android ssh: Warning: Reading the random source seems to have blocked.
error:
# ssh user@someserver
fuck…
_dns_getaddrinfo() name = 'someserver'
res_searchN() name = 'someserver'
ssh: Warning: Reading the random source seems to have blocked.
If you experience problems, you probably need to find a better entropy source.
quick reference as taken from wikipedia:
“begin knowledge”: Entropy (computing)
In computing, entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random data. This randomness is often collected from hardware sources, either pre-existing ones such as mouse movements or specially provided randomness generators. “/end knowledge”
hmm. ok – now its all coming together…
after some playing around i found a fix.
this assumes that you have busybox installed on android and have your path set (dont ask – use the google).
this is a pretty straight walk through
# ./adb remount
# ./adb shell
# cd /dev/
# mv random random_BAK
# ln -s urandom random
now test your ssh again:
# ssh user@someserver
_dns_getaddrinfo() name = 'someserver'
res_searchN() name = 'someserver'
ssh: Warning: failed creating //.ssh: Read-only file system
Host 'someserver' is not in the trusted hosts file.
profit!!
Thank you! It helped me!
Thanks! This is my solution http://www.heiher.info/1592.html
Well done!It help me!!!
I had the same problem, but it was when I had the screen off. Apparently I had used up all the entropy in the real random device, so the solution was to turn the screen on and wiggle it around for a bit to get more entropy. If you use /dev/urandom instead of /dev/random, it will always work, but the random numbers you get are not considered to be cryptographically safe, as they can be predicted based on previous random numbers. In most environments, that’s not a big concern, though.
Thanks a lot.
danke sehr… ohne diese könnte ich nicht ssh nützen!
Every time I cat /proc/sys/kernel/random/entropy_avail the number goes up. Eventually when it is over 1000 dropbear starts to work.
echo 256 > /proc/sys/kernel/random/read_wakeup_threshold
for plenty of entropy. Or look on Play Store for Entropy Fixer (requires root) and set the read_wakeup_threshold that way.
Thanks a lot! It works for me!
From Russia with thanks)