Bug#546854: marked as done (openssh-server: has unspecified limit for number of sessions tunnelled through controlmaster)
Your message dated Tue, 2 Nov 2010 20:56:40 +0100
with message-id <20101102195640.GA14773@nechayev.zugschlus.de>
and subject line Re: Bug#546854: MaxSessions in sshd_config
has caused the Debian Bug report #546854,
regarding openssh-server: has unspecified limit for number of sessions tunnelled through controlmaster
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)
--
546854: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=546854
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: openssh-server: has unspecified limit for number of sessions tunnelled through controlmaster
- From: Marc Haber <mh+debian-bugs@zugschlus.de>
- Date: Wed, 16 Sep 2009 09:17:11 +0200
- Message-id: <20090916071711.16285.91545.reportbug@swivel.zugschlus.de>
Package: openssh-server
Version: 1:5.1p1-7
Severity: normal
Hi,
I can only reach most of my systems through a dual-homed host which I
access via proxycommand ssh dhhost socket %h %p. When I use
controlmaster, there seems to be a rather low session limit of around
ten sessions which can be tunneled through.
When this limit is reached, the server logs "error: no more sessions"
and the client holding the controlmaster spews "open failed:
administratively prohibited: open failed" to its console.
In some cases, closing one of the sessions does not immediately free
up a "slot", but new connections become possible after waiting a few
minutes.
Googling for the error message suggests that there is a macro
MAX_SESSIONS which can be increased, but the current sources only
contain this string inside debian/changelog when it was documented
that this macro was increased to 64 somewhen in 2007. So I suspect
that this is now dynamically allocated, eliminating the macro from the
sources.
However, the limit remains and is a rather severe limitation
especially when a security update needs to be rolled out (I do this in
parallel and frequently hit this limit).
Greetings
Marc
-- System Information:
Debian Release: squeeze/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.30.5-nc8000 (PREEMPT)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages openssh-server depends on:
ii adduser 3.110 add and remove users and groups
ii debconf [debconf-2.0] 1.5.27 Debian configuration management sy
ii dpkg 1.15.3.1 Debian package management system
ii libc6 2.9-25 GNU C Library: Shared libraries
ii libcomerr2 1.41.8-2 common error description library
ii libgssapi-krb5-2 1.7dfsg~beta3-1 MIT Kerberos runtime libraries - k
ii libk5crypto3 1.7dfsg~beta3-1 MIT Kerberos runtime libraries - C
ii libkrb5-3 1.7dfsg~beta3-1 MIT Kerberos runtime libraries
ii libpam-modules 1.0.1-10 Pluggable Authentication Modules f
ii libpam-runtime 1.0.1-10 Runtime support for the PAM librar
ii libpam0g 1.0.1-10 Pluggable Authentication Modules l
ii libselinux1 2.0.85-1 SELinux shared libraries
ii libssl0.9.8 0.9.8k-4 SSL shared libraries
ii libwrap0 7.6.q-18 Wietse Venema's TCP wrappers libra
ii lsb-base 3.2-23 Linux Standard Base 3.2 init scrip
ii openssh-blacklist 0.4.1 list of default blacklisted OpenSS
ii openssh-client 1:5.1p1-7 secure shell client, an rlogin/rsh
ii procps 1:3.2.8-1 /proc file system utilities
ii zlib1g 1:1.2.3.3.dfsg-15 compression library - runtime
Versions of packages openssh-server recommends:
ii openssh-blacklist-extra 0.4.1 list of non-default blacklisted Op
ii xauth 1:1.0.3-2 X authentication utility
Versions of packages openssh-server suggests:
ii molly-guard 0.4.4-2 protects machines from accidental
pn rssh <none> (no description available)
ii ssh-askpass 1:1.2.4.1-7 under X, asks user for a passphras
pn ufw <none> (no description available)
-- debconf information excluded
--- End Message ---
--- Begin Message ---
On Mon, Nov 01, 2010 at 02:30:30PM +0100, Wessel Dankers wrote:
> Have you tried increasing the MaxSessions configuration parameter
> in /etc/ssh/sshd_config to something higher than the default 10?
In fact, I found that setting a few months ago and forgot to close
this bug. Thanks for the heads-up
Greetings
Marc
--
-----------------------------------------------------------------------------
Marc Haber | "I don't trust Computers. They | Mailadresse im Header
Mannheim, Germany | lose things." Winona Ryder | Fon: *49 621 72739834
Nordisch by Nature | How to make an American Quilt | Fax: *49 621 72739835
--- End Message ---
Reply to: