X2Go Bug report logs - #1156
SSH daemon could not be started

version graph

Package: x2goclient; Maintainer for x2goclient is X2Go Developers <x2go-dev@lists.x2go.org>; Source for x2goclient is src:x2goclient.

Reported by: John Cobo <john.cobo@gmail.com>

Date: Thu, 16 Mar 2017 12:40:02 UTC

Severity: normal

Tags: pending

Fixed in version

Done: X2Go Release Manager X2Go Release Manager <git-admin@x2go.org>

Bug is archived. No further changes may be made.

Full log

Message #34 received at 1156@bugs.x2go.org (full text, mbox, reply):

Received: (at 1156) by bugs.x2go.org; 5 May 2018 00:40:37 +0000
From jkl@calibersecurity.com  Sat May  5 02:40:06 2018
X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on
X-Spam-Status: No, score=0.7 required=3.0 tests=BAYES_50,DKIM_SIGNED,
	DKIM_VALID,DKIM_VALID_AU,HTML_MESSAGE autolearn=ham autolearn_force=no
Received: from localhost (localhost [])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTP id 2088C5DAE9
	for <1156@bugs.x2go.org>; Sat,  5 May 2018 02:40:06 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at ymir.das-netzwerkteam.de
Received: from ymir.das-netzwerkteam.de ([])
	by localhost (ymir.das-netzwerkteam.de []) (amavisd-new, port 10024)
	with ESMTP id SArKPh6ceSxc for <1156@bugs.x2go.org>;
	Sat,  5 May 2018 02:39:51 +0200 (CEST)
Received: from mail-wm0-x22f.google.com (mail-wm0-x22f.google.com [IPv6:2a00:1450:400c:c09::22f])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTPS id 3CF9A5DA81
	for <1156@bugs.x2go.org>; Sat,  5 May 2018 02:39:51 +0200 (CEST)
Received: by mail-wm0-x22f.google.com with SMTP id l1-v6so7517136wmb.2
        for <1156@bugs.x2go.org>; Fri, 04 May 2018 17:39:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=calibersecurity.com; s=google;
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20161025;
X-Gm-Message-State: ALQs6tCRSzJbOCBupS/cHpnYcOG4u/5bf5cZsmSy/3BWVSA6nyv3ZUzq
X-Google-Smtp-Source: AB8JxZoSndirb4+QXjFaVrLv87NwFo2tD6/gxPcyGFdvSq3Aehc+2YemqjSpUhJy2OnL5dmj9lAePawkhuh2i8VehpA=
X-Received: by with SMTP id w197mr16816830wmw.22.1525480790497;
 Fri, 04 May 2018 17:39:50 -0700 (PDT)
MIME-Version: 1.0
Received: by with HTTP; Fri, 4 May 2018 17:39:49 -0700 (PDT)
From: Jonathan Landis <jkl@calibersecurity.com>
Date: Fri, 4 May 2018 17:39:49 -0700
Message-ID: <CAFo4EaD5bNH-HWQsZgjwFmto9W1B0P3UaPEOs8rAAhe6DNL9Bw@mail.gmail.com>
Subject: another workaround
To: 1156@bugs.x2go.org
Content-Type: multipart/alternative; boundary="001a11422d82a14bdd056b6aac80"
[Message part 1 (text/plain, inline)]
You can fix the file permissions without Cygwin, but not with File
Explorer. You need to use the industrial-strength subinacl.exe tool
available for free from Microsoft. It's often the only option for
permissions issues, so it is useful to have around.

As noted earlier in the thread, the ssh_host_rsa_key file's primary group
is the same as the user. So the group permissions are the user permissions,
and there is no possible way to satisfy the permissions requirements, even
if you delete all permissions entries except the one for the user.

So what you have to do is set the primary group to something else, and make
sure that it doesn't have access to the file. Like this:

"c:\Program Files (x86)\Windows Resource Kits\Tools\subinacl.exe" /file
ssh_host_rsa_key /setprimarygroup=Administrators

That will set the primary group to the builtin Administrators group. Make
sure that group doesn't have an access grant (which can be done in File
Explorer if desired).
[Message part 2 (text/html, inline)]

Send a report that this bug log contains spam.

X2Go Developers <owner@bugs.x2go.org>. Last modified: Sun Sep 27 08:28:35 2020; Machine Name: ymir.das-netzwerkteam.de

X2Go Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.