Entropy is really important for cryptography as keys are just random strings of bits.
For a definition of entropy see here: wp>Entropy_(computing)
Entropy is gathered by IPFire by measuring hardware timings of the heads of a physical hard drive or by human input devices like mouse movements. Unfortunately server systems don't have those input devices and very often don't have harddisks so that they cannot gather entropy at all.
There are also no ways to generate entropy in software. No algorithm can be written to do this because no algorithm is random. Therefore IPFire does not provide any software that aims to generate entropy out of nowhere which can be very dangerous.
Since version 2.15, IPFire uses entropy from hardware random number generators that is fed into the kernel and mixed in into the entropy pool that has been increased to 16K of data.
|AMD Geode RNG||ALIX|
|BCM431x||Broadcom 431x WiFi Card (HWRNG device is only present when the WiFi interface is up)|
|Intel wp>RDRAND||Some Sandy Bridge and Ivy Bridge Processors and all Haswell Processors|
|Red Hat Inc., Virtio RNG||KVM/QEMU can emulate a device that reads entropy from