summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/dropbear/dropbear/dropbear-disable-weak-ciphers.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-core/dropbear/dropbear/dropbear-disable-weak-ciphers.patch')
-rw-r--r--meta/recipes-core/dropbear/dropbear/dropbear-disable-weak-ciphers.patch39
1 files changed, 15 insertions, 24 deletions
diff --git a/meta/recipes-core/dropbear/dropbear/dropbear-disable-weak-ciphers.patch b/meta/recipes-core/dropbear/dropbear/dropbear-disable-weak-ciphers.patch
index e48a34bac0..b54581f17a 100644
--- a/meta/recipes-core/dropbear/dropbear/dropbear-disable-weak-ciphers.patch
+++ b/meta/recipes-core/dropbear/dropbear/dropbear-disable-weak-ciphers.patch
@@ -1,33 +1,24 @@
1This feature disables all CBC, SHA1, and diffie-hellman group1 ciphers 1From c347ece05a7fdbf50d76cb136b9ed45caed333f6 Mon Sep 17 00:00:00 2001
2From: Joseph Reynolds <joseph.reynolds1@ibm.com>
3Date: Thu, 20 Jun 2019 16:29:15 -0500
4Subject: [PATCH] dropbear: new feature: disable-weak-ciphers
5
6This feature disables all CBC, SHA1, and diffie-hellman group1 ciphers
2in the dropbear ssh server and client since they're considered weak ciphers 7in the dropbear ssh server and client since they're considered weak ciphers
3and we want to support the stong algorithms. 8and we want to support the stong algorithms.
4 9
5Upstream-Status: Inappropriate [configuration] 10Upstream-Status: Inappropriate [configuration]
6Signed-off-by: Joseph Reynolds <joseph.reynolds1@ibm.com> 11Signed-off-by: Joseph Reynolds <joseph.reynolds1@ibm.com>
7 12
8Index: dropbear-2019.78/default_options.h 13---
9=================================================================== 14 default_options.h | 4 ++--
10--- dropbear-2019.78.orig/default_options.h 15 1 file changed, 2 insertions(+), 2 deletions(-)
11+++ dropbear-2019.78/default_options.h 16
12@@ -91,7 +91,7 @@ IMPORTANT: Some options will require "ma 17diff --git a/default_options.h b/default_options.h
13 18index 1aa2297..7ff1394 100644
14 /* Enable CBC mode for ciphers. This has security issues though 19--- a/default_options.h
15 * is the most compatible with older SSH implementations */ 20+++ b/default_options.h
16-#define DROPBEAR_ENABLE_CBC_MODE 1 21@@ -163,12 +163,12 @@ IMPORTANT: Some options will require "make clean" after changes */
17+#define DROPBEAR_ENABLE_CBC_MODE 0
18
19 /* Enable "Counter Mode" for ciphers. This is more secure than
20 * CBC mode against certain attacks. It is recommended for security
21@@ -101,7 +101,7 @@ IMPORTANT: Some options will require "ma
22 /* Message integrity. sha2-256 is recommended as a default,
23 sha1 for compatibility */
24 #define DROPBEAR_SHA1_HMAC 1
25-#define DROPBEAR_SHA1_96_HMAC 1
26+#define DROPBEAR_SHA1_96_HMAC 0
27 #define DROPBEAR_SHA2_256_HMAC 1
28
29 /* Hostkey/public key algorithms - at least one required, these are used
30@@ -149,12 +149,12 @@ IMPORTANT: Some options will require "ma
31 * Small systems should generally include either curve25519 or ecdh for performance. 22 * Small systems should generally include either curve25519 or ecdh for performance.
32 * curve25519 is less widely supported but is faster 23 * curve25519 is less widely supported but is faster
33 */ 24 */