Go to file
2022-11-14 11:15:12 +08:00
.github Revert "Add CI build with more options enabled" 2022-11-10 16:59:11 +08:00
debian
fuzz
libtomcrypt
libtommath
test
.gitignore
.hgignore
.hgsigs
.hgtags Added tag DROPBEAR_2020.81 for changeset 4b984c42372d 2020-10-29 21:40:27 +08:00
agentfwd.h
algo.h
atomicio.c
atomicio.h
auth.h
bignum.c
bignum.h
buffer.c
buffer.h
chachapoly.c Fix ChaCha20 on 32-bit platforms (#99) 2020-05-29 21:26:22 +08:00
chachapoly.h Add Chacha20-Poly1305, AES128-GCM and AES256-GCM support (#93) 2020-05-25 23:50:25 +08:00
CHANGES
channel.h Leave non-interactive at default QoS class 2022-01-27 14:34:10 +08:00
chansession.h
circbuffer.c
circbuffer.h Pointer parameter could be declared as pointing to const 2017-08-19 17:16:13 +02:00
cli-agentfwd.c
cli-auth.c
cli-authinteract.c
cli-authpasswd.c
cli-authpubkey.c Use signature type not key type for debug message 2022-03-22 23:28:24 +08:00
cli-channel.c
cli-chansession.c
cli-kex.c Fix comment style 2022-09-19 18:25:26 +02:00
cli-main.c
cli-runopts.c
cli-session.c
cli-tcpfwd.c
common-algo.c
common-channel.c
common-chansession.c Chantype handling is sorted 2004-06-02 04:59:49 +00:00
common-kex.c
common-runopts.c
common-session.c
compat.c
compat.h
config.guess
config.h.in
config.sub
configure
configure.ac
crypto_desc.c
crypto_desc.h
curve25519.c
curve25519.h
dbclient.1
dbhelpers.c
dbhelpers.h
dbmalloc.c
dbmalloc.h
dbmulti.c
dbrandom.c
dbrandom.h
dbutil.c
dbutil.h
debug.h
default_options.h
DEVELOPING.md
dh_groups.c
dh_groups.h
dropbear_lint.sh
dropbear.8
dropbearconvert.1
dropbearconvert.c Add -v variable debug levels for server too 2022-03-24 14:44:13 +08:00
dropbearkey.1
dropbearkey.c
dss.c
dss.h use sigtype where appropriate 2020-04-06 23:18:26 +08:00
ecc.c
ecc.h
ecdsa.c
ecdsa.h It turns out you can't have a single-quote in an #error 2018-03-08 22:37:54 +08:00
ed25519.c
ed25519.h Implement server-side support for sk-ecdsa U2F-backed keys (#142) 2022-01-22 21:53:04 +08:00
fake-rfc2553.c
fake-rfc2553.h
filelist.txt
fuzz-wrapfd.h fuzz: wrap kill() 2021-01-29 21:47:56 +08:00
fuzz.h
FUZZER-NOTES.md
fuzzers_test.sh fuzz: add -q quiet argument for standalone fuzzers. 2021-03-07 21:26:34 +08:00
gcm.c
gcm.h
gendss.c
gendss.h
gened25519.c
gened25519.h
genrsa.c
genrsa.h Convert #ifdef to #if, other build changes 2016-05-04 15:33:40 +02:00
gensignkey.c Use buf_burn_free() instead of two calls 2022-03-29 23:47:30 +08:00
gensignkey.h
ifndef_wrapper.sh
includes.h
INSTALL
install-sh
kex.h
keyimport.c
keyimport.h
LICENSE
list.c
list.h
listener.c
listener.h Pointer parameter could be declared as pointing to const (callback) 2017-08-19 22:39:53 +02:00
loginrec.c
loginrec.h
ltc_prng.c
ltc_prng.h include config.h for options.h. don't need to include options.h when 2018-02-18 11:22:13 +08:00
Makefile.in
MULTI - Fix "inst_scp" target since there isn't a manpage 2013-10-09 22:24:39 +08:00
netio.c
netio.h Leave non-interactive at default QoS class 2022-01-27 14:34:10 +08:00
options.h
packet.c
packet.h
process-packet.c
progressmeter.c
progressmeter.h Makefile.in contains updated files required 2004-06-01 02:46:09 +00:00
pubkeyapi.h
queue.c Pointer parameter could be declared as pointing to const 2017-08-19 17:16:13 +02:00
queue.h
README
release.sh Add release.sh --testrel, github action 2022-03-24 12:22:07 +08:00
rsa.c
rsa.h split signkey_type and signature_type for RSA sha1 vs sha256 2020-05-17 23:58:31 +08:00
runopts.h
scp.c
scpmisc.c
scpmisc.h
service.h fix empty C prototypes 2016-03-16 22:41:20 +08:00
session.h
signkey_ossh.c
signkey_ossh.h
signkey.c
signkey.h
sk-ecdsa.c
sk-ecdsa.h Implement no-touch-required and verify-requred for authorized_keys file 2022-06-11 19:17:40 +03:00
sk-ed25519.c
sk-ed25519.h
SMALL
ssh.h
sshpty.c ignore I_PUSH if it isn't defined, for Android from Reimar Döffinger 2013-03-19 20:12:19 +08:00
sshpty.h
svr-agentfwd.c
svr-auth.c
svr-authpam.c
svr-authpasswd.c
svr-authpubkey.c
svr-authpubkeyoptions.c Merge egor-duda:sk-authkey-options 2022-11-09 16:14:59 +08:00
svr-chansession.c
svr-kex.c
svr-main.c
svr-runopts.c
svr-service.c
svr-session.c
svr-tcpfwd.c Added permitopen option to authorized_keys 2022-07-12 10:35:00 +03:00
svr-x11fwd.c
sysoptions.h
tcp-accept.c
tcpfwd.h
termcodes.c
termcodes.h DROPBEAR_ prefix for include guards to avoid collisions 2015-02-24 20:43:01 +08:00
x11fwd.h

