-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
More secure random entropy pool #33
Comments
A section for hardware based entropy tools could be nice too for example https://www.crowdsupply.com/13-37/infinite-noise-trng |
@branneman Wow. That is great. I had never even considered that. Will work on adding it. Thanks! |
@pahakalle Now that is interesting. I'd be worried about trusting the hardware tech. I'll do some research. Thanks! |
Added something basic for now. I'll add more detail when I have time. |
Thanks again! |
Is this still relevant? Also, the problem with headless server generating predictable keys at boot seems to be mitigated by Sources: |
I'm not sure. I've been a bit occupied with things and haven't had time to dig into this. But I will accept PRs if folks want to make changes. |
Thanks for this How-To guide, I'm happy this project exists!
A lot of linux servers are headless (no keyboard/mouse/monitor), and therefore have less sources for good entropy as there is no human interaction beyond ssh. There have been cases of headless servers generating predictable ssh keys after boot. [1]
Thus it can be reasoned that security can be increased by setting up additional sources for entropy. A simple
sudo apt-get install rng-tools
on debian-based distro's already adds value, but there might be more tools available.I suggest adding this as a section to the guide.
Sources:
The text was updated successfully, but these errors were encountered: