~vcs-imports/ipfire/ipfire-2.x

« back to all changes in this revision

Viewing changes to config/rootfiles/common/i2c-tools

  • Committer: Peter Müller
  • Date: 2022-04-23 14:27:56 UTC
  • mto: This revision was merged to the branch mainline in revision 9750.
  • Revision ID: git-v1:7a981d94cb2c3e48ecaf07c506c8353a2c839d79
SSH: do not send spoofable TCP keep alive messages

By default, both SSH server and client rely on TCP-based keep alive
messages to detect broken sessions, which can be spoofed rather easily
in order to keep a broken session opened (and vice versa).

Since we rely on SSH-based keep alive messages, which are not vulnerable
to this kind of tampering, there is no need to double-check connections
via TCP keep alive as well.

This patch thereof disables using TCP keep alive for both SSH client and
server scenario. For usability reasons, a timeout of 5 minutes (10
seconds * 30 keep alive messages = 300 seconds) will be used for both
client and server configuration, as 60 seconds were found to be too
short for unstable connectivity scenarios.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>

Show diffs side-by-side

added added

removed removed

Lines of Context:
2
2
usr/bin/decode-dimms
3
3
usr/bin/decode-edid
4
4
usr/bin/decode-vaio
5
 
#usr/include/i2c
6
 
#usr/include/i2c/smbus.h
7
 
#usr/lib/libi2c.so
8
 
usr/lib/libi2c.so.0
9
 
usr/lib/libi2c.so.0.1.1
10
5
usr/sbin/i2c-stub-from-dump
11
6
usr/sbin/i2cdetect
12
7
usr/sbin/i2cdump
13
8
usr/sbin/i2cget
14
9
usr/sbin/i2cset
15
 
usr/sbin/i2ctransfer
16
10
#usr/share/man/man1/decode-dimms.1
17
11
#usr/share/man/man1/decode-vaio.1
18
 
#usr/share/man/man3/libi2c.3
19
12
#usr/share/man/man8/i2c-stub-from-dump.8
20
13
#usr/share/man/man8/i2cdetect.8
21
14
#usr/share/man/man8/i2cdump.8
22
15
#usr/share/man/man8/i2cget.8
23
16
#usr/share/man/man8/i2cset.8
24
 
#usr/share/man/man8/i2ctransfer.8
25