NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Forum Discussion

Callesoroe's avatar
Callesoroe
Aspirant
Oct 30, 2013

Haveged on ReadyNas Ultra ?

I am running LMS (squeezebox) on my readynas ultra. There is a problem with the Random mix. The problem is that it isn't very random.
The problem could be this that I have read about:

http://www.issihosts.com/haveged/

Is it possible to get Haveged to run on a ReadyNas. And if. How ?

If this really is a problem in the kernel software. Will this not be fixed ????

23 Replies

Replies have been turned off for this discussion
  • StephenB wrote:
    F.L. wrote:
    Is this needed on OS6 6.1.5?
    My RN102 reports values between 100-200 - similar to what fastfwd saw before he did the add-on.


    Strange, now I have low values again.
    And
    watch -n 1 cat /proc/sys/kernel/random/entropy_avail
    gives me low values too.
    Wonder why I had high values before...

    Anyway. I installed haveged using apt and now it seems OK again.
  • F.L. wrote:
    Strange, now I have low values again.
    And
    watch -n 1 cat /proc/sys/kernel/random/entropy_avail
    gives me low values too.
    Wonder why I had high values before...

    If nothing is using dev/random or dev/urandom, the entropy pool gradually fills. Presumably, your system wasn't doing much that needed random numbers, so the pool filled to 2000+ bits.

    Every time a new process is launched, the operating system reads from dev/urandom in order to randomize the process's address space layout (to protect from buffer overflow attacks), so when you repeatedly invoked cat once per second with that watch command, the available entropy decreased faster than it could be replenished.
  • fastfwd wrote:
    F.L. wrote:
    Strange, now I have low values again.
    And
    watch -n 1 cat /proc/sys/kernel/random/entropy_avail
    gives me low values too.
    Wonder why I had high values before...

    If nothing is using dev/random or dev/urandom, the entropy pool gradually fills. Presumably, your system wasn't doing much that needed random numbers, so the pool filled to 2000+ bits.

    Every time a new process is launched, the operating system reads from dev/urandom in order to randomize the process's address space layout (to protect from buffer overflow attacks), so when you repeatedly invoked cat once per second with that watch command, the available entropy decreased faster than it could be replenished.



    Thank you fastfwd for the explanation!

NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology! 

Join Us!

ProSupport for Business

Comprehensive support plans for maximum network uptime and business peace of mind.

 

Learn More