Commit graph

226 commits

Author SHA1 Message Date
dillo
d6bfbe8582 Rename option PAM to pam (so all options are lower case). Backwards
compatibility provided via PKG_OPTIONS_LEGACY_OPTS.
2005-05-31 11:24:32 +00:00
reed
f52deedaf1 Fix typo introduced on August 4 that stopped wtmp logging under Linux
and maybe other platforms.

Bump PKGREVISION.
2005-05-25 23:17:11 +00:00
reed
2e01995076 Noticed that the PAM +DISPLAY message was not displayed
and extra pam file was not included in +CONTENTS.

So moved the include of options.mk to after the PLIST_SRC and
MESSAGE_SRC are defined as empty.
(MESSAGE_SRC is redefined if Interix and if PAM PKG_OPTION was enabled
then this still needs to be fixed.)
2005-05-25 19:37:18 +00:00
reed
ee8be9d0c1 RCD_SCRIPTS_EXAMPLEDIR is no longer customizable.
And always is defined as share/examples/rc.d
which was the default before.

This rc.d scripts are not automatically added to PLISTs now also.
So add to each corresponding PLIST as required.

This was discussed on tech-pkg in late January and late April.

Todo: remove the RCD_SCRIPTS_EXAMPLEDIR uses in MESSAGES and elsewhere
and remove the RCD_SCRIPTS_EXAMPLEDIR itself.
2005-05-02 20:33:57 +00:00
wiz
3a4887c254 Add CONFLICTS with lsh (common man page). 2005-04-28 14:11:13 +00:00
tv
f816d81489 Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used. 2005-04-11 21:44:48 +00:00
tv
71e2654fa3 nb5: Rework Interix support, based on work done by Interop Systems
*before* a BSD-with-advertising license was added to their diffs, and other
work done personally by me.

sshd now works.  Most permissions checks work properly.  Privsep is off by
default, and the sshd user is not created, on Interix until some problems
with privsep are fixed (perhaps by abstracting the auth functionality out
to openpam).
2005-03-07 23:29:49 +00:00
agc
d81d19f8e0 Add RMD160 digests. 2005-02-24 12:51:41 +00:00
jlam
1b5734f517 Create a pam.buildlink3.mk file that is used by PAM-using packages.
It includes the correct buildlink3.mk file from either Linux-PAM
(security/PAM) or OpenPAM (security/openpam) and eventually will
support solaris-pam.  pam.buildlink3.mk will:

	* set PAMBASE to the base directory of the PAM files;
	* set PAM_TYPE to the PAM implementation used.

There are two variables that can be used to tweak the selection of
the PAM implementation:

PAM_DEFAULT is a user-settable variable whose value is the default
	PAM implementation to use.

PAM_ACCEPTED is a package-settable list of PAM implementations
	that may be used by the package.

Modify most packages that include PAM/buildlink3.mk to include
pam.buildlink3.mk instead.
2005-01-14 05:15:39 +00:00
reed
32d8f290c2 The default location of the pkgsrc-installed rc.d scripts is now
under share/examples/rc.d. The variable name already was named
RCD_SCRIPTS_EXAMPLEDIR.

This is from ideas from Greg Woods and others.

Also bumped PKGREVISION for all packages using RCD_SCRIPTS mechanism
(as requested by wiz).
2004-12-28 02:47:40 +00:00
jlam
650b62997d Remove support for some variables that are supposed to go away after
pkgsrc-2004Q4 is branched.
2004-12-22 21:46:24 +00:00
xtraeme
27d47d5401 Convert to use bsd.options.mk with the following options:
hpn-patch kerberos PAM (only Linux)

The hpn-patch option uses the patch available in:
http://www.psc.edu/networking/projects/hpn-ssh/ to enable high performance
connections.

Also use VARBASE intead of hardcoding /var.

