diff options
author | Damien Miller <djm@mindrot.org> | 2000-03-15 12:25:06 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2000-03-15 12:25:06 +1100 |
commit | 256fdcbec5ee70e69a89e47a360b6091a904f1a6 (patch) | |
tree | 11d9e539074e2a2a8a46a0339708ec36484ddfed /packages/suse | |
parent | 8b1c22b7758511461b359461926e47b093a349d3 (diff) |
Moved package files to contrib/
Added FreeBSD PAM config
Diffstat (limited to 'packages/suse')
-rw-r--r-- | packages/suse/openssh.spec | 243 | ||||
-rw-r--r-- | packages/suse/rc.config.sshd | 5 | ||||
-rw-r--r-- | packages/suse/rc.sshd | 80 |
3 files changed, 0 insertions, 328 deletions
diff --git a/packages/suse/openssh.spec b/packages/suse/openssh.spec deleted file mode 100644 index ab16c40ba..000000000 --- a/packages/suse/openssh.spec +++ /dev/null | |||
@@ -1,243 +0,0 @@ | |||
1 | Summary: OpenSSH, a free Secure Shell (SSH) implementation | ||
2 | Name: openssh | ||
3 | Version: 1.2.3pre2 | ||
4 | Release: 1 | ||
5 | Source0: openssh-%{version}.tar.gz | ||
6 | Copyright: BSD | ||
7 | Group: Applications/Internet | ||
8 | BuildRoot: /tmp/openssh-%{version}-buildroot | ||
9 | PreReq: openssl | ||
10 | Obsoletes: ssh | ||
11 | # | ||
12 | # (Build[ing] Prereq[uisites] only work for RPM 2.95 and newer.) | ||
13 | # building prerequisites -- stuff for | ||
14 | # OpenSSL (openssl-devel), | ||
15 | # TCP Wrappers (nkitb), | ||
16 | # and Gnome (glibdev, gtkdev, and gnlibsd) | ||
17 | # | ||
18 | BuildPrereq: openssl-devel | ||
19 | BuildPrereq: nkitb | ||
20 | BuildPrereq: glibdev | ||
21 | BuildPrereq: gtkdev | ||
22 | BuildPrereq: gnlibsd | ||
23 | |||
24 | %package clients | ||
25 | Summary: OpenSSH Secure Shell protocol clients | ||
26 | Requires: openssh | ||
27 | Group: Applications/Internet | ||
28 | Obsoletes: ssh-clients | ||
29 | |||
30 | %package server | ||
31 | Summary: OpenSSH Secure Shell protocol server (sshd) | ||
32 | Requires: openssh | ||
33 | Group: System Environment/Daemons | ||
34 | PreReq: openssh | ||
35 | Obsoletes: ssh-server | ||
36 | |||
37 | %package askpass | ||
38 | Summary: OpenSSH GNOME passphrase dialog | ||
39 | Group: Applications/Internet | ||
40 | Requires: openssh | ||
41 | Obsoletes: ssh-extras | ||
42 | Obsoletes: ssh-askpass | ||
43 | |||
44 | %description | ||
45 | Ssh (Secure Shell) a program for logging into a remote machine and for | ||
46 | executing commands in a remote machine. It is intended to replace | ||
47 | rlogin and rsh, and provide secure encrypted communications between | ||
48 | two untrusted hosts over an insecure network. X11 connections and | ||
49 | arbitrary TCP/IP ports can also be forwarded over the secure channel. | ||
50 | |||
51 | OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it | ||
52 | up to date in terms of security and features, as well as removing all | ||
53 | patented algorithms to seperate libraries (OpenSSL). | ||
54 | |||
55 | This package includes the core files necessary for both the OpenSSH | ||
56 | client and server. To make this package useful, you should also | ||
57 | install openssh-clients, openssh-server, or both. | ||
58 | |||
59 | %description clients | ||
60 | Ssh (Secure Shell) a program for logging into a remote machine and for | ||
61 | executing commands in a remote machine. It is intended to replace | ||
62 | rlogin and rsh, and provide secure encrypted communications between | ||
63 | two untrusted hosts over an insecure network. X11 connections and | ||
64 | arbitrary TCP/IP ports can also be forwarded over the secure channel. | ||
65 | |||
66 | OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it | ||
67 | up to date in terms of security and features, as well as removing all | ||
68 | patented algorithms to seperate libraries (OpenSSL). | ||
69 | |||
70 | This package includes the clients necessary to make encrypted connections | ||
71 | to SSH servers. | ||
72 | |||
73 | %description server | ||
74 | Ssh (Secure Shell) a program for logging into a remote machine and for | ||
75 | executing commands in a remote machine. It is intended to replace | ||
76 | rlogin and rsh, and provide secure encrypted communications between | ||
77 | two untrusted hosts over an insecure network. X11 connections and | ||
78 | arbitrary TCP/IP ports can also be forwarded over the secure channel. | ||
79 | |||
80 | OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it | ||
81 | up to date in terms of security and features, as well as removing all | ||
82 | patented algorithms to seperate libraries (OpenSSL). | ||
83 | |||
84 | This package contains the secure shell daemon. The sshd is the server | ||
85 | part of the secure shell protocol and allows ssh clients to connect to | ||
86 | your host. | ||
87 | |||
88 | %description askpass | ||
89 | Ssh (Secure Shell) a program for logging into a remote machine and for | ||
90 | executing commands in a remote machine. It is intended to replace | ||
91 | rlogin and rsh, and provide secure encrypted communications between | ||
92 | two untrusted hosts over an insecure network. X11 connections and | ||
93 | arbitrary TCP/IP ports can also be forwarded over the secure channel. | ||
94 | |||
95 | OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it | ||
96 | up to date in terms of security and features, as well as removing all | ||
97 | patented algorithms to seperate libraries (OpenSSL). | ||
98 | |||
99 | This package contains the GNOME passphrase dialog. | ||
100 | |||
101 | %changelog | ||
102 | * Sun Dec 26 1999 Chris Saia <csaia@wtower.com> | ||
103 | - Made symlink to gnome-ssh-askpass called ssh-askpass | ||
104 | * Wed Nov 24 1999 Chris Saia <csaia@wtower.com> | ||
105 | - Removed patches that included /etc/pam.d/sshd, /sbin/init.d/rc.sshd, and | ||
106 | /var/adm/fillup-templates/rc.config.sshd, since Damien merged these into | ||
107 | his released tarfile | ||
108 | - Changed permissions on ssh_config in the install procedure to 644 from 600 | ||
109 | even though it was correct in the %files section and thus right in the RPMs | ||
110 | - Postinstall script for the server now only prints "Generating SSH host | ||
