tech-net archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

blocklistd detects a failure for a killed ssh session



Hi,

I have the feeling that killing (SIGTERM) an ssh session triggers a
blocklistd failure on the server:

In authlog:
Nov 21 22:37:58 cactus sshd[16361]: Received disconnect from 10.1.0.15 port 57148:11: disconnected by user
Nov 21 22:37:58 cactus sshd[16361]: Disconnected from user me 10.1.0.15 port 57148

And in blocklistd:
cactus[~] # blocklistctl dump -a | grep '10[.]1'
      10.1.0.15/32:22           3/4     2022/11/21 22:37:58

The same also happens if I just close the laptop's lid and the
connection eventually times out :

Nov 21 23:01:59 cactus sshd[18107]: debug2: channel 0: read failed rfd 11 maxlen 32768: Broken pipe
Nov 21 23:01:59 cactus sshd[18107]: debug2: channel 0: read failed
...
Nov 21 23:01:59 cactus sshd[18107]: Close session: user me from 10.1.0.15 port 51772 id 0

cactus[~] # blocklistctl dump -a | grep '10[.]1'
      10.1.0.15/32:22   4       4/4     2022/11/21 23:01:59

This a bit annoying, since those are legitimate connections that where
properly authentified. This happens to me frequently (but I just
started using blocklistd) for me for instance by logging out an X11
session without closing all terminals, or just closing the laptop ...

Would there be a way to improve this, by detecting properly
established connections and not notify blacklistd anymore about these?

Anthony


Home | Main Index | Thread Index | Old Index