Menu

Main Menu
Talk Get Daily Search

Member's Online

    User Name
    Password

    [solved by NIELDK] Openssh=>5.7 for Sailfish ?

    Reply
    Page 4 of 6 | Prev |   2     3   4   5     6   | Next
    nieldk | # 31 | 2014-02-10, 15:26 | Report

    openssh-6.5p1 r5 uploaded to openrepos.
    This, I believe, together with openssl-1.0.1f will help you

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following User Says Thank You to For This Useful Post:
    kollin

     
    kollin | # 32 | 2014-02-10, 16:55 | Report

    Originally Posted by nieldk View Post
    openssh-6.5p1 r5 uploaded to openrepos.
    This, I believe, together with openssl-1.0.1f will help you
    Now i see "openssh-6.5p1-1.armv7hl.rpm" is that the updated version (i don't see -r5)?

    Edit | Forward | Quote | Quick Reply | Thanks

     
    nieldk | # 33 | 2014-02-10, 17:03 | Report

    Originally Posted by kollin View Post
    Now i see "openssh-6.5p1-1.armv7hl.rpm" is that the updated version (i don't see -r5)?
    My bad
    Now -r5 should be there

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following User Says Thank You to For This Useful Post:
    kollin

     
    kollin | # 34 | 2014-02-10, 18:04 | Report

    It works now!!!!!
    Code:
    kollin@felis ~ % ssh nemo@192.168.0.77
    nemo@192.168.0.77's password: 
    Last login: Mon Feb 10 19:59:37 2014 from 192.168.0.1
    NOTICE: Env value ignored QT_GSTREAMER_CAMERABIN_FLAGS=15
    ,---
    | SailfishOS 1.0.3.8 (Naamankajärvi) (armv7hl)
    '---
    Agent pid 2971
    Enter passphrase for /home/nemo/.ssh/id_ecdsa: 
    Identity added: /home/nemo/.ssh/id_ecdsa (/home/nemo/.ssh/id_ecdsa)
    [nemo@localhost ~]$ ssh kollin@seti.bounceme.net 
    
     * keychain 2.7.1 ~ http://www.funtoo.org
     * Found existing ssh-agent: 4298
     * Found existing gpg-agent: 4352
     * Known ssh key: /home/kollin/.ssh/id_ecdsa
    
    kollin@felis ~ %
    Thank you, thank you, thank you! Kisses, hugz whatever you want !

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following User Says Thank You to kollin For This Useful Post:

     
    nieldk | # 35 | 2014-02-10, 19:11 | Report

    Originally Posted by kollin View Post
    It works now!!!!!
    Code:
    kollin@felis ~ % ssh nemo@192.168.0.77
    nemo@192.168.0.77's password: 
    Last login: Mon Feb 10 19:59:37 2014 from 192.168.0.1
    NOTICE: Env value ignored QT_GSTREAMER_CAMERABIN_FLAGS=15
    ,---
    | SailfishOS 1.0.3.8 (Naamankajärvi) (armv7hl)
    '---
    Agent pid 2971
    Enter passphrase for /home/nemo/.ssh/id_ecdsa: 
    Identity added: /home/nemo/.ssh/id_ecdsa (/home/nemo/.ssh/id_ecdsa)
    [nemo@localhost ~]$ ssh kollin@seti.bounceme.net 
    
     * keychain 2.7.1 ~ http://www.funtoo.org
     * Found existing ssh-agent: 4298
     * Found existing gpg-agent: 4352
     * Known ssh key: /home/kollin/.ssh/id_ecdsa
    
    kollin@felis ~ %
    Thank you, thank you, thank you! Kisses, hugz whatever you want !
    hehe, coffee next time Iam near

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following User Says Thank You to For This Useful Post:
    kollin

     
    shmerl | # 36 | 2014-02-10, 21:53 | Report

    Originally Posted by nieldk View Post
    yeah, The thing is, its not a bug. Why there are like 99% of packages that needs update like that ... No idea why packages that are decades outdated.
    Talk about security .....
    No, while they have a set of old packages because of GPLv3 avoidance, openssh shouldn't be affected, since it's licensed under BSD (it originates in OpenBSD naturally). So it seems more like a neglect of Mer to me. Please file a bug if you can, if not, let me know and I'll file it. There is no point to complain if no one will file any bugs about it. Such stuff should be fixed in Mer really.

    Edit | Forward | Quote | Quick Reply | Thanks

    Last edited by shmerl; 2014-02-10 at 21:58.
    The Following 2 Users Say Thank You to shmerl For This Useful Post:
    kollin

     
    nieldk | # 37 | 2014-02-11, 07:27 | Report

    Originally Posted by shmerl View Post
    No, while they have a set of old packages because of GPLv3 avoidance, openssh shouldn't be affected, since it's licensed under BSD (it originates in OpenBSD naturally). So it seems more like a neglect of Mer to me. Please file a bug if you can, if not, let me know and I'll file it. There is no point to complain if no one will file any bugs about it. Such stuff should be fixed in Mer really.
    Filed as a bug
    https://bugs.merproject.org/show_bug.cgi?id=839

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following 2 Users Say Thank You to For This Useful Post:
    kollin, shmerl

     
    shmerl | # 38 | 2014-02-11, 18:19 | Report

    Thanks! Since you added it to openrepos, may be you can update it in Mer as well using the same spec? Or at least propose to update it to the Mer folks.

    Edit | Forward | Quote | Quick Reply | Thanks

     
    nieldk | # 39 | 2014-02-11, 18:41 | Report

    Originally Posted by shmerl View Post
    Thanks! Since you added it to openrepos, may be you can update it in Mer as well using the same spec? Or at least propose to update it to the Mer folks.
    Yes, of course. I have no problem with that.
    Going away for a couple of days, but can start during weekend

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following 2 Users Say Thank You to For This Useful Post:
    kollin, shmerl

     
    nieldk | # 40 | 2014-02-18, 12:59 | Report

    Well well, for some reason my login is rejected at https://bugs.merproject.org and even after password reset it refuses to accept my credentials. ???
    Anyways. I am posting the spec file here, perhaps some of you have better luck with using OBS


    Code:
    %define WITH_SELINUX 0
    
    # OpenSSH privilege separation requires a user & group ID
    %define sshd_uid    74
    %define sshd_gid    74
    
    # Do we want to disable building of gnome-askpass? (1=yes 0=no)
    %define no_gnome_askpass 1
    
    # Do we want to link against a static libcrypto? (1=yes 0=no)
    %define static_libcrypto 0
    
    # Use GTK2 instead of GNOME in gnome-ssh-askpass
    %define gtk2 0
    
    # Build position-independent executables (requires toolchain support)?
    %define pie 1
    
    # Do we want kerberos5 support (1=yes 0=no)
    %define kerberos5 0
    
    # Do we want libedit support
    %define libedit 0
    
    # Do we want LDAP support
    %define ldap 0
    
    # Whether to build pam_ssh_agent_auth
    %define pam_ssh_agent 0
    
    # Reserve options to override askpass settings with:
    # rpm -ba|--rebuild --define 'skip_xxx 1'
    %{?skip_gnome_askpass:%global no_gnome_askpass 1}
    
    # Add option to build without GTK2 for older platforms with only GTK+.
    # Red Hat Linux <= 7.2 and Red Hat Advanced Server 2.1 are examples.
    # rpm -ba|--rebuild --define 'no_gtk2 1'
    %{?no_gtk2:%global gtk2 0}
    
    # Options for static OpenSSL link:
    # rpm -ba|--rebuild --define "static_openssl 1"
    %{?static_openssl:%global static_libcrypto 1}
    
    # Is this a build for the rescue CD (without PAM, with MD5)? (1=yes 0=no)
    %define rescue 0
    %{?build_rescue:%global rescue 1}
    %{?build_rescue:%global rescue_rel rescue}
    
