Matt Johnston d7622f846f
Some checks failed
Autoconf Up To Date / autoconf (push) Has been cancelled
BuildTest / build (#define DROPBEAR_CURVE25519 0 , pq, no plain x25519) (push) Has been cancelled
BuildTest / build (#define DROPBEAR_SHA1_HMAC 0 #define DROPBEAR_RSA_SHA1 0 #define DROPBEAR_DH_GROUP14_SHA1 0 #define DROPBEAR_ECDSA 0 #define DROPBEAR_ED25519 0 #define DROPBEAR_SK_KEYS 0 #define DROPBEAR_ENABLE_GCM_MODE 1 #define DROPBEAR_3DES 1 #define DROPBEA… (push) Has been cancelled
BuildTest / build (--disable-harden --disable-zlib --disable-openpty --disable-lastlog, #define DROPBEAR_RSA 0 #define INETD_MODE 0 #define DROPBEAR_REEXEC 0 #define DROPBEAR_SMALL_CODE 0 #define DROPBEAR_CLI_LOCALTCPFWD 0 #define DROPBEAR_CLI_REMOTETCPFWD 0 #defi… (push) Has been cancelled
BuildTest / build (--enable-bundled-libtom --enable-werror, bundled libtom, 22.04, no writev(), 1, ubuntu-22.04, no) (push) Has been cancelled
BuildTest / build (--enable-pam, #define DEBUG_TRACE 5 , DEBUG_TRACE, 1) (push) Has been cancelled
BuildTest / build (--enable-pam, -std=c89 -Wdeclaration-after-statement, #define DROPBEAR_SNTRUP761 0 #define DROPBEAR_MLKEM768 0 , c89, 1) (push) Has been cancelled
BuildTest / build (--enable-pam, nondefault options, 1) (push) Has been cancelled
BuildTest / build (1, 1, multi binary) (push) Has been cancelled
BuildTest / build (1, 1, multi binary, dropbearmulti argv0) (push) Has been cancelled
BuildTest / build (PROGRAMS=dbclient, client only, no) (push) Has been cancelled
BuildTest / build (PROGRAMS=dropbear, server only, no) (push) Has been cancelled
BuildTest / build (clang, linux clang) (push) Has been cancelled
BuildTest / build (no, clang, -Wno-deprecated-declarations -Wno-undef, #define DROPBEAR_SVR_DROP_PRIVS 0 #define DROPBEAR_SVR_LOCALSTREAMFWD 0 , macos 14, macos-14, ranlib -no_warning_for_no_symbols, no) (push) Has been cancelled
BuildTest / build (no, clang, -Wno-deprecated-declarations -Wno-undef, #define DROPBEAR_SVR_DROP_PRIVS 0 #define DROPBEAR_SVR_LOCALSTREAMFWD 0 , macos 15, macos-15, ranlib -no_warning_for_no_symbols, no) (push) Has been cancelled
BuildTest / build (plain linux, 1) (push) Has been cancelled
CIFuzz / Fuzzing (push) Has been cancelled
Out of tree build / outoftree (push) Has been cancelled
tarball sha256sum / tarball (push) Has been cancelled
Fix changelog typo
"fowarding"
2025-12-17 22:45:39 +08:00
2025-12-13 11:56:25 +09:00
2025-03-04 23:36:14 +08:00
2023-04-19 22:24:52 +08:00
2023-09-05 10:22:56 +02:00
2025-05-06 22:48:57 +08:00
2024-04-03 17:53:35 +08:00
2025-12-17 22:45:39 +08:00
2024-04-03 17:53:35 +08:00
2023-12-17 16:40:20 +08:00
2020-06-25 23:18:16 +08:00
2025-09-02 22:18:18 +08:00
2023-12-17 16:40:20 +08:00
2023-12-17 16:40:20 +08:00
2025-12-13 11:17:09 +09:00
2023-12-17 16:40:20 +08:00

Dropbear SSH

A smallish SSH server and client https://matt.ucc.asn.au/dropbear/dropbear.html

INSTALL.md has compilation instructions.

MULTI.md has instructions on making a multi-purpose binary (ie a single binary which performs multiple tasks, to save disk space).

SMALL.md has some tips on creating small binaries.

A mirror of the Dropbear website and tarballs is available at https://dropbear.nl/mirror/.

Please contact me if you have any questions/bugs found/features/ideas/comments etc There is also a mailing list https://lists.ucc.asn.au/mailman/listinfo/dropbear

Matt Johnston matt@ucc.asn.au

In the absence of detailed documentation, some notes follow


Server public key auth

You can use ~/.ssh/authorized_keys in the same way as with OpenSSH, just put the key entries in that file. They should be of the form:

ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAwVa6M6cGVmUcLl2cFzkxEoJd06Ub4bVDsYrWvXhvUV+ZAM9uGuewZBDoAqNKJxoIn0Hyd0NkyU99UVv6NWV/5YSHtnf35LKds56j7cuzoQpFIdjNwdxAN0PCET/MG8qyskG/2IE2DPNIaJ3Wy+Ws4IZEgdJgPlTYUBWWtCWOGc= someone@hostname

You must make sure that ~/.ssh, and the key file, are only writable by the user. Beware of editors that split the key into multiple lines.

Dropbear supports some options for authorized_keys entries, see the manpage.


Client public key auth

Dropbear can do public key auth as a client. But you will have to convert OpenSSH style keys to Dropbear format, or use dropbearkey to create them.

If you have an OpenSSH-style private key ~/.ssh/id_rsa, you need to do:

dropbearconvert openssh dropbear ~/.ssh/id_rsa  ~/.ssh/id_rsa.db
dbclient -i ~/.ssh/id_rsa.db <hostname>

Dropbear does not support encrypted hostkeys though can connect to ssh-agent.


If you want to get the public-key portion of a Dropbear private key, look at dropbearkey's -y option. It will print both public key and fingerprint. If you need the pub key only you can grep by a prefix ssh-:

./dropbearkey -y -f ~/.ssh/id_ed25519 | grep "^ssh-" > ~/.ssh/id_ed25519.pub

To run the server, you need to generate server keys, this is one-off:

./dropbearkey -t rsa -f dropbear_rsa_host_key
./dropbearkey -t dss -f dropbear_dss_host_key
./dropbearkey -t ecdsa -f dropbear_ecdsa_host_key
./dropbearkey -t ed25519 -f dropbear_ed25519_host_key

Or alternatively convert OpenSSH keys to Dropbear:

./dropbearconvert openssh dropbear /etc/ssh/ssh_host_dsa_key dropbear_dss_host_key

You can also get Dropbear to create keys when the first connection is made - this is preferable to generating keys when the system boots. Make sure /etc/dropbear/ exists and then pass -R to the dropbear server.


If the server is run as non-root, you most likely won't be able to allocate a pty, and you cannot login as any user other than that running the daemon (obviously). Shadow passwords will also be unusable as non-root.


The Dropbear distribution includes a standalone version of OpenSSH's scp program. You can compile it with make scp. You may want to change the path of the ssh binary, specified by _PATH_SSH_PROGRAM in options.h. By default the progress meter isn't compiled in to save space, you can enable it by adding SCPPROGRESS=1 to the make commandline.

Description
Dropbear SSH
Readme MIT 25 MiB
Languages
C 91.4%
TeX 5.2%
Makefile 1%
Shell 0.6%
Perl 0.5%
Other 1.3%