View | Details | Raw Unified | Return to bug 776 | Differences between
and this patch

Collapse All | Expand All

(-)contrib/fedora/gnome-ssh-askpass.csh (+1 lines)
Line 0 Link Here
1
setenv SSH_ASKPASS /usr/libexec/openssh/gnome-ssh-askpass
(-)contrib/fedora/gnome-ssh-askpass.sh (+2 lines)
Line 0 Link Here
1
SSH_ASKPASS=/usr/libexec/openssh/gnome-ssh-askpass
2
export SSH_ASKPASS
(-)contrib/fedora/openssh.spec (+805 lines)
Line 0 Link Here
1
%define ver 3.7.1p2
2
%define rel 1
3
4
# OpenSSH privilege separation requires a user & group ID
5
%define sshd_uid    74
6
%define sshd_gid    74
7
8
# Version of ssh-askpass
9
%define aversion 1.2.4.1
10
11
# Do we want to disable building of x11-askpass? (1=yes 0=no)
12
%define no_x11_askpass 0
13
14
# Do we want to disable building of gnome-askpass? (1=yes 0=no)
15
%define no_gnome_askpass 0
16
17
# Do we want to link against a static libcrypto? (1=yes 0=no)
18
%define static_libcrypto 0
19
20
# Do we want smartcard support (1=yes 0=no)
21
%define scard 0
22
23
# Use GTK2 instead of GNOME in gnome-ssh-askpass
24
%define gtk2 1
25
26
# Is this build for RHL 6.x?
27
%define build6x 0
28
29
# Do we want kerberos5 support (1=yes 0=no)
30
%define kerberos5 1
31
32
# Reserve options to override askpass settings with:
33
# rpm -ba|--rebuild --define 'skip_xxx 1'
34
%{?skip_x11_askpass:%define no_x11_askpass 1}
35
%{?skip_gnome_askpass:%define no_gnome_askpass 1}
36
37
# Add option to build without GTK2 for older platforms with only GTK+.
38
# RedHat <= 7.2 and Red Hat Advanced Server 2.1 are examples.
39
# rpm -ba|--rebuild --define 'no_gtk2 1'
40
%{?no_gtk2:%define gtk2 0}
41
42
# Is this a build for RHL 6.x or earlier?
43
%{?build_6x:%define build6x 1}
44
45
# If this is RHL 6.x, the default configuration has sysconfdir in /usr/etc.
46
%if %{build6x}
47
%define _sysconfdir /etc
48
%endif
49
50
# Options for static OpenSSL link:
51
# rpm -ba|--rebuild --define "static_openssl 1"
52
%{?static_openssl:%define static_libcrypto 1}
53
54
# Options for Smartcard support: (needs libsectok and openssl-engine)
55
# rpm -ba|--rebuild --define "smartcard 1"
56
%{?smartcard:%define scard 1}
57
58
# Is this a build for the rescue CD (without PAM, with MD5)? (1=yes 0=no)
59
%define rescue 0
60
%{?build_rescue:%define rescue 1}
61
62
# Turn off some stuff for resuce builds
63
%if %{rescue}
64
%define kerberos5 0
65
%endif
66
67
Summary: The OpenSSH implementation of SSH protocol versions 1 and 2.
68
Name: openssh
69
Version: %{ver}
70
%if %{rescue}
71
Release: %{rel}rescue
72
%else
73
Release: %{rel}
74
%endif
75
URL: http://www.openssh.com/portable.html
76
Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz
77
Source1: http://www.pobox.com/~jmknoble/software/x11-ssh-askpass/x11-ssh-askpass-%{aversion}.tar.gz
78
License: BSD
79
Group: Applications/Internet
80
BuildRoot: %{_tmppath}/%{name}-%{version}-buildroot
81
Obsoletes: ssh
82
%if %{build6x}
83
PreReq: initscripts >= 5.00
84
%else
85
PreReq: initscripts >= 5.20
86
%endif
87
BuildPreReq: perl, openssl-devel, tcp_wrappers
88
BuildPreReq: /bin/login
89
%if ! %{build6x}
90
BuildPreReq: glibc-devel, pam
91
%else
92
BuildPreReq: /usr/include/security/pam_appl.h
93
%endif
94
%if ! %{no_x11_askpass}
95
BuildPreReq: XFree86-devel
96
%endif
97
%if ! %{no_gnome_askpass}
98
BuildPreReq: pkgconfig
99
%endif
100
%if %{kerberos5}
101
BuildPreReq: krb5-devel
102
BuildPreReq: krb5-libs
103
%endif
104
105
%package clients
106
Summary: OpenSSH clients.
107
Requires: openssh = %{version}-%{release}
108
Group: Applications/Internet
109
Obsoletes: ssh-clients
110
111
%package server
112
Summary: The OpenSSH server daemon.
113
Group: System Environment/Daemons
114
Obsoletes: ssh-server
115
PreReq: openssh = %{version}-%{release}, chkconfig >= 0.9
116
%if ! %{build6x}
117
Requires: /etc/pam.d/system-auth
118
%endif
119
120
%package askpass
121
Summary: A passphrase dialog for OpenSSH and X.
122
Group: Applications/Internet
123
Requires: openssh = %{version}-%{release}
124
Obsoletes: ssh-extras
125
126
%package askpass-gnome
127
Summary: A passphrase dialog for OpenSSH, X, and GNOME.
128
Group: Applications/Internet
129
Requires: openssh = %{version}-%{release}
130
Obsoletes: ssh-extras
131
132
%description
133
SSH (Secure SHell) is a program for logging into and executing
134
commands on a remote machine. SSH is intended to replace rlogin and
135
rsh, and to provide secure encrypted communications between two
136
untrusted hosts over an insecure network. X11 connections and
137
arbitrary TCP/IP ports can also be forwarded over the secure channel.
138
139
OpenSSH is OpenBSD's version of the last free version of SSH, bringing
140
it up to date in terms of security and features, as well as removing
141
all patented algorithms to separate libraries.
142
143
This package includes the core files necessary for both the OpenSSH
144
client and server. To make this package useful, you should also
145
install openssh-clients, openssh-server, or both.
146
147
%description clients
148
OpenSSH is a free version of SSH (Secure SHell), a program for logging
149
into and executing commands on a remote machine. This package includes
150
the clients necessary to make encrypted connections to SSH servers.
151
You'll also need to install the openssh package on OpenSSH clients.
