Bug#923675: Add related bug #916690 info

2019-04-16 Thread Daniel Lange
This is related to #916690. getrandom() essentially blocks during many use cases where the system does not have enough entropy. This is somewhat mitigated by the Debian kernel now trusting the RDRAND (CONFIG_RANDOM_TRUST_CPU) for AMD64 (https://lists.debian.org/debian-devel/2019/02/msg00170.htm

Bug#927045: marked as done (^C doesn't work when booting into recovery mode)

2019-04-16 Thread Debian Bug Tracking System
Your message dated Tue, 16 Apr 2019 15:16:03 +0800 with message-id <87d0lma098.8@jidanni.org> and subject line Re: Bug#927045: ^C doesn't work when booting into recovery mode has caused the Debian Bug report #927045, regarding ^C doesn't work when booting into recovery mode to be marked as done

Bug#926539: rootskel: steal-ctty no longer works on at least sparc64

2019-04-16 Thread John Paul Adrian Glaubitz
Hi Ben! On 4/7/19 1:53 AM, Ben Hutchings wrote: >> root@landau:~# cat /proc/consoles >> ttyHV0 -W- (EC p )4:64 >> tty0 -WU (E )4:1 >> root@landau:~# readlink /sys/dev/char/4:64 >> ../../devices/root/f0299a70/f029b788/tty/ttyS0 > > The inconsistent name

Bug#923675: Add related bug #916690 info

2019-04-16 Thread Petter Reinholdtsen
Debian Edu ran into this problem when installing Kerberos as a server from d-i, and solved it by running a process in the background to monitor the entropy level, and when it was running low, it would flush the file buffers and run 'find /target' to force some IO operations that would add entro

Bug#923675: Add related bug #916690 info

2019-04-16 Thread Ben Hutchings
On Tue, 2019-04-16 at 12:19 +0200, Petter Reinholdtsen wrote: > Debian Edu ran into this problem when installing Kerberos as a server from > d-i, > and solved it by running a process in the background to monitor the entropy > level, > and when it was running low, it would flush the file buffers

Bug#926539: rootskel: steal-ctty no longer works on at least sparc64

2019-04-16 Thread Ben Hutchings
On Tue, 2019-04-16 at 11:47 +0200, John Paul Adrian Glaubitz wrote: > Hi Ben! > > On 4/7/19 1:53 AM, Ben Hutchings wrote: > > > root@landau:~# cat /proc/consoles > > > ttyHV0 -W- (EC p )4:64 > > > tty0 -WU (E )4:1 > > > root@landau:~# readlink /sys/dev/c

Bug#926539: rootskel: steal-ctty no longer works on at least sparc64

2019-04-16 Thread John Paul Adrian Glaubitz
On 4/16/19 1:16 PM, Ben Hutchings wrote: >> Do you think we could carry a patch in src:linux for the time being? > [...] > > I would rather not do that until it's accepted, as if it that doesn't > happen we either have to switch back or carry it forever. Hmm, okay. Then I don't really have a way

Processed: severity of 926315 is serious, severity of 927165 is serious ..., usertagging 926315 ...

2019-04-16 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 926315 serious Bug #926315 [openssl] openssl: wget https://google.com fails in d-i Severity set to 'serious' from 'important' > severity 927165 serious Bug #927165 [debian-installer] debian-installer: improve support for LUKS Severity set

Bug#923675: Add related bug #916690 info

2019-04-16 Thread Petter Reinholdtsen
[Ben Hutchings] > This is a pretty terrible approach. Especially as the world has moved > on to SSDs and they provide very little entropy from interrupts. Absolutely. But it has solved the problem with too little entropy since 2011. Do you have any better ways to force the kernel to add some en

Bug#923675: Add related bug #916690 info

2019-04-16 Thread Thorsten Glaser
Daniel Lange dixit: > Thorsten Glaser (CC) has produced a prototype early-rng-init-tools (cf. > https://lists.debian.org/debian-devel/2019/02/msg00327.html) which could be > extended to try reading entropy off the network when it doesn't have a > carried-over seed (as in the Debian Installer case)

Bug#923675: Add related bug #916690 info

2019-04-16 Thread Ben Hutchings
On Tue, 2019-04-16 at 13:57 +0200, Petter Reinholdtsen wrote: > [Ben Hutchings] > > This is a pretty terrible approach. Especially as the world has moved > > on to SSDs and they provide very little entropy from interrupts. > > Absolutely. But it has solved the problem with too little entropy si

Re: Debian Installer Buster RC 1 release

2019-04-16 Thread Holger Wansing
Hi, Cyril Brulebois wrote: > The Debian Installer team[1] is pleased to announce the first release > candidate of the installer for Debian 10 "Buster". Sadly, the latest version of tasksel has not been unblocked for migration to Buster. (I have been pointed on this by Wolfgang, subscriber of 'Bu

Re: Debian Installer Buster RC 1 release

2019-04-16 Thread Cyril Brulebois
Hi, Holger Wansing (2019-04-16): > Cyril Brulebois wrote: > > The Debian Installer team[1] is pleased to announce the first release > > candidate of the installer for Debian 10 "Buster". > > Sadly, the latest version of tasksel has not been unblocked for > migration to Buster. > (I have been po

Bug#923675: Add related bug #916690 info

2019-04-16 Thread Cyril Brulebois
Ben Hutchings (2019-04-16): > On Tue, 2019-04-16 at 13:57 +0200, Petter Reinholdtsen wrote: > > [Ben Hutchings] > > > This is a pretty terrible approach. Especially as the world has moved > > > on to SSDs and they provide very little entropy from interrupts. > > > > Absolutely. But it has solve

Re: Debian Installer Buster RC 1 release

2019-04-16 Thread Holger Wansing
Hi, Cyril Brulebois wrote: > Hi, > > Holger Wansing (2019-04-16): > > Cyril Brulebois wrote: > > > The Debian Installer team[1] is pleased to announce the first release > > > candidate of the installer for Debian 10 "Buster". > > > > Sadly, the latest version of tasksel has not been unblocked

Bug#923675: Add related bug #916690 info

2019-04-16 Thread Petter Reinholdtsen
[Ben Hutchings] > haveged or jitterentropy-rngd are likely to be better. Is there any hope to run them within d-i in Buster before /target/ is set up? -- Happy hacking Petter Reinholdtsen

Bug#923675: debian-installer: consider using haveged to gather entropy

2019-04-16 Thread Cyril Brulebois
Control: retitle -1 debian-installer: consider using haveged to gather entropy Cyril Brulebois (2019-04-16): > The former was on my list of things to try; thanks for mentioning the > latter. I'm no cryptographer so I cannot judge haveged from that angle. But from a /proc/sys/kernel/random/entro

Processed: Bug#923675: debian-installer: consider using haveged to gather entropy

2019-04-16 Thread Debian Bug Tracking System
Processing control commands: > retitle -1 debian-installer: consider using haveged to gather entropy Bug #923675 [debian-installer] debian-installer: delays when using an https mirror due to rng Changed Bug title to 'debian-installer: consider using haveged to gather entropy' from 'debian-instal

Processing of partman-basicfilesystems_147_source.changes

2019-04-16 Thread Debian FTP Masters
partman-basicfilesystems_147_source.changes uploaded successfully to localhost along with the files: partman-basicfilesystems_147.dsc partman-basicfilesystems_147.tar.xz partman-basicfilesystems_147_amd64.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.or

partman-basicfilesystems_147_source.changes ACCEPTED into unstable

2019-04-16 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 16 Apr 2019 23:26:01 +0200 Source: partman-basicfilesystems Architecture: source Version: 147 Distribution: unstable Urgency: medium Maintainer: Debian Install System Team Changed-By: Holger Wansing Changes: pa

Bug#923675: debian-installer: consider using haveged to gather entropy

2019-04-16 Thread Steve McIntyre
On Tue, Apr 16, 2019 at 11:45:08PM +0200, Cyril Brulebois wrote: >Cyril Brulebois (2019-04-16): >> The former was on my list of things to try; thanks for mentioning the >> latter. ... >My initial thought would be to launch it on demand when one is about to >get to wget calls that needs HTTPS; bu

Bug#923675: debian-installer: consider using haveged to gather entropy

2019-04-16 Thread Jonathan Carter
On 2019/04/16 23:45, Cyril Brulebois wrote: > I'm no cryptographer so I cannot judge haveged from that angle. Ditto here, but... > But from a /proc/sys/kernel/random/entropy_avail standpoint, starting > the haveged daemon inside d-i, a couple of screens after the graphical > installer start-up, I