summaryrefslogtreecommitdiffstats
path: root/package/dropbear_sshd/Config.in
blob: 99d4496569f85ab122fadb02e2b8104865281f64 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
config BR2_PACKAGE_DROPBEAR_SSHD
	bool "dropbear_sshd"
	default n
	help
	  A small SSH 2 server designed for small memory environments.

	  http://matt.ucc.asn.au/dropbear/

config BR2_PACKAGE_DROPBEAR_SSHD_URANDOM
	bool "  Use /dev/urandom (low entropy systems only)?"
	default n
	depends on BR2_PACKAGE_DROPBEAR_SSHD
	help
	  By default, dropbear uses the much more secure /dev/random.  If you
	  are using a system lacking usable entropy sources, this could cause
	  the dropbear ssh daemon to block forever waiting for entropy that
	  will never arrive.  By making dropbear use /dev/urandom, you can
	  prevent Dropbear from blocking while waiting on the random device.
	  This could however significantly reduce the security of your ssh
	  connections.  Make sure you know what you are doing if you enable
	  this option -- most people should answer N.