32 lines
1.1 KiB
Diff
32 lines
1.1 KiB
Diff
From c347ece05a7fdbf50d76cb136b9ed45caed333f6 Mon Sep 17 00:00:00 2001
|
|
From: Joseph Reynolds <joseph.reynolds1@ibm.com>
|
|
Date: Thu, 20 Jun 2019 16:29:15 -0500
|
|
Subject: [PATCH] dropbear: new feature: disable-weak-ciphers
|
|
|
|
This feature disables all CBC, SHA1, and diffie-hellman group1 ciphers
|
|
in the dropbear ssh server and client since they're considered weak ciphers
|
|
and we want to support the stong algorithms.
|
|
|
|
Upstream-Status: Inappropriate [configuration]
|
|
Signed-off-by: Joseph Reynolds <joseph.reynolds1@ibm.com>
|
|
---
|
|
default_options.h | 2 +-
|
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
|
|
diff --git a/default_options.h b/default_options.h
|
|
index d417588..bc5200f 100644
|
|
--- a/default_options.h
|
|
+++ b/default_options.h
|
|
@@ -180,7 +180,7 @@ IMPORTANT: Some options will require "make clean" after changes */
|
|
* Small systems should generally include either curve25519 or ecdh for performance.
|
|
* curve25519 is less widely supported but is faster
|
|
*/
|
|
-#define DROPBEAR_DH_GROUP14_SHA1 1
|
|
+#define DROPBEAR_DH_GROUP14_SHA1 0
|
|
#define DROPBEAR_DH_GROUP14_SHA256 1
|
|
#define DROPBEAR_DH_GROUP16 0
|
|
#define DROPBEAR_CURVE25519 1
|
|
--
|
|
2.25.1
|
|
|