summaryrefslogtreecommitdiffstats
path: root/patches/source/openssh/rc.sshd
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2023-02-02 22:52:48 +0000
committer Eric Hameleers <alien@slackware.com>2023-02-03 13:30:32 +0100
commitad40d2a62a3d9772ffd95038a73f7e957c39950b (patch)
treec7be9c070876740641f1deb2df2ea27b4563db9c /patches/source/openssh/rc.sshd
parent7453cf8b304eae3ce386c64fe1739e21b2559edb (diff)
downloadcurrent-20230202225248_15.0.tar.gz
current-20230202225248_15.0.tar.xz
Thu Feb 2 22:52:48 UTC 202320230202225248_15.0
patches/packages/openssh-9.2p1-x86_64-1_slack15.0.txz: Upgraded. This release contains fixes for two security problems and a memory safety problem. The memory safety problem is not believed to be exploitable, but upstream reports most network-reachable memory faults as security bugs. This update contains some potentially incompatible changes regarding the scp utility. For more information, see: https://www.openssh.com/releasenotes.html#9.0 For more information, see: https://www.openssh.com/releasenotes.html#9.2 (* Security fix *)
Diffstat (limited to 'patches/source/openssh/rc.sshd')
-rw-r--r--patches/source/openssh/rc.sshd64
1 files changed, 64 insertions, 0 deletions
diff --git a/patches/source/openssh/rc.sshd b/patches/source/openssh/rc.sshd
new file mode 100644
index 000000000..eea6c6a74
--- /dev/null
+++ b/patches/source/openssh/rc.sshd
@@ -0,0 +1,64 @@
+#!/bin/sh
+# Start/stop/restart the secure shell server:
+
+# Source options
+if [ -r /etc/default/sshd ]; then
+ . /etc/default/sshd
+fi
+
+sshd_start() {
+ # Create host keys if needed.
+ if [ ! -f /etc/ssh/ssh_host_dsa_key ]; then
+ /usr/bin/ssh-keygen -t dsa -f /etc/ssh/ssh_host_dsa_key -N ''
+ fi
+ if [ ! -f /etc/ssh/ssh_host_rsa_key ]; then
+ /usr/bin/ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key -N ''
+ fi
+ if [ ! -f /etc/ssh/ssh_host_ecdsa_key ]; then
+ /usr/bin/ssh-keygen -t ecdsa -f /etc/ssh/ssh_host_ecdsa_key -N ''
+ fi
+ if [ ! -f /etc/ssh/ssh_host_ed25519_key ]; then
+ /usr/bin/ssh-keygen -t ed25519 -f /etc/ssh/ssh_host_ed25519_key -N ''
+ fi
+ # Catch any new host key types not yet created above:
+ /usr/bin/ssh-keygen -A
+ # Start the sshd daemon:
+ /usr/sbin/sshd $SSHD_OPTS
+}
+
+sshd_stop() {
+ killall sshd
+}
+
+sshd_restart() {
+ if [ -r /var/run/sshd.pid ]; then
+ echo "WARNING: killing listener process only. To kill every sshd process, you must"
+ echo " use 'rc.sshd stop'. 'rc.sshd restart' kills only the parent sshd to"
+ echo " allow an admin logged in through sshd to use 'rc.sshd restart' without"
+ echo " being cut off. If sshd has been upgraded, new connections will now"
+ echo " use the new version, which should be a safe enough approach."
+ kill `cat /var/run/sshd.pid`
+ else
+ echo "WARNING: There does not appear to be a parent instance of sshd running."
+ echo " If you really want to kill all running instances of sshd (including"
+ echo " any sessions currently in use), run '/etc/rc.d/rc.sshd stop' instead."
+ exit 1
+ fi
+ sleep 1
+ sshd_start
+}
+
+case "$1" in
+'start')
+ sshd_start
+ ;;
+'stop')
+ sshd_stop
+ ;;
+'restart')
+ sshd_restart
+ ;;
+*)
+ echo "usage $0 start|stop|restart"
+esac
+