* [PATCH] SSH: do not send spoofable TCP keep alive messages @ 2021-02-01 18:06 Peter Müller 2021-02-08 13:48 ` Michael Tremer 0 siblings, 1 reply; 7+ messages in thread From: Peter Müller @ 2021-02-01 18:06 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 3305 bytes --] By default, both SSH server and client rely on TCP-based keep alive messages to detect broken sessions, which can be spoofed rather easily in order to keep a broken session opened (and vice versa). Since we rely on SSH-based keep alive messages, which are not vulnerable to this kind of tampering, there is no need to double-check connections via TCP keep alive as well. This patch thereof disables using TCP keep alive for both SSH client and server scenario. Further, {Client,Server}AliveCountMax default to 3, which is sufficient (3 * 10 sec. = broken SSH connections die after 30 seconds), so we can omit that option. 60 seconds won't have any advantage here. Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org> --- config/ssh/ssh_config | 11 +++++++---- config/ssh/sshd_config | 7 ++++--- 2 files changed, 11 insertions(+), 7 deletions(-) diff --git a/config/ssh/ssh_config b/config/ssh/ssh_config index 2e2ee60c3..ab0967086 100644 --- a/config/ssh/ssh_config +++ b/config/ssh/ssh_config @@ -5,7 +5,7 @@ # Set some basic hardening options for all connections Host * - # Disable Roaming as it is known to be vulnerable + # Disable undocumented roaming feature as it is known to be vulnerable UseRoaming no # Only use secure crypto algorithms @@ -13,15 +13,18 @@ Host * Ciphers chacha20-poly1305(a)openssh.com,aes256-gcm(a)openssh.com,aes128-gcm(a)openssh.com,aes256-ctr,aes192-ctr,aes128-ctr MACs hmac-sha2-512-etm(a)openssh.com,hmac-sha2-256-etm(a)openssh.com,umac-128-etm(a)openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128(a)openssh.com - # Always visualise server host keys (but helps to identify key based MITM attacks) + # Always visualise server host keys (helps to identify key based MITM attacks) VisualHostKey yes # Use SSHFP (might work on some up-to-date networks) to look up host keys VerifyHostKeyDNS yes - # send keep-alive messages to connected server to avoid broken connections + # Send SSH-based keep alive messages to connected server to avoid broken connections ServerAliveInterval 10 - ServerAliveCountMax 6 + + # Disable TCP keep alive messages since they can be spoofed and we have SSH-based + # keep alive messages enabled; there is no need to do things twice here + TCPKeepAlive no # Ensure only allowed authentication methods are used PreferredAuthentications publickey,keyboard-interactive,password diff --git a/config/ssh/sshd_config b/config/ssh/sshd_config index bea5cee53..a9eb5ff14 100644 --- a/config/ssh/sshd_config +++ b/config/ssh/sshd_config @@ -47,11 +47,12 @@ AllowTcpForwarding no AllowAgentForwarding no PermitOpen none -# Detect broken sessions by sending keep-alive messages to clients via SSH connection +# Send SSH-based keep alive messages every 10 seconds ClientAliveInterval 10 -# Close unresponsive SSH sessions which fail to answer keep-alive -ClientAliveCountMax 6 +# Since TCP keep alive messages can be spoofed and we have the SSH-based already, +# there is no need for this to be enabled as well +TCPKeepAlive no # Add support for SFTP Subsystem sftp /usr/lib/openssh/sftp-server -- 2.26.2 ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] SSH: do not send spoofable TCP keep alive messages 2021-02-01 18:06 [PATCH] SSH: do not send spoofable TCP keep alive messages Peter Müller @ 2021-02-08 13:48 ` Michael Tremer 2021-04-02 19:27 ` Peter Müller 0 siblings, 1 reply; 7+ messages in thread From: Michael Tremer @ 2021-02-08 13:48 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 3877 bytes --] Hello, > On 1 Feb 2021, at 18:06, Peter Müller <peter.mueller(a)ipfire.org> wrote: > > By default, both SSH server and client rely on TCP-based keep alive > messages to detect broken sessions, which can be spoofed rather easily > in order to keep a broken session opened (and vice versa). > > Since we rely on SSH-based keep alive messages, which are not vulnerable > to this kind of tampering, there is no need to double-check connections > via TCP keep alive as well. > > This patch thereof disables using TCP keep alive for both SSH client and > server scenario. Further, {Client,Server}AliveCountMax default to 3, > which is sufficient (3 * 10 sec. = broken SSH connections die after 30 > seconds), so we can omit that option. 60 seconds won't have any > advantage here. Is there any considerable downside of increasing this to something more useless? I constantly run into broken SSH sessions because of smaller network hiccups (WiFi, VPNs, my crappy ISP, etc.). It would be useful to hold the connection for a little bit longer so that I can spend more time on fixing stuff instead of logging back in. -Michael > > Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org> > --- > config/ssh/ssh_config | 11 +++++++---- > config/ssh/sshd_config | 7 ++++--- > 2 files changed, 11 insertions(+), 7 deletions(-) > > diff --git a/config/ssh/ssh_config b/config/ssh/ssh_config > index 2e2ee60c3..ab0967086 100644 > --- a/config/ssh/ssh_config > +++ b/config/ssh/ssh_config > @@ -5,7 +5,7 @@ > > # Set some basic hardening options for all connections > Host * > - # Disable Roaming as it is known to be vulnerable > + # Disable undocumented roaming feature as it is known to be vulnerable > UseRoaming no > > # Only use secure crypto algorithms > @@ -13,15 +13,18 @@ Host * > Ciphers chacha20-poly1305(a)openssh.com,aes256-gcm(a)openssh.com,aes128-gcm(a)openssh.com,aes256-ctr,aes192-ctr,aes128-ctr > MACs hmac-sha2-512-etm(a)openssh.com,hmac-sha2-256-etm(a)openssh.com,umac-128-etm(a)openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128(a)openssh.com > > - # Always visualise server host keys (but helps to identify key based MITM attacks) > + # Always visualise server host keys (helps to identify key based MITM attacks) > VisualHostKey yes > > # Use SSHFP (might work on some up-to-date networks) to look up host keys > VerifyHostKeyDNS yes > > - # send keep-alive messages to connected server to avoid broken connections > + # Send SSH-based keep alive messages to connected server to avoid broken connections > ServerAliveInterval 10 > - ServerAliveCountMax 6 > + > + # Disable TCP keep alive messages since they can be spoofed and we have SSH-based > + # keep alive messages enabled; there is no need to do things twice here > + TCPKeepAlive no > > # Ensure only allowed authentication methods are used > PreferredAuthentications publickey,keyboard-interactive,password > diff --git a/config/ssh/sshd_config b/config/ssh/sshd_config > index bea5cee53..a9eb5ff14 100644 > --- a/config/ssh/sshd_config > +++ b/config/ssh/sshd_config > @@ -47,11 +47,12 @@ AllowTcpForwarding no > AllowAgentForwarding no > PermitOpen none > > -# Detect broken sessions by sending keep-alive messages to clients via SSH connection > +# Send SSH-based keep alive messages every 10 seconds > ClientAliveInterval 10 > > -# Close unresponsive SSH sessions which fail to answer keep-alive > -ClientAliveCountMax 6 > +# Since TCP keep alive messages can be spoofed and we have the SSH-based already, > +# there is no need for this to be enabled as well > +TCPKeepAlive no > > # Add support for SFTP > Subsystem sftp /usr/lib/openssh/sftp-server > -- > 2.26.2 ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] SSH: do not send spoofable TCP keep alive messages 2021-02-08 13:48 ` Michael Tremer @ 2021-04-02 19:27 ` Peter Müller 2021-04-06 10:16 ` Michael Tremer 0 siblings, 1 reply; 7+ messages in thread From: Peter Müller @ 2021-04-02 19:27 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 4368 bytes --] Hello Michael, thank you for your reply. Context-based, I guess you meant "something more useful", didn't you? :-) Well, if you like, we can leave 60 seconds here, but I would not go for a much longer timeout. If a network issue takes longer than a minute, requiring a re-login looks reasonable to me (it does for 30 seconds also, but hey ;-) ). Thanks, and best regards, Peter Müller > Hello, > >> On 1 Feb 2021, at 18:06, Peter Müller <peter.mueller(a)ipfire.org> wrote: >> >> By default, both SSH server and client rely on TCP-based keep alive >> messages to detect broken sessions, which can be spoofed rather easily >> in order to keep a broken session opened (and vice versa). >> >> Since we rely on SSH-based keep alive messages, which are not vulnerable >> to this kind of tampering, there is no need to double-check connections >> via TCP keep alive as well. >> >> This patch thereof disables using TCP keep alive for both SSH client and >> server scenario. Further, {Client,Server}AliveCountMax default to 3, >> which is sufficient (3 * 10 sec. = broken SSH connections die after 30 >> seconds), so we can omit that option. 60 seconds won't have any >> advantage here. > > Is there any considerable downside of increasing this to something more useless? > > I constantly run into broken SSH sessions because of smaller network hiccups (WiFi, VPNs, my crappy ISP, etc.). It would be useful to hold the connection for a little bit longer so that I can spend more time on fixing stuff instead of logging back in. > > -Michael > >> >> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org> >> --- >> config/ssh/ssh_config | 11 +++++++---- >> config/ssh/sshd_config | 7 ++++--- >> 2 files changed, 11 insertions(+), 7 deletions(-) >> >> diff --git a/config/ssh/ssh_config b/config/ssh/ssh_config >> index 2e2ee60c3..ab0967086 100644 >> --- a/config/ssh/ssh_config >> +++ b/config/ssh/ssh_config >> @@ -5,7 +5,7 @@ >> >> # Set some basic hardening options for all connections >> Host * >> - # Disable Roaming as it is known to be vulnerable >> + # Disable undocumented roaming feature as it is known to be vulnerable >> UseRoaming no >> >> # Only use secure crypto algorithms >> @@ -13,15 +13,18 @@ Host * >> Ciphers chacha20-poly1305(a)openssh.com,aes256-gcm(a)openssh.com,aes128-gcm(a)openssh.com,aes256-ctr,aes192-ctr,aes128-ctr >> MACs hmac-sha2-512-etm(a)openssh.com,hmac-sha2-256-etm(a)openssh.com,umac-128-etm(a)openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128(a)openssh.com >> >> - # Always visualise server host keys (but helps to identify key based MITM attacks) >> + # Always visualise server host keys (helps to identify key based MITM attacks) >> VisualHostKey yes >> >> # Use SSHFP (might work on some up-to-date networks) to look up host keys >> VerifyHostKeyDNS yes >> >> - # send keep-alive messages to connected server to avoid broken connections >> + # Send SSH-based keep alive messages to connected server to avoid broken connections >> ServerAliveInterval 10 >> - ServerAliveCountMax 6 >> + >> + # Disable TCP keep alive messages since they can be spoofed and we have SSH-based >> + # keep alive messages enabled; there is no need to do things twice here >> + TCPKeepAlive no >> >> # Ensure only allowed authentication methods are used >> PreferredAuthentications publickey,keyboard-interactive,password >> diff --git a/config/ssh/sshd_config b/config/ssh/sshd_config >> index bea5cee53..a9eb5ff14 100644 >> --- a/config/ssh/sshd_config >> +++ b/config/ssh/sshd_config >> @@ -47,11 +47,12 @@ AllowTcpForwarding no >> AllowAgentForwarding no >> PermitOpen none >> >> -# Detect broken sessions by sending keep-alive messages to clients via SSH connection >> +# Send SSH-based keep alive messages every 10 seconds >> ClientAliveInterval 10 >> >> -# Close unresponsive SSH sessions which fail to answer keep-alive >> -ClientAliveCountMax 6 >> +# Since TCP keep alive messages can be spoofed and we have the SSH-based already, >> +# there is no need for this to be enabled as well >> +TCPKeepAlive no >> >> # Add support for SFTP >> Subsystem sftp /usr/lib/openssh/sftp-server >> -- >> 2.26.2 > ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] SSH: do not send spoofable TCP keep alive messages 2021-04-02 19:27 ` Peter Müller @ 2021-04-06 10:16 ` Michael Tremer 2021-04-10 12:57 ` Peter Müller 0 siblings, 1 reply; 7+ messages in thread From: Michael Tremer @ 2021-04-06 10:16 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 4823 bytes --] Hi, > On 2 Apr 2021, at 20:27, Peter Müller <peter.mueller(a)ipfire.org> wrote: > > Hello Michael, > > thank you for your reply. > > Context-based, I guess you meant "something more useful", didn't you? :-) Seems so. I struggle a lot with auto-correct. > Well, if you like, we can leave 60 seconds here, but I would not go for a much > longer timeout. If a network issue takes longer than a minute, requiring a re-login > looks reasonable to me (it does for 30 seconds also, but hey ;-) ). No, it kills whatever I am running and a 60 second break happens very quickly with a DSL reconnect or rebooting an access point somewhere. Why is that supposed to break the SSH session, too? > > Thanks, and best regards, > Peter Müller > > >> Hello, >> >>> On 1 Feb 2021, at 18:06, Peter Müller <peter.mueller(a)ipfire.org> wrote: >>> >>> By default, both SSH server and client rely on TCP-based keep alive >>> messages to detect broken sessions, which can be spoofed rather easily >>> in order to keep a broken session opened (and vice versa). >>> >>> Since we rely on SSH-based keep alive messages, which are not vulnerable >>> to this kind of tampering, there is no need to double-check connections >>> via TCP keep alive as well. >>> >>> This patch thereof disables using TCP keep alive for both SSH client and >>> server scenario. Further, {Client,Server}AliveCountMax default to 3, >>> which is sufficient (3 * 10 sec. = broken SSH connections die after 30 >>> seconds), so we can omit that option. 60 seconds won't have any >>> advantage here. >> >> Is there any considerable downside of increasing this to something more useless? >> >> I constantly run into broken SSH sessions because of smaller network hiccups (WiFi, VPNs, my crappy ISP, etc.). It would be useful to hold the connection for a little bit longer so that I can spend more time on fixing stuff instead of logging back in. >> >> -Michael >> >>> >>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org> >>> --- >>> config/ssh/ssh_config | 11 +++++++---- >>> config/ssh/sshd_config | 7 ++++--- >>> 2 files changed, 11 insertions(+), 7 deletions(-) >>> >>> diff --git a/config/ssh/ssh_config b/config/ssh/ssh_config >>> index 2e2ee60c3..ab0967086 100644 >>> --- a/config/ssh/ssh_config >>> +++ b/config/ssh/ssh_config >>> @@ -5,7 +5,7 @@ >>> >>> # Set some basic hardening options for all connections >>> Host * >>> - # Disable Roaming as it is known to be vulnerable >>> + # Disable undocumented roaming feature as it is known to be vulnerable >>> UseRoaming no >>> >>> # Only use secure crypto algorithms >>> @@ -13,15 +13,18 @@ Host * >>> Ciphers chacha20-poly1305(a)openssh.com,aes256-gcm(a)openssh.com,aes128-gcm(a)openssh.com,aes256-ctr,aes192-ctr,aes128-ctr >>> MACs hmac-sha2-512-etm(a)openssh.com,hmac-sha2-256-etm(a)openssh.com,umac-128-etm(a)openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128(a)openssh.com >>> >>> - # Always visualise server host keys (but helps to identify key based MITM attacks) >>> + # Always visualise server host keys (helps to identify key based MITM attacks) >>> VisualHostKey yes >>> >>> # Use SSHFP (might work on some up-to-date networks) to look up host keys >>> VerifyHostKeyDNS yes >>> >>> - # send keep-alive messages to connected server to avoid broken connections >>> + # Send SSH-based keep alive messages to connected server to avoid broken connections >>> ServerAliveInterval 10 >>> - ServerAliveCountMax 6 >>> + >>> + # Disable TCP keep alive messages since they can be spoofed and we have SSH-based >>> + # keep alive messages enabled; there is no need to do things twice here >>> + TCPKeepAlive no >>> >>> # Ensure only allowed authentication methods are used >>> PreferredAuthentications publickey,keyboard-interactive,password >>> diff --git a/config/ssh/sshd_config b/config/ssh/sshd_config >>> index bea5cee53..a9eb5ff14 100644 >>> --- a/config/ssh/sshd_config >>> +++ b/config/ssh/sshd_config >>> @@ -47,11 +47,12 @@ AllowTcpForwarding no >>> AllowAgentForwarding no >>> PermitOpen none >>> >>> -# Detect broken sessions by sending keep-alive messages to clients via SSH connection >>> +# Send SSH-based keep alive messages every 10 seconds >>> ClientAliveInterval 10 >>> >>> -# Close unresponsive SSH sessions which fail to answer keep-alive >>> -ClientAliveCountMax 6 >>> +# Since TCP keep alive messages can be spoofed and we have the SSH-based already, >>> +# there