Line 0
Link Here
|
|
|
1 |
diff --git a/Makefile.in b/Makefile.in |
2 |
index 126b2c74..f53bb732 100644 |
3 |
--- a/Makefile.in |
4 |
+++ b/Makefile.in |
5 |
@@ -138,7 +138,7 @@ PATHSUBS = \ |
6 |
-e 's|/etc/ssh/ssh_host_dsa_key|$(sysconfdir)/ssh_host_dsa_key|g' \ |
7 |
-e 's|/etc/ssh/ssh_host_rsa_key|$(sysconfdir)/ssh_host_rsa_key|g' \ |
8 |
-e 's|/etc/ssh/ssh_host_ed25519_key|$(sysconfdir)/ssh_host_ed25519_key|g' \ |
9 |
- -e 's|/var/run/sshd.pid|$(piddir)/sshd.pid|g' \ |
10 |
+ -e 's|/run/sshd.pid|$(piddir)/sshd.pid|g' \ |
11 |
-e 's|/etc/moduli|$(sysconfdir)/moduli|g' \ |
12 |
-e 's|/etc/ssh/moduli|$(sysconfdir)/moduli|g' \ |
13 |
-e 's|/etc/ssh/sshrc|$(sysconfdir)/sshrc|g' \ |
14 |
diff --git a/configure.ac b/configure.ac |
15 |
index 68fd22b2..8b38aa1b 100644 |
16 |
--- a/configure.ac |
17 |
+++ b/configure.ac |
18 |
@@ -3146,11 +3146,11 @@ AC_ARG_WITH([prngd-port], |
19 |
|
20 |
# PRNGD Unix domain socket |
21 |
AC_ARG_WITH([prngd-socket], |
22 |
- [ --with-prngd-socket=FILE read entropy from PRNGD/EGD socket FILE (default=/var/run/egd-pool)], |
23 |
+ [ --with-prngd-socket=FILE read entropy from PRNGD/EGD socket FILE (default=/run/egd-pool)], |
24 |
[ |
25 |
case "$withval" in |
26 |
yes) |
27 |
- withval="/var/run/egd-pool" |
28 |
+ withval="/run/egd-pool" |
29 |
;; |
30 |
no) |
31 |
withval="" |
32 |
@@ -3179,7 +3179,7 @@ AC_ARG_WITH([prngd-socket], |
33 |
if test "x$OPENSSL_SEEDS_ITSELF" != "xyes" ; then |
34 |
AC_MSG_CHECKING([for PRNGD/EGD socket]) |
35 |
# Insert other locations here |
36 |
- for sock in /var/run/egd-pool /dev/egd-pool /etc/entropy; do |
37 |
+ for sock in /run/egd-pool /dev/egd-pool /etc/entropy; do |
38 |
if test -r $sock && $TEST_MINUS_S_SH -c "test -S $sock -o -p $sock" ; then |
39 |
PRNGD_SOCKET="$sock" |
40 |
AC_DEFINE_UNQUOTED([PRNGD_SOCKET], ["$PRNGD_SOCKET"]) |
41 |
@@ -4943,7 +4943,7 @@ AC_ARG_WITH([bsd-auth], |
42 |
) |
43 |
|
44 |
# Where to place sshd.pid |
45 |
-piddir=/var/run |
46 |
+piddir=/run |
47 |
# make sure the directory exists |
48 |
if test ! -d $piddir ; then |
49 |
piddir=`eval echo ${sysconfdir}` |
50 |
@@ -5127,7 +5127,7 @@ AC_COMPILE_IFELSE([AC_LANG_PROGRAM([[ |
51 |
]) |
52 |
if test -z "$conf_utmp_location"; then |
53 |
if test x"$system_utmp_path" = x"no" ; then |
54 |
- for f in /etc/utmp /usr/adm/utmp /var/run/utmp; do |
55 |
+ for f in /etc/utmp /usr/adm/utmp /run/utmp; do |
56 |
if test -f $f ; then |
57 |
conf_utmp_location=$f |
58 |
fi |
59 |
diff --git a/contrib/suse/rc.sshd b/contrib/suse/rc.sshd |
60 |
index 28f28e41..602e9909 100644 |
61 |
--- a/contrib/suse/rc.sshd |
62 |
+++ b/contrib/suse/rc.sshd |
63 |
@@ -99,8 +99,8 @@ case "$1" in |
64 |
|
65 |
# Status has a slightly different for the status command: |
66 |
# 0 - service running |
67 |
- # 1 - service dead, but /var/run/ pid file exists |
68 |
- # 2 - service dead, but /var/lock/ lock file exists |
69 |
+ # 1 - service dead, but /run/ pid file exists |
70 |
+ # 2 - service dead, but /run/lock/ lock file exists |
71 |
# 3 - service not running |
72 |
|
73 |
checkproc -p $SSHD_PIDFILE $SSHD_BIN |
74 |
