| CARVIEW |
Select Language
HTTP/2 200
expires: Thu, 19 Nov 1981 08:52:00 GMT
cache-control: no-store, no-cache, must-revalidate
pragma: no-cache
set-cookie: PHPSESSID=gls1o72o35dfdtlumd05i9g3j2; path=/
content-type: text/html; charset=UTF-8
date: Sat, 27 Dec 2025 04:18:08 GMT
server: Apache
pkgsrc.se | The NetBSD package collection
archivers
audio
benchmarks
biology
cad
chat
comms
converters
cross
crosspkgtools
databases
devel
doc
editors
emulators
filesystems
finance
fonts
games
geography
graphics
ham
inputmethod
lang
mail
math
mbone
meta-pkgs
misc
multimedia
net
news
parallel
pkgtools
print
regress
security
dropbear
shells
sysutils
textproc
time
wip
wm
www
x11
* = Virtual Category
Path to this page:
./security/dropbear, Small SSH2 server and client, aimed at embedded market
[
Branch: CURRENT, Version: 2025.89, Package name: dropbear-2025.89, Maintainer: snj
The search for a small Secure Shell server to fit on a laptop with 4
megs ram and no hard disk was fruitless, so Matt Johnston decided to
write his own, and Dropbear is the result. It implements various
features of the SSH 2 protocol, including X11 and Authentication Agent
forwarding. Dropbear is Open Source software, distributed under a
MIT-style license. It includes a server, client and tools to
generate server keys and to convert OpenSSH keys for Dropbear.
Features
* A small memory footprint - Dropbear can compile to a 110kB
statically linked binary with uClibc (and only minimal options
selected).
* Implements X11 forwarding, and authentication-agent forwarding
for OpenSSH clients
* Compatible with OpenSSH ~/.ssh/authorized_keys public key
authentication
* Features can easily be disabled when compiling to save space.
* Preliminary TCP forwarding support (-L style only)
Required to run:
[math/ltm] [security/libtomcrypt]
Required to build:
[pkgtools/cwrappers]
Navigation:
-
Browse pkgsrc
(this page)
archivers
audio
benchmarks
biology
cad
chat
comms
converters
cross
crosspkgtools
databases
devel
doc
editors
emulators
filesystems
finance
fonts
games
geography
graphics
ham
inputmethod
lang
math
mbone
meta-pkgs
misc
multimedia
net
news
parallel
pkgtools
regress
security
dropbearshells
sysutils
textproc
time
wip
wm
www
x11
* = Virtual Category
Path to this page:
./security/dropbear, Small SSH2 server and client, aimed at embedded market
[
CVSweb ] [
Homepage ] [
RSS ] [
Required by ] [
Add to tracker ]
Branch: CURRENT, Version: 2025.89, Package name: dropbear-2025.89, Maintainer: snj
The search for a small Secure Shell server to fit on a laptop with 4
megs ram and no hard disk was fruitless, so Matt Johnston decided to
write his own, and Dropbear is the result. It implements various
features of the SSH 2 protocol, including X11 and Authentication Agent
forwarding. Dropbear is Open Source software, distributed under a
MIT-style license. It includes a server, client and tools to
generate server keys and to convert OpenSSH keys for Dropbear.
Features
* A small memory footprint - Dropbear can compile to a 110kB
statically linked binary with uClibc (and only minimal options
selected).
* Implements X11 forwarding, and authentication-agent forwarding
for OpenSSH clients
* Compatible with OpenSSH ~/.ssh/authorized_keys public key
authentication
* Features can easily be disabled when compiling to save space.
