2011-06-28 10:01:11 +00:00
|
|
|
#!/bin/bash
|
|
|
|
|
|
|
|
# Create the host keys for the OpenSSH server.
|
|
|
|
#
|
|
|
|
# The creation is controlled by the $AUTOCREATE_SERVER_KEYS environment
|
|
|
|
# variable.
|
2014-04-09 11:37:47 +00:00
|
|
|
AUTOCREATE_SERVER_KEYS="RSA ECDSA ED25519"
|
2011-06-28 10:01:11 +00:00
|
|
|
|
|
|
|
# source function library
|
|
|
|
. /etc/rc.d/init.d/functions
|
|
|
|
|
|
|
|
# Some functions to make the below more readable
|
|
|
|
KEYGEN=/usr/bin/ssh-keygen
|
|
|
|
RSA1_KEY=/etc/ssh/ssh_host_key
|
|
|
|
RSA_KEY=/etc/ssh/ssh_host_rsa_key
|
|
|
|
DSA_KEY=/etc/ssh/ssh_host_dsa_key
|
2013-10-23 20:51:32 +00:00
|
|
|
ECDSA_KEY=/etc/ssh/ssh_host_ecdsa_key
|
2014-04-09 11:37:47 +00:00
|
|
|
ED25519_KEY=/etc/ssh/ssh_host_ed25519_key
|
2011-06-28 10:01:11 +00:00
|
|
|
|
2013-03-26 14:41:49 +00:00
|
|
|
# pull in sysconfig settings
|
|
|
|
[ -f /etc/sysconfig/sshd ] && . /etc/sysconfig/sshd
|
|
|
|
|
2012-04-06 19:00:10 +00:00
|
|
|
fips_enabled() {
|
|
|
|
if [ -r /proc/sys/crypto/fips_enabled ]; then
|
|
|
|
cat /proc/sys/crypto/fips_enabled
|
|
|
|
else
|
|
|
|
echo 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2011-06-28 10:01:11 +00:00
|
|
|
do_rsa1_keygen() {
|
2012-04-06 19:00:10 +00:00
|
|
|
if [ ! -s $RSA1_KEY -a `fips_enabled` -eq 0 ]; then
|
2011-06-28 10:01:11 +00:00
|
|
|
echo -n $"Generating SSH1 RSA host key: "
|
|
|
|
rm -f $RSA1_KEY
|
|
|
|
if test ! -f $RSA1_KEY && $KEYGEN -q -t rsa1 -f $RSA1_KEY -C '' -N '' >&/dev/null; then
|
|
|
|
chgrp ssh_keys $RSA1_KEY
|
2012-05-09 10:52:01 +00:00
|
|
|
chmod 640 $RSA1_KEY
|
2011-06-28 10:01:11 +00:00
|
|
|
chmod 644 $RSA1_KEY.pub
|
|
|
|
if [ -x /sbin/restorecon ]; then
|
2014-04-09 11:37:47 +00:00
|
|
|
/sbin/restorecon $RSA1_KEY{,.pub}
|
2011-06-28 10:01:11 +00:00
|
|
|
fi
|
|
|
|
success $"RSA1 key generation"
|
|
|
|
echo
|
|
|
|
else
|
|
|
|
failure $"RSA1 key generation"
|
|
|
|
echo
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
do_rsa_keygen() {
|
|
|
|
if [ ! -s $RSA_KEY ]; then
|
|
|
|
echo -n $"Generating SSH2 RSA host key: "
|
|
|
|
rm -f $RSA_KEY
|
|
|
|
if test ! -f $RSA_KEY && $KEYGEN -q -t rsa -f $RSA_KEY -C '' -N '' >&/dev/null; then
|
|
|
|
chgrp ssh_keys $RSA_KEY
|
2012-05-09 10:52:01 +00:00
|
|
|
chmod 640 $RSA_KEY
|
2011-06-28 10:01:11 +00:00
|
|
|
chmod 644 $RSA_KEY.pub
|
|
|
|
if [ -x /sbin/restorecon ]; then
|
2014-04-09 11:37:47 +00:00
|
|
|
/sbin/restorecon $RSA_KEY{,.pub}
|
2011-06-28 10:01:11 +00:00
|
|
|
fi
|
|
|
|
success $"RSA key generation"
|
|
|
|
echo
|
|
|
|
else
|
|
|
|
failure $"RSA key generation"
|
|
|
|
echo
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
do_dsa_keygen() {
|
2014-09-23 08:59:03 +00:00
|
|
|
if [ ! -s $DSA_KEY -a `fips_enabled` -eq 0 ]; then
|
2011-06-28 10:01:11 +00:00
|
|
|
echo -n $"Generating SSH2 DSA host key: "
|
|
|
|
rm -f $DSA_KEY
|
|
|
|
if test ! -f $DSA_KEY && $KEYGEN -q -t dsa -f $DSA_KEY -C '' -N '' >&/dev/null; then
|
|
|
|
chgrp ssh_keys $DSA_KEY
|
2012-05-09 10:52:01 +00:00
|
|
|
chmod 640 $DSA_KEY
|
2011-06-28 10:01:11 +00:00
|
|
|
chmod 644 $DSA_KEY.pub
|
|
|
|
if [ -x /sbin/restorecon ]; then
|
2014-04-09 11:37:47 +00:00
|
|
|
/sbin/restorecon $DSA_KEY{,.pub}
|
2011-06-28 10:01:11 +00:00
|
|
|
fi
|
|
|
|
success $"DSA key generation"
|
|
|
|
echo
|
|
|
|
else
|
|
|
|
failure $"DSA key generation"
|
|
|
|
echo
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2013-10-23 20:51:32 +00:00
|
|
|
do_ecdsa_keygen() {
|
|
|
|
if [ ! -s $ECDSA_KEY ]; then
|
|
|
|
echo -n $"Generating SSH2 ECDSA host key: "
|
|
|
|
rm -f $ECDSA_KEY
|
|
|
|
if test ! -f $ECDSA_KEY && $KEYGEN -q -t ecdsa -f $ECDSA_KEY -C '' -N '' >&/dev/null; then
|
|
|
|
chgrp ssh_keys $ECDSA_KEY
|
2013-12-09 10:14:59 +00:00
|
|
|
chmod 640 $ECDSA_KEY
|
2013-10-23 20:51:32 +00:00
|
|
|
chmod 644 $ECDSA_KEY.pub
|
|
|
|
if [ -x /sbin/restorecon ]; then
|
2014-04-09 11:37:47 +00:00
|
|
|
/sbin/restorecon $ECDSA_KEY{,.pub}
|
2013-10-23 20:51:32 +00:00
|
|
|
fi
|
|
|
|
success $"ECDSA key generation"
|
|
|
|
echo
|
|
|
|
else
|
|
|
|
failure $"ECDSA key generation"
|
|
|
|
echo
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2014-04-09 11:37:47 +00:00
|
|
|
do_ed25519_keygen() {
|
2014-09-23 08:59:03 +00:00
|
|
|
if [ ! -s $ED25519_KEY -a `fips_enabled` -eq 0 ]; then
|
2014-04-09 11:37:47 +00:00
|
|
|
echo -n $"Generating SSH2 ED25519 host key: "
|
|
|
|
rm -f $ED25519_KEY
|
|
|
|
if test ! -f $ED25519_KEY && $KEYGEN -q -t ed25519 -f $ED25519_KEY -C '' -N '' >&/dev/null; then
|
|
|
|
chgrp ssh_keys $ED25519_KEY
|
|
|
|
chmod 640 $ED25519_KEY
|
|
|
|
chmod 644 $ED25519_KEY.pub
|
|
|
|
if [ -x /sbin/restorecon ]; then
|
|
|
|
/sbin/restorecon $ED25519_KEY{,.pub}
|
|
|
|
fi
|
|
|
|
success $"ED25519 key generation"
|
|
|
|
echo
|
|
|
|
else
|
|
|
|
failure $"ED25519 key generation"
|
|
|
|
echo
|
|
|
|
exit 1
|
2013-12-09 16:30:18 +00:00
|
|
|
fi
|
2011-06-28 10:01:11 +00:00
|
|
|
fi
|
2014-04-09 11:37:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if [ "x${AUTOCREATE_SERVER_KEYS}" == "xNO" ]; then
|
|
|
|
exit 0
|
2011-06-28 10:01:11 +00:00
|
|
|
fi
|
2014-04-09 11:37:47 +00:00
|
|
|
|
|
|
|
# legacy options
|
|
|
|
case $AUTOCREATE_SERVER_KEYS in
|
|
|
|
NODSA) AUTOCREATE_SERVER_KEYS="RSA ECDSA ED25519";;
|
|
|
|
RSAONLY) AUTOCREATE_SERVER_KEYS="RSA";;
|
|
|
|
YES) AUTOCREATE_SERVER_KEYS="DSA RSA ECDSA ED25519";;
|
|
|
|
esac
|
|
|
|
|
|
|
|
for KEY in $AUTOCREATE_SERVER_KEYS; do
|
|
|
|
case $KEY in
|
|
|
|
DSA) do_dsa_keygen;;
|
|
|
|
RSA) do_rsa_keygen;;
|
|
|
|
ECDSA) do_ecdsa_keygen;;
|
|
|
|
ED25519) do_ed25519_keygen;;
|
|
|
|
esac
|
|
|
|
done
|