improove entropy manuals

This commit is contained in:
Jan F 2011-05-31 23:09:30 +02:00
parent 0e9135fc82
commit bc60f31447
2 changed files with 46 additions and 25 deletions

View File

@ -89,7 +89,7 @@ diff -up openssh-5.8p2/openbsd-compat/port-linux-prng.c.entropy openssh-5.8p2/op
diff -up openssh-5.8p2/ssh.1.entropy openssh-5.8p2/ssh.1 diff -up openssh-5.8p2/ssh.1.entropy openssh-5.8p2/ssh.1
--- openssh-5.8p2/ssh.1.entropy 2010-11-20 05:21:03.000000000 +0100 --- openssh-5.8p2/ssh.1.entropy 2010-11-20 05:21:03.000000000 +0100
+++ openssh-5.8p2/ssh.1 2011-05-28 21:15:27.375920967 +0200 +++ openssh-5.8p2/ssh.1 2011-05-28 21:15:27.375920967 +0200
@@ -1250,6 +1250,17 @@ For more information, see the @@ -1250,6 +1250,20 @@ For more information, see the
.Cm PermitUserEnvironment .Cm PermitUserEnvironment
option in option in
.Xr sshd_config 5 . .Xr sshd_config 5 .
@ -98,19 +98,22 @@ diff -up openssh-5.8p2/ssh.1.entropy openssh-5.8p2/ssh.1
+.Cm /dev/urandom . +.Cm /dev/urandom .
+If the +If the
+.Cm SSH_USE_STRONG_RNG +.Cm SSH_USE_STRONG_RNG
+is set to nonzero value +environment variable is set to value other than
+.Cm 0
+the OpenSSL random generator is reseeded from +the OpenSSL random generator is reseeded from
+.Cm /dev/random . +.Cm /dev/random .
+The number of bytes read is defined by the SSH_USE_STRONG_RNG value. Minimum is 6 bytes. +The number of bytes read is defined by the SSH_USE_STRONG_RNG value.
+Minimum is 6 bytes.
+This setting is not recommended on the computers without the hardware +This setting is not recommended on the computers without the hardware
+random generator. Insuifficient entropy causes the blocking conection. +random generator because insufficient entropy causes the connection to
+be blocked until enough entropy is available.
.Sh FILES .Sh FILES
.Bl -tag -width Ds -compact .Bl -tag -width Ds -compact
.It Pa ~/.rhosts .It Pa ~/.rhosts
diff -up openssh-5.8p2/ssh-add.1.entropy openssh-5.8p2/ssh-add.1 diff -up openssh-5.8p2/ssh-add.1.entropy openssh-5.8p2/ssh-add.1
--- openssh-5.8p2/ssh-add.1.entropy 2010-11-05 00:20:14.000000000 +0100 --- openssh-5.8p2/ssh-add.1.entropy 2010-11-05 00:20:14.000000000 +0100
+++ openssh-5.8p2/ssh-add.1 2011-05-28 21:16:43.891859186 +0200 +++ openssh-5.8p2/ssh-add.1 2011-05-28 21:16:43.891859186 +0200
@@ -158,6 +158,17 @@ Identifies the path of a @@ -158,6 +158,20 @@ Identifies the path of a
.Ux Ns -domain .Ux Ns -domain
socket used to communicate with the agent. socket used to communicate with the agent.
.El .El
@ -119,19 +122,22 @@ diff -up openssh-5.8p2/ssh-add.1.entropy openssh-5.8p2/ssh-add.1
+.Cm /dev/urandom . +.Cm /dev/urandom .
+If the +If the
+.Cm SSH_USE_STRONG_RNG +.Cm SSH_USE_STRONG_RNG
+is set to nonzero value +environment variable is set to value other than
+.Cm 0
+the OpenSSL random generator is reseeded from +the OpenSSL random generator is reseeded from
+.Cm /dev/random . +.Cm /dev/random .
+The number of bytes read is defined by the SSH_USE_STRONG_RNG value. Minimum is 6 bytes. +The number of bytes read is defined by the SSH_USE_STRONG_RNG value.
+Minimum is 6 bytes.
+This setting is not recommended on the computers without the hardware +This setting is not recommended on the computers without the hardware
+random generator. Insuifficient entropy causes the blocking conection. +random generator because insufficient entropy causes the connection to
+be blocked until enough entropy is available.
.Sh FILES .Sh FILES
.Bl -tag -width Ds .Bl -tag -width Ds
.It Pa ~/.ssh/identity .It Pa ~/.ssh/identity
diff -up openssh-5.8p2/ssh-agent.1.entropy openssh-5.8p2/ssh-agent.1 diff -up openssh-5.8p2/ssh-agent.1.entropy openssh-5.8p2/ssh-agent.1
--- openssh-5.8p2/ssh-agent.1.entropy 2010-12-01 01:50:35.000000000 +0100 --- openssh-5.8p2/ssh-agent.1.entropy 2010-12-01 01:50:35.000000000 +0100
+++ openssh-5.8p2/ssh-agent.1 2011-05-28 21:13:10.086864993 +0200 +++ openssh-5.8p2/ssh-agent.1 2011-05-28 21:13:10.086864993 +0200
@@ -198,6 +198,20 @@ sockets used to contain the connection t @@ -198,6 +198,23 @@ sockets used to contain the connection t
These sockets should only be readable by the owner. These sockets should only be readable by the owner.
The sockets should get automatically removed when the agent exits. The sockets should get automatically removed when the agent exits.
.El .El
@ -143,19 +149,22 @@ diff -up openssh-5.8p2/ssh-agent.1.entropy openssh-5.8p2/ssh-agent.1
+.Cm /dev/urandom . +.Cm /dev/urandom .
+If the +If the
+.Cm SSH_USE_STRONG_RNG +.Cm SSH_USE_STRONG_RNG
+is set to nonzero value +environment variable is set to value other than
+.Cm 0
+the OpenSSL random generator is reseeded from +the OpenSSL random generator is reseeded from
+.Cm /dev/random . +.Cm /dev/random .
+The number of bytes read is defined by the SSH_USE_STRONG_RNG value. Minimum is 6 bytes. +The number of bytes read is defined by the SSH_USE_STRONG_RNG value.
+Minimum is 6 bytes.
+This setting is not recommended on the computers without the hardware +This setting is not recommended on the computers without the hardware
+random generator. Insuifficient entropy causes the blocking conection. +random generator because insufficient entropy causes the connection to
+be blocked until enough entropy is available.
.Sh SEE ALSO .Sh SEE ALSO
.Xr ssh 1 , .Xr ssh 1 ,
.Xr ssh-add 1 , .Xr ssh-add 1 ,
diff -up openssh-5.8p2/sshd.8.entropy openssh-5.8p2/sshd.8 diff -up openssh-5.8p2/sshd.8.entropy openssh-5.8p2/sshd.8
--- openssh-5.8p2/sshd.8.entropy 2010-11-05 00:20:14.000000000 +0100 --- openssh-5.8p2/sshd.8.entropy 2010-11-05 00:20:14.000000000 +0100
+++ openssh-5.8p2/sshd.8 2011-05-28 21:13:10.241861760 +0200 +++ openssh-5.8p2/sshd.8 2011-05-28 21:13:10.241861760 +0200
@@ -937,6 +937,20 @@ concurrently for different ports, this c @@ -937,6 +937,23 @@ concurrently for different ports, this c
started last). started last).
The content of this file is not sensitive; it can be world-readable. The content of this file is not sensitive; it can be world-readable.
.El .El
@ -167,19 +176,22 @@ diff -up openssh-5.8p2/sshd.8.entropy openssh-5.8p2/sshd.8
+.Cm /dev/urandom . +.Cm /dev/urandom .
+If the +If the
+.Cm SSH_USE_STRONG_RNG +.Cm SSH_USE_STRONG_RNG
+is set to nonzero value +environment variable is set to value other than
+.Cm 0
+the OpenSSL random generator is reseeded from +the OpenSSL random generator is reseeded from
+.Cm /dev/random . +.Cm /dev/random .
+The number of bytes read is defined by the SSH_USE_STRONG_RNG value. Minimum is 6 bytes. +The number of bytes read is defined by the SSH_USE_STRONG_RNG value.
+Minimum is 6 bytes.
+This setting is not recommended on the computers without the hardware +This setting is not recommended on the computers without the hardware
+random generator. Insuifficient entropy causes the blocking conection. +random generator because insufficient entropy causes the connection to
+be blocked until enough entropy is available.
.Sh SEE ALSO .Sh SEE ALSO
.Xr scp 1 , .Xr scp 1 ,
.Xr sftp 1 , .Xr sftp 1 ,
diff -up openssh-5.8p2/ssh-keygen.1.entropy openssh-5.8p2/ssh-keygen.1 diff -up openssh-5.8p2/ssh-keygen.1.entropy openssh-5.8p2/ssh-keygen.1
--- openssh-5.8p2/ssh-keygen.1.entropy 2010-11-05 00:20:14.000000000 +0100 --- openssh-5.8p2/ssh-keygen.1.entropy 2010-11-05 00:20:14.000000000 +0100
+++ openssh-5.8p2/ssh-keygen.1 2011-05-28 21:13:10.389856432 +0200 +++ openssh-5.8p2/ssh-keygen.1 2011-05-28 21:13:10.389856432 +0200
@@ -655,6 +655,20 @@ Contains Diffie-Hellman groups used for @@ -655,6 +655,23 @@ Contains Diffie-Hellman groups used for
