changeset 713:e22d5f5f6e37

Fix "-c none" so that it allows aes during authentication Default for options.h shouldn't allow "none"
author Matt Johnston <matt@ucc.asn.au>
date Wed, 20 Mar 2013 23:52:49 +0800
parents bf0ac0512ef7
children 84157e435c52
files common-runopts.c options.h
diffstat 2 files changed, 9 insertions(+), 5 deletions(-) [+]
line wrap: on
line diff
--- a/common-runopts.c	Wed Mar 20 23:13:45 2013 +0800
+++ b/common-runopts.c	Wed Mar 20 23:52:49 2013 +0800
@@ -75,6 +75,12 @@
 			dropbear_exit(".");
 		}
 
+		if (strcmp(opts.cipher_list, "none") == 0)
+		{
+			/* Encryption is required during authentication */
+			opts.cipher_list = "none,aes128-ctr";
+		}
+
 		if (check_user_algos(opts.cipher_list, sshciphers, "cipher") == 0)
 		{
 			dropbear_exit("No valid ciphers specified for '-c'");
--- a/options.h	Wed Mar 20 23:13:45 2013 +0800
+++ b/options.h	Wed Mar 20 23:52:49 2013 +0800
@@ -104,7 +104,7 @@
  * this could be safe security-wise, though make sure you know what
  * you're doing. Anyone can see everything that goes over the wire, so
  * the only safe auth method is public key. */
-#define DROPBEAR_NONE_CIPHER
+/* #define DROPBEAR_NONE_CIPHER */
 
 /* Message Integrity - at least one required.
  * Protocol RFC requires sha1 and recommends sha1-96.
@@ -126,10 +126,8 @@
 
 /* You can also disable integrity. Don't bother disabling this if you're
  * still using a cipher, it's relatively cheap. If you disable this it's dead
- * simple to run arbitrary commands on the remote host. Beware.
- * Note again, for the client you will have to disable other hashes above
- * to use this. */
-#define DROPBEAR_NONE_INTEGRITY
+ * simple to run arbitrary commands on the remote host. Beware. */
+/* #define DROPBEAR_NONE_INTEGRITY */
 
 /* Hostkey/public key algorithms - at least one required, these are used
  * for hostkey as well as for verifying signatures with pubkey auth.