forked from rpms/openssh
Update the pka patch
This commit is contained in:
parent
ebcd8e978a
commit
9051e5753d
@ -1,7 +1,7 @@
|
|||||||
diff -up openssh-5.3p1/auth2-pubkey.c.pka openssh-5.3p1/auth2-pubkey.c
|
diff -up openssh-5.3p1/auth2-pubkey.c.pka openssh-5.3p1/auth2-pubkey.c
|
||||||
--- openssh-5.3p1/auth2-pubkey.c.pka 2009-10-15 06:26:25.000000000 +0200
|
--- openssh-5.3p1/auth2-pubkey.c.pka 2009-03-08 01:40:28.000000000 +0100
|
||||||
+++ openssh-5.3p1/auth2-pubkey.c 2009-10-15 06:44:32.000000000 +0200
|
+++ openssh-5.3p1/auth2-pubkey.c 2010-01-04 16:07:53.000000000 +0100
|
||||||
@@ -184,26 +184,14 @@ done:
|
@@ -175,26 +175,14 @@ done:
|
||||||
|
|
||||||
/* return 1 if user allows given key */
|
/* return 1 if user allows given key */
|
||||||
static int
|
static int
|
||||||
@ -29,7 +29,7 @@ diff -up openssh-5.3p1/auth2-pubkey.c.pka openssh-5.3p1/auth2-pubkey.c
|
|||||||
found_key = 0;
|
found_key = 0;
|
||||||
found = key_new(key->type);
|
found = key_new(key->type);
|
||||||
|
|
||||||
@@ -248,21 +236,160 @@ user_key_allowed2(struct passwd *pw, Key
|
@@ -239,21 +227,160 @@ user_key_allowed2(struct passwd *pw, Key
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -193,36 +193,6 @@ diff -up openssh-5.3p1/auth2-pubkey.c.pka openssh-5.3p1/auth2-pubkey.c
|
|||||||
file = authorized_keys_file(pw);
|
file = authorized_keys_file(pw);
|
||||||
success = user_key_allowed2(pw, key, file);
|
success = user_key_allowed2(pw, key, file);
|
||||||
xfree(file);
|
xfree(file);
|
||||||
diff -up openssh-5.3p1/configure.ac.pka openssh-5.3p1/configure.ac
|
|
||||||
--- openssh-5.3p1/configure.ac.pka 2009-10-15 06:26:25.000000000 +0200
|
|
||||||
+++ openssh-5.3p1/configure.ac 2009-10-15 06:26:26.000000000 +0200
|
|
||||||
@@ -1319,6 +1319,18 @@ AC_ARG_WITH(audit,
|
|
||||||
esac ]
|
|
||||||
)
|
|
||||||
|
|
||||||
+# Check whether user wants pubkey agent support
|
|
||||||
+PKA_MSG="no"
|
|
||||||
+AC_ARG_WITH(pka,
|
|
||||||
+ [ --with-pka Enable pubkey agent support],
|
|
||||||
+ [
|
|
||||||
+ if test "x$withval" != "xno" ; then
|
|
||||||
+ AC_DEFINE([WITH_PUBKEY_AGENT], 1, [Enable pubkey agent support])
|
|
||||||
+ PKA_MSG="yes"
|
|
||||||
+ fi
|
|
||||||
+ ]
|
|
||||||
+)
|
|
||||||
+
|
|
||||||
dnl Checks for library functions. Please keep in alphabetical order
|
|
||||||
AC_CHECK_FUNCS( \
|
|
||||||
arc4random \
|
|
||||||
@@ -4264,6 +4276,7 @@ echo " Linux audit support
|
|
||||||
echo " Smartcard support: $SCARD_MSG"
|
|
||||||
echo " S/KEY support: $SKEY_MSG"
|
|
||||||
echo " TCP Wrappers support: $TCPW_MSG"
|
|
||||||
+echo " PKA support: $PKA_MSG"
|
|
||||||
echo " MD5 password support: $MD5_MSG"
|
|
||||||
echo " libedit support: $LIBEDIT_MSG"
|
|
||||||
echo " Solaris process contract support: $SPC_MSG"
|
|
||||||
diff -up openssh-5.3p1/configure.pka openssh-5.3p1/configure
|
diff -up openssh-5.3p1/configure.pka openssh-5.3p1/configure
|
||||||
--- openssh-5.3p1/configure.pka 2009-10-13 19:27:51.000000000 +0200
|
--- openssh-5.3p1/configure.pka 2009-10-13 19:27:51.000000000 +0200
|
||||||
+++ openssh-5.3p1/configure 2009-10-15 06:26:33.000000000 +0200
|
+++ openssh-5.3p1/configure 2009-10-15 06:26:33.000000000 +0200
|
||||||
@ -276,10 +246,40 @@ diff -up openssh-5.3p1/configure.pka openssh-5.3p1/configure
|
|||||||
echo " MD5 password support: $MD5_MSG"
|
echo " MD5 password support: $MD5_MSG"
|
||||||
echo " libedit support: $LIBEDIT_MSG"
|
echo " libedit support: $LIBEDIT_MSG"
|
||||||
echo " Solaris process contract support: $SPC_MSG"
|
echo " Solaris process contract support: $SPC_MSG"
|
||||||
|
diff -up openssh-5.3p1/configure.ac.pka openssh-5.3p1/configure.ac
|
||||||
|
--- openssh-5.3p1/configure.ac.pka 2009-09-11 06:56:08.000000000 +0200
|
||||||
|
+++ openssh-5.3p1/configure.ac 2010-01-04 16:07:53.000000000 +0100
|
||||||
|
@@ -1319,6 +1319,18 @@ AC_ARG_WITH(audit,
|
||||||
|
esac ]
|
||||||
|
)
|
||||||
|
|
||||||
|
+# Check whether user wants pubkey agent support
|
||||||
|
+PKA_MSG="no"
|
||||||
|
+AC_ARG_WITH(pka,
|
||||||
|
+ [ --with-pka Enable pubkey agent support],
|
||||||
|
+ [
|
||||||
|
+ if test "x$withval" != "xno" ; then
|
||||||
|
+ AC_DEFINE([WITH_PUBKEY_AGENT], 1, [Enable pubkey agent support])
|
||||||
|
+ PKA_MSG="yes"
|
||||||
|
+ fi
|
||||||
|
+ ]
|
||||||
|
+)
|
||||||
|
+
|
||||||
|
dnl Checks for library functions. Please keep in alphabetical order
|
||||||
|
AC_CHECK_FUNCS( \
|
||||||
|
arc4random \
|
||||||
|
@@ -4229,6 +4241,7 @@ echo " SELinux support
|
||||||
|
echo " Smartcard support: $SCARD_MSG"
|
||||||
|
echo " S/KEY support: $SKEY_MSG"
|
||||||
|
echo " TCP Wrappers support: $TCPW_MSG"
|
||||||
|
+echo " PKA support: $PKA_MSG"
|
||||||
|
echo " MD5 password support: $MD5_MSG"
|
||||||
|
echo " libedit support: $LIBEDIT_MSG"
|
||||||
|
echo " Solaris process contract support: $SPC_MSG"
|
||||||
diff -up openssh-5.3p1/servconf.c.pka openssh-5.3p1/servconf.c
|
diff -up openssh-5.3p1/servconf.c.pka openssh-5.3p1/servconf.c
|
||||||
--- openssh-5.3p1/servconf.c.pka 2009-10-15 06:26:24.000000000 +0200
|
--- openssh-5.3p1/servconf.c.pka 2009-06-21 12:26:17.000000000 +0200
|
||||||
+++ openssh-5.3p1/servconf.c 2009-10-15 06:26:26.000000000 +0200
|
+++ openssh-5.3p1/servconf.c 2010-01-04 16:07:53.000000000 +0100
|
||||||
@@ -128,6 +128,8 @@ initialize_server_options(ServerOptions
|
@@ -127,6 +127,8 @@ initialize_server_options(ServerOptions
|
||||||
options->num_permitted_opens = -1;
|
options->num_permitted_opens = -1;
|
||||||
options->adm_forced_command = NULL;
|
options->adm_forced_command = NULL;
|
||||||
options->chroot_directory = NULL;
|
options->chroot_directory = NULL;
|
||||||
@ -288,7 +288,7 @@ diff -up openssh-5.3p1/servconf.c.pka openssh-5.3p1/servconf.c
|
|||||||
options->zero_knowledge_password_authentication = -1;
|
options->zero_knowledge_password_authentication = -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -310,6 +312,7 @@ typedef enum {
|
@@ -306,6 +308,7 @@ typedef enum {
|
||||||
