summaryrefslogtreecommitdiff
path: root/package/dropbear_sshd/Config.in
diff options
context:
space:
mode:
Diffstat (limited to 'package/dropbear_sshd/Config.in')
-rw-r--r--package/dropbear_sshd/Config.in21
1 files changed, 0 insertions, 21 deletions
diff --git a/package/dropbear_sshd/Config.in b/package/dropbear_sshd/Config.in
deleted file mode 100644
index 99d449656..000000000
--- a/package/dropbear_sshd/Config.in
+++ /dev/null
@@ -1,21 +0,0 @@
-config BR2_PACKAGE_DROPBEAR_SSHD
- bool "dropbear_sshd"
- default n
- help
- A small SSH 2 server designed for small memory environments.
-
- http://matt.ucc.asn.au/dropbear/
-
-config BR2_PACKAGE_DROPBEAR_SSHD_URANDOM
- bool " Use /dev/urandom (low entropy systems only)?"
- default n
- depends on BR2_PACKAGE_DROPBEAR_SSHD
- help
- By default, dropbear uses the much more secure /dev/random. If you
- are using a system lacking usable entropy sources, this could cause
- the dropbear ssh daemon to block forever waiting for entropy that
- will never arrive. By making dropbear use /dev/urandom, you can
- prevent Dropbear from blocking while waiting on the random device.
- This could however significantly reduce the security of your ssh
- connections. Make sure you know what you are doing if you enable
- this option -- most people should answer N.