From unknown Thu Mar 28 10:25:07 2024 X-Loop: owner@bugs.x2go.org Subject: Bug#311: http broker: Add cmd-line option for loading self-signed root-CA certificates Reply-To: Mike Gabriel , 311@bugs.x2go.org Resent-From: Mike Gabriel Resent-To: x2go-dev@lists.berlios.de Resent-CC: X2Go Developers X-Loop: owner@bugs.x2go.org Resent-Date: Tue, 24 Sep 2013 12:03:01 +0000 Resent-Message-ID: Resent-Sender: owner@bugs.x2go.org X-X2Go-PR-Message: report 311 X-X2Go-PR-Package: x2goclient X-X2Go-PR-Keywords: Received: via spool by submit@bugs.x2go.org id=B.138002337112592 (code B); Tue, 24 Sep 2013 12:03:01 +0000 Received: (at submit) by bugs.x2go.org; 24 Sep 2013 11:49:31 +0000 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on ymir.das-netzwerkteam.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,URIBL_BLOCKED autolearn=ham version=3.3.2 Received: from freya.das-netzwerkteam.de (freya.das-netzwerkteam.de [88.198.48.199]) by ymir (Postfix) with ESMTPS id CF2725DA6C for ; Tue, 24 Sep 2013 13:49:30 +0200 (CEST) Received: from grimnir.das-netzwerkteam.de (grimnir.das-netzwerkteam.de [78.46.204.98]) by freya.das-netzwerkteam.de (Postfix) with ESMTPS id 32680BB9 for ; Tue, 24 Sep 2013 13:49:30 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by grimnir.das-netzwerkteam.de (Postfix) with ESMTP id 116F73BCD4 for ; Tue, 24 Sep 2013 13:49:30 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at grimnir.das-netzwerkteam.de Received: from grimnir.das-netzwerkteam.de ([127.0.0.1]) by localhost (grimnir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xy+Hb7uBarkV for ; Tue, 24 Sep 2013 13:49:29 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by grimnir.das-netzwerkteam.de (Postfix) with ESMTP id E13D93C143 for ; Tue, 24 Sep 2013 13:49:29 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by grimnir.das-netzwerkteam.de (Postfix) with ESMTP id BB9F53BCD4 for ; Tue, 24 Sep 2013 13:49:29 +0200 (CEST) Received: by grimnir.das-netzwerkteam.de (Postfix, from userid 33) id 4AA483C143; Tue, 24 Sep 2013 13:49:29 +0200 (CEST) Received: from m-047.informatik.uni-kiel.de (m-047.informatik.uni-kiel.de [134.245.254.47]) by mail.das-netzwerkteam.de (Horde Framework) with HTTP; Tue, 24 Sep 2013 13:49:29 +0200 Message-ID: <20130924134929.16381jrelch6kthl@mail.das-netzwerkteam.de> X-Priority: 3 (Normal) Date: Tue, 24 Sep 2013 13:49:29 +0200 From: Mike Gabriel To: submit@bugs.x2go.org MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=_ah1qhz9o3ex"; protocol="application/pgp-signature"; micalg="pgp-sha1" Content-Transfer-Encoding: 7bit User-Agent: Internet Messaging Program (IMP) H3 (4.3.4) This message is in MIME format and has been PGP signed. --=_ah1qhz9o3ex Content-Type: text/plain; charset=UTF-8; DelSp="Yes"; format="flowed" Content-Disposition: inline Content-Transfer-Encoding: 7bit Package: x2goclient Severity: wishlist Version: 4.0.1.1 Add a command line options that allows to load a self-signed / custom CA certificate that is used when accessing the HTTP session broker via https. For an example, see: http://www.thomaskeller.biz/blog/2009/01/03/ssl-verification-with-qt-and-a-custom-ca-certificate/ Mike -- DAS-NETZWERKTEAM mike gabriel, herweg 7, 24357 fleckeby fon: +49 (1520) 1976 148 GnuPG Key ID 0x25771B31 mail: mike.gabriel@das-netzwerkteam.de, http://das-netzwerkteam.de freeBusy: https://mail.das-netzwerkteam.de/freebusy/m.gabriel%40das-netzwerkteam.de.xfb --=_ah1qhz9o3ex Content-Type: application/pgp-signature Content-Description: Digitale PGP-Unterschrift Content-Disposition: inline Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAABAgAGBQJSQXxIAAoJEJr0azAldxsxK4gQAKla9ByCQsOfmV6M0Gz1nrpw Jud2VOHTUOanoiAG87mUloivsDtV0NpLqqDYRE6O11I8ignNFrk3LF+VmT1oc/Lf 1WQZxuLEmYUEVhENFJjgDbfnFN4vF7oaQdF82k6A5EAVdBsZsheP0WN0d82hD8xS K6u8e08Z2xeV0TXNjfi3x0nyX0Ua+7bsgtSEP7VlFwfGb8k2+2CFVTZZlPJ2zX2q bescrA1/sraQ/tCJ6JziVgwwWrSbetIocGKJ7tc0mI0XYFOs9geg/uvNtF0MSGdU 1MeaqPihCV1jOiYNJdcKcLnnbVj/mQfcxWx0/C0EK2dCOb7BZo+32Te8pNdoPkk9 w7tPNaZxThkWeYVg3+cCTYoGfmuOHY00gLKLJHCylUcGtOlxMJ+R85ngJBYZCuDM El7hJBTu5geAD8sN7Fzwkiwc7gpM+pmL3gZsCja2tOx+BAEogVs3c/JIOUh2YQIQ uTVY8P+a2VRzSc8TqY6YKQd1lvI0lJtQ/OmQV1Bv4U3Jl0pBe1+e6s5fLjVUKj// MIos9cL5YH+BiDOTWMO3S2Au8GePcZPzjonnx3YbHiksJcYpFYhVNkDYZguVv/g6 ITYRk9gCbVfLbS9Q4WzYQFhM5pO8UMBofYSMhmG8uZr9sKBRFrEJgIhfa+Llh7T+ y+XQvOwn/PkFB8foRDja =hRaS -----END PGP SIGNATURE----- --=_ah1qhz9o3ex-- From unknown Thu Mar 28 10:25:07 2024 X-Loop: owner@bugs.x2go.org Subject: Bug#311: X2Go issue (in src:x2goclient) has been marked as pending for release Reply-To: Mike Gabriel , 311@bugs.x2go.org Resent-From: Mike Gabriel Resent-To: x2go-dev@lists.berlios.de Resent-CC: X2Go Developers X-Loop: owner@bugs.x2go.org Resent-Date: Tue, 29 Oct 2013 15:43:32 +0000 Resent-Message-ID: Resent-Sender: owner@bugs.x2go.org X-X2Go-PR-Message: followup 311 X-X2Go-PR-Package: x2goclient X-X2Go-PR-Keywords: Received: via spool by 311-submit@bugs.x2go.org id=B311.138306121816268 (code B ref 311); Tue, 29 Oct 2013 15:43:32 +0000 Received: (at 311) by bugs.x2go.org; 29 Oct 2013 15:40:18 +0000 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on ymir.das-netzwerkteam.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,NO_RELAYS, URIBL_BLOCKED autolearn=ham version=3.3.2 Received: by ymir (Postfix, from userid 1005) id 03BFE5DB18; Tue, 29 Oct 2013 16:40:17 +0100 (CET) From: Mike Gabriel To: 311-submitter@bugs.x2go.org Cc: control@bugs.x2go.org, 311@bugs.x2go.org Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit X-Mailer: http://snipr.com/post-receive-tag-pending Message-Id: <20131029154018.03BFE5DB18@ymir> Date: Tue, 29 Oct 2013 16:40:17 +0100 (CET) tag #311 pending fixed #311 4.0.1.2 thanks Hello, X2Go issue #311 (src:x2goclient) reported by you has been fixed in X2Go Git. You can see the changelog below, and you can check the diff of the fix at: http://code.x2go.org/gitweb?p=x2goclient.git;a=commitdiff;h=1a4504a The issue will most likely be fixed in src:x2goclient (4.0.1.2). light+love X2Go Git Admin (on behalf of the sender of this mail) --- commit 1a4504aefb145446c9011fb34743aa8535db3b7b Author: Mike Gabriel Date: Tue Oct 29 16:39:43 2013 +0100 Add option --broker-cacertfile. Allow usage of non-system-wide installed (self-signed) SSL certificate chains for https (SSL) session broker connections. (Fixes: #311). diff --git a/debian/changelog b/debian/changelog index e069591..78908d6 100644 --- a/debian/changelog +++ b/debian/changelog @@ -11,6 +11,9 @@ x2goclient (4.0.1.2-0~x2go2) UNRELEASED; urgency=low + Perform sanity checks on data that comes in from X2Go Servers. Prohibit the execution of arbitrary code via the ~/.bashrc file. (Fixes: #333). + + Add option --broker-cacertfile. Allow usage of non-system-wide + installed (self-signed) SSL certificate chains for https (SSL) + session broker connections. (Fixes: #311). * Pull-in packaging changes from Debian. [ Ricardo Díaz Martín ] From unknown Thu Mar 28 10:25:07 2024 X-Loop: owner@bugs.x2go.org Subject: Bug#311: X2Go issue (in src:x2goclient) has been marked as closed Reply-To: Mike Gabriel , 311@bugs.x2go.org Resent-From: Mike