sMatch, sPermitOpen, sForceCommand, sChrootDirectory,
|
sMatch, sPermitOpen, sForceCommand, sChrootDirectory,
|
||||||
sUsePrivilegeSeparation, sAllowAgentForwarding,
|
sUsePrivilegeSeparation, sAllowAgentForwarding,
|
||||||
sZeroKnowledgePasswordAuthentication,
|
sZeroKnowledgePasswordAuthentication,
|
||||||
@ -296,7 +296,7 @@ diff -up openssh-5.3p1/servconf.c.pka openssh-5.3p1/servconf.c
|
|||||||
sDeprecated, sUnsupported
|
sDeprecated, sUnsupported
|
||||||
} ServerOpCodes;
|
} ServerOpCodes;
|
||||||
|
|
||||||
@@ -429,6 +432,13 @@ static struct {
|
@@ -424,6 +427,13 @@ static struct {
|
||||||
{ "permitopen", sPermitOpen, SSHCFG_ALL },
|
{ "permitopen", sPermitOpen, SSHCFG_ALL },
|
||||||
{ "forcecommand", sForceCommand, SSHCFG_ALL },
|
{ "forcecommand", sForceCommand, SSHCFG_ALL },
|
||||||
{ "chrootdirectory", sChrootDirectory, SSHCFG_ALL },
|
{ "chrootdirectory", sChrootDirectory, SSHCFG_ALL },
|
||||||
@ -310,7 +310,7 @@ diff -up openssh-5.3p1/servconf.c.pka openssh-5.3p1/servconf.c
|
|||||||
{ NULL, sBadOption, 0 }
|
{ NULL, sBadOption, 0 }
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -1303,6 +1313,16 @@ process_server_config_line(ServerOptions
|
@@ -1294,6 +1304,20 @@ process_server_config_line(ServerOptions
|
||||||
*charptr = xstrdup(arg);
|
*charptr = xstrdup(arg);
|
||||||
break;
|
break;
|
||||||
|
|
||||||
@ -322,12 +322,16 @@ diff -up openssh-5.3p1/servconf.c.pka openssh-5.3p1/servconf.c
|
|||||||
+
|
+
|
||||||
+ case sPubkeyAgentRunAs:
|
+ case sPubkeyAgentRunAs:
|
||||||
+ charptr = &options->pubkey_agent_runas;
|
+ charptr = &options->pubkey_agent_runas;
|
||||||
|
+
|
||||||
|
+ arg = strdelim(&cp);
|
||||||
|
+ if (*activep && *charptr == NULL)
|
||||||
|
+ *charptr = xstrdup(arg);
|
||||||
+ break;
|
+ break;
|
||||||
+
|
+
|
||||||
case sDeprecated:
|
case sDeprecated:
|
||||||
logit("%s line %d: Deprecated option %s",
|
logit("%s line %d: Deprecated option %s",
|
||||||
filename, linenum, arg);
|
filename, linenum, arg);
|
||||||
@@ -1396,6 +1416,8 @@ copy_set_server_options(ServerOptions *d
|
@@ -1387,6 +1411,8 @@ copy_set_server_options(ServerOptions *d
|
||||||
M_CP_INTOPT(gss_authentication);
|
M_CP_INTOPT(gss_authentication);
|
||||||
M_CP_INTOPT(rsa_authentication);
|
M_CP_INTOPT(rsa_authentication);
|
||||||
M_CP_INTOPT(pubkey_authentication);
|
M_CP_INTOPT(pubkey_authentication);
|
||||||
@ -336,7 +340,7 @@ diff -up openssh-5.3p1/servconf.c.pka openssh-5.3p1/servconf.c
|
|||||||
M_CP_INTOPT(kerberos_authentication);
|
M_CP_INTOPT(kerberos_authentication);
|
||||||
M_CP_INTOPT(hostbased_authentication);
|
M_CP_INTOPT(hostbased_authentication);
|
||||||
M_CP_INTOPT(kbd_interactive_authentication);
|
M_CP_INTOPT(kbd_interactive_authentication);
|
||||||
@@ -1636,6 +1658,10 @@ dump_config(ServerOptions *o)
|
@@ -1626,6 +1652,10 @@ dump_config(ServerOptions *o)
|
||||||
dump_cfg_string(sAuthorizedKeysFile, o->authorized_keys_file);
|
dump_cfg_string(sAuthorizedKeysFile, o->authorized_keys_file);
|
||||||