111 | key..." if we need to actually do this, in order to eliminate a confusing | ||
112 | message if an SSH host key is already in place | ||
113 | - Marked all manual pages as %doc(umentation) | ||
114 | * Mon Nov 22 1999 Chris Saia <csaia@wtower.com> | ||
115 | - Added flag to configure daemon with TCP Wrappers support | ||
116 | - Added building prerequisites (works in RPM 3.0 and newer) | ||
117 | * Thu Nov 18 1999 Chris Saia <csaia@wtower.com> | ||
118 | - Made this package correct for SuSE. | ||
119 | - Changed instances of pam_pwdb.so to pam_unix.so, since it works more properly | ||
120 | with SuSE, and lib_pwdb.so isn't installed by default. | ||
121 | * Mon Nov 15 1999 Damien Miller <djm@mindrot.org> | ||
122 | - Split subpackages further based on patch from jim knoble <jmknoble@pobox.com> | ||
123 | * Sat Nov 13 1999 Damien Miller <djm@mindrot.org> | ||
124 | - Added 'Obsoletes' directives | ||
125 | * Tue Nov 09 1999 Damien Miller <djm@ibs.com.au> | ||
126 | - Use make install | ||
127 | - Subpackages | ||
128 | * Mon Nov 08 1999 Damien Miller <djm@ibs.com.au> | ||
129 | - Added links for slogin | ||
130 | - Fixed perms on manpages | ||
131 | * Sat Oct 30 1999 Damien Miller <djm@ibs.com.au> | ||
132 | - Renamed init script | ||
133 | * Fri Oct 29 1999 Damien Miller <djm@ibs.com.au> | ||
134 | - Back to old binary names | ||
135 | * Thu Oct 28 1999 Damien Miller <djm@ibs.com.au> | ||
136 | - Use autoconf | ||
137 | - New binary names | ||
138 | * Wed Oct 27 1999 Damien Miller <djm@ibs.com.au> | ||
139 | - Initial RPMification, based on Jan "Yenya" Kasprzak's <kas@fi.muni.cz> spec. | ||
140 | |||
141 | %prep | ||
142 | |||
143 | %setup -q | ||
144 | |||
145 | %build | ||
146 | CFLAGS="$RPM_OPT_FLAGS" \ | ||
147 | ./configure --prefix=/usr --sysconfdir=/etc/ssh --with-gnome-askpass \ | ||
148 | --with-tcp-wrappers --with-ipv4-default | ||
149 | make | ||
150 | |||
151 | %install | ||
152 | rm -rf $RPM_BUILD_ROOT | ||
153 | make install DESTDIR=$RPM_BUILD_ROOT/ | ||
154 | install -d $RPM_BUILD_ROOT/etc/ssh/ | ||
155 | install -d $RPM_BUILD_ROOT/etc/pam.d/ | ||
156 | install -d $RPM_BUILD_ROOT/sbin/init.d/ | ||
157 | install -d $RPM_BUILD_ROOT/var/adm/fillup-templates | ||
158 | install -m644 sshd.pam.generic $RPM_BUILD_ROOT/etc/pam.d/sshd | ||
159 | install -m744 packages/suse/rc.sshd $RPM_BUILD_ROOT/sbin/init.d/sshd | ||
160 | ln -s ../../sbin/init.d/sshd $RPM_BUILD_ROOT/usr/sbin/rcsshd | ||
161 | ln -s gnome-ssh-askpass $RPM_BUILD_ROOT/usr/libexec/ssh/ssh-askpass | ||
162 | install -m744 packages/suse/rc.config.sshd \ | ||
163 | $RPM_BUILD_ROOT/var/adm/fillup-templates | ||
164 | |||
165 | %clean | ||
166 | rm -rf $RPM_BUILD_ROOT | ||
167 | |||
168 | %post server | ||
169 | if [ "$1" = 1 ]; then | ||
170 | echo "Creating SSH stop/start scripts in the rc directories..." | ||
171 | ln -s ../sshd /sbin/init.d/rc2.d/K20sshd | ||
172 | ln -s ../sshd /sbin/init.d/rc2.d/S20sshd | ||
173 | ln -s ../sshd /sbin/init.d/rc3.d/K20sshd | ||
174 | ln -s ../sshd /sbin/init.d/rc3.d/S20sshd | ||
175 | fi | ||
176 | echo "Updating /etc/rc.config..." | ||
177 | if [ -x /bin/fillup ] ; then | ||
178 | /bin/fillup -q -d = etc/rc.config var/adm/fillup-templates/rc.config.sshd | ||
179 | else | ||
180 | echo "ERROR: fillup not found. This should NOT happen in SuSE Linux." | ||
181 | echo "Update /etc/rc.config by hand from the following template file:" | ||
182 | echo " /var/adm/fillup-templates/rc.config.sshd" | ||
183 | fi | ||
184 | if [ ! -f /etc/ssh/ssh_host_key -o ! -s /etc/ssh/ssh_host_key ]; then | ||
185 | echo "Generating SSH host key..." | ||
186 | /usr/bin/ssh-keygen -b 1024 -f /etc/ssh/ssh_host_key -N '' >&2 | ||
187 | fi | ||
188 | if test -r /var/run/sshd.pid | ||
189 | then | ||
190 | echo "Restarting the running SSH daemon..." | ||
191 | /usr/sbin/rcsshd restart >&2 | ||
192 | fi | ||
193 | |||
194 | %preun server | ||
195 | if [ "$1" = 0 ] | ||
196 | then | ||
197 | echo "Stopping the SSH daemon..." | ||
198 | /usr/sbin/rcsshd stop >&2 | ||
199 | echo "Removing SSH stop/start scripts from the rc directories..." | ||
200 | rm /sbin/init.d/rc2.d/K20sshd | ||
201 | rm /sbin/init.d/rc2.d/S20sshd | ||
202 | rm /sbin/init.d/rc3.d/K20sshd | ||
203 | rm /sbin/init.d/rc3.d/S20sshd | ||
204 | fi | ||
205 | |||
206 | %files | ||
207 | %defattr(-,root,root) | ||
208 | %doc COPYING.Ylonen ChangeLog OVERVIEW README README.Ylonen | ||
209 | %doc RFC.nroff TODO UPGRADING CREDITS | ||
210 | %attr(0755,root,root) /usr/bin/ssh-keygen | ||
211 | %attr(0755,root,root) /usr/bin/scp | ||
212 | %attr(0644,root,root) %doc /usr/man/man1/ssh-keygen.1 | ||
213 | %attr(0644,root,root) %doc /usr/man/man1/scp.1 | ||
214 | %attr(0755,root,root) %dir /etc/ssh | ||
215 | %attr(0755,root,root) %dir /usr/libexec/ssh | ||
216 | |||
217 | %files clients | ||
218 | %defattr(-,root,root) | ||
219 | %attr(4755,root,root) /usr/bin/ssh | ||
220 | %attr(0755,root,root) /usr/bin/ssh-agent | ||
221 | %attr(0755,root,root) /usr/bin/ssh-add | ||
222 | %attr(0644,root,root) %doc /usr/man/man1/ssh.1 | ||
223 | %attr(0644,root,root) %doc /usr/man/man1/ssh-agent.1 | ||
224 | %attr(0644,root,root) %doc /usr/man/man1/ssh-add.1 | ||
225 | %attr(0644,root,root) %config /etc/ssh/ssh_config | ||
226 | %attr(-,root,root) /usr/bin/slogin | ||
227 | %attr(-,root,root) %doc /usr/man/man1/slogin.1 | ||
228 | |||
229 | %files server | ||
230 | %defattr(-,root,root) | ||
231 | %attr(0755,root,root) /usr/sbin/sshd | ||
232 | %attr(0644,root,root) %doc /usr/man/man8/sshd.8 | ||
233 | %attr(0600,root,root) %config /etc/ssh/sshd_config | ||
234 | %attr(0644,root,root) %config /etc/pam.d/sshd | ||
235 | %attr(0755,root,root) %config /sbin/init.d/sshd | ||
236 | %attr(-,root,root) /usr/sbin/rcsshd | ||
237 | %attr(0644,root,root) /var/adm/fillup-templates/rc.config.sshd | ||
238 | |||
239 | %files askpass | ||
240 | %defattr(-,root,root) | ||
241 | %attr(0755,root,root) /usr/libexec/ssh/ssh-askpass | ||
242 | %attr(0755,root,root) /usr/libexec/ssh/gnome-ssh-askpass | ||
243 | |||