152
153
%description server
154
OpenSSH is a free version of SSH (Secure SHell), a program for logging
155
into and executing commands on a remote machine. This package contains
156
the secure shell daemon (sshd). The sshd daemon allows SSH clients to
157
securely connect to your SSH server. You also need to have the openssh
158
package installed.
159
160
%description askpass
161
OpenSSH is a free version of SSH (Secure SHell), a program for logging
162
into and executing commands on a remote machine. This package contains
163
an X11 passphrase dialog for OpenSSH.
164
165
%description askpass-gnome
166
OpenSSH is a free version of SSH (Secure SHell), a program for logging
167
into and executing commands on a remote machine. This package contains
168
an X11 passphrase dialog for OpenSSH and the GNOME GUI desktop
169
environment.
170
171
%prep
172
173
%if ! %{no_x11_askpass}
174
%setup -q -a 1
175
%else
176
%setup -q
177
%endif
178
179
%build
180
%if %{rescue}
181
CFLAGS="$RPM_OPT_FLAGS -Os"; export CFLAGS
182
%endif
183
184
%configure \
185
	--sysconfdir=%{_sysconfdir}/ssh \
186
	--libexecdir=%{_libexecdir}/openssh \
187
	--datadir=%{_datadir}/openssh \
188
	--with-tcp-wrappers \
189
	--with-rsh=%{_bindir}/rsh \
190
	--with-default-path=/usr/local/bin:/bin:/usr/bin \
191
	--with-superuser-path=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin \
192
	--with-privsep-path=%{_var}/empty/sshd \
193
	--with-md5-passwords \
194
%if %{scard}
195
	--with-smartcard \
196
%endif
197
%if %{rescue}
198
	--without-pam \
199
%else
200
	--with-pam \
201
%endif
202
%if %{kerberos5}
203
	 --with-kerberos5=/usr \
204
%endif
205
206
207
%if %{static_libcrypto}
208
perl -pi -e "s|-lcrypto|%{_libdir}/libcrypto.a|g" Makefile
209
%endif
210
211
make
212
213
%if ! %{no_x11_askpass}
214
pushd x11-ssh-askpass-%{aversion}
215
%configure --libexecdir=%{_libexecdir}/openssh
216
xmkmf -a
217
make
218
popd
219
%endif
220
221
# Define a variable to toggle gnome1/gtk2 building.  This is necessary
222
# because RPM doesn't handle nested %if statements.
223
%if %{gtk2}
224
	gtk2=yes
225
%else
226
	gtk2=no
227
%endif
228
229
%if ! %{no_gnome_askpass}
230
pushd contrib
231
if [ $gtk2 = yes ] ; then
232
	make gnome-ssh-askpass2
233
	mv gnome-ssh-askpass2 gnome-ssh-askpass
234
else
235
	make gnome-ssh-askpass1
236
	mv gnome-ssh-askpass1 gnome-ssh-askpass
237
fi
238
popd
239
%endif
240
241
%install
242
rm -rf $RPM_BUILD_ROOT
243
mkdir -p -m755 $RPM_BUILD_ROOT%{_sysconfdir}/ssh
244
mkdir -p -m755 $RPM_BUILD_ROOT%{_libexecdir}/openssh
245
mkdir -p -m755 $RPM_BUILD_ROOT%{_var}/empty/sshd
246
247
make install DESTDIR=$RPM_BUILD_ROOT
248
249
install -d $RPM_BUILD_ROOT/etc/pam.d/
250
install -d $RPM_BUILD_ROOT/etc/rc.d/init.d
251
install -d $RPM_BUILD_ROOT%{_libexecdir}/openssh
252
%if %{build6x}
253
install -m644 contrib/redhat/sshd.pam.old $RPM_BUILD_ROOT/etc/pam.d/sshd
254
%else
255
install -m644 contrib/redhat/sshd.pam     $RPM_BUILD_ROOT/etc/pam.d/sshd
256
%endif
257
install -m755 contrib/redhat/sshd.init $RPM_BUILD_ROOT/etc/rc.d/init.d/sshd
258
259
%if ! %{no_x11_askpass}
260
install -s x11-ssh-askpass-%{aversion}/x11-ssh-askpass $RPM_BUILD_ROOT%{_libexecdir}/openssh/x11-ssh-askpass
261
ln -s x11-ssh-askpass $RPM_BUILD_ROOT%{_libexecdir}/openssh/ssh-askpass
262
%endif
263
264
%if ! %{no_gnome_askpass}
265
install -s contrib/gnome-ssh-askpass $RPM_BUILD_ROOT%{_libexecdir}/openssh/gnome-ssh-askpass
266
%endif
267
268
%if ! %{scard}
269
	 rm -f $RPM_BUILD_ROOT/usr/share/openssh/Ssh.bin
270
%endif
271
272
%if ! %{no_gnome_askpass}
273
install -m 755 -d $RPM_BUILD_ROOT%{_sysconfdir}/profile.d/
274
install -m 755 contrib/redhat/gnome-ssh-askpass.csh $RPM_BUILD_ROOT%{_sysconfdir}/profile.d/
275
install -m 755 contrib/redhat/gnome-ssh-askpass.sh $RPM_BUILD_ROOT%{_sysconfdir}/profile.d/
276
%endif
277
278
perl -pi -e "s|$RPM_BUILD_ROOT||g" $RPM_BUILD_ROOT%{_mandir}/man*/*
279
280
%clean
281
rm -rf $RPM_BUILD_ROOT
282
283
%triggerun server -- ssh-server
284
if [ "$1" != 0 -a -r /var/run/sshd.pid ] ; then
285
	touch /var/run/sshd.restart
286
fi
287
288
%triggerun server -- openssh-server < 2.5.0p1
289
# Count the number of HostKey and HostDsaKey statements we have.
290
gawk	'BEGIN {IGNORECASE=1}
291
	 /^hostkey/ || /^hostdsakey/ {sawhostkey = sawhostkey + 1}
292
	 END {exit sawhostkey}' /etc/ssh/sshd_config
293
# And if we only found one, we know the client was relying on the old default
294
# behavior, which loaded the the SSH2 DSA host key when HostDsaKey wasn't
295
# specified.  Now that HostKey is used for both SSH1 and SSH2 keys, specifying
296
# one nullifies the default, which would have loaded both.
297
if [ $? -eq 1 ] ; then
298
	echo HostKey /etc/ssh/ssh_host_rsa_key >> /etc/ssh/sshd_config
299
	echo HostKey /etc/ssh/ssh_host_dsa_key >> /etc/ssh/sshd_config
300
fi
301
302
%triggerpostun server -- ssh-server
303
if [ "$1" != 0 ] ; then
304
	/sbin/chkconfig --add sshd
305
	if test -f /var/run/sshd.restart ; then
306
		rm -f /var/run/sshd.restart
307
		/sbin/service sshd start > /dev/null 2>&1 || :
308
	fi
309
fi
310
311
%pre server
312
%{_sbindir}/groupadd -r -g %{sshd_gid} sshd 2>/dev/null || :
313
%{_sbindir}/useradd -d /var/empty/sshd -s /bin/false -u %{sshd_uid} \
314
	-g sshd -M -r sshd 2>/dev/null || :
315
316
%post server
317
/sbin/chkconfig --add sshd
318
319
%postun server
320
/sbin/service sshd condrestart > /dev/null 2>&1 || :
321
322
%preun server
323
if [ "$1" = 0 ]
324
then
325
	/sbin/service sshd stop > /dev/null 2>&1 || :
326
	/sbin/chkconfig --del sshd
327
fi
328
329
%files
330
%defattr(-,root,root)
331
%doc CREDITS ChangeLog INSTALL LICENCE OVERVIEW README* RFC* TODO WARNING*
332
%attr(0755,root,root) %{_bindir}/scp
333
%attr(0644,root,root) %{_mandir}/man1/scp.1*
334
%attr(0755,root,root) %dir %{_sysconfdir}/ssh
335
%attr(0600,root,root) %config(noreplace) %{_sysconfdir}/ssh/moduli
336
%if ! %{rescue}
337
%attr(0755,root,root) %{_bindir}/ssh-keygen
338
%attr(0644,root,root) %{_mandir}/man1/ssh-keygen.1*
339
%attr(0755,root,root) %dir %{_libexecdir}/openssh
340
%attr(4711,root,root) %{_libexecdir}/openssh/ssh-keysign
341
%attr(0644,root,root) %{_mandir}/man8/ssh-keysign.8*
342
%endif
343
%if %{scard}
344
%attr(0755,root,root) %dir %{_datadir}/openssh
345
%attr(0644,root,root) %{_datadir}/openssh/Ssh.bin
346
%endif
347
348
%files clients
349
%defattr(-,root,root)
350
%attr(0755,root,root) %{_bindir}/ssh
351
%attr(0644,root,root) %{_mandir}/man1/ssh.1*
352
%attr(0644,root,root) %{_mandir}/man5/ssh_config.5*
353
%attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ssh/ssh_config
354
%attr(-,root,root) %{_bindir}/slogin
355
%attr(-,root,root) %{_mandir}/man1/slogin.1*
356
%if ! %{rescue}
357
%attr(2755,root,nobody) %{_bindir}/ssh-agent
358
%attr(0755,root,root) %{_bindir}/ssh-add
359
%attr(0755,root,root) %{_bindir}/ssh-keyscan
360
%attr(0755,root,root) %{_bindir}/sftp
361
%attr(0644,root,root) %{_mandir}/man1/ssh-agent.1*
362
%attr(0644,root,root) %{_mandir}/man1/ssh-add.1*
363
%attr(0644,root,root) %{_mandir}/man1/ssh-keyscan.1*
364
%attr(0644,root,root) %{_mandir}/man1/sftp.1*
365
%endif
366
367
%if ! %{rescue}
368
%files server
369
%defattr(-,root,root)
370
%dir %attr(0111,root,root) %{_var}/empty/sshd
371
%attr(0755,root,root) %{_sbindir}/sshd
372
%attr(0755,root,root) %{_libexecdir}/openssh/sftp-server
373
%attr(0644,root,root) %{_mandir}/man8/sshd.8*
374
%attr(0644,root,root) %{_mandir}/man5/sshd_config.5*
375
%attr(0644,root,root) %{_mandir}/man8/sftp-server.8*
376
%attr(0755,root,root) %dir %{_sysconfdir}/ssh
377
%attr(0600,root,root) %config(noreplace) %{_sysconfdir}/ssh/sshd_config
378
%attr(0600,root,root) %config(noreplace) /etc/pam.d/sshd
379
%attr(0755,root,root) %config /etc/rc.d/init.d/sshd
380
%endif
381
382
%if ! %{no_x11_askpass}
383
%files askpass
384
%defattr(-,root,root)
385
%doc x11-ssh-askpass-%{aversion}/README
386
%doc x11-ssh-askpass-%{aversion}/ChangeLog
387
%doc x11-ssh-askpass-%{aversion}/SshAskpass*.ad
388
%attr(0755,root,root) %{_libexecdir}/openssh/ssh-askpass
389
%attr(0755,root,root) %{_libexecdir}/openssh/x11-ssh-askpass
390
%endif
391
392
%if ! %{no_gnome_askpass}
393
%files askpass-gnome
394
%defattr(-,root,root)
395
%attr(0755,root,root) %config %{_sysconfdir}/profile.d/gnome-ssh-askpass.*
396
%attr(0755,root,root) %{_libexecdir}/openssh/gnome-ssh-askpass
397
%endif
398
399
%changelog
400
* Thu Dec 18 2003 Jason McCormick <jason@devrandom.org>
401
- Copied from contrib/redhat/openssh.spec.  Changed location
402
  of --with-kerberos5 to /usr since files were relocated in
403
  Fedora Core 1
404
405
* Mon Jun 2 2003 Damien Miller <djm@mindrot.org>
406
- Remove noip6 option. This may be controlled at run-time in client config
407
  file using new AddressFamily directive
408
409
* Mon May 12 2003 Damien Miller <djm@mindrot.org>
410
- Don't install profile.d scripts when not building with GNOME/GTK askpass
411
  (patch from bet@rahul.net)
412
413
* Wed Oct 01 2002 Damien Miller <djm@mindrot.org>
414
- Install ssh-agent setgid nobody to prevent ptrace() key theft attacks
415
416
* Mon Sep 30 2002 Damien Miller <djm@mindrot.org>
417
- Use contrib/ Makefile for building askpass programs
418
419
* Fri Jun 21 2002 Damien Miller <djm@mindrot.org>
420