is no need for this to be enabled as well >>> +TCPKeepAlive no >>> >>> # Add support for SFTP >>> Subsystem sftp /usr/lib/openssh/sftp-server >>> -- >>> 2.26.2 >> ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] SSH: do not send spoofable TCP keep alive messages 2021-04-06 10:16 ` Michael Tremer @ 2021-04-10 12:57 ` Peter Müller 2021-04-10 13:10 ` Michael Tremer 2021-04-10 13:14 ` Michael Tremer 0 siblings, 2 replies; 7+ messages in thread From: Peter Müller @ 2021-04-10 12:57 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 5054 bytes --] Hello Michael, thanks for your reply. Which timeout value would you suggest then? Thanks, and best regards, Peter Müller > Hi, > >> On 2 Apr 2021, at 20:27, Peter Müller <peter.mueller(a)ipfire.org> wrote: >> >> Hello Michael, >> >> thank you for your reply. >> >> Context-based, I guess you meant "something more useful", didn't you? :-) > > Seems so. I struggle a lot with auto-correct. > >> Well, if you like, we can leave 60 seconds here, but I would not go for a much >> longer timeout. If a network issue takes longer than a minute, requiring a re-login >> looks reasonable to me (it does for 30 seconds also, but hey ;-) ). > > No, it kills whatever I am running and a 60 second break happens very quickly with a DSL reconnect or rebooting an access point somewhere. Why is that supposed to break the SSH session, too? > >> >> Thanks, and best regards, >> Peter Müller >> >> >>> Hello, >>> >>>> On 1 Feb 2021, at 18:06, Peter Müller <peter.mueller(a)ipfire.org> wrote: >>>> >>>> By default, both SSH server and client rely on TCP-based keep alive >>>> messages to detect broken sessions, which can be spoofed rather easily >>>> in order to keep a broken session opened (and vice versa). >>>> >>>> Since we rely on SSH-based keep alive messages, which are not vulnerable >>>> to this kind of tampering, there is no need to double-check connections >>>> via TCP keep alive as well. >>>> >>>> This patch thereof disables using TCP keep alive for both SSH client and >>>> server scenario. Further, {Client,Server}AliveCountMax default to 3, >>>> which is sufficient (3 * 10 sec. = broken SSH connections die after 30 >>>> seconds), so we can omit that option. 60 seconds won't have any >>>> advantage here. >>> >>> Is there any considerable downside of increasing this to something more useless? >>> >>> I constantly run into broken SSH sessions because of smaller network hiccups (WiFi, VPNs, my crappy ISP, etc.). It would be useful to hold the connection for a little bit longer so that I can spend more time on fixing stuff instead of logging back in. >>> >>> -Michael >>> >>>> >>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org> >>>> --- >>>> config/ssh/ssh_config | 11 +++++++---- >>>> config/ssh/sshd_config | 7 ++++--- >>>> 2 files changed, 11 insertions(+), 7 deletions(-) >>>> >>>> diff --git a/config/ssh/ssh_config b/config/ssh/ssh_config >>>> index 2e2ee60c3..ab0967086 100644 >>>> --- a/config/ssh/ssh_config >>>> +++ b/config/ssh/ssh_config >>>> @@ -5,7 +5,7 @@ >>>> >>>> # Set some basic hardening options for all connections >>>> Host * >>>> - # Disable Roaming as it is known to be vulnerable >>>> + # Disable undocumented roaming feature as it is known to be vulnerable >>>> UseRoaming no >>>> >>>> # Only use secure crypto algorithms >>>> @@ -13,15 +13,18 @@ Host * >>>> Ciphers chacha20-poly1305(a)openssh.com,aes256-gcm(a)openssh.com,aes128-gcm(a)openssh.com,aes256-ctr,aes192-ctr,aes128-ctr >>>> MACs hmac-sha2-512-etm(a)openssh.com,hmac-sha2-256-etm(a)openssh.com,umac-128-etm(a)openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128(a)openssh.com >>>> >>>> - # Always visualise server host keys (but helps to identify key based MITM attacks) >>>> + # Always visualise server host keys (helps to identify key based MITM attacks) >>>> VisualHostKey yes >>>> >>>> # Use SSHFP (might work on some up-to-date networks) to look up host keys >>>> VerifyHostKeyDNS yes >>>> >>>> - # send keep-alive messages to connected server to avoid broken connections >>>> + # Send SSH-based keep alive messages to connected server to avoid broken connections >>>> ServerAliveInterval 10 >>>> - ServerAliveCountMax 6 >>>> + >>>> + # Disable TCP keep alive messages since they can be spoofed and we have SSH-based >>>> + # keep alive messages enabled; there is no need to do things twice here >>>> + TCPKeepAlive no >>>> >>>> # Ensure only allowed authentication methods are used >>>> PreferredAuthentications publickey,keyboard-interactive,password >>>> diff --git a/config/ssh/sshd_config b/config/ssh/sshd_config >>>> index bea5cee53..a9eb5ff14 100644 >>>> --- a/config/ssh/sshd_config >>>> +++ b/config/ssh/sshd_config >>>> @@ -47,11 +47,12 @@ AllowTcpForwarding no >>>> AllowAgentForwarding no >>>> PermitOpen none >>>> >>>> -# Detect broken sessions by sending keep-alive messages to clients via SSH connection >>>> +# Send SSH-based keep alive messages every 10 seconds >>>> ClientAliveInterval 10 >>>> >>>> -# Close unresponsive SSH sessions which fail to answer keep-alive >>>> -ClientAliveCountMax 6 >>>> +# Since TCP keep alive messages can be spoofed and we have the SSH-based already, >>>> +# there is no need for this to be enabled as well >>>> +TCPKeepAlive no >>>> >>>> # Add support for SFTP >>>> Subsystem sftp /usr/lib/openssh/sftp-server >>>> -- >>>> 2.26.2 >>> > ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] SSH: do not send spoofable TCP keep alive messages 2021-04-10 12:57 ` Peter Müller @ 2021-04-10 13:10 ` Michael Tremer 2021-04-10 13:14 ` Michael Tremer 1 sibling, 0 replies; 7+ messages in thread From: Michael Tremer @ 2021-04-10 13:10 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 5300 bytes --] 15 minutes > On 10 Apr 2021, at 13:57, Peter Müller <peter.mueller(a)ipfire.org> wrote: > > Hello Michael, > > thanks for your reply. > > Which timeout value would you suggest then? > > Thanks, and best regards, > Peter Müller > >> Hi, >> >>> On 2 Apr 2021, at 20:27, Peter Müller <peter.mueller(a)ipfire.org> wrote: >>> >>> Hello Michael, >>> >>> thank you for your reply. >>> >>> Context-based, I guess you meant "something more useful", didn't you? :-) >> >> Seems so. I struggle a lot with auto-correct. >> >>> Well, if you like, we can leave 60 seconds here, but I would not go for a much >>> longer timeout. If a network issue takes longer than a minute, requiring a re-login >>> looks reasonable to me (it does for 30 seconds also, but hey ;-) ). >> >> No, it kills whatever I am running and a 60 second break happens very quickly with a DSL reconnect or rebooting an access point somewhere. Why is that supposed to break the SSH session, too? >> >>> >>> Thanks, and best regards, >>> Peter Müller >>> >>> >>>> Hello, >>>> >>>>> On 1 Feb 2021, at 18:06, Peter Müller <peter.mueller(a)ipfire.org> wrote: >>>>> >>>>> By default, both SSH server and client rely on TCP-based keep alive >>>>> messages to detect broken sessions, which can be spoofed rather easily >>>>> in order to keep a broken session opened (and vice versa). >>>>> >>>>> Since we rely on SSH-based keep alive messages, which are not vulnerable >>>>> to this kind of tampering, there is no need to double-check connections >>>>> via TCP keep alive as well. >>>>> >>>>> This patch thereof disables using TCP keep alive for both SSH client and >>>>> server scenario. Further, {Client,Server}AliveCountMax default to 3, >>>>> which is sufficient (3 * 10 sec. = broken SSH connections die after 30 >>>>> seconds), so we can omit that option. 60 seconds won't have any >>>>> advantage here. >>>> >>>> Is there any considerable downside of increasing this to something more useless? >>>> >>>> I constantly run into broken SSH sessions because of smaller network hiccups (WiFi, VPNs, my crappy ISP, etc.). It would be useful to hold the connection for a little bit longer so that I can spend more time on fixing stuff instead of logging back in. >>>> >>>> -Michael >>>> >>>>> >>>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org> >>>>> --- >>>>> config/ssh/ssh_config | 11 +++++++---- >>>>> config/ssh/sshd_config | 7 ++++--- >>>>> 2 files changed, 11 insertions(+), 7 deletions(-) >>>>> >>>>> diff --git a/config/ssh/ssh_config b/config/ssh/ssh_config >>>>> index 2e2ee60c3..ab0967086 100644 >>>>> --- a/config/ssh/ssh_config >>>>> +++ b/config/ssh/ssh_config >>>>> @@ -5,7 +5,7 @@ >>>>> >>>>> # Set some basic hardening options for all connections >>>>> Host * >>>>> - # Disable Roaming as it is known to be vulnerable >>>>> + # Disable undocumented roaming feature as it is known to be vulnerable >>>>> UseRoaming no >>>>> >>>>> # Only use secure crypto algorithms >>>>> @@ -13,15 +13,18 @@ Host * >>>>> Ciphers chacha20-poly1305(a)openssh.com,aes256-gcm(a)openssh.com,aes128-gcm(a)openssh.com,aes256-ctr,aes192-ctr,aes128-ctr >>>>> MACs hmac-sha2-512-etm(a)openssh.com,hmac-sha2-256-etm(a)openssh.com,umac-128-etm(a)openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128(a)openssh.com >>>>> >>>>> - # Always visualise server host keys (but helps to identify key based MITM attacks) >>>>> + # Always visualise server host keys (helps to identify key based MITM attacks) >>>>> VisualHostKey yes >>>>> >>>>> # Use SSHFP (might work on some up-to-date networks) to look up host keys >>>>> VerifyHostKeyDNS yes >>>>> >>>>> - # send keep-alive messages to connected server to avoid broken connections >>>>> + # Send SSH-based keep alive messages to connected server to avoid broken connections >>>>> ServerAliveInterval 10 >>>>> - ServerAliveCountMax 6 >>>>> + >>>>> + # Disable TCP keep alive messages since they can be spoofed and we have SSH-based >>>>> + # keep alive messages enabled; there is no need to do things twice here >>>>> + TCPKeepAlive no >>>>> >>>>> # Ensure only allowed authentication methods are used >>>>> PreferredAuthentications publickey,keyboard-interactive,password >>>>> diff --git a/config/ssh/sshd_config b/config/ssh/sshd_config >>>>> index bea5cee53..a9eb5ff14 100644 >>>>> --- a/config/ssh/sshd_config >>>>> +++ b/config/ssh/sshd_config >>>>> @@ -47,11 +47,12 @@ AllowTcpForwarding no >>>>> AllowAgentForwarding no >>>>> PermitOpen none >>>>> >>>>> -# Detect broken sessions by sending keep-alive messages to clients via SSH connection >>>>> +# Send SSH-based keep alive messages every 10 seconds >>>>> ClientAliveInterval 10 >>>>> >>>>> -# Close unresponsive SSH sessions which fail to answer keep-alive >>>>> -ClientAliveCountMax 6 >>>>> +# Since TCP keep alive messages can be spoofed and we have the SSH-based already, >>>>> +# there is no need for this to be enabled as well >>>>> +TCPKeepAlive no >>>>> >>>>> # Add support for SFTP >>>>> Subsystem sftp /usr/lib/openssh/sftp-server >>>>> -- >>>>> 2.26.2 >>>> >> ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] SSH: do not send spoofable TCP keep alive messages 2021-04-10 12:57 ` Peter Müller 2021-04-10 13:10 ` Michael Tremer @ 2021-04-10 13:14 ` Michael Tremer 1 sibling, 0 replies; 7+ messages in thread From: Michael Tremer @ 2021-04-10 13:14 UTC (permalink / raw) To: development [-- Attachment #1: Type: text/plain, Size: 5290 bytes --] 15 minutes > On 10 Apr 2021, at 13:57, Peter Müller <peter.mueller(a)ipfire.org> wrote: > > Hello Michael, > > thanks for your reply. > > Which timeout value would you suggest then? > > Thanks, and best regards, > Peter Müller > >> Hi, >> >>> On 2 Apr 2021, at 20:27, Peter Müller <peter.mueller(a)ipfire.org> wrote: >>> >>> Hello Michael, >>> >>> thank you for your reply. >>> >>> Context-based, I guess you meant "something more useful", didn't you? :-) >> >> Seems so. I struggle a lot with auto-correct. >> >>> Well, if you like, we can leave 60 seconds here, but I would not go for a much >>> longer timeout. If a network issue takes longer than a minute, requiring a re-login >>> looks reasonable to me (it does for 30 seconds also, but hey ;-) ). >> >> No, it kills whatever I am running and a 60 second break happens very quickly with a DSL reconnect or rebooting an access point somewhere. Why is that supposed to break the SSH session, too? >> >>> >>> Thanks, and best regards, >>> Peter Müller >>> >>> >>>> Hello, >>>> >>>>> On 1 Feb 2021, at 18:06, Peter Müller <peter.mueller(a)ipfire.org> wrote: >>>>> >>>>> By default, both SSH server and client rely on TCP-based keep alive >>>>> messages to detect broken sessions, which can be spoofed rather easily >>>>> in order to keep a broken session opened (and vice versa). >>>>> >>>>> Since we rely on SSH-based keep alive messages, which are not vulnerable >>>>> to this kind of tampering, there is no need to double-check connections >>>>> via TCP keep alive as well. >>>>> >>>>> This patch thereof disables using TCP keep alive for both SSH client and >>>>> server scenario. Further, {Client,Server}AliveCountMax default to 3, >>>>> which is sufficient (3 * 10 sec. = broken SSH connections die after 30 >>>>> seconds), so we can omit that option. 60 seconds won't have any >>>>> advantage here. >>>> >>>> Is there any considerable downside of increasing this to something more useless? >>>> >>>> I constantly run into broken SSH sessions because of smaller network hiccups (WiFi, VPNs, my crappy ISP, etc.). It would be useful to hold the connection for a little bit longer so that I can spend more time on fixing stuff instead of logging back in. >>>> >>>> -Michael >>>> >>>>> >>>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org> >>>>> --- >>>>> config/ssh/ssh_config | 11 +++++++---- >>>>> config/ssh/sshd_config | 7 ++++--- >>>>> 2 files changed, 11 insertions(+), 7 deletions(-) >>>>> >>>>> diff --git a/config/ssh/ssh_config b/config/ssh/ssh_config >>>>> index 2e2ee60c3..ab0967086 100644 >>>>> --- a/config/ssh/ssh_config >>>>> +++ b/config/ssh/ssh_config >>>>> @@ -5,7 +5,7 @@ >>>>> >>>>> # Set some basic hardening options for all connections >>>>> Host * >>>>> - # Disable Roaming as it is known to be vulnerable >>>>> + # Disable undocumented roaming feature as it is known to be vulnerable >>>>> UseRoaming no >>>>> >>>>> # Only use secure crypto algorithms >>>>> @@ -13,15 +13,18 @@ Host * >>>>> Ciphers chacha20-poly1305(a)openssh.com,aes256-gcm(a)openssh.com,aes128-gcm(a)openssh.com,aes256-ctr,aes192-ctr,aes128-ctr >>>>> MACs hmac-sha2-512-etm(a)openssh.com,hmac-sha2-256-etm(a)openssh.com,umac-128-etm(a)openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128(a)openssh.com >>>>> >>>>> - # Always visualise server host keys (but helps to identify key based MITM attacks) >>>>> + # Always visualise server host keys (helps to identify key based MITM attacks) >>>>> VisualHostKey yes >>>>> >>>>> # Use SSHFP (might work on some up-to-date networks) to look up host keys >>>>> VerifyHostKeyDNS yes >>>>> >>>>> - # send keep-alive messages to connected server to avoid broken connections >>>>> + # Send SSH-based keep alive messages to connected server to avoid broken connections >>>>> ServerAliveInterval 10 >>>>> - ServerAliveCountMax 6 >>>>> + >>>>> + # Disable TCP keep alive messages since they can be spoofed and we have SSH-based >>>>> + # keep alive messages enabled; there is no need to do things twice here >>>>> + TCPKeepAlive no >>>>> >>>>> # Ensure only allowed authentication methods are used >>>>> PreferredAuthentications publickey,keyboard-interactive,password >>>>> diff --git a/config/ssh/sshd_config b/config/ssh/sshd_config >>>>> index bea5cee53..a9eb5ff14 100644 >>>>> --- a/config/ssh/sshd_config >>>>> +++ b/config/ssh/sshd_config >>>>> @@ -47,11 +47,12 @@ AllowTcpForwarding no >>>>> AllowAgentForwarding no >>>>> PermitOpen none >>>>> >>>>> -# Detect broken sessions by sending keep-alive messages to clients via SSH connection >>>>> +# Send SSH-based keep alive messages every 10 seconds >>>>> ClientAliveInterval 10 >>>>> >>>>> -# Close unresponsive SSH sessions which fail to answer keep-alive >>>>> -ClientAliveCountMax 6 >>>>> +# Since TCP keep alive messages can be spoofed and we have the SSH-based already, >>>>> +# there is no need for this to be enabled as well >>>>> +TCPKeepAlive no >>>>> >>>>> # Add support for SFTP >>>>> Subsystem sftp /usr/lib/openssh/sftp-server >>>>> -- >>>>> 2.26.2 >>>> >> ^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2021-04-10 13:14 UTC | newest] Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2021-02-01 18:06 [PATCH] SSH: do not send spoofable TCP keep alive messages Peter Müller 2021-02-08 13:48 ` Michael Tremer 2021-04-02 19:27 ` Peter Müller 2021-04-06 10:16 ` Michael Tremer 2021-04-10 12:57 ` Peter Müller 2021-04-10 13:10 ` Michael Tremer 2021-04-10 13:14 ` Michael Tremer
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox