zorz has quit [Quit: leaving]
serpente has quit [Remote host closed the connection]
zorz has joined #opencrux
<zorz> farkuhar: speaking about speed, on boot. try to use ksh93u+m instead of dash. half time. you need faster, shcomp... compile the scripts for ksh.
<zorz> dash is an okay posix shells to overcome the bash nightmare... fuckin gnu
<zorz> i am on runit with kash93u+m.... its fast.
<SiFuh> I need a vodka! This woman!
<zorz> hahaha
<zorz> SiFuh: bonjour!
<zorz> SiFuh: ubase+mbase+libudev-zero and part of smdev thanks to this.... https://aur.archlinux.org/cgit/aur.git/tree/config.h?h=smdev-phkr From Monday, no no no no gnu procps core-utils linux-utils bla bla bla
<zorz> mbase=sbase:P
zorz has quit [Quit: leaving]
serpente has joined #opencrux
SiFuh has quit [Remote host closed the connection]
SiFuh has joined #opencrux
<SiFuh> ukky: If the kernel RNG is disabled then there is no real entropy source that is feeding the /dev/random or the /dev/urandom. So that would mean that running dd if=/dev/urandom of=/var/lib/urandom/seed would technically not be truly random/cryptographically strong. Basically recycling data generated from an entropy-starved source. Basically, /dev/random and /dev/urandom depend on the kernel RNG entropy.
<SiFuh> With it disabled the output would be weak.
<ukky> SiFuh: I would not recommend disabling RNG in the kernel.
<SiFuh> ukky: Disabled or not it still gets fed since 5X ;-)
<SiFuh> ukky: And darfo caused me to look deeper. That 256 is when hardware RNG isn't available.
<ukky> In most cases, HW RNG is not available.
farkuhar has quit [Ping timeout: 276 seconds]
zorz has joined #opencrux