1 /* $NetBSD: msg.entropy.pl,v 1.5 2022/04/21 17:30:15 martin Exp $ */ 2 3 /* 4 * Copyright (c) 2020 The NetBSD Foundation, Inc. 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 16 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 17 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 18 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 19 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 20 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 21 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 22 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 23 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 24 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 25 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 26 * POSSIBILITY OF SUCH DAMAGE. 27 */ 28 29 message Configure_entropy {Set up entropy} 30 31 message continue_without_entropy {Not now, continue!} 32 33 message not_enough_entropy 34 {This system seems to lack a cryptographically strong pseudo random 35 number generator. There is not enough entropy available to create secure 36 keys (e.g. ssh host keys). 37 38 If you plan to use this installation for production work and will 39 for example have ssh host keys generated, we strongly advise to complete 40 the entropy setup now! 41 42 You may use random data generated on another computer and load it 43 here, or you could enter random characters manually. 44 45 If you have a USB random number device, connect it now and select 46 the "Re-test" option.} 47 48 message entropy_add_manually {Manually input random characters} 49 message entropy_download_raw {Load raw binary random data} 50 message entropy_download_seed {Import a NetBSD entropy file} 51 message entropy_retry {Re-test} 52 53 message entropy_enter_manual1 54 {Enter one line of random characters.} 55 56 message entropy_enter_manual2 57 {They should contain at last 256 bits of randomness, as in 256 coin 58 tosses, 100 throws of a 6-sided die, 64 random hexadecimal digits, or 59 (if you are able to copy & paste output from another machine into this 60 installer) the output from running the following command on another 61 machine whose randomness you trust:} 62 63 message entropy_enter_manual3 64 {A line of any length and content will be accepted and assumed to 65 contain at least 256 bits of randomness. If it actually contains 66 less, the installed system may not be secure.} 67 68 message entropy_select_file 69 {Please select how you want to transfer the random data file 70 to this machine:} 71 72 message entropy_add_download_ftp 73 {Download via ftp} 74 75 message entropy_add_download_http 76 {Download via http} 77 78 message download_entropy 79 {Start download} 80 81 message entropy_add_nfs 82 {Load from a NFS share} 83 84 message entropy_add_local 85 {Load from a local file system (e.g. a USB device)} 86 87 message entropy_file 88 {Path/file} 89 90 message load_entropy 91 {Load random data} 92 93 message set_entropy_file 94 {Random data file path} 95 96 /* Called with: Example 97 * $0 = content of file NetBSD entropy seed file 98 */ 99 message entropy_via_nfs 100 {Select a server, a share and the file path to load the $0.} 101 102 /* Called with: Example 103 * $0 = content of file NetBSD entropy seed file 104 */ 105 message entropy_via_download 106 {Since not enough entropy is available on this system, all crytographic 107 operations are suspect to replay attacks. 108 Please only use trustworthy local networks.} 109 110 message entropy_data 111 {random data binary file} 112 113 message entropy_data_hdr 114 {On a system with cryptographically strong pseudo random number generator 115 you can create a file with random binary data like this:} 116 117 message entropy_seed 118 {NetBSD entropy seed file} 119 120 message entropy_seed_hdr 121 {On a NetBSD system with cryptographically strong pseudo random number 122 generator you can create an entropy snapshot like this:} 123 124 message entropy_path_and_file 125 {Path and filename} 126 127 message entropy_localfs 128 {Enter the unmounted local device and directory on that device where 129 the random data is located.} 130