610d298652
sshd2 unless it detects an entry for ssh in /etc/inetd.conf. As there are three ways to automatically start sshd2 and /etc/rc.conf is the simplest one (at least on FreeBSD 4, with rcNG once /etc/rc.d/sshd is fixed to not be tailored to the base sshd) this version of the port is the last one to do so. Beginning with next version it will only install a sample start-up script. To prevent foot shooting when updating to the next version this port won't remove an existing start-up scripting on deinstall. Please see also the pkg-message that gets displayed on installation. - Update to 3.2.9.1. This is _not_ a security update. For the non-commercial version the only change worth mentioning since 3.2.5 is the addition of the config option "DisableVersionFallback", see sshd2_config(5) for further details. - Use sites from the official list of mirrors for MASTER_SITES. - Adjust COMMENT to justify why this port is security/ssh2, not security/ssh3. - Revise list of installed documentation. No longer install MANIFEST (list of source files) and INSTALL, install RFCs referenced in sshd2_config(5) and HOWTO.anonymous.sftp (patched to better fit FreeBSD). - Remove WITH_STATIC_SFTP knob. Using the internal sftp-server instead of the external (static) one is much simpler to set up and maintain (using the external one requires to install a copy of it in the home directory of the anonymous sftp user which has to be manually updated when installing a newer version of the port). - Remove WITHOUT_TCPWRAP knob, libwarp is part of FreeBSD since 3.2. - Install examples scripts for the ExternalAuthorizationProgram and AuthKbdInt.Plugin config options in EXAMPLESDIR. See sshd2_config(5) for further information. - Replace references to /etc/ssh2/* in config files with PREFIX/etc/ssh2/*. - Add a pkg-message displaying the different methods to automatically start sshd2. - Switch to the start-up script for Solaris which is part of the tarball, it handles the name of the pidfile better. - Fix detection of X11 headers, this enables compilation with support for X11 SECURITY extension. See TrustX11Applications in ssh2_config(5) for further information. - Add a test target to the Makefile of the port, the tests seem a bit outdated and buggy but it's enough to e.g. do a bit of speed comparison when building with different compilers. - Minor changes and clean-up (sort pkg-plist, don't add /usr/local/lib to the library search path when compiling, etc.). Revive some local modifications lost with the update to 3.1.0: - Use login_cap(3)/login_class(3) facilities to set environment variables, prority and shell, get motd, copyright, hushlogin and nologin, respect ignorenologin and requirehome. This changes are roughly based on former patch-ah and patch-ai and patches of security/openssh. - Don't print "No mail.", it's not FreeBSD login style. Submitted by: maintainer
24 lines
1.1 KiB
Plaintext
24 lines
1.1 KiB
Plaintext
===========================================================================
|
|
|
|
Depending on how you would like to start sshd2(8) you have three choices:
|
|
1) Copy the sample start-up script %%PREFIX%%/etc/rc.d/sshd2.sh.sample
|
|
to %%PREFIX%%/etc/rc.d/sshd2.sh.
|
|
|
|
2) Add the following entries to your /etc/inetd.conf:
|
|
ssh stream tcp nowait root %%PREFIX%%/sbin/sshd2 sshd -i
|
|
ssh stream tcp6 nowait root %%PREFIX%%/sbin/sshd2 sshd -i
|
|
|
|
3) On FreeBSD 4 only (on FreeBSD 5 with rcNG this currently doesn't work
|
|
properly) add the following entries to your /etc/rc.conf:
|
|
sshd_enable="YES"
|
|
sshd_program="%%PREFIX%%/sbin/sshd2"
|
|
|
|
NOTE: This port traditionally sets up 1) automatically unless it detects 2).
|
|
If you want to use 2) or 3) you have to manually delete the start-up
|
|
script %%PREFIX%%/etc/rc.d/sshd2.sh. This version of the port is the
|
|
last one that does 1) automatically. To prevent foot shooting when
|
|
updating to the next version this port won't remove an existing
|
|
%%PREFIX%%/etc/rc.d/sshd2.sh on deinstallation.
|
|
|
|
===========================================================================
|