Home | History | Annotate | Line # | Download | only in sysinst
msg.entropy.es revision 1.2
      1 /*      $NetBSD: msg.entropy.es,v 1.2 2020/11/06 12:23:10 martin Exp $  */
      2 
      3 /*
      4  * Copyright (c) 2020 The NetBSD Foundation, Inc.
      5  * All rights reserved.
      6  *
      7  * Redistribution and use in source and binary forms, with or without
      8  * modification, are permitted provided that the following conditions
      9  * are met:
     10  * 1. Redistributions of source code must retain the above copyright
     11  *    notice, this list of conditions and the following disclaimer.
     12  * 2. Redistributions in binary form must reproduce the above copyright
     13  *    notice, this list of conditions and the following disclaimer in the
     14  *    documentation and/or other materials provided with the distribution.
     15  *
     16  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     17  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     18  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     19  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     20  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     21  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     22  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     23  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     24  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     25  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     26  * POSSIBILITY OF SUCH DAMAGE.
     27  */
     28 
     29 message not_enough_entropy
     30 {This system seems to lack a cryptographically strong pseudo random
     31 number generator. There is not enough entropy available to create secure
     32 keys (e.g. ssh host keys).
     33 
     34 You may use random data generated on another computer and load it
     35 here, or you could enter random characters manually.
     36 
     37 If you own a USB random number device, connect it now and select
     38 the "Re-test" option.}
     39 
     40 message entropy_add_manually		{Manual input of random data}
     41 message entropy_download_raw		{Load random data}
     42 message	entropy_download_seed		{Import a NetBSD entropy file}
     43 message entropy_retry			{Re-test}
     44 
     45 message entropy_enter_manual1
     46 {Enter random characters.}
     47 
     48 message entropy_enter_manual2
     49 {They should contain at last 256 bits of randomness, as in 256 coin
     50 tosses, 100 throws of a 6-sided die, 64 random hexadecimal digits, or
     51 (if you are able to copy & paste output from another machine into this
     52 installer) the output from running the following command on another
     53 machine whose randomness you trust:}
     54 
     55 message entropy_enter_manual3
     56 {Do not use the same data for multiple installations.
     57 Terminate the input with an empty line.}
     58 
     59 message entropy_manual_not_enough
     60 {You did not enter enough characters!}
     61 
     62 message entropy_select_file
     63 {Please select how you want to transfer the random data file
     64 to this machine:}
     65 
     66 message entropy_add_download_ftp
     67 {Download via ftp}
     68 
     69 message entropy_add_download_http
     70 {Download via http}
     71 
     72 message download_entropy
     73 {Start download}
     74 
     75 message entropy_add_nfs
     76 {Load from a NFS share}
     77 
     78 message entropy_add_local
     79 {Laod from a local file system (e.g. a USB device)}
     80 
     81 message entropy_file
     82 {Path/file}
     83 
     84 message load_entropy
     85 {Load random data}
     86 
     87 message set_entropy_file
     88 {Random data file path}
     89 
     90 /* Called with:				Example
     91  *  $0 = content of file		NetBSD entropy seed file
     92  */
     93 message entropy_via_nfs
     94 {Select a server, a share and the file path to load the $0.}
     95 
     96 /* Called with:				Example
     97  *  $0 = content of file		NetBSD entropy seed file
     98  */
     99 message entropy_via_download
    100 {Since not enough entropy is available on this system, all crytographic
    101 operations are suspect to replay attacks.
    102 Please only use trustworthy local networks.}
    103 
    104 message entropy_data
    105 {random data binary file}
    106 
    107 message entropy_data_hdr
    108 {On a system with cryptographically strong pseudo random number generator
    109 you can create a file with random binary data like this:}
    110 
    111 message entropy_seed
    112 {NetBSD entropy seed file}
    113 
    114 message entropy_seed_hdr
    115 {On a NetBSD system with cryptographically strong pseudo random number
    116 generator you can create an entropy snapshot like this:}
    117 
    118 message entropy_path_and_file
    119 {Path and filename}
    120 
    121 message entropy_localfs
    122 {Enter the unmounted local device and directory on that device where
    123 the random data is located.}
    124 
    125