- Merge in spec changes from seba@iq.pl (Sebastian Pachuta)
421
- Add new {ssh,sshd}_config.5 manpages
422
- Add new ssh-keysign program and remove setuid from ssh client
423
424
* Fri May 10 2002 Damien Miller <djm@mindrot.org>
425
- Merge in spec changes from RedHat, reorgansie a little
426
- Add Privsep user, group and directory
427
428
* Thu Mar  7 2002 Nalin Dahyabhai <nalin@redhat.com> 3.1p1-2
429
- bump and grind (through the build system)
430
431
* Thu Mar  7 2002 Nalin Dahyabhai <nalin@redhat.com> 3.1p1-1
432
- require sharutils for building (mindrot #137)
433
- require db1-devel only when building for 6.x (#55105), which probably won't
434
  work anyway (3.1 requires OpenSSL 0.9.6 to build), but what the heck
435
- require pam-devel by file (not by package name) again
436
- add Markus's patch to compile with OpenSSL 0.9.5a (from
437
  http://bugzilla.mindrot.org/show_bug.cgi?id=141) and apply it if we're
438
  building for 6.x
439
440
* Thu Mar  7 2002 Nalin Dahyabhai <nalin@redhat.com> 3.1p1-0
441
- update to 3.1p1
442
443
* Tue Mar  5 2002 Nalin Dahyabhai <nalin@redhat.com> SNAP-20020305
444
- update to SNAP-20020305
445
- drop debug patch, fixed upstream
446
447
* Wed Feb 20 2002 Nalin Dahyabhai <nalin@redhat.com> SNAP-20020220
448
- update to SNAP-20020220 for testing purposes (you've been warned, if there's
449
  anything to be warned about, gss patches won't apply, I don't mind)
450
451
* Wed Feb 13 2002 Nalin Dahyabhai <nalin@redhat.com> 3.0.2p1-3
452
- add patches from Simon Wilkinson and Nicolas Williams for GSSAPI key
453
  exchange, authentication, and named key support
454
455
* Wed Jan 23 2002 Nalin Dahyabhai <nalin@redhat.com> 3.0.2p1-2
456
- remove dependency on db1-devel, which has just been swallowed up whole
457
  by gnome-libs-devel
458
459
* Sun Dec 29 2001 Nalin Dahyabhai <nalin@redhat.com>
460
- adjust build dependencies so that build6x actually works right (fix
461
  from Hugo van der Kooij)
462
463
* Tue Dec  4 2001 Nalin Dahyabhai <nalin@redhat.com> 3.0.2p1-1
464
- update to 3.0.2p1
465
466
* Fri Nov 16 2001 Nalin Dahyabhai <nalin@redhat.com> 3.0.1p1-1
467
- update to 3.0.1p1
468
469
* Tue Nov 13 2001 Nalin Dahyabhai <nalin@redhat.com>
470
- update to current CVS (not for use in distribution)
471
472
* Thu Nov  8 2001 Nalin Dahyabhai <nalin@redhat.com> 3.0p1-1
473
- merge some of Damien Miller <djm@mindrot.org> changes from the upstream
474
  3.0p1 spec file and init script
475
476
* Wed Nov  7 2001 Nalin Dahyabhai <nalin@redhat.com>
477
- update to 3.0p1
478
- update to x11-ssh-askpass 1.2.4.1
479
- change build dependency on a file from pam-devel to the pam-devel package
480
- replace primes with moduli
481
482
* Thu Sep 27 2001 Nalin Dahyabhai <nalin@redhat.com> 2.9p2-9
483
- incorporate fix from Markus Friedl's advisory for IP-based authorization bugs
484
485
* Thu Sep 13 2001 Bernhard Rosenkraenzer <bero@redhat.com> 2.9p2-8
486
- Merge changes to rescue build from current sysadmin survival cd
487
488
* Thu Sep  6 2001 Nalin Dahyabhai <nalin@redhat.com> 2.9p2-7
489
- fix scp's server's reporting of file sizes, and build with the proper
490
  preprocessor define to get large-file capable open(), stat(), etc.
491
  (sftp has been doing this correctly all along) (#51827)
492
- configure without --with-ipv4-default on RHL 7.x and newer (#45987,#52247)
493
- pull cvs patch to fix support for /etc/nologin for non-PAM logins (#47298)
494
- mark profile.d scriptlets as config files (#42337)
495
- refer to Jason Stone's mail for zsh workaround for exit-hanging quasi-bug
496
- change a couple of log() statements to debug() statements (#50751)
497
- pull cvs patch to add -t flag to sshd (#28611)
498
- clear fd_sets correctly (one bit per FD, not one byte per FD) (#43221)
499
500
* Mon Aug 20 2001 Nalin Dahyabhai <nalin@redhat.com> 2.9p2-6
501
- add db1-devel as a BuildPrerequisite (noted by Hans Ecke)
502
503
* Thu Aug 16 2001 Nalin Dahyabhai <nalin@redhat.com>
504
- pull cvs patch to fix remote port forwarding with protocol 2
505
506
* Thu Aug  9 2001 Nalin Dahyabhai <nalin@redhat.com>
507
- pull cvs patch to add session initialization to no-pty sessions
508
- pull cvs patch to not cut off challengeresponse auth needlessly
509
- refuse to do X11 forwarding if xauth isn't there, handy if you enable
510
  it by default on a system that doesn't have X installed (#49263)
511
512
* Wed Aug  8 2001 Nalin Dahyabhai <nalin@redhat.com>
513
- don't apply patches to code we don't intend to build (spotted by Matt Galgoci)
514
515
* Mon Aug  6 2001 Nalin Dahyabhai <nalin@redhat.com>
516
- pass OPTIONS correctly to initlog (#50151)
517
518
* Wed Jul 25 2001 Nalin Dahyabhai <nalin@redhat.com>
519
- switch to x11-ssh-askpass 1.2.2
520
521
* Wed Jul 11 2001 Nalin Dahyabhai <nalin@redhat.com>
522
- rebuild in new environment
523
524
* Mon Jun 25 2001 Nalin Dahyabhai <nalin@redhat.com>
525
- disable the gssapi patch
526
527
* Mon Jun 18 2001 Nalin Dahyabhai <nalin@redhat.com>
528
- update to 2.9p2
529
- refresh to a new version of the gssapi patch
530
531
* Thu Jun  7 2001 Nalin Dahyabhai <nalin@redhat.com>
532
- change Copyright: BSD to License: BSD
533
- add Markus Friedl's unverified patch for the cookie file deletion problem
534
  so that we can verify it
535
- drop patch to check if xauth is present (was folded into cookie patch)
536
- don't apply gssapi patches for the errata candidate
537
- clear supplemental groups list at startup
538
539
