1999-11-12 04:35:58 +01:00
|
|
|
1. Prerequisites
|
|
|
|
----------------
|
|
|
|
|
|
|
|
You will need working installations of Zlib and OpenSSL.
|
|
|
|
|
2005-04-24 09:52:22 +02:00
|
|
|
Zlib 1.1.4 or 1.2.1.2 or greater (ealier 1.2.x versions have problems):
|
2003-11-21 13:48:55 +01:00
|
|
|
http://www.gzip.org/zlib/
|
1999-11-12 04:35:58 +01:00
|
|
|
|
2002-03-07 18:49:39 +01:00
|
|
|
OpenSSL 0.9.6 or greater:
|
1999-11-12 04:35:58 +01:00
|
|
|
http://www.openssl.org/
|
|
|
|
|
2003-11-21 13:48:55 +01:00
|
|
|
(OpenSSL 0.9.5a is partially supported, but some ciphers (SSH protocol 1
|
2002-07-25 06:36:24 +02:00
|
|
|
Blowfish) do not work correctly.)
|
2000-04-13 04:19:32 +02:00
|
|
|
|
2006-06-30 08:20:58 +02:00
|
|
|
The remaining items are optional.
|
|
|
|
|
2003-11-21 13:48:55 +01:00
|
|
|
NB. If you operating system supports /dev/random, you should configure
|
|
|
|
OpenSSL to use it. OpenSSH relies on OpenSSL's direct support of
|
2011-05-05 05:48:37 +02:00
|
|
|
/dev/random, or failing that, either prngd or egd
|
1999-12-26 03:36:11 +01:00
|
|
|
|
2001-01-25 00:51:46 +01:00
|
|
|
PRNGD:
|
|
|
|
|
2007-04-06 04:25:08 +02:00
|
|
|
If your system lacks kernel-based random collection, the use of Lutz
|
2001-01-25 00:51:46 +01:00
|
|
|
Jaenicke's PRNGd is recommended.
|
|
|
|
|
2007-04-06 04:25:08 +02:00
|
|
|
http://prngd.sourceforge.net/
|
2001-01-25 00:51:46 +01:00
|
|
|
|
|
|
|
EGD:
|
|
|
|
|
2000-05-09 07:03:37 +02:00
|
|
|
The Entropy Gathering Daemon (EGD) is supported if you have a system which
|
|
|
|
lacks /dev/random and don't want to use OpenSSH's internal entropy collection.
|
1999-11-12 04:35:58 +01:00
|
|
|
|
|
|
|
http://www.lothar.com/tech/crypto/
|
|
|
|
|
2007-08-17 14:12:14 +02:00
|
|
|
PAM:
|
|
|
|
|
2007-08-17 14:03:09 +02:00
|
|
|
OpenSSH can utilise Pluggable Authentication Modules (PAM) if your
|
|
|
|
system supports it. PAM is standard most Linux distributions, Solaris,
|
|
|
|
HP-UX 11, AIX >= 5.2, FreeBSD and NetBSD.
|
|
|
|
|
|
|
|
Information about the various PAM implementations are available:
|
|
|
|
|
|
|
|
Solaris PAM: http://www.sun.com/software/solaris/pam/
|
|
|
|
Linux PAM: http://www.kernel.org/pub/linux/libs/pam/
|
|
|
|
OpenPAM: http://www.openpam.org/
|
|
|
|
|
|
|
|
If you wish to build the GNOME passphrase requester, you will need the GNOME
|
|
|
|
libraries and headers.
|
|
|
|
|
|
|
|
GNOME:
|
|
|
|
http://www.gnome.org/
|
|
|
|
|
|
|
|
Alternatively, Jim Knoble <jmknoble@pobox.com> has written an excellent X11
|
|
|
|
passphrase requester. This is maintained separately at:
|
|
|
|
|
|
|
|
http://www.jmknoble.net/software/x11-ssh-askpass/
|
|
|
|
|
2007-08-17 14:52:05 +02:00
|
|
|
TCP Wrappers:
|
|
|
|
|
|
|
|
If you wish to use the TCP wrappers functionality you will need at least
|
|
|
|
tcpd.h and libwrap.a, either in the standard include and library paths,
|
|
|
|
or in the directory specified by --with-tcp-wrappers. Version 7.6 is
|
|
|
|
known to work.
|
|
|
|
|
|
|
|
http://ftp.porcupine.org/pub/security/index.html
|
|
|
|
|
2000-11-10 03:41:30 +01:00
|
|
|
S/Key Libraries:
|
2005-04-19 07:31:49 +02:00
|
|
|
|
2005-04-19 07:40:51 +02:00
|
|
|
If you wish to use --with-skey then you will need the library below
|
|
|
|
installed. No other S/Key library is currently known to be supported.
