On Thu, Mar 26, 2009 at 02:05:02AM -0400, Paul Smith wrote: > In openssh I can do this by setting the SSH daemon parameter to not fail > on empty passwords. > > But, I can't find anything similar in dropbear. Googling around I found > references to a "allow-nopw.patch" which supposedly adds this but I > can't find the patch itself. From what I have been able to see it seems > the patch just #ifdefs out the checks. I was hoping for something that > would add a command-line option to dropbear to disable this check... > something that might even have a chance of being supported officially. > > Is there any interest in something like this?
I guess that would be useful - patches happily accepted :) > > > The second thing is that a have a number of systems already deployed, > and they contain host keys generated by OpenSSH's keygen. However, when > I try to invoke the dropbear server and point it at those > OpenSSH-generated keys, it just fails for me with an error about a line > that's too long. Is it possible to get dropbear to use an > OpenSSH-generated host key? The dropbearconvert program can convert to/from OpenSSH keys, as long as they are not encrypted. Cheers, Matt