I've got a ton of processes running in the background to try and get enough entropy, but I am still failing.
**We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
Not enough random bytes available. Please do some other work to give
the OS a chance to collect more entropy! (Need 210 more bytes)**
I need a method to generate the key that works, cause what I'm trying to do is failing apparently.
Have you had a look at RNG?
Fedora/Rh/Centos types: sudo yum install rng-tools
On deb types: sudo apt-get install rng-tools
to set it up.
Then run sudo rngd -r /dev/urandom
before generating the keys.
Also, on a more serious note, you can use
sudo apt-get install rng-tools
if you're on Ubuntu instead ofsudo yum install rng-utils
like they have for Fedora, since norng-utils
package exists for Ubuntu.The package is named
rng-tools
on both Fedora and EL6, so I suspect a typo in the linked article. BTW, it is a good idea to provide the essential parts of the answer here, and the link for reference, in case the link goes dead in the future.There is no "low-quality entropy" or "fake entropy" in urandom. urandom calls the same code as /dev/random. There is no need to feed additional randomness into the CSPRNG (except at boottime, and there your distribution should take care of it). This is a myth and should not be propagated. See for example sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers or this video: media.ccc.de/v/32c3-7441-the_plain_simple_reality_of_entropy
Here's another good one on the urandom myth.
Basically GPG is broken for reading from /dev/random, then blocking, i.s.o from /dev/urandom which never blocks. The web is filled with questions about it.