Files
bpfire/config
Peter Müller 7a981d94cb SSH: do not send spoofable TCP keep alive messages
By default, both SSH server and client rely on TCP-based keep alive
messages to detect broken sessions, which can be spoofed rather easily
in order to keep a broken session opened (and vice versa).

Since we rely on SSH-based keep alive messages, which are not vulnerable
to this kind of tampering, there is no need to double-check connections
via TCP keep alive as well.

This patch thereof disables using TCP keep alive for both SSH client and
server scenario. For usability reasons, a timeout of 5 minutes (10
seconds * 30 keep alive messages = 300 seconds) will be used for both
client and server configuration, as 60 seconds were found to be too
short for unstable connectivity scenarios.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-23 14:27:56 +00:00
..
2022-03-30 15:53:27 +00:00
2021-07-19 18:27:26 +00:00
2021-04-02 16:24:09 +00:00
2021-10-13 12:22:49 +00:00
2020-04-14 15:30:51 +00:00
2022-04-22 12:48:32 +00:00
2019-11-13 19:38:59 +00:00
2022-02-06 10:50:43 +00:00
2019-06-05 05:04:17 +01:00
2020-10-30 15:09:50 +00:00
2021-05-11 16:44:46 +00:00
2021-12-04 23:27:26 +01:00
2022-04-23 14:27:01 +00:00