-
-
Notifications
You must be signed in to change notification settings - Fork 3.1k
RSA key generation does not deplete entropy pool #911
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@vitzli great find! as mentioned in the security notes, our state of crypto is very far from secure right now-- we need to make a long list of things to check (and eventually have an independent audit of the whole thing). If you'd like to make a document |
This issue seems to be caused by
It seems that there is a consensus that using BUT:www.gossamer-threads.com on large entropy consumption:
|
Maybe it's not a bug, but compared to gpg, IPFS:
OS: Debian Jessie 32-bit, 512 MB RAM inside virtualbox VM;
I'm checking available entropy via /proc/sys/kernel/random/entropy_avail, entropy drops a little (about 100 bits) but stays there, while gpg eats all available entropy (drops to 40 bits, process takes about 5 minutes and HDD activity is required to feed the pool).
Here is the log, I combined entropy output, time, and ipfs generation into one file, long version at https://gist.github.com/vitzli/f6fa7338cbc2bf4eb553:
The text was updated successfully, but these errors were encountered: