- (tim) update contrib/caldera files with what Caldera is using.

<sps@caldera.de>
This commit is contained in:
Tim Rice 2001-04-26 22:50:48 -07:00
parent bb34625b6c
commit a8c7a62ad4
5 changed files with 378 additions and 379 deletions

View File

@ -10,6 +10,8 @@
- (bal) Cygwin lacks setgroups() API. Patch by Corinna Vinschen - (bal) Cygwin lacks setgroups() API. Patch by Corinna Vinschen
<vinschen@redhat.com> <vinschen@redhat.com>
- (bal) version.h synced, RPM specs updated for 2.9 - (bal) version.h synced, RPM specs updated for 2.9
- (tim) update contrib/caldera files with what Caldera is using.
<sps@caldera.de>
20010425 20010425
- OpenBSD CVS Sync - OpenBSD CVS Sync
@ -5265,4 +5267,4 @@
- Wrote replacements for strlcpy and mkdtemp - Wrote replacements for strlcpy and mkdtemp
- Released 1.0pre1 - Released 1.0pre1
$Id: ChangeLog,v 1.1177 2001/04/27 02:15:00 mouring Exp $ $Id: ChangeLog,v 1.1178 2001/04/27 05:50:48 tim Exp $

View File

@ -1,340 +1,281 @@
# Version of OpenSSH %define askpass 1.2.0
%define oversion 2.9p1
# Version of ssh-askpass Name : openssh
%define aversion 1.2.0 Version : 2.9p1
Release : 1
Group : System/Network
# Do we want to disable building of x11-askpass? (1=yes 0=no) Summary : OpenSSH free Secure Shell (SSH) implementation.
%define no_x11_askpass 0 Summary(de) : OpenSSH - freie Implementation der Secure Shell (SSH).
Summary(es) : OpenSSH implementación libre de Secure Shell (SSH).
Summary(fr) : Implémentation libre du shell sécurisé OpenSSH (SSH).
Summary(it) : Implementazione gratuita OpenSSH della Secure Shell.
Summary(pt) : Implementação livre OpenSSH do protocolo 'Secure Shell' (SSH).
# Do we want to disable building of gnome-askpass? (1=yes 0=no) Copyright : BSD
%define no_gnome_askpass 1 Packager : Stephan Seyboth <sps@caldera.de>
#Icon : .
URL : http://www.openssh.com/
# Do we want to include contributed programs? (1=yes 0=no) Obsoletes : ssh, ssh-clients, openssh-clients
%define contrib_programs 1
Summary: OpenSSH free Secure Shell (SSH) implementation BuildRoot : /tmp/%{Name}-%{Version}
Name: openssh
Version: %{oversion}
Release: 1
Packager: Damien Miller <djm@mindrot.org>
URL: http://www.openssh.com/
Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{oversion}.tar.gz
Source1: http://www.ntrnet.net/~jmknoble/software/x11-ssh-askpass/x11-ssh-askpass-%{aversion}.tar.gz
Copyright: BSD
Group: Applications/Internet
BuildRoot: /var/tmp/openssh-%{Version}-buildroot
#BuildRoot: /tmp/openssh-%{Version}-buildroot
Obsoletes: ssh
PreReq: openssl >= 0.9.5a
Requires: openssl >= 0.9.5a
BuildPreReq: perl, openssl-devel, tcp_wrappers
BuildPreReq: /bin/login, /usr/bin/rsh, /usr/include/security/pam_appl.h
%if ! %{no_gnome_askpass}
BuildPreReq: gnome-libs-devel
%endif
%package clients Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{Version}.tar.gz
Summary: OpenSSH Secure Shell protocol clients Source1: http://www.ntrnet.net/~jmknoble/software/x11-ssh-askpass/x11-ssh-askpass-%{askpass}.tar.gz
Requires: openssh = %{Version}-%{release}
Group: Applications/Internet
Obsoletes: ssh-clients
%package server
Summary: OpenSSH Secure Shell protocol server (sshd)
Group: System Environment/Daemons
Obsoletes: ssh-server
#PreReq: openssh chkconfig >= 0.9
%package askpass %Package server
Summary: OpenSSH X11 passphrase dialog Group : System/Network
Group: Applications/Internet Requires : openssh = %{Version}
Requires: openssh = %{Version}-%{release} Obsoletes : ssh-server
Obsoletes: ssh-extras
%package askpass-gnome Summary : OpenSSH Secure Shell protocol server (sshd).
Summary: OpenSSH GNOME passphrase dialog Summary(de) : OpenSSH Secure Shell Protocol Server (sshd).
Group: Applications/Internet Summary(es) : Servidor del protocolo OpenSSH Secure Shell (sshd).
Requires: openssh = %{Version}-%{release} Summary(fr) : Serveur de protocole du shell sécurisé OpenSSH (sshd).
Obsoletes: ssh-extras Summary(it) : Server OpenSSH per il protocollo Secure Shell (sshd).
Summary(pt) : Servidor do protocolo 'Secure Shell' OpenSSH (sshd).
%description
Ssh (Secure Shell) a program for logging into a remote machine and for
executing commands in a remote machine. It is intended to replace
rlogin and rsh, and provide secure encrypted communications between
two untrusted hosts over an insecure network. X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.
OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it %Package askpass
up to date in terms of security and features, as well as removing all Group : System/Network
patented algorithms to separate libraries (OpenSSL). Requires : openssh = %{Version}
Obsoletes : ssh-extras
This package includes the core files necessary for both the OpenSSH Summary : OpenSSH X11 pass-phrase dialog.
client and server. To make this package useful, you should also Summary(de) : OpenSSH X11 Passwort-Dialog.
install openssh-clients, openssh-server, or both. Summary(es) : Aplicación de petición de frase clave OpenSSH X11.
Summary(fr) : Dialogue pass-phrase X11 d'OpenSSH.
Summary(it) : Finestra di dialogo X11 per la frase segreta di OpenSSH.
Summary(pt) : Diálogo de pedido de senha para X11 do OpenSSH.
%description clients
Ssh (Secure Shell) a program for logging into a remote machine and for
executing commands in a remote machine. It is intended to replace
rlogin and rsh, and provide secure encrypted communications between
two untrusted hosts over an insecure network. X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.
OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it %Description
up to date in terms of security and features, as well as removing all OpenSSH (Secure Shell) provides access to a remote system. It replaces
patented algorithms to separate libraries (OpenSSL). telnet, rlogin, rexec, and rsh, and provides secure encrypted
communications between two untrusted hosts over an insecure network.
X11 connections and arbitrary TCP/IP ports can also be forwarded over
the secure channel.
This package includes the clients necessary to make encrypted connections %Description -l de
to SSH servers. OpenSSH (Secure Shell) stellt den Zugang zu anderen Rechnern her. Es ersetzt
telnet, rlogin, rexec und rsh und stellt eine sichere, verschlüsselte
Verbindung zwischen zwei nicht vertrauenswürdigen Hosts über eine unsicheres
Netzwerk her. X11 Verbindungen und beliebige andere TCP/IP Ports können ebenso
über den sicheren Channel weitergeleitet werden.
%description server %Description -l es
Ssh (Secure Shell) a program for logging into a remote machine and for OpenSSH (Secure Shell) proporciona acceso a sistemas remotos. Reemplaza a
executing commands in a remote machine. It is intended to replace telnet, rlogin, rexec, y rsh, y proporciona comunicaciones seguras encriptadas
rlogin and rsh, and provide secure encrypted communications between entre dos equipos entre los que no se ha establecido confianza a través de una
two untrusted hosts over an insecure network. X11 connections and red insegura. Las conexiones X11 y puertos TCP/IP arbitrarios también pueden
arbitrary TCP/IP ports can also be forwarded over the secure channel. ser canalizadas sobre el canal seguro.
OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it %Description -l fr
up to date in terms of security and features, as well as removing all OpenSSH (Secure Shell) fournit un accès à un système distant. Il remplace
patented algorithms to separate libraries (OpenSSL). telnet, rlogin, rexec et rsh, tout en assurant des communications cryptées
securisées entre deux hôtes non fiabilisés sur un réseau non sécurisé. Des
connexions X11 et des ports TCP/IP arbitraires peuvent également être
transmis sur le canal sécurisé.
This package contains the secure shell daemon. The sshd is the server %Description -l it
part of the secure shell protocol and allows ssh clients to connect to OpenSSH (Secure Shell) fornisce l'accesso ad un sistema remoto.
your host. Sostituisce telnet, rlogin, rexec, e rsh, e fornisce comunicazioni sicure
e crittate tra due host non fidati su una rete non sicura. Le connessioni
X11 ad una porta TCP/IP arbitraria possono essere inoltrate attraverso
un canale sicuro.
%description askpass %Description -l pt
Ssh (Secure Shell) a program for logging into a remote machine and for OpenSSH (Secure Shell) fornece acesso a um sistema remoto. Substitui o
executing commands in a remote machine. It is intended to replace telnet, rlogin, rexec, e o rsh e fornece comunicações seguras e cifradas
rlogin and rsh, and provide secure encrypted communications between entre duas máquinas sem confiança mútua sobre uma rede insegura.
two untrusted hosts over an insecure network. X11 connections and Ligações X11 e portos TCP/IP arbitrários também poder ser reenviados
arbitrary TCP/IP ports can also be forwarded over the secure channel. pelos porto seguro.
OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it %Description server
up to date in terms of security and features, as well as removing all This package installs the sshd, the server portion of OpenSSH.
patented algorithms to separate libraries (OpenSSL).
This package contains Jim Knoble's <jmknoble@pobox.com> X11 passphrase %Description -l de server
dialog. Dieses Paket installiert den sshd, den Server-Teil der OpenSSH.
%description askpass-gnome %Description -l es server
Ssh (Secure Shell) a program for logging into a remote machine and for Este paquete instala sshd, la parte servidor de OpenSSH.
executing commands in a remote machine. It is intended to replace
rlogin and rsh, and provide secure encrypted communications between
two untrusted hosts over an insecure network. X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.
OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it %Description -l fr server
up to date in terms of security and features, as well as removing all Ce paquetage installe le 'sshd', partie serveur de OpenSSH.
patented algorithms to separate libraries (OpenSSL).
This package contains the GNOME passphrase dialog. %Description -l it server
Questo pacchetto installa sshd, il server di OpenSSH.
%prep %Description -l pt server
Este pacote intala o sshd, o servidor do OpenSSH.
%setup -a 1 %Description askpass
This package contains an X11-based passphrase dialog.
%build %Description -l de askpass
Dieses Paket enthält einen X11-basierten Passwort Dialog.
%define _sysconfdir /etc/ssh %Description -l es askpass
Este paquete contiene una aplicación para petición de frases-contraseña basada
en X11.
CFLAGS="$RPM_OPT_FLAGS" \ %Description -l fr askpass
./configure \ Ce paquetage contient un dialogue de passphrase basé sur X11.
--prefix=/usr \
--sysconfdir=/etc/ssh \ %Description -l it askpass
--libexecdir=%{_libexecdir}/openssh \ Questo pacchetto contiene una finestra di X11 che chiede la frase segreta.
--with-pam \
--with-tcp-wrappers \ %Description -l pt askpass
--with-ipv4-default \ Este pacote contém um diálogo de senha para o X11.
--with-rsh=/usr/bin/rsh
%Prep
%setup
%setup -D -T -a1
%Build
CFLAGS="$RPM_OPT_FLAGS" \
./configure \
--prefix=/usr \
--sysconfdir=/etc/ssh \
--libexecdir=/usr/lib/ssh \
--with-pam \
--with-tcp-wrappers \
--with-ipv4-default \
make make
%if ! %{no_x11_askpass} cd x11-ssh-askpass-%{askpass}
cd x11-ssh-askpass-%{aversion}
xmkmf -a xmkmf -a
make make
cd ..
%endif
%if ! %{no_gnome_askpass}
cd contrib
gcc -O -g `gnome-config --cflags gnome gnomeui` \
gnome-ssh-askpass.c -o gnome-ssh-askpass \
`gnome-config --libs gnome gnomeui`
cd ..
%endif
%install %Install
rm -rf $RPM_BUILD_ROOT %{mkDESTDIR}
make install DESTDIR=$RPM_BUILD_ROOT/
# setup the environment we want make DESTDIR="$DESTDIR" install
perl -pi -e "s,PermitRootLogin yes,PermitRootLogin no,;" \
-e "s,X11Forwarding no,X11Forwarding yes,;" \
-e "s,CheckMail no,CheckMail yes,;" \
-e "s,^#Subsystem sftp,Subsystem sftp,;" \
$RPM_BUILD_ROOT/etc/ssh/sshd_config
install -d $RPM_BUILD_ROOT/etc/pam.d/ make -C x11-ssh-askpass-%{askpass} DESTDIR="$DESTDIR" \
install -d $RPM_BUILD_ROOT/etc/rc.d/init.d BINDIR="/usr/lib/ssh" install
install -d $RPM_BUILD_ROOT/etc/sysconfig/daemons
install -d $RPM_BUILD_ROOT%{_libexecdir}/openssh
install -d $RPM_BUILD_ROOT/usr/local/bin
install -d $RPM_BUILD_ROOT/usr/local/man/man1
install -m644 contrib/caldera/sshd.pam $RPM_BUILD_ROOT/etc/pam.d/sshd
install -m755 contrib/caldera/sshd.init $RPM_BUILD_ROOT/etc/rc.d/init.d/sshd
install -m755 contrib/caldera/sshd.daemons $RPM_BUILD_ROOT/etc/sysconfig/daemons/sshd
perl -pi -e "s,\@OPENSSH_VERSION\@,%{Name}-%{Version},g" \
$RPM_BUILD_ROOT/etc/rc.d/init.d/sshd
perl -pi -e "s,\@OPENSSH_VERSION\@,%{Name}-%{Version},g" \
$RPM_BUILD_ROOT/etc/sysconfig/daemons/sshd
%if %{contrib_programs}
install -m755 contrib/make-ssh-known-hosts.pl $RPM_BUILD_ROOT/usr/local/bin
install -m644 contrib/make-ssh-known-hosts.1 $RPM_BUILD_ROOT/usr/local/man/man1
install -m755 contrib/ssh-copy-id $RPM_BUILD_ROOT/usr/local/bin
install -m644 contrib/ssh-copy-id.1 $RPM_BUILD_ROOT/usr/local/man/man1
%endif
%if ! %{no_x11_askpass} %{fixManPages}
install -s x11-ssh-askpass-%{aversion}/x11-ssh-askpass $RPM_BUILD_ROOT/usr/libexec/openssh/x11-ssh-askpass
ln -s /usr/libexec/openssh/x11-ssh-askpass $RPM_BUILD_ROOT/usr/libexec/openssh/ssh-askpass
install -d $RPM_BUILD_ROOT/usr/X11R6/man/man1
install -c -m 0444 x11-ssh-askpass-%{aversion}/x11-ssh-askpass.man $RPM_BUILD_ROOT/usr/X11R6/man/man1/x11-ssh-askpass.1x
ln -s /usr/X11R6/man/man1/x11-ssh-askpass.1x $RPM_BUILD_ROOT/usr/X11R6/man/man1/ssh-askpass.1x
%endif
%if ! %{no_gnome_askpass} # install remaining docs
install -s contrib/gnome-ssh-askpass $RPM_BUILD_ROOT/usr/libexec/openssh/gnome-ssh-askpass NV="$DESTDIR%{_defaultdocdir}/%{Name}-%{Version}"
%endif mkdir -p $NV
cp -a CREDITS ChangeLog LICENCE OVERVIEW README* TODO $NV
mkdir -p $NV/x11-ssh-askpass-%{askpass}
cp -a x11-ssh-askpass-%{askpass}/{README,ChangeLog,SshAskpass*.ad} \
$NV/x11-ssh-askpass-%{askpass}
%clean
##rm -rf $RPM_BUILD_ROOT
%post server # OpenLinux specific configuration
if [ "$1" = 1 ]; then mkdir -p $DESTDIR/{etc/pam.d,%{SVIcdir},%{SVIdir}}
echo "Creating SSH stop/start scripts in the rc directories..."
# /sbin/chkconfig --add sshd # enabling X11 forwarding on the server is convenient and okay,
lisa --SysV-init install sshd S90 2:3:4:5 K05 0:1:6 # on the client side it's a potential security risk!
