From cdb736cea0363f6057853e424bf2e49acb9039f9 Mon Sep 17 00:00:00 2001 From: Ulf Samuelsson Date: Sat, 11 Aug 2007 18:43:58 +0000 Subject: Bump dropbear to 0.50, /dev/urandom is now default --- package/dropbear/Config.in | 14 -------------- 1 file changed, 14 deletions(-) (limited to 'package/dropbear/Config.in') diff --git a/package/dropbear/Config.in b/package/dropbear/Config.in index 8e39166a8..d76bb2947 100644 --- a/package/dropbear/Config.in +++ b/package/dropbear/Config.in @@ -5,17 +5,3 @@ config BR2_PACKAGE_DROPBEAR A small SSH 2 server designed for small memory environments. http://matt.ucc.asn.au/dropbear/dropbear.html - -config BR2_PACKAGE_DROPBEAR_URANDOM - bool "Use /dev/urandom (low entropy systems only)?" - default n - depends on BR2_PACKAGE_DROPBEAR - help - By default, dropbear uses the much more secure /dev/random. If you - are using a system lacking usable entropy sources, this could cause - the dropbear ssh daemon to block forever waiting for entropy that - will never arrive. By making dropbear use /dev/urandom, you can - prevent Dropbear from blocking while waiting on the random device. - This could however significantly reduce the security of your ssh - connections. Make sure you know what you are doing if you enable - this option -- most people should answer N. -- cgit v1.2.3