forked from pool/openssh
08f9072513
- Update of the underlying OpenSSH to 6.5p1 - Update to 6.5p1 Features since 6.4p1: * ssh(1), sshd(8): support for key exchange using ECDH in Daniel Bernstein's Curve25519; default when both the client and server support it. * ssh(1), sshd(8): support for Ed25519 as a public key type fo rboth server and client. Ed25519 is an EC signature offering better security than ECDSA and DSA and good performance. * Add a new private key format that uses a bcrypt KDF to better protect keys at rest. Used unconditionally for Ed25519 keys, on demand for other key types via the -o ssh-keygen(1) option. Intended to become default in the near future. Details documented in PROTOCOL.key. * ssh(1), sshd(8): new transport cipher "chacha20-poly1305@openssh.com" combining Daniel Bernstein's ChaCha20 stream cipher and Poly1305 MAC to build an authenticated encryption mode. Details documented PROTOCOL.chacha20poly1305. * ssh(1), sshd(8): refuse RSA keys from old proprietary clients and servers that use the obsolete RSA+MD5 signature scheme. It will still be possible to connect with these clients/servers but only DSA keys will be accepted, and OpenSSH will refuse connection entirely in a future release. * ssh(1), sshd(8): refuse old proprietary clients and servers that use a weaker key exchange hash calculation. * ssh(1): increase the size of the Diffie-Hellman groups requested for each symmetric key size. New values from NIST Special Publication 800-57 with the upper limit specified by OBS-URL: https://build.opensuse.org/request/show/222365 OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=63
382 lines
11 KiB
RPMSpec
382 lines
11 KiB
RPMSpec
#
|
|
# spec file for package openssh
|
|
#
|
|
# Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany.
|
|
#
|
|
# All modifications and additions to the file contributed by third parties
|
|
# remain the property of their copyright owners, unless otherwise agreed
|
|
# upon. The license for this file, and modifications and additions to the
|
|
# file, is the same license as for the pristine package itself (unless the
|
|
# license for the pristine package is not an Open Source License, in which
|
|
# case the license is the MIT License). An "Open Source License" is a
|
|
# license that conforms to the Open Source Definition (Version 1.9)
|
|
# published by the Open Source Initiative.
|
|
|
|
# Please submit bugfixes or comments via http://bugs.opensuse.org/
|
|
#
|
|
|
|
|
|
%if 0%{suse_version} >= 1100
|
|
%define has_fw_dir 1
|
|
%else
|
|
%define has_fw_dir 0
|
|
%endif
|
|
|
|
%if 0%{suse_version} >= 1110
|
|
%define has_libselinux 1
|
|
%else
|
|
%define has_libselinux 0
|
|
%endif
|
|
|
|
%if 0%{?suse_version} >= 1130
|
|
%define needs_all_dirs 1
|
|
%else
|
|
%define needs_all_dirs 0
|
|
%endif
|
|
|
|
%if 0%{?suse_version} >= 1140
|
|
%define needs_libedit 1
|
|
%else
|
|
%define needs_libedit 0
|
|
%endif
|
|
|
|
%if 0%{?suse_version} > 1140
|
|
%define has_krb_mini 1
|
|
%else
|
|
%define has_krb_mini 0
|
|
%endif
|
|
|
|
%if 0%{?suse_version} > 1220
|
|
%define uses_systemd 1
|
|
%else
|
|
%define uses_systemd 0
|
|
%endif
|
|
|
|
%define sandbox_seccomp 0
|
|
%ifarch %ix86 x86_64
|
|
%if 0%{?suse_version} > 1220
|
|
%define sandbox_seccomp 1
|
|
%endif
|
|
%endif
|
|
|
|
%define _fwdir %{_sysconfdir}/sysconfig/SuSEfirewall2.d
|
|
%define _fwdefdir %{_fwdir}/services
|
|
%define _appdefdir %( grep "configdirspec=" $( which xmkmf ) | sed -r 's,^[^=]+=.*-I(.*)/config.*$,\\1/app-defaults,' )
|
|
%{!?_initddir:%global _initddir %{_initrddir}}
|
|
|
|
Name: openssh
|
|
BuildRequires: audit-devel
|
|
BuildRequires: autoconf
|
|
BuildRequires: groff
|
|
%if %{has_krb_mini}
|
|
BuildRequires: krb5-mini-devel
|
|
%else
|
|
BuildRequires: krb5-devel
|
|
%endif
|
|
%if %{needs_libedit}
|
|
BuildRequires: libedit-devel
|
|
%endif
|
|
%if %{has_libselinux}
|
|
BuildRequires: libselinux-devel
|
|
%endif
|
|
BuildRequires: openldap2-devel
|
|
BuildRequires: openssl-devel
|
|
BuildRequires: pam-devel
|
|
%if %{uses_systemd}
|
|
BuildRequires: pkgconfig(systemd)
|
|
%{?systemd_requires}
|
|
%endif
|
|
BuildRequires: tcpd-devel
|
|
PreReq: pwdutils %{insserv_prereq} %{fillup_prereq} coreutils
|
|
Conflicts: nonfreessh
|
|
Recommends: xauth
|
|
Recommends: %{name}-helpers
|
|
Version: 6.5p1
|
|
Release: 0
|
|
Summary: Secure Shell Client and Server (Remote Login Program)
|
|
License: BSD-3-Clause and MIT
|
|
Group: Productivity/Networking/SSH
|
|
Url: http://www.openssh.com/
|
|
Source: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz
|
|
Source1: sshd.init
|
|
Source2: sshd.pamd
|
|
Source3: README.SuSE
|
|
Source4: README.kerberos
|
|
Source5: ssh.reg
|
|
Source6: ssh-askpass
|
|
Source7: sshd.fw
|
|
Source8: sysconfig.ssh
|
|
Source9: sshd-gen-keys-start
|
|
Source10: sshd.service
|
|
Patch1: openssh-6.5p1-key-converter.patch
|
|
Patch2: openssh-6.5p1-X11-forwarding.patch
|
|
Patch3: openssh-6.5p1-lastlog.patch
|
|
Patch4: openssh-6.5p1-pam-fix2.patch
|
|
Patch5: openssh-6.5p1-saveargv-fix.patch
|
|
Patch6: openssh-6.5p1-pam-fix3.patch
|
|
Patch7: openssh-6.5p1-gssapimitm.patch
|
|
Patch8: openssh-6.5p1-eal3.patch
|
|
Patch9: openssh-6.5p1-blocksigalrm.patch
|
|
Patch10: openssh-6.5p1-send_locale.patch
|
|
Patch11: openssh-6.5p1-xauthlocalhostname.patch
|
|
Patch12: openssh-6.5p1-xauth.patch
|
|
Patch13: openssh-6.5p1-default-protocol.patch
|
|
Patch14: openssh-6.5p1-pts.patch
|
|
Patch15: openssh-6.5p1-pam-check-locks.patch
|
|
Patch16: openssh-6.5p1-fingerprint_hash.patch
|
|
Patch17: openssh-6.5p1-audit1-remove_duplicit_audit.patch
|
|
Patch18: openssh-6.5p1-audit2-better_audit_of_user_actions.patch
|
|
Patch19: openssh-6.5p1-audit3-key_auth_usage.patch
|
|
Patch20: openssh-6.5p1-audit4-kex_results.patch
|
|
Patch21: openssh-6.5p1-audit5-session_key_destruction.patch
|
|
Patch22: openssh-6.5p1-audit6-server_key_destruction.patch
|
|
Patch23: openssh-6.5p1-audit7-libaudit_compat.patch
|
|
Patch24: openssh-6.5p1-audit8-libaudit_dns_timeouts.patch
|
|
Patch25: openssh-6.5p1-seed-prng.patch
|
|
Patch26: openssh-6.5p1-ldap.patch
|
|
Patch27: openssh-6.5p1-fips.patch
|
|
Patch28: openssh-6.5p1-gssapi_key_exchange.patch
|
|
Patch29: openssh-6.5p1-login_options.patch
|
|
Patch30: openssh-6.5p1-disable-openssl-abi-check.patch
|
|
Patch31: openssh-6.5p1-no_fork-no_pid_file.patch
|
|
Patch32: openssh-6.5p1-host_ident.patch
|
|
Patch33: openssh-6.5p1-sftp_homechroot.patch
|
|
Patch34: openssh-6.5p1-sftp_force_permissions.patch
|
|
|
|
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
|
|
|
%description
|
|
SSH (Secure Shell) is a program for logging into and executing commands
|
|
on a remote machine. It is intended to replace rsh (rlogin and rsh) and
|
|
provides openssl (secure encrypted communication) between two untrusted
|
|
hosts over an insecure network.
