2007-01-07 17:26:05 +01:00
|
|
|
#
|
2011-02-01 15:14:14 +01:00
|
|
|
# spec file for package openssh
|
2007-01-07 17:26:05 +01:00
|
|
|
#
|
2020-09-18 19:44:52 +02:00
|
|
|
# Copyright (c) 2020 SUSE LLC
|
2007-01-07 17:26:05 +01:00
|
|
|
#
|
2008-08-23 01:32:08 +02:00
|
|
|
# All modifications and additions to the file contributed by third parties
|
|
|
|
# remain the property of their copyright owners, unless otherwise agreed
|
|
|
|
# upon. The license for this file, and modifications and additions to the
|
|
|
|
# file, is the same license as for the pristine package itself (unless the
|
|
|
|
# license for the pristine package is not an Open Source License, in which
|
|
|
|
# case the license is the MIT License). An "Open Source License" is a
|
|
|
|
# license that conforms to the Open Source Definition (Version 1.9)
|
|
|
|
# published by the Open Source Initiative.
|
|
|
|
|
2019-07-22 20:28:13 +02:00
|
|
|
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
2007-01-07 17:26:05 +01:00
|
|
|
#
|
|
|
|
|
2016-04-06 13:34:51 +02:00
|
|
|
%define sandbox_seccomp 0
|
2019-01-28 11:41:40 +01:00
|
|
|
%ifnarch ppc
|
2014-02-18 14:04:57 +01:00
|
|
|
%define sandbox_seccomp 1
|
|
|
|
%endif
|
2018-12-11 17:01:09 +01:00
|
|
|
%if 0%{?suse_version} >= 1500
|
|
|
|
%bcond_without tirpc
|
|
|
|
%else
|
2018-10-17 10:57:56 +02:00
|
|
|
%bcond_with tirpc
|
2018-05-02 14:05:42 +02:00
|
|
|
%endif
|
2019-01-04 07:19:36 +01:00
|
|
|
%define _fwdir %{_sysconfdir}/sysconfig/SuSEfirewall2.d
|
|
|
|
%define _fwdefdir %{_fwdir}/services
|
2016-04-06 13:34:51 +02:00
|
|
|
%define _appdefdir %( grep "configdirspec=" $( which xmkmf ) | sed -r 's,^[^=]+=.*-I(.*)/config.*$,\\1/app-defaults,' )
|
2018-10-17 10:57:56 +02:00
|
|
|
%define CHECKSUM_SUFFIX .hmac
|
|
|
|
%define CHECKSUM_HMAC_KEY "HMAC_KEY:OpenSSH-FIPS@SLE"
|
2020-10-15 16:25:21 +02:00
|
|
|
|
2018-10-17 10:57:56 +02:00
|
|
|
#Compat macro for new _fillupdir macro introduced in Nov 2017
|
|
|
|
%if ! %{defined _fillupdir}
|
|
|
|
%define _fillupdir %{_localstatedir}/adm/fillup-templates
|
2016-09-30 22:34:19 +02:00
|
|
|
%endif
|
2018-10-17 10:57:56 +02:00
|
|
|
Name: openssh
|
Accepting request 922068 from home:hpjansson:branches:network
- Version upgrade to 8.8p1
* No changes for askpass, see main package changelog for
details
- Version update to 8.8p1:
= Security
* sshd(8) from OpenSSH 6.2 through 8.7 failed to correctly initialise
supplemental groups when executing an AuthorizedKeysCommand or
AuthorizedPrincipalsCommand, where a AuthorizedKeysCommandUser or
AuthorizedPrincipalsCommandUser directive has been set to run the
command as a different user. Instead these commands would inherit
the groups that sshd(8) was started with.
Depending on system configuration, inherited groups may allow
AuthorizedKeysCommand/AuthorizedPrincipalsCommand helper programs to
gain unintended privilege.
Neither AuthorizedKeysCommand nor AuthorizedPrincipalsCommand are
enabled by default in sshd_config(5).
= Potentially-incompatible changes
* This release disables RSA signatures using the SHA-1 hash algorithm
by default. This change has been made as the SHA-1 hash algorithm is
cryptographically broken, and it is possible to create chosen-prefix
hash collisions for <USD$50K.
For most users, this change should be invisible and there is
no need to replace ssh-rsa keys. OpenSSH has supported RFC8332
RSA/SHA-256/512 signatures since release 7.2 and existing ssh-rsa keys
will automatically use the stronger algorithm where possible.
Incompatibility is more likely when connecting to older SSH
implementations that have not been upgraded or have not closely tracked
improvements in the SSH protocol. For these cases, it may be necessary
to selectively re-enable RSA/SHA1 to allow connection and/or user
authentication via the HostkeyAlgorithms and PubkeyAcceptedAlgorithms
options.
= New features
* ssh(1): allow the ssh_config(5) CanonicalizePermittedCNAMEs
directive to accept a "none" argument to specify the default
behaviour.
= Bugfixes
* scp(1): when using the SFTP protocol, continue transferring files
after a transfer error occurs, better matching original scp/rcp
behaviour.
* ssh(1): fixed a number of memory leaks in multiplexing,
* ssh-keygen(1): avoid crash when using the -Y find-principals
command.
* A number of documentation and manual improvements, including
bz#3340, PR139, PR215, PR241, PR257
- Additional changes from 8.7p1 release:
= Potentially-incompatible changes
* scp(1): this release changes the behaviour of remote to remote
copies (e.g. "scp host-a:/path host-b:") to transfer through the
local host by default. This was previously available via the -3
flag. This mode avoids the need to expose credentials on the
origin hop, avoids triplicate interpretation of filenames by the
shell (by the local system, the copy origin and the destination)
and, in conjunction with the SFTP support for scp(1) mentioned
below, allows use of all authentication methods to the remote
hosts (previously, only non-interactive methods could be used).
A -R flag has been added to select the old behaviour.
* ssh(1)/sshd(8): both the client and server are now using a
stricter configuration file parser. The new parser uses more
shell-like rules for quotes, space and escape characters. It is
also more strict in rejecting configurations that include options
lacking arguments. Previously some options (e.g. DenyUsers) could
appear on a line with no subsequent arguments. This release will
reject such configurations. The new parser will also reject
configurations with unterminated quotes and multiple '='
characters after the option name.
* ssh(1): when using SSHFP DNS records for host key verification,
ssh(1) will verify all matching records instead of just those
with the specific signature type requested. This may cause host
key verification problems if stale SSHFP records of a different
or legacy signature type exist alongside other records for a
particular host. bz#3322
* ssh-keygen(1): when generating a FIDO key and specifying an
explicit attestation challenge (using -Ochallenge), the challenge
will now be hashed by the builtin security key middleware. This
removes the (undocumented) requirement that challenges be exactly
32 bytes in length and matches the expectations of libfido2.
* sshd(8): environment="..." directives in authorized_keys files are
now first-match-wins and limited to 1024 discrete environment
variable names.
= New features
* scp(1): experimental support for transfers using the SFTP protocol
as a replacement for the venerable SCP/RCP protocol that it has
traditionally used. SFTP offers more predictable filename handling
and does not require expansion of glob(3) patterns via the shell
on the remote side.
* sftp-server(8): add a protocol extension to support expansion of
~/ and ~user/ prefixed paths. This was added to support these
paths when used by scp(1) while in SFTP mode.
* ssh(1): add a ForkAfterAuthentication ssh_config(5) counterpart to
the ssh(1) -f flag. GHPR231
* ssh(1): add a StdinNull directive to ssh_config(5) that allows the
config file to do the same thing as -n does on the ssh(1) command-
line. GHPR231
* ssh(1): add a SessionType directive to ssh_config, allowing the
configuration file to offer equivalent control to the -N (no
session) and -s (subsystem) command-line flags. GHPR231
* ssh-keygen(1): allowed signers files used by ssh-keygen(1)
signatures now support listing key validity intervals alongside
they key, and ssh-keygen(1) can optionally check during signature
verification whether a specified time falls inside this interval.
This feature is intended for use by git to support signing and
verifying objects using ssh keys.
* ssh-keygen(8): support printing of the full public key in a sshsig
signature via a -Oprint-pubkey flag.
= Bugfixes
* ssh(1)/sshd(8): start time-based re-keying exactly on schedule in
the client and server mainloops. Previously the re-key timeout
could expire but re-keying would not start until a packet was sent
or received, causing a spin in select() if the connection was
quiescent.
* ssh-keygen(1): avoid Y2038 problem in printing certificate
validity lifetimes. Dates past 2^31-1 seconds since epoch were
displayed incorrectly on some platforms. bz#3329
* scp(1): allow spaces to appear in usernames for local to remote
and scp -3 remote to remote copies. bz#1164
* ssh(1)/sshd(8): remove references to ChallengeResponseAuthentication
in favour of KbdInteractiveAuthentication. The former is what was in
SSHv1, the latter is what is in SSHv2 (RFC4256) and they were
treated as somewhat but not entirely equivalent. We retain the old
name as a deprecated alias so configuration files continue to work
as well as a reference in the man page for people looking for it.
bz#3303
* ssh(1)/ssh-add(1)/ssh-keygen(1): fix decoding of X.509 subject name
when extracting a key from a PKCS#11 certificate. bz#3327
* ssh(1): restore blocking status on stdio fds before close. ssh(1)
needs file descriptors in non-blocking mode to operate but it was
not restoring the original state on exit. This could cause
problems with fds shared with other programs via the shell,
bz#3280 and GHPR246
* ssh(1)/sshd(8): switch both client and server mainloops from
select(3) to pselect(3). Avoids race conditions where a signal
may arrive immediately before select(3) and not be processed until
an event fires. bz#2158
* ssh(1): sessions started with ControlPersist were incorrectly
executing a shell when the -N (no shell) option was specified.
bz#3290
* ssh(1): check if IPQoS or TunnelDevice are already set before
overriding. Prevents values in config files from overriding values
supplied on the command line. bz#3319
* ssh(1): fix debug message when finding a private key to match a
certificate being attempted for user authentication. Previously it
would print the certificate's path, whereas it was supposed to be
showing the private key's path. GHPR247
* sshd(8): match host certificates against host public keys, not
private keys. Allows use of certificates with private keys held in
a ssh-agent. bz#3524
* ssh(1): add a workaround for a bug in OpenSSH 7.4 sshd(8), which
allows RSA/SHA2 signatures for public key authentication but fails
to advertise this correctly via SSH2_MSG_EXT_INFO. This causes
clients of these server to incorrectly match
PubkeyAcceptedAlgorithmse and potentially refuse to offer valid
keys. bz#3213
* sftp(1)/scp(1): degrade gracefully if a sftp-server offers the
limits@openssh.com extension but fails when the client tries to
invoke it. bz#3318
* ssh(1): allow ssh_config SetEnv to override $TERM, which is
otherwise handled specially by the protocol. Useful in ~/.ssh/config
to set TERM to something generic (e.g. "xterm" instead of
"xterm-256color") for destinations that lack terminfo entries.
* sftp-server(8): the limits@openssh.com extension was incorrectly
marked as an operation that writes to the filesystem, which made it
unavailable in sftp-server read-only mode. bz#3318
* ssh(1): fix SEGV in UpdateHostkeys debug() message, triggered when
the update removed more host keys than remain present.
* Many manual page fixes.
- Additional changes from 8.6p1 release:
= Security
* sshd(8): OpenSSH 8.5 introduced the LogVerbose keyword. When this
option was enabled with a set of patterns that activated logging
in code that runs in the low-privilege sandboxed sshd process, the
log messages were constructed in such a way that printf(3) format
strings could effectively be specified the low-privilege code.
= New features
* sftp-server(8): add a new limits@openssh.com protocol extension
that allows a client to discover various server limits, including
maximum packet size and maximum read/write length.
* sftp(1): use the new limits@openssh.com extension (when available)
to select better transfer lengths in the client.
* sshd(8): Add ModuliFile keyword to sshd_config to specify the
location of the "moduli" file containing the groups for DH-GEX.
* unit tests: Add a TEST_SSH_ELAPSED_TIMES environment variable to
enable printing of the elapsed time in seconds of each test.
= Bugfixes
* ssh_config(5), sshd_config(5): sync CASignatureAlgorithms lists in
manual pages with the current default. GHPR174
* ssh(1): ensure that pkcs11_del_provider() is called before exit.
GHPR234
* ssh(1), sshd(8): fix problems in string->argv conversion. Multiple
backslashes were not being dequoted correctly and quoted space in
the middle of a string was being incorrectly split. GHPR223
* ssh(1): return non-zero exit status when killed by signal; bz#3281
* sftp-server(8): increase maximum SSH2_FXP_READ to match the maximum
packet size. Also handle zero-length reads that are not explicitly
banned by the spec.
- Additional changes from 8.5p1 release:
= Security
* ssh-agent(1): fixed a double-free memory corruption that was
introduced in OpenSSH 8.2 . We treat all such memory faults as
potentially exploitable. This bug could be reached by an attacker
with access to the agent socket.
= Potentially-incompatible changes
* ssh(1), sshd(8): this release changes the first-preference signature
algorithm from ECDSA to ED25519.
* ssh(1), sshd(8): set the TOS/DSCP specified in the configuration
for interactive use prior to TCP connect. The connection phase of
the SSH session is time-sensitive and often explicitly interactive.
The ultimate interactive/bulk TOS/DSCP will be set after
authentication completes.
* ssh(1), sshd(8): remove the pre-standardization cipher
rijndael-cbc@lysator.liu.se. It is an alias for aes256-cbc before
it was standardized in RFC4253 (2006), has been deprecated and
disabled by default since OpenSSH 7.2 (2016) and was only briefly
documented in ssh.1 in 2001.
* ssh(1), sshd(8): update/replace the experimental post-quantum
hybrid key exchange method based on Streamlined NTRU Prime coupled
with X25519. The previous sntrup4591761x25519-sha512@tinyssh.org
method is replaced with sntrup761x25519-sha512@openssh.com.
* ssh(1): disable CheckHostIP by default. It provides insignificant
benefits while making key rotation significantly more difficult,
especially for hosts behind IP-based load-balancers.
= New features
* ssh(1): this release enables UpdateHostkeys by default subject to
some conservative preconditions:
- The key was matched in the UserKnownHostsFile (and not in the
GlobalKnownHostsFile).
- The same key does not exist under another name.
- A certificate host key is not in use.
- known_hosts contains no matching wildcard hostname pattern.
- VerifyHostKeyDNS is not enabled.
- The default UserKnownHostsFile is in use.
* ssh(1), sshd(8): add a new LogVerbose configuration directive for
that allows forcing maximum debug logging by file/function/line
pattern-lists.
* ssh(1): when prompting the user to accept a new hostkey, display
any other host names/addresses already associated with the key.
* ssh(1): allow UserKnownHostsFile=none to indicate that no
known_hosts file should be used to identify host keys.
* ssh(1): add a ssh_config KnownHostsCommand option that allows the
client to obtain known_hosts data from a command in addition to
the usual files.
* ssh(1): add a ssh_config PermitRemoteOpen option that allows the
client to restrict the destination when RemoteForward is used
with SOCKS.
* ssh(1): for FIDO keys, if a signature operation fails with a
"incorrect PIN" reason and no PIN was initially requested from the
user, then request a PIN and retry the operation. This supports
some biometric devices that fall back to requiring PIN when reading
of the biometric failed, and devices that require PINs for all
hosted credentials.
* sshd(8): implement client address-based rate-limiting via new
sshd_config(5) PerSourceMaxStartups and PerSourceNetBlockSize
directives that provide more fine-grained control on a per-origin
address basis than the global MaxStartups limit.
= Bugfixes
* ssh(1): Prefix keyboard interactive prompts with "(user@host)" to
make it easier to determine which connection they are associated
with in cases like scp -3, ProxyJump, etc. bz#3224
* sshd(8): fix sshd_config SetEnv directives located inside Match
blocks. GHPR201
* ssh(1): when requesting a FIDO token touch on stderr, inform the
user once the touch has been recorded.
* ssh(1): prevent integer overflow when ridiculously large
ConnectTimeout values are specified, capping the effective value
(for most platforms) at 24 days. bz#3229
* ssh(1): consider the ECDSA key subtype when ordering host key
algorithms in the client.
* ssh(1), sshd(8): rename the PubkeyAcceptedKeyTypes keyword to
PubkeyAcceptedAlgorithms. The previous name incorrectly suggested
that it control allowed key algorithms, when this option actually
specifies the signature algorithms that are accepted. The previous
name remains available as an alias. bz#3253
* ssh(1), sshd(8): similarly, rename HostbasedKeyTypes (ssh) and
HostbasedAcceptedKeyTypes (sshd) to HostbasedAcceptedAlgorithms.
* sftp-server(8): add missing lsetstat@openssh.com documentation
and advertisement in the server's SSH2_FXP_VERSION hello packet.
* ssh(1), sshd(8): more strictly enforce KEX state-machine by
banning packet types once they are received. Fixes memleak caused
by duplicate SSH2_MSG_KEX_DH_GEX_REQUEST (oss-fuzz #30078).
* sftp(1): allow the full range of UIDs/GIDs for chown/chgrp on 32bit
platforms instead of being limited by LONG_MAX. bz#3206
* Minor man page fixes (capitalization, commas, etc.) bz#3223
* sftp(1): when doing an sftp recursive upload or download of a
read-only directory, ensure that the directory is created with
write and execute permissions in the interim so that the transfer
can actually complete, then set the directory permission as the
final step. bz#3222
* ssh-keygen(1): document the -Z, check the validity of its argument
earlier and provide a better error message if it's not correct.
bz#2879
* ssh(1): ignore comments at the end of config lines in ssh_config,
similar to what we already do for sshd_config. bz#2320
* sshd_config(5): mention that DisableForwarding is valid in a
sshd_config Match block. bz3239
* sftp(1): fix incorrect sorting of "ls -ltr" under some
circumstances. bz3248.
* ssh(1), sshd(8): fix potential integer truncation of (unlikely)
timeout values. bz#3250
* ssh(1): make hostbased authentication send the signature algorithm
in its SSH2_MSG_USERAUTH_REQUEST packets instead of the key type.
This make HostbasedAcceptedAlgorithms do what it is supposed to -
filter on signature algorithm and not key type.
- Rebased patches:
* openssh-7.7p1-IPv6_X_forwarding.patch
* openssh-7.7p1-X11_trusted_forwarding.patch
* openssh-7.7p1-X_forward_with_disabled_ipv6.patch
* openssh-7.7p1-cavstest-ctr.patch
* openssh-7.7p1-cavstest-kdf.patch
* openssh-7.7p1-disable_openssl_abi_check.patch
* openssh-7.7p1-eal3.patch
* openssh-7.7p1-enable_PAM_by_default.patch
* openssh-7.7p1-fips.patch
* openssh-7.7p1-fips_checks.patch
* openssh-7.7p1-host_ident.patch
* openssh-7.7p1-hostname_changes_when_forwarding_X.patch
* openssh-7.7p1-ldap.patch
* openssh-7.7p1-no_fork-no_pid_file.patch
* openssh-7.7p1-pam_check_locks.patch
* openssh-7.7p1-pts_names_formatting.patch
* openssh-7.7p1-remove_xauth_cookies_on_exit.patch
* openssh-7.7p1-seccomp_ipc_flock.patch
* openssh-7.7p1-seccomp_stat.patch
* openssh-7.7p1-send_locale.patch
* openssh-7.7p1-sftp_force_permissions.patch
* openssh-7.7p1-sftp_print_diagnostic_messages.patch
* openssh-7.7p1-systemd-notify.patch
* openssh-7.9p1-keygen-preserve-perms.patch
* openssh-7.9p1-revert-new-qos-defaults.patch
* openssh-8.0p1-gssapi-keyex.patch
* openssh-8.1p1-audit.patch
* openssh-8.1p1-seccomp-clock_gettime64.patch
* openssh-8.1p1-seccomp-clock_nanosleep.patch
* openssh-8.1p1-seccomp-clock_nanosleep_time64.patch
* openssh-8.1p1-use-openssl-kdf.patch
* openssh-8.4p1-vendordir.patch
* openssh-fips-ensure-approved-moduli.patch
* openssh-link-with-sk.patch
* openssh-reenable-dh-group14-sha1-default.patch
* openssh-whitelist-syscalls.patch
- Removed openssh-fix-ssh-copy-id.patch (fixed upstream).
