2004-09-14 15:26:50 +00:00
.TH dropbear 8
.SH NAME
2013-10-03 15:50:04 +00:00
dropbear \- lightweight SSH server
2004-09-14 15:26:50 +00:00
.SH SYNOPSIS
.B dropbear
2015-11-25 12:46:06 +00:00
[\fI flag arguments\fR ] [\- b
2013-11-14 14:14:09 +00:00
.I banner\fR]
[\- r
2015-11-25 12:46:06 +00:00
.I hostkeyfile\fR] [\-p [\fIaddress\fR:]\fIport\fR]
2004-09-14 15:26:50 +00:00
.SH DESCRIPTION
.B dropbear
2014-07-27 14:06:26 +00:00
is a small SSH server
2004-09-14 15:26:50 +00:00
.SH OPTIONS
.TP
.B \- b \fI banner
bannerfile.
Display the contents of the file
.I banner
before user login (default: none).
.TP
2013-11-14 14:14:09 +00:00
.B \- r \fI hostkey
2004-09-14 15:26:50 +00:00
Use the contents of the file
2013-11-14 14:14:09 +00:00
.I hostkey
for the SSH hostkey.
2004-09-14 15:26:50 +00:00
This file is generated with
2013-11-14 14:14:09 +00:00
.BR dropbearkey (1)
or automatically with the '-R' option. See "Host Key Files" below.
2004-09-14 15:26:50 +00:00
.TP
2013-11-14 14:14:09 +00:00
.B \- R
2013-12-03 13:13:58 +00:00
Generate hostkeys automatically. See "Host Key Files" below.
2004-09-14 15:26:50 +00:00
.TP
.B \- F
Don't fork into background.
.TP
.B \- E
Log to standard error rather than syslog.
.TP
.B \- m
Don't display the message of the day on login.
.TP
.B \- w
Disallow root logins.
.TP
.B \- s
Disable password logins.
.TP
.B \- g
Disable password logins for root.
.TP
.B \- j
Disable local port forwarding.
.TP
.B \- k
Disable remote port forwarding.
.TP
2015-11-25 12:46:06 +00:00
.B \- p\fR [\fIaddress\fR:]\fIport
2007-02-22 15:51:15 +00:00
Listen on specified
.I address
and TCP
.I port.
If just a port is given listen
on all addresses.
2020-12-05 06:56:53 +00:00
Up to 10 can be specified (default 22 if none specified).
2004-09-14 15:26:50 +00:00
.TP
.B \- i
Service program mode.
Use this option to run
.B dropbear
under TCP/IP servers like inetd, tcpsvd, or tcpserver.
In program mode the \- F option is implied, and \- p options are ignored.
2005-12-04 16:13:11 +00:00
.TP
2006-06-07 15:01:20 +00:00
.B \- P \fI pidfile
Specify a pidfile to create when running as a daemon. If not specified, the
default is /var/run/dropbear.pid
.TP
2005-12-04 16:13:11 +00:00
.B \- a
Allow remote hosts to connect to forwarded ports.
2007-07-25 15:44:25 +00:00
.TP
.B \- W \fI windowsize
Specify the per-channel receive window buffer size. Increasing this
may improve network performance at the expense of memory use. Use -h to see the
default buffer size.
2007-08-08 15:12:06 +00:00
.TP
.B \- K \fI timeout_seconds
Ensure that traffic is transmitted at a certain interval in seconds. This is
useful for working around firewalls or routers that drop connections after
a certain period of inactivity. The trade-off is that a session may be
closed if there is a temporary lapse of network connectivity. A setting
2020-12-05 06:56:53 +00:00
of 0 disables keepalives. If no response is received for 3 consecutive keepalives the connection will be closed.
2008-11-11 13:51:55 +00:00
.TP
.B \- I \fI idle_timeout
Disconnect the session if no traffic is transmitted or received for \fI idle_timeout\fR seconds.
2014-07-27 14:06:26 +00:00
.TP
2017-05-29 09:25:09 +00:00
.B \- T \fI max_authentication_attempts
2017-06-27 14:20:38 +00:00
Set the number of authentication attempts allowed per connection. If unspecified the default is 10 (MAX_AUTH_TRIES)
2017-05-29 09:25:09 +00:00
.TP
2016-04-12 13:05:40 +00:00
.B \- c \fI forced_command
Disregard the command provided by the user and always run \fI forced_command\fR . This also
2020-12-05 06:56:53 +00:00
overrides any authorized_keys command= option. The original command is saved in the
SSH_ORIGINAL_COMMAND environment variable (see below).
