diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-02-02 22:52:48 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-02-03 13:30:32 +0100 |
commit | ad40d2a62a3d9772ffd95038a73f7e957c39950b (patch) | |
tree | c7be9c070876740641f1deb2df2ea27b4563db9c /patches/source/openssh/rc.sshd | |
parent | 7453cf8b304eae3ce386c64fe1739e21b2559edb (diff) | |
download | current-20230202225248_15.0.tar.gz current-20230202225248_15.0.tar.xz |
Thu Feb 2 22:52:48 UTC 202320230202225248_15.0
patches/packages/openssh-9.2p1-x86_64-1_slack15.0.txz: Upgraded.
This release contains fixes for two security problems and a memory safety
problem. The memory safety problem is not believed to be exploitable, but
upstream reports most network-reachable memory faults as security bugs.
This update contains some potentially incompatible changes regarding the
scp utility. For more information, see:
https://www.openssh.com/releasenotes.html#9.0
For more information, see:
https://www.openssh.com/releasenotes.html#9.2
(* Security fix *)
Diffstat (limited to 'patches/source/openssh/rc.sshd')
-rw-r--r-- | patches/source/openssh/rc.sshd | 64 |
1 files changed, 64 insertions, 0 deletions
diff --git a/patches/source/openssh/rc.sshd b/patches/source/openssh/rc.sshd new file mode 100644 index 000000000..eea6c6a74 --- /dev/null +++ b/patches/source/openssh/rc.sshd @@ -0,0 +1,64 @@ +#!/bin/sh +# Start/stop/restart the secure shell server: + +# Source options +if [ -r /etc/default/sshd ]; then + . /etc/default/sshd +fi + +sshd_start() { + # Create host keys if needed. + if [ ! -f /etc/ssh/ssh_host_dsa_key ]; then + /usr/bin/ssh-keygen -t dsa -f /etc/ssh/ssh_host_dsa_key -N '' + fi + if [ ! -f /etc/ssh/ssh_host_rsa_key ]; then + /usr/bin/ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key -N '' + fi + if [ ! -f /etc/ssh/ssh_host_ecdsa_key ]; then + /usr/bin/ssh-keygen -t ecdsa -f /etc/ssh/ssh_host_ecdsa_key -N '' + fi + if [ ! -f /etc/ssh/ssh_host_ed25519_key ]; then + /usr/bin/ssh-keygen -t ed25519 -f /etc/ssh/ssh_host_ed25519_key -N '' + fi + # Catch any new host key types not yet created above: + /usr/bin/ssh-keygen -A + # Start the sshd daemon: + /usr/sbin/sshd $SSHD_OPTS +} + +sshd_stop() { + killall sshd +} + +sshd_restart() { + if [ -r /var/run/sshd.pid ]; then + echo "WARNING: killing listener process only. To kill every sshd process, you must" + echo " use 'rc.sshd stop'. 'rc.sshd restart' kills only the parent sshd to" + echo " allow an admin logged in through sshd to use 'rc.sshd restart' without" + echo " being cut off. If sshd has been upgraded, new connections will now" + echo " use the new version, which should be a safe enough approach." + kill `cat /var/run/sshd.pid` + else + echo "WARNING: There does not appear to be a parent instance of sshd running." + echo " If you really want to kill all running instances of sshd (including" + echo " any sessions currently in use), run '/etc/rc.d/rc.sshd stop' instead." + exit 1 + fi + sleep 1 + sshd_start +} + +case "$1" in +'start') + sshd_start + ;; +'stop') + sshd_stop + ;; +'restart') + sshd_restart + ;; +*) + echo "usage $0 start|stop|restart" +esac + |