what kind of 
> > entropy
> > that provided?
> > 
> 
> It was only the first time sshd starts to generate enough entropy for the
> ssh-key generation.
> 
> http://www.freebsd.org/cgi/cvsweb.cgi/src/etc/rc.d/sshd?rev=1.14;content-type=text%2Fplain

In our case, the aim is to use the entropy collected during install
by the various entropy sources (tty, disk io, network io and more) to
generate a random seed that's being saved to disk so the first real
boot is able to stir the random pool with that and have enough entropy
to generate good hostkeys.

        -Otto

Reply via email to