summery for OpenSSl and OpenSSh / How to Install Secure Shell Ftp/Telnet Step By Step for Tru64

From: Rezk Mekhael <rezk_at_clunet.edu>
Date: Tue, 15 Jul 2003 10:13:54 -0700

How To Install and setup Secure Shell on Tru64 Ver 5.X


 
1) Download/install Openssl "you know ./configure ----> make ----->
make install"
Location http://www.openssl.org/source/ File Name openssl-0.9.7b.tar.gz


2) Downlaod/install Openssh "you know ./configure ----> make ----->
make install"
Location ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/ File Name
openssh-3.6.1p2.tar.gz

3) Create a home directory, group and user name "sshd"

# mkdir /var/empty
# chown root:sys /var/empty
# chmod 755 /var/empty
# groupadd sshd
# useradd -g sshd -c 'sshd privsep' -d /var/empty -s /bin/false sshd

4) create start up script called ssh ----see end of the message

5) Put the script ssh in /sbin/init.d

6) Set the protection and ownership

7) chmod 755 /sbin/init.d/ssh
8) chown root:system /sbin/init.d/ssh

9) Start sshd with /sbin/init.d start

10) To start SSH on boot place a soft link in /sbin/rc3.d

ln -s /sbin/init.d/ssh /sbin/rc3.d/S91ssh

11) test it the telnet #ssh -v -l "userName" localhost

Script
-------------------------------------------------------

#!/sbin/sh
#
# *****************************************************************
# * *
# * Copyright (c) Digital Equipment Corporation, 1991, 1998 *
# * *
# * All Rights Reserved. Unpublished rights reserved under *
# * the copyright laws of the United States. *
# * *
# * The software contained on this media is proprietary to *
# * and embodies the confidential technology of Digital *
# * Equipment Corporation. Possession, use, duplication or *
# * dissemination of the software and media is authorized only *
# * pursuant to a valid written license from Digital Equipment *
# * Corporation. *
# * *
# * RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure *
# * by the U.S. Government is subject to restrictions as set *
# * forth in Subparagraph (c)(1)(ii) of DFARS 252.227-7013, *
# * or in FAR 52.227-19, as applicable. *
# * *
# *****************************************************************
#
# HISTORY
#
#
# (c) Copyright 1990, OPEN SOFTWARE FOUNDATION, INC.
# ALL RIGHTS RESERVED
#
#
# OSF/1 Release 1.0

# Control the ssh daemon
#

PATH=/sbin:/usr/sbin:/usr/bin:/usr/local/bin:/usr/local/sbin
export PATH

Pid=`/sbin/init.d/bin/getpid /usr/local/sbin/sshd -uroot`

case "$1" in
'start')
        set `who -r`
        if [ $9 = "S" ]; then
                if [ -x /usr/local/sbin/sshd ]; then
                        /usr/local/sbin/sshd -f
/usr/local/etc/sshd_config
                        echo "ssh service started"
                fi
        fi
        ;;
'stop')
        if [ "X$Pid" != "X" ]
        then
#
# NOTE: The first kill allows any daemons to exit gracefully.
# The second kill (-9) gets any that refused to die.
#

                /bin/ps -e |grep /usr/local/sbin/sshd |grep -v grep |awk
'{print $1}' |xargs kill
                sleep 5
                /bin/ps -e |grep /usr/local/sbin/sshd |grep -v grep |awk
'{print $1}' |xargs kill -9
        fi
        ;;
*)
        echo "usage: $0 {start|stop}"
        ;;
esac




---
Sincerely,
Rezk Mekhael
Received on Tue Jul 15 2003 - 17:14:40 NZST

This archive was generated by hypermail 2.4.0 : Wed Nov 08 2023 - 11:53:44 NZDT