OBS-URL: https://build.opensuse.org/request/show/922068
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=235
2021-10-07 10:06:58 +02:00
|
|
|
Version: 8.8p1
|
2011-12-21 18:59:28 +01:00
|
|
|
Release: 0
|
2007-01-07 17:26:05 +01:00
|
|
|
Summary: Secure Shell Client and Server (Remote Login Program)
|
2018-04-06 06:49:00 +02:00
|
|
|
License: BSD-2-Clause AND MIT
|
2011-12-21 18:59:28 +01:00
|
|
|
Group: Productivity/Networking/SSH
|
2020-06-03 15:03:53 +02:00
|
|
|
URL: https://www.openssh.com/
|
2021-01-18 02:12:55 +01:00
|
|
|
Source0: https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz
|
|
|
|
Source1: https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz.asc
|
2007-01-07 17:26:05 +01:00
|
|
|
Source2: sshd.pamd
|
2016-05-30 03:36:18 +02:00
|
|
|
Source3: README.SUSE
|
2013-09-19 06:09:33 +02:00
|
|
|
Source4: README.kerberos
|
|
|
|
Source5: ssh.reg
|
|
|
|
Source6: ssh-askpass
|
|
|
|
Source7: sshd.fw
|
|
|
|
Source8: sysconfig.ssh
|
|
|
|
Source9: sshd-gen-keys-start
|
|
|
|
Source10: sshd.service
|
2016-05-30 03:36:18 +02:00
|
|
|
Source11: README.FIPS
|
2018-01-12 01:42:53 +01:00
|
|
|
Source12: cavs_driver-ssh.pl
|
2020-06-03 15:03:53 +02:00
|
|
|
Source13: https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/RELEASE_KEY.asc#/openssh.keyring
|
2021-01-24 19:19:54 +01:00
|
|
|
Source14: sysusers-sshd.conf
|
2018-10-17 10:57:56 +02:00
|
|
|
Patch1: openssh-7.7p1-X11_trusted_forwarding.patch
|
|
|
|
Patch3: openssh-7.7p1-enable_PAM_by_default.patch
|
|
|
|
Patch4: openssh-7.7p1-eal3.patch
|
|
|
|
Patch6: openssh-7.7p1-send_locale.patch
|
|
|
|
Patch7: openssh-7.7p1-hostname_changes_when_forwarding_X.patch
|
|
|
|
Patch8: openssh-7.7p1-remove_xauth_cookies_on_exit.patch
|
|
|
|
Patch9: openssh-7.7p1-pts_names_formatting.patch
|
|
|
|
Patch10: openssh-7.7p1-pam_check_locks.patch
|
2018-10-19 15:24:01 +02:00
|
|
|
# https://bugzilla.mindrot.org/show_bug.cgi?id=2752
|
2018-10-17 10:57:56 +02:00
|
|
|
Patch14: openssh-7.7p1-seccomp_stat.patch
|
2018-10-19 15:24:01 +02:00
|
|
|
# https://bugzilla.mindrot.org/show_bug.cgi?id=2752
|
2018-10-17 10:57:56 +02:00
|
|
|
Patch15: openssh-7.7p1-seccomp_ipc_flock.patch
|
2018-10-19 15:24:01 +02:00
|
|
|
# https://bugzilla.mindrot.org/show_bug.cgi?id=2752
|
2018-10-19 15:44:30 +02:00
|
|
|
# Local FIPS patchset
|
2018-10-17 10:57:56 +02:00
|
|
|
Patch17: openssh-7.7p1-fips.patch
|
2018-10-19 15:44:30 +02:00
|
|
|
# Local cavs patchset
|
2018-10-17 10:57:56 +02:00
|
|
|
Patch18: openssh-7.7p1-cavstest-ctr.patch
|
2018-10-19 15:44:30 +02:00
|
|
|
# Local cavs patchset
|
2018-10-17 10:57:56 +02:00
|
|
|
Patch19: openssh-7.7p1-cavstest-kdf.patch
|
2018-10-19 15:44:30 +02:00
|
|
|
# Local FIPS patchset
|
2018-10-17 10:57:56 +02:00
|
|
|
Patch20: openssh-7.7p1-fips_checks.patch
|
2018-10-19 15:24:01 +02:00
|
|
|
# https://bugzilla.mindrot.org/show_bug.cgi?id=2641
|
2018-10-17 10:57:56 +02:00
|
|
|
Patch22: openssh-7.7p1-systemd-notify.patch
|
2019-10-10 15:32:50 +02:00
|
|
|
Patch23: openssh-8.0p1-gssapi-keyex.patch
|
2018-10-19 15:44:30 +02:00
|
|
|
# https://bugzilla.mindrot.org/show_bug.cgi?id=1402
|
2019-10-10 15:32:50 +02:00
|
|
|
Patch24: openssh-8.1p1-audit.patch
|
2018-10-19 15:44:30 +02:00
|
|
|
# Local patch to disable runtime abi SSL checks, quite pointless for us
|
2018-10-17 10:57:56 +02:00
|
|
|
Patch26: openssh-7.7p1-disable_openssl_abi_check.patch
|
2018-10-19 15:24:01 +02:00
|
|
|
# https://bugzilla.mindrot.org/show_bug.cgi?id=2641
|
2018-10-17 10:57:56 +02:00
|
|
|
Patch27: openssh-7.7p1-no_fork-no_pid_file.patch
|
|
|
|
Patch28: openssh-7.7p1-host_ident.patch
|
2018-10-19 15:12:48 +02:00
|
|
|
# https://bugzilla.mindrot.org/show_bug.cgi?id=1844
|
2018-10-17 10:57:56 +02:00
|
|
|
Patch29: openssh-7.7p1-sftp_force_permissions.patch
|
2018-10-19 15:24:01 +02:00
|
|
|
# https://bugzilla.mindrot.org/show_bug.cgi?id=2143
|
2018-10-17 10:57:56 +02:00
|
|
|
Patch30: openssh-7.7p1-X_forward_with_disabled_ipv6.patch
|
|
|
|
Patch31: openssh-7.7p1-ldap.patch
|
2018-10-19 15:24:01 +02:00
|
|
|
# https://bugzilla.mindrot.org/show_bug.cgi?id=2213
|
2018-10-17 10:57:56 +02:00
|
|
|
Patch32: openssh-7.7p1-IPv6_X_forwarding.patch
|
|
|
|
Patch33: openssh-7.7p1-sftp_print_diagnostic_messages.patch
|
2019-10-15 09:47:08 +02:00
|
|
|
Patch34: openssh-7.9p1-keygen-preserve-perms.patch
|
|
|
|
Patch35: openssh-7.9p1-revert-new-qos-defaults.patch
|
2019-11-14 16:26:26 +01:00
|
|
|
Patch36: openssh-8.1p1-seccomp-clock_nanosleep.patch
|
2020-02-18 16:10:09 +01:00
|
|
|
Patch37: openssh-8.1p1-seccomp-clock_nanosleep_time64.patch
|
|
|
|
Patch38: openssh-8.1p1-seccomp-clock_gettime64.patch
|
2020-02-28 13:19:42 +01:00
|
|
|
Patch39: openssh-8.1p1-use-openssl-kdf.patch
|
2020-11-22 17:59:16 +01:00
|
|
|
Patch40: openssh-8.1p1-ed25519-use-openssl-rng.patch
|
|
|
|
Patch41: openssh-fips-ensure-approved-moduli.patch
|
|
|
|
Patch42: openssh-link-with-sk.patch
|
2021-01-23 00:06:22 +01:00
|
|
|
Patch43: openssh-reenable-dh-group14-sha1-default.patch
|
2021-01-27 20:14:20 +01:00
|
|
|
Patch45: openssh-8.4p1-ssh_config_d.patch
|
2021-02-15 11:04:25 +01:00
|
|
|
Patch46: openssh-whitelist-syscalls.patch
|
2021-04-09 03:57:00 +02:00
|
|
|
Patch47: openssh-8.4p1-vendordir.patch
|
2021-06-23 20:30:23 +02:00
|
|
|
Patch48: openssh-8.4p1-pam_motd.patch
|
2018-10-17 10:57:56 +02:00
|
|
|
BuildRequires: audit-devel
|
2021-01-18 02:12:55 +01:00
|
|
|
BuildRequires: automake
|
2018-10-17 10:57:56 +02:00
|
|
|
BuildRequires: groff
|
|
|
|
BuildRequires: libedit-devel
|
|
|
|
BuildRequires: libselinux-devel
|
|
|
|
BuildRequires: openldap2-devel
|
|
|
|
BuildRequires: openssl-devel
|
|
|
|
BuildRequires: pam-devel
|
|
|
|
BuildRequires: pkgconfig
|
|
|
|
BuildRequires: zlib-devel
|
2020-06-06 08:49:00 +02:00
|
|
|
BuildRequires: pkgconfig(libfido2)
|
2018-10-17 10:57:56 +02:00
|
|
|
BuildRequires: pkgconfig(libsystemd)
|
2021-01-24 19:19:54 +01:00
|
|
|
BuildRequires: sysuser-shadow
|
|
|
|
BuildRequires: sysuser-tools
|
2020-09-18 19:44:52 +02:00
|
|
|
Requires: %{name}-clients = %{version}-%{release}
|
|
|
|
Requires: %{name}-server = %{version}-%{release}
|
2018-10-17 10:57:56 +02:00
|
|
|
%if %{with tirpc}
|
|
|
|
BuildRequires: libtirpc-devel
|
|
|
|
%endif
|
2019-01-28 09:02:07 +01:00
|
|
|
%if 0%{?suse_version} >= 1550
|
|
|
|
BuildRequires: pkgconfig(krb5)
|
|
|
|
%else
|
|
|
|
BuildRequires: krb5-mini-devel
|
|
|
|
%endif
|
2021-01-23 00:06:22 +01:00
|
|
|
Requires(pre): findutils
|
|
|
|
Requires(pre): grep
|
2011-12-26 08:09:33 +01:00
|
|
|
|
2007-01-07 17:26:05 +01:00
|
|
|
%description
|
|
|
|
SSH (Secure Shell) is a program for logging into and executing commands
|
2020-09-18 19:44:52 +02:00
|
|
|
on a remote machine. It replaces rsh (rlogin and rsh) and
|
2020-10-15 16:25:21 +02:00
|
|
|
provides secure encrypted communication between two untrusted
|
2007-07-27 02:01:43 +02:00
|
|
|
hosts over an insecure network.
|
|
|
|
|
|
|
|
xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can
|
|
|
|
also be forwarded over the secure channel.
|
2007-01-07 17:26:05 +01:00
|
|
|
|
2020-09-18 19:44:52 +02:00
|
|
|
This is a dummy package that pulls in both the client and server
|
|
|
|
components.
|
|
|
|
|
|
|
|
%package common
|
|
|
|
Summary: SSH (Secure Shell) common files
|
|
|
|
Group: Productivity/Networking/SSH
|
|
|
|
Conflicts: nonfreessh
|
|
|
|
Conflicts: %{name}-fips < %{version}-%{release}
|
|
|
|
Conflicts: %{name}-fips > %{version}-%{release}
|
|
|
|
|
|
|
|
%description common
|
|
|
|
SSH (Secure Shell) is a program for logging into and executing commands
|
|
|
|
on a remote machine. It replaces rsh (rlogin and rsh) and
|
2020-10-15 16:25:21 +02:00
|
|
|
provides secure encrypted communication between two untrusted
|
2020-09-18 19:44:52 +02:00
|
|
|
hosts over an insecure network.
|
|
|
|
|
|
|
|
xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can
|
|
|
|
also be forwarded over the secure channel.
|
|
|
|
|
|
|
|
This package contains common files for the Secure Shell server and
|
|
|
|
clients.
|
|
|
|
|
2020-09-14 12:47:29 +02:00
|
|
|
%package server
|
|
|
|
Summary: SSH (Secure Shell) server
|
|
|
|
Group: Productivity/Networking/SSH
|
2020-09-18 19:44:52 +02:00
|
|
|
Requires: %{name}-common = %{version}-%{release}
|
|
|
|
Recommends: audit
|
2021-01-23 00:06:22 +01:00
|
|
|
Requires(pre): findutils
|
|
|
|
Requires(pre): grep
|
2020-09-18 19:44:52 +02:00
|
|
|
Requires(post): %fillup_prereq
|
|
|
|
Requires(post): permissions
|
|
|
|
Provides: openssh:%{_sbindir}/sshd
|
2021-01-24 19:19:54 +01:00
|
|
|
%sysusers_requires
|
2020-09-14 12:47:29 +02:00
|
|
|
|
|
|
|
%description server
|
2020-09-18 19:44:52 +02:00
|
|
|
SSH (Secure Shell) is a program for logging into and executing commands
|
|
|
|
on a remote machine. It replaces rsh (rlogin and rsh) and
|
2020-10-15 16:25:21 +02:00
|
|
|
provides secure encrypted communication between two untrusted
|
2020-09-18 19:44:52 +02:00
|
|
|
hosts over an insecure network.
|
|
|
|
|
|
|
|
xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can
|
|
|
|
also be forwarded over the secure channel.
|
|
|
|
|
|
|
|
This package contains the Secure Shell daemon, which allows clients to
|
|
|
|
securely connect to your server.
|
2020-09-14 12:47:29 +02:00
|
|
|
|
|
|
|
%package clients
|
|
|
|
Summary: SSH (Secure Shell) client applications
|
|
|
|
Group: Productivity/Networking/SSH
|
2020-09-18 19:44:52 +02:00
|
|
|
Requires: %{name}-common = %{version}-%{release}
|
|
|
|
Provides: openssh:%{_bindir}/ssh
|
2020-09-14 12:47:29 +02:00
|
|
|
|
|
|
|
%description clients
|
2020-09-18 19:44:52 +02:00
|
|
|
SSH (Secure Shell) is a program for logging into and executing commands
|
|
|
|
on a remote machine. It replaces rsh (rlogin and rsh) and
|
2020-10-15 16:25:21 +02:00
|
|
|
provides secure encrypted communication between two untrusted
|
2020-09-18 19:44:52 +02:00
|
|
|
hosts over an insecure network.
|
|
|
|
|
|
|
|
xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can
|
|
|
|
also be forwarded over the secure channel.
|
|
|
|
|
|
|
|
This package contains clients for making secure connections to Secure
|
|
|
|
Shell servers.
|
2020-09-14 12:47:29 +02:00
|
|
|
|
2014-01-31 13:18:41 +01:00
|
|
|
%package helpers
|
|
|
|
Summary: OpenSSH AuthorizedKeysCommand helpers
|
2013-09-19 06:09:33 +02:00
|
|
|
Group: Productivity/Networking/SSH
|
2020-09-18 19:44:52 +02:00
|
|
|
Requires: %{name}-common = %{version}-%{release}
|
2013-09-19 06:09:33 +02:00
|
|
|
|
2014-01-31 13:18:41 +01:00
|
|
|
%description helpers
|
2020-09-18 19:44:52 +02:00
|
|
|
SSH (Secure Shell) is a program for logging into and executing commands
|
|
|
|
on a remote machine. It replaces rsh (rlogin and rsh) and
|
2020-10-15 16:25:21 +02:00
|
|
|
provides secure encrypted communication between two untrusted
|
2020-09-18 19:44:52 +02:00
|
|
|
hosts over an insecure network.
|
|
|
|
|
|
|
|
xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can
|
|
|
|
also be forwarded over the secure channel.
|
|
|
|
|
|
|
|
This package contains helper applications for OpenSSH which retrieve
|
|
|
|
keys from various sources.
|
2013-09-19 06:09:33 +02:00
|
|
|
|
2014-04-14 23:53:01 +02:00
|
|
|
%package fips
|
2020-09-18 19:44:52 +02:00
|
|
|
Summary: OpenSSH FIPS crypto module HMACs
|
2014-04-14 23:53:01 +02:00
|
|
|
Group: Productivity/Networking/SSH
|
2020-09-18 19:44:52 +02:00
|
|
|
Requires: %{name}-common = %{version}-%{release}
|
|
|
|
Conflicts: %{name}-common < %{version}-%{release}
|
|
|
|
Conflicts: %{name}-common > %{version}-%{release}
|
2016-05-30 03:36:18 +02:00
|
|
|
Obsoletes: %{name}-hmac
|
2014-04-14 23:53:01 +02:00
|
|
|
|
|
|
|
%description fips
|
2020-09-18 19:44:52 +02:00
|
|
|
This package contains hashes that, together with the main openssh packages,
|
|
|
|
form the FIPS certifiable crypto module.
|
2014-04-14 23:53:01 +02:00
|
|
|
|
2018-01-12 01:42:53 +01:00
|
|
|
%package cavs
|
2020-09-18 19:44:52 +02:00
|
|
|
Summary: OpenSSH FIPS crypto module CAVS tests
|
2018-01-12 01:42:53 +01:00
|
|
|
Group: Productivity/Networking/SSH
|
2020-09-18 19:44:52 +02:00
|
|
|
Requires: %{name}-common = %{version}-%{release}
|
2018-01-12 01:42:53 +01:00
|
|
|
|
|
|
|
%description cavs
|
2020-10-15 16:25:21 +02:00
|
|
|
This package contains the FIPS-140 CAVS (Cryptographic Algorithm
|
2020-09-18 19:44:52 +02:00
|
|
|
Validation Program/Suite) related tests of OpenSSH.
|
2016-05-30 03:36:18 +02:00
|
|
|
|
2007-01-07 17:26:05 +01:00
|
|
|
%prep
|
2018-10-17 10:57:56 +02:00
|
|
|
%setup -q
|
2016-05-30 03:36:18 +02:00
|
|
|
cp %{SOURCE3} %{SOURCE4} %{SOURCE11} .
|
2007-01-07 17:26:05 +01:00
|
|
|
|
2018-10-17 10:57:56 +02:00
|
|
|
%autopatch -p1
|
|
|
|
|
2019-01-04 07:19:36 +01:00
|
|
|
# set libexec dir in the LDAP patch
|
2018-05-01 01:44:41 +02:00
|
|
|
sed -i.libexec 's,@LIBEXECDIR@,%{_libexecdir}/ssh,' \
|
|
|
|
$( grep -Rl @LIBEXECDIR@ \
|
2018-10-17 10:57:56 +02:00
|
|
|
$( grep "^+++" openssh-7.7p1-ldap.patch | sed -r 's@^.+/([^/\t ]+).*$@\1@' )
|
2018-05-01 01:44:41 +02:00
|
|
|
)
|
2016-04-06 13:34:51 +02:00
|
|
|
|
2018-01-12 01:42:53 +01:00
|
|
|
%build
|
2011-09-07 17:50:44 +02:00
|
|
|
autoreconf -fiv
|
2018-10-17 10:57:56 +02:00
|
|
|
%ifarch s390 s390x %{sparc}
|
2007-01-07 17:26:05 +01:00
|
|
|
PIEFLAGS="-fPIE"
|
|
|
|
%else
|
|
|
|
PIEFLAGS="-fpie"
|
|
|
|
%endif
|
2013-09-19 06:09:33 +02:00
|
|
|
CFLAGS="%{optflags} $PIEFLAGS -fstack-protector"
|
|
|
|
CXXFLAGS="%{optflags} $PIEFLAGS -fstack-protector"
|
|
|
|
LDFLAGS="-pie -Wl,--as-needed"
|
2019-01-04 07:19:36 +01:00
|
|
|
#CPPFLAGS="%%{optflags} -DUSE_INTERNAL_B64"
|
2013-09-19 06:09:33 +02:00
|
|
|
export LDFLAGS CFLAGS CXXFLAGS CPPFLAGS
|
2016-05-30 03:36:18 +02:00
|
|
|
%configure \
|
2011-10-19 04:18:13 +02:00
|
|
|
--sysconfdir=%{_sysconfdir}/ssh \
|
|
|
|
--libexecdir=%{_libexecdir}/ssh \
|
2011-02-04 11:44:51 +01:00
|
|
|
--with-selinux \
|
2013-09-19 06:09:33 +02:00
|
|
|
--with-pid-dir=/run \
|
2018-01-12 13:57:27 +01:00
|
|
|
--with-systemd \
|
2013-09-19 06:09:33 +02:00
|
|
|
--with-ssl-engine \
|
2011-02-04 11:44:51 +01:00
|
|
|
--with-pam \
|
2013-09-19 06:09:33 +02:00
|
|
|
--with-kerberos5=%{_prefix} \
|
2018-10-17 10:57:56 +02:00
|
|
|
--with-privsep-path=%{_localstatedir}/lib/empty \
|
2014-02-14 15:54:10 +01:00
|
|
|
%if %{sandbox_seccomp}
|
|
|
|
--with-sandbox=seccomp_filter \
|
|
|
|
%else
|
2011-10-19 04:18:13 +02:00
|
|
|
--with-sandbox=rlimit \
|
2013-09-19 06:09:33 +02:00
|
|
|
%endif
|
2011-02-04 11:44:51 +01:00
|
|
|
--disable-strip \
|
2013-09-19 06:09:33 +02:00
|
|
|
--with-audit=linux \
|
|
|
|
--with-ldap \
|
|
|
|
--with-xauth=%{_bindir}/xauth \
|
|
|
|
--with-libedit \
|
2020-06-06 08:49:00 +02:00
|
|
|
--with-security-key-builtin \
|
2018-10-17 11:24:31 +02:00
|
|
|
--target=%{_target_cpu}-suse-linux
|
2013-09-19 06:09:33 +02:00
|
|
|
|
2020-06-03 15:03:53 +02:00
|
|
|
%make_build
|
2021-04-09 03:57:00 +02:00
|
|
|
%sysusers_generate_pre %{SOURCE14} sshd sshd.conf
|
2013-09-19 06:09:33 +02:00
|
|
|
|
2007-01-07 17:26:05 +01:00
|
|
|
%install
|
2018-10-17 10:57:56 +02:00
|
|
|
%make_install
|
2021-01-04 18:53:11 +01:00
|
|
|
%if %{defined _distconfdir}
|
|
|
|
install -d -m 755 %{buildroot}%{_distconfdir}/pam.d
|
|
|
|
install -m 644 %{SOURCE2} %{buildroot}%{_distconfdir}/pam.d/sshd
|
|
|
|
%else
|
2011-10-19 04:18:13 +02:00
|
|
|
install -d -m 755 %{buildroot}%{_sysconfdir}/pam.d
|
2013-09-19 06:09:33 +02:00
|
|
|
install -m 644 %{SOURCE2} %{buildroot}%{_sysconfdir}/pam.d/sshd
|
2021-01-04 18:53:11 +01:00
|
|
|
%endif
|
|
|
|
install -d -m 755 %{buildroot}%{_localstatedir}/lib/sshd
|
2021-01-27 20:14:20 +01:00
|
|
|
install -d -m 755 %{buildroot}%{_sysconfdir}/ssh/ssh_config.d
|
|
|
|
install -d -m 755 %{buildroot}%{_sysconfdir}/ssh/sshd_config.d
|
2011-10-19 04:18:13 +02:00
|
|
|
install -d -m 755 %{buildroot}%{_sysconfdir}/slp.reg.d/
|
2013-09-19 06:09:33 +02:00
|
|
|
install -m 644 %{SOURCE5} %{buildroot}%{_sysconfdir}/slp.reg.d/
|
2014-02-14 15:54:10 +01:00
|
|
|
install -D -m 0644 %{SOURCE10} %{buildroot}%{_unitdir}/sshd.service
|
2018-10-17 10:57:56 +02:00
|
|
|
ln -s service %{buildroot}%{_sbindir}/rcsshd
|
2018-01-12 13:57:27 +01:00
|
|
|
install -d -m 755 %{buildroot}%{_fillupdir}
|
|
|
|
install -m 644 %{SOURCE8} %{buildroot}%{_fillupdir}
|
2007-01-07 17:26:05 +01:00
|
|
|
# install shell script to automate the process of adding your public key to a remote machine
|
2011-10-19 04:18:13 +02:00
|
|
|
install -m 755 contrib/ssh-copy-id %{buildroot}%{_bindir}
|
2011-11-02 16:44:39 +01:00
|
|
|
install -m 644 contrib/ssh-copy-id.1 %{buildroot}%{_mandir}/man1
|
2018-10-17 10:57:56 +02:00
|
|
|
sed -i -e s@%{_prefix}/libexec@%{_libexecdir}@g %{buildroot}%{_sysconfdir}/ssh/sshd_config
|
2013-09-19 06:09:33 +02:00
|
|
|
|
2021-04-27 15:00:08 +02:00
|
|
|
# Move /etc to /usr/etc/ssh
|
|
|
|
mkdir -p %{buildroot}%{_distconfdir}/ssh
|
|
|
|
mv %{buildroot}%{_sysconfdir}/ssh/moduli %{buildroot}%{_distconfdir}/ssh/