    # Turn off some stuff for resuce builds
    %if %{rescue}
    %define kerberos5 0
    %define libedit 0
    %define pam_ssh_agent 0
    %endif
    
    # Do not forget to bump pam_ssh_agent_auth release if you rewind the main package release to 1
    %define openssh_ver 6.5p1
    %define openssh_rel 5
    %define pam_ssh_agent_ver 0.9.3
    %define pam_ssh_agent_rel 1
    
    Summary: An open source implementation of SSH protocol versions 1 and 2
    Name: openssh
    Version: %{openssh_ver}
    Release: %{openssh_rel}%{?dist}%{?rescue_rel}
    URL: http://www.openssh.com/portable.html
    #URL1: http://pamsshagentauth.sourceforge.net
    Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz
    
    License: BSD
    Group: Applications/Internet
    BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
    Requires: /sbin/nologin
    
    
    %package clients
    Summary: An open source SSH client applications
    Group: Applications/Internet
    Requires: openssh = %{version}-%{release}
    
    %package server
    Summary: An open source SSH server daemon
    Group: System Environment/Daemons
    Requires: openssh = %{version}-%{release}
    Requires(pre): /usr/sbin/useradd
    Requires: pam >= 1.0.1-3
    
    %if %{ldap}
    %package ldap
    Summary: A LDAP support for open source SSH server daemon
    Requires: openssh = %{version}-%{release}
    Group: System Environment/Daemons
    %endif
    
    %package askpass
    Summary: A passphrase dialog for OpenSSH and X
    Group: Applications/Internet
    Requires: openssh = %{version}-%{release}
    Obsoletes: openssh-askpass-gnome
    Provides: openssh-askpass-gnome
    
    %package -n pam_ssh_agent_auth
    Summary: PAM module for authentication with ssh-agent
    Group: System Environment/Base
    Version: %{pam_ssh_agent_ver}
    Release: %{pam_ssh_agent_rel}.%{openssh_rel}%{?dist}%{?rescue_rel}
    License: BSD
    
    %description
    SSH (Secure SHell) is a program for logging into and executing
    commands on a remote machine. SSH is intended to replace rlogin and
    rsh, and to provide secure encrypted communications between two
    untrusted hosts over an insecure network. X11 connections and
    arbitrary TCP/IP ports can also be forwarded over the secure channel.
    
    OpenSSH is OpenBSD's version of the last free version of SSH, bringing
    it up to date in terms of security and features.
    
    This package includes the core files necessary for both the OpenSSH
    client and server. To make this package useful, you should also
    install openssh-clients, openssh-server, or both.
    
    %description clients
    OpenSSH is a free version of SSH (Secure SHell), a program for logging
    into and executing commands on a remote machine. This package includes
    the clients necessary to make encrypted connections to SSH servers.
    
    %description server
    OpenSSH is a free version of SSH (Secure SHell), a program for logging
    into and executing commands on a remote machine. This package contains
    the secure shell daemon (sshd). The sshd daemon allows SSH clients to
    securely connect to your SSH server.
    
    %if %{ldap}
    %description ldap
    OpenSSH LDAP backend is a way how to distribute the authorized tokens
    among the servers in the network.
    %endif
    
    %description askpass
    OpenSSH is a free version of SSH (Secure SHell), a program for logging
    into and executing commands on a remote machine. This package contains
    an X11 passphrase dialog for OpenSSH.
    
    %description -n pam_ssh_agent_auth
    This package contains a PAM module which can be used to authenticate
    users using ssh keys stored in a ssh-agent. Through the use of the
    forwarding of ssh-agent connection it also allows to authenticate with
    remote ssh-agent instance.
    
    The module is most useful for su and sudo service stacks.
    
