On Thu, May 27, 2010 at 08:21:11PM +0200, Milan Broz wrote: > On 05/27/2010 06:21 PM, Mario 'BitKoenig' Holbe wrote: > > Milan Broz <mbroz@xxxxxxxxxx> wrote: > >> (read from /dev/random can return if there is not enough entropy, it needs > > > > Nope. It blocks. > > yep, you are right :) > > The problem is that can wait very long time, so it should inform user that > system is out of entropy and ask for some action etc. This should be part > of the RNG handler in cryptsetup if using /dev/random is supported. Indeed. You could also just flush an explanation to stdout and ask the user to provide keystrokes if things take long. That would remove the need for monitoring what comes from /dev/random. Maybe use this as a temporary fix that amounts to one printf. However that does not solve the case of automatic installation on, e.g., embedded devices that have a low-entropy envoronment. Arno -- Arno Wagner, Dr. sc. techn., Dipl. Inform., CISSP -- Email: arno@xxxxxxxxxxx GnuPG: ID: 1E25338F FP: 0C30 5782 9D93 F785 E79C 0296 797F 6B50 1E25 338F ---- Cuddly UI's are the manifestation of wishful thinking. -- Dylan Evans If it's in the news, don't worry about it. The very definition of "news" is "something that hardly ever happens." -- Bruce Schneier _______________________________________________ dm-crypt mailing list dm-crypt@xxxxxxxx http://www.saout.de/mailman/listinfo/dm-crypt