-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dropbear server support #633
Comments
Beware that the kind of environments where we find Dropbear (e.g. it's the default sshd for OpenWRT) are likely to be resource constrained and may also be on instruction set architectures that aren't supported by Dart (or be using libc that can't be used by Dart AOT binaries). |
My environment is based on a buildroot arm64 embedded device. Currently, I have copied the sshnoport arm64 Linux binary file into the device, and I can perform preliminary execution as follows: Invalid argument(s): Option atsign is mandatory. Does this imply that Dart AOT binaries can be executed normally? |
Hi @KunChiLu getting the usage info to print like you have shows that the Dart AOT binary is indeed working :) This is good news, as it limits the problem at hand to interoperability with Dropbear rather than the range of other issues we've tripped across in other environments. |
DropBear on OpenWRT does not accept the following in the authorized_hosts file
It is mentioned in the documentation but when using it the server ignores the Key and prompts for a password. I do have a version of sshnpd in a docker container that works just fine with a sshd (Openssh) running on the host, but DropBear not supporting the above prevents sshnp working in a secure manner. moving to sshnpd in a Docker container and moving from Dropbear to Openssh seems to be prudent. I was testing against beta sshnpd (v5.0.2) in a docker container can be found on dockerhub at cconstab/sshnpd-slim I will continue testing on OpenWRT and provide documentation and prod version of the "slim" sshnpd docker container in the comming days - @cconstab |
@cconstab containers won't be an option on smaller devices. Can you drop in a link to that documentation that you found please. I think this is one of those things where you've got a full understanding of the issue and its consequences that maybe isn't completely coming through to the rest of us on this thread. |
Moving from Dropbear to Openssh using this as a guide and running the above mentioned sshnpd in a docker container worked fine..
|
https://matt.ucc.asn.au/dropbear/dropbear.html In this link and then documented in the Github Man page here https://github.com/mkj/dropbear/blob/master/manpages/dropbear.8 Search for |
@cpswan sorry been working on this waiting for an aircraft which has now arrived. Better/more details to come. |
@cconstab bear in mind that Dropbear on OpenWRT is tightly integrated into their UCI config system, so I'd expect the Dropbear maintainers to take a 'not our circus, not our clowns' approach. |
@cpswan .. The original ticket if for dropbear support so I will address that with the dropbear source. |
Based on my current experience, with Dropbear 2022.83, you can use permitopen, and ssh-keygen needs to be modified to dropbearkey and dropbearconvert. In noports-5.0.2: Change: (line 13) Change: (line112)
To:
And add:
Change: (line161)
to:
This should provide preliminary support for Dropbear. |
In my embedded system, I only have 24MB to install the entire Linux system. For me, if an application is larger than 3MB, it can be considered to occupy a significant amount of space. Currently, with the Dart version, sshnpd and srv occupy around 16.7MB of space, which makes it difficult for me to incorporate them into the system. I'm not sure if reducing the space usage further is possible with the C language version, but I'm hopeful for such a change.
|
We would be interested to know what TLS libs you are using as we need to use TLS. |
In my current environment, mbedtls is the default choice, and it is currently under development for TLS 1.3 support. According to the current roadmap, there is a possibility of improved TLS 1.3 support starting from version 3.6. TLS 1.2 is currently available. |
Great news! We are using mbedtls to develop the C version |
Is your feature request related to a problem? Please describe.
Use dropbear server in replacement of openssh-server with sshnpd.
Describe the solution you'd like
N/A
Describe alternatives you've considered
No response
Additional context
TCP local forwarding is required to be enabled with dropbear.
https://stackoverflow.com/questions/62648290/how-do-i-port-forward-in-dropbear-ssh
The text was updated successfully, but these errors were encountered: