2004-10-09 08:13:40 +02:00
|
|
|
config BR2_PACKAGE_DROPBEAR_SSHD
|
2004-12-26 08:36:59 +01:00
|
|
|
bool "dropbear_sshd"
|
2004-10-09 08:13:40 +02:00
|
|
|
default n
|
|
|
|
help
|
2004-10-14 22:33:45 +02:00
|
|
|
A small SSH 2 server designed for small memory environments.
|
2004-10-09 08:13:40 +02:00
|
|
|
|
2004-10-14 22:33:45 +02:00
|
|
|
http://matt.ucc.asn.au/dropbear/
|
2005-03-09 09:30:47 +01:00
|
|
|
|
|
|
|
config BR2_PACKAGE_DROPBEAR_SSHD_URANDOM
|
|
|
|
bool " Use /dev/urandom (low entropy systems only)?"
|
|
|
|
default n
|
|
|
|
depends on BR2_PACKAGE_DROPBEAR_SSHD
|
|
|
|
help
|
|
|
|
By default, dropbear uses the much more secure /dev/random. If you
|
|
|
|
are using a system lacking usable entropy sources, this could cause
|
|
|
|
the dropbear ssh daemon to block forever waiting for entropy that
|
|
|
|
will never arrive. By making dropbear use /dev/urandom, you can
|
|
|
|
prevent Dropbear from blocking while waiting on the random device.
|
|
|
|
This could however significantly reduce the security of your ssh
|
|
|
|
connections. Make sure you know what you are doing if you enable
|
|
|
|
this option -- most people should answer N.
|