X2Go Bug report logs - #372
x2goadmin writes to users homes

Package: x2goserver; Maintainer for x2goserver is X2Go Developers <x2go-dev@lists.x2go.org>; Source for x2goserver is src:x2goserver.

Reported by: Reinhard Tartler <siretart@gmail.com>

Date: Sun, 15 Dec 2013 00:18:02 UTC

Severity: serious

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>:
Bug#372; Package x2goserver. (Sun, 15 Dec 2013 00:18:02 GMT) Full text and rfc822 format available.

Acknowledgement sent to Reinhard Tartler <siretart@gmail.com>:
New Bug report received and forwarded. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>. (Sun, 15 Dec 2013 00:18:02 GMT) Full text and rfc822 format available.

Message #5 received at submit@bugs.x2go.org (full text, mbox):

From: Reinhard Tartler <siretart@gmail.com>
To: submit@bugs.x2go.org
Subject: x2goadmin writes to users homes
Date: Sat, 14 Dec 2013 19:13:35 -0500
Package: x2goserver
Severity: serious

Hi,

my understanding of the x2goadmin code [code], end of sub add_user, is
that the code tries to write the sql password in users homes. This
will fail for installations that have the user homes on NFS with the
option "rootsquash" mounted.

I set the severity to "serious" because I imagine that this is a
rather common scenario.

Also, this approach has another problem: Imagine you want to give
access to the unix group "staff"? According to the documentation, you
can use the options "--addgroup" and "--rmgroup" for this. What if a
new employee joins the company later and wants to use x2go? In this
case you need to call x2godbadmin for this new user again, which is
suboptimal.

Is there really no way to get around generated user passwords?

[code] http://code.x2go.org/gitweb?p=x2goserver.git;a=blob;f=x2goserver/sbin/x2godbadmin

-- 
regards,
    Reinhard


Information forwarded to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>:
Bug#372; Package x2goserver. (Mon, 16 Dec 2013 07:48:02 GMT) Full text and rfc822 format available.

Acknowledgement sent to Mike Gabriel <mike.gabriel@das-netzwerkteam.de>:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>. (Mon, 16 Dec 2013 07:48:02 GMT) Full text and rfc822 format available.

Message #10 received at 372@bugs.x2go.org (full text, mbox):

From: Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
To: Reinhard Tartler <siretart@gmail.com>, 372@bugs.x2go.org
Cc: o.schneyder@phoca-gmbh.de
Subject: Re: [X2Go-Dev] Bug#372: x2goadmin writes to users homes
Date: Mon, 16 Dec 2013 07:34:34 +0000
[Message part 1 (text/plain, inline)]
Hi Reinhard,

On  So 15 Dez 2013 01:13:35 CET, Reinhard Tartler wrote:

> Package: x2goserver
> Severity: serious
>
> Hi,
>
> my understanding of the x2goadmin code [code], end of sub add_user, is
> that the code tries to write the sql password in users homes. This
> will fail for installations that have the user homes on NFS with the
> option "rootsquash" mounted.
>
> I set the severity to "serious" because I imagine that this is a
> rather common scenario.
>
> Also, this approach has another problem: Imagine you want to give
> access to the unix group "staff"? According to the documentation, you
> can use the options "--addgroup" and "--rmgroup" for this. What if a
> new employee joins the company later and wants to use x2go? In this
> case you need to call x2godbadmin for this new user again, which is
> suboptimal.
>
> Is there really no way to get around generated user passwords?
>
> [code]  
> http://code.x2go.org/gitweb?p=x2goserver.git;a=blob;f=x2goserver/sbin/x2godbadmin

I install x2goserver on the file servers and run x2godbadmin there  
daily in a cron job.

If you have distributed file servers, one should test for the $HOME to  
be accessible in x2godbadmin.

If needed, we could split out x2godbadmin from the x2goserver package  
and provide it as a standalone package.

As this is a workaround and not a solution to your question above,  
let's see if Alex has a comment on this.

Mike
-- 

DAS-NETZWERKTEAM
mike gabriel, herweg 7, 24357 fleckeby
fon: +49 (1520) 1976 148

GnuPG Key ID 0x25771B31
mail: mike.gabriel@das-netzwerkteam.de, http://das-netzwerkteam.de

freeBusy:
https://mail.das-netzwerkteam.de/freebusy/m.gabriel%40das-netzwerkteam.de.xfb
[Message part 2 (application/pgp-signature, inline)]

Information forwarded to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>:
Bug#372; Package x2goserver. (Mon, 16 Dec 2013 12:48:02 GMT) Full text and rfc822 format available.

Acknowledgement sent to Reinhard Tartler <siretart@gmail.com>:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>. (Mon, 16 Dec 2013 12:48:02 GMT) Full text and rfc822 format available.

Message #15 received at 372@bugs.x2go.org (full text, mbox):

From: Reinhard Tartler <siretart@gmail.com>
To: Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
Cc: 372@bugs.x2go.org, o.schneyder@phoca-gmbh.de
Subject: Re: [X2Go-Dev] Bug#372: x2goadmin writes to users homes
Date: Mon, 16 Dec 2013 07:33:40 -0500
On Mon, Dec 16, 2013 at 2:34 AM, Mike Gabriel
<mike.gabriel@das-netzwerkteam.de> wrote:
> I install x2goserver on the file servers and run x2godbadmin there daily in
> a cron job.
>
> If you have distributed file servers, one should test for the $HOME to be
> accessible in x2godbadmin.

What to do if it isn't accesible? Then the user won't get a password
to access the postgres, and x2godbadmin will fail silently. That's
even worse!

> If needed, we could split out x2godbadmin from the x2goserver package and
> provide it as a standalone package.

I don't see any benefit in doing so other than moving the problem
around instead of solving it.

Cheers,

-- 
regards,
    Reinhard


Information forwarded to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>:
Bug#372; Package x2goserver. (Mon, 16 Dec 2013 14:18:01 GMT) Full text and rfc822 format available.

Acknowledgement sent to Alexander Wuerstlein <snalwuer@cip.informatik.uni-erlangen.de>:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>. (Mon, 16 Dec 2013 14:18:01 GMT) Full text and rfc822 format available.

Message #20 received at 372@bugs.x2go.org (full text, mbox):

From: Alexander Wuerstlein <snalwuer@cip.informatik.uni-erlangen.de>
To: Mike Gabriel <mike.gabriel@das-netzwerkteam.de>, 372@bugs.x2go.org, x2go-dev@lists.berlios.de
Cc: Reinhard Tartler <siretart@gmail.com>, o.schneyder@phoca-gmbh.de
Subject: Re: [X2Go-Dev] Bug#372: Bug#372: x2goadmin writes to users homes
Date: Mon, 16 Dec 2013 14:59:40 +0100
On 13-12-16 08:49, Mike Gabriel <mike.gabriel@das-netzwerkteam.de> wrote:
> Hi Reinhard,
> 
> On  So 15 Dez 2013 01:13:35 CET, Reinhard Tartler wrote:
> 
> >Package: x2goserver
> >Severity: serious
> >
> >Hi,
> >
> >my understanding of the x2goadmin code [code], end of sub add_user, is
> >that the code tries to write the sql password in users homes. This
> >will fail for installations that have the user homes on NFS with the
> >option "rootsquash" mounted.
> >
> >I set the severity to "serious" because I imagine that this is a
> >rather common scenario.
> >
> >Also, this approach has another problem: Imagine you want to give
> >access to the unix group "staff"? According to the documentation, you
> >can use the options "--addgroup" and "--rmgroup" for this. What if a
> >new employee joins the company later and wants to use x2go? In this
> >case you need to call x2godbadmin for this new user again, which is
> >suboptimal.
> >
> >Is there really no way to get around generated user passwords?

There is a way that could work: If configured correctly, postgresql can
use GSSAPI (Kerberos) Authentication. That way, the user is
authenticated using his login ticket cache which is created anyways.
If necessary, one could also provide a keyfile for the cleanup-cronjob
so that it can at least access the database with sufficient permissions. 

But I have never tried this with x2go and don't know if it would work.



Ciao,

Alexander Wuerstlein.


Information forwarded to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>:
Bug#372; Package x2goserver. (Mon, 16 Dec 2013 14:33:02 GMT) Full text and rfc822 format available.

Acknowledgement sent to Reinhard Tartler <siretart@gmail.com>:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>. (Mon, 16 Dec 2013 14:33:02 GMT) Full text and rfc822 format available.

Message #25 received at 372@bugs.x2go.org (full text, mbox):

From: Reinhard Tartler <siretart@gmail.com>
To: Alexander Wuerstlein <snalwuer@cip.informatik.uni-erlangen.de>
Cc: 372@bugs.x2go.org, o.schneyder@phoca-gmbh.de, Mike Gabriel <mike.gabriel@das-netzwerkteam.de>, x2go-dev@lists.berlios.de
Subject: Re: [X2Go-Dev] Bug#372: Bug#372: x2goadmin writes to users homes
Date: Mon, 16 Dec 2013 09:31:48 -0500
[Message part 1 (text/plain, inline)]
On Dec 16, 2013 8:59 AM, "Alexander Wuerstlein" <
snalwuer@cip.informatik.uni-erlangen.de> wrote:
>
> On 13-12-16 08:49, Mike Gabriel <mike.gabriel@das-netzwerkteam.de> wrote:
> > Hi Reinhard,
> >
> > On  So 15 Dez 2013 01:13:35 CET, Reinhard Tartler wrote:
> >
> > >Package: x2goserver
> > >Severity: serious
> > >
> > >Hi,
> > >
> > >my understanding of the x2goadmin code [code], end of sub add_user, is
> > >that the code tries to write the sql password in users homes. This
> > >will fail for installations that have the user homes on NFS with the
> > >option "rootsquash" mounted.
> > >
> > >I set the severity to "serious" because I imagine that this is a
> > >rather common scenario.
> > >
> > >Also, this approach has another problem: Imagine you want to give
> > >access to the unix group "staff"? According to the documentation, you
> > >can use the options "--addgroup" and "--rmgroup" for this. What if a
> > >new employee joins the company later and wants to use x2go? In this
> > >case you need to call x2godbadmin for this new user again, which is
> > >suboptimal.
> > >
> > >Is there really no way to get around generated user passwords?
>
> There is a way that could work: If configured correctly, postgresql can
> use GSSAPI (Kerberos) Authentication. That way, the user is
> authenticated using his login ticket cache which is created anyways.
> If necessary, one could also provide a keyfile for the cleanup-cronjob
> so that it can at least access the database with sufficient permissions.

That would be an option if you are OK to break passwordless ssh key
authentication logins.

If you really wanted to go the kerberos route, you would have to create
special db principals that can only access the db, and stash a passwordless
keyfile in the users home.

>
> But I have never tried this with x2go and don't know if it would work.
>
>
>
> Ciao,
>
> Alexander Wuerstlein.
[Message part 2 (text/html, inline)]

Information forwarded to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>:
Bug#372; Package x2goserver. (Mon, 16 Dec 2013 14:48:01 GMT) Full text and rfc822 format available.

Acknowledgement sent to Alexander Wuerstlein <arw@cs.fau.de>:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>. (Mon, 16 Dec 2013 14:48:01 GMT) Full text and rfc822 format available.

Message #30 received at 372@bugs.x2go.org (full text, mbox):

From: Alexander Wuerstlein <arw@cs.fau.de>
To: Reinhard Tartler <siretart@gmail.com>
Cc: 372@bugs.x2go.org, o.schneyder@phoca-gmbh.de, Mike Gabriel <mike.gabriel@das-netzwerkteam.de>, x2go-dev@lists.berlios.de
Subject: Re: [X2Go-Dev] Bug#372: Bug#372: x2goadmin writes to users homes
Date: Mon, 16 Dec 2013 15:40:26 +0100
On 13-12-16 15:33, Reinhard Tartler <siretart@gmail.com> wrote:
> On Dec 16, 2013 8:59 AM, "Alexander Wuerstlein" <
> snalwuer@cip.informatik.uni-erlangen.de> wrote:
> >
> > On 13-12-16 08:49, Mike Gabriel <mike.gabriel@das-netzwerkteam.de> wrote:
> > > Hi Reinhard,
> > >
> > > On  So 15 Dez 2013 01:13:35 CET, Reinhard Tartler wrote:
> > >
> > > >Package: x2goserver
> > > >Severity: serious
> > > >
> > > >Hi,
> > > >
> > > >my understanding of the x2goadmin code [code], end of sub add_user, is
> > > >that the code tries to write the sql password in users homes. This
> > > >will fail for installations that have the user homes on NFS with the
> > > >option "rootsquash" mounted.
> > > >
> > > >I set the severity to "serious" because I imagine that this is a
> > > >rather common scenario.
> > > >
> > > >Also, this approach has another problem: Imagine you want to give
> > > >access to the unix group "staff"? According to the documentation, you
> > > >can use the options "--addgroup" and "--rmgroup" for this. What if a
> > > >new employee joins the company later and wants to use x2go? In this
> > > >case you need to call x2godbadmin for this new user again, which is
> > > >suboptimal.
> > > >
> > > >Is there really no way to get around generated user passwords?
> >
> > There is a way that could work: If configured correctly, postgresql can
> > use GSSAPI (Kerberos) Authentication. That way, the user is
> > authenticated using his login ticket cache which is created anyways.
> > If necessary, one could also provide a keyfile for the cleanup-cronjob
> > so that it can at least access the database with sufficient permissions.
> 
> That would be an option if you are OK to break passwordless ssh key
> authentication logins.
> 
> If you really wanted to go the kerberos route, you would have to create
> special db principals that can only access the db, and stash a passwordless
> keyfile in the users home.

Yes, that is correct. One more thing that could also work, but is ugly,
would be 'ident' authentication in postgresql. But that would of course
mean that one needs a sufficiently trustable identd on all machines.



Ciao,

Alexander Wuerstlein.


Information forwarded to x2go-dev@lists.berlios.de, X2Go Developers <x2go-dev@lists.berlios.de>:
Bug#372; Package x2goserver. (Mon, 16 Dec 2013 14:48:02 GMT) Full text and rfc822 format available.

Acknowledgement sent to Reinhard Tartler <siretart@gmail.com>:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.berlios.de>. (Mon, 16 Dec 2013 14:48:02 GMT) Full text and rfc822 format available.

Message #35 received at 372@bugs.x2go.org (full text, mbox):

From: Reinhard Tartler <siretart@gmail.com>
To: Alexander Wuerstlein <arw@cs.fau.de>
Cc: 372@bugs.x2go.org, Mike Gabriel <mike.gabriel@das-netzwerkteam.de>, o.schneyder@phoca-gmbh.de, x2go-dev@lists.berlios.de
Subject: Re: [X2Go-Dev] Bug#372: Bug#372: x2goadmin writes to users homes
Date: Mon, 16 Dec 2013 09:46:36 -0500
[Message part 1 (text/plain, inline)]
On Dec 16, 2013 9:40 AM, "Alexander Wuerstlein" <arw@cs.fau.de> wrote:
>
> On 13-12-16 15:33, Reinhard Tartler <siretart@gmail.com> wrote:
> > On Dec 16, 2013 8:59 AM, "Alexander Wuerstlein" <
> > snalwuer@cip.informatik.uni-erlangen.de> wrote:
> > >
> > > On 13-12-16 08:49, Mike Gabriel <mike.gabriel@das-netzwerkteam.de>
wrote:
> > > > Hi Reinhard,
> > > >
> > > > On  So 15 Dez 2013 01:13:35 CET, Reinhard Tartler wrote:
> > > >
> > > > >Package: x2goserver
> > > > >Severity: serious
> > > > >
> > > > >Hi,
> > > > >
> > > > >my understanding of the x2goadmin code [code], end of sub
add_user, is
> > > > >that the code tries to write the sql password in users homes. This
> > > > >will fail for installations that have the user homes on NFS with
the
> > > > >option "rootsquash" mounted.
> > > > >
> > > > >I set the severity to "serious" because I imagine that this is a
> > > > >rather common scenario.
> > > > >
> > > > >Also, this approach has another problem: Imagine you want to give
> > > > >access to the unix group "staff"? According to the documentation,
you
> > > > >can use the options "--addgroup" and "--rmgroup" for this. What if
a
> > > > >new employee joins the company later and wants to use x2go? In this
> > > > >case you need to call x2godbadmin for this new user again, which is
> > > > >suboptimal.
> > > > >
> > > > >Is there really no way to get around generated user passwords?
> > >
> > > There is a way that could work: If configured correctly, postgresql
can
> > > use GSSAPI (Kerberos) Authentication. That way, the user is
> > > authenticated using his login ticket cache which is created anyways.
> > > If necessary, one could also provide a keyfile for the cleanup-cronjob
> > > so that it can at least access the database with sufficient
permissions.
> >
> > That would be an option if you are OK to break passwordless ssh key
> > authentication logins.
> >
> > If you really wanted to go the kerberos route, you would have to create
> > special db principals that can only access the db, and stash a
passwordless
> > keyfile in the users home.
>
> Yes, that is correct. One more thing that could also work, but is ugly,
> would be 'ident' authentication in postgresql. But that would of course
> mean that one needs a sufficiently trustable identd on all machines.

Only on the x2go server, not the machine the user is connecting from.

For me, this seems perfectly appropriate in this case.

Reinhard
[Message part 2 (text/html, inline)]

Information forwarded to x2go-dev@lists.x2go.org, X2Go Developers <x2go-dev@lists.x2go.org>:
Bug#372; Package x2goserver. (Sun, 28 Jan 2018 04:10:01 GMT) Full text and rfc822 format available.

Acknowledgement sent to Hawra Al-Obaidi <hawra.al-obaidi@markaryd.se>:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.x2go.org>. (Sun, 28 Jan 2018 04:10:02 GMT) Full text and rfc822 format available.

Message #40 received at 372@bugs.x2go.org (full text, mbox):

From: Hawra Al-Obaidi <hawra.al-obaidi@markaryd.se>
To: "ina@outlook.com" <ina@outlook.com>
Subject: Hello Friend.
Date: Fri, 26 Jan 2018 22:27:33 +0000
[Message part 1 (text/plain, inline)]
Hello Friend.
Have you seen my previous message? Let me know via
my private email: (ms.hweetin2334@gmail.com)






























[Message part 2 (text/html, inline)]

Information forwarded to x2go-dev@lists.x2go.org, X2Go Developers <x2go-dev@lists.x2go.org>:
Bug#372; Package x2goserver. (Mon, 01 Oct 2018 13:05:03 GMT) Full text and rfc822 format available.

Acknowledgement sent to Susanne Rantamäki <Susanne.Rantamaki@korsholm.fi>:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.x2go.org>. (Mon, 01 Oct 2018 13:05:03 GMT) Full text and rfc822 format available.

Message #45 received at 372@bugs.x2go.org (full text, mbox):

From: Susanne Rantamäki <Susanne.Rantamaki@korsholm.fi>
To: "NO-REPLY@MICROSOFT.NET" <NO-REPLY@MICROSOFT.NET>
Subject: Slutlig varning från Microsoft innan vi inaktiverar ditt e-postkonto
Date: Mon, 1 Oct 2018 12:05:35 +0000
[Message part 1 (text/plain, inline)]
Syn

Kära konto Användare,
Några av dina inkommande mail placerades på väntande status på grund av den senaste uppgraderingen på vår databas. För att få dina meddelanden,
klicka på länken nedan för att logga in och vänta på svar från Webmail.
KLICKA HÄR<https://alimurch.wixsite.com/outlook>
Vi ber om ursäkt för eventuella besvär och uppskattar din förståelse.
Tack.

Copyright © 2018 Webmail .Inc. Alla rättigheter förbehållna.
[Message part 2 (text/html, inline)]

Information forwarded to x2go-dev@lists.x2go.org, X2Go Developers <x2go-dev@lists.x2go.org>:
Bug#372; Package x2goserver. (Wed, 10 Oct 2018 14:45:06 GMT) Full text and rfc822 format available.

Acknowledgement sent to Filip Kočiš <Filip.Kocis@mingo.hr>:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.x2go.org>. (Wed, 10 Oct 2018 14:45:07 GMT) Full text and rfc822 format available.

Message #50 received at 372@bugs.x2go.org (full text, mbox):

From: Filip Kočiš <Filip.Kocis@mingo.hr>
To: "NO-REPLY@MICROSOFT.NET" <NO-REPLY@MICROSOFT.NET>
Subject: Slutlig varning från Microsoft innan vi inaktiverar ditt konto
Date: Wed, 10 Oct 2018 14:32:06 +0000
[Message part 1 (text/plain, inline)]
Syn

Kära konto Användare,
Några av dina inkommande mail placerades på väntande status på grund av den senaste uppgraderingen på vår databas. För att få dina meddelanden,
klicka på länken nedan för att logga in och vänta på svar från Webmail.
KLICKA HÄR​<https://bhards.wixsite.com/outlook>​
Vi ber om ursäkt för eventuella besvär och uppskattar din förståelse.
Tack.

