summaryrefslogtreecommitdiffstats
path: root/package/dropbear_sshd/dropbear-0.45-urandom.patch
blob: a19490daa5e5160cb058af2b375c6d31a556fcbc (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
--- dropbear-0.45/options.h
+++ dropbear-0.45/options.h
@@ -148,6 +148,10 @@
 /* prngd must be manually set up to produce output */
 /*#define DROPBEAR_PRNGD_SOCKET "/var/run/dropbear-rng"*/
 
+/* If the normal random source would block for a while, fall back to 
+ * the urandom source so that connections don't hang forever. */
+#define DROPBEAR_URANDOM_DEV "/dev/urandom"
+
 /* Specify the number of clients we will allow to be connected but
  * not yet authenticated. After this limit, connections are rejected */
 #ifndef MAX_UNAUTH_CLIENTS
--- dropbear-0.45/random.c
+++ dropbear-0.45/random.c
@@ -57,9 +57,14 @@
 	struct sockaddr_un egdsock;
 	char egdcmd[2];
 #endif
+	mode_t readmode = O_RDONLY;
+#ifdef DROPBEAR_URANDOM_DEV
+	unsigned int readtries = 0;
+	readmode |= O_NONBLOCK;
+#endif
 
 #ifdef DROPBEAR_RANDOM_DEV
-	readfd = open(DROPBEAR_RANDOM_DEV, O_RDONLY);
+	readfd = open(DROPBEAR_RANDOM_DEV, readmode);
 	if (readfd < 0) {
 		dropbear_exit("couldn't open random device");
 	}
@@ -97,6 +102,24 @@
 			if (readlen < 0 && errno == EINTR) {
 				continue;
 			}
+#ifdef DROPBEAR_URANDOM_DEV
+			/* if the main random source blocked, lets retry a few times, 
+			 * but then give up and try a constant random source. */
+			if (readlen < 0 && errno == EAGAIN) {
+				++readtries;
+				if (readtries < 5) {
+					sleep(1);
+					continue;
+				} else if (readtries == 5) {
+					close (readfd);
+					readfd = open(DROPBEAR_URANDOM_DEV, readmode);
+					if (readfd < 0) {
+						dropbear_exit("couldn't open secondary random device");
+					}
+					continue;
+				}
+			}
+#endif
 			dropbear_exit("error reading random source");
 		}
 		readpos += readlen;