* Preliminary TCP forwarding support (-L style only)
Required to run:
[math/ltm] [security/libtomcrypt]
Required to build:
[pkgtools/cwrappers]
Master sites:
Filesize: 2318.365 KBVersion history: (Expand)
- (2025-12-22) Updated to version: dropbear-2025.89
- (2025-10-24) Package has been reborn
- (2025-10-24) Package deleted from pkgsrc
- (2025-07-24) Updated to version: dropbear-2025.88
- (2025-07-15) Package has been reborn
- (2025-07-15) Package deleted from pkgsrc
CVS history: (Expand)
| 2025-12-22 09:41:05 by Adam Ciarcinski | Files touched by this commit (3) | |
Log message: dropbear: updated to 2025.89 2025.89 - 16 December 2025 - Security: Avoid privilege escalation via unix stream forwarding in Dropbear server. Other programs on a system may authenticate unix sockets via SO_PEERCRED, which would be root user for Dropbear forwarded connections, allowing root privilege escalation. Reported by Turistu, and thanks for advice on the fix. This is tracked as CVE-2025-14282, and affects 2024.84 to 2025.88. It is fixed by dropping privileges of the dropbear process after authentication. Unix stream sockets are now disallowed when a forced command is used, either with authorized_key restrictions or "dropbear -c command". In previous affected releases running with "dropbear -j" (will also \ disable TCP fowarding) or building with localoptions.h/distrooptions.h "#define DROPBEAR_SVR_LOCALSTREAMFWD 0" is a mitigation. - Security: Include scp fix for CVE-2019-6111. This allowed a malicious server to overwrite arbitrary local files. The missing fix was reported by Ashish Kunwar. - Server dropping privileges post-auth is enabled by default. This requires setresgid() support, so some platforms such as netbsd or macos will have to disable DROPBEAR_SVR_DROP_PRIVS in localoptions.h. Unix stream forwarding is not available if DROPBEAR_SVR_DROP_PRIVS is disabled. Remote server TCP socket forwarding will now use OS privileged port restrictions rather than having a fixed "allow >=1024 for \ non-root" rule. A future release may implement privilege dropping for netbsd/macos. - Fix a regression in 2025.87 when RSA and DSS are not built. This would lead to a crash at startup with bad_bufptr(). Reported by Dani Schmitt and Sebastian Priebe. - Don't limit channel window to 500MB. That is could cause stuck connections if peers advise a large window and don't send an increment within 500MB. Affects SSH.NET https://github.com/sshnet/SSH.NET/issues/1671 Reported by Rob Hague. - Ignore -g -s when passwords arent enabled. Patch from Norbert Lange. Ignore -m (disable MOTD), -j/-k (tcp forwarding) when not enabled. - Report SIGBUS and SIGTRAP signals. Patch from Loïc Mangeonjean. - Fix incorrect server auth delay. Was meant to be 250-350ms, it was actually 150-350ms or possibly negative (zero). Reported by pickaxprograms. - Fix building without public key options. Thanks to Konstantin Demin - Fix building with proxycmd but without netcat. Thanks to Konstantin Demin - Fix incorrect path documentation for distrooptions, thanks to Todd Zullinger - Fix SO_REUSEADDR for TCP tests, reported by vt-alt. |
| 2025-07-24 15:11:38 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message: dropbear: updated to 2025.88 2025.88 - Security: Don't allow dbclient hostname arguments to be interpreted by the shell. dbclient hostname arguments with a comma (for multihop) would be passed to the shell which could result in running arbitrary shell commands locally. That could be a security issue in situations where dbclient is passed untrusted hostname arguments. Now the multihop command is executed directly, no shell is involved. Thanks to Marcin Nowak for the report, tracked as CVE-2025-47203 - Fix compatibility for htole64 and htole32, regression in 2025.87 Patch from Peter Fichtner to work with old GCC versions, and patch from Matt Robinson to check different header files. - Fix building on older compilers or libc that don't support static_assert(). Regression in 2025.87 - Support ~R in the client to force a key re-exchange. - Improve strict KEX handling. Dropbear previously would allow other packets at the end of key exchange prior to receiving the remote peer's NEWKEYS message, which should be forbidden by strict KEX. Reported by Fabian Bäumer. |
| 2025-05-04 15:17:39 by Nia Alarie | Files touched by this commit (5) |
Log message: dropbear: Various packaging improvements. - Add rc script. - Fix support for PKG_SYSCONFDIR. - Move PKG_OPITONS into options.mk. |
| 2025-03-06 12:53:50 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message: dropbear: updated to 2025.87 2025.87 - 5 March 2025 Note >> for compatibility/configuration changes - >> Disable SHA-1 algorithms by default. SHA-1 has known weakness and most implementations support alternatives. - Add post-quantum key exchange. These avoid the possibility of current stored traffic being decrypted using a possible future quantum computer. sntrup761 added by Matt Johnston, using sntrup761 implementation from Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange and Christine van Vredendaal, with integration work from OpenSSH. ML-KEM added by Loganaden Velvindron, Jaykishan Mutkawoa, Kavish Nadan, using libcrux, also based on OpenSSH work. These do increase code size, at least sntrup761 is recommended, see default_options.h - >> Decompression is disabled on the server, compression is still supported. This avoids attack surface for zlib and saves runtime memory. - Add -D server flag to specify authorized_keys directory, from Darren Tucker. - Include remote host in "Login attempt with wrong user" message for \ fail2ban, patch from MichaIng. - Workaround writing hostkeys on FUSE filesystem that don't support hardlinks, reported by elijahr. - Fix truncated error messages such as host key mismatch. - >> Preference aes256 ahead of aes128 for the client. chacha20-poly1305 is still first preference. - Fix ubsan failure in curve25519 code, reported by Steven Bytnar. Has no effect on execution. |
