|
Revision tags: perseant-exfatfs-base-20250801 netbsd-11-base perseant-exfatfs-base-20240630 perseant-exfatfs-base
|
| #
1.37 |
|
22-Jul-2023 |
kim |
Remove backwards compat.
|
| #
1.36 |
|
10-Jun-2023 |
kim |
Add some backwards compat. Adjust grammar.
|
| #
1.35 |
|
05-Jun-2023 |
riastradh |
/etc/rc.d/sshd: Use default curve for ECDSA keygen, not NIST P-521.
The default is NIST P-256, which:
(a) has plenty of cryptanalytic security, (b) performs better on essentially all platforms (smaller enough that even the advantage of the Mersenne prime structure of P-521 can't compete), and (c) likely gets more scrutiny on implementations than P-521 since it's more widespread.
|
| #
1.34 |
|
05-Jun-2023 |
riastradh |
/etc/rc.d/sshd: Stop generating DSA host keys by default.
If you want them you can generate them yourself, but in this day and age (Monday and 2023, specifically) there's no reason to be using DSA except for compatibility with ancient legacy software.
|
| #
1.33 |
|
26-May-2023 |
riastradh |
/etc/rc.d/sshd: New check cmd and reload precmd.
- check cmd: run `sshd -t' to check sshd_config file
- reload precmd: run check cmd before reloading so we don't nuke sshd if there's an error in the sshd_config file
(It is still possible to effectively nuke sshd by changing the configuration tosomething that won't work on your network, but at least we avoid making sshd just exit on reload when you make a typo in a config option.)
XXX pullup-9 XXX pullup-10
|
|
Revision tags: netbsd-10-base
|
| #
1.32 |
|
15-May-2022 |
martin |
branches: 1.32.2; PR 56835: fix sshd startup script to only whine about bogus keys it created if it actualy did create keys (one should thing that a function called sshd_keygen() only is called to create keys, but the "precmd" magic makes it run every time sshd is started or stopped).
Patch from Tom Lane, with modifications suggested by kre and a minor additional cosemtic change.
|
| #
1.31 |
|
26-Sep-2021 |
martin |
If key generation happens with not enough entropy in the system, add a warning to motd pointing at entropy(7) and give instructions how to re-generate the (weak) keys after fixing up entropy.
Add a "keyregen" command, which forces regeneration of all host keys to simplify the replacement of weak keys.
|
|
Revision tags: cjep_sun2x-base1 cjep_sun2x-base cjep_staticlib_x-base1 cjep_staticlib_x-base phil-wifi-20200421 phil-wifi-20200411 is-mlppp-base phil-wifi-20200406 phil-wifi-20191119
|
| #
1.30 |
|
23-Oct-2019 |
christos |
simplify more (from rudolf)
|
|
Revision tags: netbsd-9-3-RELEASE netbsd-9-2-RELEASE netbsd-9-1-RELEASE netbsd-9-0-RELEASE netbsd-9-0-RC2 netbsd-9-0-RC1 netbsd-9-base phil-wifi-20190609 pgoyette-compat-20190127 pgoyette-compat-20190118 pgoyette-compat-1226 pgoyette-compat-1126 pgoyette-compat-1020 pgoyette-compat-0930 pgoyette-compat-0906 pgoyette-compat-0728 phil-wifi-base pgoyette-compat-0625
|
| #
1.29 |
|
26-May-2018 |
riastradh |
branches: 1.29.2; 1.29.4; Revert previous: Don't generate XMSS host keys for sshd by default.
XMSS is a stateful post-quantum signature scheme.
- Post-quantum security for _online_ authentication is not important until quantum computers become practical; there's no danger of retroactive forgery in sessions that have already completed.
- As a stateful signature schemes, XMSS is qualitatively different from all the other ones sshd supports, requiring additional administrative care: roll back the state (e.g., from a disk backup or VM snapshot), and you've shot yourself in the foot.
If users want XMSS keys, they can make them explicitly, but there's no need for this to be enabled by default.
