Home | History | Annotate | Line # | Download | only in sysinst
msg.entropy.pl revision 1.3
      1 /*      $NetBSD: msg.entropy.pl,v 1.3 2021/10/08 15:59:55 martin Exp $  */
      2 
      3 /*
      4  * Copyright (c) 2020 The NetBSD Foundation, Inc.
      5  * All rights reserved.
      6  *
      7  * Redistribution and use in source and binary forms, with or without
      8  * modification, are permitted provided that the following conditions
      9  * are met:
     10  * 1. Redistributions of source code must retain the above copyright
     11  *    notice, this list of conditions and the following disclaimer.
     12  * 2. Redistributions in binary form must reproduce the above copyright
     13  *    notice, this list of conditions and the following disclaimer in the
     14  *    documentation and/or other materials provided with the distribution.
     15  *
     16  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     17  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     18  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     19  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     20  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     21  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     22  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     23  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     24  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     25  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     26  * POSSIBILITY OF SUCH DAMAGE.
     27  */
     28 
     29 message Configure_entropy	{Set up entropy}
     30 
     31 message continue_without_entropy	{Continue without entropy}
     32 
     33 message not_enough_entropy
     34 {This system seems to lack a cryptographically strong pseudo random
     35 number generator. There is not enough entropy available to create secure
     36 keys (e.g. ssh host keys). 
     37 
     38 You may use random data generated on another computer and load it
     39 here, or you could enter random characters manually. 
     40  
     41 If you own a USB random number device, connect it now and select
     42 the "Re-test" option.}
     43 
     44 message entropy_add_manually		{Manual input of random data}
     45 message entropy_download_raw		{Load raw binary random random data}
     46 message	entropy_download_seed		{Import a NetBSD entropy file}
     47 message entropy_retry			{Re-test}
     48 
     49 message entropy_enter_manual1
     50 {Enter random characters.}
     51 
     52 message entropy_enter_manual2
     53 {They should contain at last 256 bits of randomness, as in 256 coin
     54 tosses, 100 throws of a 6-sided die, 64 random hexadecimal digits, or
     55 (if you are able to copy & paste output from another machine into this
     56 installer) the output from running the following command on another
     57 machine whose randomness you trust:}
     58 
     59 message entropy_enter_manual3
     60 {Do not use the same data for multiple installations. 
     61 Terminate the input with an empty line.}
     62 
     63 message entropy_manual_not_enough
     64 {You did not enter enough characters!}
     65 
     66 message entropy_select_file
     67 {Please select how you want to transfer the random data file
     68 to this machine:}
     69 
     70 message entropy_add_download_ftp
     71 {Download via ftp}
     72 
     73 message entropy_add_download_http
     74 {Download via http}
     75 
     76 message download_entropy
     77 {Start download}
     78 
     79 message entropy_add_nfs
     80 {Load from a NFS share}
     81 
     82 message entropy_add_local
     83 {Load from a local file system (e.g. a USB device)}
     84 
     85 message entropy_file
     86 {Path/file}
     87 
     88 message load_entropy
     89 {Load random data}
     90 
     91 message set_entropy_file
     92 {Random data file path}
     93 
     94 /* Called with:				Example
     95  *  $0 = content of file		NetBSD entropy seed file
     96  */
     97 message entropy_via_nfs
     98 {Select a server, a share and the file path to load the $0.}
     99 
    100 /* Called with:				Example
    101  *  $0 = content of file		NetBSD entropy seed file
    102  */
    103 message entropy_via_download
    104 {Since not enough entropy is available on this system, all crytographic
    105 operations are suspect to replay attacks. 
    106 Please only use trustworthy local networks.}
    107 
    108 message entropy_data
    109 {random data binary file}
    110 
    111 message entropy_data_hdr
    112 {On a system with cryptographically strong pseudo random number generator
    113 you can create a file with random binary data like this:}
    114 
    115 message entropy_seed
    116 {NetBSD entropy seed file}
    117 
    118 message entropy_seed_hdr
    119 {On a NetBSD system with cryptographically strong pseudo random number
    120 generator you can create an entropy snapshot like this:}
    121 
    122 message entropy_path_and_file
    123 {Path and filename}
    124 
    125 message entropy_localfs
    126 {Enter the unmounted local device and directory on that device where
    127 the random data is located.}
    128 
    129