From 4c22057788314a0b3f8fcd4dfd53a7837e3f6cf0 Mon Sep 17 00:00:00 2001 From: Eric Andersen Date: Wed, 9 Mar 2005 08:30:47 +0000 Subject: Update dropbear to the new version. Add a config option to handle low entropy system. --- package/dropbear_sshd/Config.in | 14 ++++++++++++++ 1 file changed, 14 insertions(+) (limited to 'package/dropbear_sshd/Config.in') diff --git a/package/dropbear_sshd/Config.in b/package/dropbear_sshd/Config.in index 07c521884..99d449656 100644 --- a/package/dropbear_sshd/Config.in +++ b/package/dropbear_sshd/Config.in @@ -5,3 +5,17 @@ config BR2_PACKAGE_DROPBEAR_SSHD A small SSH 2 server designed for small memory environments. http://matt.ucc.asn.au/dropbear/ + +config BR2_PACKAGE_DROPBEAR_SSHD_URANDOM + bool " Use /dev/urandom (low entropy systems only)?" + default n + depends on BR2_PACKAGE_DROPBEAR_SSHD + help + By default, dropbear uses the much more secure /dev/random. If you + are using a system lacking usable entropy sources, this could cause + the dropbear ssh daemon to block forever waiting for entropy that + will never arrive. By making dropbear use /dev/urandom, you can + prevent Dropbear from blocking while waiting on the random device. + This could however significantly reduce the security of your ssh + connections. Make sure you know what you are doing if you enable + this option -- most people should answer N. -- cgit v1.2.3