* Fri May 25 2001 Nalin Dahyabhai <nalin@redhat.com>
540
- fix an error parsing the new default sshd_config
541
- add a fix from Markus Friedl (via openssh-unix-dev) for ssh-keygen not
542
  dealing with comments right
543
544
* Thu May 24 2001 Nalin Dahyabhai <nalin@redhat.com>
545
- add in Simon Wilkinson's GSSAPI patch to give it some testing in-house,
546
  to be removed before the next beta cycle because it's a big departure
547
  from the upstream version
548
549
* Thu May  3 2001 Nalin Dahyabhai <nalin@redhat.com>
550
- finish marking strings in the init script for translation
551
- modify init script to source /etc/sysconfig/sshd and pass $OPTIONS to sshd
552
  at startup (change merged from openssh.com init script, originally by
553
  Pekka Savola)
554
- refuse to do X11 forwarding if xauth isn't there, handy if you enable
555
  it by default on a system that doesn't have X installed
556
557
* Wed May  2 2001 Nalin Dahyabhai <nalin@redhat.com>
558
- update to 2.9
559
- drop various patches that came from or went upstream or to or from CVS
560
561
* Wed Apr 18 2001 Nalin Dahyabhai <nalin@redhat.com>
562
- only require initscripts 5.00 on 6.2 (reported by Peter Bieringer)
563
564
* Sun Apr  8 2001 Preston Brown <pbrown@redhat.com>
565
- remove explicit openssl requirement, fixes builddistro issue
566
- make initscript stop() function wait until sshd really dead to avoid
567
  races in condrestart
568
569
* Mon Apr  2 2001 Nalin Dahyabhai <nalin@redhat.com>
570
- mention that challengereponse supports PAM, so disabling password doesn't
571
  limit users to pubkey and rsa auth (#34378)
572
- bypass the daemon() function in the init script and call initlog directly,
573
  because daemon() won't start a daemon it detects is already running (like
574
  open connections)
575
- require the version of openssl we had when we were built
576
577
* Fri Mar 23 2001 Nalin Dahyabhai <nalin@redhat.com>
578
- make do_pam_setcred() smart enough to know when to establish creds and
579
  when to reinitialize them
580
- add in a couple of other fixes from Damien for inclusion in the errata
581
582
* Thu Mar 22 2001 Nalin Dahyabhai <nalin@redhat.com>
583
- update to 2.5.2p2
584
- call setcred() again after initgroups, because the "creds" could actually
585
  be group memberships
586
587
* Tue Mar 20 2001 Nalin Dahyabhai <nalin@redhat.com>
588
- update to 2.5.2p1 (includes endianness fixes in the rijndael implementation)
589
- don't enable challenge-response by default until we find a way to not
590
  have too many userauth requests (we may make up to six pubkey and up to
591
  three password attempts as it is)
592
- remove build dependency on rsh to match openssh.com's packages more closely
593
594
* Sat Mar  3 2001 Nalin Dahyabhai <nalin@redhat.com>
595
- remove dependency on openssl -- would need to be too precise
596
597
* Fri Mar  2 2001 Nalin Dahyabhai <nalin@redhat.com>
598
- rebuild in new environment
599
600
* Mon Feb 26 2001 Nalin Dahyabhai <nalin@redhat.com>
601
- Revert the patch to move pam_open_session.
602
- Init script and spec file changes from Pekka Savola. (#28750)
603
- Patch sftp to recognize '-o protocol' arguments. (#29540)
604
605
* Thu Feb 22 2001 Nalin Dahyabhai <nalin@redhat.com>
606
- Chuck the closing patch.
607
- Add a trigger to add host keys for protocol 2 to the config file, now that
608
  configuration file syntax requires us to specify it with HostKey if we
609
  specify any other HostKey values, which we do.
610
611
* Tue Feb 20 2001 Nalin Dahyabhai <nalin@redhat.com>
612
- Redo patch to move pam_open_session after the server setuid()s to the user.
613
- Rework the nopam patch to use be picked up by autoconf.
614
615
* Mon Feb 19 2001 Nalin Dahyabhai <nalin@redhat.com>
616
- Update for 2.5.1p1.
617
- Add init script mods from Pekka Savola.
618
- Tweak the init script to match the CVS contrib script more closely.
619
- Redo patch to ssh-add to try to adding both identity and id_dsa to also try
620
  adding id_rsa.
621
622
* Fri Feb 16 2001 Nalin Dahyabhai <nalin@redhat.com>
623
- Update for 2.5.0p1.
624
- Use $RPM_OPT_FLAGS instead of -O when building gnome-ssh-askpass
625
- Resync with parts of Damien Miller's openssh.spec from CVS, including
626
  update of x11 askpass to 1.2.0.
627
- Only require openssl (don't prereq) because we generate keys in the init
628
  script now.
629
630
* Tue Feb 13 2001 Nalin Dahyabhai <nalin@redhat.com>
631
- Don't open a PAM session until we've forked and become the user (#25690).
632
- Apply Andrew Bartlett's patch for letting pam_authenticate() know which
633
  host the user is attempting a login from.
634
- Resync with parts of Damien Miller's openssh.spec from CVS.
635
- Don't expose KbdInt responses in debug messages (from CVS).
636
- Detect and handle errors in rsa_{public,private}_decrypt (from CVS).
637
638
* Wed Feb  7 2001 Trond Eivind Glomsrxd <teg@redhat.com>
639
- i18n-tweak to initscript.
640
641
* Tue Jan 23 2001 Nalin Dahyabhai <nalin@redhat.com>
642
- More gettextizing.
643
- Close all files after going into daemon mode (needs more testing).
644
- Extract patch from CVS to handle auth banners (in the client).
645
- Extract patch from CVS to handle compat weirdness.
646
647
* Fri Jan 19 2001 Nalin Dahyabhai <nalin@redhat.com>
648
- Finish with the gettextizing.
649
650
* Thu Jan 18 2001 Nalin Dahyabhai <nalin@redhat.com>
651
- Fix a bug in auth2-pam.c (#23877)
652
- Gettextize the init script.