Gabriel Resent-To: x2go-dev@lists.berlios.de Resent-CC: X2Go Developers X-Loop: owner@bugs.x2go.org Resent-Date: Tue, 17 Dec 2013 15:03:02 +0000 Resent-Message-ID: Resent-Sender: owner@bugs.x2go.org X-X2Go-PR-Message: followup 311 X-X2Go-PR-Package: x2goclient X-X2Go-PR-Keywords: pending Received: via spool by 311-submit@bugs.x2go.org id=B311.13872921936063 (code B ref 311); Tue, 17 Dec 2013 15:03:02 +0000 Received: (at 311) by bugs.x2go.org; 17 Dec 2013 14:56:33 +0000 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on ymir.das-netzwerkteam.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,NO_RELAYS, URIBL_BLOCKED autolearn=ham version=3.3.2 Received: by ymir (Postfix, from userid 1005) id 4C0A45DB28; Tue, 17 Dec 2013 15:55:21 +0100 (CET) From: Mike Gabriel To: 311-submitter@bugs.x2go.org Cc: control@bugs.x2go.org, 311@bugs.x2go.org Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit Message-Id: <20131217145521.4C0A45DB28@ymir> Date: Tue, 17 Dec 2013 15:55:21 +0100 (CET) close #311 thanks Hello, we are very hopeful that X2Go issue #311 reported by you has been resolved in the new release (4.0.1.2) of the X2Go source project »src:x2goclient«. You can view the complete changelog entry of src:x2goclient (4.0.1.2) below, and you can use the following link to view all the code changes between this and the last release of src:x2goclient. http://code.x2go.org/gitweb?p=x2goclient.git;a=commitdiff;h=34591fd62844b2b955e6a4bf3cf44d4759c5e44c;hp=d5ff7886ae22a1e36541570e7095fac9860af6e8 If you feel that the issue has not been resolved satisfyingly, feel free to reopen this bug report or submit a follow-up report with further observations described based on the new released version of src:x2goclient. Thanks a lot for contributing to X2Go!!! light+love X2Go Git Admin (on behalf of the sender of this mail) --- X2Go Component: src:x2goclient Version: 4.0.1.2-0x2go2 Status: RELEASE Date: Tue, 17 Dec 2013 15:21:38 +0100 Fixes: 139 230 241 311 315 316 328 333 Changes: x2goclient (4.0.1.2-0x2go2) RELEASED; urgency=low . [ Mike Gabriel ] * New upstream version (4.0.1.2): - Provide Keywords: key in .desktop file. - Add NSIS packaging files for win32 builds to source tree. (Files provided by Oleksandr Shneyder, thanks!!!). - Rename win32 desktop and startmenu icon from "X2goClient" to "X2Go Client". - Store broker HTTPS certificate exceptions in $HOME/.x2go/ssl/exceptions (before: $HOME/ssl/exceptions). (Fixes: #328). - Perform sanity checks on data that comes in from X2Go Servers. Prohibit the execution of arbitrary code via the ~/.bashrc file. (Fixes: #333). - Add option --broker-cacertfile. Allow usage of non-system-wide installed (self-signed) SSL certificate chains for https (SSL) session broker connections. (Fixes: #311). - Update man page for new --tray-icon cmdline option. - Update man page for --broker-url. Explain the syntax of . - Properly handle (=expand) the "~" character in key filenames. (Brought to attention by Eldamir on IRC. Thanks!). - Expand tilde operator for all other file paths handed over to X2Go Client via sessions file or cmdline parameter. - Syntax fix of x2goclient.desktop file. - Test for various file locations of the pulseaudio cookie file. - Allow patching of qmake-qt4 executable path in Makefile. - Make qmake-qt4 and lrelease path in Makefile easily replacable (as RHEL-5 does not have those tools in $PATH). - Make sure that build_client and build_plugin are not build with parallel make. - Make x2goplugin-provider installable via Makefile. * Pull-in packaging changes from