fi %{fixUP} -vg $DESTDIR/etc/ssh/sshd_config 'X11Forwarding no' \
if test -r /var/run/sshd.pid 'X11Forwarding yes'
then
echo "Restarting the running SSH daemon..." install -m644 contrib/caldera/sshd.pam $DESTDIR/etc/pam.d/sshd
/etc/rc.d/init.d/sshd restart >&2 # FIXME: disabled, find out why this doesn't work with nis
%{fixUP} -vg $DESTDIR/etc/pam.d/sshd '(.*pam_limits.*)' '#$1'
install -m 0755 contrib/caldera/sshd.init $DESTDIR%{SVIdir}/sshd
%{fixUP} -T $DESTDIR/%{SVIdir} -e 's:\@SVIdir\@:%{SVIdir}:'
%{fixUP} -T $DESTDIR/%{SVIdir} -e 's:\@sysconfdir\@:/etc/ssh:'
cat <<-EoD > $DESTDIR%{SVIcdir}/sshd
IDENT=sshd
DESCRIPTIVE="OpenSSH secure shell daemon"
# This service will be marked as 'skipped' on boot if there
# is no host key. Use ssh-host-keygen to generate one
ONBOOT="yes"
OPTIONS=""
EoD
SKG=$DESTDIR/usr/sbin/ssh-host-keygen
install -m 0755 contrib/caldera/ssh-host-keygen $SKG
%{fixUP} -T $SKG -e 's:\@sysconfdir\@:/etc/ssh:'
%{fixUP} -T $SKG -e 's:\@sshkeygen\@:/usr/bin/ssh-keygen:'
# generate file lists
%{mkLists} -c %{Name}
%{mkLists} -d %{Name} << 'EOF'
/etc/ssh base
^/etc/ IGNORED
%{_defaultdocdir}/$ IGNORED
askpass askpass
* default
EOF
%{mkLists} -a -f %{Name} << 'EOF'
^/etc * prefix(%%config)
/usr/X11R6/lib/X11/app-defaults IGNORED
[Aa]skpass askpass
%{_defaultdocdir}/%{Name}-%{Version}/ base
ssh-keygen base
sshd server
sftp-server server
.* base
EOF
%Clean
%{rmDESTDIR}
%Post
# Generate host key when none is present to get up and running,
# both client and server require this for host-based auth!
# ssh-host-keygen checks for existing keys.
/usr/sbin/ssh-host-keygen
: # to protect the rpm database
%Post server
if [ -x %{LSBinit}-install ]; then
%{LSBinit}-install sshd
else else
echo "Starting the SSH daemon..." lisa --SysV-init install sshd S55 3:4:5 K45 0:1:2:6
/etc/rc.d/init.d/sshd start >&2
fi fi
%preun server ! %{SVIdir}/sshd status || %{SVIdir}/sshd restart
if [ "$1" = 0 ] ; then : # to protect the rpm database
echo "Stopping the SSH daemon..."
/etc/rc.d/init.d/sshd stop >&2
echo "Removing SSH stop/start scripts from the rc directories..." %PreUn server
# /sbin/chkconfig --del sshd [ "$1" = 0 ] || exit 0
lisa --SysV-init remove sshd $1
! %{SVIdir}/sshd status || %{SVIdir}/sshd stop
: # to protect the rpm database
%PostUn server
if [ -x %{LSBinit}-remove ]; then
%{LSBinit}-remove sshd
else
lisa --SysV-init remove sshd $1
fi fi
: # to protect the rpm database
%files
%Files -f files-%{Name}-base
%defattr(-,root,root) %defattr(-,root,root)
%doc ChangeLog OVERVIEW README* INSTALL
%doc CREDITS LICENCE
%attr(0755,root,root) %{_bindir}/ssh-keygen
%attr(0755,root,root) %{_bindir}/scp
%attr(0755,root,root) %{_bindir}/ssh-keyscan
%attr(0644,root,root) %{_mandir}/man1/ssh-keygen.1*
%attr(0644,root,root) %{_mandir}/man1/ssh-keyscan.1*
%attr(0644,root,root) %{_mandir}/man1/scp.1*
%attr(0755,root,root) %dir %{_sysconfdir}
%attr(0600,root,root) %config(noreplace) %{_sysconfdir}/primes
%attr(0755,root,root) %dir %{_libexecdir}/openssh
%files clients
%Files server -f files-%{Name}-server
%defattr(-,root,root) %defattr(-,root,root)
%attr(4755,root,root) %{_bindir}/ssh
%attr(0755,root,root) %{_bindir}/ssh-agent
%attr(0755,root,root) %{_bindir}/ssh-add
%attr(0755,root,root) %{_bindir}/ssh-keyscan
%attr(0755,root,root) %{_bindir}/sftp
%attr(0644,root,root) %{_mandir}/man1/ssh.1*
