diff options
-rw-r--r-- | cli-runopts.c | 6 | ||||
-rw-r--r-- | dbclient.1 | 3 | ||||
-rw-r--r-- | dropbear.8 | 3 | ||||
-rw-r--r-- | options.h | 13 | ||||
-rw-r--r-- | random.c | 11 | ||||
-rw-r--r-- | random.h | 2 | ||||
-rw-r--r-- | svr-runopts.c | 4 |
7 files changed, 9 insertions, 33 deletions
diff --git a/cli-runopts.c b/cli-runopts.c index cb548a2..3e9b5ab 100644 --- a/cli-runopts.c +++ b/cli-runopts.c @@ -29,7 +29,6 @@ #include "dbutil.h" #include "algo.h" #include "tcpfwd.h" -#include "random.h" cli_runopts cli_opts; /* GLOBAL */ @@ -54,7 +53,6 @@ static void printhelp() { "-N Don't run a remote command\n" "-f Run in background after auth\n" "-y Always accept remote host key if unknown\n" - "-u Use /dev/urandom - use with caution\n" #ifdef ENABLE_CLI_PUBKEY_AUTH "-i <identityfile> (multiple allowed)\n" #endif @@ -88,7 +86,6 @@ void cli_getopts(int argc, char ** argv) { char* dummy = NULL; /* Not used for anything real */ /* see printhelp() for options */ - opts.listen_fwd_all = 0; cli_opts.progname = argv[0]; cli_opts.remotehost = NULL; cli_opts.remoteport = NULL; @@ -103,6 +100,7 @@ void cli_getopts(int argc, char ** argv) { #endif #ifdef ENABLE_CLI_LOCALTCPFWD cli_opts.localfwds = NULL; + opts.listen_fwd_all = 0; #endif #ifdef ENABLE_CLI_REMOTETCPFWD cli_opts.remotefwds = NULL; @@ -201,7 +199,7 @@ void cli_getopts(int argc, char ** argv) { exit(EXIT_SUCCESS); break; case 'u': - random_dev = DROPBEAR_URANDOM_DEV; + /* backwards compatibility with old urandom option */ break; #ifdef DEBUG_TRACE case 'v': @@ -74,9 +74,6 @@ by the ssh server. .B \-y Always accept hostkeys if they are unknown. If a hostkey mismatch occurs the connection will abort as normal. -.B \-u -Use /dev/urandom rather than /dev/random. This should only be used if the -/dev/urandom device is known to have sufficient entropy. .SH AUTHOR Matt Johnston (matt@ucc.asn.au). .br @@ -82,9 +82,6 @@ default is /var/run/dropbear.pid .TP .B \-a Allow remote hosts to connect to forwarded ports. -.B \-u -Use /dev/urandom rather than /dev/random. This should only be used if the -/dev/urandom device is known to have sufficient entropy. .SH AUTHOR Matt Johnston (matt@ucc.asn.au). .br @@ -162,15 +162,10 @@ etc) slower (perhaps by 50%). Recommended for most small systems. */ * The device will be queried for a few dozen bytes of seed a couple of times * per session (or more for very long-lived sessions). */ -/* If you are lacking entropy on the system then using /dev/urandom - * will prevent Dropbear from blocking on the device. This could - * however significantly reduce the security of your ssh connections - * if the PRNG state becomes guessable - make sure you know what you are - * doing if you change this. */ -#define DROPBEAR_RANDOM_DEV "/dev/random" - -/* The -u flag on the commandline can also be used */ -#define DROPBEAR_URANDOM_DEV "/dev/urandom" +/* We'll use /dev/urandom by default, since /dev/random is too much hassle. + * If system developers aren't keeping seeds between boots nor getting + * any entropy from somewhere it's their own fault. */ +#define DROPBEAR_RANDOM_DEV "/dev/urandom" /* prngd must be manually set up to produce output */ /*#define DROPBEAR_PRNGD_SOCKET "/var/run/dropbear-rng"*/ @@ -27,13 +27,6 @@ #include "dbutil.h" #include "bignum.h" -#ifdef DROPBEAR_RANDOM_DEV -const char* random_dev = DROPBEAR_RANDOM_DEV; -#else -const char* random_dev = NULL; -#endif - - static int donerandinit = 0; /* this is used to generate unique output from the same hashpool */ @@ -69,9 +62,9 @@ static void readrand(unsigned char* buf, unsigned int buflen) { #endif #ifdef DROPBEAR_RANDOM_DEV - readfd = open(random_dev, O_RDONLY); + readfd = open(DROPBEAR_RANDOM_DEV, O_RDONLY); if (readfd < 0) { - dropbear_exit("couldn't open %s", random_dev); + dropbear_exit("couldn't open random device"); } #endif @@ -33,6 +33,4 @@ void genrandom(unsigned char* buf, int len); void addrandom(unsigned char* buf, int len); void gen_random_mpint(mp_int *max, mp_int *rand); -extern const char * random_dev; - #endif /* _RANDOM_H_ */ diff --git a/svr-runopts.c b/svr-runopts.c index 59f4514..dde0b07 100644 --- a/svr-runopts.c +++ b/svr-runopts.c @@ -28,7 +28,6 @@ #include "buffer.h" #include "dbutil.h" #include "algo.h" -#include "random.h" svr_runopts svr_opts; /* GLOBAL */ @@ -81,7 +80,6 @@ static void printhelp(const char * progname) { #ifdef INETD_MODE "-i Start for inetd\n" #endif - "-u Use /dev/urandom - use with caution\n" #ifdef DEBUG_TRACE "-v verbose\n" #endif @@ -219,7 +217,7 @@ void svr_getopts(int argc, char ** argv) { exit(EXIT_FAILURE); break; case 'u': - random_dev = DROPBEAR_URANDOM_DEV; + /* backwards compatibility with old urandom option */ break; #ifdef DEBUG_TRACE case 'v': |