Mercurial > dropbear
diff options.h @ 710:91dd8328a3ff
Merge "none" cipher/MAC branch. Also adds sha256 and sha512
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Wed, 20 Mar 2013 22:41:07 +0800 |
parents | 94aa1203be1e 983a817f8e41 |
children | e22d5f5f6e37 |
line wrap: on
line diff
--- a/options.h Wed Mar 20 22:31:07 2013 +0800 +++ b/options.h Wed Mar 20 22:41:07 2013 +0800 @@ -100,6 +100,12 @@ * size and is recommended for most cases */ #define DROPBEAR_ENABLE_CTR_MODE +/* You can compile with no encryption if you want. In some circumstances + * this could be safe security-wise, though make sure you know what + * you're doing. Anyone can see everything that goes over the wire, so + * the only safe auth method is public key. */ +#define DROPBEAR_NONE_CIPHER + /* Message Integrity - at least one required. * Protocol RFC requires sha1 and recommends sha1-96. * sha1-96 is of use for slow links as it has a smaller overhead. @@ -112,11 +118,19 @@ * These hashes are also used for public key fingerprints in logs. * If you disable MD5, Dropbear will fall back to SHA1 fingerprints, * which are not the standard form. */ - #define DROPBEAR_SHA1_HMAC #define DROPBEAR_SHA1_96_HMAC +/*#define DROPBEAR_SHA2_256_HMAC*/ +/*#define DROPBEAR_SHA2_512_HMAC*/ #define DROPBEAR_MD5_HMAC +/* You can also disable integrity. Don't bother disabling this if you're + * still using a cipher, it's relatively cheap. If you disable this it's dead + * simple to run arbitrary commands on the remote host. Beware. + * Note again, for the client you will have to disable other hashes above + * to use this. */ +#define DROPBEAR_NONE_INTEGRITY + /* Hostkey/public key algorithms - at least one required, these are used * for hostkey as well as for verifying signatures with pubkey auth. * Removing either of these won't save very much space.