X2Go Bug report logs -
#335
Users can inject arbitrary data into Pyhoca-GUI via .bashrc
Reported by: "Dan Halbert" <halbert@halwitz.org>
Date: Mon, 21 Oct 2013 12:48:02 UTC
Severity: grave
Tags: confirmed, pending
Fixed in version 0.4.0.9
Done: Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded
to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>
:
Bug#327
; Package x2goclient
.
(Mon, 21 Oct 2013 12:48:02 GMT) (full text, mbox, link).
Acknowledgement sent
to "Dan Halbert" <halbert@halwitz.org>
:
New Bug report received and forwarded. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>
.
(Mon, 21 Oct 2013 12:48:02 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.x2go.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Package: x2goclient
Version: 4.0.0.3
If I put an
echo "testing" # exact text doesn't matter
at the top of my .bashrc, then the x2goclient crashes immediately when trying to start a session.
(The crash does not occur if I put a similar statement in .bash_login.)
I have reproduced this on the Windows client; I believe a colleague saw it on both the Windows and Linux clients.
The x2go server being used is 4.0.1.6-0~712~precise1.
[Message part 2 (text/html, inline)]
Information forwarded
to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>
:
Bug#327
; Package x2goclient
.
(Tue, 29 Oct 2013 08:48:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>
.
(Tue, 29 Oct 2013 08:48:02 GMT) (full text, mbox, link).
Message #10 received at 327@bugs.x2go.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
tag #327 confirmed
thanks
Hi Dan,
On Sa 19 Okt 2013 18:22:43 CEST, Dan Halbert wrote:
> If I put an
> echo "testing" # exact text doesn't matter
I presume, this on the server.
> at the top of my .bashrc, then the x2goclient crashes immediately
> when trying to start a session.
>
> (The crash does not occur if I put a similar statement in .bash_login.)
>
> I have reproduced this on the Windows client; I believe a colleague
> saw it on both the Windows and Linux clients.
>
> The x2go server being used is 4.0.1.6-0~712~precise1.
I can confirm that the issue exists with latest X2Go Client.
I could confirm this issue on Debian wheezy or Ubuntu precise as X2Go
Server. On Ubuntu lucid, the problem does not occur.
Mike
--
DAS-NETZWERKTEAM
mike gabriel, herweg 7, 24357 fleckeby
fon: +49 (1520) 1976 148
GnuPG Key ID 0x25771B31
mail: mike.gabriel@das-netzwerkteam.de, http://das-netzwerkteam.de
freeBusy:
https://mail.das-netzwerkteam.de/freebusy/m.gabriel%40das-netzwerkteam.de.xfb
[Message part 2 (application/pgp-keys, inline)]
[Message part 3 (application/pgp-signature, inline)]
Added tag(s) confirmed.
Request was from Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
to control@bugs.x2go.org
.
(Tue, 29 Oct 2013 08:48:02 GMT) (full text, mbox, link).
Information forwarded
to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>
:
Bug#327
; Package x2goclient
.
(Tue, 29 Oct 2013 12:03:01 GMT) (full text, mbox, link).
Acknowledgement sent
to Dan Halbert <halbert@halwitz.org>
:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>
.
(Tue, 29 Oct 2013 12:03:01 GMT) (full text, mbox, link).
Message #17 received at 327@bugs.x2go.org (full text, mbox, reply):
On 10/29/2013 4:36 AM, Mike Gabriel wrote:
> If I put an
>> echo "testing" # exact text doesn't matter
>
> I presume, this on the server.
Right, this is on the server. With the Windows client there is no
.bashrc anyway. I confirmed with my colleague that he saw this on both
the Windows and Ubuntu Precise clients.
Which windowing system chosen on the server does not seem to matter
either. I saw it with UNITY and with just "Terminal".
> I could confirm this issue on Debian wheezy or Ubuntu precise as X2Go
> Server. On Ubuntu lucid, the problem does not occur.
That's interesting. The reason for putting in the echo's was to debug a
completely unrelated problem about which shell init got run when we were
running some batch jobs. I had instrumented the init files before
without difficulty. Thanks for looking at this.
Information forwarded
to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>
:
Bug#327
; Package x2goclient
.
(Tue, 29 Oct 2013 12:27:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>
.
(Tue, 29 Oct 2013 12:27:05 GMT) (full text, mbox, link).
