summaryrefslogtreecommitdiff
path: root/package/dropbear_sshd/Config.in
diff options
context:
space:
mode:
Diffstat (limited to 'package/dropbear_sshd/Config.in')
-rw-r--r--package/dropbear_sshd/Config.in14
1 files changed, 14 insertions, 0 deletions
diff --git a/package/dropbear_sshd/Config.in b/package/dropbear_sshd/Config.in
index 07c521884..99d449656 100644
--- a/package/dropbear_sshd/Config.in
+++ b/package/dropbear_sshd/Config.in
@@ -5,3 +5,17 @@ config BR2_PACKAGE_DROPBEAR_SSHD
A small SSH 2 server designed for small memory environments.
http://matt.ucc.asn.au/dropbear/
+
+config BR2_PACKAGE_DROPBEAR_SSHD_URANDOM
+ bool " Use /dev/urandom (low entropy systems only)?"
+ default n
+ depends on BR2_PACKAGE_DROPBEAR_SSHD
+ help
+ By default, dropbear uses the much more secure /dev/random. If you
+ are using a system lacking usable entropy sources, this could cause
+ the dropbear ssh daemon to block forever waiting for entropy that
+ will never arrive. By making dropbear use /dev/urandom, you can
+ prevent Dropbear from blocking while waiting on the random device.
+ This could however significantly reduce the security of your ssh
+ connections. Make sure you know what you are doing if you enable
+ this option -- most people should answer N.