The file format is described in The file format is described in
.Xr moduli 5 . .Xr moduli 5 .
.El .El
@ -191,19 +203,22 @@ diff -up openssh-5.8p2/ssh-keygen.1.entropy openssh-5.8p2/ssh-keygen.1
+.Cm /dev/urandom . +.Cm /dev/urandom .
+If the +If the
+.Cm SSH_USE_STRONG_RNG +.Cm SSH_USE_STRONG_RNG
+is set to nonzero value +environment variable is set to value other than
+.Cm 0
+the OpenSSL random generator is reseeded from +the OpenSSL random generator is reseeded from
+.Cm /dev/random . +.Cm /dev/random .
+The number of bytes read is defined by the SSH_USE_STRONG_RNG value. Minimum is 6 bytes. +The number of bytes read is defined by the SSH_USE_STRONG_RNG value.
+Minimum is 6 bytes.
+This setting is not recommended on the computers without the hardware +This setting is not recommended on the computers without the hardware
+random generator. Insuifficient entropy causes the blocking conection. +random generator because insufficient entropy causes the connection to
+be blocked until enough entropy is available.
.Sh SEE ALSO .Sh SEE ALSO
.Xr ssh 1 , .Xr ssh 1 ,
.Xr ssh-add 1 , .Xr ssh-add 1 ,
diff -up openssh-5.8p2/ssh-keysign.8.entropy openssh-5.8p2/ssh-keysign.8 diff -up openssh-5.8p2/ssh-keysign.8.entropy openssh-5.8p2/ssh-keysign.8
--- openssh-5.8p2/ssh-keysign.8.entropy 2010-08-31 14:41:14.000000000 +0200 --- openssh-5.8p2/ssh-keysign.8.entropy 2010-08-31 14:41:14.000000000 +0200
+++ openssh-5.8p2/ssh-keysign.8 2011-05-28 21:17:32.399856797 +0200 +++ openssh-5.8p2/ssh-keysign.8 2011-05-28 21:17:32.399856797 +0200
@@ -78,6 +78,20 @@ must be set-uid root if host-based authe @@ -78,6 +78,23 @@ must be set-uid root if host-based authe
If these files exist they are assumed to contain public certificate If these files exist they are assumed to contain public certificate
information corresponding with the private keys above. information corresponding with the private keys above.
.El .El
@ -215,12 +230,15 @@ diff -up openssh-5.8p2/ssh-keysign.8.entropy openssh-5.8p2/ssh-keysign.8
+.Cm /dev/urandom . +.Cm /dev/urandom .
+If the +If the
+.Cm SSH_USE_STRONG_RNG +.Cm SSH_USE_STRONG_RNG
+is set to nonzero value +environment variable is set to value other than
+.Cm 0
+the OpenSSL random generator is reseeded from +the OpenSSL random generator is reseeded from
+.Cm /dev/random . +.Cm /dev/random .
+The number of bytes read is defined by the SSH_USE_STRONG_RNG value. Minimum is 6 bytes. +The number of bytes read is defined by the SSH_USE_STRONG_RNG value.
+Minimum is 6 bytes.
+This setting is not recommended on the computers without the hardware +This setting is not recommended on the computers without the hardware
+random generator. Insuifficient entropy causes the blocking conection. +random generator because insufficient entropy causes the connection to
+be blocked until enough entropy is available.
.Sh SEE ALSO .Sh SEE ALSO
.Xr ssh 1 , .Xr ssh 1 ,
.Xr ssh-keygen 1 , .Xr ssh-keygen 1 ,

View File

@ -74,7 +74,7 @@
# Do not forget to bump pam_ssh_agent_auth release if you rewind the main package release to 1 # Do not forget to bump pam_ssh_agent_auth release if you rewind the main package release to 1
%define openssh_ver 5.8p2 %define openssh_ver 5.8p2
%define openssh_rel 4 %define openssh_rel 5
%define pam_ssh_agent_ver 0.9.2 %define pam_ssh_agent_ver 0.9.2
%define pam_ssh_agent_rel 31 %define pam_ssh_agent_rel 31
@ -739,6 +739,9 @@ exit 0
%endif %endif
%changelog %changelog
* Tue May 31 2011 Jan F. Chadima <jchadima@redhat.com> - 5.8p2-5 + 0.9.2-31
- improove entropy manuals
* Fri May 27 2011 Jan F. Chadima <jchadima@redhat.com> - 5.8p2-4 + 0.9.2-31 * Fri May 27 2011 Jan F. Chadima <jchadima@redhat.com> - 5.8p2-4 + 0.9.2-31
- improove entropy handling - improove entropy handling
- concat ldap patches - concat ldap patches