%attr(0644,root,root) %{_mandir}/man1/ssh-agent.1*
%attr(0644,root,root) %{_mandir}/man1/ssh-add.1*
%attr(0644,root,root) %{_mandir}/man1/ssh-keyscan.1*
%attr(0644,root,root) %{_mandir}/man1/sftp.1*
%attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ssh_config
%attr(-,root,root) %{_bindir}/slogin
%attr(-,root,root) %{_mandir}/man1/slogin.1*
%if %{contrib_programs}
%attr(0755,root,root) /usr/local/bin/make-ssh-known-hosts.pl
%attr(0644,root,root) /usr/local/man/man1/make-ssh-known-hosts.1
%attr(0755,root,root) /usr/local/bin/ssh-copy-id
%attr(0644,root,root) /usr/local/man/man1/ssh-copy-id.1
%endif
%files server
%Files askpass -f files-%{Name}-askpass
%defattr(-,root,root) %defattr(-,root,root)
%attr(0751,root,root) %{_sbindir}/sshd
%attr(0755,root,root) %{_libexecdir}/openssh/sftp-server
%attr(0644,root,root) %{_mandir}/man8/sshd.8*
%attr(0644,root,root) %{_mandir}/man8/sftp-server.8*
#%attr(0600,root,root) %config(noreplace) %{_sysconfdir}/sshd_config
%attr(0600,root,root) %config %{_sysconfdir}/sshd_config
%attr(0600,root,root) %config(noreplace) /etc/pam.d/sshd
%attr(0755,root,root) %config /etc/rc.d/init.d/sshd
%attr(0755,root,root) %config /etc/sysconfig/daemons/sshd
%if ! %{no_x11_askpass}
%files askpass
%defattr(-,root,root)
%doc x11-ssh-askpass-%{aversion}/README
%doc x11-ssh-askpass-%{aversion}/ChangeLog
%doc x11-ssh-askpass-%{aversion}/SshAskpass*.ad
%attr(0755,root,root) %{_libexecdir}/openssh/ssh-askpass
%attr(0755,root,root) %{_libexecdir}/openssh/x11-ssh-askpass
%attr(0644,root,root) /usr/X11R6/man/man1/x11-ssh-askpass.1x
%attr(-,root,root) /usr/X11R6/man/man1/ssh-askpass.1x
%endif
%if ! %{no_gnome_askpass} %ChangeLog
%files askpass-gnome * Mon Jan 01 1998 ...
%defattr(-,root,root) Template Version: 1.31
%attr(0755,root,root) %{_libexecdir}/openssh/gnome-ssh-askpass
%endif
%changelog
* Mon Oct 18 2000 Damien Miller <djm@mindrot.org>
- Merge some of Nalin Dahyabhai <nalin@redhat.com> changes from the
Redhat 7.0 spec file
* Tue Sep 05 2000 Damien Miller <djm@mindrot.org>
- Use RPM configure macro
* Tue Aug 08 2000 Damien Miller <djm@mindrot.org>
- Some surgery to sshd.init (generate keys at runtime)
- Cleanup of groups and removal of keygen calls
* Wed Jul 12 2000 Damien Miller <djm@mindrot.org>
- Make building of X11-askpass and gnome-askpass optional
* Mon Jun 12 2000 Damien Miller <djm@mindrot.org>
- Glob manpages to catch compressed files
* Wed Mar 15 2000 Damien Miller <djm@ibs.com.au>
- Updated for new location
- Updated for new gnome-ssh-askpass build
* Sun Dec 26 1999 Damien Miller <djm@mindrot.org>
- Added Jim Knoble's <jmknoble@pobox.com> askpass
* Mon Nov 15 1999 Damien Miller <djm@mindrot.org>
- Split subpackages further based on patch from jim knoble <jmknoble@pobox.com>
* Sat Nov 13 1999 Damien Miller <djm@mindrot.org>
- Added 'Obsoletes' directives
* Tue Nov 09 1999 Damien Miller <djm@ibs.com.au>
- Use make install
- Subpackages
* Mon Nov 08 1999 Damien Miller <djm@ibs.com.au>
- Added links for slogin
- Fixed perms on manpages
* Sat Oct 30 1999 Damien Miller <djm@ibs.com.au>
- Renamed init script
* Fri Oct 29 1999 Damien Miller <djm@ibs.com.au>
- Back to old binary names
* Thu Oct 28 1999 Damien Miller <djm@ibs.com.au>
- Use autoconf
- New binary names
* Wed Oct 27 1999 Damien Miller <djm@ibs.com.au>
- Initial RPMification, based on Jan "Yenya" Kasprzak's <kas@fi.muni.cz> spec.
