The Following User Says Thank You to For This Useful Post: | ||
|
2014-02-10
, 16:55
|
|
Posts: 193 |
Thanked: 203 times |
Joined on Jun 2012
@ Sofia, Bulgaria
|
#32
|
openssh-6.5p1 r5 uploaded to openrepos.
This, I believe, together with openssl-1.0.1f will help you
Dear Enemy: may the Lord hate you and all your kind, may you be turned orange in hue, and may your head fall off at an awkward moment.
How to tell Heretics from Catholics?Papal legate Arnaud Amalric answers :Caedite eos. Novit enim Dominus qui sunt eius.(Kill them all, the Lord will recognise His own.)
“Get thee to Hell, where Asmodeus himself may suckle upon your diseased teat!”
Barnabas Collins
|
2014-02-10
, 18:04
|
|
Posts: 193 |
Thanked: 203 times |
Joined on Jun 2012
@ Sofia, Bulgaria
|
#34
|
kollin@felis ~ % ssh nemo@192.168.0.77 nemo@192.168.0.77's password: Last login: Mon Feb 10 19:59:37 2014 from 192.168.0.1 NOTICE: Env value ignored QT_GSTREAMER_CAMERABIN_FLAGS=15 ,--- | SailfishOS 1.0.3.8 (Naamankajärvi) (armv7hl) '--- Agent pid 2971 Enter passphrase for /home/nemo/.ssh/id_ecdsa: Identity added: /home/nemo/.ssh/id_ecdsa (/home/nemo/.ssh/id_ecdsa) [nemo@localhost ~]$ ssh kollin@seti.bounceme.net * keychain 2.7.1 ~ http://www.funtoo.org * Found existing ssh-agent: 4298 * Found existing gpg-agent: 4352 * Known ssh key: /home/kollin/.ssh/id_ecdsa kollin@felis ~ %
Dear Enemy: may the Lord hate you and all your kind, may you be turned orange in hue, and may your head fall off at an awkward moment.
How to tell Heretics from Catholics?Papal legate Arnaud Amalric answers :Caedite eos. Novit enim Dominus qui sunt eius.(Kill them all, the Lord will recognise His own.)
“Get thee to Hell, where Asmodeus himself may suckle upon your diseased teat!”
Barnabas Collins
The Following User Says Thank You to kollin For This Useful Post: | ||
|
2014-02-10
, 19:11
|
Guest |
Posts: n/a |
Thanked: 0 times |
Joined on
|
#35
|
It works now!!!!!Thank you, thank you, thank you! Kisses, hugz whatever you want !Code:kollin@felis ~ % ssh nemo@192.168.0.77 nemo@192.168.0.77's password: Last login: Mon Feb 10 19:59:37 2014 from 192.168.0.1 NOTICE: Env value ignored QT_GSTREAMER_CAMERABIN_FLAGS=15 ,--- | SailfishOS 1.0.3.8 (Naamankajärvi) (armv7hl) '--- Agent pid 2971 Enter passphrase for /home/nemo/.ssh/id_ecdsa: Identity added: /home/nemo/.ssh/id_ecdsa (/home/nemo/.ssh/id_ecdsa) [nemo@localhost ~]$ ssh kollin@seti.bounceme.net * keychain 2.7.1 ~ http://www.funtoo.org * Found existing ssh-agent: 4298 * Found existing gpg-agent: 4352 * Known ssh key: /home/kollin/.ssh/id_ecdsa kollin@felis ~ %
The Following User Says Thank You to For This Useful Post: | ||
|
2014-02-10
, 21:53
|
Posts: 1,298 |
Thanked: 2,277 times |
Joined on May 2011
|
#36
|
yeah, The thing is, its not a bug. Why there are like 99% of packages that needs update like that ... No idea why packages that are decades outdated.
Talk about security .....
The Following 2 Users Say Thank You to shmerl For This Useful Post: | ||
|
2014-02-11
, 07:27
|
Guest |
Posts: n/a |
Thanked: 0 times |
Joined on
|
#37
|
No, while they have a set of old packages because of GPLv3 avoidance, openssh shouldn't be affected, since it's licensed under BSD (it originates in OpenBSD naturally). So it seems more like a neglect of Mer to me. Please file a bug if you can, if not, let me know and I'll file it. There is no point to complain if no one will file any bugs about it. Such stuff should be fixed in Mer really.
|
2014-02-11
, 18:19
|
Posts: 1,298 |
Thanked: 2,277 times |
Joined on May 2011
|
#38
|
|
2014-02-11
, 18:41
|
Guest |
Posts: n/a |
Thanked: 0 times |
Joined on
|
#39
|
Thanks! Since you added it to openrepos, may be you can update it in Mer as well using the same spec? Or at least propose to update it to the Mer folks.
|
2014-02-18
, 12:59
|
Guest |
Posts: n/a |
Thanked: 0 times |
Joined on
|
#40
|
%define WITH_SELINUX 0 # OpenSSH privilege separation requires a user & group ID %define sshd_uid 74 %define sshd_gid 74 # Do we want to disable building of gnome-askpass? (1=yes 0=no) %define no_gnome_askpass 1 # Do we want to link against a static libcrypto? (1=yes 0=no) %define static_libcrypto 0 # Use GTK2 instead of GNOME in gnome-ssh-askpass %define gtk2 0 # Build position-independent executables (requires toolchain support)? %define pie 1 # Do we want kerberos5 support (1=yes 0=no) %define kerberos5 0 # Do we want libedit support %define libedit 0 # Do we want LDAP support %define ldap 0 # Whether to build pam_ssh_agent_auth %define pam_ssh_agent 0 # Reserve options to override askpass settings with: # rpm -ba|--rebuild --define 'skip_xxx 1' %{?skip_gnome_askpass:%global no_gnome_askpass 1} # Add option to build without GTK2 for older platforms with only GTK+. # Red Hat Linux <= 7.2 and Red Hat Advanced Server 2.1 are examples. # rpm -ba|--rebuild --define 'no_gtk2 1' %{?no_gtk2:%global gtk2 0} # Options for static OpenSSL link: # rpm -ba|--rebuild --define "static_openssl 1" %{?static_openssl:%global static_libcrypto 1} # Is this a build for the rescue CD (without PAM, with MD5)? (1=yes 0=no) %define rescue 0 %{?build_rescue:%global rescue 1} %{?build_rescue:%global rescue_rel rescue} # Turn off some stuff for resuce builds %if %{rescue} %define kerberos5 0 %define libedit 0 %define pam_ssh_agent 0 %endif # Do not forget to bump pam_ssh_agent_auth release if you rewind the main package release to 1 %define openssh_ver 6.5p1 %define openssh_rel 5 %define pam_ssh_agent_ver 0.9.3 %define pam_ssh_agent_rel 1 Summary: An open source implementation of SSH protocol versions 1 and 2 Name: openssh Version: %{openssh_ver} Release: %{openssh_rel}%{?dist}%{?rescue_rel} URL: http://www.openssh.com/portable.html #URL1: http://pamsshagentauth.sourceforge.net Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz License: BSD Group: Applications/Internet BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n) Requires: /sbin/nologin %package clients Summary: An open source SSH client applications Group: Applications/Internet Requires: openssh = %{version}-%{release} %package server Summary: An open source SSH server daemon Group: System Environment/Daemons Requires: openssh = %{version}-%{release} Requires(pre): /usr/sbin/useradd Requires: pam >= 1.0.1-3 %if %{ldap} %package ldap Summary: A LDAP support for open source SSH server daemon Requires: openssh = %{version}-%{release} Group: System Environment/Daemons %endif %package askpass Summary: A passphrase dialog for OpenSSH and X Group: Applications/Internet Requires: openssh = %{version}-%{release} Obsoletes: openssh-askpass-gnome Provides: openssh-askpass-gnome %package -n pam_ssh_agent_auth Summary: PAM module for authentication with ssh-agent Group: System Environment/Base Version: %{pam_ssh_agent_ver} Release: %{pam_ssh_agent_rel}.%{openssh_rel}%{?dist}%{?rescue_rel} License: BSD %description SSH (Secure SHell) is a program for logging into and executing commands on a remote machine. SSH is intended to replace rlogin and rsh, and to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's version of the last free version of SSH, bringing it up to date in terms of security and features. This package includes the core files necessary for both the OpenSSH client and server. To make this package useful, you should also install openssh-clients, openssh-server, or both. %description clients OpenSSH is a free version of SSH (Secure SHell), a program for logging into and executing commands on a remote machine. This package includes the clients necessary to make encrypted connections to SSH servers. %description server OpenSSH is a free version of SSH (Secure SHell), a program for logging into and executing commands on a remote machine. This package contains the secure shell daemon (sshd). The sshd daemon allows SSH clients to securely connect to your SSH server. %if %{ldap} %description ldap OpenSSH LDAP backend is a way how to distribute the authorized tokens among the servers in the network. %endif %description askpass OpenSSH is a free version of SSH (Secure SHell), a program for logging into and executing commands on a remote machine. This package contains an X11 passphrase dialog for OpenSSH. %description -n pam_ssh_agent_auth This package contains a PAM module which can be used to authenticate users using ssh keys stored in a ssh-agent. Through the use of the forwarding of ssh-agent connection it also allows to authenticate with remote ssh-agent instance. The module is most useful for su and sudo service stacks. %prep %setup -q #Do not enable by default autoreconf %build %if %{rescue} CFLAGS="$CFLAGS -Os" %endif %if %{pie} %ifarch s390 s390x sparc sparcv9 sparc64 CFLAGS="$CFLAGS -fPIC" %else CFLAGS="$CFLAGS -fpic" %endif SAVE_LDFLAGS="$LDFLAGS" LDFLAGS="$LDFLAGS -pie -z relro -z now" export CFLAGS export LDFLAGS %endif %if %{kerberos5} if test -r /etc/profile.d/krb5-devel.sh ; then source /etc/profile.d/krb5-devel.sh fi krb5_prefix=`krb5-config --prefix` if test "$krb5_prefix" != "%{_prefix}" ; then CPPFLAGS="$CPPFLAGS -I${krb5_prefix}/include -I${krb5_prefix}/include/gssapi"; export CPPFLAGS CFLAGS="$CFLAGS -I${krb5_prefix}/include -I${krb5_prefix}/include/gssapi" LDFLAGS="$LDFLAGS -L${krb5_prefix}/%{_lib}"; export LDFLAGS else krb5_prefix= CPPFLAGS="-I%{_includedir}/gssapi"; export CPPFLAGS CFLAGS="$CFLAGS -I%{_includedir}/gssapi" fi %endif %configure \ --sysconfdir=%{_sysconfdir}/ssh \ --libexecdir=%{_libexecdir}/openssh \ --datadir=%{_datadir}/openssh \ --with-defalt-path=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/bin:/sbin \ --with-superuser-path=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/bin:/sbin \ --with-privsep-path=%{_var}/empty/sshd \ --enable-vendor-patchlevel="FC-%{version}-%{release}" \ --disable-strip \ --without-zlib-version-check \ --with-ssl-engine \ --with-ipaddr-display \ %if %{ldap} --with-ldap \ %endif %if %{rescue} --without-pam \ %else --with-pam \ %endif %if %{WITH_SELINUX} --with-selinux --with-audit=linux \ %if 0 #seccomp_filter cannot be build right now --with-sandbox=seccomp_filter \ %else --with-sandbox=rlimit \ %endif %endif %if %{kerberos5} --with-kerberos5${krb5_prefix:+=${krb5_prefix}} \ %else --without-kerberos5 \ %endif %if %{libedit} --with-libedit %else --without-libedit %endif %if %{static_libcrypto} perl -pi -e "s|-lcrypto|%{_libdir}/libcrypto.a|g" Makefile %endif make # Define a variable to toggle gnome1/gtk2 building. This is necessary # because RPM doesn't handle nested %if statements. %if %{gtk2} gtk2=yes %else gtk2=no %endif %if ! %{no_gnome_askpass} pushd contrib if [ $gtk2 = yes ] ; then make gnome-ssh-askpass2 mv gnome-ssh-askpass2 gnome-ssh-askpass else make gnome-ssh-askpass1 mv gnome-ssh-askpass1 gnome-ssh-askpass fi %endif %if %{pam_ssh_agent} pushd pam_ssh_agent_auth-%{pam_ssh_agent_ver} LDFLAGS="$SAVE_LDFLAGS" %configure --with-selinux --libexecdir=/%{_libdir}/security --with-mantype=man make %endif %check #to run tests use "--with check" %if %{?_with_check:1}%{!?_with_check:0} make tests %endif %install rm -rf $RPM_BUILD_ROOT mkdir -p -m755 $RPM_BUILD_ROOT%{_sysconfdir}/ssh mkdir -p -m755 $RPM_BUILD_ROOT%{_libexecdir}/openssh mkdir -p -m755 $RPM_BUILD_ROOT%{_var}/empty/sshd make install DESTDIR=$RPM_BUILD_ROOT rm -f $RPM_BUILD_ROOT%{_sysconfdir}/ssh/ldap.conf install -d $RPM_BUILD_ROOT%{_libexecdir}/openssh install -d -m755 $RPM_BUILD_ROOT/%{_unitdir} install -m755 contrib/ssh-copy-id $RPM_BUILD_ROOT%{_bindir}/ install contrib/ssh-copy-id.1 $RPM_BUILD_ROOT%{_mandir}/man1/ %if ! %{no_gnome_askpass} install contrib/gnome-ssh-askpass $RPM_BUILD_ROOT%{_libexecdir}/openssh/gnome-ssh-askpass %endif %if ! %{no_gnome_askpass} ln -s gnome-ssh-askpass $RPM_BUILD_ROOT%{_libexecdir}/openssh/ssh-askpass install -m 755 -d $RPM_BUILD_ROOT%{_sysconfdir}/profile.d/ install -m 755 contrib/redhat/gnome-ssh-askpass.csh $RPM_BUILD_ROOT%{_sysconfdir}/profile.d/ install -m 755 contrib/redhat/gnome-ssh-askpass.sh $RPM_BUILD_ROOT%{_sysconfdir}/profile.d/ %endif %if %{no_gnome_askpass} rm -f $RPM_BUILD_ROOT/etc/profile.d/gnome-ssh-askpass.* %endif perl -pi -e "s|$RPM_BUILD_ROOT||g" $RPM_BUILD_ROOT%{_mandir}/man*/* %if %{pam_ssh_agent} pushd pam_ssh_agent_auth-%{pam_ssh_agent_ver} make install DESTDIR=$RPM_BUILD_ROOT %endif %clean rm -rf $RPM_BUILD_ROOT %pre getent group ssh_keys >/dev/null || groupadd -r ssh_keys || : %pre server getent group sshd >/dev/null || groupadd -g %{sshd_uid} -r sshd || : getent passwd sshd >/dev/null || \ useradd -c "Privilege-separated SSH" -u %{sshd_uid} -g sshd \ -s /sbin/nologin -r -d /var/empty/sshd sshd 2> /dev/null || : %triggerun -n openssh-server -- openssh-server < 5.8p2-12 /bin/systemctl enable sshd.service >/dev/null 2>&1 /sbin/chkconfig --del sshd >/dev/null 2>&1 || : /bin/systemctl try-restart sshd.service >/dev/null 2>&1 || : %triggerun -n openssh-server -- openssh-server < 5.9p1-22 /sbin/chkconfig --add sshd >/dev/null 2>&1 || : %files %defattr(-,root,root) %doc CREDITS ChangeLog INSTALL LICENCE OVERVIEW PROTOCOL* README README.platform README.privsep README.tun README.dns TODO %attr(0755,root,root) %dir %{_sysconfdir}/ssh %attr(0600,root,root) %config(noreplace) %{_sysconfdir}/ssh/moduli %if ! %{rescue} %attr(0755,root,root) %{_bindir}/ssh-keygen %attr(0644,root,root) %{_mandir}/man1/ssh-keygen.1* %attr(0755,root,root) %dir %{_libexecdir}/openssh %attr(2111,root,ssh_keys) %{_libexecdir}/openssh/ssh-keysign %attr(0644,root,root) %{_mandir}/man8/ssh-keysign.8* %endif %files clients %defattr(-,root,root) %attr(0755,root,root) %{_bindir}/ssh %attr(0644,root,root) %{_mandir}/man1/ssh.1* %attr(0755,root,root) %{_bindir}/scp %attr(0644,root,root) %{_mandir}/man1/scp.1* %attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ssh/ssh_config %attr(0755,root,root) %{_bindir}/slogin %attr(0644,root,root) %{_mandir}/man1/slogin.1* %attr(0644,root,root) %{_mandir}/man5/ssh_config.5* %if ! %{rescue} %attr(2111,root,nobody) %{_bindir}/ssh-agent %attr(0755,root,root) %{_bindir}/ssh-add %attr(0755,root,root) %{_bindir}/ssh-keyscan %attr(0755,root,root) %{_bindir}/sftp %attr(0755,root,root) %{_bindir}/ssh-copy-id %attr(0755,root,root) %{_libexecdir}/openssh/ssh-pkcs11-helper %attr(0644,root,root) %{_mandir}/man1/ssh-agent.1* %attr(0644,root,root) %{_mandir}/man1/ssh-add.1* %attr(0644,root,root) %{_mandir}/man1/ssh-keyscan.1* %attr(0644,root,root) %{_mandir}/man1/sftp.1* %attr(0644,root,root) %{_mandir}/man1/ssh-copy-id.1* %attr(0644,root,root) %{_mandir}/man8/ssh-pkcs11-helper.8* %endif %if ! %{rescue} %files server %defattr(-,root,root) %dir %attr(0711,root,root) %{_var}/empty/sshd %attr(0755,root,root) %{_sbindir}/sshd %attr(0755,root,root) %{_libexecdir}/openssh/sftp-server %attr(0644,root,root) %{_mandir}/man5/sshd_config.5* %attr(0644,root,root) %{_mandir}/man5/moduli.5* %attr(0644,root,root) %{_mandir}/man8/sshd.8* %attr(0644,root,root) %{_mandir}/man8/sftp-server.8* %attr(0600,root,root) %config(noreplace) %{_sysconfdir}/ssh/sshd_config %endif %if %{ldap} %files ldap %defattr(-,root,root) %doc HOWTO.ldap-keys openssh-lpk-openldap.schema openssh-lpk-sun.schema ldap.conf %attr(0755,root,root) %{_libexecdir}/openssh/ssh-ldap-helper %attr(0755,root,root) %{_libexecdir}/openssh/ssh-ldap-wrapper %attr(0644,root,root) %{_mandir}/man8/ssh-ldap-helper.8* %attr(0644,root,root) %{_mandir}/man5/ssh-ldap.conf.5* %endif %if ! %{no_gnome_askpass} %files askpass %defattr(-,root,root) %attr(0644,root,root) %{_sysconfdir}/profile.d/gnome-ssh-askpass.* %attr(0755,root,root) %{_libexecdir}/openssh/gnome-ssh-askpass %attr(0755,root,root) %{_libexecdir}/openssh/ssh-askpass %endif %if %{pam_ssh_agent} %files -n pam_ssh_agent_auth %defattr(-,root,root) %doc pam_ssh_agent_auth-%{pam_ssh_agent_ver}/OPENSSH_LICENSE %attr(0755,root,root) %{_libdir}/security/pam_ssh_agent_auth.so %attr(0644,root,root) %{_mandir}/man8/pam_ssh_agent_auth.8* %endif %changelog * Sun Feb 9 2014 Niel Nielsen <nieldk@gmail.com> - Changed default path to include /bin:/sbin * Sat Feb 8 2014 Niel Nielsen <nieldk@gmail.com> - Initial build
This, I believe, together with openssl-1.0.1f will help you