1dropbear(8) System Manager's Manual dropbear(8)
2
3
4
6 dropbear - lightweight SSH server
7
9 dropbear [flag arguments] [-b banner] [-r hostkeyfile] [-p [ad‐
10 dress:]port]
11
13 dropbear is a small SSH server
14
16 -b banner
17 bannerfile. Display the contents of the file banner before user
18 login (default: none).
19
20 -r hostkey
21 Use the contents of the file hostkey for the SSH hostkey. This
22 file is generated with dropbearkey(1) or automatically with the
23 '-R' option. See "Host Key Files" below.
24
25 -R Generate hostkeys automatically. See "Host Key Files" below.
26
27 -F Don't fork into background.
28
29 -E Log to standard error rather than syslog.
30
31 -e Pass on the server environment to all child processes. This is
32 required, for example, if Dropbear is launched on the fly from a
33 SLURM workload manager. The environment is not passed by de‐
34 fault. Note that this could expose secrets in environment vari‐
35 ables from the calling process - use with caution.
36
37 -m Don't display the message of the day on login.
38
39 -w Disallow root logins.
40
41 -s Disable password logins.
42
43 -g Disable password logins for root.
44
45 -j Disable local port forwarding.
46
47 -k Disable remote port forwarding.
48
49 -p [address:]port
50 Listen on specified address and TCP port. If just a port is
51 given listen on all addresses. Up to 10 can be specified (de‐
52 fault 22 if none specified).
53
54 -i Service program mode. Use this option to run dropbear under
55 TCP/IP servers like inetd, tcpsvd, or tcpserver. In program
56 mode the -F option is implied, and -p options are ignored.
57
58 -P pidfile
59 Specify a pidfile to create when running as a daemon. If not
60 specified, the default is /var/run/dropbear.pid
61
62 -a Allow remote hosts to connect to forwarded ports.
63
64 -W windowsize
65 Specify the per-channel receive window buffer size. Increasing
66 this may improve network performance at the expense of memory
67 use. Use -h to see the default buffer size.
68
69 -K timeout_seconds
70 Ensure that traffic is transmitted at a certain interval in sec‐
71 onds. This is useful for working around firewalls or routers
72 that drop connections after a certain period of inactivity. The
73 trade-off is that a session may be closed if there is a tempo‐
74 rary lapse of network connectivity. A setting of 0 disables
75 keepalives. If no response is received for 3 consecutive
76 keepalives the connection will be closed.
77
78 -I idle_timeout
79 Disconnect the session if no traffic is transmitted or received
80 for idle_timeout seconds.
81
82 -T max_authentication_attempts
83 Set the number of authentication attempts allowed per connec‐
84 tion. If unspecified the default is 10 (MAX_AUTH_TRIES)
85
86 -c forced_command
87 Disregard the command provided by the user and always run
88 forced_command. This also overrides any authorized_keys command=
89 option. The original command is saved in the SSH_ORIGINAL_COM‐
90 MAND environment variable (see below).
91
92 -V Print the version
93
94
96 Authorized Keys
97
98 ~/.ssh/authorized_keys can be set up to allow remote login with
99 a RSA, ECDSA, Ed25519 or DSS key. Each line is of the form
100
101 [restrictions] ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIgAsp... [comment]
102
103 and can be extracted from a Dropbear private host key with
104 "dropbearkey -y". This is the same format as used by OpenSSH,
105 though the restrictions are a subset (keys with unknown restric‐
106 tions are ignored). Restrictions are comma separated, with dou‐
107 ble quotes around spaces in arguments. Available restrictions
108 are:
109
110
111 no-port-forwarding
112 Don't allow port forwarding for this connection
113
114
115 no-agent-forwarding
116 Don't allow agent forwarding for this connection
117
118
119 no-X11-forwarding
120 Don't allow X11 forwarding for this connection
121
122
123 no-pty Disable PTY allocation. Note that a user can still obtain most
124 of the same functionality with other means even if no-pty is
125 set.
126
127
128 restrict
129 Applies all the no- restrictions listed above.
130
131
132 command="forced_command"
133 Disregard the command provided by the user and always run
134 forced_command. The -c command line option overrides this.
135
136 The authorized_keys file and its containing ~/.ssh directory
137 must only be writable by the user, otherwise Dropbear will not
138 allow a login using public key authentication.
139
140
141 Host Key Files
142
143 Host key files are read at startup from a standard location, by
144 default /etc/dropbear/dropbear_dss_host_key, /etc/dropbear/drop‐
145 bear_rsa_host_key, /etc/dropbear/dropbear_ecdsa_host_key and
146 /etc/dropbear/dropbear_ed25519_host_key
147
148 If the -r command line option is specified the default files are
149 not loaded. Host key files are of the form generated by drop‐
150 bearkey. The -R option can be used to automatically generate
151 keys in the default location - keys will be generated after
152 startup when the first connection is established. This had the
153 benefit that the system /dev/urandom random number source has a
154 better chance of being securely seeded.
155
156
157 Message Of The Day
158
159 By default the file /etc/motd will be printed for any login
160 shell (unless disabled at compile-time). This can also be dis‐
161 abled per-user by creating a file ~/.hushlogin .
162
163
165 Dropbear sets the standard variables USER, LOGNAME, HOME, SHELL, PATH,
166 and TERM.
167
168 The variables below are set for sessions as appropriate.
169
170
171 SSH_TTY
172 This is set to the allocated TTY if a PTY was used.
173
174
175 SSH_CONNECTION
176 Contains "<remote_ip> <remote_port> <local_ip> <local_port>".
177
178
179 DISPLAY
180 Set X11 forwarding is used.
181
182
183 SSH_ORIGINAL_COMMAND
184 If a 'command=' authorized_keys option was used, the original
185 command is specified in this variable. If a shell was requested
186 this is set to an empty value.
187
188
189 SSH_AUTH_SOCK
190 Set to a forwarded ssh-agent connection.
191
192
194 Dropbear only supports SSH protocol version 2.
195
196
198 Matt Johnston (matt@ucc.asn.au).
199 Gerrit Pape (pape@smarden.org) wrote this manual page.
200
202 dropbearkey(1), dbclient(1), dropbearconvert(1)
203
204 https://matt.ucc.asn.au/dropbear/dropbear.html
205
206
207
208 dropbear(8)