    %prep
    %setup -q 
    #Do not enable by default
    
    autoreconf
    
    %build
    %if %{rescue}
    CFLAGS="$CFLAGS -Os"
    %endif
    %if %{pie}
    %ifarch s390 s390x sparc sparcv9 sparc64
    CFLAGS="$CFLAGS -fPIC"
    %else
    CFLAGS="$CFLAGS -fpic"
    %endif
    SAVE_LDFLAGS="$LDFLAGS"
    LDFLAGS="$LDFLAGS -pie -z relro -z now"
    
    export CFLAGS
    export LDFLAGS
    
    %endif
    %if %{kerberos5}
    if test -r /etc/profile.d/krb5-devel.sh ; then
            source /etc/profile.d/krb5-devel.sh
    fi
    krb5_prefix=`krb5-config --prefix`
    if test "$krb5_prefix" != "%{_prefix}" ; then
    	CPPFLAGS="$CPPFLAGS -I${krb5_prefix}/include -I${krb5_prefix}/include/gssapi"; export CPPFLAGS
    	CFLAGS="$CFLAGS -I${krb5_prefix}/include -I${krb5_prefix}/include/gssapi"
    	LDFLAGS="$LDFLAGS -L${krb5_prefix}/%{_lib}"; export LDFLAGS
    else
    	krb5_prefix=
    	CPPFLAGS="-I%{_includedir}/gssapi"; export CPPFLAGS
    	CFLAGS="$CFLAGS -I%{_includedir}/gssapi"
    fi
    %endif
    
    %configure \
    	--sysconfdir=%{_sysconfdir}/ssh \
    	--libexecdir=%{_libexecdir}/openssh \
    	--datadir=%{_datadir}/openssh \
    	--with-defalt-path=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/bin:/sbin \
    	--with-superuser-path=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/bin:/sbin \
    	--with-privsep-path=%{_var}/empty/sshd \
    	--enable-vendor-patchlevel="FC-%{version}-%{release}" \
    	--disable-strip \
    	--without-zlib-version-check \
    	--with-ssl-engine \
    	--with-ipaddr-display \
    %if %{ldap}
    	--with-ldap \
    %endif
    %if %{rescue}
    	--without-pam \
    %else
    	--with-pam \
    %endif
    %if %{WITH_SELINUX}
    	--with-selinux --with-audit=linux \
    %if 0
    #seccomp_filter cannot be build right now
    	--with-sandbox=seccomp_filter \
    %else
    	--with-sandbox=rlimit \
    %endif
    %endif
    %if %{kerberos5}
    	--with-kerberos5${krb5_prefix:+=${krb5_prefix}} \
    %else
    	--without-kerberos5 \
    %endif
    %if %{libedit}
    	--with-libedit
    %else
    	--without-libedit
    %endif
    
    %if %{static_libcrypto}
    perl -pi -e "s|-lcrypto|%{_libdir}/libcrypto.a|g" Makefile
    %endif
    
    make
    
    # Define a variable to toggle gnome1/gtk2 building.  This is necessary
    # because RPM doesn't handle nested %if statements.
    %if %{gtk2}
    	gtk2=yes
    %else
    	gtk2=no
    %endif
    
    %if ! %{no_gnome_askpass}
    pushd contrib
    if [ $gtk2 = yes ] ; then
    	make gnome-ssh-askpass2
    	mv gnome-ssh-askpass2 gnome-ssh-askpass
    else
    	make gnome-ssh-askpass1
    	mv gnome-ssh-askpass1 gnome-ssh-askpass
    fi
    %endif
    
    %if %{pam_ssh_agent}
    pushd pam_ssh_agent_auth-%{pam_ssh_agent_ver}
    LDFLAGS="$SAVE_LDFLAGS"
    %configure --with-selinux --libexecdir=/%{_libdir}/security --with-mantype=man
    make
    %endif
    
    %check
    #to run tests use "--with check"
    %if %{?_with_check:1}%{!?_with_check:0}
    make tests
    %endif
    
    %install
    rm -rf $RPM_BUILD_ROOT
    mkdir -p -m755 $RPM_BUILD_ROOT%{_sysconfdir}/ssh
    mkdir -p -m755 $RPM_BUILD_ROOT%{_libexecdir}/openssh
    mkdir -p -m755 $RPM_BUILD_ROOT%{_var}/empty/sshd
    make install DESTDIR=$RPM_BUILD_ROOT
    rm -f $RPM_BUILD_ROOT%{_sysconfdir}/ssh/ldap.conf
    
    install -d $RPM_BUILD_ROOT%{_libexecdir}/openssh
    install -d -m755 $RPM_BUILD_ROOT/%{_unitdir}
    install -m755 contrib/ssh-copy-id $RPM_BUILD_ROOT%{_bindir}/
    install contrib/ssh-copy-id.1 $RPM_BUILD_ROOT%{_mandir}/man1/
    
    %if ! %{no_gnome_askpass}
    install contrib/gnome-ssh-askpass $RPM_BUILD_ROOT%{_libexecdir}/openssh/gnome-ssh-askpass
    %endif
    
    %if ! %{no_gnome_askpass}
    ln -s gnome-ssh-askpass $RPM_BUILD_ROOT%{_libexecdir}/openssh/ssh-askpass
    install -m 755 -d $RPM_BUILD_ROOT%{_sysconfdir}/profile.d/
    install -m 755 contrib/redhat/gnome-ssh-askpass.csh $RPM_BUILD_ROOT%{_sysconfdir}/profile.d/
    install -m 755 contrib/redhat/gnome-ssh-askpass.sh $RPM_BUILD_ROOT%{_sysconfdir}/profile.d/
    %endif
    
    %if %{no_gnome_askpass}
    rm -f $RPM_BUILD_ROOT/etc/profile.d/gnome-ssh-askpass.*
    %endif
    
    perl -pi -e "s|$RPM_BUILD_ROOT||g" $RPM_BUILD_ROOT%{_mandir}/man*/*
    
    %if %{pam_ssh_agent}
    pushd pam_ssh_agent_auth-%{pam_ssh_agent_ver}
    make install DESTDIR=$RPM_BUILD_ROOT
    %endif
    %clean
    rm -rf $RPM_BUILD_ROOT
    
    %pre
    getent group ssh_keys >/dev/null || groupadd -r ssh_keys || :
    
    %pre server
    getent group sshd >/dev/null || groupadd -g %{sshd_uid} -r sshd || :
    getent passwd sshd >/dev/null || \
      useradd -c "Privilege-separated SSH" -u %{sshd_uid} -g sshd \
      -s /sbin/nologin -r -d /var/empty/sshd sshd 2> /dev/null || :
    
    %triggerun -n openssh-server -- openssh-server < 5.8p2-12
    /bin/systemctl enable sshd.service >/dev/null 2>&1
    /sbin/chkconfig --del sshd >/dev/null 2>&1 || :
    /bin/systemctl try-restart sshd.service >/dev/null 2>&1 || :
    
    %triggerun -n openssh-server -- openssh-server < 5.9p1-22
    
    /sbin/chkconfig --add sshd >/dev/null 2>&1 || :
    
    %files
    %defattr(-,root,root)
    %doc CREDITS ChangeLog INSTALL LICENCE OVERVIEW PROTOCOL* README README.platform README.privsep README.tun README.dns TODO
    %attr(0755,root,root) %dir %{_sysconfdir}/ssh
    %attr(0600,root,root) %config(noreplace) %{_sysconfdir}/ssh/moduli
    %if ! %{rescue}
    %attr(0755,root,root) %{_bindir}/ssh-keygen
    %attr(0644,root,root) %{_mandir}/man1/ssh-keygen.1*
    %attr(0755,root,root) %dir %{_libexecdir}/openssh
    %attr(2111,root,ssh_keys) %{_libexecdir}/openssh/ssh-keysign
    %attr(0644,root,root) %{_mandir}/man8/ssh-keysign.8*
    %endif
    