2016-04-12 13:05:40 +00:00
.TP
2014-07-27 14:06:26 +00:00
.B \- V
Print the version
2008-11-05 14:14:40 +00:00
.SH FILES
.TP
Authorized Keys
2015-08-07 15:07:16 +00:00
~/.ssh/authorized_keys can be set up to allow remote login with a RSA,
2020-03-11 16:09:45 +00:00
ECDSA, Ed25519 or DSS
2008-11-05 14:14:40 +00:00
key. Each line is of the form
.TP
[restrictions] ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIgAsp... [comment]
and can be extracted from a Dropbear private host key with "dropbearkey -y". This is the same format as used by OpenSSH, though the restrictions are a subset (keys with unknown restrictions are ignored).
Restrictions are comma separated, with double quotes around spaces in arguments.
Available restrictions are:
.TP
.B no-port-forwarding
Don't allow port forwarding for this connection
.TP
.B no-agent-forwarding
Don't allow agent forwarding for this connection
.TP
.B no-X11-forwarding
Don't allow X11 forwarding for this connection
.TP
.B no-pty
Disable PTY allocation. Note that a user can still obtain most of the
same functionality with other means even if no-pty is set.
.TP
2015-11-25 12:46:06 +00:00
.B command=\fR"\fIforced_command\fR"
2008-11-05 14:14:40 +00:00
Disregard the command provided by the user and always run \fI forced_command\fR .
2016-04-12 13:05:40 +00:00
The -c command line option overrides this.
2008-11-05 14:14:40 +00:00
The authorized_keys file and its containing ~/.ssh directory must only be
writable by the user, otherwise Dropbear will not allow a login using public
key authentication.
.TP
Host Key Files
Host key files are read at startup from a standard location, by default
2020-03-11 16:09:45 +00:00
/etc/dropbear/dropbear_dss_host_key, /etc/dropbear/dropbear_rsa_host_key,
/etc/dropbear/dropbear_ecdsa_host_key and /etc/dropbear/dropbear_ed25519_host_key
2018-02-22 13:57:47 +00:00
If the -r command line option is specified the default files are not loaded.
Host key files are of the form generated by dropbearkey.
The -R option can be used to automatically generate keys
2013-11-14 14:14:09 +00:00
in the default location - keys will be generated after startup when the first
connection is established. This had the benefit that the system /dev/urandom
random number source has a better chance of being securely seeded.
2008-11-05 14:14:40 +00:00
.TP
Message Of The Day
By default the file /etc/motd will be printed for any login shell (unless
disabled at compile-time). This can also be disabled per-user
by creating a file ~/.hushlogin .
2009-09-02 14:47:12 +00:00
.SH ENVIRONMENT VARIABLES
Dropbear sets the standard variables USER, LOGNAME, HOME, SHELL, PATH, and TERM.
The variables below are set for sessions as appropriate.
.TP
.B SSH_TTY
This is set to the allocated TTY if a PTY was used.
.TP
.B SSH_CONNECTION
Contains "<remote_ip> <remote_port> <local_ip> <local_port>".
.TP
.B DISPLAY
Set X11 forwarding is used.
.TP
.B SSH_ORIGINAL_COMMAND
If a 'command=' authorized_keys option was used, the original command is specified
in this variable. If a shell was requested this is set to an empty value.
.TP
.B SSH_AUTH_SOCK
Set to a forwarded ssh-agent connection.
2013-10-03 15:50:04 +00:00
.SH NOTES
Dropbear only supports SSH protocol version 2.
2009-09-02 14:47:12 +00:00
2004-09-14 15:26:50 +00:00
.SH AUTHOR
Matt Johnston (matt@ucc.asn.au).
.br
Gerrit Pape (pape@smarden.org) wrote this manual page.
.SH SEE ALSO
2013-10-03 15:50:04 +00:00
dropbearkey(1), dbclient(1), dropbearconvert(1)
2004-09-14 15:26:50 +00:00
.P
2013-02-22 15:53:49 +00:00
https://matt.ucc.asn.au/dropbear/dropbear.html