diff options
author | Matt Johnston <matt@ucc.asn.au> | 2013-12-03 21:03:23 +0800 |
---|---|---|
committer | Matt Johnston <matt@ucc.asn.au> | 2013-12-03 21:03:23 +0800 |
commit | e5279b0e2eda6d2e232d816956e6c0deb9aafedd (patch) | |
tree | e3c243cd715b7c740746090672687068afa0bf80 | |
parent | 9ff337aa3b0db3f8244ecbefe4318e32634a37ee (diff) |
Update README
-rw-r--r-- | README | 10 |
1 files changed, 7 insertions, 3 deletions
@@ -42,8 +42,7 @@ If you have an OpenSSH-style private key ~/.ssh/id_rsa, you need to do: dropbearconvert openssh dropbear ~/.ssh/id_rsa ~/.ssh/id_rsa.db dbclient -i ~/.ssh/id_rsa.db <hostname> -Currently encrypted keys aren't supported, neither is agent forwarding. At some -stage both hopefully will be. +Dropbear does not support encrypted hostkeys though can connect to ssh-agent. ============================================================================ @@ -52,13 +51,18 @@ dropbearkey's '-y' option. ============================================================================ -To run the server, you need to generate server keys, this is one-off: +To run the server, you need to server keys, this is one-off: ./dropbearkey -t rsa -f dropbear_rsa_host_key ./dropbearkey -t dss -f dropbear_dss_host_key +./dropbearkey -t ecdsa -f dropbear_dss_host_key or alternatively convert OpenSSH keys to Dropbear: ./dropbearconvert openssh dropbear /etc/ssh/ssh_host_dsa_key dropbear_dss_host_key +You can also get Dropbear to create keys when the first connection is made - +this is preferable to generating keys when the system boots. Make sure +/etc/dropbear/ exists and then pass '-R' to the dropbear server. + ============================================================================ If the server is run as non-root, you most likely won't be able to allocate a |