This is Dropbear, a smallish SSH server and client.
https://matt.ucc.asn.au/dropbear/dropbear.html

INSTALL has compilation instructions.

MULTI has instructions on making a multi-purpose binary (ie a single binary
which performs multiple tasks, to save disk space)

SMALL has some tips on creating small binaries.

A mirror of the Dropbear website and tarballs is available at https://dropbear.nl/mirror/

Please contact me if you have any questions/bugs found/features/ideas/comments etc :)
There is also a mailing list http://lists.ucc.gu.uwa.edu.au/mailman/listinfo/dropbear

Matt Johnston
matt@ucc.asn.au


In the absence of detailed documentation, some notes follow:
============================================================================

Server public key auth:

You can use ~/.ssh/authorized_keys in the same way as with OpenSSH, just put
the key entries in that file. They should be of the form:

ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAwVa6M6cGVmUcLl2cFzkxEoJd06Ub4bVDsYrWvXhvUV+ZAM9uGuewZBDoAqNKJxoIn0Hyd0Nk/yU99UVv6NWV/5YSHtnf35LKds56j7cuzoQpFIdjNwdxAN0PCET/MG8qyskG/2IE2DPNIaJ3Wy+Ws4IZEgdJgPlTYUBWWtCWOGc= someone@hostname

You must make sure that ~/.ssh, and the key file, are only writable by the
user. Beware of editors that split the key into multiple lines.

Dropbear supports some options for authorized_keys entries, see the manpage.

============================================================================

Client public key auth:

Dropbear can do public key auth as a client, but you will have to convert
OpenSSH style keys to Dropbear format, or use dropbearkey to create them.

If you have an OpenSSH-style private key ~/.ssh/id_rsa, you need to do:

dropbearconvert openssh dropbear ~/.ssh/id_rsa  ~/.ssh/id_rsa.db
dbclient -i ~/.ssh/id_rsa.db <hostname>

Dropbear does not support encrypted hostkeys though can connect to ssh-agent.

============================================================================

If you want to get the public-key portion of a Dropbear private key, look at
dropbearkey's '-y' option.

============================================================================

To run the server, you need to generate server keys, this is one-off:
./dropbearkey -t rsa -f dropbear_rsa_host_key
./dropbearkey -t dss -f dropbear_dss_host_key
./dropbearkey -t ecdsa -f dropbear_ecdsa_host_key
./dropbearkey -t ed25519 -f dropbear_ed25519_host_key

or alternatively convert OpenSSH keys to Dropbear:
./dropbearconvert openssh dropbear /etc/ssh/ssh_host_dsa_key dropbear_dss_host_key

You can also get Dropbear to create keys when the first connection is made -
this is preferable to generating keys when the system boots. Make sure 
/etc/dropbear/ exists and then pass '-R' to the dropbear server.

============================================================================

If the server is run as non-root, you most likely won't be able to allocate a
pty, and you cannot login as any user other than that running the daemon
(obviously). Shadow passwords will also be unusable as non-root.

============================================================================

The Dropbear distribution includes a standalone version of OpenSSH's scp
program. You can compile it with "make scp", you may want to change the path
of the ssh binary, specified by _PATH_SSH_PROGRAM in options.h . By default
the progress meter isn't compiled in to save space, you can enable it by 
adding 'SCPPROGRESS=1' to the make commandline.