2014-03-29 16:59:26 +00:00
|
|
|
menu "Configuration"
|
|
|
|
depends on PACKAGE_dropbear
|
|
|
|
|
2016-01-10 22:38:53 +00:00
|
|
|
config DROPBEAR_CURVE25519
|
|
|
|
bool "Curve25519 support"
|
2016-01-10 22:38:59 +00:00
|
|
|
default y
|
2016-01-10 22:38:53 +00:00
|
|
|
help
|
|
|
|
This enables the following key exchange algorithm:
|
|
|
|
curve25519-sha256@libssh.org
|
|
|
|
|
2020-04-12 22:24:28 +00:00
|
|
|
Increases binary size by about 4 kB (MIPS).
|
2016-01-10 22:38:53 +00:00
|
|
|
|
2014-03-29 16:59:26 +00:00
|
|
|
config DROPBEAR_ECC
|
|
|
|
bool "Elliptic curve cryptography (ECC)"
|
|
|
|
help
|
2019-03-25 19:00:28 +00:00
|
|
|
Enables basic support for elliptic curve cryptography (ECC)
|
|
|
|
in key exchange and public key authentication.
|
2014-03-29 16:59:26 +00:00
|
|
|
|
|
|
|
Key exchange algorithms:
|
|
|
|
ecdh-sha2-nistp256
|
2019-03-25 19:00:28 +00:00
|
|
|
|
|
|
|
Public key algorithms:
|
|
|
|
ecdsa-sha2-nistp256
|
|
|
|
|
|
|
|
Increases binary size by about 24 kB (MIPS).
|
|
|
|
|
2024-01-09 00:40:01 +00:00
|
|
|
Note: select DROPBEAR_ECC_FULL if full ECC support is required.
|
2019-03-25 19:00:28 +00:00
|
|
|
|
|
|
|
config DROPBEAR_ECC_FULL
|
|
|
|
bool "Elliptic curve cryptography (ECC), full support"
|
|
|
|
depends on DROPBEAR_ECC
|
|
|
|
help
|
|
|
|
Enables full support for elliptic curve cryptography (ECC)
|
|
|
|
in key exchange and public key authentication.
|
|
|
|
|
|
|
|
Key exchange algorithms:
|
|
|
|
ecdh-sha2-nistp256 (*)
|
2014-03-29 16:59:26 +00:00
|
|
|
ecdh-sha2-nistp384
|
|
|
|
ecdh-sha2-nistp521
|
|
|
|
|
|
|
|
Public key algorithms:
|
2019-03-25 19:00:28 +00:00
|
|
|
ecdsa-sha2-nistp256 (*)
|
2014-03-29 16:59:26 +00:00
|
|
|
ecdsa-sha2-nistp384
|
|
|
|
ecdsa-sha2-nistp521
|
|
|
|
|
2019-03-25 19:00:28 +00:00
|
|
|
(*) - basic ECC support; provided by DROPBEAR_ECC.
|
2014-03-29 16:59:26 +00:00
|
|
|
|
2019-03-25 19:00:28 +00:00
|
|
|
Increases binary size by about 4 kB (MIPS).
|
2014-03-29 16:59:26 +00:00
|
|
|
|
2020-04-12 22:24:28 +00:00
|
|
|
config DROPBEAR_ED25519
|
|
|
|
bool "Ed25519 support"
|
2020-09-01 19:13:28 +00:00
|
|
|
default y if !SMALL_FLASH
|
2020-04-12 22:24:28 +00:00
|
|
|
help
|
|
|
|
This enables the following public key algorithm:
|
|
|
|
ssh-ed25519
|
|
|
|
|
|
|
|
Increases binary size by about 12 kB (MIPS).
|
|
|
|
|
|
|
|
config DROPBEAR_CHACHA20POLY1305
|
|
|
|
bool "Chacha20-Poly1305 support"
|
|
|
|
default y
|
|
|
|
help
|
|
|
|
This enables the following authenticated encryption cipher:
|
|
|
|
chacha20-poly1305@openssh.com
|
|
|
|
|
|
|
|
Increases binary size by about 4 kB (MIPS).
|
|
|
|
|
2017-06-30 11:13:50 +00:00
|
|
|
config DROPBEAR_ZLIB
|
|
|
|
bool "Enable compression"
|
|
|
|
help
|
|
|
|
Enables compression using shared zlib library.
|
|
|
|
|
2024-01-09 00:40:01 +00:00
|
|
|
Increases binary size by about 0.1 kB (MIPS) and requires
|
|
|
|
additional 62 kB (MIPS) for a shared zlib library.