|
|
|
|
xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can
|
|
also be forwarded over the secure channel.
|
|
|
|
|
|
%package helpers
|
|
Summary: OpenSSH AuthorizedKeysCommand helpers
|
|
Group: Productivity/Networking/SSH
|
|
Requires: openldap2
|
|
Requires: openssh
|
|
|
|
%description helpers
|
|
Helper applications for OpenSSH which retrieve keys from various sources.
|
|
|
|
|
|
%prep
|
|
%setup -q
|
|
#patch1 -p2
|
|
%patch2 -p2
|
|
%patch3 -p2
|
|
%patch4 -p2
|
|
%patch5 -p2
|
|
%patch6 -p2
|
|
%patch7 -p2
|
|
%patch8 -p2
|
|
%patch9 -p2
|
|
%patch10 -p2
|
|
%patch11 -p2
|
|
%patch12 -p2
|
|
%patch13 -p2
|
|
%patch14 -p2
|
|
%patch15 -p2
|
|
%patch16 -p2
|
|
%patch17 -p2
|
|
%patch18 -p2
|
|
%patch19 -p2
|
|
%patch20 -p2
|
|
%patch21 -p2
|
|
%patch22 -p2
|
|
%patch23 -p2
|
|
%patch24 -p2
|
|
%patch25 -p2
|
|
%patch26 -p2
|
|
#patch27 -p2
|
|
#patch28 -p2
|
|
%patch29 -p2
|
|
%patch30 -p2
|
|
%patch31 -p2
|
|
%patch32 -p2
|
|
%patch33 -p2
|
|
%patch34 -p2
|
|
cp %{SOURCE3} %{SOURCE4} .
|
|
|
|
%build
|
|
# set libexec dir in the LDAP patch
|
|
sed -i.libexec 's,@LIBEXECDIR@,%{_libexecdir}/ssh,' \
|
|
$( grep -Rl @LIBEXECDIR@ \
|
|
$( grep "^+++" %{PATCH26} | sed -r 's@^.+/([^/\t ]+).*$@\1@' )
|
|
)
|
|
|
|
autoreconf -fiv
|
|
%ifarch s390 s390x %sparc
|
|
PIEFLAGS="-fPIE"
|
|
%else
|
|
PIEFLAGS="-fpie"
|
|
%endif
|
|
CFLAGS="%{optflags} $PIEFLAGS -fstack-protector"
|
|
#%if 0%{?suse_version} < 1230
|
|
#CFLAGS="-lrt $CFLAGS"
|
|
#%endif
|
|
CXXFLAGS="%{optflags} $PIEFLAGS -fstack-protector"
|
|
LDFLAGS="-pie -Wl,--as-needed"
|
|
#%if 0%{?suse_version} < 1230
|
|
#LDFLAGS="-lrt $LDFLAGS"
|
|
#%endif
|
|
#CPPFLAGS="%{optflags} -DUSE_INTERNAL_B64"
|
|
export LDFLAGS CFLAGS CXXFLAGS CPPFLAGS
|
|
./configure \
|
|
--prefix=%{_prefix} \
|
|
--mandir=%{_mandir} \
|
|
--infodir=%{_infodir} \
|
|
--sysconfdir=%{_sysconfdir}/ssh \
|
|
--libexecdir=%{_libexecdir}/ssh \
|
|
--with-tcp-wrappers \
|
|
%if %{has_libselinux}
|
|
--with-selinux \
|
|
%endif
|
|
%if %{uses_systemd}
|
|
--with-pid-dir=/run \
|
|
%endif
|
|
--with-ssl-engine \
|
|
--with-pam \
|
|
--with-kerberos5=%{_prefix} \
|
|
--with-privsep-path=/var/lib/empty \
|
|
%if %{sandbox_seccomp}
|
|
--with-sandbox=seccomp_filter \
|
|
%else
|
|
--with-sandbox=rlimit \
|
|
%endif
|
|
%ifnarch s390 s390x
|
|
--with-opensc \
|
|
%endif
|
|
--disable-strip \
|
|
--with-audit=linux \
|
|
--with-ldap \
|
|
--with-xauth=%{_bindir}/xauth \
|
|
%if %{needs_libedit}
|
|
--with-libedit \
|
|
%endif
|
|
--target=%{_target_cpu}-suse-linux \
|
|
|
|
### configure end
|
|
make %{?_smp_mflags}
|
|
|
|
#make %{?_smp_mflags} -C converter
|
|
|
|
%install
|
|
make install DESTDIR=%{buildroot}
|
|
#make install DESTDIR=%{buildroot} -C converter
|
|
|
|
install -d -m 755 %{buildroot}%{_sysconfdir}/pam.d
|
|
install -d -m 755 %{buildroot}/var/lib/sshd
|
|
install -m 644 %{SOURCE2} %{buildroot}%{_sysconfdir}/pam.d/sshd
|
|
install -d -m 755 %{buildroot}%{_sysconfdir}/slp.reg.d/
|
|
install -m 644 %{SOURCE5} %{buildroot}%{_sysconfdir}/slp.reg.d/
|
|
install -d -m 755 %{buildroot}%{_initddir}
|
|
%if %{uses_systemd}
|
|
install -m 0755 %{SOURCE1} .
|
|
install -D -m 0644 %{SOURCE10} %{buildroot}%{_unitdir}/sshd.service
|
|
ln -s /usr/sbin/service %{buildroot}%{_sbindir}/rcsshd
|
|
%else
|
|
install -D -m 0755 %{SOURCE1} %{buildroot}%{_initddir}/sshd
|
|
install -m 0644 %{SOURCE10} .
|
|
ln -s ../..%{_initddir}/sshd %{buildroot}%{_sbindir}/rcsshd
|
|
%endif
|
|
install -d -m 755 %{buildroot}/var/adm/fillup-templates
|
|
install -m 644 %{SOURCE8} %{buildroot}/var/adm/fillup-templates
|
|
# install shell script to automate the process of adding your public key to a remote machine
|
|
install -m 755 contrib/ssh-copy-id %{buildroot}%{_bindir}
|
|
install -m 644 contrib/ssh-copy-id.1 %{buildroot}%{_mandir}/man1
|
|
sed -i -e s@/usr/libexec@%{_libexecdir}@g %{buildroot}%{_sysconfdir}/ssh/sshd_config
|
|
|
|
%if %{has_fw_dir}
|
|
#install firewall definitions format is described here:
|
|
#%{_datadir}/SuSEfirewall2/services/TEMPLATE
|
|
mkdir -p %{buildroot}%{_fwdefdir}
|
|
install -m 644 %{SOURCE7} %{buildroot}%{_fwdefdir}/sshd
|
|
%endif
|
|
|
|
# askpass wrapper
|
|
sed -e "s,@LIBEXECDIR@,%{_libexecdir},g" < %{SOURCE6} > %{buildroot}%{_libexecdir}/ssh/ssh-askpass
|
|
rm -f %{buildroot}%{_datadir}/Ssh.bin
|
|
# sshd keys generator wrapper
|
|
install -D -m 0755 %{SOURCE9} %{buildroot}%{_sbindir}/sshd-gen-keys-start
|
|
|
|
%pre
|
|
getent group sshd >/dev/null || %{_sbindir}/groupadd -r sshd
|
|
getent passwd sshd >/dev/null || %{_sbindir}/useradd -r -g sshd -d /var/lib/sshd -s /bin/false -c "SSH daemon" sshd
