In the System environment variables, set the RANDFILE parameter to a
file that has a lot of entropy.  You must be an Administrator to do
this.

-Kyle H

On Tue, Apr 14, 2009 at 8:30 PM, seanlennon <seanlen...@cyberbless.com> wrote:
>
> Did this fix the problem.  I'm having the same problem.  How exactly do you
> "set RANDFILE environment variable in the service process"  Is that the same
> as the environment variables.  I bet this is a windows 2003 server.  I
> actually called linkpoint about this.  They had no solution.
>
>
>
> wolfoftheair wrote:
>>
>> This is User FAQ #1: http://openssl.org/support/faq.html#USER1
>>
>> You must provide a source of entropy -- that is, randomness -- to
>> OpenSSL in order for it to provide any kind of security at all.  This
>> can be done by setting the RANDFILE environment variable in the
>> service process, and filling that file with at least 128 bits
>> (preferably at least 1024 bytes) of random data.  (If you don't know
>> what random data to use, try creating a bunch of keys with 'openssl
>> rsagen', concatenating all of them, and saving that as the %RANDFILE%
>> contents.  If that doesn't work, take some random user documents and
>> use those.  It doesn't matter -- as long as it's not known to anyone
>> else what the contents are.  (Preferably, only SYSTEM and the service
>> account will have read access -- even Administrators shouldn't.)
>>
>> Make sure that file is readable and writable by the service process,
>> and don't just point RANDFILE at a user's file -- copy whatever you
>> want into where you want it to be, and then use that copy.  OpenSSL
>> will write its random state out to that file as well.
>>
>> -Kyle H
>>
>> On Tue, Mar 17, 2009 at 4:33 AM, shadi jawhar <shadi_jaw...@hotmail.com>
>> wrote:
>>> Hello,
>>> We spent 5 days researchng and trying.
>>> We have an Ecommerce simple applocation that uses link point to process
>>> orders.
>>> We installed OPEN SSL As it is required.
>>> When the application tries to process order using the com objects, we are
>>> getting:
>>>
>>> SSLEAY_RAND_BYTES:PRNG not seeded
>>>
>>>
>>> <r_error> Unable to connect to server.   ERRs: wsa=0 err=604389476 ssl=0
>>> sys=0.  INFO: ACE_SSL (50872|61532) error code: 604389476 -
>>> error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded
>>> </r_error>
>>>
>>> Please help
>>>
>>>
>>> ________________________________
>>> What can you do with the new Windows Live? Find out
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> User Support Mailing List                    openssl-us...@openssl.org
>> Automated List Manager                           majord...@openssl.org
>>
>>
>
> --
> View this message in context: 
> http://www.nabble.com/Linkpoint-giving-SSLEAY_RAND_BYTES%3APRNG-not-seeded-tp22557669p23051937.html
> Sent from the OpenSSL - User mailing list archive at Nabble.com.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-us...@openssl.org
> Automated List Manager                           majord...@openssl.org
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to