X2Go Bug report logs - #1557
Windows client crashes when connecting to RHEL8

version graph

Package: x2goclient; Maintainer for x2goclient is X2Go Developers <x2go-dev@lists.x2go.org>; Source for x2goclient is src:x2goclient.

Reported by: Hans Peter Verne <h.p.verne@geo.uio.no>

Date: Thu, 5 Aug 2021 14:45:02 UTC

Severity: normal

Found in version 4.1.2.2

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.x2go.org
Subject: Bug#1557: Windows client crashes when connecting to RHEL8
Reply-To: Hans Peter Verne <h.p.verne@geo.uio.no>, 1557@bugs.x2go.org
Resent-From: Hans Peter Verne <h.p.verne@geo.uio.no>
Resent-To: x2go-dev@lists.x2go.org
Resent-CC: X2Go Developers <x2go-dev@lists.x2go.org>
X-Loop: owner@bugs.x2go.org
Resent-Date: Thu, 05 Aug 2021 14:45:02 +0000
Resent-Message-ID: <handler.1557.B.162817464518886@bugs.x2go.org>
Resent-Sender: owner@bugs.x2go.org
X-X2Go-PR-Message: report 1557
X-X2Go-PR-Package: x2goclient
X-X2Go-PR-Keywords: 
Received: via spool by submit@bugs.x2go.org id=B.162817464518886
          (code B); Thu, 05 Aug 2021 14:45:02 +0000
Received: (at submit) by bugs.x2go.org; 5 Aug 2021 14:44:05 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on
	ymir.das-netzwerkteam.de
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 required=3.0 tests=BAYES_00,SPF_HELO_PASS,
	URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.2
Received: from mail-out04.uio.no (mail-out04.uio.no [IPv6:2001:700:100:8210::76])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTPS id D4EF05DD10
	for <submit@bugs.x2go.org>; Thu,  5 Aug 2021 16:43:53 +0200 (CEST)
Received: from mail-mx10.uio.no ([129.240.10.27])
	by mail-out04.uio.no with esmtps  (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
	(Exim 4.94.2)
	(envelope-from <h.p.verne@geo.uio.no>)
	id 1mBebA-008u8Q-GC
	for submit@bugs.x2go.org; Thu, 05 Aug 2021 16:43:52 +0200
Received: from tai.uio.no ([129.240.26.18])
	by mail-mx10.uio.no with esmtpsa (TLS1.2:ECDHE-RSA-AES128-GCM-SHA256:128)
	user hpverne (Exim 4.94.2)
	(envelope-from <h.p.verne@geo.uio.no>)
	id 1mBeb8-0005Me-Go; Thu, 05 Aug 2021 16:43:52 +0200
From: Hans Peter Verne <h.p.verne@geo.uio.no>
To: submit@bugs.x2go.org
Cc: Hans Peter Verne <h.p.verne@geo.uio.no>
Message-ID: <372b7f8e-8d40-8fc7-6789-cab8db717cf4@geo.uio.no>
Date: Thu, 5 Aug 2021 16:43:50 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
 Thunderbird/78.11.0
MIME-Version: 1.0
Content-Type: multipart/mixed;
 boundary="------------B1242ACF7F50D272B83E3F72"
Content-Language: en-US
X-UiO-SPF-Received: Received-SPF: neutral (mail-mx10.uio.no: 129.240.26.18 is neither permitted nor denied by domain of geo.uio.no) client-ip=129.240.26.18; envelope-from=h.p.verne@geo.uio.no; helo=[129.240.26.18];
X-UiO-Spam-info: not spam, SpamAssassin (score=-5.0, required=5.0, autolearn=disabled, AWL=-0.046,UIO_MAIL_IS_INTERNAL=-5)
X-UiO-Scanned: F1CDF70C35B6621E4BF86FC40BAFF33922558B69
[Message part 1 (text/plain, inline)]
Package: x2goclient
Version: 4.1.2.2

Hello, devs!

I'm afraid this is not a very precise bug report.  Any assistance in
how to investigate this is appreciated.

We're running x2goclient 4.1.2.2 on Windows-10 machines, this has served
us well up to now.  With our new RedHat Enterprise Server 8.4 in production,
we see the client crashing very often.

When the client crashes, it does so shortly after trying to log in to a
new or existing session.  The clients "show details" window pane is activated, 
but the client dies before anything can be seen there.

On the server, just these entries in the system logs appears:

Aug 05 14:42:56 mimi.uio.no sshd[2421324]: Connection from 2001:700:100:4028:9462:e3c7:21c5:ec1c port 49763 on 2001:700:100:118::101 port 22
Aug 05 14:42:59 mimi.uio.no sshd[2421324]: Connection reset by 2001:700:100:4028:9462:e3c7:21c5:ec1c port 49763 [preauth]

If I disable IPv6:

Aug 05 14:45:30 mimi.uio.no sshd[2421601]: Connection from 193.157.161.44 port 57619 on 129.240.118.101 port 22
Aug 05 14:45:33 mimi.uio.no sshd[2421601]: Connection reset by 193.157.161.44 port 57619 [preauth]

Note the absence of the "Fail password for ..." log entry.  It looks like
it never gets to even try authenticating.

There is no problem logging in with putty from the same client machine,
both with IPv6 and IPv4.  Neither have I had this problem (at least
not so frequent) with the Linux client.

The server is running sshd and x2goserver from the RHEL8/EPEL repos,
packages openssh-server-8.0p1-6 and x2goserver-4.1.0.3-9, respectively.

I eventually tried to run sshd -ddd on the server and catch the output.  
The typescripts are attached (slightly edited): one where the client crashed;
and one where it didn't (but couldn't authenticate, bad password).  I'm no
expert on ssh, but it seems like the difference appears after the key exchange
("KEX done"), when the instance that crashed never reaches the bit with 
userauth-request.

I also tried "setenforce 0" on the server, i.e. disable SELinux, but the
client still crashed.

As it is, I can't clearly provide a procedure to reproduce the problem,
as it doesn't always happen. 

If more information is required, or there are suggested steps to take,
please let me know.


Thanks in advance, and best regards,
-- 
Hans Peter Verne  --  IT-drift Geofag.

In 1934, Van der Lubbe was beheaded in a German prison yard. In 1967, a court
in West Berlin overturned the 1933 verdict, and posthumously changed Van der
Lubbe's sentence to eight years in prison.  -- "Reichstag fire" on Wikipedia.
[sshd.debug-x2go_access-denied (text/plain, attachment)]
[sshd.debug-x2go_crash (text/plain, attachment)]

Send a report that this bug log contains spam.


X2Go Developers <owner@bugs.x2go.org>. Last modified: Sat Nov 23 22:12:25 2024; Machine Name: ymir.das-netzwerkteam.de

X2Go Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.