mirror of
https://github.com/clearml/dropbear
synced 2025-01-31 10:57:01 +00:00
Comment on reason for DROPBEAR_MAX_PASSWORD_LEN limit
This commit is contained in:
parent
f3b72bfd18
commit
3c2436cd05
@ -86,6 +86,12 @@
|
|||||||
/* Required for pubkey auth */
|
/* Required for pubkey auth */
|
||||||
#define DROPBEAR_SIGNKEY_VERIFY ((DROPBEAR_SVR_PUBKEY_AUTH) || (DROPBEAR_CLIENT))
|
#define DROPBEAR_SIGNKEY_VERIFY ((DROPBEAR_SVR_PUBKEY_AUTH) || (DROPBEAR_CLIENT))
|
||||||
|
|
||||||
|
/* crypt(password) must take less time than the auth failure delay
|
||||||
|
(250ms set in svr-auth.c). On Linux the delay depends on
|
||||||
|
password length, 100 characters here was empirically derived.
|
||||||
|
|
||||||
|
If a longer password is allowed Dropbear cannot compensate
|
||||||
|
for the crypt time which will expose which usernames exist */
|
||||||
#define DROPBEAR_MAX_PASSWORD_LEN 100
|
#define DROPBEAR_MAX_PASSWORD_LEN 100
|
||||||
|
|
||||||
#define SHA1_HASH_SIZE 20
|
#define SHA1_HASH_SIZE 20
|
||||||
|
Loading…
Reference in New Issue
Block a user