Crypto

GPG key generation: Not enough random bytes available.

A common error when creating keys with GnuPG is: Not enough random bytes available. In this article we have a look at the cause and solution to create more random bytes for entropy.

Summary of GPG key generation: Not enough random bytes available.

Not enough random bytes available Generating keys with GnuPG Anyone who wants to create a new key set via GnuPG (GPG) may run into this error: some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. Not enough random bytes available. Please do some other work to give the OS a chance to collect more entropy!

Read the full article…

Protect Linux systems against SSLv3 Poodle vulnerability

The Poodle vulnerability is discovered in October 2014, putting all systems using SSL 3.0 at risk. We share steps to mitigate this vulnerability on Linux based systems.

Summary of Protect Linux systems against SSLv3 Poodle vulnerability

What is the Poodle vulnerability ? The “Poodle” vulnerability is basicly an attack on the SSL 3.0 protocol. It is discovered in October 2014. The flaw is in the protocol itself (not implementation), which makes the issue applicable for all products using SSL 3.0. TLS 1.0 and later are considered safe against the attack. How does the attack work? While we won’t go into too much depth of encryption and ciphers, we will share some basics.

Read the full article…

Using encrypted documents with vim

Everyone has secrets. Or at least some data you don't want to show others, right? Vim is a common editor and it actually has an option to create and use encrypted documents!

Summary of Using encrypted documents with vim

Everyone has secrets. Or at least some data you don’t want to show others, right? Vim is a common editor to be found on Linux systems. It has an option to create and use encrypted files. We will look at how to configure it and use this encryption capability. Encryption is the process of fiddling with data so that others no longer can’t read it. The idea is that you still can, so when we speak about encryption, we can’t ignore decryption.

Read the full article…