|
|
%if %{uses_systemd}
|
|
%service_add_pre sshd.service
|
|
%endif
|
|
|
|
%post
|
|
%if %{uses_systemd}
|
|
%{fillup_only -n ssh sshd}
|
|
%service_add_post sshd.service
|
|
%else
|
|
%{fillup_and_insserv -n ssh sshd}
|
|
%endif
|
|
|
|
%preun
|
|
%if %{uses_systemd}
|
|
%service_del_preun sshd.service
|
|
%else
|
|
%stop_on_removal sshd
|
|
%endif
|
|
|
|
%postun
|
|
%if %{uses_systemd}
|
|
%service_del_postun sshd.service
|
|
%else
|
|
%restart_on_update sshd
|
|
%{insserv_cleanup}
|
|
%endif
|
|
|
|
%files
|
|
%defattr(-,root,root)
|
|
%dir %attr(755,root,root) /var/lib/sshd
|
|
%doc README.SuSE README.kerberos ChangeLog OVERVIEW README TODO LICENCE CREDITS
|
|
%attr(0755,root,root) %dir %{_sysconfdir}/ssh
|
|
%attr(0600,root,root) %config(noreplace) %{_sysconfdir}/ssh/moduli
|
|
%verify(not mode) %attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ssh/ssh_config
|
|
%verify(not mode) %attr(0640,root,root) %config(noreplace) %{_sysconfdir}/ssh/sshd_config
|
|
%attr(0644,root,root) %config(noreplace) %{_sysconfdir}/pam.d/sshd
|
|
%if %{uses_systemd}
|
|
%doc sshd.init
|
|
%attr(0644,root,root) %config %{_unitdir}/sshd.service
|
|
%else
|
|
%attr(0755,root,root) %config %{_initddir}/sshd
|
|
%doc sshd.service
|
|
%endif
|
|
%attr(0755,root,root) %{_bindir}/*
|
|
%attr(0755,root,root) %{_sbindir}/*
|
|
%attr(0755,root,root) %dir %{_libexecdir}/ssh
|
|
%exclude %{_libexecdir}/ssh/ssh-ldap*
|
|
%attr(0755,root,root) %{_libexecdir}/ssh/*
|
|
%attr(0444,root,root) %doc %{_mandir}/man1/*
|
|
%attr(0444,root,root) %doc %{_mandir}/man5/*
|
|
%attr(0444,root,root) %doc %{_mandir}/man8/*
|
|
%dir %{_sysconfdir}/slp.reg.d
|
|
%config %{_sysconfdir}/slp.reg.d/ssh.reg
|
|
/var/adm/fillup-templates/sysconfig.ssh
|
|
%if %{has_fw_dir}
|
|
%if %{needs_all_dirs}
|
|
%dir %{_fwdir}
|
|
%dir %{_fwdefdir}
|
|
%endif
|
|
%config %{_fwdefdir}/sshd
|
|
%endif
|
|
|
|
%files helpers
|
|
%defattr(-,root,root)
|
|
%attr(0755,root,root) %dir %{_sysconfdir}/ssh
|
|
%verify(not mode) %attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ssh/ldap.conf
|
|
%attr(0755,root,root) %dir %{_libexecdir}/ssh
|
|
%attr(0755,root,root) %{_libexecdir}/ssh/ssh-ldap*
|
|
%doc HOWTO.ldap-keys openssh-lpk-openldap.schema openssh-lpk-sun.schema
|
|
|
|
%changelog
|