    %files clients
    %defattr(-,root,root)
    %attr(0755,root,root) %{_bindir}/ssh
    %attr(0644,root,root) %{_mandir}/man1/ssh.1*
    %attr(0755,root,root) %{_bindir}/scp
    %attr(0644,root,root) %{_mandir}/man1/scp.1*
    %attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ssh/ssh_config
    %attr(0755,root,root) %{_bindir}/slogin
    %attr(0644,root,root) %{_mandir}/man1/slogin.1*
    %attr(0644,root,root) %{_mandir}/man5/ssh_config.5*
    %if ! %{rescue}
    %attr(2111,root,nobody) %{_bindir}/ssh-agent
    %attr(0755,root,root) %{_bindir}/ssh-add
    %attr(0755,root,root) %{_bindir}/ssh-keyscan
    %attr(0755,root,root) %{_bindir}/sftp
    %attr(0755,root,root) %{_bindir}/ssh-copy-id
    %attr(0755,root,root) %{_libexecdir}/openssh/ssh-pkcs11-helper
    %attr(0644,root,root) %{_mandir}/man1/ssh-agent.1*
    %attr(0644,root,root) %{_mandir}/man1/ssh-add.1*
    %attr(0644,root,root) %{_mandir}/man1/ssh-keyscan.1*
    %attr(0644,root,root) %{_mandir}/man1/sftp.1*
    %attr(0644,root,root) %{_mandir}/man1/ssh-copy-id.1*
    %attr(0644,root,root) %{_mandir}/man8/ssh-pkcs11-helper.8*
    %endif
    
    %if ! %{rescue}
    %files server
    %defattr(-,root,root)
    %dir %attr(0711,root,root) %{_var}/empty/sshd
    %attr(0755,root,root) %{_sbindir}/sshd
    %attr(0755,root,root) %{_libexecdir}/openssh/sftp-server
    %attr(0644,root,root) %{_mandir}/man5/sshd_config.5*
    %attr(0644,root,root) %{_mandir}/man5/moduli.5*
    %attr(0644,root,root) %{_mandir}/man8/sshd.8*
    %attr(0644,root,root) %{_mandir}/man8/sftp-server.8*
    %attr(0600,root,root) %config(noreplace) %{_sysconfdir}/ssh/sshd_config
    %endif
    
    %if %{ldap}
    %files ldap
    %defattr(-,root,root)
    %doc HOWTO.ldap-keys openssh-lpk-openldap.schema openssh-lpk-sun.schema ldap.conf
    %attr(0755,root,root) %{_libexecdir}/openssh/ssh-ldap-helper
    %attr(0755,root,root) %{_libexecdir}/openssh/ssh-ldap-wrapper
    %attr(0644,root,root) %{_mandir}/man8/ssh-ldap-helper.8*
    %attr(0644,root,root) %{_mandir}/man5/ssh-ldap.conf.5*
    %endif
    
    
    %if ! %{no_gnome_askpass}
    %files askpass
    %defattr(-,root,root)
    %attr(0644,root,root) %{_sysconfdir}/profile.d/gnome-ssh-askpass.*
    %attr(0755,root,root) %{_libexecdir}/openssh/gnome-ssh-askpass
    %attr(0755,root,root) %{_libexecdir}/openssh/ssh-askpass
    %endif
    
    %if %{pam_ssh_agent}
    %files -n pam_ssh_agent_auth
    %defattr(-,root,root)
    %doc pam_ssh_agent_auth-%{pam_ssh_agent_ver}/OPENSSH_LICENSE
    %attr(0755,root,root) %{_libdir}/security/pam_ssh_agent_auth.so
    %attr(0644,root,root) %{_mandir}/man8/pam_ssh_agent_auth.8*
    %endif
    
    %changelog
    * Sun Feb 9 2014 Niel Nielsen <nieldk@gmail.com>
    - Changed default path to include /bin:/sbin
    * Sat Feb 8 2014 Niel Nielsen <nieldk@gmail.com>
    - Initial build

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Page 4 of 6 | Prev |   2     3   4   5     6   | Next
vBulletin® Version 3.8.8
Normal Logout