Go to file
Matt Johnston ca77392bd1 - Fixed twofish algorithm naming so it actually works.
- Added support for aes256, twofish256 and sha1-96
- Fixed some debugging statements

--HG--
extra : convert_revision : 598835dadaddb1e95d4ac99f8a1be4ba51639000
2005-08-30 16:58:57 +00:00
debian * preparing for 0.46 release 2005-07-08 14:28:21 +00:00
agentfwd.h
algo.h Switching to libtomcrypt 1.02 2005-05-09 09:32:33 +00:00
atomicio.c
atomicio.h
auth.h rename PubkeyList to SignKeyList for clarity 2005-07-08 11:32:09 +00:00
bignum.c - refactored random mp_int generation and byte->mp_int code 2005-05-05 03:58:21 +00:00
bignum.h - refactored random mp_int generation and byte->mp_int code 2005-05-05 03:58:21 +00:00
buffer.c * fix longstanding bug with connections being closed on failure to 2005-03-13 13:58:14 +00:00
buffer.h * fix longstanding bug with connections being closed on failure to 2005-03-13 13:58:14 +00:00
CHANGES * ... and a bit more for the CHANGES 2005-07-08 19:20:10 +00:00
channel.h channel.h: make definition extern 2005-07-29 05:37:20 +00:00
chansession.h
circbuffer.c
circbuffer.h
cli-algo.c
cli-auth.c * fix longstanding bug with connections being closed on failure to 2005-03-13 13:58:14 +00:00
cli-authpasswd.c * add SSH_ASKPASS support (based on patch from Paul Whittaker 2005-02-28 13:01:00 +00:00
cli-authpubkey.c rename PubkeyList to SignKeyList for clarity 2005-07-08 11:32:09 +00:00
cli-channel.c * fix longstanding bug with connections being closed on failure to 2005-03-13 13:58:14 +00:00
cli-chansession.c * fix longstanding bug with connections being closed on failure to 2005-03-13 13:58:14 +00:00
cli-kex.c
cli-main.c
cli-runopts.c rename PubkeyList to SignKeyList for clarity 2005-07-08 11:32:09 +00:00
cli-service.c
cli-session.c rename PubkeyList to SignKeyList for clarity 2005-07-08 11:32:09 +00:00
cli-tcpfwd.c - allocate correct buffer size for channel info, rather than sizeof(pointer). 2005-04-24 10:30:33 +00:00
common-algo.c - Fixed twofish algorithm naming so it actually works. 2005-08-30 16:58:57 +00:00
common-channel.c * close a file descriptor after we've shutdown() both sides, to avoid a leak 2005-07-08 15:04:06 +00:00
common-chansession.c
common-kex.c - Fixed twofish algorithm naming so it actually works. 2005-08-30 16:58:57 +00:00
common-runopts.c
common-session.c
compat.c
compat.h
config.guess
config.sub
configure.in
dbclient.1 Merge in Debian package changes from 0.45-3, grab the dbclient manpage 2005-03-13 16:22:36 +00:00
dbmulti.c
dbutil.c * add a "label" argument to printhex() 2005-05-10 17:02:05 +00:00
dbutil.h * add a "label" argument to printhex() 2005-05-10 17:02:05 +00:00
debug.h * fix longstanding bug with connections being closed on failure to 2005-03-13 13:58:14 +00:00
dropbear.8 * Add references in the manpages to the dbclient manpage 2005-03-13 16:23:15 +00:00
dropbearconvert.c
dropbearkey.8 * Add references in the manpages to the dbclient manpage 2005-03-13 16:23:15 +00:00
dropbearkey.c
dss.c - refactored random mp_int generation and byte->mp_int code 2005-05-05 03:58:21 +00:00
dss.h
fake-rfc2553.c
fake-rfc2553.h
filelist.txt
gendss.c - refactored random mp_int generation and byte->mp_int code 2005-05-05 03:58:21 +00:00
gendss.h
genrsa.c - refactored random mp_int generation and byte->mp_int code 2005-05-05 03:58:21 +00:00
genrsa.h
includes.h Switching to libtomcrypt 1.02 2005-05-09 09:32:33 +00:00
INSTALL
install-sh
kex.h Make a variables static 2005-08-24 16:43:29 +00:00
keyimport.c
keyimport.h
LICENSE
listener.c
listener.h
loginrec.c
loginrec.h
Makefile.in * change include path for libtomcrypt 1.02 2005-05-10 17:01:16 +00:00
MULTI
options.h - Fixed twofish algorithm naming so it actually works. 2005-08-30 16:58:57 +00:00
packet.c - Fixed twofish algorithm naming so it actually works. 2005-08-30 16:58:57 +00:00
packet.h
process-packet.c
progressmeter.c
progressmeter.h
queue.c
queue.h
random.c * add a "label" argument to printhex() 2005-05-10 17:02:05 +00:00
random.h - refactored random mp_int generation and byte->mp_int code 2005-05-05 03:58:21 +00:00
README
rsa.c * move RSA_BLINDING to options.h 2005-07-08 13:19:10 +00:00
rsa.h
runopts.h rename PubkeyList to SignKeyList for clarity 2005-07-08 11:32:09 +00:00
scp.c * fix longstanding bug with connections being closed on failure to 2005-03-13 13:58:14 +00:00
scpmisc.c
scpmisc.h
service.h
session.h rename PubkeyList to SignKeyList for clarity 2005-07-08 11:32:09 +00:00
signkey.c Change the format of for loops, gcc4 produces incorrect binaries with 2005-07-08 11:30:54 +00:00
signkey.h
SMALL
ssh.h
sshpty.c
sshpty.h
svr-agentfwd.c
svr-algo.c
svr-auth.c
svr-authpam.c channel.h: make definition extern 2005-07-29 05:37:20 +00:00
svr-authpasswd.c * fix longstanding bug with connections being closed on failure to 2005-03-13 13:58:14 +00:00
svr-authpubkey.c * fix longstanding bug with connections being closed on failure to 2005-03-13 13:58:14 +00:00
svr-chansession.c * fix off-by-one closing open FDs 2005-06-02 22:53:18 +00:00
svr-kex.c
svr-main.c
svr-runopts.c
svr-service.c
svr-session.c
svr-tcpfwd.c * fix longstanding bug with connections being closed on failure to 2005-03-13 13:58:14 +00:00
svr-x11fwd.c * fix longstanding bug with connections being closed on failure to 2005-03-13 13:58:14 +00:00
tcp-accept.c
tcpfwd.h
termcodes.c
termcodes.h
TODO rename PubkeyList to SignKeyList for clarity 2005-07-08 11:32:09 +00:00
x11fwd.h

This is Dropbear, a smallish SSH 2 server and client.

INSTALL has compilation instructions.

MULTI has instructions on making a multi-purpose binary (ie a single binary
which performs multiple tasks, to save disk space)

SMALL has some tips on creating small binaries.

See TODO for a few of the things I know need looking at, and please contact
me if you have any questions/bugs found/features/ideas/comments etc :)

Matt Johnston
matt@ucc.asn.au


In the absence of detailed documentation, some notes follow:
============================================================================

Server public key auth:

You can use ~/.ssh/authorized_keys in the same way as with OpenSSH, just put
the key entries in that file. They should be of the form:

ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAwVa6M6cGVmUcLl2cFzkxEoJd06Ub4bVDsYrWvXhvUV+ZAM9uGuewZBDoAqNKJxoIn0Hyd0Nk/yU99UVv6NWV/5YSHtnf35LKds56j7cuzoQpFIdjNwdxAN0PCET/MG8qyskG/2IE2DPNIaJ3Wy+Ws4IZEgdJgPlTYUBWWtCWOGc= someone@hostname

You must make sure that ~/.ssh, and the key file, are only writable by the
user.

NOTE: Dropbear ignores authorized_keys options such as those described in the
OpenSSH sshd manpage, and will not allow a login for these keys. 

============================================================================

Client public key auth:

Dropbear can do public key auth as a client, but you will have to convert
OpenSSH style keys to Dropbear format, or use dropbearkey to create them.

If you have an OpenSSH-style private key ~/.ssh/id_rsa, you need to do:

dropbearconvert openssh dropbear ~/.ssh/id_rsa  ~/.ssh/id_rsa.db
dbclient -i ~/.ssh/id_rsa.db <hostname>

Currently encrypted keys aren't supported, neither is agent forwarding. At some
stage both hopefully will be.

============================================================================

If you want to get the public-key portion of a Dropbear private key, look at
dropbearkey's '-y' option.

============================================================================

To run the server, you need to generate server keys, this is one-off:
./dropbearkey -t rsa -f dropbear_rsa_host_key
./dropbearkey -t dss -f dropbear_dss_host_key

or alternatively convert OpenSSH keys to Dropbear:
./dropbearconvert openssh dropbear /etc/ssh/ssh_host_dsa_key dropbear_dss_host_key

============================================================================

If the server is run as non-root, you most likely won't be able to allocate a
pty, and you cannot login as any user other than that running the daemon
(obviously). Shadow passwords will also be unusable as non-root.

============================================================================

The Dropbear distribution includes a standalone version of OpenSSH's scp
program. You can compile it with "make scp", you may want to change the path
of the ssh binary, specified by _PATH_SSH_PROGRAM in options.h . By default
the progress meter isn't compiled in to save space, you can enable it by 
adding 'SCPPROGRESS=1' to the make commandline.