653
654
* Wed Dec 20 2000 Nalin Dahyabhai <nalin@redhat.com>
655
- Incorporate a switch for using PAM configs for 6.x, just in case.
656
657
* Tue Dec  5 2000 Nalin Dahyabhai <nalin@redhat.com>
658
- Incorporate Bero's changes for a build specifically for rescue CDs.
659
660
* Wed Nov 29 2000 Nalin Dahyabhai <nalin@redhat.com>
661
- Don't treat pam_setcred() failure as fatal unless pam_authenticate() has
662
  succeeded, to allow public-key authentication after a failure with "none"
663
  authentication.  (#21268)
664
665
* Tue Nov 28 2000 Nalin Dahyabhai <nalin@redhat.com>
666
- Update to x11-askpass 1.1.1. (#21301)
667
- Don't second-guess fixpaths, which causes paths to get fixed twice. (#21290)
668
669
* Mon Nov 27 2000 Nalin Dahyabhai <nalin@redhat.com>
670
- Merge multiple PAM text messages into subsequent prompts when possible when
671
  doing keyboard-interactive authentication.
672
673
* Sun Nov 26 2000 Nalin Dahyabhai <nalin@redhat.com>
674
- Disable the built-in MD5 password support.  We're using PAM.
675
- Take a crack at doing keyboard-interactive authentication with PAM, and
676
  enable use of it in the default client configuration so that the client
677
  will try it when the server disallows password authentication.
678
- Build with debugging flags.  Build root policies strip all binaries anyway.
679
680
* Tue Nov 21 2000 Nalin Dahyabhai <nalin@redhat.com>
681
- Use DESTDIR instead of %%makeinstall.
682
- Remove /usr/X11R6/bin from the path-fixing patch.
683
684
* Mon Nov 20 2000 Nalin Dahyabhai <nalin@redhat.com>
685
- Add the primes file from the latest snapshot to the main package (#20884).
686
- Add the dev package to the prereq list (#19984).
687
- Remove the default path and mimic login's behavior in the server itself.
688
689
* Fri Nov 17 2000 Nalin Dahyabhai <nalin@redhat.com>
690
- Resync with conditional options in Damien Miller's .spec file for an errata.
691
- Change libexecdir from %%{_libexecdir}/ssh to %%{_libexecdir}/openssh.
692
693
* Tue Nov  7 2000 Nalin Dahyabhai <nalin@redhat.com>
694
- Update to OpenSSH 2.3.0p1.
695
- Update to x11-askpass 1.1.0.
696
- Enable keyboard-interactive authentication.
697
698
* Mon Oct 30 2000 Nalin Dahyabhai <nalin@redhat.com>
699
- Update to ssh-askpass-x11 1.0.3.
700
- Change authentication related messages to be private (#19966).
701
702
* Tue Oct 10 2000 Nalin Dahyabhai <nalin@redhat.com>
703
- Patch ssh-keygen to be able to list signatures for DSA public key files
704
  it generates.
705
706
* Thu Oct  5 2000 Nalin Dahyabhai <nalin@redhat.com>
707
- Add BuildPreReq on /usr/include/security/pam_appl.h to be sure we always
708
  build PAM authentication in.
709
- Try setting SSH_ASKPASS if gnome-ssh-askpass is installed.
710
- Clean out no-longer-used patches.
711
- Patch ssh-add to try to add both identity and id_dsa, and to error only
712
  when neither exists.
713
714
* Mon Oct  2 2000 Nalin Dahyabhai <nalin@redhat.com>
715
- Update x11-askpass to 1.0.2. (#17835)
716
- Add BuildPreReqs for /bin/login and /usr/bin/rsh so that configure will
717
  always find them in the right place. (#17909)
718
- Set the default path to be the same as the one supplied by /bin/login, but
719
  add /usr/X11R6/bin. (#17909)
720
- Try to handle obsoletion of ssh-server more cleanly.  Package names
721
  are different, but init script name isn't. (#17865)
722
723
* Wed Sep  6 2000 Nalin Dahyabhai <nalin@redhat.com>
724
- Update to 2.2.0p1. (#17835)
725
- Tweak the init script to allow proper restarting. (#18023)
726
727
* Wed Aug 23 2000 Nalin Dahyabhai <nalin@redhat.com>
728
- Update to 20000823 snapshot.
729
- Change subpackage requirements from %%{version} to %%{version}-%%{release}
730
- Back out the pipe patch.
731
732
* Mon Jul 17 2000 Nalin Dahyabhai <nalin@redhat.com>
733
- Update to 2.1.1p4, which includes fixes for config file parsing problems.
734
- Move the init script back.
735
- Add Damien's quick fix for wackiness.
736
737
* Wed Jul 12 2000 Nalin Dahyabhai <nalin@redhat.com>
738
- Update to 2.1.1p3, which includes fixes for X11 forwarding and strtok().
739
740
* Thu Jul  6 2000 Nalin Dahyabhai <nalin@redhat.com>
741
- Move condrestart to server postun.
742
- Move key generation to init script.
743
- Actually use the right patch for moving the key generation to the init script.
744
- Clean up the init script a bit.
745
746
* Wed Jul  5 2000 Nalin Dahyabhai <nalin@redhat.com>
747
- Fix X11 forwarding, from mail post by Chan Shih-Ping Richard.
748
749
* Sun Jul  2 2000 Nalin Dahyabhai <nalin@redhat.com>
750
- Update to 2.1.1p2.
751
- Use of strtok() considered harmful.
752
753
* Sat Jul  1 2000 Nalin Dahyabhai <nalin@redhat.com>
754
- Get the build root out of the man pages.
755
756
* Thu Jun 29 2000 Nalin Dahyabhai <nalin@redhat.com>
757
- Add and use condrestart support in the init script.
758
- Add newer initscripts as a prereq.
759
760
* Tue Jun 27 2000 Nalin Dahyabhai <nalin@redhat.com>
761
- Build in new environment (release 2)
762
- Move -clients subpackage to Applications/Internet group
763
764
* Fri Jun  9 2000 Nalin Dahyabhai <nalin@redhat.com>
765
- Update to 2.2.1p1
766
767
* Sat Jun  3 2000 Nalin Dahyabhai <nalin@redhat.com>
768
- Patch to build with neither RSA nor RSAref.
769
- Miscellaneous FHS-compliance tweaks.
770
- Fix for possibly-compressed man pages.
