kentpeacock / rpms / openssh

Forked from rpms/openssh 2 years ago
Clone
f09e2e
diff -up openssh-6.3p1/ssh_config.redhat openssh-6.3p1/ssh_config
f09e2e
--- openssh-6.3p1/ssh_config.redhat	2013-10-11 14:51:18.345876648 +0200
f09e2e
+++ openssh-6.3p1/ssh_config	2013-10-11 15:13:05.429829266 +0200
f09e2e
@@ -46,3 +46,14 @@
f09e2e
 #   VisualHostKey no
f09e2e
 #   ProxyCommand ssh -q -W %h:%p gateway.example.com
f09e2e
 #   RekeyLimit 1G 1h
f09e2e
+Host *
f09e2e
+	GSSAPIAuthentication yes
f09e2e
+# If this option is set to yes then remote X11 clients will have full access
f09e2e
+# to the original X11 display. As virtually no X11 client supports the untrusted
f09e2e
+# mode correctly we set this to yes.
f09e2e
+	ForwardX11Trusted yes
f09e2e
+# Send locale-related environment variables
f09e2e
+	SendEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
f09e2e
+	SendEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
f09e2e
+	SendEnv LC_IDENTIFICATION LC_ALL LANGUAGE
f09e2e
+	SendEnv XMODIFIERS
f09e2e
diff -up openssh-6.3p1/sshd_config.0.redhat openssh-6.3p1/sshd_config.0
f09e2e
--- openssh-6.3p1/sshd_config.0.redhat	2013-09-13 08:20:43.000000000 +0200
f09e2e
+++ openssh-6.3p1/sshd_config.0	2013-10-11 14:51:18.345876648 +0200
f09e2e
@@ -653,9 +653,9 @@ DESCRIPTION
f09e2e
 
f09e2e
      SyslogFacility
f09e2e
              Gives the facility code that is used when logging messages from
f09e2e
-             sshd(8).  The possible values are: DAEMON, USER, AUTH, LOCAL0,
f09e2e
-             LOCAL1, LOCAL2, LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.  The
f09e2e
-             default is AUTH.
f09e2e
+             sshd(8).  The possible values are: DAEMON, USER, AUTH, AUTHPRIV,
f09e2e
+             LOCAL0, LOCAL1, LOCAL2, LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.
f09e2e
+             The default is AUTH.
f09e2e
 
f09e2e
      TCPKeepAlive
f09e2e
              Specifies whether the system should send TCP keepalive messages
f09e2e
diff -up openssh-6.3p1/sshd_config.5.redhat openssh-6.3p1/sshd_config.5
f09e2e
--- openssh-6.3p1/sshd_config.5.redhat	2013-07-20 05:21:53.000000000 +0200
f09e2e
+++ openssh-6.3p1/sshd_config.5	2013-10-11 14:51:18.346876643 +0200
f09e2e
@@ -1095,7 +1095,7 @@ Note that this option applies to protoco
f09e2e
 .It Cm SyslogFacility
f09e2e
 Gives the facility code that is used when logging messages from
f09e2e
 .Xr sshd 8 .
f09e2e
-The possible values are: DAEMON, USER, AUTH, LOCAL0, LOCAL1, LOCAL2,
f09e2e
+The possible values are: DAEMON, USER, AUTH, AUTHPRIV, LOCAL0, LOCAL1, LOCAL2,
f09e2e
 LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.
f09e2e
 The default is AUTH.
f09e2e
 .It Cm TCPKeepAlive
f09e2e
diff -up openssh-6.3p1/sshd_config.redhat openssh-6.3p1/sshd_config
f09e2e
--- openssh-6.3p1/sshd_config.redhat	2013-10-11 14:51:18.343876657 +0200
f09e2e
+++ openssh-6.3p1/sshd_config	2013-10-11 14:51:18.346876643 +0200
f09e2e
@@ -10,6 +10,10 @@
f09e2e
 # possible, but leave them commented.  Uncommented options override the
f09e2e
 # default value.
f09e2e
 
f09e2e
+# If you want to change the port on a SELinux system, you have to tell
f09e2e
+# SELinux about this change.
f09e2e
+# semanage port -a -t ssh_port_t -p tcp #PORTNUMBER
f09e2e
+#
f09e2e
 #Port 22
f09e2e
 #AddressFamily any
f09e2e
 #ListenAddress 0.0.0.0
770374
@@ -21,9 +25,9 @@
770374
 # HostKey for protocol version 1
770374
 #HostKey /etc/ssh/ssh_host_key
770374
 # HostKeys for protocol version 2
770374
-#HostKey /etc/ssh/ssh_host_rsa_key
770374
+HostKey /etc/ssh/ssh_host_rsa_key
770374
 #HostKey /etc/ssh/ssh_host_dsa_key
770374
-#HostKey /etc/ssh/ssh_host_ecdsa_key
770374
+HostKey /etc/ssh/ssh_host_ecdsa_key
770374
 
770374
 # Lifetime and size of ephemeral version 1 server key
770374
 #KeyRegenerationInterval 1h
f09e2e
@@ -35,6 +39,7 @@
f09e2e
 # Logging
f09e2e
 # obsoletes QuietMode and FascistLogging
f09e2e
 #SyslogFacility AUTH
f09e2e
+SyslogFacility AUTHPRIV
f09e2e
 #LogLevel INFO
f09e2e
 
f09e2e
 # Authentication:
f09e2e
@@ -70,9 +75,11 @@ AuthorizedKeysFile	.ssh/authorized_keys
f09e2e
 # To disable tunneled clear text passwords, change to no here!
f09e2e
 #PasswordAuthentication yes
f09e2e
 #PermitEmptyPasswords no
f09e2e
+PasswordAuthentication yes
f09e2e
 
f09e2e
 # Change to no to disable s/key passwords
f09e2e
 #ChallengeResponseAuthentication yes
f09e2e
+ChallengeResponseAuthentication no
f09e2e
 
f09e2e
 # Kerberos options
f09e2e
 #KerberosAuthentication no
f09e2e
@@ -82,7 +89,9 @@ AuthorizedKeysFile	.ssh/authorized_keys
f09e2e
 
f09e2e
 # GSSAPI options
f09e2e
 #GSSAPIAuthentication no
f09e2e
+GSSAPIAuthentication yes
f09e2e
 #GSSAPICleanupCredentials yes
f09e2e
+GSSAPICleanupCredentials yes
f09e2e
 
f09e2e
 # Set this to 'yes' to enable PAM authentication, account processing, 
f09e2e
 # and session processing. If this is enabled, PAM authentication will 
f09e2e
@@ -94,11 +103,13 @@ AuthorizedKeysFile	.ssh/authorized_keys
f09e2e
 # PAM authentication, then enable this but set PasswordAuthentication
f09e2e
 # and ChallengeResponseAuthentication to 'no'.
f09e2e
 #UsePAM no
f09e2e
+UsePAM yes
f09e2e
 
f09e2e
 #AllowAgentForwarding yes
f09e2e
 #AllowTcpForwarding yes
f09e2e
 #GatewayPorts no
f09e2e
 #X11Forwarding no
f09e2e
+X11Forwarding yes
f09e2e
 #X11DisplayOffset 10
f09e2e
 #X11UseLocalhost yes
f09e2e
 #PrintMotd yes
f09e2e
@@ -120,6 +131,12 @@ UsePrivilegeSeparation sandbox		# Defaul
f09e2e
 # no default banner path
f09e2e
 #Banner none
f09e2e
 
f09e2e
+# Accept locale-related environment variables
f09e2e
+AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
f09e2e
+AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
f09e2e
+AcceptEnv LC_IDENTIFICATION LC_ALL LANGUAGE
f09e2e
+AcceptEnv XMODIFIERS
f09e2e
+
f09e2e
 # override default of no subsystems
f09e2e
 Subsystem	sftp	/usr/libexec/sftp-server
f09e2e