slackware-current/source/n/openssh/rc.sshd
Patrick J Volkerding aae4a0adca Tue Nov 26 22:05:37 UTC 2024
a/mkinitrd-1.4.11-x86_64-51.txz:  Rebuilt.
  remove-orphaned-initrds: fix report about dangling symlinks from --dry-run.
  Thanks to Mechanikx.
  setup.01.mkinitrd: report if symlinks are created.
ap/mariadb-11.4.4-x86_64-4.txz:  Rebuilt.
  /etc/default/mariadb: it appears that the correct option to skip SSL is
  --skip-ssl as in mariadb(1), not the --disable-ssl that was mentioned on the
  changes-improvements-in-mariadb-11-4 page.
  Thanks to rocknrobin and Windu.
l/mozjs128-128.5.0esr-x86_64-1.txz:  Upgraded.
n/netatalk-4.0.7-x86_64-1.txz:  Upgraded.
n/samba-4.21.2-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-128.5.0esr-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/128.5.0/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2024-64
    https://www.cve.org/CVERecord?id=CVE-2024-11691
    https://www.cve.org/CVERecord?id=CVE-2024-11692
    https://www.cve.org/CVERecord?id=CVE-2024-11693
    https://www.cve.org/CVERecord?id=CVE-2024-11694
    https://www.cve.org/CVERecord?id=CVE-2024-11695
    https://www.cve.org/CVERecord?id=CVE-2024-11696
    https://www.cve.org/CVERecord?id=CVE-2024-11697
    https://www.cve.org/CVERecord?id=CVE-2024-11698
    https://www.cve.org/CVERecord?id=CVE-2024-11699
  (* Security fix *)
xap/mozilla-thunderbird-128.5.0esr-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/128.5.0esr/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2024-68/
    https://www.cve.org/CVERecord?id=CVE-2024-11691
    https://www.cve.org/CVERecord?id=CVE-2024-11692
    https://www.cve.org/CVERecord?id=CVE-2024-11693
    https://www.cve.org/CVERecord?id=CVE-2024-11694
    https://www.cve.org/CVERecord?id=CVE-2024-11695
    https://www.cve.org/CVERecord?id=CVE-2024-11696
    https://www.cve.org/CVERecord?id=CVE-2024-11697
    https://www.cve.org/CVERecord?id=CVE-2024-11698
    https://www.cve.org/CVERecord?id=CVE-2024-11699
  (* Security fix *)
2024-11-27 00:34:09 +01:00

64 lines
1.8 KiB
Bash

#!/bin/sh
# Start/stop/restart the secure shell server:
# Source options
if [ -r /etc/default/sshd ]; then
. /etc/default/sshd
fi
sshd_start() {
# Create host keys if needed.
if [ ! -f /etc/ssh/ssh_host_dsa_key ]; then
/usr/bin/ssh-keygen -t dsa -f /etc/ssh/ssh_host_dsa_key -N ''
fi
if [ ! -f /etc/ssh/ssh_host_rsa_key ]; then
/usr/bin/ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key -N ''
fi
if [ ! -f /etc/ssh/ssh_host_ecdsa_key ]; then
/usr/bin/ssh-keygen -t ecdsa -f /etc/ssh/ssh_host_ecdsa_key -N ''
fi
if [ ! -f /etc/ssh/ssh_host_ed25519_key ]; then
/usr/bin/ssh-keygen -t ed25519 -f /etc/ssh/ssh_host_ed25519_key -N ''
fi
# Catch any new host key types not yet created above:
/usr/bin/ssh-keygen -A
# Start the sshd daemon:
/usr/sbin/sshd $SSHD_OPTS
}
sshd_stop() {
killall --ns $$ sshd-session 2> /dev/null
killall --ns $$ sshd
}
sshd_restart() {
if [ -r /var/run/sshd.pid ]; then
echo "WARNING: killing listener process only. To kill every sshd process, you must"
echo " use 'rc.sshd stop'. 'rc.sshd restart' kills only the parent sshd to"
echo " allow an admin logged in through sshd to use 'rc.sshd restart' without"
echo " being cut off. If sshd has been upgraded, new connections will now"
echo " use the new version, which should be a safe enough approach."
kill $(cat /var/run/sshd.pid)
else
echo "WARNING: There does not appear to be a parent instance of sshd running."
echo " If you really want to kill all running instances of sshd (including"
echo " any sessions currently in use), run '/etc/rc.d/rc.sshd stop' instead."
exit 1
fi
sleep 1
sshd_start
}
case "$1" in
'start')
sshd_start
;;
'stop')
sshd_stop
;;
'restart')
sshd_restart
;;
*)
echo "usage $0 start|stop|restart"
esac