mirror of
https://github.com/clearml/dropbear
synced 2025-01-31 02:46:58 +00:00
Disable by default 3des, cbc, hmac-sha1-96, x11 forwarding
This commit is contained in:
parent
6145289e0d
commit
a27e8b053e
@ -48,7 +48,7 @@ IMPORTANT: Some options will require "make clean" after changes */
|
|||||||
#define DROPBEAR_SMALL_CODE 1
|
#define DROPBEAR_SMALL_CODE 1
|
||||||
|
|
||||||
/* Enable X11 Forwarding - server only */
|
/* Enable X11 Forwarding - server only */
|
||||||
#define DROPBEAR_X11FWD 1
|
#define DROPBEAR_X11FWD 0
|
||||||
|
|
||||||
/* Enable TCP Fowarding */
|
/* Enable TCP Fowarding */
|
||||||
/* 'Local' is "-L" style (client listening port forwarded via server)
|
/* 'Local' is "-L" style (client listening port forwarded via server)
|
||||||
@ -83,20 +83,24 @@ IMPORTANT: Some options will require "make clean" after changes */
|
|||||||
* Including both AES keysize variants (128 and 256) will result in
|
* Including both AES keysize variants (128 and 256) will result in
|
||||||
* a minimal size increase */
|
* a minimal size increase */
|
||||||
#define DROPBEAR_AES128 1
|
#define DROPBEAR_AES128 1
|
||||||
#define DROPBEAR_3DES 1
|
|
||||||
#define DROPBEAR_AES256 1
|
#define DROPBEAR_AES256 1
|
||||||
|
#define DROPBEAR_3DES 0
|
||||||
#define DROPBEAR_TWOFISH256 0
|
#define DROPBEAR_TWOFISH256 0
|
||||||
#define DROPBEAR_TWOFISH128 0
|
#define DROPBEAR_TWOFISH128 0
|
||||||
|
|
||||||
/* Enable CBC mode for ciphers. This has security issues though
|
/* Enable Chacha20-Poly1305 authenticated encryption mode. This is
|
||||||
* is the most compatible with older SSH implementations */
|
* generally faster than AES256 on CPU w/o dedicated AES instructions,
|
||||||
#define DROPBEAR_ENABLE_CBC_MODE 1
|
* having the same key size. Recommended.
|
||||||
|
* Compiling in will add ~5,5kB to binary size on x86-64 */
|
||||||
|
#define DROPBEAR_CHACHA20POLY1305 1
|
||||||
|
|
||||||
/* Enable "Counter Mode" for ciphers. This is more secure than
|
/* Enable "Counter Mode" for ciphers. Recommended. */
|
||||||
* CBC mode against certain attacks. It is recommended for security
|
|
||||||
* and forwards compatibility */
|
|
||||||
#define DROPBEAR_ENABLE_CTR_MODE 1
|
#define DROPBEAR_ENABLE_CTR_MODE 1
|
||||||
|
|
||||||
|
/* Enable CBC mode for ciphers. This has security issues though
|
||||||
|
may be required for compatibility with old implementations */
|
||||||
|
#define DROPBEAR_ENABLE_CBC_MODE 0
|
||||||
|
|
||||||
/* Enable "Galois/Counter Mode" for ciphers. This authenticated
|
/* Enable "Galois/Counter Mode" for ciphers. This authenticated
|
||||||
* encryption mode is combination of CTR mode and GHASH. Recommended
|
* encryption mode is combination of CTR mode and GHASH. Recommended
|
||||||
* for security and forwards compatibility, but slower than CTR on
|
* for security and forwards compatibility, but slower than CTR on
|
||||||
@ -104,17 +108,11 @@ IMPORTANT: Some options will require "make clean" after changes */
|
|||||||
* Compiling in will add ~6kB to binary size on x86-64 */
|
* Compiling in will add ~6kB to binary size on x86-64 */
|
||||||
#define DROPBEAR_ENABLE_GCM_MODE 0
|
#define DROPBEAR_ENABLE_GCM_MODE 0
|
||||||
|
|
||||||
/* Enable Chacha20-Poly1305 authenticated encryption mode. This is
|
|
||||||
* generally faster than AES256 on CPU w/o dedicated AES instructions,
|
|
||||||
* having the same key size.
|
|
||||||
* Compiling in will add ~5,5kB to binary size on x86-64 */
|
|
||||||
#define DROPBEAR_CHACHA20POLY1305 1
|
|
||||||
|
|
||||||
/* Message integrity. sha2-256 is recommended as a default,
|
/* Message integrity. sha2-256 is recommended as a default,
|
||||||
sha1 for compatibility */
|
sha1 for compatibility */
|
||||||
#define DROPBEAR_SHA1_HMAC 1
|
#define DROPBEAR_SHA1_HMAC 1
|
||||||
#define DROPBEAR_SHA1_96_HMAC 1
|
|
||||||
#define DROPBEAR_SHA2_256_HMAC 1
|
#define DROPBEAR_SHA2_256_HMAC 1
|
||||||
|
#define DROPBEAR_SHA1_96_HMAC 0
|
||||||
|
|
||||||
/* Hostkey/public key algorithms - at least one required, these are used
|
/* Hostkey/public key algorithms - at least one required, these are used
|
||||||
* for hostkey as well as for verifying signatures with pubkey auth.
|
* for hostkey as well as for verifying signatures with pubkey auth.
|
||||||
|
Loading…
Reference in New Issue
Block a user