[Pkg-gnupg-commit] [gnupg2] 08/205: doc: Note that rngd can also be used to quickly generate insecure keys.
Daniel Kahn Gillmor
dkg at fifthhorseman.net
Wed May 11 08:38:08 UTC 2016
This is an automated email from the git hooks/post-receive script.
dkg pushed a commit to branch experimental
in repository gnupg2.
commit 75311cfe18071b94c66121a9785b133b6df345a3
Author: Neal H. Walfield <neal at g10code.com>
Date: Tue Feb 2 11:50:08 2016 +0100
doc: Note that rngd can also be used to quickly generate insecure keys.
* doc/gpg-agent.texi (Agent Options): Add comment to the description
of --debug-quick-random that rngd can also be used to quickly generate
key.
--
Signed-off-by: Neal H. Walfield <neal at g10code.com>
---
doc/gpg-agent.texi | 8 +++++++-
1 file changed, 7 insertions(+), 1 deletion(-)
diff --git a/doc/gpg-agent.texi b/doc/gpg-agent.texi
index f4da9cf..5a387d4 100644
--- a/doc/gpg-agent.texi
+++ b/doc/gpg-agent.texi
@@ -243,9 +243,15 @@ debugger.
This option inhibits the use of the very secure random quality level
(Libgcrypt’s @code{GCRY_VERY_STRONG_RANDOM}) and degrades all request
down to standard random quality. It is only used for testing and
-shall not be used for any production quality keys. This option is
+should not be used for any production quality keys. This option is
only effective when given on the command line.
+On GNU/Linux, another way to quickly generate insecure keys is to use
+ at command{rngd} to fill the kernel's entropy pool with lower quality
+random data. @command{rngd} is typically provided by the
+ at command{rng-tools} package. It can be run as follows: @samp{sudo
+rngd -f -r /dev/urandom}.
+
@item --debug-pinentry
@opindex debug-pinentry
This option enables extra debug information pertaining to the
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-gnupg/gnupg2.git
More information about the Pkg-gnupg-commit
mailing list