|
|
|
|
mv %{buildroot}%{_sysconfdir}/ssh/ssh_config %{buildroot}%{_distconfdir}/ssh/
|
|
|
|
mv %{buildroot}%{_sysconfdir}/ssh/sshd_config %{buildroot}%{_distconfdir}/ssh/
|
2021-04-09 03:57:00 +02:00
|
|
|
|
2019-08-19 11:45:46 +02:00
|
|
|
%if 0%{?suse_version} < 1550
|
2018-12-11 17:01:09 +01:00
|
|
|
# install firewall definitions
|
2011-11-02 16:44:39 +01:00
|
|
|
mkdir -p %{buildroot}%{_fwdefdir}
|
2013-09-19 06:09:33 +02:00
|
|
|
install -m 644 %{SOURCE7} %{buildroot}%{_fwdefdir}/sshd
|
2019-08-19 11:45:46 +02:00
|
|
|
%endif
|
2013-09-19 06:09:33 +02:00
|
|
|
|
|
|
|
# askpass wrapper
|
|
|
|
sed -e "s,@LIBEXECDIR@,%{_libexecdir},g" < %{SOURCE6} > %{buildroot}%{_libexecdir}/ssh/ssh-askpass
|
2018-01-12 01:42:53 +01:00
|
|
|
sed -e "s,@LIBEXECDIR@,%{_libexecdir},g" < %{SOURCE12} > %{buildroot}%{_libexecdir}/ssh/cavs_driver-ssh.pl
|
2013-09-19 06:09:33 +02:00
|
|
|
rm -f %{buildroot}%{_datadir}/Ssh.bin
|
2014-02-14 15:54:10 +01:00
|
|
|
# sshd keys generator wrapper
|
2013-09-19 06:09:33 +02:00
|
|
|
install -D -m 0755 %{SOURCE9} %{buildroot}%{_sbindir}/sshd-gen-keys-start
|
2007-01-07 17:26:05 +01:00
|
|
|
|
2021-01-24 19:19:54 +01:00
|
|
|
# Install sysusers.d config for sshd user
|
|
|
|
mkdir -p %{buildroot}%{_sysusersdir}
|
|
|
|
install -m 644 %{SOURCE14} %{buildroot}%{_sysusersdir}/sshd.conf
|
|
|
|
|
2014-04-14 23:53:01 +02:00
|
|
|
# the hmac hashes - taken from openssl
|
|
|
|
#
|
|
|
|
# re-define the __os_install_post macro: the macro strips
|
|
|
|
# the binaries and thereby invalidates any hashes created earlier.
|
|
|
|
#
|
2019-01-04 07:19:36 +01:00
|
|
|
# this shows up earlier because otherwise the %%expand of
|
2014-04-14 23:53:01 +02:00
|
|
|
# the macro is too late.
|
|
|
|
%{expand:%%global __os_install_post {%__os_install_post
|
|
|
|
for b in \
|
|
|
|
%{_bindir}/ssh \
|
|
|
|
%{_sbindir}/sshd \
|
|
|
|
%{_libexecdir}/ssh/sftp-server \
|
|
|
|
; do
|
2016-05-30 03:36:18 +02:00
|
|
|
openssl dgst -sha256 -binary -hmac %{CHECKSUM_HMAC_KEY} < %{buildroot}$b > %{buildroot}$b%{CHECKSUM_SUFFIX}
|
2014-04-14 23:53:01 +02:00
|
|
|
done
|
|
|
|
|
|
|
|
}}
|
|
|
|
|
2021-01-24 19:19:54 +01:00
|
|
|
%pre server -f sshd.pre
|
2021-01-04 18:53:11 +01:00
|
|
|
%if %{defined _distconfdir}
|
2021-06-23 21:02:47 +02:00
|
|
|
# Prepare for migration to /usr/etc.
|
2021-01-04 18:53:11 +01:00
|
|
|
test -f /etc/pam.d/sshd.rpmsave && mv -v /etc/pam.d/sshd.rpmsave /etc/pam.d/sshd.rpmsave.old ||:
|
2021-06-23 21:02:47 +02:00
|
|
|
test -f /etc/ssh/sshd_config.rpmsave && mv -v /etc/ssh/sshd_config.rpmsave /etc/ssh/sshd_config.rpmsave.old ||:
|
2021-01-04 18:53:11 +01:00
|
|
|
%endif
|
|
|
|
|
2011-11-29 20:55:10 +01:00
|
|
|
%service_add_pre sshd.service
|
2011-10-19 04:18:13 +02:00
|
|
|
|
2020-09-14 12:47:29 +02:00
|
|
|
%post server
|
2020-09-25 21:42:09 +02:00
|
|
|
%{fillup_only -n ssh}
|
2011-11-29 20:55:10 +01:00
|
|
|
%service_add_post sshd.service
|
2020-10-15 16:25:21 +02:00
|
|
|
|
2020-09-14 12:47:29 +02:00
|
|
|
%preun server
|
2011-11-29 20:55:10 +01:00
|
|
|
%service_del_preun sshd.service
|
2007-01-07 17:26:05 +01:00
|
|
|
|
2020-09-14 12:47:29 +02:00
|
|
|
%postun server
|
2016-05-30 03:36:18 +02:00
|
|
|
# The openssh-fips trigger script for openssh will normally restart sshd once
|
2020-10-15 16:25:21 +02:00
|
|
|
# it gets installed, so only restart the service here if openssh-fips is not
|
|
|
|
# present.
|
|
|
|
if rpm -q openssh-fips >/dev/null 2>/dev/null; then
|
|
|
|
%service_del_postun_without_restart sshd.service
|
|
|
|
else
|
2014-02-14 15:54:10 +01:00
|
|
|
%service_del_postun sshd.service
|
2020-10-15 16:25:21 +02:00
|
|
|
fi
|
2007-01-07 17:26:05 +01:00
|
|
|
|
2021-01-04 18:53:11 +01:00
|
|
|
%if %{defined _distconfdir}
|
|
|
|
%posttrans server
|
|
|
|
# Migration to /usr/etc.
|
|
|
|
test -f /etc/pam.d/sshd.rpmsave && mv -v /etc/pam.d/sshd.rpmsave /etc/pam.d/sshd ||:
|
2021-06-23 21:02:47 +02:00
|
|
|
test -f /etc/ssh/sshd_config.rpmsave && mv -v /etc/ssh/sshd_config.rpmsave /etc/ssh/sshd_config ||:
|
2021-01-04 18:53:11 +01:00
|
|
|
%endif
|
|
|
|
|
2021-06-23 21:02:47 +02:00
|
|
|
%if %{defined _distconfdir}
|
|
|
|
%pre clients
|
|
|
|
# Prepare for migration to /usr/etc.
|
|
|
|
test -f /etc/ssh/ssh_config.rpmsave && mv -v /etc/ssh/ssh_config.rpmsave /etc/ssh/ssh_config.rpmsave.old ||:
|
|
|
|
%endif
|
|
|
|
|
|
|
|
%if %{defined _distconfdir}
|
|
|
|
%posttrans clients
|
|
|
|
# Migration to /usr/etc.
|
|
|
|
test -f /etc/ssh/ssh_config.rpmsave && mv -v /etc/ssh/ssh_config.rpmsave /etc/ssh/ssh_config ||:
|
|
|
|
%endif
|
2021-01-04 18:53:11 +01:00
|
|
|
|
2016-05-30 03:36:18 +02:00
|
|
|
%triggerin -n openssh-fips -- %{name} = %{version}-%{release}
|
|
|
|
%restart_on_update sshd
|
|
|
|
|
2007-01-07 17:26:05 +01:00
|
|
|
%files
|
2020-09-18 19:44:52 +02:00
|
|
|
# openssh is an empty package that depends on -clients and -server,
|
|
|
|
# resulting in a clean upgrade path from prior to the split even when
|
|
|
|
# recommends are disabled.
|
|
|
|
|
|
|
|
%files common
|
2018-04-06 06:49:00 +02:00
|
|
|
%license LICENCE
|
|
|
|
%doc README.SUSE README.kerberos README.FIPS ChangeLog OVERVIEW README TODO CREDITS
|
2011-10-19 04:18:13 +02:00
|
|
|
%attr(0755,root,root) %dir %{_sysconfdir}/ssh
|
2021-04-27 15:00:08 +02:00
|
|
|
%attr(0755,root,root) %dir %{_distconfdir}/ssh
|
|
|
|
%attr(0600,root,root) %{_distconfdir}/ssh/moduli
|
2020-09-14 12:47:29 +02:00
|
|
|
%attr(0444,root,root) %{_mandir}/man1/ssh-keygen.1*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man5/moduli.5*
|
|
|
|
%attr(0755,root,root) %{_bindir}/ssh-keygen*
|
|
|
|
|
|
|
|
%files server
|
|
|
|
%attr(0755,root,root) %{_sbindir}/sshd
|
|
|
|
%attr(0755,root,root) %{_sbindir}/rcsshd
|
|
|
|
%attr(0755,root,root) %{_sbindir}/sshd-gen-keys-start
|
2021-01-27 20:14:20 +01:00
|
|
|
%dir %attr(0755,root,root) %{_localstatedir}/lib/sshd
|
|
|
|
%dir %attr(0755,root,root) %{_sysconfdir}/ssh/sshd_config.d
|
2021-04-27 15:00:08 +02:00
|
|
|
%attr(0755,root,root) %dir %{_distconfdir}/ssh
|
|
|
|
%attr(0640,root,root) %{_distconfdir}/ssh/sshd_config
|
2021-01-04 18:53:11 +01:00
|
|
|
%if %{defined _distconfdir}
|
|
|
|
%attr(0644,root,root) %{_distconfdir}/pam.d/sshd
|
|
|
|
%else
|
2013-09-19 06:09:33 +02:00
|
|
|
%attr(0644,root,root) %config(noreplace) %{_sysconfdir}/pam.d/sshd
|
2021-01-04 18:53:11 +01:00
|
|
|
%endif
|
2018-10-17 10:57:56 +02:00
|
|
|
%attr(0644,root,root) %{_unitdir}/sshd.service
|
2021-01-24 19:19:54 +01:00
|
|
|
%attr(0644,root,root) %{_sysusersdir}/sshd.conf
|
2020-09-14 12:47:29 +02:00
|
|
|
%attr(0444,root,root) %{_mandir}/man5/sshd_config*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man8/sftp-server.8*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man8/sshd.8*
|
|
|
|
%attr(0755,root,root) %{_libexecdir}/ssh/sftp-server
|
2011-10-19 04:18:13 +02:00
|
|
|
%dir %{_sysconfdir}/slp.reg.d
|
|
|
|
%config %{_sysconfdir}/slp.reg.d/ssh.reg
|
2018-01-12 13:57:27 +01:00
|
|
|
%{_fillupdir}/sysconfig.ssh
|
2019-08-19 11:45:46 +02:00
|
|
|
%if 0%{?suse_version} < 1550
|
2019-01-04 07:19:36 +01:00
|
|
|
%dir %{_fwdir}
|
|
|
|
%dir %{_fwdefdir}
|
2013-09-19 06:09:33 +02:00
|
|
|
%config %{_fwdefdir}/sshd
|
2019-08-19 11:45:46 +02:00
|
|
|
%endif
|
2013-09-19 06:09:33 +02:00
|
|
|
|
2020-09-14 12:47:29 +02:00
|
|
|
%files clients
|
2021-01-27 20:14:20 +01:00
|
|
|
%dir %attr(0755,root,root) %{_sysconfdir}/ssh/ssh_config.d
|
2021-04-27 15:00:08 +02:00
|
|
|
%attr(0644,root,root) %{_distconfdir}/ssh/ssh_config
|
2020-09-14 12:47:29 +02:00
|
|
|
%attr(0755,root,root) %{_bindir}/ssh
|
|
|
|
%attr(0755,root,root) %{_bindir}/scp*
|
|
|
|
%attr(0755,root,root) %{_bindir}/sftp*
|
|
|
|
%attr(0755,root,root) %{_bindir}/ssh-add*
|
|
|
|
%attr(0755,root,root) %{_bindir}/ssh-agent*
|
|
|
|
%attr(0755,root,root) %{_bindir}/ssh-copy-id*
|
|
|
|
%attr(0755,root,root) %{_bindir}/ssh-keyscan*
|
|
|
|
%attr(0755,root,root) %dir %{_libexecdir}/ssh
|
|
|
|
%attr(0755,root,root) %{_libexecdir}/ssh/ssh-askpass*
|
|
|
|
%attr(0755,root,root) %{_libexecdir}/ssh/ssh-keysign*
|
|
|
|
%attr(0755,root,root) %{_libexecdir}/ssh/ssh-pkcs11-helper*
|
|
|
|
%attr(0755,root,root) %{_libexecdir}/ssh/ssh-sk-helper*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man1/scp.1*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man1/sftp.1*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man1/ssh-add.1*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man1/ssh-agent.1*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man1/ssh-keyscan.1*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man1/ssh.1*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man1/ssh-copy-id.1*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man5/ssh_config.5*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man8/ssh-pkcs11-helper.8*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man8/ssh-sk-helper.8*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man8/ssh-keysign.8*
|
|
|
|
|
2014-01-31 13:18:41 +01:00
|
|
|
%files helpers
|
2013-09-19 06:09:33 +02:00
|
|
|
%attr(0755,root,root) %dir %{_sysconfdir}/ssh
|
2018-05-01 01:44:41 +02:00
|
|
|
%verify(not mode) %attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ssh/ldap.conf
|
2013-09-19 06:09:33 +02:00
|
|
|
%attr(0755,root,root) %dir %{_libexecdir}/ssh
|
2018-05-01 01:44:41 +02:00
|
|
|
%attr(0755,root,root) %{_libexecdir}/ssh/ssh-ldap*
|
2019-01-28 09:02:07 +01:00
|
|
|
%attr(0444,root,root) %{_mandir}/man5/ssh-ldap*
|
|
|
|
%attr(0444,root,root) %{_mandir}/man8/ssh-ldap*
|
2018-05-01 01:44:41 +02:00
|
|
|
%doc HOWTO.ldap-keys openssh-lpk-openldap.schema openssh-lpk-sun.schema
|
2007-01-07 17:26:05 +01:00
|
|
|
|
2014-04-14 23:53:01 +02:00
|
|
|
%files fips
|
2016-05-30 03:36:18 +02:00
|
|
|
%attr(0444,root,root) %{_bindir}/ssh%{CHECKSUM_SUFFIX}
|
|
|
|
%attr(0444,root,root) %{_sbindir}/sshd%{CHECKSUM_SUFFIX}
|
|
|
|
%attr(0444,root,root) %{_libexecdir}/ssh/sftp-server%{CHECKSUM_SUFFIX}
|
|
|
|
|
2018-01-12 01:42:53 +01:00
|
|
|
%files cavs
|
|
|
|
%attr(0755,root,root) %{_libexecdir}/ssh/cavs*
|
2014-04-14 23:53:01 +02:00
|
|
|
|
2007-02-22 14:37:20 +01:00
|
|
|
%changelog
|