~vcs-imports/ipfire/ipfire-2.x

« back to all changes in this revision

Viewing changes to lfs/guardian

  • Committer: Peter Müller
  • Date: 2022-04-23 14:27:56 UTC
  • mto: This revision was merged to the branch mainline in revision 9750.
  • Revision ID: git-v1:7a981d94cb2c3e48ecaf07c506c8353a2c839d79
SSH: do not send spoofable TCP keep alive messages

By default, both SSH server and client rely on TCP-based keep alive
messages to detect broken sessions, which can be spoofed rather easily
in order to keep a broken session opened (and vice versa).

Since we rely on SSH-based keep alive messages, which are not vulnerable
to this kind of tampering, there is no need to double-check connections
via TCP keep alive as well.

This patch thereof disables using TCP keep alive for both SSH client and
server scenario. For usability reasons, a timeout of 5 minutes (10
seconds * 30 keep alive messages = 300 seconds) will be used for both
client and server configuration, as 60 seconds were found to be too
short for unstable connectivity scenarios.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
1
###############################################################################
2
2
#                                                                             #
3
3
# IPFire.org - A linux based firewall                                         #
4
 
# Copyright (C) 2007-2022  IPFire Team  <info@ipfire.org>                     #
 
4
# Copyright (C) 2007-2019  IPFire Team  <info@ipfire.org>                     #
5
5
#                                                                             #
6
6
# This program is free software: you can redistribute it and/or modify        #
7
7
# it under the terms of the GNU General Public License as published by        #
35
35
TARGET     = $(DIR_INFO)/$(THISAPP)
36
36
 
37
37
PROG       = guardian
38
 
PAK_VER    = 27
 
38
PAK_VER    = 25
39
39
 
40
40
DEPS       = perl-inotify2 perl-Net-IP
41
41