X2Go Bug report logs - #693
domain users can't open sessions

version graph

Package: x2goserver; Maintainer for x2goserver is X2Go Developers <x2go-dev@lists.x2go.org>; Source for x2goserver is src:x2goserver.

Reported by: Cristian Falcas <cristi.falcas@gmail.com>

Date: Mon, 8 Dec 2014 08:40:02 UTC

Severity: normal

Tags: moreinfo

Found in version 4.0.1.18

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.x2go.org
Subject: Bug#693: domain users can't open sessions
Reply-To: Cristian Falcas <cristi.falcas@gmail.com>, 693@bugs.x2go.org
Resent-From: Cristian Falcas <cristi.falcas@gmail.com>
Resent-To: x2go-dev@lists.x2go.org
Resent-CC: X2Go Developers <x2go-dev@lists.x2go.org>
X-Loop: owner@bugs.x2go.org
Resent-Date: Mon, 08 Dec 2014 08:40:02 +0000
Resent-Message-ID: <handler.693.B.14180279334295@bugs.x2go.org>
Resent-Sender: owner@bugs.x2go.org
X-X2Go-PR-Message: report 693
X-X2Go-PR-Package: x2goserver
X-X2Go-PR-Keywords: 
Received: via spool by submit@bugs.x2go.org id=B.14180279334295
          (code B); Mon, 08 Dec 2014 08:40:02 +0000
Received: (at submit) by bugs.x2go.org; 8 Dec 2014 08:38:53 +0000
X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on
	ymir.das-netzwerkteam.de
X-Spam-Level: 
X-Spam-Status: No, score=0.8 required=5.0 tests=BAYES_50,FREEMAIL_FROM,
	T_DKIM_INVALID,URIBL_BLOCKED autolearn=ham version=3.3.2
Received: from mail-lb0-f178.google.com (mail-lb0-f178.google.com [209.85.217.178])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTPS id 3A5765E0E0
	for <submit@bugs.x2go.org>; Mon,  8 Dec 2014 09:38:51 +0100 (CET)
Received: by mail-lb0-f178.google.com with SMTP id f15so3708359lbj.37
        for <submit@bugs.x2go.org>; Mon, 08 Dec 2014 00:38:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20120113;
        h=mime-version:from:date:message-id:subject:to:content-type;
        bh=w0DD+bRXz8bMMZBpZ/kCJ0R6Y3zQOYeJuqdy2ERy6Q4=;
        b=O2YzJPAnbTNdgYkp0C4qn38vW8P3XkEIppdX3nem4pnjZcAnHA5qDPNORld4IOUMeh
         PvNtPlY48+PtySrA1FB4sfHySA5P2CS5Ct+Suhb/c77hd+zLlq2AgbFh2WULl6OFRv01
         3EGo6MxmFnTKBAih00JCIWsgaZvI2u/hNkG9H5xdYtGsP+k6b1ellHZShlrveL/X8F++
         VWWFxiKLlEHyhIzROGytlXxxeZjN1Q6FL8M62HDfcv6yldA5N/3A1jZw2mYjnKiLS7dj
         hnYAVIuWNN0nyGKj8JFP6cHLZikbVyjivH/JBm6418yq7JpHL95HBQa/NYSVbErEzIC2
         gnHA==
X-Received: by 10.112.42.114 with SMTP id n18mr15320188lbl.44.1418027930595;
 Mon, 08 Dec 2014 00:38:50 -0800 (PST)
MIME-Version: 1.0
Received: by 10.112.1.200 with HTTP; Mon, 8 Dec 2014 00:38:30 -0800 (PST)
From: Cristian Falcas <cristi.falcas@gmail.com>
Date: Mon, 8 Dec 2014 10:38:30 +0200
Message-ID: <CAMo7R_caAnCp_T4YuLZ02=eTLF02qfJY-rZadq05sVYK9S=qqw@mail.gmail.com>
To: submit@bugs.x2go.org
Content-Type: text/plain; charset=UTF-8
Package: x2goserver
Version: 4.0.1.18

Due to the sanitizer from "/usr/lib64/x2go/x2gosqlitewrapper.pl",
domain users can't login. Usually a login id is in for
"domain\username" or "username@domain". Bot "\" and "@" are stripped
and the sub check_user fails.

Either allow at least "@" as a valid char to username, or make it
configurable and allow extra chars from a varible in the configuration
file.

Best regards,
Cristian Falcas

Send a report that this bug log contains spam.


X2Go Developers <owner@bugs.x2go.org>. Last modified: Wed Apr 24 09:27:28 2024; Machine Name: ymir.das-netzwerkteam.de

X2Go Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.