1 %define askpass 1.2.4.1
8 Summary : OpenSSH free Secure Shell (SSH) implementation.
9 Summary(de) : OpenSSH - freie Implementation der Secure Shell (SSH).
10 Summary(es) : OpenSSH implementación libre de Secure Shell (SSH).
11 Summary(fr) : Implémentation libre du shell sécurisé OpenSSH (SSH).
12 Summary(it) : Implementazione gratuita OpenSSH della Secure Shell.
13 Summary(pt) : Implementação livre OpenSSH do protocolo 'Secure Shell' (SSH).
14 Summary(pt_BR) : Implementação livre OpenSSH do protocolo Secure Shell (SSH).
17 Packager : Stephan Seyboth <sps@caldera.de>
19 URL : http://www.openssh.com/
21 Obsoletes : ssh, ssh-clients, openssh-clients
23 BuildRoot : /tmp/%{Name}-%{Version}
25 Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{Version}.tar.gz
26 Source1: http://www.ntrnet.net/~jmknoble/software/x11-ssh-askpass/x11-ssh-askpass-%{askpass}.tar.gz
27 Source2: http://www.openssh.com/openssh-faq.html
31 Group : System/Network
32 Requires : openssh = %{Version}
33 Obsoletes : ssh-server
35 Summary : OpenSSH Secure Shell protocol server (sshd).
36 Summary(de) : OpenSSH Secure Shell Protocol-Server (sshd).
37 Summary(es) : Servidor del protocolo OpenSSH Secure Shell (sshd).
38 Summary(fr) : Serveur de protocole du shell sécurisé OpenSSH (sshd).
39 Summary(it) : Server OpenSSH per il protocollo Secure Shell (sshd).
40 Summary(pt) : Servidor do protocolo 'Secure Shell' OpenSSH (sshd).
41 Summary(pt_BR) : Servidor do protocolo Secure Shell OpenSSH (sshd).
45 Group : System/Network
46 Requires : openssh = %{Version}
47 Obsoletes : ssh-extras
49 Summary : OpenSSH X11 pass-phrase dialog.
50 Summary(de) : OpenSSH X11 Passwort-Dialog.
51 Summary(es) : Aplicación de petición de frase clave OpenSSH X11.
52 Summary(fr) : Dialogue pass-phrase X11 d'OpenSSH.
53 Summary(it) : Finestra di dialogo X11 per la frase segreta di OpenSSH.
54 Summary(pt) : Diálogo de pedido de senha para X11 do OpenSSH.
55 Summary(pt_BR) : Diálogo de pedido de senha para X11 do OpenSSH.
59 OpenSSH (Secure Shell) provides access to a remote system. It replaces
60 telnet, rlogin, rexec, and rsh, and provides secure encrypted
61 communications between two untrusted hosts over an insecure network.
62 X11 connections and arbitrary TCP/IP ports can also be forwarded over
66 OpenSSH (Secure Shell) stellt den Zugang zu anderen Rechnern her. Es ersetzt
67 telnet, rlogin, rexec und rsh und stellt eine sichere, verschlüsselte
68 Verbindung zwischen zwei nicht vertrauenswürdigen Hosts über eine unsicheres
69 Netzwerk her. X11 Verbindungen und beliebige andere TCP/IP Ports können ebenso
70 über den sicheren Channel weitergeleitet werden.
73 OpenSSH (Secure Shell) proporciona acceso a sistemas remotos. Reemplaza a
74 telnet, rlogin, rexec, y rsh, y proporciona comunicaciones seguras encriptadas
75 entre dos equipos entre los que no se ha establecido confianza a través de una
76 red insegura. Las conexiones X11 y puertos TCP/IP arbitrarios también pueden
77 ser canalizadas sobre el canal seguro.
80 OpenSSH (Secure Shell) fournit un accès à un système distant. Il remplace
81 telnet, rlogin, rexec et rsh, tout en assurant des communications cryptées
82 securisées entre deux hôtes non fiabilisés sur un réseau non sécurisé. Des
83 connexions X11 et des ports TCP/IP arbitraires peuvent également être
84 transmis sur le canal sécurisé.
87 OpenSSH (Secure Shell) fornisce l'accesso ad un sistema remoto.
88 Sostituisce telnet, rlogin, rexec, e rsh, e fornisce comunicazioni sicure
89 e crittate tra due host non fidati su una rete non sicura. Le connessioni
90 X11 ad una porta TCP/IP arbitraria possono essere inoltrate attraverso
94 OpenSSH (Secure Shell) fornece acesso a um sistema remoto. Substitui o
95 telnet, rlogin, rexec, e o rsh e fornece comunicações seguras e cifradas
96 entre duas máquinas sem confiança mútua sobre uma rede insegura.
97 Ligações X11 e portos TCP/IP arbitrários também poder ser reenviados
100 %Description -l pt_BR
101 O OpenSSH (Secure Shell) fornece acesso a um sistema remoto. Substitui o
102 telnet, rlogin, rexec, e o rsh e fornece comunicações seguras e criptografadas
103 entre duas máquinas sem confiança mútua sobre uma rede insegura.
