X-Git-Url: http://git.grml.org/?a=blobdiff_plain;f=etc%2Finit.d%2Fssh;h=f832b712166190c750435e2003696155705d1953;hb=258084a279ed5d08a8697b855d5453fa0c2be167;hp=6b4127be8a7874ef001d510dcd0b194755bcec84;hpb=619e0de06b76617ae33acdeafc455210dc58d729;p=grml-etc.git diff --git a/etc/init.d/ssh b/etc/init.d/ssh index 6b4127b..f832b71 100755 --- a/etc/init.d/ssh +++ b/etc/init.d/ssh @@ -1,73 +1,199 @@ -#!/bin/sh -# Filename: /etc/init.d/ssh -# Purpose: start and stop the OpenBSD "secure shell(tm)" daemon including keyeneration -# Authors: grml-team (grml.org), (c) Michael Prokop -# Bug-Reports: see http://grml.org/bugs/ -# License: This file is licensed under the GPL v2. -# Latest change: Mon Jul 11 01:26:29 CEST 2005 [mika] -################################################################################ +#! /bin/sh -test -x /usr/sbin/sshd || exit 0 -( /usr/sbin/sshd -\? 2>&1 | grep -q OpenSSH ) 2>/dev/null || exit 0 +### BEGIN INIT INFO +# Provides: sshd +# Required-Start: $remote_fs $syslog +# Required-Stop: $remote_fs $syslog +# Default-Start: 2 3 4 5 +# Default-Stop: +# Short-Description: OpenBSD Secure Shell server +### END INIT INFO -# forget it if we're trying to start, and /etc/ssh/NOSERVER exists -if expr "$1" : '.*start$' >/dev/null && [ -e /etc/ssh/NOSERVER ]; then - echo "Not starting OpenBSD Secure Shell server (/etc/ssh/NOSERVER)" - exit 0 -fi +# Notice: this file has been slightly adjusted by the +# Grml team so the script supports key-generation # Configurable options: KEYGEN=/usr/bin/ssh-keygen RSA1_KEY=/etc/ssh/ssh_host_key RSA_KEY=/etc/ssh/ssh_host_rsa_key DSA_KEY=/etc/ssh/ssh_host_dsa_key +ECDSA_KEY=/etc/ssh/ssh_host_ecdsa_key -case "$1" in - start) - test -f /etc/ssh/sshd_not_to_be_run && exit 0 +set -e + +# /etc/init.d/ssh: start and stop the OpenBSD "secure shell(tm)" daemon + +test -x /usr/sbin/sshd || exit 0 +( /usr/sbin/sshd -\? 2>&1 | grep -q OpenSSH ) 2>/dev/null || exit 0 + +umask 022 + +if test -f /etc/default/ssh; then + . /etc/default/ssh +fi + +. /lib/lsb/init-functions + +if [ -n "$2" ]; then + SSHD_OPTS="$SSHD_OPTS $2" +fi + +# Are we running from init? +run_by_init() { + ([ "$previous" ] && [ "$runlevel" ]) || [ "$runlevel" = S ] +} + +check_for_no_start() { + # forget it if we're trying to start, and /etc/ssh/sshd_not_to_be_run exists + if [ -e /etc/ssh/sshd_not_to_be_run ]; then + if [ "$1" = log_end_msg ]; then + log_end_msg 0 || true + fi + if ! run_by_init; then + log_action_msg "OpenBSD Secure Shell server not in use (/etc/ssh/sshd_not_to_be_run)" || true + fi + exit 0 + fi +} + +check_dev_null() { + if [ ! -c /dev/null ]; then + if [ "$1" = log_end_msg ]; then + log_end_msg 1 || true + fi + if ! run_by_init; then + log_action_msg "/dev/null is not a character device!" || true + fi + exit 1 + fi +} + +check_privsep_dir() { + # Create the PrivSep empty dir if necessary + if [ ! -d /var/run/sshd ]; then + mkdir /var/run/sshd + chmod 0755 /var/run/sshd + fi +} + +check_config() { + if [ ! -e /etc/ssh/sshd_not_to_be_run ]; then + /usr/sbin/sshd $SSHD_OPTS -t || exit 1 + fi +} + + +generate_ssh_keys() { if ! test -f $RSA1_KEY ; then - echo "Generating SSH1 RSA host key..." - $KEYGEN -t rsa1 -f $RSA1_KEY -C '' -N '' || exit 1 + log_action_msg "Generating SSH1 RSA host key..." + $KEYGEN -t rsa1 -f $RSA1_KEY -C '' -N '' || exit 1 fi + if ! test -f $RSA_KEY ; then - echo "Generating SSH RSA host key..." - $KEYGEN -t rsa -f $RSA_KEY -C '' -N '' || exit 1 + log_action_msg "Generating SSH2 RSA host key..." + $KEYGEN -t rsa -f $RSA_KEY -C '' -N '' || exit 1 fi + if ! test -f $DSA_KEY ; then - echo "Generating SSH2 DSA host key..." - $KEYGEN -t dsa -f $DSA_KEY -C '' -N '' || exit 1 + log_action_msg "Generating SSH2 DSA host key..." + $KEYGEN -t dsa -f $DSA_KEY -C '' -N '' || exit 1 fi - echo -n "Starting OpenBSD Secure Shell server: sshd" - start-stop-daemon --start --quiet --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd - echo "." - ;; + + if ! test -f "$ECDSA_KEY" && grep -q "$ECDSA_KEY" /etc/ssh/sshd_config ; then + log_action_msg "Generating SSH2 ECDSA host key..." + $KEYGEN -t ecdsa -f "$ECDSA_KEY" -C '' -N '' || exit 1 + fi +} + +export PATH="${PATH:+$PATH:}/usr/sbin:/sbin" + +case "$1" in + start) + check_privsep_dir + check_for_no_start + check_dev_null + generate_ssh_keys + log_daemon_msg "Starting OpenBSD Secure Shell server" "sshd" || true + if start-stop-daemon --start --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd -- $SSHD_OPTS; then + log_end_msg 0 || true + else + log_end_msg 1 || true + fi + ;; stop) - echo -n "Stopping OpenBSD Secure Shell server: sshd" - start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd - echo "." - ;; + log_daemon_msg "Stopping OpenBSD Secure Shell server" "sshd" || true + if start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/sshd.pid; then + log_end_msg 0 || true + else + log_end_msg 1 || true + fi + ;; reload|force-reload) - test -f /etc/ssh/sshd_not_to_be_run && exit 0 - echo -n "Reloading OpenBSD Secure Shell server's configuration" - start-stop-daemon --stop --signal 1 --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd - echo "." - ;; + check_for_no_start + check_config + generate_ssh_keys + log_daemon_msg "Reloading OpenBSD Secure Shell server's configuration" "sshd" || true + if start-stop-daemon --stop --signal 1 --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd; then + log_end_msg 0 || true + else + log_end_msg 1 || true + fi + ;; restart) - test -f /etc/ssh/sshd_not_to_be_run && exit 0 - echo -n "Restarting OpenBSD Secure Shell server: sshd" - start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd - sleep 10 - start-stop-daemon --start --quiet --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd - echo "." - ;; + check_privsep_dir + check_config + generate_ssh_keys + log_daemon_msg "Restarting OpenBSD Secure Shell server" "sshd" || true + start-stop-daemon --stop --quiet --oknodo --retry 30 --pidfile /var/run/sshd.pid + check_for_no_start log_end_msg + check_dev_null log_end_msg + if start-stop-daemon --start --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd -- $SSHD_OPTS; then + log_end_msg 0 || true + else + log_end_msg 1 || true + fi + ;; + + try-restart) + check_privsep_dir + check_config + generate_ssh_keys + log_daemon_msg "Restarting OpenBSD Secure Shell server" "sshd" || true + RET=0 + start-stop-daemon --stop --quiet --retry 30 --pidfile /var/run/sshd.pid || RET="$?" + case $RET in + 0) + # old daemon stopped + check_for_no_start log_end_msg + check_dev_null log_end_msg + if start-stop-daemon --start --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd -- $SSHD_OPTS; then + log_end_msg 0 || true + else + log_end_msg 1 || true + fi + ;; + 1) + # daemon not running + log_progress_msg "(not running)" || true + log_end_msg 0 || true + ;; + *) + # failed to stop + log_progress_msg "(failed to stop)" || true + log_end_msg 1 || true + ;; + esac + ;; + + status) + status_of_proc -p /var/run/sshd.pid /usr/sbin/sshd sshd && exit 0 || exit $? + ;; *) - echo "Usage: /etc/init.d/ssh {start|stop|reload|force-reload|restart}" - exit 1 + log_action_msg "Usage: /etc/init.d/ssh {start|stop|reload|force-reload|restart|try-restart|status}" || true + exit 1 esac exit 0 - -## END OF FILE #################################################################