buildroot/package/dropbear_sshd/Config.in

22 lines
858 B
Plaintext
Raw Normal View History

2004-10-09 08:13:40 +02:00
config BR2_PACKAGE_DROPBEAR_SSHD
2004-12-26 08:36:59 +01:00
bool "dropbear_sshd"
2004-10-09 08:13:40 +02:00
default n
help
2004-10-14 22:33:45 +02:00
A small SSH 2 server designed for small memory environments.
2004-10-09 08:13:40 +02:00
2004-10-14 22:33:45 +02:00
http://matt.ucc.asn.au/dropbear/
config BR2_PACKAGE_DROPBEAR_SSHD_URANDOM
bool " Use /dev/urandom (low entropy systems only)?"
default n
depends on BR2_PACKAGE_DROPBEAR_SSHD
help
By default, dropbear uses the much more secure /dev/random. If you
are using a system lacking usable entropy sources, this could cause
the dropbear ssh daemon to block forever waiting for entropy that
will never arrive. By making dropbear use /dev/urandom, you can
prevent Dropbear from blocking while waiting on the random device.
This could however significantly reduce the security of your ssh
connections. Make sure you know what you are doing if you enable
this option -- most people should answer N.