mirror of
git://slackware.nl/current.git
synced 2024-12-26 09:58:59 +01:00
aae4a0adca
a/mkinitrd-1.4.11-x86_64-51.txz: Rebuilt. remove-orphaned-initrds: fix report about dangling symlinks from --dry-run. Thanks to Mechanikx. setup.01.mkinitrd: report if symlinks are created. ap/mariadb-11.4.4-x86_64-4.txz: Rebuilt. /etc/default/mariadb: it appears that the correct option to skip SSL is --skip-ssl as in mariadb(1), not the --disable-ssl that was mentioned on the changes-improvements-in-mariadb-11-4 page. Thanks to rocknrobin and Windu. l/mozjs128-128.5.0esr-x86_64-1.txz: Upgraded. n/netatalk-4.0.7-x86_64-1.txz: Upgraded. n/samba-4.21.2-x86_64-1.txz: Upgraded. xap/mozilla-firefox-128.5.0esr-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/128.5.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-64 https://www.cve.org/CVERecord?id=CVE-2024-11691 https://www.cve.org/CVERecord?id=CVE-2024-11692 https://www.cve.org/CVERecord?id=CVE-2024-11693 https://www.cve.org/CVERecord?id=CVE-2024-11694 https://www.cve.org/CVERecord?id=CVE-2024-11695 https://www.cve.org/CVERecord?id=CVE-2024-11696 https://www.cve.org/CVERecord?id=CVE-2024-11697 https://www.cve.org/CVERecord?id=CVE-2024-11698 https://www.cve.org/CVERecord?id=CVE-2024-11699 (* Security fix *) xap/mozilla-thunderbird-128.5.0esr-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/128.5.0esr/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2024-68/ https://www.cve.org/CVERecord?id=CVE-2024-11691 https://www.cve.org/CVERecord?id=CVE-2024-11692 https://www.cve.org/CVERecord?id=CVE-2024-11693 https://www.cve.org/CVERecord?id=CVE-2024-11694 https://www.cve.org/CVERecord?id=CVE-2024-11695 https://www.cve.org/CVERecord?id=CVE-2024-11696 https://www.cve.org/CVERecord?id=CVE-2024-11697 https://www.cve.org/CVERecord?id=CVE-2024-11698 https://www.cve.org/CVERecord?id=CVE-2024-11699 (* Security fix *)
64 lines
1.8 KiB
Bash
64 lines
1.8 KiB
Bash
#!/bin/sh
|
|
# Start/stop/restart the secure shell server:
|
|
|
|
# Source options
|
|
if [ -r /etc/default/sshd ]; then
|
|
. /etc/default/sshd
|
|
fi
|
|
|
|
sshd_start() {
|
|
# Create host keys if needed.
|
|
if [ ! -f /etc/ssh/ssh_host_dsa_key ]; then
|
|
/usr/bin/ssh-keygen -t dsa -f /etc/ssh/ssh_host_dsa_key -N ''
|
|
fi
|
|
if [ ! -f /etc/ssh/ssh_host_rsa_key ]; then
|
|
/usr/bin/ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key -N ''
|
|
fi
|
|
if [ ! -f /etc/ssh/ssh_host_ecdsa_key ]; then
|
|
/usr/bin/ssh-keygen -t ecdsa -f /etc/ssh/ssh_host_ecdsa_key -N ''
|
|
fi
|
|
if [ ! -f /etc/ssh/ssh_host_ed25519_key ]; then
|
|
/usr/bin/ssh-keygen -t ed25519 -f /etc/ssh/ssh_host_ed25519_key -N ''
|
|
fi
|
|
# Catch any new host key types not yet created above:
|
|
/usr/bin/ssh-keygen -A
|
|
# Start the sshd daemon:
|
|
/usr/sbin/sshd $SSHD_OPTS
|
|
}
|
|
|
|
sshd_stop() {
|
|
killall --ns $$ sshd-session 2> /dev/null
|
|
killall --ns $$ sshd
|
|
}
|
|
|
|
sshd_restart() {
|
|
if [ -r /var/run/sshd.pid ]; then
|
|
echo "WARNING: killing listener process only. To kill every sshd process, you must"
|
|
echo " use 'rc.sshd stop'. 'rc.sshd restart' kills only the parent sshd to"
|
|
echo " allow an admin logged in through sshd to use 'rc.sshd restart' without"
|
|
echo " being cut off. If sshd has been upgraded, new connections will now"
|
|
echo " use the new version, which should be a safe enough approach."
|
|
kill $(cat /var/run/sshd.pid)
|
|
else
|
|
echo "WARNING: There does not appear to be a parent instance of sshd running."
|
|
echo " If you really want to kill all running instances of sshd (including"
|
|
echo " any sessions currently in use), run '/etc/rc.d/rc.sshd stop' instead."
|
|
exit 1
|
|
fi
|
|
sleep 1
|
|
sshd_start
|
|
}
|
|
|
|
case "$1" in
|
|
'start')
|
|
sshd_start
|
|
;;
|
|
'stop')
|
|
sshd_stop
|
|
;;
|
|
'restart')
|
|
sshd_restart
|
|
;;
|
|
*)
|
|
echo "usage $0 start|stop|restart"
|
|
esac
|