771
772
* Wed Mar 15 2000 Damien Miller <djm@ibs.com.au>
773
- Updated for new location
774
- Updated for new gnome-ssh-askpass build
775
776
* Sun Dec 26 1999 Damien Miller <djm@mindrot.org>
777
- Added Jim Knoble's <jmknoble@pobox.com> askpass
778
779
* Mon Nov 15 1999 Damien Miller <djm@mindrot.org>
780
- Split subpackages further based on patch from jim knoble <jmknoble@pobox.com>
781
782
* Sat Nov 13 1999 Damien Miller <djm@mindrot.org>
783
- Added 'Obsoletes' directives
784
785
* Tue Nov 09 1999 Damien Miller <djm@ibs.com.au>
786
- Use make install
787
- Subpackages
788
789
* Mon Nov 08 1999 Damien Miller <djm@ibs.com.au>
790
- Added links for slogin
791
- Fixed perms on manpages
792
793
* Sat Oct 30 1999 Damien Miller <djm@ibs.com.au>
794
- Renamed init script
795
796
* Fri Oct 29 1999 Damien Miller <djm@ibs.com.au>
797
- Back to old binary names
798
799
* Thu Oct 28 1999 Damien Miller <djm@ibs.com.au>
800
- Use autoconf
801
- New binary names
802
803
* Wed Oct 27 1999 Damien Miller <djm@ibs.com.au>
804
- Initial RPMification, based on Jan "Yenya" Kasprzak's <kas@fi.muni.cz> spec.
805
(-)contrib/fedora/sshd.init (+154 lines)
Line 0 Link Here
1
#!/bin/bash
2
#
3
# Init file for OpenSSH server daemon
4
#
5
# chkconfig: 2345 55 25
6
# description: OpenSSH server daemon
7
#
8
# processname: sshd
9
# config: /etc/ssh/ssh_host_key
10
# config: /etc/ssh/ssh_host_key.pub
11
# config: /etc/ssh/ssh_random_seed
12
# config: /etc/ssh/sshd_config
13
# pidfile: /var/run/sshd.pid
14
15
# source function library
16
. /etc/rc.d/init.d/functions
17
18
# pull in sysconfig settings
19
[ -f /etc/sysconfig/sshd ] && . /etc/sysconfig/sshd
20
21
RETVAL=0
22
prog="sshd"
23
24
# Some functions to make the below more readable
25
KEYGEN=/usr/bin/ssh-keygen
26
SSHD=/usr/sbin/sshd
27
RSA1_KEY=/etc/ssh/ssh_host_key
28
RSA_KEY=/etc/ssh/ssh_host_rsa_key
29
DSA_KEY=/etc/ssh/ssh_host_dsa_key
30
PID_FILE=/var/run/sshd.pid
31
32
do_rsa1_keygen() {
33
	if [ ! -s $RSA1_KEY ]; then
34
		echo -n $"Generating SSH1 RSA host key: "
35
		if $KEYGEN -q -t rsa1 -f $RSA1_KEY -C '' -N '' >&/dev/null; then
36
			chmod 600 $RSA1_KEY
37
			chmod 644 $RSA1_KEY.pub
38
			success $"RSA1 key generation"
39
			echo
40
		else
41
			failure $"RSA1 key generation"
42
			echo
43
			exit 1
44
		fi
45
	fi
46
}
47
48
do_rsa_keygen() {
49
	if [ ! -s $RSA_KEY ]; then
50
		echo -n $"Generating SSH2 RSA host key: "
51
		if $KEYGEN -q -t rsa -f $RSA_KEY -C '' -N '' >&/dev/null; then
52
			chmod 600 $RSA_KEY
53
			chmod 644 $RSA_KEY.pub
54
			success $"RSA key generation"
55
			echo
56
		else
57
			failure $"RSA key generation"
58
			echo
59
			exit 1
60
		fi
61
	fi
62
}
63
64
do_dsa_keygen() {
65
	if [ ! -s $DSA_KEY ]; then
66
		echo -n $"Generating SSH2 DSA host key: "
67
		if $KEYGEN -q -t dsa -f $DSA_KEY -C '' -N '' >&/dev/null; then
68
			chmod 600 $DSA_KEY
69
			chmod 644 $DSA_KEY.pub
70
			success $"DSA key generation"
71
			echo
72
		else
73
			failure $"DSA key generation"
74
			echo
75
			exit 1
76
		fi
77
	fi
78
}
79
80
do_restart_sanity_check()
81
{
82
	$SSHD -t
83
	RETVAL=$?
84
	if [ ! "$RETVAL" = 0 ]; then
85
		failure $"Configuration file or keys are invalid"
86
		echo
87
	fi
88
}
89
90
start()
91
{
92
	# Create keys if necessary
93
	do_rsa1_keygen
94
	do_rsa_keygen
95
	do_dsa_keygen
96
97
	echo -n $"Starting $prog:"
98
	initlog -c "$SSHD $OPTIONS" && success || failure
99
	RETVAL=$?
100
	[ "$RETVAL" = 0 ] && touch /var/lock/subsys/sshd
101
	echo
102
}
103
104
stop()
105
{
106
	echo -n $"Stopping $prog:"
107
	killproc $SSHD -TERM
108
	RETVAL=$?
109
	[ "$RETVAL" = 0 ] && rm -f /var/lock/subsys/sshd
110
	echo
111
}
112
113
reload()
114
{
115
	echo -n $"Reloading $prog:"
116
	killproc $SSHD -HUP
117
	RETVAL=$?
118
	echo
119
}
120
121
case "$1" in
122
	start)
123
		start
124
		;;
125
	stop)
126
		stop
127
		;;
128
	restart)
129
		stop
130
		start
131
		;;
132
	reload)
133
		reload
134
		;;
135
	condrestart)
136
		if [ -f /var/lock/subsys/sshd ] ; then
137
			do_restart_sanity_check
138
			if [ "$RETVAL" = 0 ] ; then
139
				stop
140
				# avoid race
141
				sleep 3
142
				start
143
			fi
144
		fi
145
		;;
146
	status)
147
		status $SSHD
148
		RETVAL=$?