$Id: openssh.spec,v 1.15 2001/04/27 05:50:49 tim Exp $

36
contrib/caldera/ssh-host-keygen Executable file
View File

@ -0,0 +1,36 @@
#! /bin/sh
#
# $Id: ssh-host-keygen,v 1.1 2001/04/27 05:50:50 tim Exp $
#
# This script is normally run only *once* for a given host
# (in a given period of time) -- on updates/upgrades/recovery
# the ssh_host_key* files _should_ be retained! Otherwise false
# "man-in-the-middle-attack" alerts will frighten unsuspecting
# clients...
keydir=@sysconfdir@
keygen=@sshkeygen@
if [ -f $keydir/ssh_host_key -o \
-f $keydir/ssh_host_key.pub ]; then
echo "You already have an SSH1 RSA host key in $keydir/ssh_host_key."
else
echo "Generating 1024 bit SSH1 RSA host key."
$keygen -b 1024 -t rsa1 -f $keydir/ssh_host_key -C '' -N ''
fi
if [ -f $keydir/ssh_host_rsa_key -o \
-f $keydir/ssh_host_rsa_key.pub ]; then
echo "You already have an SSH2 RSA host key in $keydir/ssh_host_rsa_key."
else
echo "Generating 1024 bit SSH2 RSA host key."
$keygen -b 1024 -t rsa -f $keydir/ssh_host_rsa_key -C '' -N ''
fi
if [ -f $keydir/ssh_host_dsa_key -o \
-f $keydir/ssh_host_dsa_key.pub ]; then
echo "You already have an SSH2 DSA host key in $keydir/ssh_host_dsa_key."
else
echo "Generating SSH2 DSA host key."
$keygen -t dsa -f $keydir/ssh_host_dsa_key -C '' -N ''
fi

View File

@ -1,6 +0,0 @@
IDENT=sshd
SHORT="sshd"
DESCRIPTIVE="@OPENSSH_VERSION@"
DAEMON=/usr/sbin/sshd
# DAEMON_ARGS="-p some_other_port"
ONBOOT=yes

View File

@ -1,99 +1,125 @@
#! /bin/sh #! /bin/bash
# #
# Generic network daemon RC script. If installed as /etc/rc.d/init.d/foobar, # $Id: sshd.init,v 1.2 2001/04/27 05:50:50 tim Exp $
# it source /etc/sysconfig/daemons/foobar and looks at the
# variable definitions (Bourne shell syntax). Variables marked with an
# asterisk are required.
# #
# * IDENT=sshd ### BEGIN INIT INFO
# DESCRIPTIVE="@OPENSSH_VERSION@" # Provides:
# * DAEMON=/usr/sbin/sshd # Required-Start: $network
# DAEMON_ARGS="-p some_other_port" # Required-Stop:
# ONBOOT=yes # Default-Start: 3 4 5
# Default-Stop: 0 1 2 6
# Description: sshd
# Bring up/down the OpenSSH secure shell daemon.
### END INIT INFO
# #
# Written by Miquel van Smoorenburg <miquels@drinkel.ow.org>.
# Modified for Debian GNU/Linux by Ian Murdock <imurdock@gnu.ai.mit.edu>.
# Modified for OpenLinux by Raymund Will <ray@caldera.de>
# Source networking configuration. NAME=sshd
. /etc/sysconfig/network DAEMON=/usr/sbin/$NAME
# Hack-Alert(TM)! This is necessary to get around the 'reload'-problem
# created by recent OpenSSH daemon/ssd combinations. See Caldera internal
# PR [linux/8278] for details...
PIDF=/var/run/$NAME.pid
NAME=$DAEMON
# Check that networking is up. _status() {
[ ${NETWORKING} = "no" ] && exit 0 [ -z "$1" ] || local pidf="$1"
local ret=-1
local pid
if [ -n "$pidf" ] && [ -r "$pidf" ]; then
pid=$(head -1 $pidf)
else
pid=$(pidof $NAME)
fi
# Source function library, check sysconfig/daemon file and source it. if [ ! -e $SVIlock ]; then
. /etc/rc.d/init.d/functions # no lock-file => not started == stopped?
ret=3
[ -x $DAEMON ] || exit 0 elif { [ -n "$pidf" ] && [ ! -f "$pidf" ] } || [ -z "$pid" ]; then
# pid-file given but not present or no pid => died, but was not stopped
# Some functions to make the below more readable ret=2
KEYGEN=/usr/bin/ssh-keygen elif [ -r /proc/$pid/cmdline ] &&
RSA1_KEY=/etc/ssh/ssh_host_key echo -ne $NAME'\000' | cmp -s - /proc/$pid/cmdline; then
RSA_KEY=/etc/ssh/ssh_host_rsa_key # pid-file given and present or pid found => check process...