Discussed with christos offline.
|
| #
1.28 |
|
26-May-2018 |
jmcneill |
Silence ssh-keygen output when host keys are generated. Instead, print only key fingerprints. This replaces dozens of lines out ASCII art output with something more reasonable:
armv7# service sshd start ssh-keygen: 1024 SHA256:ynP4BQ2B0Fknnf9PfF4QoUDlYi0+7rNfYXTOYP2cDic root@armv7 (DSA) ssh-keygen: 521 SHA256:Eoj382aaJNlSxuq/aYj3AXgxfMJAkyVPoCQd2BNjJiA root@armv7 (ECDSA) ssh-keygen: 256 SHA256:+e9/qTbbN/g6xvkadtHsmIQ+Pc0afZRxbXJsk2HKIzY root@armv7 (ED25519) ssh-keygen: 2048 SHA256:urNaF/m6oiCe5hXFZBxGLW2PvLz0ibtRFrqYw6R+qTw root@armv7 (RSA) ssh-keygen: 256 SHA256:Su2Nal2W3vrFz8ukpcSXngl1/bu6xUm1nSvbxTHe9Js root@armv7 (XMSS) Starting sshd.
|
|
Revision tags: pgoyette-compat-0521 pgoyette-compat-0502 pgoyette-compat-0422 pgoyette-compat-0415
|
| #
1.27 |
|
09-Apr-2018 |
christos |
Simplify so we don't have to hard-code the key filenames in two places.
|
|
Revision tags: pgoyette-compat-0407
|
| #
1.26 |
|
07-Apr-2018 |
christos |
support xmss keys
|
|
Revision tags: pgoyette-compat-0330 pgoyette-compat-0322 pgoyette-compat-0315 pgoyette-compat-base
|
| #
1.25 |
|
04-Dec-2017 |
kre |
branches: 1.25.2;
Do away with (not well specified, even if it happens to work) absurd 15 arg test ([ ]) expression, and replace it with several well defined 2 arg tests, combined with (also well defined) sh syntax.
|
| #
1.24 |
|
07-Oct-2017 |
sevan |
With the new version of OpenSSH, SSHv1 is no longer supported server-side. Along with that rsa1 type keys are no longer supported. Don't try to generate such keys on new systems.
ok christos
|
|
Revision tags: matt-nb8-mediatek-base perseant-stdc-iso10646-base netbsd-8-base prg-localcount2-base3 prg-localcount2-base2 prg-localcount2-base1 prg-localcount2-base pgoyette-localcount-20170426 bouyer-socketcan-base1 pgoyette-localcount-20170320 bouyer-socketcan-base pgoyette-localcount-20170107 pgoyette-localcount-20161104 localcount-20160914 pgoyette-localcount-20160806 pgoyette-localcount-20160726 pgoyette-localcount-base
|
| #
1.23 |
|
19-Oct-2014 |
christos |
branches: 1.23.8; Add new keytype, replace duplicated code with loop
|
|
Revision tags: netbsd-7-base yamt-pagecache-base9 tls-earlyentropy-base riastradh-xf86-video-intel-2-7-1-pre-2-21-15 riastradh-drm2-base3 riastradh-drm2-base2 riastradh-drm2-base1 riastradh-drm2-base agc-symver-base tls-maxphys-base
|
| #
1.22 |
|
07-Feb-2013 |
christos |
branches: 1.22.10; PR/47540: Felix Deichmann: DSA keys can only be 1024 bits.
|
|
Revision tags: netbsd-6-0-6-RELEASE netbsd-6-1-5-RELEASE yamt-pagecache-tag8 netbsd-6-1-4-RELEASE netbsd-6-0-5-RELEASE netbsd-6-1-3-RELEASE netbsd-6-0-4-RELEASE netbsd-6-1-2-RELEASE netbsd-6-0-3-RELEASE netbsd-6-1-1-RELEASE netbsd-6-0-2-RELEASE netbsd-6-1-RELEASE netbsd-6-1-RC4 netbsd-6-1-RC3 netbsd-6-1-RC2 netbsd-6-1-RC1 yamt-pagecache-base8 netbsd-6-0-1-RELEASE yamt-pagecache-base7 matt-nb6-plus-nbase yamt-pagecache-base6 netbsd-6-0-RELEASE netbsd-6-0-RC2 matt-nb6-plus-base netbsd-6-0-RC1 yamt-pagecache-base5 yamt-pagecache-base4 netbsd-6-base yamt-pagecache-base3 yamt-pagecache-base2 yamt-pagecache-base
|
| #
1.21 |
|
25-Jul-2011 |
christos |
branches: 1.21.2; 1.21.4; 1.21.8; 1.21.10; 1.21.12; generate ecdsa key
|
|
Revision tags: netbsd-5-2-3-RELEASE netbsd-5-1-5-RELEASE netbsd-5-2-2-RELEASE netbsd-5-1-4-RELEASE netbsd-5-2-1-RELEASE netbsd-5-1-3-RELEASE netbsd-5-2-RELEASE netbsd-5-2-RC1 netbsd-5-1-2-RELEASE netbsd-5-1-1-RELEASE cherry-xenmp-base bouyer-quota2-nbase bouyer-quota2-base matt-mips64-premerge-20101231 matt-nb5-mips64-premerge-20101231 matt-nb5-pq3-base netbsd-5-1-RELEASE netbsd-5-1-RC4 matt-nb5-mips64-k15 netbsd-5-1-RC3 netbsd-5-1-RC2 netbsd-5-1-RC1 netbsd-5-0-2-RELEASE matt-nb5-mips64-premerge-20091211 matt-premerge-20091211 matt-nb5-mips64-u2-k2-k4-k7-k8-k9 matt-nb4-mips64-k7-u2a-k9b matt-nb5-mips64-u1-k1-k5 netbsd-5-0-1-RELEASE jym-xensuspend-nbase netbsd-5-0-RELEASE netbsd-5-0-RC4 netbsd-5-0-RC3 netbsd-5-0-RC2 jym-xensuspend-base netbsd-5-0-RC1 mjf-devfs2-base2 netbsd-5-base matt-mips64-base2 netbsd-4-0-1-RELEASE wrstuden-revivesa-base-3 wrstuden-revivesa-base-2 wrstuden-fixsa-newbase wrstuden-revivesa-base-1 yamt-pf42-base4 yamt-pf42-base3 hpcarm-cleanup-nbase yamt-pf42-baseX yamt-pf42-base2 wrstuden-revivesa-base yamt-pf42-base mjf-devfs2-base keiichi-mipv6-base mjf-devfs-base matt-armv6-nbase matt-armv6-prevmlocking wrstuden-fixsa-base-1 netbsd-4-0-RELEASE cube-autoconf-base netbsd-4-0-RC5 netbsd-4-0-RC4 netbsd-4-0-RC3 netbsd-4-0-RC2 netbsd-4-0-RC1 matt-armv6-base matt-mips64-base hpcarm-cleanup-base netbsd-3-1-1-RELEASE netbsd-3-0-3-RELEASE wrstuden-fixsa-base abandoned-netbsd-4-base netbsd-3-1-RELEASE netbsd-3-0-2-RELEASE netbsd-3-1-RC4 netbsd-3-1-RC3 netbsd-3-1-RC2 netbsd-3-1-RC1 netbsd-4-base netbsd-3-0-1-RELEASE netbsd-3-0-RELEASE netbsd-3-0-RC6 netbsd-3-0-RC5 netbsd-3-0-RC4 netbsd-3-0-RC3 netbsd-3-0-RC2 netbsd-3-0-RC1 netbsd-3-base
|
| #
1.20 |
|
13-Aug-2004 |
mycroft |
Add an _rc_subr_loaded variable, set to ":" by rc.subr. Scripts can use this for a speedup by doing: $_rc_subr_loaded . /etc/rc.subr
|
|
Revision tags: netbsd-2-0-3-RELEASE netbsd-2-1-RELEASE netbsd-2-1-RC6 netbsd-2-1-RC5 netbsd-2-1-RC4 netbsd-2-1-RC3 netbsd-2-1-RC2 netbsd-2-1-RC1 netbsd-2-0-2-RELEASE netbsd-2-0-1-RELEASE netbsd-2-base netbsd-2-0-RELEASE netbsd-2-0-RC5 netbsd-2-0-RC4 netbsd-2-0-RC3 netbsd-2-0-RC2 netbsd-2-0-RC1 netbsd-2-0-base
|
| #
1.19 |
|
18-Feb-2004 |
jonb |
Add ssh_keygen_flags variable to rc.conf to allow users to set the size of auto-generated keys if desired.
|
|
Revision tags: netbsd-1-6-PATCH002-RELEASE netbsd-1-6-PATCH002 netbsd-1-6-PATCH002-RC4 netbsd-1-6-PATCH002-RC3 netbsd-1-6-PATCH002-RC2 netbsd-1-6-PATCH002-RC1 netbsd-1-6-PATCH001 netbsd-1-6-PATCH001-RELEASE netbsd-1-6-PATCH001-RC3 netbsd-1-6-PATCH001-RC2 netbsd-1-6-PATCH001-RC1 fvdl_fs64_base netbsd-1-6-RELEASE netbsd-1-6-RC3 netbsd-1-6-RC2 netbsd-1-6-RC1 netbsd-1-6-base
|
| #
1.18 |
|
29-Apr-2002 |
lukem |
Complete the conversion back to the OpenSSH default configuration files of "/etc/ssh/ssh_config" (from "/etc/ssh/ssh.conf") for ssh(1) and other userland tools, and "/etc/ssh/sshd_config (from "/etc/ssh/sshd.conf") for sshd(8).
