diff options
Diffstat (limited to 'packages/suse')
-rw-r--r-- | packages/suse/openssh.spec | 227 | ||||
-rw-r--r-- | packages/suse/rc.config.sshd | 5 | ||||
-rw-r--r-- | packages/suse/rc.sshd | 80 |
3 files changed, 312 insertions, 0 deletions
diff --git a/packages/suse/openssh.spec b/packages/suse/openssh.spec new file mode 100644 index 000000000..9bdde3b2c --- /dev/null +++ b/packages/suse/openssh.spec | |||
@@ -0,0 +1,227 @@ | |||
1 | Summary: OpenSSH, a free Secure Shell (SSH) implementation | ||
2 | Name: openssh | ||
3 | Version: 1.2pre14 | ||
4 | Release: 2RSAref | ||
5 | Source0: openssh-%{version}.tar.gz | ||
6 | Copyright: BSD | ||
7 | Group: Applications/Internet | ||
8 | BuildRoot: /tmp/openssh-%{version}-buildroot | ||
9 | Obsoletes: ssh | ||
10 | # | ||
11 | # building prerequisites -- stuff for TCP Wrappers and Gnome | ||
12 | # (This only works for RPM 2.95 and newer.) | ||
13 | # | ||
14 | BuildPrereq: nkitb | ||
15 | BuildPrereq: glibdev | ||
16 | BuildPrereq: gtkdev | ||
17 | BuildPrereq: gnlibsd | ||
18 | |||
19 | %package clients | ||
20 | Summary: OpenSSH Secure Shell protocol clients | ||
21 | Requires: openssh | ||
22 | Group: Applications/Internet | ||
23 | Obsoletes: ssh-clients | ||
24 | |||
25 | %package server | ||
26 | Summary: OpenSSH Secure Shell protocol server (sshd) | ||
27 | Requires: openssh | ||
28 | Group: System Environment/Daemons | ||
29 | Obsoletes: ssh-server | ||
30 | |||
31 | %package askpass | ||
32 | Summary: OpenSSH GNOME passphrase dialog | ||
33 | Group: Applications/Internet | ||
34 | Requires: openssh | ||
35 | Obsoletes: ssh-extras | ||
36 | Obsoletes: ssh-askpass | ||
37 | |||
38 | %description | ||
39 | Ssh (Secure Shell) a program for logging into a remote machine and for | ||
40 | executing commands in a remote machine. It is intended to replace | ||
41 | rlogin and rsh, and provide secure encrypted communications between | ||
42 | two untrusted hosts over an insecure network. X11 connections and | ||
43 | arbitrary TCP/IP ports can also be forwarded over the secure channel. | ||
44 | |||
45 | OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it | ||
46 | up to date in terms of security and features, as well as removing all | ||
47 | patented algorithms to seperate libraries (OpenSSL). | ||
48 | |||
49 | This package includes the core files necessary for both the OpenSSH | ||
50 | client and server. To make this package useful, you should also | ||
51 | install openssh-clients, openssh-server, or both. | ||
52 | |||
53 | %description clients | ||
54 | Ssh (Secure Shell) a program for logging into a remote machine and for | ||
55 | executing commands in a remote machine. It is intended to replace | ||
56 | rlogin and rsh, and provide secure encrypted communications between | ||
57 | two untrusted hosts over an insecure network. X11 connections and | ||
58 | arbitrary TCP/IP ports can also be forwarded over the secure channel. | ||
59 | |||
60 | OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it | ||
61 | up to date in terms of security and features, as well as removing all | ||
62 | patented algorithms to seperate libraries (OpenSSL). | ||
63 | |||
64 | This package includes the clients necessary to make encrypted connections | ||
65 | to SSH servers. | ||
66 | |||
67 | %description server | ||
68 | Ssh (Secure Shell) a program for logging into a remote machine and for | ||
69 | executing commands in a remote machine. It is intended to replace | ||
70 | rlogin and rsh, and provide secure encrypted communications between | ||
71 | two untrusted hosts over an insecure network. X11 connections and | ||
72 | arbitrary TCP/IP ports can also be forwarded over the secure channel. | ||
73 | |||
74 | OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it | ||
75 | up to date in terms of security and features, as well as removing all | ||
76 | patented algorithms to seperate libraries (OpenSSL). | ||
77 | |||
78 | This package contains the secure shell daemon. The sshd is the server | ||
79 | part of the secure shell protocol and allows ssh clients to connect to | ||
80 | your host. | ||
81 | |||
82 | %description askpass | ||
83 | Ssh (Secure Shell) a program for logging into a remote machine and for | ||
84 | executing commands in a remote machine. It is intended to replace | ||
85 | rlogin and rsh, and provide secure encrypted communications between | ||
86 | two untrusted hosts over an insecure network. X11 connections and | ||
87 | arbitrary TCP/IP ports can also be forwarded over the secure channel. | ||
88 | |||
89 | OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it | ||
90 | up to date in terms of security and features, as well as removing all | ||
91 | patented algorithms to seperate libraries (OpenSSL). | ||
92 | |||
93 | This package contains the GNOME passphrase dialog. | ||
94 | |||
95 | %changelog | ||
96 | * Mon Nov 22 1999 Chris Saia <csaia@wtower.com> | ||
97 | - Added flag to configure daemon with TCP Wrappers support | ||
98 | - Added building prerequisites (works in RPM 3.0 and newer) | ||
99 | * Thu Nov 18 1999 Chris Saia <csaia@wtower.com> | ||
100 | - Made this package correct for SuSE. | ||
101 | - Changed instances of pam_pwdb.so to pam_unix.so, since it works more properly | ||
102 | with SuSE, and lib_pwdb.so isn't installed by default. | ||
103 | * Mon Nov 15 1999 Damien Miller <djm@mindrot.org> | ||
104 | - Split subpackages further based on patch from jim knoble <jmknoble@pobox.com> | ||
105 | * Sat Nov 13 1999 Damien Miller <djm@mindrot.org> | ||
106 | - Added 'Obsoletes' directives | ||
107 | * Tue Nov 09 1999 Damien Miller <djm@ibs.com.au> | ||
108 | - Use make install | ||
109 | - Subpackages | ||
110 | * Mon Nov 08 1999 Damien Miller <djm@ibs.com.au> | ||
111 | - Added links for slogin | ||
112 | - Fixed perms on manpages | ||
113 | * Sat Oct 30 1999 Damien Miller <djm@ibs.com.au> | ||
114 | - Renamed init script | ||
115 | * Fri Oct 29 1999 Damien Miller <djm@ibs.com.au> | ||
116 | - Back to old binary names | ||
117 | * Thu Oct 28 1999 Damien Miller <djm@ibs.com.au> | ||
118 | - Use autoconf | ||
119 | - New binary names | ||
120 | * Wed Oct 27 1999 Damien Miller <djm@ibs.com.au> | ||
121 | - Initial RPMification, based on Jan "Yenya" Kasprzak's <kas@fi.muni.cz> spec. | ||
122 | |||
123 | %prep | ||
124 | |||
125 | %setup | ||
126 | |||
127 | %build | ||
128 | |||
129 | CFLAGS="$RPM_OPT_FLAGS" \ | ||
130 | ./configure --prefix=/usr --sysconfdir=/etc/ssh --with-gnome-askpass --with-tcp-wrappers | ||
131 | |||
132 | make | ||
133 | |||
134 | %install | ||
135 | rm -rf $RPM_BUILD_ROOT | ||
136 | make install prefix="$RPM_BUILD_ROOT/usr" | ||
137 | |||
138 | install -d $RPM_BUILD_ROOT/etc/ssh/ | ||
139 | install -d $RPM_BUILD_ROOT/etc/pam.d/ | ||
140 | install -d $RPM_BUILD_ROOT/sbin/init.d/ | ||
141 | install -d $RPM_BUILD_ROOT/sbin/init.d/rc2.d/ | ||
142 | install -d $RPM_BUILD_ROOT/sbin/init.d/rc3.d/ | ||
143 | install -m644 sshd.pam.generic $RPM_BUILD_ROOT/etc/pam.d/sshd | ||
144 | install -m744 packages/suse/rc.sshd $RPM_BUILD_ROOT/sbin/init.d/sshd | ||
145 | install -m600 ssh_config $RPM_BUILD_ROOT/etc/ssh/ssh_config | ||
146 | install -m600 sshd_config $RPM_BUILD_ROOT/etc/ssh/sshd_config | ||
147 | ln -s ../../sbin/init.d/sshd $RPM_BUILD_ROOT/usr/sbin/rcsshd | ||
148 | install -d $RPM_BUILD_ROOT/var/adm/fillup-templates | ||
149 | cp packages/suse/rc.config.sshd $RPM_BUILD_ROOT/var/adm/fillup-templates | ||
150 | |||
151 | %clean | ||
152 | rm -rf $RPM_BUILD_ROOT | ||
153 | |||
154 | %post server | ||
155 | if [ "$1" = 0 ]; then | ||
156 | echo "Creating SSH stop/start scripts in rc directories..." | ||
157 | ln -s ../sshd /sbin/init.d/rc2.d/K20sshd | ||
158 | ln -s ../sshd /sbin/init.d/rc2.d/S20sshd | ||
159 | ln -s ../sshd /sbin/init.d/rc3.d/K20sshd | ||
160 | ln -s ../sshd /sbin/init.d/rc3.d/S20sshd | ||
161 | fi | ||
162 | echo "Updating /etc/rc.config..." | ||
163 | if [ -x /bin/fillup ] ; then | ||
164 | /bin/fillup -q -d = etc/rc.config var/adm/fillup-templates/rc.config.sshd | ||
165 | else | ||
166 | echo "ERROR: fillup not found. This should NOT happen in SuSE Linux." | ||
167 | echo "Update /etc/rc.config by hand from the following template file:" | ||
168 | echo " /var/adm/fillup-templates/rc.config.sshd" | ||
169 | fi | ||
170 | echo "Generating SSH host key..." | ||
171 | if [ ! -f /etc/ssh/ssh_host_key -o ! -s /etc/ssh/ssh_host_key ]; then | ||
172 | /usr/bin/ssh-keygen -b 1024 -f /etc/ssh/ssh_host_key -N '' >&2 | ||
173 | fi | ||
174 | if test -r /var/run/sshd.pid | ||
175 | then | ||
176 | /usr/sbin/rcsshd restart >&2 | ||
177 | fi | ||
178 | |||
179 | %preun server | ||
180 | if [ "$1" = 0 ] | ||
181 | then | ||
182 | echo "Stopping SSH..." | ||
183 | /usr/sbin/rcsshd stop >&2 | ||
184 | echo "Removing SSH stop/start scripts from rc directories..." | ||
185 | rm /sbin/init.d/rc2.d/K20sshd | ||
186 | rm /sbin/init.d/rc2.d/S20sshd | ||
187 | rm /sbin/init.d/rc3.d/K20sshd | ||
188 | rm /sbin/init.d/rc3.d/S20sshd | ||
189 | fi | ||
190 | |||
191 | %files | ||
192 | %defattr(-,root,root) | ||
193 | %doc COPYING.Ylonen ChangeLog OVERVIEW README README.Ylonen | ||
194 | %doc RFC.nroff TODO UPGRADING | ||
195 | %attr(0755,root,root) /usr/bin/ssh-keygen | ||
196 | %attr(0755,root,root) /usr/bin/scp | ||
197 | %attr(0644,root,root) /usr/man/man1/ssh-keygen.1 | ||
198 | %attr(0644,root,root) /usr/man/man1/scp.1 | ||
199 | %attr(0755,root,root) %dir /etc/ssh | ||
200 | |||
201 | %files clients | ||
202 | %defattr(-,root,root) | ||
203 | %attr(4755,root,root) /usr/bin/ssh | ||
204 | %attr(0755,root,root) /usr/bin/ssh-agent | ||
205 | %attr(0755,root,root) /usr/bin/ssh-add | ||
206 | %attr(0644,root,root) /usr/man/man1/ssh.1 | ||
207 | %attr(0644,root,root) /usr/man/man1/ssh-agent.1 | ||
208 | %attr(0644,root,root) /usr/man/man1/ssh-add.1 | ||
209 | %attr(0644,root,root) %config(noreplace) /etc/ssh/ssh_config | ||
210 | %attr(-,root,root) /usr/bin/slogin | ||
211 | %attr(-,root,root) /usr/man/man1/slogin.1 | ||
212 | |||
213 | %files server | ||
214 | %defattr(-,root,root) | ||
215 | %attr(0755,root,root) /usr/sbin/sshd | ||
216 | %attr(0644,root,root) /usr/man/man8/sshd.8 | ||
217 | %attr(0600,root,root) %config(noreplace) /etc/ssh/sshd_config | ||
218 | %attr(0644,root,root) %config(noreplace) /etc/pam.d/sshd | ||
219 | %attr(0755,root,root) %config /sbin/init.d/sshd | ||