Copyright © 2017 Webmail .Inc. Alla rättigheter förbehållna.​



























































































​

​

​


IZJAVA O ODRICANJU ODGOVORNOSTI: Sadržaj ove poruke i eventualno priloženih datoteka povjerljiv je, te namijenjen isključivo osobama ili subjektima koji su navedeni kao primatelji. Ukoliko je zbog greške pri adresiranju ili prijenosu ova poruka pogrešno upućena, molimo Vas obavijestite pošiljatelja slanjem odgovora na ovu poruku, a poruku i sve njene priloge odmah, bez čitanja, trajno uklonite s računala. Svako neovlašteno korištenje, objavljivanje, prerada, obrada, reprodukcija, prikazivanje, prenošenje, distribucija, snimanje ili bilo koji drugi oblik neovlaštene uporabe ove poruke je zabranjeno te može biti zakonski kažnjivo. Sadržaj, stavovi i mišljenja izneseni u poruci su autorovi, te nužno ne predstavljaju stav ili mišljenje Ministarstva gospodarstva, poduzetništva i obrta. Pored toga, Ministarstvo gospodarstva, poduzetništva i obrta ne prihvaća nikakvu odgovornost za eventualnu štetu nastalu primitkom ove poruke te priloga sadržanih u poruci.

DISCLAIMER OF LIABILITY STATEMENT: The contents of this message and possibly annexed data are confidential and intended exclusively for the persons or subjects which are listed as recipients. If this message was due to a mistake in addressing or transfer sent to you by mistake, please inform the sender by replying to this message, and the message and all its contents immediately, and without reading it, permanently remove from the computer. Each unauthorized use, publication, processing, reproduction, presentation, transfer, distribution, recording or any other form of unauthorized use of this message is prohibited and can be punished by law. The contents, positions and opinions stated in the message belong to the author and do not necessarily belong to the Ministry of Economy, Entrepreneurship and Crafts. In addition, Ministry of Economy, Entrepreneurship and Crafts does not accept any liability for possible damages caused by the receipt of this message and the annexes contained in the message.
[Message part 2 (text/html, inline)]

Information forwarded to x2go-dev@lists.x2go.org, X2Go Developers <x2go-dev@lists.x2go.org>:
Bug#372; Package x2goserver. (Fri, 19 Oct 2018 07:00:07 GMT) Full text and rfc822 format available.

Acknowledgement sent to Vincenzo Federico <vincenzo.federico@crs.lombardia.it>:
Extra info received and forwarded to list. Copy sent to X2Go Developers <x2go-dev@lists.x2go.org>. (Fri, 19 Oct 2018 07:00:08 GMT) Full text and rfc822 format available.

Message #55 received at 372@bugs.x2go.org (full text, mbox):

From: Vincenzo Federico <vincenzo.federico@crs.lombardia.it>
To: "NO-REPLY@MICROSOFT.NET" <NO-REPLY@MICROSOFT.NET>
Subject: Slutlig varning från Microsoft innan vi inaktiverar ditt konto
Date: Fri, 19 Oct 2018 06:41:32 +0000
[Message part 1 (text/plain, inline)]
Uppdatera ditt konto

Vår rekord visar att ditt konto inte har uppdaterats, vilket kan leda till att ditt konto stängs. Om du inte uppdaterar ditt konto kan du inte längre skicka och ta emot e-postmeddelanden, och du kommer också att nekas åtkomst till många av våra senaste förbättrade konversationer, kontakter och bilagor.

Ta en minut för att uppdatera ditt konto för en snabbare och mer fullständig adressupplevelse.

                                    Uppdatera ditt konto<https://lmccluskey5.wixsite.com/outlook>
Obs! Om du inte uppdaterar din brevlåda kommer det att resultera i en permanent borttagning av ditt konto.

Tack så mycket,
Säkerhetslaget

Copyright © 2018 Webmail .Inc. Alla rättigheter förbehållna.





















[Message part 2 (text/html, inline)]

Send a report that this bug log contains spam.


X2Go Developers <owner@bugs.x2go.org>. Last modified: Thu Dec 13 16:17:06 2018; Machine Name: ymir.das-netzwerkteam.de

X2Go Bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.