How to Keep Alive SSH Sessions
Many NAT firewalls time out idle sessions after a certain period of time to keep their trunks clean. Sometimes the interval between session drops is 24 hours, but on many commodity firewalls, connections are killed after as little as 300 seconds. To avoid having your SSH sessions become unresponsive after e.g. 5 minutes, do the following:
On Windows (PuTTY)
In your session properties, go to Connection and under Sending of null packets to keep session active, set Seconds between keepalives (0 to turn off) to e.g. 300 (5 minutes).
On Linux (ssh)
To enable the keep alive system-wide (root access required), edit/etc/ssh/ssh_config
; to set the settings for just your user, edit ~/.ssh/config
(create the file if it doesn’t exist). Insert the following:
Host * ServerAliveInterval 300 ServerAliveCountMax 2You can also make your OpenSSH server keep alive all connections with clients by adding the following to
/etc/ssh/sshd_config
:
ClientAliveInterval 300 ClientAliveCountMax 2
These settings will make the SSH client or server send a null packet to the other side every 300 seconds (5 minutes), and give up if it doesn’t receive any response after 2 tries, at which point the connection is likely to have been discarded anyway.
From thessh_config
man page:
ServerAliveCountMax
Sets the number of server alive messages (see below) which may be sent without ssh(1) receiving any messages back from the server. If this threshold is reached while server alive messages are being sent, ssh will disconnect from the server, terminating the session. It is important to note that the use of server alive messages is very different from TCPKeepAlive (below). The server alive messages are sent through the encrypted channel and therefore will not be spoofable. The TCP keepalive option enabled by TCPKeepAlive is spoofable. The server alive mechanism is valuable when the client or server depend on knowing when a connection has become inactive.The default value is 3. If, for example, ServerAliveInterval (see below) is set to 15 and ServerAliveCountMax is left at the default, if the server becomes unresponsive, ssh will disconnect after approximately 45 seconds. This option applies to protocol version 2 only; in protocol version 1 there is no mechanism to request a response from the server to the server alive messages, so disconnection is the responsibility of the TCP stack.
ServerAliveInterval
Sets a timeout interval in seconds after which if no data has been received from the server, ssh(1) will send a message through the encrypted channel to request a response from the server. The default is 0, indicating that these messages will not be sent to the server, or 300 if the BatchMode option is set. This option applies to protocol version 2 only. ProtocolKeepAlives and SetupTimeOut are Debian-specific compatibility aliases for this option.
Lowering Mouse Sensitivity in Ubuntu and Fedora
I have a Razer Deathadder. It’s a nice gaming mouse. In Ubuntu its polling rates are through the roof, though, and the mouse is pretty much unusable even with the mouse sensitivity and acceleration settings at their lowest.
Here’s how I regained my sanity and mouse slowness. This fix should work for any mouse (tested with many different mouse brands, including Logitech.)
Please contact me if you know of a better way to do any of the below.
Fix for Ubuntu 17.04+ and Fedora 22+ (libinput)
- Open a terminal
-
Run the command:
xinput --list --short
⎡ Virtual core pointer id=2 [master pointer (3)] ⎜ ↳ Virtual core XTEST pointer id=4 [slave pointer (2)] ⎜ ↳ Razer USA, Ltd DeathAdder Mouse id=6 [slave pointer (2)] ⎜ ↳ Razer USA, Ltd DeathAdder Mouse id=7 [slave pointer (2)] ⎜ ↳ Razer DeathAdder id=11 [slave pointer (2)] ⎜ ↳ Macintosh mouse button emulation id=12 [slave pointer (2)] ⎣ Virtual core keyboard id=3 [master keyboard (2)] ↳ Virtual core XTEST keyboard id=5 [slave keyboard (3)] ↳ Power Button id=8 [slave keyboard (3)] ↳ Power Button id=9 [slave keyboard (3)] ↳ Dell Dell USB Keyboard id=10 [slave keyboard (3)]
- Note the name of your device. (In my case, manipulating ‘Razer DeathAdder’ worked.)
-
Set the constant deceleration and transformation matrix for the device:
xinput --set-prop "Device Name" "libinput Accel Speed" -0.9 xinput --set-prop "Device Name" "Coordinate Transformation Matrix" 0.6 0 0 0 0.6 0 0 0 2
The “libinput Accel Speed” number must be an integer between 1 and -1, and appears less flexible than the old Constant Deceleration setting (below.) Playing around with the coordinate transformation matrix numbers may also help. You may want to apply only one or both of these changes. (Thanks to Emanuel Steen for the tip.)
Fix for Ubuntu 10.04-16.10 and Fedora 12-21
- Open a terminal
-
Run the command:
xinput --list --short
⎡ Virtual core pointer id=2 [master pointer (3)] ⎜ ↳ Virtual core XTEST pointer id=4 [slave pointer (2)] ⎜ ↳ Razer USA, Ltd DeathAdder Mouse id=6 [slave pointer (2)] ⎜ ↳ Razer USA, Ltd DeathAdder Mouse id=7 [slave pointer (2)] ⎜ ↳ Razer DeathAdder id=11 [slave pointer (2)] ⎜ ↳ Macintosh mouse button emulation id=12 [slave pointer (2)] ⎣ Virtual core keyboard id=3 [master keyboard (2)] ↳ Virtual core XTEST keyboard id=5 [slave keyboard (3)] ↳ Power Button id=8 [slave keyboard (3)] ↳ Power Button id=9 [slave keyboard (3)] ↳ Dell Dell USB Keyboard id=10 [slave keyboard (3)]
- Note the name of your device. (In my case, manipulating ‘Razer DeathAdder’ worked.)
-
Set the constant deceleration for the device:
xinput --set-prop "Razer DeathAdder" "Device Accel Constant Deceleration" 5
That’s it. You might have to play around with the value, but 5 slowed down my mouse sufficiently.
-
To see the current settings for the device:
xinput --list-props "Razer DeathAdder"
-
To turn off mouse acceleration:
xinput --set-prop "Razer DeathAdder" "Device Accel Velocity Scaling" 1 xinput --set-prop "Razer DeathAdder" "Device Accel Profile" -1
To perform the tuning automatically, I simply created a file fix-mouse.sh
containing the script below, ran chmod +x fix-mouse.sh
and added it to GNOME’s Startup Applications — gnome-session-properties
, or System -> Preferences -> Startup Applications, or the gear in the upper-right corner -> Startup Applications in Ubuntu’s Unity.
#!/bin/sh
xinput --set-prop "Razer DeathAdder" "Device Accel Constant Deceleration" 5
xinput --set-prop "Razer DeathAdder" "Device Accel Velocity Scaling" 1
xinput --set-prop "Razer DeathAdder" "Device Accel Profile" -1
Fix for distributions using HAL (including Ubuntu 9.10)
- Open a terminal
-
Run the command:
hal-device
-
In the output, locate the mouse’s hex format vendor and product ID’s as highlighted below:
In this case, my Product ID is 0x7 and my Vendor ID is 0x1532. Note that there can be more than one section containing the name of your mouse or its manufacturer — if you can’t find the product and vendor ID, look further down.82: udi = '/org/freedesktop/Hal/devices/usb_device_1532_7_noserial_if0' linux.hotplug_type = 2 (0x2) (int) linux.subsystem = 'usb' (string) info.linux.driver = 'usbhid' (string) info.subsystem = 'usb' (string) info.product = 'USB HID InterfacUbuntu 10.04 Lucid Lynxe' (string) info.udi = '/org/freedesktop/Hal/devices/usb_device_1532_7_noserial_if0' (string) usb.linux.sysfs_path = '/sys/devices/pci0000:00/0000:00:1d.2/usb8/8-2/8-2:1.0' (string) usb.configuration_value = 1 (0x1) (int) usb.num_configurations = 1 (0x1) (int) usb.num_interfaces = 1 (0x1) (int) usb.device_class = 0 (0x0) (int) usb.device_subclass = 0 (0x0) (int) usb.device_protocol = 0 (0x0) (int) usb.product_id = 7 (<strong>0x7</strong>) (int) usb.vendor_id = 5426 (<strong>0x1532</strong>) (int) usb.product = 'USB HID Interface' (string) usb.vendor = 'Razer USA, Ltd' (string) usb.num_ports = 0 (0x0) (int) usb.max_power = 100 (0x64) (int) usb.device_revision_bcd = 256 (0x100) (int) usb.is_self_powered = false (bool) usb.can_wake_up = true (bool) usb.bus_number = 8 (0x8) (int) usb.speed = 12 (double) usb.version = 2 (double) linux.sysfs_path = '/sys/devices/pci0000:00/0000:00:1d.2/usb8/8-2/8-2:1.0' (string) info.parent = '/org/freedesktop/Hal/devices/usb_device_1532_7_noserial' (string) usb.interface.number = 0 (0x0) (int) usb.linux.device_number = 3 (0x3) (int) usb.interface.subclass = 1 (0x1) (int) usb.interface.class = 3 (0x3) (int) usb.interface.protocol = 2 (0x2) (int)
