[Bug 3872] Interactive input excessively buffered when using a mux socket if ControlPersist is set

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Tue Oct 7 17:02:18 AEDT 2025


https://bugzilla.mindrot.org/show_bug.cgi?id=3872

--- Comment #10 from Darren Tucker <dtucker at dtucker.net> ---
Given there's a reproducer and a relatively small range of changes, I
bisected it down to one of the following (the SIGINFO changes don't
compile until the ifdef wrapping):

There are only 'skip'ped commits left to test.
The first bad commit could be any of:
dc5147028ff19213a32281dad07bba02e58da3fa
289239046b2c4b0076c14394ae9703a879e78706
f807a598c96be683d97810481e954ec9db6b0027
b7ee13fbbb4ebafcf71f29685f053ecb97d1bcef
We cannot bisect more!

commit b7ee13fbbb4ebafcf71f29685f053ecb97d1bcef
Author: Damien Miller <djm at mindrot.org>
Date:   Mon Aug 18 14:22:18 2025 +1000

    wrap SIGINFO in ifdef

commit 289239046b2c4b0076c14394ae9703a879e78706 (HEAD)
Author: djm at openbsd.org <djm at openbsd.org>
Date:   Mon Aug 18 03:43:01 2025 +0000

    upstream: Make ssh(1) and sshd(8) set IP QoS (aka IP_TOS,
IPV6_TCLASS)

    continually at runtime based on what sessions/channels are open.

    Previously, ssh(1) and sshd(8) would pick a QoS value when they
    were started and use it for the whole connection. This could
    produce suboptimal choices for the QoS value, e.g. for multiplexed
    sessions that started interactive but picked up a sftp client,
    or sessions that moved large amounts of data via port forwarding.

    Now the QoS value will change to the non-interactive IPQoS whenever
    a "non-interactive" channel is open; basically any channel that
lacks
    a tty other than agent forwarding.

    This is important now that the default interactive IPQoS is EF
    (Expedited Forwarding), as many networks are configured to allow
    only relatively small amounts of traffic of this class and they
will
    aggressively deprioritise the entire connection if this is
exceeded.

    NB. because ssh(1) and sshd(8) now change IP_TOS/IPV6_TCLASS
    continually via setsockopt(), this commit requires a recent
pledge(2)
    change that landed recently in the OpenBSD kernel. Please ensure
    you have updated to a kernel from within the last two weeks before
    updating OpenSSH.

    with job@ deraadt@

    OpenBSD-Commit-ID: 325fc41717eecdf5e4b534bfa8d66817425b840f

commit dc5147028ff19213a32281dad07bba02e58da3fa
Author: djm at openbsd.org <djm at openbsd.org>
Date:   Mon Aug 18 03:29:11 2025 +0000

    upstream: SIGINFO handler for sshd(8) to dump active

    channels/sessions ok deraadt@

    OpenBSD-Commit-ID: 9955cb6d157c6d7aa23a819e8ef61b1edabc8b7d

commit f807a598c96be683d97810481e954ec9db6b0027
Author: djm at openbsd.org <djm at openbsd.org>
Date:   Mon Aug 18 03:28:36 2025 +0000

    upstream: SIGINFO handler for ssh(1) to dump active

    channels/sessions ok deraadt@

    OpenBSD-Commit-ID: 12f88a5044bca40ef5f41ff61b1755d0e25df901

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.


More information about the openssh-bugs mailing list