|
2005-04-19 07:31:49 +02:00
|
|
|
|
2000-11-10 03:41:30 +01:00
|
|
|
http://www.sparc.spb.su/solaris/skey/
|
|
|
|
|
2004-11-07 10:14:34 +01:00
|
|
|
LibEdit:
|
2006-06-23 13:05:12 +02:00
|
|
|
|
|
|
|
sftp supports command-line editing via NetBSD's libedit. If your platform
|
|
|
|
has it available natively you can use that, alternatively you might try
|
|
|
|
these multi-platform ports:
|
2005-04-19 07:31:49 +02:00
|
|
|
|
2004-11-07 10:14:34 +01:00
|
|
|
http://www.thrysoee.dk/editline/
|
|
|
|
http://sourceforge.net/projects/libedit/
|
|
|
|
|
2011-11-04 01:25:24 +01:00
|
|
|
LDNS:
|
|
|
|
|
|
|
|
LDNS is a DNS BSD-licensed resolver library which supports DNSSEC.
|
|
|
|
|
|
|
|
http://nlnetlabs.nl/projects/ldns/
|
|
|
|
|
2006-06-30 08:20:58 +02:00
|
|
|
Autoconf:
|
|
|
|
|
2006-07-06 11:12:08 +02:00
|
|
|
If you modify configure.ac or configure doesn't exist (eg if you checked
|
2007-03-02 07:53:41 +01:00
|
|
|
the code out of CVS yourself) then you will need autoconf-2.61 to rebuild
|
|
|
|
the automatically generated files by running "autoreconf". Earlier
|
2007-08-17 13:40:22 +02:00
|
|
|
versions may also work but this is not guaranteed.
|
2006-06-30 08:20:58 +02:00
|
|
|
|
|
|
|
http://www.gnu.org/software/autoconf/
|
|
|
|
|
2006-09-17 14:55:52 +02:00
|
|
|
Basic Security Module (BSM):
|
|
|
|
|
|
|
|
Native BSM support is know to exist in Solaris from at least 2.5.1,
|
|
|
|
FreeBSD 6.1 and OS X. Alternatively, you may use the OpenBSM
|
|
|
|
implementation (http://www.openbsm.org).
|
|
|
|
|
2006-06-30 08:20:58 +02:00
|
|
|
|
1999-11-12 04:35:58 +01:00
|
|
|
2. Building / Installation
|
|
|
|
--------------------------
|
|
|
|
|
|
|
|
To install OpenSSH with default options:
|
|
|
|
|
|
|
|
./configure
|
|
|
|
make
|
|
|
|
make install
|
|
|
|
|
|
|
|
This will install the OpenSSH binaries in /usr/local/bin, configuration files
|
|
|
|
in /usr/local/etc, the server in /usr/local/sbin, etc. To specify a different
|
|
|
|
installation prefix, use the --prefix option to configure:
|
|
|
|
|
|
|
|
./configure --prefix=/opt
|
|
|
|
make
|
|
|
|
make install
|
|
|
|
|
2003-11-21 13:48:55 +01:00
|
|
|
Will install OpenSSH in /opt/{bin,etc,lib,sbin}. You can also override
|
1999-11-12 04:35:58 +01:00
|
|
|
specific paths, for example:
|
|
|
|
|
|
|
|
./configure --prefix=/opt --sysconfdir=/etc/ssh
|
|
|
|
make
|
|
|
|
make install
|
|
|
|
|
|
|
|
This will install the binaries in /opt/{bin,lib,sbin}, but will place the
|
|
|
|
configuration files in /etc/ssh.
|
|
|
|
|
2005-04-19 04:21:21 +02:00
|
|
|
If you are using Privilege Separation (which is enabled by default)
|
|
|
|
then you will also need to create the user, group and directory used by
|
|
|
|
sshd for privilege separation. See README.privsep for details.
|
|
|
|
|
2001-04-20 22:56:21 +02:00
|
|
|
If you are using PAM, you may need to manually install a PAM control
|
|
|
|
file as "/etc/pam.d/sshd" (or wherever your system prefers to keep
|
|
|
|
them). Note that the service name used to start PAM is __progname,
|
|
|
|
which is the basename of the path of your sshd (e.g., the service name
|
|
|
|
for /usr/sbin/osshd will be osshd). If you have renamed your sshd
|
|
|
|
executable, your PAM configuration may need to be modified.
|
|
|
|
|
|
|
|
A generic PAM configuration is included as "contrib/sshd.pam.generic",
|
|
|
|
you may need to edit it before using it on your system. If you are
|
|
|
|
using a recent version of Red Hat Linux, the config file in
|
|
|
|
contrib/redhat/sshd.pam should be more useful. Failure to install a
|
|
|
|
valid PAM file may result in an inability to use password
|
|
|
|
authentication. On HP-UX 11 and Solaris, the standard /etc/pam.conf
|
|
|
|
configuration will work with sshd (sshd will match the other service
|
2000-11-07 15:47:51 +01:00
|
|
|
name).
|
1999-11-22 06:12:31 +01:00
|
|
|
|
1999-11-12 04:35:58 +01:00
|
|
|
There are a few other options to the configure script:
|
|
|
|
|
2006-09-17 14:55:52 +02:00
|
|
|
--with-audit=[module] enable additional auditing via the specified module.
|
|
|
|
Currently, drivers for "debug" (additional info via syslog) and "bsm"
|
|
|
|
(Sun's Basic Security Module) are supported.
|
|
|
|
|
2003-09-23 14:12:38 +02:00
|
|
|
--with-pam enables PAM support. If PAM support is compiled in, it must
|
|
|
|
also be enabled in sshd_config (refer to the UsePAM directive).
|
1999-11-12 04:35:58 +01:00
|
|
|
|
2003-11-21 13:48:55 +01:00
|
|
|
--with-prngd-socket=/some/file allows you to enable EGD or PRNGD
|
|
|
|
support and to specify a PRNGd socket. Use this if your Unix lacks
|
|
|
|
/dev/random and you don't want to use OpenSSH's builtin entropy
|
2001-03-03 14:29:20 +01:00
|
|
|
collection support.
|
|
|
|
|
2003-11-21 13:48:55 +01:00
|
|
|
--with-prngd-port=portnum allows you to enable EGD or PRNGD support
|
|
|
|
and to specify a EGD localhost TCP port. Use this if your Unix lacks
|
|
|
|
/dev/random and you don't want to use OpenSSH's builtin entropy
|
2001-01-25 00:51:46 +01:00
|
|
|
collection support.
|
1999-11-12 04:35:58 +01:00
|
|
|
|
2003-11-21 13:48:55 +01:00
|
|
|
--with-lastlog=FILE will specify the location of the lastlog file.
|
1999-12-30 05:50:54 +01:00
|
|
|
./configure searches a few locations for lastlog, but may not find
|
|
|
|
it if lastlog is installed in a different place.
|
|
|
|
|
|
|
|
--without-lastlog will disable lastlog support entirely.
|
|
|
|
|
2003-11-21 13:48:55 +01:00
|
|
|
--with-osfsia, --without-osfsia will enable or disable OSF1's Security
|
2001-05-08 22:42:28 +02:00
|
|
|
Integration Architecture. The default for OSF1 machines is enable.
|
|
|
|
|
2003-11-21 13:48:55 +01:00
|
|
|
--with-skey=PATH will enable S/Key one time password support. You will
|
2000-11-10 03:41:30 +01:00
|
|
|
need the S/Key libraries and header files installed for this to work.
|
1999-11-19 05:53:50 +01:00
|
|
|
|
|
|
|
--with-tcp-wrappers will enable TCP Wrappers (/etc/hosts.allow|deny)
|
2007-08-17 14:52:05 +02:00
|
|
|
support.
|
1999-11-19 05:53:50 +01:00
|
|
|
|
|
|
|
--with-md5-passwords will enable the use of MD5 passwords. Enable this
|
2003-10-21 04:41:14 +02:00
|
|
|
if your operating system uses MD5 passwords and the system crypt() does
|
|
|
|
not support them directly (see the crypt(3/3c) man page). If enabled, the
|
|
|
|
resulting binary will support both MD5 and traditional crypt passwords.
|
1999-11-12 05:46:08 +01:00
|
|
|
|
2003-11-21 13:48:55 +01:00
|
|
|
--with-utmpx enables utmpx support. utmpx support is automatic for
|
1999-12-30 05:50:54 +01:00
|
|
|
some platforms.
|
|
|
|
|
|
|
|
--without-shadow disables shadow password support.
|
|
|
|
|
2003-11-21 13:48:55 +01:00
|
|
|
--with-ipaddr-display forces the use of a numeric IP address in the
|
1999-12-30 05:50:54 +01:00
|
|
|
$DISPLAY environment variable. Some broken systems need this.
|
|
|
|
|
|
|
|
--with-default-path=PATH allows you to specify a default $PATH for sessions
|
2000-03-17 00:54:15 +01:00
|
|
|
started by sshd. This replaces the standard path entirely.
|
1999-12-30 05:50:54 +01:00
|
|
|
|
2007-08-17 14:10:10 +02:00
|
|
|
--with-pid-dir=PATH specifies the directory in which the sshd.pid file is
|
2000-01-16 02:05:18 +01:00
|
|
|
created.
|
|
|
|
|
|
|
|
--with-xauth=PATH specifies the location of the xauth binary
|
|
|
|
|
2000-02-03 03:58:51 +01:00
|
|
|
--with-ssl-dir=DIR allows you to specify where your OpenSSL libraries
|
|
|
|
are installed.
|
|
|
|
|
2006-02-20 10:17:35 +01:00
|
|
|
--with-ssl-engine enables OpenSSL's (hardware) ENGINE support
|
|
|
|
|
2000-03-16 01:51:09 +01:00
|
|
|
--with-4in6 Check for IPv4 in IPv6 mapped addresses and convert them to
|
|
|
|
real (AF_INET) IPv4 addresses. Works around some quirks on Linux.
|
|
|
|
|
1999-12-28 05:09:35 +01:00
|
|
|
If you need to pass special options to the compiler or linker, you
|
2000-05-17 14:53:33 +02:00
|
|
|
can specify these as environment variables before running ./configure.
|
1999-12-28 05:09:35 +01:00
|
|
|
For example:
|
|
|
|
|
2000-08-31 02:13:10 +02:00
|
|
|
CFLAGS="-O -m486" LDFLAGS="-s" LIBS="-lrubbish" LD="/usr/foo/ld" ./configure
|
1999-11-12 04:35:58 +01:00
|
|
|
|
|
|
|
3. Configuration
|
|
|
|
----------------
|
|
|
|
|
2003-11-21 13:48:55 +01:00
|
|
|
The runtime configuration files are installed by in ${prefix}/etc or
|
1999-11-12 04:35:58 +01:00
|
|
|
whatever you specified as your --sysconfdir (/usr/local/etc by default).
|
|
|
|
|
2003-11-21 13:48:55 +01:00
|
|
|
The default configuration should be instantly usable, though you should
|
1999-11-12 04:35:58 +01:00
|
|
|
review it to ensure that it matches your security requirements.
|
|
|
|
|
2000-03-03 12:13:52 +01:00
|
|
|
To generate a host key, run "make host-key". Alternately you can do so
|
2003-11-21 13:48:55 +01:00
|
|
|
manually using the following commands:
|
1999-11-15 13:34:11 +01:00
|
|
|
|
2001-02-18 02:58:24 +01:00
|
|
|
ssh-keygen -t rsa1 -f /etc/ssh/ssh_host_key -N ""
|
|
|
|
ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key -N ""
|
|
|
|
ssh-keygen -t dsa -f /etc/ssh/ssh_host_dsa_key -N ""
|
1999-11-15 13:34:11 +01:00
|
|
|
|
1999-12-14 05:43:03 +01:00
|
|
|
Replacing /etc/ssh with the correct path to the configuration directory.
|
2003-11-21 13:48:55 +01:00
|
|
|
(${prefix}/etc or whatever you specified with --sysconfdir during
|
1999-12-14 05:43:03 +01:00
|
|
|
configuration)
|
|
|
|
|
1999-12-16 03:05:30 +01:00
|
|
|
If you have configured OpenSSH with EGD support, ensure that EGD is
|
|
|
|
running and has collected some Entropy.
|
|
|
|
|
2003-11-21 13:48:55 +01:00
|
|
|
For more information on configuration, please refer to the manual pages
|
1999-11-12 04:35:58 +01:00
|
|
|
for sshd, ssh and ssh-agent.
|
|
|
|
|
2005-01-18 02:05:18 +01:00
|
|
|
4. (Optional) Send survey
|
|
|
|
-------------------------
|
|
|
|
|
|
|
|
$ make survey
|
2006-06-23 13:05:12 +02:00
|
|
|
[check the contents of the file "survey" to ensure there's no information
|
|
|
|
that you consider sensitive]
|
2005-01-18 02:05:18 +01:00
|
|
|
$ make send-survey
|
|
|
|
|
|
|
|
This will send configuration information for the currently configured
|
|
|
|
host to a survey address. This will help determine which configurations
|
|
|
|
are actually in use, and what valid combinations of configure options
|
|
|
|
exist. The raw data is available only to the OpenSSH developers, however
|
|
|
|
summary data may be published.
|
|
|
|
|
|
|
|
5. Problems?
|
1999-12-14 05:43:03 +01:00
|
|
|
------------
|
|
|
|
|
2003-11-21 13:48:55 +01:00
|
|
|
If you experience problems compiling, installing or running OpenSSH.
|
1999-12-14 05:43:03 +01:00
|
|
|
Please refer to the "reporting bugs" section of the webpage at
|
2000-05-17 14:53:33 +02:00
|
|
|
http://www.openssh.com/
|
1999-12-14 05:43:03 +01:00
|
|
|
|
2001-02-09 02:55:35 +01:00
|
|
|
|
2011-11-04 01:25:24 +01:00
|
|
|
$Id: INSTALL,v 1.87 2011/11/04 00:25:25 dtucker Exp $
|