matthias-t

Results 22 comments of matthias-t

Thanks for the prompt review. > I would like to see it repeat as few steps from the chroot guide as possible, instead focusing on what needs to be done...

Here are some more needed improvements: - Dracut reads from `/dev/urandom` before it is initialized. Normally, the systemd module takes care of that, but it is rightfully disabled by the...

> If you want to give your thoughts on any of the issues surrounding this, you are welcome to! We appreciate the help c: Thanks, that's nice of you. :relaxed:...

Wow, that's a great article! It demolishes the concept of entropy depletion (which haveged promotes), but maintains that some initial amount of entropy is of course necessary: > To work...

How about removing `/var/lib/random-seed` after using it? This will produce the expected behavior in `/etc/runit/core-services/05-misc.sh`. The only problem is that when the system is improperly shutdown, there is no seed...

https://github.com/void-linux/void-runit/pull/30 removed a line generating a new random seed file in `/etc/runit/core-services/05-misc.sh`, claiming that newer kernels do not credit entropy added from userspace. Is this the correct way to understand...

> Changing the number doesn't change the amount of entropy, it just changes what the kernel thinks about it. That is how I read it, too. But how does that...

> Maybe there's a race condition between entropy gathering and cryptsetup? Yes, probably. I'll try with cryptsetup reading `/dev/random` to see if that incurs any significant performance cost. > The...

> if you start with low entropy (and an attacker knows it) then do any known deterministic process, the system is potentially vulnerable to brute force attacks that reveal the...

As I said, I'm not really aware of any (except maybe TOML).