dump_cfg_string(sAuthorizedKeysFile2, o->authorized_keys_file2);
|
dump_cfg_string(sAuthorizedKeysFile2, o->authorized_keys_file2);
|
||||||
dump_cfg_string(sForceCommand, o->adm_forced_command);
|
dump_cfg_string(sForceCommand, o->adm_forced_command);
|
||||||
@ -348,9 +352,9 @@ diff -up openssh-5.3p1/servconf.c.pka openssh-5.3p1/servconf.c
|
|||||||
/* string arguments requiring a lookup */
|
/* string arguments requiring a lookup */
|
||||||
dump_cfg_string(sLogLevel, log_level_name(o->log_level));
|
dump_cfg_string(sLogLevel, log_level_name(o->log_level));
|
||||||
diff -up openssh-5.3p1/servconf.h.pka openssh-5.3p1/servconf.h
|
diff -up openssh-5.3p1/servconf.h.pka openssh-5.3p1/servconf.h
|
||||||
--- openssh-5.3p1/servconf.h.pka 2009-10-15 06:26:24.000000000 +0200
|
--- openssh-5.3p1/servconf.h.pka 2009-01-28 06:31:23.000000000 +0100
|
||||||
+++ openssh-5.3p1/servconf.h 2009-10-15 06:26:26.000000000 +0200
|
+++ openssh-5.3p1/servconf.h 2010-01-04 16:07:53.000000000 +0100
|
||||||
@@ -152,6 +152,8 @@ typedef struct {
|
@@ -151,6 +151,8 @@ typedef struct {
|
||||||
int num_permitted_opens;
|
int num_permitted_opens;
|
||||||
|
|
||||||
char *chroot_directory;
|
char *chroot_directory;
|
||||||
@ -360,8 +364,8 @@ diff -up openssh-5.3p1/servconf.h.pka openssh-5.3p1/servconf.h
|
|||||||
|
|
||||||
void initialize_server_options(ServerOptions *);
|
void initialize_server_options(ServerOptions *);
|
||||||
diff -up openssh-5.3p1/sshd_config.0.pka openssh-5.3p1/sshd_config.0
|
diff -up openssh-5.3p1/sshd_config.0.pka openssh-5.3p1/sshd_config.0
|
||||||
--- openssh-5.3p1/sshd_config.0.pka 2009-10-15 06:26:24.000000000 +0200
|
--- openssh-5.3p1/sshd_config.0.pka 2009-09-26 08:31:16.000000000 +0200
|
||||||
+++ openssh-5.3p1/sshd_config.0 2009-10-15 06:26:26.000000000 +0200
|
+++ openssh-5.3p1/sshd_config.0 2010-01-04 16:07:53.000000000 +0100
|
||||||
@@ -344,10 +344,11 @@ DESCRIPTION
|
@@ -344,10 +344,11 @@ DESCRIPTION
|
||||||
AllowTcpForwarding, Banner, ChrootDirectory, ForceCommand,
|
AllowTcpForwarding, Banner, ChrootDirectory, ForceCommand,
|
||||||
GatewayPorts, GSSAPIAuthentication, HostbasedAuthentication,
|
GatewayPorts, GSSAPIAuthentication, HostbasedAuthentication,
|
||||||
@ -396,9 +400,21 @@ diff -up openssh-5.3p1/sshd_config.0.pka openssh-5.3p1/sshd_config.0
|
|||||||
RhostsRSAAuthentication
|
RhostsRSAAuthentication
|
||||||
Specifies whether rhosts or /etc/hosts.equiv authentication to-
|
Specifies whether rhosts or /etc/hosts.equiv authentication to-
|
||||||
gether with successful RSA host authentication is allowed. The
|
gether with successful RSA host authentication is allowed. The
|
||||||
|
diff -up openssh-5.3p1/sshd_config.pka openssh-5.3p1/sshd_config
|
||||||
|
--- openssh-5.3p1/sshd_config.pka 2008-07-02 14:35:43.000000000 +0200
|
||||||
|
+++ openssh-5.3p1/sshd_config 2010-01-04 16:07:53.000000000 +0100
|
||||||
|
@@ -46,6 +46,8 @@ Protocol 2
|
||||||
|
#RSAAuthentication yes
|
||||||
|
#PubkeyAuthentication yes
|
||||||
|
#AuthorizedKeysFile .ssh/authorized_keys