|
2017-06-30 11:13:50 +00:00
|
|
|
|
2016-04-27 09:13:58 +00:00
|
|
|
config DROPBEAR_UTMP
|
|
|
|
bool "Utmp support"
|
|
|
|
depends on BUSYBOX_CONFIG_FEATURE_UTMP
|
|
|
|
help
|
2024-01-09 00:40:01 +00:00
|
|
|
This enables dropbear utmp support, the file /var/run/utmp is
|
|
|
|
used to track who is currently logged in.
|
2016-04-27 09:13:58 +00:00
|
|
|
|
|
|
|
config DROPBEAR_PUTUTLINE
|
|
|
|
bool "Pututline support"
|
|
|
|
depends on DROPBEAR_UTMP
|
|
|
|
help
|
2024-01-09 00:40:01 +00:00
|
|
|
Dropbear will use pututline() to write the utmp structure into
|
|
|
|
the utmp file.
|
2016-04-27 09:13:58 +00:00
|
|
|
|
2019-04-18 02:20:19 +00:00
|
|
|
config DROPBEAR_DBCLIENT
|
|
|
|
bool "Build dropbear with dbclient"
|
|
|
|
default y
|
|
|
|
|
2021-07-15 22:44:53 +00:00
|
|
|
config DROPBEAR_DBCLIENT_AGENTFORWARD
|
2024-01-09 00:40:01 +00:00
|
|
|
bool "Enable agent forwarding in dbclient [LEGACY/SECURITY]"
|
2021-07-15 22:44:53 +00:00
|
|
|
default y
|
|
|
|
depends on DROPBEAR_DBCLIENT
|
2024-01-09 00:40:01 +00:00
|
|
|
help
|
|
|
|
Increases binary size by about 0.1 kB (MIPS).
|
|
|
|
|
|
|
|
Security notes:
|
|
|
|
|
|
|
|
SSH agent forwarding might cause security issues (locally and
|
|
|
|
on the jump machine).
|
|
|
|
|
|
|
|
Hovewer, it's enabled by default for compatibility with
|
|
|
|
previous OpenWrt/dropbear releases.
|
|
|
|
|
|
|
|
Consider DISABLING this option if you're building own OpenWrt
|
|
|
|
image.
|
|
|
|
|
|
|
|
Also see DROPBEAR_AGENTFORWARD (agent forwarding in dropbear
|
|
|
|
server itself).
|
2021-07-15 22:44:53 +00:00
|
|
|
|
2020-08-15 10:10:22 +00:00
|
|
|
config DROPBEAR_SCP
|
|
|
|
bool "Build dropbear with scp"
|
|
|
|
default y
|
|
|
|
|
2020-11-25 03:14:30 +00:00
|
|
|
config DROPBEAR_ASKPASS
|
|
|
|
bool "Enable askpass helper support"
|
|
|
|
depends on DROPBEAR_DBCLIENT
|
|
|
|
help
|
|
|
|
This enables support for ssh-askpass helper in dropbear client
|
|
|
|
in order to authenticate on remote hosts.
|
|
|
|
|
|
|
|
Increases binary size by about 0.1 kB (MIPS).
|
|
|
|
|
2021-07-15 22:44:53 +00:00
|
|
|
config DROPBEAR_AGENTFORWARD
|
2024-01-09 00:40:01 +00:00
|
|
|
bool "Enable agent forwarding [LEGACY/SECURITY]"
|
2021-07-15 22:44:53 +00:00
|
|
|
default y
|
2024-01-09 00:40:01 +00:00
|
|
|
help
|
|
|
|
Increases binary size by about 0.1 kB (MIPS).
|
|
|
|
|
|
|
|
Security notes:
|
|
|
|
|
|
|
|
SSH agent forwarding might cause security issues (locally and
|
|
|
|
on the jump machine).
|
|
|
|
|
|
|
|
Hovewer, it's enabled by default for compatibility with
|
|
|
|
previous OpenWrt/dropbear releases.
|
|
|
|
|
|
|
|
Consider DISABLING this option if you're building own OpenWrt
|
|
|
|
image.
|
|
|
|
|
|
|
|
Also see DROPBEAR_DBCLIENT_AGENTFORWARD (agent forwarding in
|
|
|
|
dropbear client) if DROPBEAR_DBCLIENT is selected.
|
2021-07-15 22:44:53 +00:00
|
|
|
|
2014-03-29 16:59:26 +00:00
|
|
|
endmenu
|