Message #22 received at 327@bugs.x2go.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
clone #327 -1
tag #327 wontfix
retitle -1 users can inject data into X2Go Client using .bashrc
severity -1 grave
Hi Dan,
On Di 29 Okt 2013 12:55:05 CET, Dan Halbert wrote:
> On 10/29/2013 4:36 AM, Mike Gabriel wrote:
>> If I put an
>>> echo "testing" # exact text doesn't matter
>>
>> I presume, this on the server.
> Right, this is on the server. With the Windows client there is no
> .bashrc anyway. I confirmed with my colleague that he saw this on
> both the Windows and Ubuntu Precise clients.
>
> Which windowing system chosen on the server does not seem to matter
> either. I saw it with UNITY and with just "Terminal".
>
>> I could confirm this issue on Debian wheezy or Ubuntu precise as
>> X2Go Server. On Ubuntu lucid, the problem does not occur.
> That's interesting. The reason for putting in the echo's was to
> debug a completely unrelated problem about which shell init got run
> when we were running some batch jobs. I had instrumented the init
> files before without difficulty. Thanks for looking at this.
I have looked at this in depth this morning. Indeed an echoing .bashrc
file breaks X2Go. But it also breaks everything else around SSH, esp.
scp [1, 2].
The first link [1] also provides a solution that I want to quote here:
""" (file: ~/.bashrc)
[... normal .bashrc stuff ...]
if [[ $- =~ "i" ]]; then
echo "SPEAK OUT LOUD!!!"
fi
"""
The i-flag in $- checks if the shell is interactive or not. With X2Go,
this flag will not get set.
Greets,
Mike
[1]
http://stackoverflow.com/questions/12440287/scp-doesnt-work-when-echo-in-bashrc
[2] https://bugzilla.redhat.com/show_bug.cgi?id=20527
--
DAS-NETZWERKTEAM
mike gabriel, herweg 7, 24357 fleckeby
fon: +49 (1520) 1976 148
GnuPG Key ID 0x25771B31
mail: mike.gabriel@das-netzwerkteam.de, http://das-netzwerkteam.de
freeBusy:
https://mail.das-netzwerkteam.de/freebusy/m.gabriel%40das-netzwerkteam.de.xfb
[Message part 2 (application/pgp-keys, inline)]
[Message part 3 (application/pgp-signature, inline)]
Bug 327 cloned as bug 333
Request was from Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
to control@bugs.x2go.org
.
(Tue, 29 Oct 2013 12:27:05 GMT) (full text, mbox, link).
Changed Bug title to 'users can inject data into X2Go Client using .bashrc' from 'x2go client crashes if .bashrc prints anything'
Request was from Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
to control@bugs.x2go.org
.
(Tue, 29 Oct 2013 12:27:05 GMT) (full text, mbox, link).
Severity set to 'grave' from 'normal'
Request was from Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
to control@bugs.x2go.org
.
(Tue, 29 Oct 2013 12:27:05 GMT) (full text, mbox, link).
Information forwarded
to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>
:
Bug#333
; Package x2goclient
.
(Tue, 29 Oct 2013 12:41:17 GMT) (full text, mbox, link).
Acknowledgement sent
to Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>
.
(Tue, 29 Oct 2013 12:41:17 GMT) (full text, mbox, link).
Message #33 received at 333@bugs.x2go.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Hi All,
Dan Halbert made me aware of it being easily possible to inject
arbitrary data into X2Go Client via the server-side .bashrc file. This
surely is a security problem in X2Go.
Thus, I found that we really need to do some sanity checks on incoming
output from X2Go Servers to avoid such injections.
The idea is to invoke the server-side command with a UUID hash before
and after the actuall command invocation:
1. execute server-side command from X2Go Client:
ssh <user>@<server> sh -c "echo <uuidhash> && <x2gocmd> && echo <uuidhash>
2. read data from X2Go Server:
X2GODATABEGIN:<uuidhash>
<x2godata_line1>
<x2godata_line2>
....
<x2godata_lineN>
X2GODATAEND:<uuidhash>
3. cut out the X2Go data returned by the server (in C++):
QString begin_marker = "X2GODATABEGIN:"+uuid+"\n";
QString end_marker = "X2GODATAEND:"+uuid+"\n";
int output_begin=stdOutString.indexOf(begin_marker) + \\
begin_marker.length();
int output_end=stdOutString.indexOf(end_marker);
output = stdOutString.mid(output_begin, \\
output_end-output_begin);
I have a patch locally for this and will commit it in a minute. We can
discuss the patch and move on from there when it's there.
Unfortunately, this patch does not fix #327 as it is impossible to use
scp with echoing .bashrc files. With this patch applied, the session
starts, but setting up the SSHfs shares fails with locking up X2Go
Client.
For people who depend on echoing .bashrc files, please read my last
post on #327.
Mike
--
DAS-NETZWERKTEAM
mike gabriel, herweg 7, 24357 fleckeby
fon: +49 (1520) 1976 148
GnuPG Key ID 0x25771B31
mail: mike.gabriel@das-netzwerkteam.de, http://das-netzwerkteam.de
freeBusy:
https://mail.das-netzwerkteam.de/freebusy/m.gabriel%40das-netzwerkteam.de.xfb
[Message part 2 (application/pgp-keys, inline)]
[Message part 3 (application/pgp-signature, inline)]
Information forwarded
to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>
:
Bug#333
; Package x2goclient
.
(Tue, 29 Oct 2013 12:41:17 GMT) (full text, mbox, link).
Acknowledgement sent
to Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>
.
(Tue, 29 Oct 2013 12:41:17 GMT) (full text, mbox, link).
Message #38 received at 333@bugs.x2go.org (full text, mbox, reply):
tag #333 pending
fixed #333 4.0.1.2
thanks
Hello,
X2Go issue #333 (src:x2goclient) reported by you has been
fixed in X2Go Git. You can see the changelog below, and you can
check the diff of the fix at:
http://code.x2go.org/gitweb?p=x2goclient.git;a=commitdiff;h=c121b7e
The issue will most likely be fixed in src:x2goclient (4.0.1.2).
light+love
X2Go Git Admin (on behalf of the sender of this mail)
---
commit c121b7e2d3d83abdc2d7a29637bc3294e38b2ec3
Author: Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
Date: Tue Oct 29 13:36:58 2013 +0100
Perform sanity checks on data that comes in from X2Go Servers. Prohibit the execution of arbitrary code via the ~/.bashrc file. (Fixes: #333).
diff --git a/debian/changelog b/debian/changelog
index e484ba5..e069591 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -8,6 +8,9 @@ x2goclient (4.0.1.2-0~x2go2) UNRELEASED; urgency=low
+ Store broker HTTPS certificate exceptions in
$HOME/.x2go/ssl/exceptions (before: $HOME/ssl/exceptions).
(Fixes: #328).
+ + Perform sanity checks on data that comes in from X2Go Servers.
+ Prohibit the execution of arbitrary code via the ~/.bashrc file.
+ (Fixes: #333).
* Pull-in packaging changes from Debian.
[ Ricardo Díaz Martín ]
Added tag(s) pending.
Request was from Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
to control@bugs.x2go.org
.
(Tue, 29 Oct 2013 12:41:18 GMT) (full text, mbox, link).
Marked as fixed in versions 4.0.1.2.
Request was from Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
to control@bugs.x2go.org
.
(Tue, 29 Oct 2013 12:41:18 GMT) (full text, mbox, link).
Message sent on
to "Dan Halbert" <halbert@halwitz.org>
:
Bug#333.
(Tue, 29 Oct 2013 12:41:18 GMT) (full text, mbox, link).
Information forwarded
to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>
:
Bug#333
; Package x2goclient
.
(Tue, 29 Oct 2013 13:18:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Dan Halbert <halbert@halwitz.org>
:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>
.
(Tue, 29 Oct 2013 13:18:02 GMT) (full text, mbox, link).
Message #50 received at 333@bugs.x2go.org (full text, mbox, reply):
Hi Mike, this fix to authenticate the commands is good. I didn't realize
I was uncovering a security problem.
One question: the underlying crash was due to bad data. If authenticated
but still bad data is sent, will the client still crash? I am thinking
about a malicious server crafting something to crash the client or have
it do something bad. I looked at the code diff and I didn't see some
underlying verification of the x2go commands.
E.g.:
X2GODATABEGIN:<good-uuidhash>
bad data here
X2GODATAEND:<good-uuidhash>
Information forwarded
to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>
:
Bug#333
; Package x2goclient
.
(Tue, 29 Oct 2013 13:18:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>
.
(Tue, 29 Oct 2013 13:18:02 GMT) (full text, mbox, link).
Message #55 received at 333@bugs.x2go.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Hi Dan,
On Di 29 Okt 2013 13:59:30 CET, Dan Halbert wrote:
> Hi Mike, this fix to authenticate the commands is good. I didn't
> realize I was uncovering a security problem.
>
> One question: the underlying crash was due to bad data. If
> authenticated but still bad data is sent, will the client still
> crash? I am thinking about a malicious server crafting something to
> crash the client or have it do something bad. I looked at the code
> diff and I didn't see some underlying verification of the x2go
> commands.
>
> E.g.:
> X2GODATABEGIN:<good-uuidhash>
> bad data here
> X2GODATAEND:<good-uuidhash>
I would indeed call this work in progress. See #334 for the ,,bad data
here'' location you address above.
We surely need a means to ensure that the data sent over the wire is
sane. An idea could be to encrypt/decrypt the data asymmetrically.
Maybe something else...
Hmmm...
I don't think that evaluating the data in itself (via regexp e.g.)
will lead to good results. We should invent a method that is common to
all sorts of text data and makes sure that the data is for the client
that requested it.
On the other hand... If you cannot trust your admin, who can you trust???
Any contribution of ideas is welcome.
Mike
--
DAS-NETZWERKTEAM
mike gabriel, herweg 7, 24357 fleckeby
fon: +49 (1520) 1976 148
GnuPG Key ID 0x25771B31
mail: mike.gabriel@das-netzwerkteam.de, http://das-netzwerkteam.de
freeBusy:
https://mail.das-netzwerkteam.de/freebusy/m.gabriel%40das-netzwerkteam.de.xfb
[Message part 2 (application/pgp-keys, inline)]
[Message part 3 (application/pgp-signature, inline)]
Information forwarded
to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>
:
Bug#333
; Package x2goclient
.
(Tue, 29 Oct 2013 13:48:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>
.
(Tue, 29 Oct 2013 13:48:02 GMT) (full text, mbox, link).
Message #60 received at 333@bugs.x2go.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
clone #333 -1
reassign -1 python-x2go
retitle -1 Users can inject arbitrary data into Pyhoca-GUI via .bashrc
thanks
Hi All,
On Di 29 Okt 2013 13:36:14 CET, Mike Gabriel wrote:
> Hi All,
>
> Dan Halbert made me aware of it being easily possible to inject
> arbitrary data into X2Go Client via the server-side .bashrc file.
> This surely is a security problem in X2Go.
>
> Thus, I found that we really need to do some sanity checks on
> incoming output from X2Go Servers to avoid such injections.
>
> The idea is to invoke the server-side command with a UUID hash
> before and after the actuall command invocation:
>
> 1. execute server-side command from X2Go Client:
>
> ssh <user>@<server> sh -c "echo <uuidhash> && <x2gocmd> && echo <uuidhash>
>
> 2. read data from X2Go Server:
>
> X2GODATABEGIN:<uuidhash>
> <x2godata_line1>
> <x2godata_line2>
> ....
> <x2godata_lineN>
> X2GODATAEND:<uuidhash>
>
> 3. cut out the X2Go data returned by the server (in C++):
>
> QString begin_marker = "X2GODATABEGIN:"+uuid+"\n";
> QString end_marker = "X2GODATAEND:"+uuid+"\n";
> int output_begin=stdOutString.indexOf(begin_marker) + \\
> begin_marker.length();
> int output_end=stdOutString.indexOf(end_marker);
> output = stdOutString.mid(output_begin, \\
> output_end-output_begin);
>
>
> I have a patch locally for this and will commit it in a minute. We
> can discuss the patch and move on from there when it's there.
>
> Unfortunately, this patch does not fix #327 as it is impossible to
> use scp with echoing .bashrc files. With this patch applied, the
> session starts, but setting up the SSHfs shares fails with locking
> up X2Go Client.
>
> For people who depend on echoing .bashrc files, please read my last
> post on #327.
>
> Mike
This actually also applies to Python X2Go.