|
||||||
|
+#PubkeyAgent none
|
||||||
|
+#PubkeyAgentRunAs nobody
|
||||||
|
|
||||||
|
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
|
||||||
|
#RhostsRSAAuthentication no
|
||||||
diff -up openssh-5.3p1/sshd_config.5.pka openssh-5.3p1/sshd_config.5
|
diff -up openssh-5.3p1/sshd_config.5.pka openssh-5.3p1/sshd_config.5
|
||||||
--- openssh-5.3p1/sshd_config.5.pka 2009-10-15 06:26:24.000000000 +0200
|
--- openssh-5.3p1/sshd_config.5.pka 2009-08-28 02:27:08.000000000 +0200
|
||||||
+++ openssh-5.3p1/sshd_config.5 2009-10-15 06:26:26.000000000 +0200
|
+++ openssh-5.3p1/sshd_config.5 2010-01-04 16:07:53.000000000 +0100
|
||||||
@@ -610,6 +610,9 @@ Available keywords are
|
@@ -610,6 +610,9 @@ Available keywords are
|
||||||
.Cm KerberosAuthentication ,
|
.Cm KerberosAuthentication ,
|
||||||
.Cm MaxAuthTries ,
|
.Cm MaxAuthTries ,
|
||||||
@ -426,15 +442,3 @@ diff -up openssh-5.3p1/sshd_config.5.pka openssh-5.3p1/sshd_config.5
|
|||||||
.It Cm RhostsRSAAuthentication
|
.It Cm RhostsRSAAuthentication
|
||||||
Specifies whether rhosts or /etc/hosts.equiv authentication together
|
Specifies whether rhosts or /etc/hosts.equiv authentication together
|
||||||
with successful RSA host authentication is allowed.
|
with successful RSA host authentication is allowed.
|
||||||
diff -up openssh-5.3p1/sshd_config.pka openssh-5.3p1/sshd_config
|
|
||||||
--- openssh-5.3p1/sshd_config.pka 2009-10-15 06:26:24.000000000 +0200
|
|
||||||
+++ openssh-5.3p1/sshd_config 2009-10-15 06:26:26.000000000 +0200
|
|
||||||
@@ -47,6 +47,8 @@ SyslogFacility AUTHPRIV
|
|
||||||
#RSAAuthentication yes
|
|
||||||
#PubkeyAuthentication yes
|
|
||||||
#AuthorizedKeysFile .ssh/authorized_keys
|
|
||||||
+#PubkeyAgent none
|
|
||||||
+#PubkeyAgentRunAs nobody
|
|
||||||
|
|
||||||
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
|
|
||||||
#RhostsRSAAuthentication no
|
|
||||||
|
@ -69,7 +69,7 @@
|
|||||||
Summary: An open source implementation of SSH protocol versions 1 and 2
|
Summary: An open source implementation of SSH protocol versions 1 and 2
|
||||||
Name: openssh
|
Name: openssh
|
||||||
Version: 5.3p1
|
Version: 5.3p1
|
||||||
Release: 13%{?dist}%{?rescue_rel}
|
Release: 14%{?dist}%{?rescue_rel}
|
||||||
URL: http://www.openssh.com/portable.html
|
URL: http://www.openssh.com/portable.html
|
||||||
#URL1: http://pamsshauth.sourceforge.net
|
#URL1: http://pamsshauth.sourceforge.net
|
||||||
#Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz
|
#Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz
|
||||||
@ -525,6 +525,9 @@ fi
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Tue Jan 5 2010 Jan F. Chadima <jchadima@redhat.com> - 5.3p1-14
|
||||||
|
- Update the pka patch
|
||||||
|
|
||||||
* Mon Dec 21 2009 Jan F. Chadima <jchadima@redhat.com> - 5.3p1-13
|
* Mon Dec 21 2009 Jan F. Chadima <jchadima@redhat.com> - 5.3p1-13
|
||||||
- Update the audit patch
|
- Update the audit patch
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user