| 2024-11-21 20:06:41 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message: dropbear: updated to 2024.86 2024.86 - 22 October 2024 - Fix failure on concurrent channel open/close. - Print remote host after "Login attempt for nonexistent user" log entry to assist fail2ban. Fix from MichaIng, the format changed in 2020.79 - Dropbear now exits with exit status 0 on SIGINT/SIGTERM. This is a more graceful behaviour for "systemctl stop dropbear". Reported by Ninad Palsule - New IDENT_VERSION_PART config allows customising some of the SSH version string. From Marius Dinu - Fix building SK_KEYS with just one of ECDSA or ED25519 From Marius Dinu - Fix dbclient "-m help" and "-c help" without a hostname. Patch from Darren Tucker - Remove fprintf/gettimeofday from sigchld handler when running with verbose trace enabled. - Improved configure help output, from Mikel Olasagasti Uranga - Compile fix for GNU Hurd, from Guilhem Moulin - Support running test_aslr without venv, from Guilhem Moulin - Compilation fixes for older compilers, and better build tests - Update some test infrastructure versions of python packages, github actions, and github runner OSes |
| 2024-10-14 17:33:20 by Nia Alarie | Files touched by this commit (2) |
Log message: dropbear: fix non-portable mv usage |
| 2024-05-15 10:54:23 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message: dropbear: updated to 2024.85 2024.85 - 25 April 2024 This release fixes build regressions in 2024.84 - Fix build failure when SHA1 is disabled, thanks to Peter Krefting - Fix build failure when DROPBEAR_CLI_PUBKEY_AUTH disabled, thanks to Sergey Ponomarev - Update debian/ directory with changed paths |
| 2024-04-04 14:13:28 by Thomas Klausner | Files touched by this commit (11) | |
Log message: dropbear: update to 2024.84. 2024.84 - 4 April 2024 Features and Changes: Note >> for compatibility/configuration changes - >> Only use /etc/shadow when a user has :x: as the crypt in /etc/passwd. This is the documented behaviour of passwd(5) so should be consistent with other programs. Thanks to Paulo Cabral for the report. Note that any users without x as the crypt will not be able to log in with /etc/shadow, in cases were the existing configuration differs. - Support -o StrictHostKeyChecking, patch from Sergey Ponomarev - Support -o BatchMode, from Sergey Ponomarev and Hans Harder - Support various other -o options compatible with OpenSSH, from Sergey Ponomarev. Includes -o PasswordAuthentication - Add dbclient config file support, ~/.ssh/dropbear_config Thanks to tjkolev Disabled by default, set #define DROPBEAR_USE_SSH_CONFIG 1 - Add support for unix socket forwarding (destination) on the server, thanks to WangYi for the implementation - Add option to bind to interface, from Diederik De Coninck - Ignore unsupported arguments in dropbearkey, allow running binary as 'ssh-key'. From Sergey Ponomarev - Save a public key file on generation with dropbearkey. -C can be used for a comment, and choose a default key type (ed25519 first preference). Thanks to Sergey Ponomarev - Allow inetd to run in non-syslog modes. Thanks to Laurent Bercot for the report - Allow user's own gid in PTY permissions, lets Dropbear work as non-root even if /dev/pts isn't mounted with gid=5 - src/distrooptions.h can now be used as another config file. This can be used by distributions for customisations (separate to the build directory's localoptions.h) Fixes: - "dbclient host >> output" would previously overwrite \ "output", instead of appending. Thanks for the report from eSotoIoT - Add "Strict KEX" support. This mitigates a SSH protocol flaw which lets a MITM attacker silently remove packets immediately after the first key exchange. At present the flaw does not seem to reduce Dropbear's security (the only packet affected would be a server-sig-algs extension, which is used for compatibility not security). For Dropbear, chacha20-poly1305 is the only affected cipher. Both sides of the connection must support Strict KEX for it to be used. The protocol flaw is tracked as CVE-2023-48795, details at https://terrapin-attack.com . Thanks to the researchers Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk. Thanks to OpenSSH for specifying strict KEX mode. - Fix blocking while closing forwarded TCP sessions. Noticable when many connections are being forwarded. Reported and tested by GektorUA. Github #230 - Don't offer RSA (then fail) if there is no RSA key. Regression in 2020.79 Github #219 - Fix missing response to remote TCP requests when it is disabled. Patch from Justin Chen. Github #254 - Fix building with DROPBEAR_RSA disabled - /proc/timer_list is no longer used for entropy, it was a bottleneck. Thanks to Aleksei Plotnikov for the report. - Don't unconditionally enable DROPBEAR_DSS - Make banner reading failure non-fatal - Fix DROPBEAR_SVR_MULTIUSER. This appears to have been broken since when it was added in 2019. If you're using this let me know (it might be removed if I don't hear otherwise). Thanks to davidatrsp - Fix Y2038 issues Infrastructure: - Move source files to src/ subdirectory. Thanks to tjkolev - Remove more files with "make distclean" - Add tests for disabled options |
