kumquat-buildroot/package/dropbear_sshd/Config.in
Eric Andersen 4c22057788 Update dropbear to the new version.
Add a config option to handle low entropy system.
2005-03-09 08:30:47 +00:00

22 lines
858 B
Plaintext

config BR2_PACKAGE_DROPBEAR_SSHD
bool "dropbear_sshd"
default n
help
A small SSH 2 server designed for small memory environments.
http://matt.ucc.asn.au/dropbear/
config BR2_PACKAGE_DROPBEAR_SSHD_URANDOM
bool " Use /dev/urandom (low entropy systems only)?"
default n
depends on BR2_PACKAGE_DROPBEAR_SSHD
help
By default, dropbear uses the much more secure /dev/random. If you
are using a system lacking usable entropy sources, this could cause
the dropbear ssh daemon to block forever waiting for entropy that
will never arrive. By making dropbear use /dev/urandom, you can
prevent Dropbear from blocking while waiting on the random device.
This could however significantly reduce the security of your ssh
connections. Make sure you know what you are doing if you enable
this option -- most people should answer N.