Re: sshd and ntpd

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Wed, 14 Aug 2019 at 15:09, Peter Moody <mindrot@xxxxxxxx> wrote:
[...]
> is it possible that the crypto routines in sshd accept would be
> sensitive to the advancing system clock and kill the connection?

For an established session I wouldn't think so.  Once it's up there
only symmetric ciphers unless it rekeys, in which case it'd use also
use the host keys.  For regular key based auth I don't think so
either.

For a connection authenticating via certificates the clock skew might
throw off the certificate validity, but I suspect it'd have to be
pretty far off for it to matter.

For most other timers (eg ClientAliveInterval, RekeyInterval) it uses
CLOCK_MONOTONIC when the platform supports it, and that is not
affected by clock steps.

-- 
Darren Tucker (dtucker at dtucker.net)
GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860  37F4 9357 ECEF 11EA A6FA (new)
    Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux