From unknown Thu Mar 28 23:06:16 2024 MIME-Version: 1.0 X-Mailer: MIME-tools 5.507 (Entity 5.507) X-Loop: owner@bugs.x2go.org From: owner@bugs.x2go.org (X2Go Bug Tracking System) Subject: Bug#1258 closed by Mike DePaulo Mike DePaulo (X2Go issue (in src:x2goclient) has been marked as closed) Message-ID: References: <20180301123016.BD2F25DAE9@ymir.das-netzwerkteam.de> X-X2go-PR-Keywords: pending X-X2go-PR-Message: they-closed 1258 X-X2go-PR-Package: x2goclient X-X2go-PR-Source: x2goclient Date: Thu, 01 Mar 2018 12:35:02 +0000 Content-Type: multipart/mixed; boundary="----------=_1519907702-12373-0" This is a multi-part message in MIME format... ------------=_1519907702-12373-0 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 This is an automatic notification regarding your Bug report which was filed against the x2goclient package: #1258: x2goclient hangs when connecting with Kerberos auth It has been closed by Mike DePaulo Mike DePaulo . Their explanation is attached below along with your original report. If this explanation is unsatisfactory and you have not received a better one in a separate message then please contact Mike DePaulo Mike DePa= ulo by replying to this email. --=20 X2Go Bug Tracking System Contact owner@bugs.x2go.org with problems ------------=_1519907702-12373-0 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at control) by bugs.x2go.org; 1 Mar 2018 12:30:33 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on ymir.das-netzwerkteam.de X-Spam-Level: X-Spam-Status: No, score=-2.0 required=3.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FREEMAIL_FROM,NML_ADSP_CUSTOM_MED,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.1 Received: from localhost (localhost [127.0.0.1]) by ymir.das-netzwerkteam.de (Postfix) with ESMTP id 183F05DAEB; Thu, 1 Mar 2018 13:30:32 +0100 (CET) X-Virus-Scanned: Debian amavisd-new at ymir.das-netzwerkteam.de Received: from ymir.das-netzwerkteam.de ([127.0.0.1]) by localhost (ymir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RmpnLkA5HdYq; Thu, 1 Mar 2018 13:30:16 +0100 (CET) Received: by ymir.das-netzwerkteam.de (Postfix, from userid 1005) id BD2F25DAE9; Thu, 1 Mar 2018 13:30:16 +0100 (CET) From: =?utf-8?q?Mike_DePaulo?= Mike DePaulo To: 1258-submitter@bugs.x2go.org Cc: control@bugs.x2go.org, 1258@bugs.x2go.org Subject: X2Go issue (in src:x2goclient) has been marked as closed Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit Message-Id: <20180301123016.BD2F25DAE9@ymir.das-netzwerkteam.de> Date: Thu, 1 Mar 2018 13:30:16 +0100 (CET) close #1258 thanks Hello, we are very hopeful that X2Go issue #1258 reported by you has been resolved in the new release (4.1.1.1) of the X2Go source project »src:x2goclient«. You can view the complete changelog entry of src:x2goclient (4.1.1.1) below, and you can use the following link to view all the code changes between this and the last release of src:x2goclient. http://code.x2go.org/gitweb?p=x2goclient.git;a=commitdiff;h=b4421bf6fc16d46e68dde8a0b9d48252804a30f1;hp=d8f5e5a4a51724ef3620e7f347644338e2449444 If you feel that the issue has not been resolved satisfyingly, feel free to reopen this bug report or submit a follow-up report with further observations described based on the new released version of src:x2goclient. Thanks a lot for contributing to X2Go!!! light+love X2Go Git Admin (on behalf of the sender of this mail) --- X2Go Component: src:x2goclient Version: 4.1.1.1-2018.03.01 Status: RELEASE Date: Wed, 28 Feb 2018 20:53:41 -0500 Fixes: 1258 Changes: x2goclient (4.1.1.1-2018.03.01) RELEASED; urgency=medium . [ Mike DePaulo ] * New upstream version (4.1.1.1-2018.03.01): - src/sshmasterconnection.cpp: Do not attempt to perform Interaction with SSH Server (e.g. for changing expired password) when using GSSAPI/Kerberos because the interaction code does not support it yet. Fixes: #1258 - Windows: Update PuTTY from 0.68 to 0.70, which fixes PuTTY vulns vuln-indirect-dll-hijack-2 & vuln-indirect-dll-hijack-3. Note that x2goclient was only ever affected if the permissions on the installation folder were changed to give users write access, or if x2goclient was copied/extracted to a folder where users could write. ------------=_1519907702-12373-0 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at submit) by bugs.x2go.org; 19 Feb 2018 04:28:27 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on ymir.das-netzwerkteam.de X-Spam-Level: X-Spam-Status: No, score=-0.6 required=3.0 tests=BAYES_05,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FROM,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.1 Received: from localhost (localhost [127.0.0.1]) by ymir.das-netzwerkteam.de (Postfix) with ESMTP id 0D8DF5DAEA for ; Mon, 19 Feb 2018 05:28:20 +0100 (CET) X-Virus-Scanned: Debian amavisd-new at ymir.das-netzwerkteam.de Received: from ymir.das-netzwerkteam.de ([127.0.0.1]) by localhost (ymir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gc2zRvaIusNT for ; Mon, 19 Feb 2018 05:28:14 +0100 (CET) Received: from mail-qt0-x230.google.com (mail-qt0-x230.google.com [IPv6:2607:f8b0:400d:c0d::230]) by ymir.das-netzwerkteam.de (Postfix) with ESMTPS id 5D8795DAC9 for ; Mon, 19 Feb 2018 05:28:14 +0100 (CET) Received: by mail-qt0-x230.google.com with SMTP id v90so7990773qte.12 for ; Sun, 18 Feb 2018 20:28:14 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=3akfDnX8moS76YvzsbnT38ytmHFZI0lZJ44HOL4Zi74=; b=J1c8x5B4E+Nzyop799VTyPjan4MV1fH7YJ0+q8uLVqn2cmu8HeLcOZKHhyPiOe9Skf 2f0r56qqyFdF2cbjHQOnkkC+kNf4HPBRs+F0gRFI/1pzd9xKIFZwkuE2vkq+Rqhk+Pd3 SV5wvIrKAgBAGfaQ+wiPHiilcfy3wFPzxyGiqZ4H6VYg0Sk1LFsfhp/nQ97S/eiIpmbJ FLbEDV/JusFE4l1+DOopU109ZBev/uKRm76nyjoyWYct5JdX7noBe5eimucL9HP9reGo K03uJCib/TLMwubXptibxTwvJpKIC0vOVnoQpMVhE1AByGnFnzse9Gq9Rti2YkHNw/Qw bByg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=3akfDnX8moS76YvzsbnT38ytmHFZI0lZJ44HOL4Zi74=; b=eZd3tpxiTNVcYnbG8e7TeJBRNwufJSvJXoAP/S27tYB9WN8nzsEtzOKHBBWm+nlRBw 3iox9OQAEENbE0LR7J2N3e+EjA4N4gCumre7nc7BqPnnAcZxU28fc6KRoXBEqqBPjnnL KzC5rCQKyg/NRd4EgV6mOEjJFACNNWG0qO5vL2Q2fqC2w/AD5IleadP7J/qPBfDEREfQ vz2xm/zYmIVW4X7gh2Zg45NvFNMvzl2y2l2hNwEfs/Mr4FeI06JhaVssMSCiPGKFHYNl dmuZDyjn7EyeVOtgujr2dERnWr79xCR+LwXxuUIgoXid7OIdm3OZkUVfOZYW3MDUh165 y2ag== X-Gm-Message-State: APf1xPBJSNgA3V6a2gGu0DsrcjsjkGJoZ/vgXfCx01viWNSIFisxGsTD +xFhBDSqxcnEiD+2SBuc4sc/4cvt7pD6LOqAzrljwO+s X-Google-Smtp-Source: AH8x225jePWFMfWTGQaYXgLtzsHU89Mf7o+o4Vlibm2bL+pVupPCAlCTs06RuIT7ne4B1whlloXEgxyze2Vyj1o3AHg= X-Received: by 10.200.44.154 with SMTP id 26mr22784470qtw.214.1519014492736; Sun, 18 Feb 2018 20:28:12 -0800 (PST) MIME-Version: 1.0 Received: by 10.237.62.232 with HTTP; Sun, 18 Feb 2018 20:28:12 -0800 (PST) From: Mike DePaulo Date: Sun, 18 Feb 2018 23:28:12 -0500 Message-ID: Subject: x2goclient hangs when connecting with Kerberos auth To: submit@bugs.x2go.org Content-Type: text/plain; charset="UTF-8" Package: x2goclient Version: 4.1.1.0 When attempting to connect to an X2Go server with GSSAPI/Kerberos auth, x2goclient hangs indefinitely. This was observed with nightly builds for Windows, and was assumed to be Windows-specific. The fix has already been committed to master. I will update master with another commit (& change to debian/changelog) stating that this was fixed: commit 7cbd8d525309edb8bd05d27ec57ac72e2d8c90e8 Author: Mike DePaulo Date: Sun Feb 18 19:52:22 2018 -0500 Do not attempt to perform Interaction with SSH Server (e.g. for changing expired password) when using GSSAPI/Kerberos because the interaction code does not support it yet. But as I was fixing it, I noticed that Linux & Mac OS X are probably affected too. The cause of the issue is that the new Interaction Dialog feature introduced by this commit contains libssh-specific function calls, but we use PuTTY binaries on Windows & the OpenSSH ssh client binary on Linux/MacOS for GSSAPI/Kerberos: commit 68bbf328132125eaad5c53b0ac82490bf818e42e Author: Oleksandr Shneyder Date: Wed May 10 15:22:11 2017 +0200 Interaction with SSH server (for example for changing expired password). Fixes: #592. And the "fix" for this is to bypass that new feature when GSSAPI/Kerberos auth is used. I will open up a separate issue about the fact that the Interaction Dialog feature does not work with GSSAPI/Kerberos. -Mike ------------=_1519907702-12373-0--