From nobody Fri Feb 10 10:35:39 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4PCqrW1Qp8z3pk7R for ; Fri, 10 Feb 2023 10:35:39 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4PCqrV6ctSz3ngM for ; Fri, 10 Feb 2023 10:35:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1676025338; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=7/8036L/t8osNyC2FK0LM1UdS3WIfCXl+uv1aUMlodc=; b=m9ETmeHnbh05ZuuBBLSy4hhH3akx8frCCLwsqrOPDcLSigIsLgziwCtfglgDVxNfPORkMU fXmow+EG70bUBej4hg5ptRFyf1pRfcjZ3tea47X0ZDATmiv/MlIkXLVnDyHXtyQWVgsfJy vMzSE28cIsPKOkMNqpTATU6EcjKRQDAvWGlEOj4TqkqRY4AIK/paDxRoDYheNGknzC56jf kQTblcddHaB+wXw29yrt58nie6qYtd6r1EKGo5M70sp/HR+QmpcBWeAKrqXZBVVN0sq8eT Y+Lzl6yGfWBtKXQCnnQ89QXvvwcKNniwxbsBmOqojeu6tuHqqe90VKSv4lR46A== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1676025338; a=rsa-sha256; cv=none; b=yFLsJsRl2HL7WODiVhZ0qXG3IDHE6Y5lG6ClyJoCIMAkP6+VASpRCmwhsJgpjA9h/G6vzh 9qfMmC6GVL4ImaPdTQDc/98jQW6d7Flj6Yfo17K10zxeDOpyf+Fm/+7YHvn2uYimS4ovXn ELRAGlECNSL9i9fUbXPHgWdQDRkFBlp7r861Y25nERQ3Ki38JdTKtjDG6Gz77012iL2hPC SirMF03kwMnlV57Y+1DXL1s9BkaQsq9EESToqf9EJkiwoyVxY3vWaBEhetASUVGD72QCsp hKJQy/U7sI9IujRqNjEfRrVoWas7RmwxYFIZrNUkSQXnh9TmS18hhAhXVniguw== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4PCqrV5h69zF3j for ; Fri, 10 Feb 2023 10:35:38 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 31AAZc29029521 for ; Fri, 10 Feb 2023 10:35:38 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 31AAZcJo029520 for bugs@FreeBSD.org; Fri, 10 Feb 2023 10:35:38 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 269456] sshd stops accepting connections if tcp_wrapper is used Date: Fri, 10 Feb 2023 10:35:39 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bin X-Bugzilla-Version: 13.1-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: lampa@fit.vutbr.cz X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D269456 Bug ID: 269456 Summary: sshd stops accepting connections if tcp_wrapper is used Product: Base System Version: 13.1-STABLE Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: bin Assignee: bugs@FreeBSD.org Reporter: lampa@fit.vutbr.cz Change in "sshd: update the libwrap patch to drop connections early" 46aaea6c19ef1f377936eede16b4bdb626421dd6 moved tcp wrapper actions into main loop in sshd: for (i =3D 0; i < num_listen_socks; i++) { ... if (!hosts_access(&req)) { ... } If for any reason hosts_access() stalls (DNS lookup timeouts), it stops this loop and sshd stops accepting any connections for some time (eventually indefinitely if attacker is persistent). It seems that dropping connections= in main loop with tcp_wrapper is not a good idea. --=20 You are receiving this mail because: You are the assignee for the bug.=