diff --git a/pathnames.h b/pathnames.h |
75 |
index 6fb4767c..0a3773e4 100644 |
76 |
--- a/pathnames.h |
77 |
+++ b/pathnames.h |
78 |
@@ -19,7 +19,7 @@ |
79 |
#endif |
80 |
|
81 |
#ifndef _PATH_SSH_PIDDIR |
82 |
-#define _PATH_SSH_PIDDIR "/var/run" |
83 |
+#define _PATH_SSH_PIDDIR "/run" |
84 |
#endif |
85 |
|
86 |
/* |
87 |
diff --git a/regress/Makefile b/regress/Makefile |
88 |
index 647b4a04..49311c35 100644 |
89 |
--- a/regress/Makefile |
90 |
+++ b/regress/Makefile |
91 |
@@ -122,7 +122,7 @@ CLEANFILES= *.core actual agent-key.* authorized_keys_${USERNAME} \ |
92 |
t8.out t8.out.pub t9.out t9.out.pub testdata \ |
93 |
user_*key* user_ca* user_key* |
94 |
|
95 |
-SUDO_CLEAN+= /var/run/testdata_${USERNAME} /var/run/keycommand_${USERNAME} |
96 |
+SUDO_CLEAN+= /run/testdata_${USERNAME} /run/keycommand_${USERNAME} |
97 |
|
98 |
# Enable all malloc(3) randomisations and checks |
99 |
TEST_ENV= "MALLOC_OPTIONS=CFGJRSUX" |
100 |
diff --git a/regress/keys-command.sh b/regress/keys-command.sh |
101 |
index 4029e2c7..e277e327 100644 |
102 |
--- a/regress/keys-command.sh |
103 |
+++ b/regress/keys-command.sh |
104 |
@@ -3,9 +3,9 @@ |
105 |
|
106 |
tid="authorized keys from command" |
107 |
|
108 |
-if [ -z "$SUDO" -a ! -w /var/run ]; then |
109 |
+if [ -z "$SUDO" -a ! -w /run ]; then |
110 |
echo "skipped (SUDO not set)" |
111 |
- echo "need SUDO to create file in /var/run, test won't work without" |
112 |
+ echo "need SUDO to create file in /run, test won't work without" |
113 |
exit 0 |
114 |
fi |
115 |
|
116 |
@@ -17,9 +17,9 @@ chmod a+rw $OBJ/keys-command-args |
117 |
expected_key_text=`awk '{ print $2 }' < $OBJ/rsa.pub` |
118 |
expected_key_fp=`$SSHKEYGEN -lf $OBJ/rsa.pub | awk '{ print $2 }'` |
119 |
|
120 |
-# Establish a AuthorizedKeysCommand in /var/run where it will have |
121 |
+# Establish a AuthorizedKeysCommand in /run where it will have |
122 |
# acceptable directory permissions. |
123 |
-KEY_COMMAND="/var/run/keycommand_${LOGNAME}" |
124 |
+KEY_COMMAND="/run/keycommand_${LOGNAME}" |
125 |
cat << _EOF | $SUDO sh -c "rm -f '$KEY_COMMAND' ; cat > '$KEY_COMMAND'" |
126 |
#!/bin/sh |
127 |
echo args: "\$@" >> $OBJ/keys-command-args |
128 |
@@ -76,7 +76,7 @@ if [ -x $KEY_COMMAND ]; then |
129 |
fail "connect failed" |
130 |
fi |
131 |
else |
132 |
- echo "SKIPPED: $KEY_COMMAND not executable (/var/run mounted noexec?)" |
133 |
+ echo "SKIPPED: $KEY_COMMAND not executable (/run mounted noexec?)" |
134 |
fi |
135 |
|
136 |
$SUDO rm -f $KEY_COMMAND |
137 |
diff --git a/regress/principals-command.sh b/regress/principals-command.sh |
138 |
index bcc68e80..da6a9106 100644 |
139 |
--- a/regress/principals-command.sh |
140 |
+++ b/regress/principals-command.sh |
141 |
@@ -6,9 +6,9 @@ tid="authorized principals command" |
142 |
rm -f $OBJ/user_ca_key* $OBJ/cert_user_key* |
143 |
cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak |
144 |
|
145 |
-if [ -z "$SUDO" -a ! -w /var/run ]; then |
146 |
+if [ -z "$SUDO" -a ! -w /run ]; then |
147 |
echo "skipped (SUDO not set)" |
148 |
- echo "need SUDO to create file in /var/run, test won't work without" |
149 |
+ echo "need SUDO to create file in /run, test won't work without" |
150 |
exit 0 |
151 |
fi |
152 |
|
153 |
@@ -28,9 +28,9 @@ CA_BODY=`cat $OBJ/user_ca_key.pub | awk '{ print $2 }'` |
154 |
CERT_FP=`${SSHKEYGEN} -lf $OBJ/cert_user_key-cert.pub | awk '{ print $2 }'` |
155 |
CA_FP=`${SSHKEYGEN} -lf $OBJ/user_ca_key.pub | awk '{ print $2 }'` |
156 |
|
157 |
-# Establish a AuthorizedPrincipalsCommand in /var/run where it will have |
158 |
+# Establish a AuthorizedPrincipalsCommand in /run where it will have |
159 |
# acceptable directory permissions. |
160 |
-PRINCIPALS_COMMAND="/var/run/principals_command_${LOGNAME}" |
161 |
+PRINCIPALS_COMMAND="/run/principals_command_${LOGNAME}" |
162 |
cat << _EOF | $SUDO sh -c "cat > '$PRINCIPALS_COMMAND'" |
163 |
#!/bin/sh |
164 |
test "x\$1" != "x${LOGNAME}" && exit 1 |
165 |
@@ -164,5 +164,5 @@ if [ -x $PRINCIPALS_COMMAND ]; then |
166 |
done |
167 |
else |
168 |
echo "SKIPPED: $PRINCIPALS_COMMAND not executable " \ |
169 |
- "(/var/run mounted noexec?)" |
170 |
+ "(/run mounted noexec?)" |
171 |
fi |
172 |
diff --git a/regress/sftp-chroot.sh b/regress/sftp-chroot.sh |
173 |
index ba5bd1ef..ab806566 100644 |
174 |
--- a/regress/sftp-chroot.sh |
175 |
+++ b/regress/sftp-chroot.sh |
176 |
@@ -3,12 +3,12 @@ |
177 |
|
178 |
tid="sftp in chroot" |
179 |
|
180 |
-CHROOT=/var/run |
181 |
+CHROOT=/run |
182 |
FILENAME=testdata_${USER} |
183 |
PRIVDATA=${CHROOT}/${FILENAME} |
184 |
|
185 |
-if [ -z "$SUDO" -a ! -w /var/run ]; then |
186 |
- echo "need SUDO to create file in /var/run, test won't work without" |
187 |
+if [ -z "$SUDO" -a ! -w /run ]; then |
188 |
+ echo "need SUDO to create file in /run, test won't work without" |
189 |
echo SKIPPED |
190 |
exit 0 |
191 |
fi |
192 |
diff --git a/sshd.8 b/sshd.8 |
193 |
index d33a50a1..fdd84c8f 100644 |
194 |
--- a/sshd.8 |
195 |
+++ b/sshd.8 |
196 |
@@ -958,7 +958,7 @@ during privilege separation in the pre-authentication phase. |
197 |
The directory should not contain any files and must be owned by root |
198 |
and not group or world-writable. |
199 |
.Pp |
200 |
-.It Pa /var/run/sshd.pid |
201 |
+.It Pa /run/sshd.pid |
202 |
Contains the process ID of the |
203 |
.Nm |
204 |
listening for connections (if there are several daemons running |
205 |
diff --git a/sshd_config b/sshd_config |
206 |
index 014b16f7..abe467ad 100644 |
207 |
--- a/sshd_config |
208 |
+++ b/sshd_config |
209 |
@@ -95,7 +95,7 @@ |
210 |
#ClientAliveInterval 0 |
211 |
#ClientAliveCountMax 3 |
212 |
#UseDNS no |
213 |
-#PidFile /var/run/sshd.pid |
214 |
+#PidFile /run/sshd.pid |
215 |
#MaxStartups 10:30:100 |
216 |
#PermitTunnel no |
217 |
#ChrootDirectory none |
218 |
diff --git a/sshd_config.5 b/sshd_config.5 |
219 |
index 47db015f..6bf8ed27 100644 |
220 |
--- a/sshd_config.5 |
221 |
+++ b/sshd_config.5 |
222 |
@@ -1363,7 +1363,7 @@ SSH daemon, or |
223 |
.Cm none |
224 |
to not write one. |
225 |
The default is |
226 |
-.Pa /var/run/sshd.pid . |
227 |
+.Pa /run/sshd.pid . |
228 |
.It Cm Port |
229 |
Specifies the port number that |
230 |
.Xr sshd 8 |