diff options
author | Matt Johnston <matt@ucc.asn.au> | 2012-06-29 23:19:43 +0800 |
---|---|---|
committer | Matt Johnston <matt@ucc.asn.au> | 2012-06-29 23:19:43 +0800 |
commit | d5ccc32b4d8903562107a534fbe09433c27d2880 (patch) | |
tree | 467f88f9f0d6d85c2be90d2a590504ec10742bba /options.h | |
parent | db34044c7fdfcdf85a2606b686d60910e1ff36b6 (diff) |
Improve RNG seeding.
Try to read from /dev/urandom multiple times, take input from extra sources,
and use /dev/random when generating private keys
Diffstat (limited to 'options.h')
-rw-r--r-- | options.h | 20 |
1 files changed, 7 insertions, 13 deletions
@@ -204,21 +204,15 @@ much traffic. */ * return the password on standard output */ /*#define ENABLE_CLI_ASKPASS_HELPER*/ -/* Random device to use - define either DROPBEAR_RANDOM_DEV or - * DROPBEAR_PRNGD_SOCKET. - * DROPBEAR_RANDOM_DEV is recommended on hosts with a good /dev/(u)random, - * otherwise use run prngd (or egd if you want), specifying the socket. - * The device will be queried for a few dozen bytes of seed a couple of times - * per session (or more for very long-lived sessions). */ - -/* We'll use /dev/urandom by default, since /dev/random is too much hassle. - * If system developers aren't keeping seeds between boots nor getting - * any entropy from somewhere it's their own fault. */ -#define DROPBEAR_RANDOM_DEV "/dev/urandom" - -/* prngd must be manually set up to produce output */ +/* Source for randomness. This must be able to provide hundreds of bytes per SSH + * connection without blocking. In addition /dev/random is used for seeding + * rsa/dss key generation */ +#define DROPBEAR_URANDOM_DEV "/dev/urandom" + +/* Set this to use PRNGD or EGD instead of /dev/urandom or /dev/random */ /*#define DROPBEAR_PRNGD_SOCKET "/var/run/dropbear-rng"*/ + /* Specify the number of clients we will allow to be connected but * not yet authenticated. After this limit, connections are rejected */ /* The first setting is per-IP, to avoid denial of service */ |