Bug 1686065
Summary: | SSH connections get closed when time-based rekeyring is used and ClientAliveMaxCount=0 | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Ondrej Moriš <omoris> | ||||
Component: | openssh | Assignee: | Jakub Jelen <jjelen> | ||||
Status: | CLOSED ERRATA | QA Contact: | bsmejkal | ||||
Severity: | medium | Docs Contact: | |||||
Priority: | low | ||||||
Version: | 8.0 | CC: | bsmejkal, dchong, eric.negaard, jjelen, tmraz | ||||
Target Milestone: | rc | Keywords: | Triaged | ||||
Target Release: | 8.1 | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | openssh-8.0p1-1.el8 | Doc Type: | If docs needed, set a value | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2019-11-05 22:41:32 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1682500 | ||||||
Bug Blocks: | |||||||
Attachments: |
|
Description
Ondrej Moriš
2019-03-06 16:12:41 UTC
First of all, this is misconfiguration, that behaves this wrong way. The upstream still did not manage to fix this (attached upstream bug) so I do not think it is super-important issue, even though it worked in RHEL7. The fix is merged upstream and available in the OpenSSH 8.0p1 release Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2019:3702 This bug is still present in openssh-8.0p1-5.el8 on Red Hat Enterprise Linux release 8.3 (Ootpa), so the upstream fix was not complete. It is easily reproducible if the timeout component of RekeyLimit is set to something greater than ClientAliveInterval, for example with the following settings in sshd_config: ClientAliveCountMax 0 ClientAliveInterval 60 RekeyLimit 512M 120 The session will almost always be disconnected as soon as the RekeyLimit is reached, because with the current openssh 8.0p1 code any input that occurs during the final ClientAliveInterval seconds of the RekeyLimit timer does not count towards updating the last_client_time variable which is used for implementing the timeout. Therefore I request that this ticket be reopened. Please, open a new bug if you believe the issue is still present as described in the comment #11. Sorry, I missed the instructions in comment #11. I have created new bug #1952411. |