Bump PKGREVISION.
2004-11-25 19:25:28 +00:00
markd
d7fe2cd381 Reorder inclusion of headers to fix build on Solaris when kerberos option
is enabled.
2004-11-04 12:46:33 +00:00
grant
faa2c46dbe tell configure where to find xauth(1) so that X forwarding over ssh
works when using pkgsrc X11.

bump PKGREVISION.
2004-10-24 02:52:15 +00:00
tv
c487cb967a Libtool fix for PR pkg/26633, and other issues. Update libtool to 1.5.10
in the process.  (More information on tech-pkg.)

Bump PKGREVISION and BUILDLINK_DEPENDS of all packages using libtool and
installing .la files.

Bump PKGREVISION (only) of all packages depending directly on the above
via a buildlink3 include.
2004-10-03 00:12:51 +00:00
wiz
9ac74e840c Update to 3.9p1:
* Added new "IdentitiesOnly" option to ssh(1), which specifies that it should
   use keys specified in ssh_config, rather than any keys in ssh-agent(1)

 * Make sshd(8) re-execute itself on accepting a new connection. This security
   measure ensures that all execute-time randomisations are reapplied for each
   connection rather than once, for the master process' lifetime. This includes
   mmap and malloc mappings, shared library addressing, shared library mapping
   order, ProPolice and StackGhost cookies on systems that support such things

 * Add strict permission and ownership checks to programs reading ~/.ssh/config
   NB ssh(1) will now exit instead of trying to process a config with poor
   ownership or permissions

 * Implemented the ability to pass selected environment variables between the
   client and the server. See "AcceptEnv" in sshd_config(5) and "SendEnv" in
   ssh_config(5) for details

 * Added a "MaxAuthTries" option to sshd(8), allowing control over the maximum
   number of authentication attempts permitted per connection

 * Added support for cancellation of active remote port forwarding sessions.
   This may be performed using the ~C escape character, see "Escape Characters"
   in ssh(1) for details

 * Many sftp(1) interface improvements, including greatly enhanced "ls" support
   and the ability to cancel active transfers using SIGINT (^C)

 * Implement session multiplexing: a single ssh(1) connection can now carry
   multiple login/command/file transfer sessions. Refer to the "ControlMaster"
   and "ControlPath" options in ssh_config(5) for more information

 * The sftp-server has improved support for non-POSIX filesystems (e.g. FAT)

 * Portable OpenSSH: Re-introduce support for PAM password authentication, in
   addition to the keyboard-interactive driver. PAM password authentication
   is less flexible, and doesn't support pre-authentication password expiry but
   runs in-process so Kerberos tokens, etc are retained

 * Improved and more extensive regression tests

 * Many bugfixes and small improvements
2004-08-31 11:27:11 +00:00
minskim
6c1e49d7f6 Make openssh build on Interix. Currently only the client (ssh) was
tested.  The server (sshd) still needs more patches especially because of
non-zero Administrator uid/gid issues.
2004-08-04 06:43:52 +00:00
grant
1e99c0fee7 add CONFLICT with ssh2-nox11. 2004-07-25 12:36:03 +00:00
reed
a6877657cc Only use the NetBSD-specific MESSAGE.urandom for NetBSD.
It says to use "pseudo-device   rnd" kernel configuration.

TODO: if the above instructions are fine for other
operating systems with /dev/urandom then add.
2004-05-21 23:00:23 +00:00
reed
ec087dd4e3 The makefile had a comment saying PAM authentication causes memory
faults, and haven't tracked down why yet.

No allow PAM authentication if Linux (and USE_PAM is defined).

This will close my 20846 PR from March 2003.

Also, install the contrib/sshd.pam.generic file as the example
sshd.pam instead of the FreeBSD version, but this okay since
it was commented out in the first place.

