[Bug 2627] Documentation update: semantic of ClientAliveCountMax 0 unclear

2023-11-27 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2627

--- Comment #8 from Christopher Maynard  ---
(In reply to Damien Miller from comment #7)
> If you were relying on an accidental, unreliable and undocumented
> behaviour for security then you always destined to have a bad time. 

The behavior was tested with the options we specified and it worked
exactly as desired.  You chose to make a change that broke that
behavior, seemingly without any regard to its implications, judging by
the lack of any discussions surrounding the change.  Yes, users are
going to have a bad time when developers behave in such ways.

> ClientAliveCountMax=0 *never* worked as a reliable inactivity
> timeout - ServerAliveInterval or a number of other things that
> caused non-session traffic could keep a connection alive
> indefinitely. A security control that appears to work but silently
> fails under common conditions is worse than useless.

You do realize that users control all their own options, don't you? 
And that users generally do test those options to ensure they work as
desired?  I would say a break in functionality that 100% ensures
failure is worse than useless, and borderline malicious.

> We've since added explicit, documented and supported inactivity
> timeout mechanisms (ChannelTimeout and UnusedConnectionTimeout), so
> the previous accidental behaviour of ClientAliveCountMax won't be
> coming back.

And when were those options added?  According to
https://www.openssh.com/releasenotes.html, they were added in OpenSSH
9.2.  So what about those of us using older versions such as OpenSSH
8.2 
 The fact that ClientAliveCountMax=0 behavior changed in OpenSSH 8.2
without regard to backward-compatibility and without those 2 new
options being added in conjunction with that behavioral change in order
to provide a mechanism by which the same behavior could be realized as
before just goes to show how poorly and sloppily the change was made
with barely a thought to its implication.  I sincerely hope that
considerably more thought is given to future changes that break
backward-compatibility than what has been demonstrated here.

-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2627] Documentation update: semantic of ClientAliveCountMax 0 unclear

2023-11-27 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2627

--- Comment #7 from Damien Miller  ---
If you were relying on an accidental, unreliable and undocumented
behaviour for security then you always destined to have a bad time. 

ClientAliveCountMax=0 *never* worked as a reliable inactivity timeout -
ServerAliveInterval or a number of other things that caused non-session
traffic could keep a connection alive indefinitely. A security control
that appears to work but silently fails under common conditions is
worse than useless.

We've since added explicit, documented and supported inactivity timeout
mechanisms (ChannelTimeout and UnusedConnectionTimeout), so the
previous accidental behaviour of ClientAliveCountMax won't be coming
back.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2627] Documentation update: semantic of ClientAliveCountMax 0 unclear

2023-11-27 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2627

Christopher Maynard  changed:

   What|Removed |Added

 CC||christopher.mayn...@igt.com

--- Comment #6 from Christopher Maynard  ---
(In reply to Damien Miller from comment #2)
> I committed an alternate change: ClientAliveCountMax=0 will disable
> connection-killing entirely. This will be released in OpenSSH 8.2

I think this was the absolute wrong thing to do.  This bug report was
opened to clarify the documentation about the exact behavior of setting
ClientAliveCountMax=0, not to change the behavior of it, and in doing
so completely break backward-compatibility in the process.

Our organization has just been bitten by this change where previously
idle SSH sessions would automatically time out and terminate after the
configured value of ClientAliveInterval, as expected.  Now this no
longer happens and idle sessions remain active indefinitely.  I fail to
see any possible positive use case for SSH sessions to remain active
indefinitely, and in fact, the new behavior is now perceived as an
increased security risk.

How many idle SSH sessions are unknowingly remaining active now, I
wonder?  In today's security conscious world, this change in behavior
is simply terrible and quite frankly inexcusable.

For the benefit of all users, please revert this change.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2627] Documentation update: semantic of ClientAliveCountMax 0 unclear

2022-06-22 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2627

James Dingwall  changed:

   What|Removed |Added

 CC||james.dingw...@ncr.com

--- Comment #5 from James Dingwall  ---
As per comment#4 after an upgrade from Ubuntu 18.04 to Ubuntu 20.04 the
ClientAlive* settings no longer functioned as expected.  My personal
opinion is that the existing behaviour (disconnect with no probes)
could have been clarified in the man page but actually changing
behaviour that existing configurations depended on was not the correct
decision.  It is also unclear what advantage the new behaviour of
ClientAliveCountMax=0 brings, if you don't want the client connection
to be killed then don't configure the parameters, the default
ClientAliveInterval=0 already meant that these messages would not be
sent.

Perhaps if you want a client alive message to be sent then
ClientAliveCountMax=-1 could have indicated no disconnect.

cross reference:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1978816

-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2627] Documentation update: semantic of ClientAliveCountMax 0 unclear

2021-03-03 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2627

Damien Miller  changed:

   What|Removed |Added

 Status|RESOLVED|CLOSED

--- Comment #3 from Damien Miller  ---
close bugs that were resolved in OpenSSH 8.5 release cycle

-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2627] Documentation update: semantic of ClientAliveCountMax 0 unclear

2020-01-25 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2627

Damien Miller  changed:

   What|Removed |Added

 Blocks||3079
 Status|NEW |RESOLVED
 Resolution|--- |FIXED

--- Comment #2 from Damien Miller  ---
I committed an alternate change: ClientAliveCountMax=0 will disable
connection-killing entirely. This will be released in OpenSSH 8.2


Referenced Bugs:

https://bugzilla.mindrot.org/show_bug.cgi?id=3079
[Bug 3079] Tracking bug for 8.2 release
-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2627] Documentation update: semantic of ClientAliveCountMax 0 unclear

2019-07-18 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2627

Darren Tucker  changed:

   What|Removed |Added

   Attachment #3301|ok?(dtuc...@dtucker.net)|ok+
  Flags||

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2627] Documentation update: semantic of ClientAliveCountMax 0 unclear

2019-07-18 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2627

Damien Miller  changed:

   What|Removed |Added

 CC||d...@mindrot.org,
   ||dtuc...@dtucker.net
   Attachment #3301||ok?(dtuc...@dtucker.net)
  Flags||

--- Comment #1 from Damien Miller  ---
Created attachment 3301
  --> https://bugzilla.mindrot.org/attachment.cgi?id=3301&action=edit
ban ClientAliveCountMax=0

Maybe we should just ban ClientAliveCountMax=0, or make it equivalent
to ClientAliveInterval=0 in stopping checks

-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs