44dc4fd200
- now in protocol2: Background ssh at logout when waiting for forwarded connection / X11 sessions to terminate disabled -DSKEY from Changelog (not complete): 20011115 - (djm) Fix IPv4 default in ssh-keyscan. Spotted by Dan Astoorian <djast@cs.toronto.edu> Fix from markus@ - (djm) Release 3.0.1p1 20011113 - (djm) Fix early (and double) free of remote user when using Kerberos. Patch from Simon Wilkinson <simon@sxw.org.uk> - (djm) AIX login{success,failed} changes. Move loginsuccess call to do_authenticated. Call loginfailed for protocol 2 failures > MAX like we do for protocol 1. Reports from Ralf Wenk <wera0003@fh-karlsruhe.de>, K.Wolkersdorfer@fz-juelich.de and others - (djm) OpenBSD CVS Sync - dugsong@cvs.openbsd.org 2001/11/11 18:47:10 [auth-krb5.c] fix krb5 authorization check. found by <jhawk@MIT.EDU>. from art@, deraadt@ ok - markus@cvs.openbsd.org 2001/11/12 11:17:07 [servconf.c] enable authorized_keys2 again. tested by fries@ 20011112 - OpenBSD CVS Sync - markus@cvs.openbsd.org 2001/10/24 08:41:41 [sshd.c] mention remote port in debug message - markus@cvs.openbsd.org 2001/10/24 08:51:35 [clientloop.c ssh.c] ignore SIGPIPE early, makes ssh work if agent dies, netbsd-pr via itojun@ - markus@cvs.openbsd.org 2001/10/24 19:57:40 [clientloop.c] make ~& (backgrounding) work again for proto v1; add support ~& for v2, too - markus@cvs.openbsd.org 2001/10/25 21:14:32 [ssh-keygen.1 ssh-keygen.c] better docu for fingerprinting, ok deraadt@ - markus@cvs.openbsd.org 2001/10/29 19:27:15 [sshconnect2.c] hostbased: check for client hostkey before building chost - markus@cvs.openbsd.org 2001/11/07 16:03:17 [packet.c packet.h sshconnect2.c] pad using the padding field from the ssh2 packet instead of sending extra ignore messages. tested against several other ssh servers. - markus@cvs.openbsd.org 2001/11/07 21:40:21 [ssh-rsa.c] ssh_rsa_sign/verify: SSH_BUG_SIGBLOB not supported - markus@cvs.openbsd.org 2001/11/07 22:10:28 [ssh-dss.c ssh-rsa.c] missing free and sync dss/rsa code. - markus@cvs.openbsd.org 2001/11/07 22:53:21 [channels.h] crank c->path to 256 so they can hold a full hostname; dwd@bell-labs.com - markus@cvs.openbsd.org 2001/11/08 10:51:08 [readpass.c] don't strdup too much data; from gotoh@taiyo.co.jp; ok millert. - markus@cvs.openbsd.org 2001/11/10 13:22:42 [ssh-rsa.c] KNF (unexpand) - markus@cvs.openbsd.org 2001/11/11 13:02:31 [servconf.c] make AuthorizedKeysFile2 fallback to AuthorizedKeysFile if AuthorizedKeysFile is specified. 20011109 - (stevesk) auth-pam.c: use do_pam_authenticate(PAM_DISALLOW_NULL_AUTHTOK) if permit_empty_passwd == 0 so null password check cannot be bypassed. jayaraj@amritapuri.com OpenBSD bug 2168
123 lines
3.7 KiB
Makefile
123 lines
3.7 KiB
Makefile
# New ports collection makefile for: OpenSSH
|
|
# Date created: 7 October 1999
|
|
# Whom: green
|
|
#
|
|
# $FreeBSD$
|
|
#
|
|
|
|
PORTNAME= openssh
|
|
PORTVERSION= 3.0.1
|
|
CATEGORIES= security
|
|
MASTER_SITES= ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/ \
|
|
ftp://ftp.usa.openbsd.org/pub/OpenBSD/OpenSSH/ \
|
|
ftp://ftp1.se.openbsd.org/pub/OpenBSD/OpenSSH/
|
|
DISTNAME= openssh-${PORTVERSION}
|
|
PATCHFILES= openbsd2x_3.0.1.patch
|
|
EXTRACT_SUFX= .tgz
|
|
|
|
MAINTAINER= dinoex@FreeBSD.org
|
|
|
|
USE_OPENSSL= YES
|
|
|
|
MAN1= scp.1 slogin.1 ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh.1 \
|
|
ssh-keyscan.1 sftp.1
|
|
MAN8= sshd.8 sftp-server.8
|
|
MANCOMPRESSED= yes
|
|
FIXME= lib/Makefile scp/Makefile sftp/Makefile sftp-server/Makefile \
|
|
ssh/Makefile ssh-add/Makefile ssh-agent/Makefile \
|
|
ssh-keygen/Makefile ssh-keyscan/Makefile sshd/Makefile
|
|
|
|
.include <bsd.port.pre.mk>
|
|
|
|
.if ${OSVERSION} < 430000
|
|
OPENSSLBASE= /usr/local
|
|
OPENSSLDIR= ${OPENSSLBASE}/openssl
|
|
LIB_DEPENDS+= crypto.2:${PORTSDIR}/security/openssl
|
|
OPENSSLLIB= ${OPENSSLBASE}/lib
|
|
OPENSSLINC= ${OPENSSLBASE}/include
|
|
MAKE_ENV+= OPENSSLLIB=${OPENSSLLIB} OPENSSLINC=${OPENSSLINC} \
|
|
OPENSSLBASE=${OPENSSLBASE} OPENSSLDIR=${OPENSSLDIR}
|
|
.endif
|
|
CRYPTOLIBS= -L${OPENSSLLIB} -lcrypto
|
|
# Here, MANDIR is concetenated to DESTDIR which all forms the man install dir...
|
|
MAKE_ENV+= DESTDIR=${PREFIX} MANDIR=/man/man CRYPTOLIBS="${CRYPTOLIBS}"
|
|
.if ${OSVERSION} < 400014
|
|
MAKE_ENV+= COMPAT_GETADDRINFO=yes
|
|
.else
|
|
MAKE_ENV+= INET6FLAGS=-DINET6
|
|
.endif
|
|
.if !exists(/usr/include/tcpd.h)
|
|
MAKE_ENV+= TCP_WRAPPERS=no
|
|
.endif
|
|
.if defined(AFS) && ${AFS} == YES
|
|
MAKE_ENV+= AFS=yes
|
|
.endif
|
|
.if defined(KERBEROS) && ${KERBEROS} == YES
|
|
MAKE_ENV+= KERBEROS=yes
|
|
.endif
|
|
.if exists(/usr/include/security/pam_modules.h)
|
|
PAM?= yes
|
|
.else
|
|
PAM= no
|
|
.endif
|
|
MAKE_ENV+= PAM=${PAM}
|
|
.if defined(SKEY) && ${SKEY} == YES
|
|
MAKE_ENV+= SKEY=yes
|
|
.endif
|
|
WRKSRC= ${WRKDIR}/ssh
|
|
|
|
post-extract:
|
|
@${PERL5} -pi -e "s=/etc/ssh=${PREFIX}/etc/ssh=" ${WRKSRC}/sshd_config
|
|
@${PERL5} -pi -e "s=/usr/libex=${PREFIX}/libex=" ${WRKSRC}/sshd_config
|
|
@${CP} ${FILESDIR}/strlcat.c ${FILESDIR}/strlcpy.c ${WRKSRC}/lib/
|
|
@${CP} ${FILESDIR}/sshd.sh ${WRKSRC}/
|
|
.if ${OSVERSION} < 400014
|
|
@${CP} ${FILESDIR}/getaddrinfo.c ${FILESDIR}/name6.c ${WRKSRC}/lib/
|
|
@${CP} ${FILESDIR}/bindresvport.c ${FILESDIR}/rcmd.c ${WRKSRC}/lib/
|
|
@${CP} ${FILESDIR}/getnameinfo.c ${WRKSRC}/lib/
|
|
@${CP} ${FILESDIR}/netdb.h ${WRKSRC}/
|
|
.endif
|
|
|
|
post-patch:
|
|
@${PERL} -pi -e 's:__PREFIX__:${PREFIX}:g' ${WRKSRC}/ssh.h \
|
|
${WRKSRC}/sshd_config ${WRKSRC}/sshd.sh \
|
|
${WRKSRC}/pathnames.h
|
|
|
|
.if ${OSVERSION} < 430000
|
|
post-configure:
|
|
.for i in ${FIXME}
|
|
@${PERL5} -pi -e "s=KERBEROS[:]L=KERBEROS=" ${WRKSRC}/${i}
|
|
@${PERL5} -pi -e "s=KERBEROS5[:]L=KERBEROS5=" ${WRKSRC}/${i}
|
|
@${PERL5} -pi -e "s=AFS[:]L=AFS=" ${WRKSRC}/${i}
|
|
@${PERL5} -pi -e "s=TCP_WRAPPERS[:]L=TCP_WRAPPERS=" ${WRKSRC}/${i}
|
|
@${PERL5} -pi -e "s=SKEY[:]L=SKEY=" ${WRKSRC}/${i}
|
|
.endfor
|
|
.endif
|
|
|
|
pre-install:
|
|
${MKDIR} ${PREFIX}/libdata/ssh
|
|
|
|
post-install:
|
|
.if !defined(BATCH)
|
|
.if !exists(${PREFIX}/etc/ssh_host_key)
|
|
@${ECHO_MSG} ">> Generating an RSA secret host key."
|
|
${PREFIX}/bin/ssh-keygen -N "" -f ${PREFIX}/etc/ssh_host_key
|
|
.endif
|
|
.if !exists(${PREFIX}/etc/ssh_host_dsa_key)
|
|
@${ECHO_MSG} ">> Generating a DSA secret host key."
|
|
${PREFIX}/bin/ssh-keygen -d -N "" -f ${PREFIX}/etc/ssh_host_dsa_key
|
|
.endif
|
|
.endif
|
|
.if !exists(${PREFIX}/etc/rc.d/sshd.sh)
|
|
@${INSTALL_SCRIPT} ${WRKSRC}/sshd.sh ${PREFIX}/etc/rc.d/
|
|
.endif
|
|
.if !exists(${PREFIX}/etc/ssh_config) && !exists(${PREFIX}/etc/sshd_config)
|
|
@cd ${WRKSRC}; \
|
|
${MAKE} DESTDIR=${PREFIX} distribution
|
|
.else
|
|
@${ECHO_MSG} ">> ${PREFIX}/etc/ssh{,d}_config exists, not being replaced!"
|
|
@${ECHO_MSG} ">> If this is left over from another version of SSH, you will"
|
|
@${ECHO_MSG} ">> need to update it to work with OpenSSH."
|
|
.endif
|
|
|
|
.include <bsd.port.post.mk>
|