X2Go Bug report logs - #323
x2go server refuses client with 'Error: Wrong version or invalid session authentication cookie.'

version graph

Package: x2goserver; Maintainer for x2goserver is X2Go Developers <x2go-dev@lists.x2go.org>; Source for x2goserver is src:x2goserver.

Reported by: harry mangalam <harry.mangalam@uci.edu>

Date: Mon, 14 Oct 2013 04:48:01 UTC

Severity: normal

Tags: moreinfo

Found in version 4.0.1

Full log


View this message in rfc822 format

X-Loop: owner@bugs.x2go.org
Subject: Bug#323: Alerta de correo
Reply-To: "Mail"<qubek@tlen.pl>, 323@bugs.x2go.org
Resent-From: "Mail"<qubek@tlen.pl>
Resent-To: x2go-dev@lists.x2go.org
Resent-CC: X2Go Developers <x2go-dev@lists.x2go.org>
X-Loop: owner@bugs.x2go.org
Resent-Date: Tue, 13 Nov 2018 14:50:01 +0000
Resent-Message-ID: <handler.323.B323.1542120445743@bugs.x2go.org>
Resent-Sender: owner@bugs.x2go.org
X-X2Go-PR-Message: followup 323
X-X2Go-PR-Package: x2goserver
X-X2Go-PR-Keywords: moreinfo
Received: via spool by 323-submit@bugs.x2go.org id=B323.1542120445743
          (code B ref 323); Tue, 13 Nov 2018 14:50:01 +0000
Received: (at 323) by bugs.x2go.org; 13 Nov 2018 14:47:25 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on
	ymir.das-netzwerkteam.de
X-Spam-Level: **
X-Spam-Status: No, score=2.1 required=3.0 tests=BAYES_50,FREEMAIL_FROM,
	HTML_MESSAGE,RCVD_IN_RP_RNBL,URIBL_BLOCKED autolearn=no
	autolearn_force=no version=3.4.2
Received: from localhost (localhost [127.0.0.1])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTP id B0EC15DAEE
	for <323@bugs.x2go.org>; Tue, 13 Nov 2018 15:47:24 +0100 (CET)
X-Virus-Scanned: Debian amavisd-new at ymir.das-netzwerkteam.de
Received: from ymir.das-netzwerkteam.de ([127.0.0.1])
	by localhost (ymir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024)
	with ESMTP id nRHN-FbKvwBs for <323@bugs.x2go.org>;
	Tue, 13 Nov 2018 15:47:11 +0100 (CET)
X-Greylist: delayed 367 seconds by postgrey-1.35 at ymir.das-netzwerkteam.de; Tue, 13 Nov 2018 15:47:09 CET
Received: from mercury.cupid.or.jp (mercury.cupid.or.jp [61.200.49.66])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTP id 0416F5DA81
	for <323@bugs.x2go.org>; Tue, 13 Nov 2018 15:47:08 +0100 (CET)
Received: from [192.168.8.163] (unknown [41.203.72.25])
	by mercury.cupid.or.jp (Postfix) with ESMTPA id 821D72C09FE96;
	Tue, 13 Nov 2018 23:40:47 +0900 (JST)
Content-Type: multipart/alternative; boundary="===============1312941449=="
MIME-Version: 1.0
To: Recipients <qubek@tlen.pl>
From: "Mail"<qubek@tlen.pl>
Date: Tue, 13 Nov 2018 15:40:35 +0100
Sensitivity: Personal
Message-Id: <20181113144724.B0EC15DAEE@ymir.das-netzwerkteam.de>
[Message part 1 (text/plain, inline)]
Estimado usuario de correo electrónico,
 Hay una alerta de seguridad en su cuenta de CORREO ELECTRÓNICO.
Haga clic abajo en "Verificar mi cuenta" para resolver este problema.
 Verificar mi cuenta
http://walahi247.tripod.com/
 ©Copyright 2018 INC.
[Message part 2 (text/html, inline)]

Send a report that this bug log contains spam.


X2Go Developers <owner@bugs.x2go.org>. Last modified: Wed Jul 24 05:01:59 2019; Machine Name: ymir.das-netzwerkteam.de

X2Go Bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.