1/*      $NetBSD: msg.entropy.es,v 1.5 2022/04/21 17:30:15 martin Exp $  */
2
3/*
4 * Copyright (c) 2020 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 *    notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in the
14 *    documentation and/or other materials provided with the distribution.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 * POSSIBILITY OF SUCH DAMAGE.
27 */
28
29message Configure_entropy	{Set up entropy}
30
31message continue_without_entropy	{Not now, continue!}
32
33message not_enough_entropy
34{This system seems to lack a cryptographically strong pseudo random
35number generator. There is not enough entropy available to create secure
36keys (e.g. ssh host keys). 
37 
38If you plan to use this installation for production work and will
39for example have ssh host keys generated, we strongly advise to complete
40the entropy setup now! 
41 
42You may use random data generated on another computer and load it
43here, or you could enter random characters manually. 
44 
45If you have a USB random number device, connect it now and select
46the "Re-test" option.}
47
48message entropy_add_manually		{Manually input random characters}
49message entropy_download_raw		{Load raw binary random data}
50message	entropy_download_seed		{Import a NetBSD entropy file}
51message entropy_retry			{Re-test}
52
53message entropy_enter_manual1
54{Enter one line of random characters.}
55
56message entropy_enter_manual2
57{They should contain at last 256 bits of randomness, as in 256 coin
58tosses, 100 throws of a 6-sided die, 64 random hexadecimal digits, or
59(if you are able to copy & paste output from another machine into this
60installer) the output from running the following command on another
61machine whose randomness you trust:}
62
63message entropy_enter_manual3
64{A line of any length and content will be accepted and assumed to
65contain at least 256 bits of randomness.  If it actually contains
66less, the installed system may not be secure.}
67
68message entropy_select_file
69{Please select how you want to transfer the random data file
70to this machine:}
71
72message entropy_add_download_ftp
73{Download via ftp}
74
75message entropy_add_download_http
76{Download via http}
77
78message download_entropy
79{Start download}
80
81message entropy_add_nfs
82{Load from a NFS share}
83
84message entropy_add_local
85{Load from a local file system (e.g. a USB device)}
86
87message entropy_file
88{Path/file}
89
90message load_entropy
91{Load random data}
92
93message set_entropy_file
94{Random data file path}
95
96/* Called with:				Example
97 *  $0 = content of file		NetBSD entropy seed file
98 */
99message entropy_via_nfs
100{Select a server, a share and the file path to load the $0.}
101
102/* Called with:				Example
103 *  $0 = content of file		NetBSD entropy seed file
104 */
105message entropy_via_download
106{Since not enough entropy is available on this system, all crytographic
107operations are suspect to replay attacks. 
108Please only use trustworthy local networks.}
109
110message entropy_data
111{random data binary file}
112
113message entropy_data_hdr
114{On a system with cryptographically strong pseudo random number generator
115you can create a file with random binary data like this:}
116
117message entropy_seed
118{NetBSD entropy seed file}
119
120message entropy_seed_hdr
121{On a NetBSD system with cryptographically strong pseudo random number
122generator you can create an entropy snapshot like this:}
123
124message entropy_path_and_file
125{Path and filename}
126
127message entropy_localfs
128{Enter the unmounted local device and directory on that device where
129the random data is located.}
130