comparison options.h @ 512:0129fd8ccc71 insecure-nocrypto

Update nocrypto branch to current head
author Matt Johnston <matt@ucc.asn.au>
date Thu, 06 Nov 2008 13:33:06 +0000
parents 582cb38e4eb5
children a4b7627b3157
comparison
equal deleted inserted replaced
511:582cb38e4eb5 512:0129fd8ccc71
80 80
81 /* Encryption - at least one required. 81 /* Encryption - at least one required.
82 * Protocol RFC requires 3DES and recommends AES128 for interoperability. 82 * Protocol RFC requires 3DES and recommends AES128 for interoperability.
83 * Including multiple keysize variants the same cipher 83 * Including multiple keysize variants the same cipher
84 * (eg AES256 as well as AES128) will result in a minimal size increase.*/ 84 * (eg AES256 as well as AES128) will result in a minimal size increase.*/
85 /*
85 #define DROPBEAR_AES128 86 #define DROPBEAR_AES128
86 #define DROPBEAR_3DES 87 #define DROPBEAR_3DES
87 #define DROPBEAR_AES256 88 #define DROPBEAR_AES256
88 #define DROPBEAR_BLOWFISH 89 #define DROPBEAR_BLOWFISH
89 #define DROPBEAR_TWOFISH256 90 #define DROPBEAR_TWOFISH256
90 #define DROPBEAR_TWOFISH128 91 #define DROPBEAR_TWOFISH128
91 92 */
92 /* Enable "Counter Mode" for ciphers. This is more secure than normal 93
93 * CBC mode against certain attacks. This adds around 1kB to binary
94 * size and is recommended for most cases */
95 #define DROPBEAR_ENABLE_CTR_MODE
96 /* You can compile with no encryption if you want. In some circumstances 94 /* You can compile with no encryption if you want. In some circumstances
97 * this could be safe securitywise, though make sure you know what 95 * this could be safe securitywise, though make sure you know what
98 * you're doing. Anyone can see everything that goes over the wire, so 96 * you're doing. Anyone can see everything that goes over the wire, so
99 * the only safe auth method is public key. You'll have to disable all other 97 * the only safe auth method is public key. You'll have to disable all other
100 * ciphers above in the client if you want to use this, or implement cipher 98 * ciphers above in the client if you want to use this, or implement cipher
103 * The best way to do things is probably make normal compile of dropbear with 101 * The best way to do things is probably make normal compile of dropbear with
104 * all ciphers including "none" as the server, then recompile a special 102 * all ciphers including "none" as the server, then recompile a special
105 * "dbclient-insecure" client. */ 103 * "dbclient-insecure" client. */
106 #define DROPBEAR_NONE_CIPHER 104 #define DROPBEAR_NONE_CIPHER
107 105
106 /* Enable "Counter Mode" for ciphers. This is more secure than normal
107 * CBC mode against certain attacks. This adds around 1kB to binary
108 * size and is recommended for most cases */
109 #define DROPBEAR_ENABLE_CTR_MODE
110
108 /* Message Integrity - at least one required. 111 /* Message Integrity - at least one required.
109 * Protocol RFC requires sha1 and recommends sha1-96. 112 * Protocol RFC requires sha1 and recommends sha1-96.
110 * sha1-96 may be of use for slow links, as it has a smaller overhead. 113 * sha1-96 may be of use for slow links, as it has a smaller overhead.
111 * 114 *
112 * Note: there's no point disabling sha1 to save space, since it's used 115 * Note: there's no point disabling sha1 to save space, since it's used
115 * of the ssh protocol. 118 * of the ssh protocol.
116 * 119 *
117 * These hashes are also used for public key fingerprints in logs. 120 * These hashes are also used for public key fingerprints in logs.
118 * If you disable MD5, Dropbear will fall back to SHA1 fingerprints, 121 * If you disable MD5, Dropbear will fall back to SHA1 fingerprints,
119 * which are not the standard form. */ 122 * which are not the standard form. */
123 /*
120 #define DROPBEAR_SHA1_HMAC 124 #define DROPBEAR_SHA1_HMAC
121 #define DROPBEAR_SHA1_96_HMAC 125 #define DROPBEAR_SHA1_96_HMAC
122 #define DROPBEAR_MD5_HMAC 126 #define DROPBEAR_MD5_HMAC
127 */
123 128
124 /* You can also disable integrity. Don't bother disabling this if you're 129 /* You can also disable integrity. Don't bother disabling this if you're
125 * still using a cipher, it's relatively cheap. Don't disable this if you're 130 * still using a cipher, it's relatively cheap. Don't disable this if you're
126 * using 'none' cipher, since it's dead simple to run arbitrary commands 131 * using 'none' cipher, since it's dead simple to run arbitrary commands
127 * on the remote host. Beware. */ 132 * on the remote host. Beware.
128 /*#define DROPBEAR_NONE_INTEGRITY*/ 133 * Note again, for the client you will have to disable other hashes above
134 * to use this. */
135 #define DROPBEAR_NONE_INTEGRITY
129 136
130 /* Hostkey/public key algorithms - at least one required, these are used 137 /* Hostkey/public key algorithms - at least one required, these are used
131 * for hostkey as well as for verifying signatures with pubkey auth. 138 * for hostkey as well as for verifying signatures with pubkey auth.
132 * Removing either of these won't save very much space. 139 * Removing either of these won't save very much space.
133 * SSH2 RFC Draft requires dss, recommends rsa */ 140 * SSH2 RFC Draft requires dss, recommends rsa */