Bug ID 974245: With ssh-session-limit enabled, root user is unable to login via SSH

Last Modified: Jan 14, 2021

Bug Tracker

Affected Product:  See more info
BIG-IP TMOS(all modules)

Known Affected Versions:
13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 13.1.3, 13.1.3.1, 13.1.3.2, 13.1.3.3, 13.1.3.4, 13.1.3.5, 14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4, 14.0.0.5, 14.0.1, 14.0.1.1, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5, 14.1.0.6, 14.1.2, 14.1.2.1, 14.1.2.2, 14.1.2.3, 14.1.2.4, 14.1.2.5, 14.1.2.6, 14.1.2.7, 14.1.2.8, 14.1.3, 14.1.3.1, 15.0.0, 15.0.1, 15.0.1.1, 15.0.1.2, 15.0.1.3, 15.0.1.4, 15.1.0, 15.1.0.1, 15.1.0.2, 15.1.0.3, 15.1.0.4, 15.1.0.5, 15.1.1, 15.1.2, 16.0.0, 16.0.0.1, 16.0.1

Opened: Dec 15, 2020
Severity: 4-Minor

Symptoms

Root is unable to login to the device when the ssh-session-limit feature is enabled and the specified limit is reached.

Impact

Root user is denied SSH access when the session limit is exhausted by non-root users.

Conditions

-- The ssh-session-limit feature is enabled: tmsh modify sys global-settings ssh-session-limit enabled -- A limit is set: tmsh modify sys global-settings ssh-max-session-limit 4 -- A non-root user consumes all of the sessions up to the session limit

Workaround

Terminate non-root user SSH sessions.

Fix Information

None

Behavior Change