TODO: test the PAM support on other platforms and allow
if USE_PAM is defined.
2004-05-21 22:54:43 +00:00
wiz
fe4b1f5fc6 Not needed after 3.8.1p1 update. 2004-05-10 18:12:43 +00:00
wiz
23810a3f2a Update to 3.8.1p1:
Minor bugfixes.
2004-05-10 18:12:23 +00:00
xtraeme
e4f66bcc3f Enable md5 passwords support in Linux. This closes PR pkg/25322 by
Piotr Meyer.
2004-05-02 17:30:37 +00:00
jlam
7766d0b725 The buildlink3.mk file for the Kerberos 5 implementation used will
automatically pass the correct -I flags to the compiler.
2004-04-28 05:26:39 +00:00
jlam
e3ee2f2be4 This version of OpenSSH actually no longer supports building with
Kerberos 4 support, so remove those Makefile checks.
2004-04-28 05:25:54 +00:00
jlam
6716a865f5 Fix up OpenSSH sources to allow building with S/Key support on NetBSD as
well.  Bump the PKGREVISION.

XXX The right fix is to create a autoconf check for the number of args
XXX that skeychallenge takes and do the right thing accordingly.
2004-04-28 04:00:17 +00:00
jlam
c1bc435448 Building with Kerberos 4 support doesn't work when using mit-krb5. Only
allow building with Kerberos 4 support when using Heimdal and if the
kerberosIV headers exist.
2004-04-28 03:54:08 +00:00
markd
68acd364ef Add the .endif I missed off last night. 2004-04-27 21:39:39 +00:00
jlam
94da92332c Don't support the updating the in-tree openssh via pkgsrc. pkgsrc really
has no business trying to update parts of the base system.
2004-04-27 19:08:36 +00:00
markd
6548ed08a7 Add handling of utmpx/wtmpx on NetBSD-current.
Bump PKGREVISION.
2004-04-27 12:30:23 +00:00
markd
85964ae390 Something in our framework interferes with configure disabling utmp/wtmp
handling on Solaris >= 8 so do it explicitly.
2004-04-27 12:26:31 +00:00
markd
ddc2279c9a Use krb5.buildlink3.mk to find krb5 locations. 2004-04-27 12:21:49 +00:00
markd
7e2c1fed6a Teach about recent NetBSD versions.
Finish buildlink3 changes.

Obscure LOCALBASE path so that base system compilers dont match the
prefix otherwise compiler.mk then wants to build the pkgsrc gcc
package. (ick)
2004-04-27 12:15:48 +00:00
wiz
9821b663fe Convert to bl3; update comments in Makefile.intree. 2004-04-25 23:36:52 +00:00
reed
9c790735db mk/bsd.pkg.install.mk now automatically registers
the RCD_SCRIPTS rc.d script(s) to the PLIST.

This GENERATE_PLIST idea is part of Greg A. Woods'
PR #22954.

This helps when the RC_SCRIPTS are installed to
a different ${RCD_SCRIPTS_EXAMPLEDIR}. (Later,
the default RCD_SCRIPTS_EXAMPLEDIR will be changed
to be more clear that they are the examples.)

These patches also remove the etc/rc.d/ scripts from PLISTs
(of packages that use RCD_SCRIPTS). (This also removes
now unused references from openssh* makefiles. Note that
qmail package has not been changed yet.)

I have been doing automatic PLIST registration for RC_SCRIPTS
for over a year. Not all of these packages have been tested,
but many have been tested and used.