149
		;;
150
	*)
151
		echo $"Usage: $0 {start|stop|restart|reload|condrestart|status}"
152
		RETVAL=1
153
esac
154
exit $RETVAL
(-)contrib/fedora/sshd.init.old (+172 lines)
Line 0 Link Here
1
#!/bin/bash
2
#
3
# Init file for OpenSSH server daemon
4
#
5
# chkconfig: 2345 55 25
6
# description: OpenSSH server daemon
7
#
8
# processname: sshd
9
# config: /etc/ssh/ssh_host_key
10
# config: /etc/ssh/ssh_host_key.pub
11
# config: /etc/ssh/ssh_random_seed
12
# config: /etc/ssh/sshd_config
13
# pidfile: /var/run/sshd.pid
14
15
# source function library
16
. /etc/rc.d/init.d/functions
17
18
# pull in sysconfig settings
19
[ -f /etc/sysconfig/sshd ] && . /etc/sysconfig/sshd
20
21
RETVAL=0
22
prog="sshd"
23
24
# Some functions to make the below more readable
25
KEYGEN=/usr/bin/ssh-keygen
26
SSHD=/usr/sbin/sshd
27
RSA1_KEY=/etc/ssh/ssh_host_key
28
RSA_KEY=/etc/ssh/ssh_host_rsa_key
29
DSA_KEY=/etc/ssh/ssh_host_dsa_key
30
PID_FILE=/var/run/sshd.pid
31
32
my_success() {
33
  local msg
34
  if [ $# -gt 1 ]; then
35
    msg="$2"
36
  else
37
    msg="done"
38
  fi
39
  case "`type -type success`" in
40
    function)
41
      success "$1"
42
    ;;
43
    *)
44
      echo -n "${msg}"
45
    ;;
46
  esac
47
}
48
my_failure() {
49
  local msg
50
  if [ $# -gt 1 ]; then
51
    msg="$2"
52
  else
53
    msg="FAILED"
54
  fi
55
  case "`type -type failure`" in
56
    function)
57
      failure "$1"
58
    ;;
59
    *)
60
      echo -n "${msg}"
61
    ;;
62
  esac
63
}
64
do_rsa1_keygen() {
65
	if [ ! -s $RSA1_KEY ]; then
66
		echo -n "Generating SSH1 RSA host key: "
67
		if $KEYGEN -q -t rsa1 -f $RSA1_KEY -C '' -N '' >&/dev/null; then
68
			chmod 600 $RSA1_KEY
69
			chmod 644 $RSA1_KEY.pub
70
			my_success "RSA1 key generation"
71
			echo
72
		else
73
			my_failure "RSA1 key generation"
74
			echo
75
			exit 1
76
		fi
77
	fi
78
}
79
do_rsa_keygen() {
80
	if [ ! -s $RSA_KEY ]; then
81
		echo -n "Generating SSH2 RSA host key: "
82
		if $KEYGEN -q -t rsa -f $RSA_KEY -C '' -N '' >&/dev/null; then
83
			chmod 600 $RSA_KEY
84
			chmod 644 $RSA_KEY.pub
85
			my_success "RSA key generation"
86
			echo
87
		else
88
			my_failure "RSA key generation"
89
			echo
90
			exit 1
91
		fi
92
	fi
93
}
94
do_dsa_keygen() {
95
	if [ ! -s $DSA_KEY ]; then
96
		echo -n "Generating SSH2 DSA host key: "
97
		if $KEYGEN -q -t dsa -f $DSA_KEY -C '' -N '' >&/dev/null; then
98
			chmod 600 $DSA_KEY
99
			chmod 644 $DSA_KEY.pub
100
			my_success "DSA key generation"
101
			echo
102
		else
103
			my_failure "DSA key generation"
104
			echo
105
			exit 1
106
		fi
107
	fi
108
}
109
do_restart_sanity_check() {
110
	$SSHD -t
111
	RETVAL=$?
112
	if [ ! "$RETVAL" = 0 ]; then
113
		my_failure "Configuration file or keys"
114
		echo
115
	fi
116
}
117
118
119
case "$1" in
120
	start)
121
		# Create keys if necessary
122
		do_rsa1_keygen;
123
		do_rsa_keygen;
124
		do_dsa_keygen;
125
		
126
		echo -n "Starting sshd: "
127
		if [ ! -f $PID_FILE ] ; then
128
			sshd $OPTIONS
129
			RETVAL=$?
130
			if [ "$RETVAL" = "0" ] ; then
131
				my_success "sshd startup" "sshd"
132
				touch /var/lock/subsys/sshd
133
			else
134
				my_failure "sshd startup" ""
135
			fi
136
		fi
137
		echo
138
		;;
139
	stop)
140
		echo -n "Shutting down sshd: "
141
		if [ -f $PID_FILE ] ; then
142
			killproc sshd
143
			RETVAL=$?
144
			[ $RETVAL -eq 0 ] && rm -f /var/lock/subsys/sshd
145
		fi
146
		echo
147
		;;
148
	restart)
149
		do_restart_sanity_check
150
		$0 stop
151
		$0 start
152
		RETVAL=$?
153
		;;
154
	condrestart)
155
		if [ -f /var/lock/subsys/sshd ] ; then
156
			do_restart_sanity_check
157
			$0 stop
158
			$0 start
159
			RETVAL=$?
160
		fi
161
		;;
162
	status)
163
		status sshd
164
		RETVAL=$?
165
		;;
166
	*)
167
		echo "Usage: sshd {start|stop|restart|status|condrestart}"
168
		exit 1
169
		;;
170
esac
171
172
exit $RETVAL
(-)contrib/fedora/sshd.pam (+8 lines)
Line 0 Link Here
1
#%PAM-1.0
2
auth       required     /lib/security/pam_stack.so service=system-auth
3
auth       required     /lib/security/pam_nologin.so
4
account    required     /lib/security/pam_stack.so service=system-auth
5
password   required     /lib/security/pam_stack.so service=system-auth
6
session    required     /lib/security/pam_stack.so service=system-auth
7
session    required     /lib/security/pam_limits.so
8
session    optional     /lib/security/pam_console.so
(-)contrib/fedora/sshd.pam.old (+8 lines)
Line 0 Link Here
1
#%PAM-1.0
2
auth       required     /lib/security/pam_pwdb.so shadow nodelay
3
auth       required     /lib/security/pam_nologin.so
4
account    required     /lib/security/pam_pwdb.so
5
password   required     /lib/security/pam_cracklib.so
6
password   required     /lib/security/pam_pwdb.so shadow nullok use_authtok
7
session    required     /lib/security/pam_pwdb.so
8
session    required     /lib/security/pam_limits.so

Return to bug 776