Bug 2015828
| Summary: | openssh patch for sshd_config:ClientAliveCountMax=0 disable the connection killing behaviour | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Steve Outteridge <soutteri> | |
| Component: | openssh | Assignee: | Dmitry Belyavskiy <dbelyavs> | |
| Status: | CLOSED ERRATA | QA Contact: | Marek Havrila <mhavrila> | |
| Severity: | high | Docs Contact: | Jan Fiala <jafiala> | |
| Priority: | urgent | |||
| Version: | 8.6 | CC: | apmukher, ccheney, dbelyavs, gfialova, jafiala, jjelen, mhavrila, rmetrich, sbroz, tsorense | |
| Target Milestone: | rc | Keywords: | Triaged, ZStream | |
| Target Release: | --- | Flags: | pm-rhel:
                mirror+ | |
| Hardware: | All | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | Doc Type: | Enhancement | ||
| Doc Text: | .`sshd_config:ClientAliveCountMax=0` disables connection termination
Setting the SSHD configuration option `ClientAliveCountMax` to `0` now disables connection termination. This aligns the behavior of this option with the upstream. As a consequence, OpenSSH no longer disconnects idle SSH users when it reaches the timeout configured by the `ClientAliveInterval` option. | Story Points: | --- | |
| Clone Of: | ||||
| : | 2030659 (view as bug list) | Environment: | ||
| Last Closed: | 2022-05-10 15:19:04 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2030659 | |||
| 
        
          Description
        
        
          Steve Outteridge
        
        
        
        
        
          2021-10-20 08:16:44 UTC
        
       We currently don't have plans to integrate this patch into RHEL7/RHEL8 series. *** Bug 2008339 has been marked as a duplicate of this bug. *** I'm setting this as High/High because all customers implementing DISA compliance may hit this. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: openssh security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:2013 |