220 | %attr(-,root,root) /usr/sbin/rcsshd | ||
221 | %attr(0644,root,root) /var/adm/fillup-templates/rc.config.sshd | ||
222 | |||
223 | %files askpass | ||
224 | %defattr(-,root,root) | ||
225 | %attr(0755,root,root) %dir /usr/libexec/ssh | ||
226 | %attr(0755,root,root) /usr/libexec/ssh/ssh-askpass | ||
227 | |||
diff --git a/packages/suse/rc.config.sshd b/packages/suse/rc.config.sshd new file mode 100644 index 000000000..baaa7a5a1 --- /dev/null +++ b/packages/suse/rc.config.sshd | |||
@@ -0,0 +1,5 @@ | |||
1 | # | ||
2 | # Start the Secure Shell (SSH) Daemon? | ||
3 | # | ||
4 | START_SSHD="yes" | ||
5 | |||
diff --git a/packages/suse/rc.sshd b/packages/suse/rc.sshd new file mode 100644 index 000000000..f7d431ebb --- /dev/null +++ b/packages/suse/rc.sshd | |||
@@ -0,0 +1,80 @@ | |||
1 | #! /bin/sh | ||
2 | # Copyright (c) 1995-1998 SuSE GmbH Nuernberg, Germany. | ||
3 | # | ||
4 | # Author: Chris Saia <csaia@wtower.com> | ||
5 | # | ||
6 | # /sbin/init.d/sshd | ||
7 | # | ||
8 | # and symbolic its link | ||
9 | # | ||
10 | # /sbin/rcsshd | ||
11 | # | ||
12 | |||
13 | . /etc/rc.config | ||
14 | |||
15 | # Determine the base and follow a runlevel link name. | ||
16 | base=${0##*/} | ||
17 | link=${base#*[SK][0-9][0-9]} | ||
18 | |||
19 | # Force execution if not called by a runlevel directory. | ||
20 | test $link = $base && START_SSHD=yes | ||
21 | test "$START_SSHD" = yes || exit 0 | ||
22 | |||
23 | # The echo return value for success (defined in /etc/rc.config). | ||
24 | return=$rc_done | ||
25 | case "$1" in | ||
26 | start) | ||
27 | echo -n "Starting service sshd" | ||
28 | ## Start daemon with startproc(8). If this fails | ||
29 | ## the echo return value is set appropriate. | ||
30 | |||
31 | startproc /usr/sbin/sshd || return=$rc_failed | ||
32 | |||
33 | echo -e "$return" | ||
34 | ;; | ||
35 | stop) | ||
36 | echo -n "Stopping service sshd" | ||
37 | ## Stop daemon with killproc(8) and if this fails | ||
38 | ## set echo the echo return value. | ||
39 | |||
40 | killproc -TERM /usr/sbin/sshd || return=$rc_failed | ||
41 | |||
42 | echo -e "$return" | ||
43 | ;; | ||
44 | restart) | ||
45 | ## If first returns OK call the second, if first or | ||
46 | ## second command fails, set echo return value. | ||
47 | $0 stop && $0 start || return=$rc_failed | ||
48 | ;; | ||
49 | reload) | ||
50 | ## Choose ONE of the following two cases: | ||
51 | |||
52 | ## First possibility: A few services accepts a signal | ||
53 | ## to reread the (changed) configuration. | ||
54 | |||
55 | echo -n "Reload service sshd" | ||
56 | killproc -HUP /usr/sbin/sshd || return=$rc_failed | ||
57 | echo -e "$return" | ||
58 | ;; | ||
59 | status) | ||
60 | echo -n "Checking for service sshd" | ||
61 | ## Check status with checkproc(8), if process is running | ||
62 | ## checkproc will return with exit status 0. | ||
63 | |||
64 | checkproc /usr/sbin/sshd && echo OK || echo No process | ||
65 | ;; | ||
66 | probe) | ||
67 | ## Optional: Probe for the necessity of a reload, | ||
68 | ## give out the argument which is required for a reload. | ||
69 | |||
70 | test /etc/ssh/sshd_config -nt /var/run/sshd.pid && echo reload | ||
71 | ;; | ||
72 | *) | ||
73 | echo "Usage: $0 {start|stop|status|restart|reload[|probe]}" | ||
74 | exit 1 | ||
75 | ;; | ||
76 | esac | ||
77 | |||
78 | # Inform the caller not only verbosely and set an exit status. | ||
79 | test "$return" = "$rc_done" || exit 1 | ||
80 | exit 0 | ||