104 Ligações X11 e portas TCP/IP arbitrárias também podem ser reenviadas
108 This package installs the sshd, the server portion of OpenSSH.
110 %Description -l de server
111 Dieses Paket installiert den sshd, den Server-Teil der OpenSSH.
113 %Description -l es server
114 Este paquete instala sshd, la parte servidor de OpenSSH.
116 %Description -l fr server
117 Ce paquetage installe le 'sshd', partie serveur de OpenSSH.
119 %Description -l it server
120 Questo pacchetto installa sshd, il server di OpenSSH.
122 %Description -l pt server
123 Este pacote intala o sshd, o servidor do OpenSSH.
125 %Description -l pt_BR server
126 Este pacote intala o sshd, o servidor do OpenSSH.
129 This package contains an X11-based passphrase dialog.
131 %Description -l de askpass
132 Dieses Paket enthält einen X11-basierten Passwort Dialog.
134 %Description -l es askpass
135 Este paquete contiene una aplicación para petición de frases-contraseña basada
138 %Description -l fr askpass
139 Ce paquetage contient un dialogue de passphrase basé sur X11.
141 %Description -l it askpass
142 Questo pacchetto contiene una finestra di X11 che chiede la frase segreta.
144 %Description -l pt askpass
145 Este pacote contém um diálogo de senha para o X11.
147 %Description -l pt_BR askpass
148 Este pacote contem um diálogo de frase-senha para o X11.
156 CFLAGS="$RPM_OPT_FLAGS" \
159 --sysconfdir=/etc/ssh \
160 --libexecdir=/usr/lib/ssh \
161 --datadir=/usr/share/openssh \
163 --with-tcp-wrappers \
164 --with-ipv4-default \
168 cd x11-ssh-askpass-%{askpass}
178 make DESTDIR="$DESTDIR" install
180 make -C x11-ssh-askpass-%{askpass} DESTDIR="$DESTDIR" \
181 BINDIR="/usr/lib/ssh" install
185 # install remaining docs
186 NV="$DESTDIR%{_defaultdocdir}/%{Name}-%{Version}"
188 cp -a CREDITS ChangeLog LICENCE OVERVIEW README* TODO $NV
189 cp %{SOURCE2} $NV/faq.html
190 mkdir -p $NV/x11-ssh-askpass-%{askpass}
191 cp -a x11-ssh-askpass-%{askpass}/{README,ChangeLog,TODO,SshAskpass*.ad} \
192 $NV/x11-ssh-askpass-%{askpass}
195 # OpenLinux specific configuration
196 mkdir -p $DESTDIR/{etc/pam.d,%{SVIcdir},%{SVIdir}}
198 # enabling X11 forwarding on the server is convenient and okay,
199 # on the client side it's a potential security risk!
200 %{fixUP} -vg $DESTDIR/etc/ssh/sshd_config 'X11Forwarding no' \
203 cat <<-EOF >> $DESTDIR/etc/ssh/ssh_config
205 # This retains the old behaviour of trying the SSH1 protocol
206 # before the more secure SSH2 one. Note that the SSH2 keys are
207 # stored in a different format so you will have to generate and
208 # distribute a new public/private key pair to migrate. See the
209 # ssh(1) man-page for details
214 install -m644 contrib/caldera/sshd.pam $DESTDIR/etc/pam.d/sshd
215 # FIXME: disabled, find out why this doesn't work with nis
216 %{fixUP} -vg $DESTDIR/etc/pam.d/sshd '(.*pam_limits.*)' '#$1'
218 install -m 0755 contrib/caldera/sshd.init $DESTDIR%{SVIdir}/sshd
219 %{fixUP} -T $DESTDIR/%{SVIdir} -e 's:\@SVIdir\@:%{SVIdir}:'
220 %{fixUP} -T $DESTDIR/%{SVIdir} -e 's:\@sysconfdir\@:/etc/ssh:'
222 cat <<-EoD > $DESTDIR%{SVIcdir}/sshd
224 DESCRIPTIVE="OpenSSH secure shell daemon"
225 # This service will be marked as 'skipped' on boot if there
226 # is no host key. Use ssh-host-keygen to generate one
231 SKG=$DESTDIR/usr/sbin/ssh-host-keygen
232 install -m 0755 contrib/caldera/ssh-host-keygen $SKG
233 %{fixUP} -T $SKG -e 's:\@sysconfdir\@:/etc/ssh:'
234 %{fixUP} -T $SKG -e 's:\@sshkeygen\@:/usr/bin/ssh-keygen:'
237 # generate file lists
238 %{mkLists} -c %{Name}
239 %{mkLists} -d %{Name} << 'EOF'
242 %{_defaultdocdir}/$ IGNORED
246 %{mkLists} -a -f %{Name} << 'EOF'
247 ^/etc * prefix(%%config)
248 /usr/X11R6/lib/X11/app-defaults IGNORED
250 %{_defaultdocdir}/%{Name}-%{Version}/ base
263 # Generate host key when none is present to get up and running,
264 # both client and server require this for host-based auth!
265 # ssh-host-keygen checks for existing keys.
266 /usr/sbin/ssh-host-keygen
267 : # to protect the rpm database
271 if [ -x %{LSBinit}-install ]; then
272 %{LSBinit}-install sshd
274 lisa --SysV-init install sshd S55 3:4:5 K45 0:1:2:6
277 ! %{SVIdir}/sshd status || %{SVIdir}/sshd restart
278 : # to protect the rpm database
282 [ "$1" = 0 ] || exit 0
284 ! %{SVIdir}/sshd status || %{SVIdir}/sshd stop
285 : # to protect the rpm database
289 if [ -x %{LSBinit}-remove ]; then
290 %{LSBinit}-remove sshd
292 lisa --SysV-init remove sshd $1
294 : # to protect the rpm database
297 %Files -f files-%{Name}-base
298 %defattr(-,root,root)
301 %Files server -f files-%{Name}-server
302 %defattr(-,root,root)
305 %Files askpass -f files-%{Name}-askpass
306 %defattr(-,root,root)
310 * Mon Jan 01 1998 ...
311 Template Version: 1.31