-
Edit the HAL policy file for input devices:
sudo nano -w /etc/hal/fdi/policy/10-x11-input.fdi
- Insert the following text:
-
Hit Ctrl + X, then Y to save the file and exit
nano
-
Restart hald:
sudo service hald restart
- Restart X.Org (log out or reboot your computer)
<?xml version="1.0" encoding="UTF-8"?>
<deviceinfo version="0.2">
<device>
<match key="@input.originating_device:usb.vendor_id" int="0x1532">
<match key="@input.originating_device:usb.product_id" int="0x7">
<merge key="input.x11_options.ConstantDeceleration" type="string">5</merge>
</match>
</match>
</device>
</deviceinfo>
That’s it! The “ConstantDeceleration” setting in /etc/hal/fdi/policy/10-x11-input.fdi
is what does the trick. When set to a value of 5, the sensitivity will essentially be divided by 5. Oh, sweet sanity.
Hard to Believe It's Not Real: The Third & The Seventh
Made by Alex Roman — original available in MP4 format here (torrent).
How To Set Up Simple SSH Tunneling
By far the easiest way to set up a simple connection proxy is to use the SSH tunneling feature of either PuTTY on Windows or SSH on Linux. This lets you establish connections to servers and ports that you might not be able to access (e.g. from work), as long as you can connect to your server’s SSH service (e.g. myserver.com port 22). This might be for privacy reasons, to connect to MSN from work, to browse a blocked website, et cetera.
Update: To do this without an OpenSSH server, see Senka.
On Windows Machines
- Download and open PuTTY
- In the fields ‘Address’ and ‘Port’, enter the address and port for your SSH server
- Go to ‘Connection’ -> ‘SSH’ -> ‘Tunnels’ on the left-hand side
- In ‘Source port’, enter 31337, then click the button ‘Dynamic’ and then ‘Add’
- Go back to the main ‘Session’ screen
- In the ‘Saved Sessions’ text box, enter e.g. “My Shell” and click ‘Save’
- Double-click “My Shell” to establish a connection, then log in to your shell
-
In any application that supports connecting through a proxy, set the following settings:
- Proxy type: SOCKS 5
- Proxy server: 127.0.0.1
- Proxy port: 31337
You can also set these as your global proxy settings in Windows (via ‘Control Panel’ -> ‘Internet Properties’ -> ‘Connections’ -> ‘LAN settings’ -> “Use a proxy server for your LAN” -> ‘Advanced’ -> ‘Socks’: 127.0.0.1:31337. This will cause most applications to connect through the SSH tunnel to your server.
In the future, just open PuTTY and double-click “My Shell” to open your shell and activate the SSH tunneling.
On Linux Machines
- Open a terminal
-
Enter e.g.:
ssh -D31337 [email protected] -N
- Log in to your shell
-
In any application that supports connecting through a proxy, set the following settings:
- Proxy type: SOCKS 5
- Proxy server: 127.0.0.1
- Proxy port: 31337
Alternatively, enter e.g.: ssh -L 31337:patrickmylund.com:80 [email protected] -N
. Here, you specify the target host and port before-hand; the result is that all connections to 127.0.0.1 port 31337 will be tunneled through your server, myserver.com, using your username, myuser, to the target machine, patrickmylund.com, port 80.
The SSH tunnel will stay active until you close the terminal window or hit CTRL+C (Linux), or close PuTTY (Windows).