#! /bin/sh ### BEGIN INIT INFO # Provides: sshd # Required-Start: $remote_fs $syslog # Required-Stop: $remote_fs $syslog # Default-Start: 2 3 4 5 # Default-Stop: # Short-Description: OpenBSD Secure Shell server ### END INIT INFO set -e # /etc/init.d/ssh: start and stop the OpenBSD "secure shell(tm)" daemon test -x /usr/sbin/sshd || exit 0 shell { /usr/sbin/sshd -'?' !2 > !1 | grep -q OpenSSH } 2>/dev/null || exit 0 umask 022 if test -f /etc/default/ssh { source /etc/default/ssh } source /lib/lsb/init-functions if test -n $2 { global SSHD_OPTS := ""$SSHD_OPTS $2"" } # Are we running from init? proc run_by_init { shell {test $previous && test $runlevel} || test $runlevel = S } proc check_for_upstart { if init_is_upstart { exit $1 } } proc check_for_no_start { # forget it if we're trying to start, and /etc/ssh/sshd_not_to_be_run exists if test -e /etc/ssh/sshd_not_to_be_run { if test $1 = log_end_msg { log_end_msg 0 || true } if ! run_by_init { log_action_msg "OpenBSD Secure Shell server not in use (/etc/ssh/sshd_not_to_be_run)" || true } exit 0 } } proc check_dev_null { if test ! -c /dev/null { if test $1 = log_end_msg { log_end_msg 1 || true } if ! run_by_init { log_action_msg "/dev/null is not a character device!" || true } exit 1 } } proc check_privsep_dir { # Create the PrivSep empty dir if necessary if test ! -d /var/run/sshd { mkdir /var/run/sshd chmod 0755 /var/run/sshd } } proc check_config { if test ! -e /etc/ssh/sshd_not_to_be_run { /usr/sbin/sshd $SSHD_OPTS -t || exit 1 } } export PATH = ""$(PATH:+$PATH:)/usr/sbin:/sbin"" matchstr $1 { start { check_for_upstart 1 check_privsep_dir check_for_no_start check_dev_null log_daemon_msg "Starting OpenBSD Secure Shell server" "sshd" || true if start-stop-daemon --start --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd -- $SSHD_OPTS { log_end_msg 0 || true } else { log_end_msg 1 || true } } stop { check_for_upstart 0 log_daemon_msg "Stopping OpenBSD Secure Shell server" "sshd" || true if start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/sshd.pid { log_end_msg 0 || true } else { log_end_msg 1 || true } } reload|force-reload { check_for_upstart 1 check_for_no_start check_config log_daemon_msg "Reloading OpenBSD Secure Shell server's configuration" "sshd" || true if start-stop-daemon --stop --signal 1 --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd { log_end_msg 0 || true } else { log_end_msg 1 || true } } restart { check_for_upstart 1 check_privsep_dir check_config log_daemon_msg "Restarting OpenBSD Secure Shell server" "sshd" || true start-stop-daemon --stop --quiet --oknodo --retry 30 --pidfile /var/run/sshd.pid check_for_no_start log_end_msg check_dev_null log_end_msg if start-stop-daemon --start --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd -- $SSHD_OPTS { log_end_msg 0 || true } else { log_end_msg 1 || true } } try-restart { check_for_upstart 1 check_privsep_dir check_config log_daemon_msg "Restarting OpenBSD Secure Shell server" "sshd" || true global RET := '0' start-stop-daemon --stop --quiet --retry 30 --pidfile /var/run/sshd.pid || global RET := "$Status" matchstr $RET { 0 { # old daemon stopped check_for_no_start log_end_msg check_dev_null log_end_msg if start-stop-daemon --start --quiet --oknodo --pidfile /var/run/sshd.pid --exec /usr/sbin/sshd -- $SSHD_OPTS { log_end_msg 0 || true } else { log_end_msg 1 || true } } 1 { # daemon not running log_progress_msg "(not running)" || true log_end_msg 0 || true } * { # failed to stop log_progress_msg "(failed to stop)" || true log_end_msg 1 || true } } } status { check_for_upstart 1 status_of_proc -p /var/run/sshd.pid /usr/sbin/sshd sshd && exit 0 || exit $Status } * { log_action_msg "Usage: /etc/init.d/ssh {start|stop|reload|force-reload|restart|try-restart|status}" || true exit 1 } } exit 0