blob: 5c60868ed83d0fecb7075f2afb6408e0c84382a5 [file] [log] [blame]
Andrew Geissler475cb722020-07-10 16:00:51 -05001From c347ece05a7fdbf50d76cb136b9ed45caed333f6 Mon Sep 17 00:00:00 2001
2From: Joseph Reynolds <joseph.reynolds1@ibm.com>
3Date: Thu, 20 Jun 2019 16:29:15 -0500
4Subject: [PATCH] dropbear: new feature: disable-weak-ciphers
5
6This feature disables all CBC, SHA1, and diffie-hellman group1 ciphers
Brad Bishopc8f47122019-06-24 09:36:18 -04007in the dropbear ssh server and client since they're considered weak ciphers
8and we want to support the stong algorithms.
9
10Upstream-Status: Inappropriate [configuration]
11Signed-off-by: Joseph Reynolds <joseph.reynolds1@ibm.com>
Andrew Geissler475cb722020-07-10 16:00:51 -050012---
Patrick Williams03907ee2022-05-01 06:28:52 -050013 default_options.h | 2 +-
14 1 file changed, 1 insertion(+), 1 deletion(-)
Andrew Geissler475cb722020-07-10 16:00:51 -050015
16diff --git a/default_options.h b/default_options.h
Patrick Williams03907ee2022-05-01 06:28:52 -050017index d417588..bc5200f 100644
Andrew Geissler475cb722020-07-10 16:00:51 -050018--- a/default_options.h
19+++ b/default_options.h
Patrick Williams03907ee2022-05-01 06:28:52 -050020@@ -180,7 +180,7 @@ IMPORTANT: Some options will require "make clean" after changes */
Brad Bishopc8f47122019-06-24 09:36:18 -040021 * Small systems should generally include either curve25519 or ecdh for performance.
22 * curve25519 is less widely supported but is faster
Patrick Williams03907ee2022-05-01 06:28:52 -050023 */
Brad Bishopc8f47122019-06-24 09:36:18 -040024-#define DROPBEAR_DH_GROUP14_SHA1 1
25+#define DROPBEAR_DH_GROUP14_SHA1 0
26 #define DROPBEAR_DH_GROUP14_SHA256 1
27 #define DROPBEAR_DH_GROUP16 0
28 #define DROPBEAR_CURVE25519 1
Patrick Williams03907ee2022-05-01 06:28:52 -050029--
302.25.1
31