etc/postinstall will detect this, and if "fix" is given, rename the files.
|
| #
1.17 |
|
29-Apr-2002 |
lukem |
deprecate $sshd_conf_dir and hardcode /etc/ssh. $sshd_conf_dir wasn't as flexible as liked (it didn't work for ssh(1), host keys or known_hosts).
|
| #
1.16 |
|
19-Apr-2002 |
enami |
Don't assume that $0 is this script.
|
| #
1.15 |
|
19-Apr-2002 |
enami |
Wrap long lines.
|
| #
1.14 |
|
27-Mar-2002 |
lukem |
Set command_args to '-f ${sshd_conf_dir}/${name}.conf'. This occurs before the first load_rc_config() so that it may be overridden by the user, and appears in single quotes so the variables don't get evaluated until the eval in run_rc_command(). Problem noted by Patrick Welche <prlw1@cam.ac.uk> in [bin/15912].
|
| #
1.13 |
|
24-Feb-2002 |
lukem |
Support alternate config dir for sshd conf file and keys (defaults to "/etc"). Based on [misc/12473] from Jim Bernard.
|
| #
1.12 |
|
25-Apr-2001 |
lukem |
be consistent with other scripts when temporarily setting umask to 022
|
| #
1.11 |
|
25-Apr-2001 |
lukem |
set the umask to 022 (remembering the previous setting) for ssh_keygen()
|
| #
1.10 |
|
26-Mar-2001 |
itojun |
check existence of /etc/ssh_host_rsa_key too
|
| #
1.9 |
|
26-Mar-2001 |
itojun |
auto-generate SSH protocol version 2 RSA key. use newer command line syntax for ssh-keygen (-t <type>, instead of -d)
|
| #
1.8 |
|
19-Sep-2000 |
lukem |
- only perform the checkyesno on the variable named in $rcvar (rather than implicitly using $name if $rcvar isn't set), and always perform this check, even when using start_cmd (et al). this check is performed before the pidcmd is run, speeding up scripts that weren't going to be run anyway. this should speed up booting slow systems.
- take advantage of the above and remove start_precmd="checkyesno foo" in scripts that use start_cmd.
- explicitly set rcvar=foo in the rc.d/foo scripts which have an equivalent rc.conf entry
- fix `rcvar' and `restart' when $rcvar isn't set. these above changes fix PR [bin/11027].
- when doing `force*', ignore the return value of *_precmd. this fixes PR [bin/10781].
- rename what sysdb provides from `databases' to `sysdb', to reflect the name of the script.
- improve the comments in rc.subr
|
| #
1.7 |
|
10-Aug-2000 |
lukem |
- sshd has a pid file, so take advantage of it - support `reload' arg (using default of SIGHUP)
|
| #
1.6 |
|
10-Aug-2000 |
lukem |
- provide sshd not ssh - don't start until after LOGIN (after NETWORK is way too early) - KNF (as such :)
|
| #
1.5 |
|
01-Aug-2000 |
jwise |
branches: 1.5.2; Change name of precmd from start_precmd to sshd_precmd. While it worked fine as was, the result was the line `start_precmd=start_precmd' which looked odd. Pointed out by Bernd Ernesti.
While here, add NetBSD RCS Id.
BTW, to clarify, as people have asked: this script does not support pkgsrc/security/sshd -- that package comes with a perfectly fine rc script which in addition to supporting /etc/rc.d can also be used with 1.4.X.
This script will not trivially work with the ssh package as it a.) calls the ssh commands at the pathnames they will be installed at by usr.bin/ssh, and b.) generates a DSA key as well as an RSA key.
|
| #
1.4 |
|
31-Jul-2000 |
jlam |
Correct apparent past-o: RSA -> DSA
|
| #
1.3 |
|
31-Jul-2000 |
jwise |
An sshd startup script for use with usr.bin/sshd. Installation is conditional on ${SSHDIST}, as with usr.bin/ssh itself.
This script includes a `keygen' target for regenerating RSA and DSA host keys, and invokes this if these keys are not present when sshd is started up.
|
| #
1.2 |
|
13-Mar-2000 |
lukem |
* replace daemon, login, servers with DAEMON, LOGIN, SERVERS * remove sshd (it was from my private system)
|
| #
1.1 |
|
10-Mar-2000 |
lukem |
branches: 1.1.1; Initial revision
|