Somethings maybe to do:
- a few packages still manually install the rc.d scripts to
  hard-coded etc/rc.d. These need to be fixed.
- maybe  remove from mk/${OPSYS}.pkg.dist mtree specifications too.
2004-04-23 22:07:52 +00:00
wiz
a661ce60c0 PKGREVISION bump after openssl-security-fix-update to 0.9.6m.
Buildlink files: RECOMMENDED version changed to current version.
2004-03-26 02:27:34 +00:00
wiz
f042140b18 Update to 3.8p1:
This version features many improvements and bugfixes.
2004-03-12 19:24:47 +00:00
xtraeme
974c5dc7ce Force manual pages installation, because some systems like IRIX will
install them like preformatted manual pages (cat).
Reported by Georg Schwarz in PR pkg/24428.
2004-02-21 06:26:41 +00:00
jlam
53f75c6830 Don't set LD=${CC} globally, but only pass it to CONFIGURE_ENV, which is
the only relevant place that wants it.
2004-02-07 23:58:49 +00:00
jschauma
fe19bb05b5 PKGREVISION++ after openssl update. 2003-11-12 03:39:39 +00:00
cjep
cfe8be1263 Add RCS IDs 2003-10-18 13:20:31 +00:00
grant
63054249c7 set LD=CC again for all platforms with an appropriate comment - I
don't know why this didn't originally work as it should, but I've
just tested it with gcc3 and Forte 8 on Solaris and I couldn't make
it fail.

fixes coredump problem on Solaris observed by some, and also
PR pkg/23120 from Alex Gerasimoff.

bump PKGREVISION to differentiate between broken and unbroken
package.
2003-10-12 10:13:53 +00:00
grant
2f7d54398d add a missing .elif OPSYS == NetBSD, which was resulting in passing
"--with-skey=... --without-skey" on Solaris :)
2003-10-12 08:25:17 +00:00
reed
a20d31972d Improve message (because on some systems it is okay to install to the
PAM directory too).
2003-10-08 18:54:42 +00:00
jschauma
5bc408943d On non-SunOS, bring back
LD=${CC}
2003-09-23 20:53:52 +00:00
jschauma
91cad7d231 This version of OpenSSH doesn't need special flags for Irix anymore. 2003-09-23 19:33:14 +00:00
jschauma
d22e217b00 Update to 3.7.1p2:
Most important chcanges: security relevant bug fixes in new PAM authentication code

Changes since OpenSSH 3.7.1p1:
==============================

* This release disables PAM by default. To enable it, set "UsePAM yes" in
  sshd_config. Due to complexity, inconsistencies in the specification and
  differences between vendors' PAM implementations we recommend that PAM
  be left disabled in sshd_config unless there is a need for its use.
  Sites using only public key or simple password authentication usually
  have little need to enable PAM support.

* This release now requires zlib 1.1.4 to build correctly. Previous
  versions have security problems.

* Fix compilation for versions of OpenSSL before 0.9.6. Some cipher modes
  are not supported for older OpenSSL versions.

* Fix compilation problems on systems with a missing or lacking inet_ntoa()
  function.

* Workaround problems related to unimplemented or broken setresuid/setreuid
  functions on several platforms.

* Fix compilation on older OpenBSD systems.

* Fix handling of password-less authentication (PermitEmptyPasswords=yes)
  that has not worked since the 3.7p1 release.
2003-09-23 17:52:33 +00:00
grant
4f44662287 as this pkg now calls the linker directly, we need to explicitly
specify -lc on Solaris.

remove a bogus hack setting LD=${CC} which was also breaking the
build on Solaris.
2003-09-22 01:18:38 +00:00
jschauma
97b01bddae Ok, so we can make this work on Irix by adding
-DSETEUID_BREAKS_SETUID -DBROKEN_SETREUID -DBROKEN_SETREGID
to the CFLAGS.  Wuppi.
2003-09-18 02:11:38 +00:00
jschauma
7c1fd4eb84 Mark OpenSSH-3.7x as *not available for IRIX*!
# OpenSSH 3.7x currently does *not* work on IRIX!
# To compile, we would need to remove the extraneous inclusion of the
# ``inet_ntoa.h'' header in openbsd-compat/inet_ntoa.c, but even though
# sshd will not work:  It seems the connection is closed by the daemon
# when it tries to spawn off a child to handle the incoming connection
#
# If you need the latest security patches for your openssh, I'm afraid you'll
# have to apply them by hand to the 3.6.1p2 version.

(Now wouldn't it be nice if we had a NOT_FOR_PLATFORM_REASON that is displayed
automatically?)
2003-09-17 16:42:01 +00:00