DSA_KEY=/etc/ssh/ssh_host_dsa_key # but don't compare exe, as this will fail after an update!
PID_FILE=/var/run/sshd.pid # compares OK => all's well, that ends well...
do_rsa1_keygen() { ret=0
if ! test -f $RSA1_KEY ; then else
echo -n "Generating SSH1 RSA host key: " # no such process or exe does not match => stale pid-file or process died
if $KEYGEN -q -t rsa1 -f $RSA1_KEY -C '' -N '' >&/dev/null; then # just recently...
echo "RSA1 key generation success" ret=1
else fi
echo "RSA1 key generation failure" return $ret
exit 1
fi
fi
}
do_rsa_keygen() {
if ! test -f $RSA_KEY ; then
echo -n "Generating SSH2 RSA host key: "
if $KEYGEN -q -t rsa -f $RSA_KEY -C '' -N '' >&/dev/null; then
echo "RSA key generation success"
else
echo "RSA key generation failure"
exit 1
fi
fi
}
do_dsa_keygen() {
if ! test -f $DSA_KEY ; then
echo -n "Generating SSH2 DSA host key: "
if $KEYGEN -q -t dsa -f $DSA_KEY -C '' -N '' >&/dev/null; then
echo "DSA key generation success"
else
echo "DSA key generation failure"
exit 1
fi
fi
} }
# See how we were called. # Source function library (and set vital variables).
. @SVIdir@/functions
case "$1" in case "$1" in
start) start)
# Create keys if necessary [ ! -e $SVIlock ] || exit 0
do_rsa1_keygen [ -x $DAEMON ] || exit 5
do_rsa_keygen SVIemptyConfig @sysconfdir@/sshd_config && exit 6
do_dsa_keygen
if [ ! \( -f @sysconfdir@/ssh_host_key -a \
-f @sysconfdir@/ssh_host_key.pub \) -a \
! \( -f @sysconfdir@/ssh_host_rsa_key -a \
-f @sysconfdir@/ssh_host_rsa_key.pub \) -a \
! \( -f @sysconfdir@/ssh_host_dsa_key -a \
-f @sysconfdir@/ssh_host_dsa_key.pub \) ]; then
echo "$SVIsubsys: host key not initialized: skipped!"
echo "$SVIsubsys: use ssh-host-keygen to generate one!"
exit 6
fi
echo -n "Starting $SVIsubsys services: "
ssd -S -x $DAEMON -n $NAME -- $OPTIONS
ret=$?
echo "."
touch $SVIlock
;;
stop)
[ -e $SVIlock ] || exit 0
echo -n "Stopping $SVIsubsys services: "
ssd -K -p $PIDF -n $NAME
ret=$?
echo "."
rm -f $SVIlock
;;
force-reload|reload)
[ -e $SVIlock ] || exit 0
echo "Reloading $SVIsubsys configuration files: "
ssd -K --signal 1 -q -p $PIDF -n $NAME
ret=$?
echo "done."
;;
restart)
$0 stop
$0 start
ret=$?
;;
status)
_status $PIDF
ret=$?
;;
*)
echo "Usage: $SVIscript {[re]start|stop|[force-]reload|status}"
ret=2
;;
# Start daemons.
[ ! -e $LOCK ] || exit 1
echo -n "Starting $SUBSYS services: "
start-stop-daemon -S -n $IDENT -x $DAEMON -- $DAEMON_ARGS
sleep 1
echo .
touch $LOCK
;;
stop)
# Stop daemons.
[ -e $LOCK ] || exit 0
echo -n "Stopping $SUBSYS services: "
start-stop-daemon -K -n $IDENT -x $DAEMON
echo
rm -f $LOCK
;;
restart)
$0 stop
$0 start
;;
*)
echo "Usage: $SUBSYS {start|stop|restart}"
exit 1
esac esac
exit 0 exit $ret