diff --git a/packages/suse/rc.config.sshd b/packages/suse/rc.config.sshd deleted file mode 100644 index baaa7a5a1..000000000 --- a/packages/suse/rc.config.sshd +++ /dev/null | |||
@@ -1,5 +0,0 @@ | |||
1 | # | ||
2 | # Start the Secure Shell (SSH) Daemon? | ||
3 | # | ||
4 | START_SSHD="yes" | ||
5 | |||
diff --git a/packages/suse/rc.sshd b/packages/suse/rc.sshd deleted file mode 100644 index f7d431ebb..000000000 --- a/packages/suse/rc.sshd +++ /dev/null | |||
@@ -1,80 +0,0 @@ | |||
1 | #! /bin/sh | ||
2 | # Copyright (c) 1995-1998 SuSE GmbH Nuernberg, Germany. | ||
3 | # | ||
4 | # Author: Chris Saia <csaia@wtower.com> | ||
5 | # | ||
6 | # /sbin/init.d/sshd | ||
7 | # | ||
8 | # and symbolic its link | ||
9 | # | ||
10 | # /sbin/rcsshd | ||
11 | # | ||
12 | |||
13 | . /etc/rc.config | ||
14 | |||
15 | # Determine the base and follow a runlevel link name. | ||
16 | base=${0##*/} | ||
17 | link=${base#*[SK][0-9][0-9]} | ||
18 | |||
19 | # Force execution if not called by a runlevel directory. | ||
20 | test $link = $base && START_SSHD=yes | ||
21 | test "$START_SSHD" = yes || exit 0 | ||
22 | |||
23 | # The echo return value for success (defined in /etc/rc.config). | ||
24 | return=$rc_done | ||
25 | case "$1" in | ||
26 | start) | ||
27 | echo -n "Starting service sshd" | ||
28 | ## Start daemon with startproc(8). If this fails | ||
29 | ## the echo return value is set appropriate. | ||
30 | |||
31 | startproc /usr/sbin/sshd || return=$rc_failed | ||
32 | |||
33 | echo -e "$return" | ||
34 | ;; | ||
35 | stop) | ||
36 | echo -n "Stopping service sshd" | ||
37 | ## Stop daemon with killproc(8) and if this fails | ||
38 | ## set echo the echo return value. | ||
39 | |||
40 | killproc -TERM /usr/sbin/sshd || return=$rc_failed | ||
41 | |||
42 | echo -e "$return" | ||
43 | ;; | ||
44 | restart) | ||
45 | ## If first returns OK call the second, if first or | ||
46 | ## second command fails, set echo return value. | ||
47 | $0 stop && $0 start || return=$rc_failed | ||
48 | ;; | ||
49 | reload) | ||
50 | ## Choose ONE of the following two cases: | ||
51 | |||
52 | ## First possibility: A few services accepts a signal | ||
53 | ## to reread the (changed) configuration. | ||
54 | |||
55 | echo -n "Reload service sshd" | ||
56 | killproc -HUP /usr/sbin/sshd || return=$rc_failed | ||
57 | echo -e "$return" | ||
58 | ;; | ||
59 | status) | ||
60 | echo -n "Checking for service sshd" | ||
61 | ## Check status with checkproc(8), if process is running | ||
62 | ## checkproc will return with exit status 0. | ||
63 | |||
64 | checkproc /usr/sbin/sshd && echo OK || echo No process | ||
65 | ;; | ||
66 | probe) | ||
67 | ## Optional: Probe for the necessity of a reload, | ||
68 | ## give out the argument which is required for a reload. | ||
69 | |||
70 | test /etc/ssh/sshd_config -nt /var/run/sshd.pid && echo reload | ||
71 | ;; | ||
72 | *) | ||
73 | echo "Usage: $0 {start|stop|status|restart|reload[|probe]}" | ||
74 | exit 1 | ||
75 | ;; | ||
76 | esac | ||
77 | |||
78 | # Inform the caller not only verbosely and set an exit status. | ||
79 | test "$return" = "$rc_done" || exit 1 | ||
80 | exit 0 | ||