Mike
--
DAS-NETZWERKTEAM
mike gabriel, herweg 7, 24357 fleckeby
fon: +49 (1520) 1976 148
GnuPG Key ID 0x25771B31
mail: mike.gabriel@das-netzwerkteam.de, http://das-netzwerkteam.de
freeBusy:
https://mail.das-netzwerkteam.de/freebusy/m.gabriel%40das-netzwerkteam.de.xfb
[Message part 2 (application/pgp-keys, inline)]
[Message part 3 (application/pgp-signature, inline)]
Bug 333 cloned as bug 335
Request was from Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
to control@bugs.x2go.org
.
(Tue, 29 Oct 2013 13:48:03 GMT) (full text, mbox, link).
Bug reassigned from package 'x2goclient' to 'python-x2go'.
Request was from Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
to control@bugs.x2go.org
.
(Tue, 29 Oct 2013 13:48:03 GMT) (full text, mbox, link).
No longer marked as found in versions 4.0.0.3.
Request was from Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
to control@bugs.x2go.org
.
(Tue, 29 Oct 2013 13:48:03 GMT) (full text, mbox, link).
No longer marked as fixed in versions 4.0.1.2.
Request was from Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
to control@bugs.x2go.org
.
(Tue, 29 Oct 2013 13:48:03 GMT) (full text, mbox, link).
Changed Bug title to 'Users can inject arbitrary data into Pyhoca-GUI via .bashrc' from 'users can inject data into X2Go Client using .bashrc'
Request was from Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
to control@bugs.x2go.org
.
(Tue, 29 Oct 2013 13:48:03 GMT) (full text, mbox, link).
Information forwarded
to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>
:
Bug#335
; Package python-x2go
.
(Tue, 29 Oct 2013 17:48:01 GMT) (full text, mbox, link).
Acknowledgement sent
to Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>
.
(Tue, 29 Oct 2013 17:48:01 GMT) (full text, mbox, link).
Message #75 received at 335@bugs.x2go.org (full text, mbox, reply):
tag #335 pending
fixed #335 0.4.0.9
thanks
Hello,
X2Go issue #335 (src:python-x2go) reported by you has been
fixed in X2Go Git. You can see the changelog below, and you can
check the diff of the fix at:
http://code.x2go.org/gitweb?p=python-x2go.git;a=commitdiff;h=5b8164d
The issue will most likely be fixed in src:python-x2go (0.4.0.9).
light+love
X2Go Git Admin (on behalf of the sender of this mail)
---
commit 5b8164de3596bd79e89de18e574252b2730b0916
Author: Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
Date: Tue Oct 29 18:36:06 2013 +0100
Handle echoing ~/.*shrc files gracefully via SSH client connections. Do not allow data injections via ~/.*shrc files. (Fixes: #335).
diff --git a/debian/changelog b/debian/changelog
index eb4b587..cee5b48 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -19,6 +19,8 @@ python-x2go (0.4.0.9-0~x2go1) UNRELEASED; urgency=low
- Implement two-factor authentication.
- Compat fix in _paramiko monkey patch module to also work with early Paramiko
versions.
+ - Handle echoing ~/.*shrc files gracefully via SSH client connections. Do not allow
+ data injections via ~/.*shrc files. (Fixes: #335).
[ Orion Poplawski ]
* debian/control:
Marked as fixed in versions 0.4.0.9.
Request was from Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
to control@bugs.x2go.org
.
(Tue, 29 Oct 2013 17:48:02 GMT) (full text, mbox, link).
Message sent on
to "Dan Halbert" <halbert@halwitz.org>
:
Bug#335.
(Tue, 29 Oct 2013 17:48:02 GMT) (full text, mbox, link).
Information forwarded
to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>
:
Bug#335
; Package python-x2go
.
(Wed, 08 Jan 2014 14:35:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>
.
(Wed, 08 Jan 2014 14:35:02 GMT) (full text, mbox, link).
Message #85 received at 335@bugs.x2go.org (full text, mbox, reply):
close #335
thanks
Hello,
we are very hopeful that X2Go issue #335 reported by you
has been resolved in the new release (0.4.0.9) of the
X2Go source project »src:python-x2go«.
You can view the complete changelog entry of src:python-x2go (0.4.0.9)
below, and you can use the following link to view all the code changes
between this and the last release of src:python-x2go.
http://code.x2go.org/gitweb?p=python-x2go.git;a=commitdiff;h=62f82b9324d1ed8240af1ad0bf0e5ff82f08ee49;hp=000e5e38e26713f485314365486d05b93100a189
If you feel that the issue has not been resolved satisfyingly, feel
free to reopen this bug report or submit a follow-up report with
further observations described based on the new released version
of src:python-x2go.
Thanks a lot for contributing to X2Go!!!
light+love
X2Go Git Admin (on behalf of the sender of this mail)
---
X2Go Component: src:python-x2go
Version: 0.4.0.9-0x2go1
Status: RELEASE
Date: Wed, 08 Jan 2014 15:14:16 +0100
Fixes: 329 330 335
Changes:
python-x2go (0.4.0.9-0x2go1) RELEASED; urgency=low
.
[ Mike Gabriel ]
* New upstream version (0.4.0.9):
- Agent channels in Paramiko can raise an EOFError if the connection
has got disrupted. Ignoring this.
- Store the session password in base64 encoded string in order to make
it harder spotting the long term stored (for the duration of the session)
plain text password.
- Support encryption passphrases on SSH private key files (X2Go SSH
connections as well as SSH proxy connections).
- Invalidate SSH private keys (filename, pkey object) when look_for_keys is
requested.
- Keep private key information even if force_password_auth is set in the
control session's connect() method.
- Fix parameter handling in X2GoSession.connect().
- Rewrite passwords that are not string/unicode to an empty string.
- No Unicode chars in log messages. Eliminated one more in checkhosts.py.
- Implement two-factor authentication.
- Compat fix in _paramiko monkey patch module to also work with early
Paramiko versions.
- Handle echoing ~/.*shrc files gracefully via SSH client connections. Do
not allow data injections via ~/.*shrc files. (Fixes: #335).
- Properly handle (=expand) the "~" character in key filenames. (Brought to
attention by Eldamir on IRC. Thanks!).
- Differentiate between desktop sharing errors and desktop sharing access
that gets denied by the other/remote user.
- Report about found session window / session window retitling in debug
mode.
- Fix session window detection when local session manager is the i3 session
manager (which uses _NET_CLIENT_LIST_STACKING instead of
_NET_CLIENT_LIST).
- Check for pulse cookie file in old (~/.pulse-cookie) and new
(~/.config/pulse/cookie) location.
- Import python-x2go-py3.patch from Fedora. Thanks to Orion!!!
- Improve setup.py script: make it run with Python3 and older Python2
versions.
- Fix tests for two-factor authentication in control session and SSH proxy
code.
- Fix regression: Make password logins with PyHoca-CLI succeed again.
- Make channel compression to all authentication methods.
- Set keepalive on proxy channel.
- Only use [<host>]:<port> if <port> is not 22.
- Handle host key checks for hosts that do not have a port specified.
* debian/source/format:
+ Switch to format 1.0.
* python-x2go.spec:
+ Ship python-x2go.spec (RPM package definitions) in upstream project.
(Thanks to the Fedora package maintainers).
+ Clear (Fedora package) changelog.
+ Drop dependency on python-cups.
.
[ Orion Poplawski ]
* debian/control:
+ Drop python-cups from Depends: field. Python CUPS is no dependency if
Python X2Go. (Fixes: #329).
.
[ Kenneth Pedersen ]
* New upstream version (0.4.0.9):
- Color depth detection: Stop using win32api.GetSystemMetrics(2) which actually
returns the width of a vertical scroll bar in pixels. Instead, create a screen
display context and query it for the color depth. (Fixes: #330).
Marked Bug as done
Request was from Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
to control@bugs.x2go.org
.
(Wed, 08 Jan 2014 14:35:03 GMT) (full text, mbox, link).
Notification sent
to "Dan Halbert" <halbert@halwitz.org>
:
Bug acknowledged by developer.
(Wed, 08 Jan 2014 14:35:03 GMT) (full text, mbox, link).
Message sent on
to "Dan Halbert" <halbert@halwitz.org>
:
Bug#335.
(Wed, 08 Jan 2014 14:35:04 GMT) (full text, mbox, link).
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.x2go.org>
to internal_control@bugs.x2go.org
.
(Thu, 06 Feb 2014 06:24:01 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
X2Go Developers <owner@bugs.x2go.org>.
Last modified:
Thu Nov 21 15:46:44 2024;
Machine Name:
ymir.das-netzwerkteam.de
X2Go Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.