From unknown Sun May 24 17:45:51 2026
MIME-Version: 1.0
X-Mailer: MIME-tools 5.507 (Entity 5.507)
X-Loop: owner@bugs.x2go.org
From: owner@bugs.x2go.org (X2Go Bug Tracking System)
Subject: Bug#1258 closed by Mike DePaulo Mike DePaulo <mikedep333@gmail.com>
 (X2Go issue (in src:x2goclient) has been marked as closed)
Message-ID: <handler.1258.c.151990743310010.notifdone@bugs.x2go.org>
References: <20180301123016.BD2F25DAE9@ymir.das-netzwerkteam.de>
X-X2go-PR-Keywords: pending
X-X2go-PR-Message: they-closed 1258
X-X2go-PR-Package: x2goclient
X-X2go-PR-Source: x2goclient
Date: Thu, 01 Mar 2018 12:35:02 +0000
Content-Type: multipart/mixed; boundary="----------=_1519907702-12373-0"

This is a multi-part message in MIME format...

------------=_1519907702-12373-0
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset=utf-8

This is an automatic notification regarding your Bug report
which was filed against the x2goclient package:

#1258: x2goclient hangs when connecting with Kerberos auth

It has been closed by Mike DePaulo Mike DePaulo <mikedep333@gmail.com>.

Their explanation is attached below along with your original report.
If this explanation is unsatisfactory and you have not received a
better one in a separate message then please contact Mike DePaulo Mike DePa=
ulo <mikedep333@gmail.com> by
replying to this email.


--=20
X2Go Bug Tracking System
Contact owner@bugs.x2go.org with problems

------------=_1519907702-12373-0
Content-Type: message/rfc822
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

Received: (at control) by bugs.x2go.org; 1 Mar 2018 12:30:33 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on
	ymir.das-netzwerkteam.de
X-Spam-Level: 
X-Spam-Status: No, score=-2.0 required=3.0 tests=ALL_TRUSTED,BAYES_00,
	DKIM_ADSP_CUSTOM_MED,FREEMAIL_FROM,NML_ADSP_CUSTOM_MED,URIBL_BLOCKED
	autolearn=no autolearn_force=no version=3.4.1
Received: from localhost (localhost [127.0.0.1])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTP id 183F05DAEB;
	Thu,  1 Mar 2018 13:30:32 +0100 (CET)
X-Virus-Scanned: Debian amavisd-new at ymir.das-netzwerkteam.de
Received: from ymir.das-netzwerkteam.de ([127.0.0.1])
	by localhost (ymir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id RmpnLkA5HdYq; Thu,  1 Mar 2018 13:30:16 +0100 (CET)
Received: by ymir.das-netzwerkteam.de (Postfix, from userid 1005)
	id BD2F25DAE9; Thu,  1 Mar 2018 13:30:16 +0100 (CET)
From: =?utf-8?q?Mike_DePaulo?= Mike DePaulo <mikedep333@gmail.com>
To: 1258-submitter@bugs.x2go.org
Cc: control@bugs.x2go.org, 1258@bugs.x2go.org
Subject: X2Go issue (in src:x2goclient) has been marked as closed
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
Message-Id: <20180301123016.BD2F25DAE9@ymir.das-netzwerkteam.de>
Date: Thu,  1 Mar 2018 13:30:16 +0100 (CET)

close #1258
thanks

Hello,

we are very hopeful that X2Go issue #1258 reported by you
has been resolved in the new release (4.1.1.1) of the
X2Go source project »src:x2goclient«.

You can view the complete changelog entry of src:x2goclient (4.1.1.1)
below, and you can use the following link to view all the code changes
between this and the last release of src:x2goclient.

    http://code.x2go.org/gitweb?p=x2goclient.git;a=commitdiff;h=b4421bf6fc16d46e68dde8a0b9d48252804a30f1;hp=d8f5e5a4a51724ef3620e7f347644338e2449444

If you feel that the issue has not been resolved satisfyingly, feel
free to reopen this bug report or submit a follow-up report with
further observations described based on the new released version
of src:x2goclient.

Thanks a lot for contributing to X2Go!!!

light+love
X2Go Git Admin (on behalf of the sender of this mail)

---
X2Go Component: src:x2goclient
Version: 4.1.1.1-2018.03.01
Status: RELEASE
Date: Wed, 28 Feb 2018 20:53:41 -0500
Fixes: 1258
Changes:
 x2goclient (4.1.1.1-2018.03.01) RELEASED; urgency=medium
 .
   [ Mike DePaulo ]
   * New upstream version (4.1.1.1-2018.03.01):
     - src/sshmasterconnection.cpp: Do not attempt to perform Interaction with
       SSH Server (e.g. for changing expired password) when using
       GSSAPI/Kerberos because the interaction code does not support it yet.
       Fixes: #1258
     - Windows: Update PuTTY from 0.68 to 0.70, which fixes PuTTY vulns
       vuln-indirect-dll-hijack-2 & vuln-indirect-dll-hijack-3.
       Note that x2goclient was only ever affected if the permissions on the
       installation folder were changed to give users write access, or if
       x2goclient was copied/extracted to a folder where users could write.


------------=_1519907702-12373-0
Content-Type: message/rfc822
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

Received: (at submit) by bugs.x2go.org; 19 Feb 2018 04:28:27 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on
	ymir.das-netzwerkteam.de
X-Spam-Level: 
X-Spam-Status: No, score=-0.6 required=3.0 tests=BAYES_05,DKIM_SIGNED,
	DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FROM,URIBL_BLOCKED autolearn=ham
	autolearn_force=no version=3.4.1
Received: from localhost (localhost [127.0.0.1])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTP id 0D8DF5DAEA
	for <submit@bugs.x2go.org>; Mon, 19 Feb 2018 05:28:20 +0100 (CET)
X-Virus-Scanned: Debian amavisd-new at ymir.das-netzwerkteam.de
Received: from ymir.das-netzwerkteam.de ([127.0.0.1])
	by localhost (ymir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id Gc2zRvaIusNT for <submit@bugs.x2go.org>;
	Mon, 19 Feb 2018 05:28:14 +0100 (CET)
Received: from mail-qt0-x230.google.com (mail-qt0-x230.google.com [IPv6:2607:f8b0:400d:c0d::230])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTPS id 5D8795DAC9
	for <submit@bugs.x2go.org>; Mon, 19 Feb 2018 05:28:14 +0100 (CET)
Received: by mail-qt0-x230.google.com with SMTP id v90so7990773qte.12
        for <submit@bugs.x2go.org>; Sun, 18 Feb 2018 20:28:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20161025;
        h=mime-version:from:date:message-id:subject:to;
        bh=3akfDnX8moS76YvzsbnT38ytmHFZI0lZJ44HOL4Zi74=;
        b=J1c8x5B4E+Nzyop799VTyPjan4MV1fH7YJ0+q8uLVqn2cmu8HeLcOZKHhyPiOe9Skf
         2f0r56qqyFdF2cbjHQOnkkC+kNf4HPBRs+F0gRFI/1pzd9xKIFZwkuE2vkq+Rqhk+Pd3
         SV5wvIrKAgBAGfaQ+wiPHiilcfy3wFPzxyGiqZ4H6VYg0Sk1LFsfhp/nQ97S/eiIpmbJ
         FLbEDV/JusFE4l1+DOopU109ZBev/uKRm76nyjoyWYct5JdX7noBe5eimucL9HP9reGo
         K03uJCib/TLMwubXptibxTwvJpKIC0vOVnoQpMVhE1AByGnFnzse9Gq9Rti2YkHNw/Qw
         bByg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20161025;
        h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
        bh=3akfDnX8moS76YvzsbnT38ytmHFZI0lZJ44HOL4Zi74=;
        b=eZd3tpxiTNVcYnbG8e7TeJBRNwufJSvJXoAP/S27tYB9WN8nzsEtzOKHBBWm+nlRBw
         3iox9OQAEENbE0LR7J2N3e+EjA4N4gCumre7nc7BqPnnAcZxU28fc6KRoXBEqqBPjnnL
         KzC5rCQKyg/NRd4EgV6mOEjJFACNNWG0qO5vL2Q2fqC2w/AD5IleadP7J/qPBfDEREfQ
         vz2xm/zYmIVW4X7gh2Zg45NvFNMvzl2y2l2hNwEfs/Mr4FeI06JhaVssMSCiPGKFHYNl
         dmuZDyjn7EyeVOtgujr2dERnWr79xCR+LwXxuUIgoXid7OIdm3OZkUVfOZYW3MDUh165
         y2ag==
X-Gm-Message-State: APf1xPBJSNgA3V6a2gGu0DsrcjsjkGJoZ/vgXfCx01viWNSIFisxGsTD
	+xFhBDSqxcnEiD+2SBuc4sc/4cvt7pD6LOqAzrljwO+s
X-Google-Smtp-Source: AH8x225jePWFMfWTGQaYXgLtzsHU89Mf7o+o4Vlibm2bL+pVupPCAlCTs06RuIT7ne4B1whlloXEgxyze2Vyj1o3AHg=
X-Received: by 10.200.44.154 with SMTP id 26mr22784470qtw.214.1519014492736;
 Sun, 18 Feb 2018 20:28:12 -0800 (PST)
MIME-Version: 1.0
Received: by 10.237.62.232 with HTTP; Sun, 18 Feb 2018 20:28:12 -0800 (PST)
From: Mike DePaulo <mikedep333@gmail.com>
Date: Sun, 18 Feb 2018 23:28:12 -0500
Message-ID: <CAMKht8he2RvDvE914Dvh4+dTL2jvCijvtaug_ejN40yWESArmQ@mail.gmail.com>
Subject: x2goclient hangs when connecting with Kerberos auth
To: submit@bugs.x2go.org
Content-Type: text/plain; charset="UTF-8"

Package: x2goclient
Version: 4.1.1.0

When attempting to connect to an X2Go server with GSSAPI/Kerberos
auth, x2goclient hangs indefinitely.

This was observed with nightly builds for Windows, and was assumed to
be Windows-specific.

The fix has already been committed to master. I will update master
with another commit (& change to debian/changelog) stating that this
was fixed:
commit 7cbd8d525309edb8bd05d27ec57ac72e2d8c90e8
Author: Mike DePaulo <mikedep333@gmail.com>
Date:   Sun Feb 18 19:52:22 2018 -0500

    Do not attempt to perform Interaction with SSH Server

    (e.g. for changing expired password) when using GSSAPI/Kerberos
    because the interaction code does not support it yet.


But as I was fixing it, I noticed that Linux & Mac OS X are probably
affected too.

The cause of the issue is that the new Interaction Dialog feature
introduced by this commit contains libssh-specific function calls, but
we use PuTTY binaries on Windows & the OpenSSH ssh client binary on
Linux/MacOS for GSSAPI/Kerberos:
commit 68bbf328132125eaad5c53b0ac82490bf818e42e
Author: Oleksandr Shneyder <o.shneyder@phoca-gmbh.de>
Date:   Wed May 10 15:22:11 2017 +0200

    Interaction with SSH server (for example for changing expired
password). Fixes: #592.

And the "fix" for this is to bypass that new feature when
GSSAPI/Kerberos auth is used.

I will open up a separate issue about the fact that the Interaction
Dialog feature does not work with GSSAPI/Kerberos.

-Mike

------------=_1519907702-12373-0--