Debian. * debian/source/format: + Switch to format 1.0. * x2goclient.spec: + Ship x2goclient.spec (RPM package definitions) in upstream project. (Thanks to the Fedora package maintainers). + Clear (Fedora package) changelog. + Make package build on Fedora/EPEL versions that do not have the qtbrowserplugin package. + For EPEL-5 builds: replace full path to qmake-qt4 and lrelease. + Split up package into bin:packages: x2goclient, x2goplugin, x2goplugin-provider. + Make sure lrelease-qt4 is executed (not just lrelease). . [ Ricardo Díaz Martín ] * New upstream versino (4.0.1.2): - Strip whitespaces off of user name, host name and other strings when loading / saving session profiles.(Fixes: #315). - New option --tray-icon. Force showing the tray icon, even for hidden sessions. Also allow creation of .desktop files with --tray-icon optionally being enabled. (Fixes: #316). - Update Spanish translation. . [ Oleksandr Shneyder ] * New upstream version (4.0.1.2): - Support for keys "shadowuser" "shadowdisplay" and "shadowmode" in config file. This allows choosing the default display for shadow sessions. - Support for GSSApi(Kerberos 5) authentication. Using ssh/scp commands on Linux and Mac and plink/pscp on Windows. - Support for ChallengeResponseAuthentication (Google Authenticator) - Setting main window focus on mac (Fixes: #139). - Additional check if authentication with GSSApi successfull - c121b7e2d3d83abdc2d7a29637bc3294e38b2ec3 broke checking if remote command produce only stderr and not stdout. It made x2goclient crash if x2gostartagent send LIMIT error. Current commit fixes this issue. - SshMasterConnection should use current user name if no user name is specified in session settings - GSSApi(Kerberos 5) authentication for sshproxy and sshbroker - fixed GSSApi(Kerberos 5) authentication for sshproxy and sshbroker on windows . [ Heinrich Schuchardt ] * New upstream version (4.0.1.2): - Handle SSH host key changes more elegantly and allow user interaction if such a host key change occurs. (Fixes: #241). . [ Michael DePaulo ] * New upstream version (4.0.1.2): - win32: Add uninstall information to Add/Remove Programs. (Fixes: #230). From unknown Thu Mar 28 10:25:07 2024 MIME-Version: 1.0 X-Mailer: MIME-tools 5.502 (Entity 5.502) X-Loop: owner@bugs.x2go.org From: owner@bugs.x2go.org (X2Go Bug Tracking System) Subject: Bug#311 closed by Mike Gabriel (X2Go issue (in src:x2goclient) has been marked as closed) Message-ID: References: <20131217145521.4C0A45DB28@ymir> X-X2go-PR-Keywords: pending X-X2go-PR-Message: they-closed 311 X-X2go-PR-Package: x2goclient X-X2go-PR-Source: x2goclient Date: Tue, 17 Dec 2013 15:03:07 +0000 Content-Type: multipart/mixed; boundary="----------=_1387292587-10965-0" This is a multi-part message in MIME format... ------------=_1387292587-10965-0 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 This is an automatic notification regarding your Bug report which was filed against the x2goclient package: #311: http broker: Add cmd-line option for loading self-signed root-CA cert= ificates It has been closed by Mike Gabriel . Their explanation is attached below along with your original report. If this explanation is unsatisfactory and you have not received a better one in a separate message then please contact Mike Gabriel by replying to this email. --=20 X2Go Bug Tracking System Contact owner@bugs.x2go.org with problems ------------=_1387292587-10965-0 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at control) by bugs.x2go.org; 17 Dec 2013 14:56:49 +0000 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on ymir.das-netzwerkteam.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,NO_RELAYS, URIBL_BLOCKED autolearn=unavailable version=3.3.2 Received: by ymir (Postfix, from userid 1005) id 4C0A45DB28; Tue, 17 Dec 2013 15:55:21 +0100 (CET) From: Mike Gabriel To: 311-submitter@bugs.x2go.org Cc: control@bugs.x2go.org, 311@bugs.x2go.org Subject: X2Go issue (in src:x2goclient) has been marked as closed Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit Message-Id: <20131217145521.4C0A45DB28@ymir> Date: Tue, 17 Dec 2013 15:55:21 +0100 (CET) close #311 thanks Hello, we are very hopeful that X2Go issue #311 reported by you has been resolved in the new release (4.0.1.2) of the X2Go source project »src:x2goclient«. You can view the complete changelog entry of src:x2goclient (4.0.1.2) below, and you can use the following link to view all the code changes between this and the last release of src:x2goclient. http://code.x2go.org/gitweb?p=x2goclient.git;a=commitdiff;h=34591fd62844b2b955e6a4bf3cf44d4759c5e44c;hp=d5ff7886ae22a1e36541570e7095fac9860af6e8 If you feel that the issue has not been resolved satisfyingly, feel free to reopen this bug report or submit a follow-up report with further observations described based on the new released version of src:x2goclient. Thanks a lot for contributing to X2Go!!! light+love X2Go Git Admin (on behalf of the sender of this mail) --- X2Go Component: src:x2goclient Version: 4.0.1.2-0x2go2 Status: RELEASE Date: Tue, 17 Dec 2013 15:21:38 +0100 Fixes: 139 230 241 311 315 316 328 333 Changes: x2goclient (4.0.1.2-0x2go2) RELEASED; urgency=low . [ Mike Gabriel ] * New upstream version (4.0.1.2): - Provide Keywords: key in .desktop file. - Add NSIS packaging files for win32 builds to source tree. (Files provided by Oleksandr Shneyder, thanks!!!). - Rename win32 desktop and startmenu icon from "X2goClient" to "X2Go Client". - Store broker HTTPS certificate exceptions in $HOME/.x2go/ssl/exceptions (before: $HOME/ssl/exceptions). (Fixes: #328). - Perform sanity checks on data that comes in from X2Go Servers. Prohibit the execution of arbitrary code via the ~/.bashrc file. (Fixes: #333). - Add option --broker-cacertfile. Allow usage of non-system-wide installed (self-signed) SSL certificate chains for https (SSL) session broker connections. (Fixes: #311). - Update man page for new --tray-icon cmdline option. - Update man page for --broker-url. Explain the syntax of . - Properly handle (=expand) the "~" character in key filenames. (Brought to attention by Eldamir on IRC. Thanks!). - Expand tilde operator for all other file paths handed over to X2Go Client via sessions file or cmdline parameter. - Syntax fix of x2goclient.desktop file. - Test for various file locations of the pulseaudio cookie file. - Allow patching of qmake-qt4 executable path in Makefile. - Make qmake-qt4 and lrelease path in Makefile easily replacable (as RHEL-5 does not have those tools in $PATH). - Make sure that build_client and build_plugin are not build with parallel make. - Make x2goplugin-provider installable via Makefile. * Pull-in packaging changes from Debian. * debian/source/format: + Switch to format 1.0. * x2goclient.spec: + Ship x2goclient.spec (RPM package definitions) in upstream project. (Thanks to the Fedora package maintainers). + Clear (Fedora package) changelog. + Make package build on Fedora/EPEL versions that do not have the qtbrowserplugin package. + For EPEL-5 builds: replace full path to qmake-qt4 and lrelease. + Split up package into bin:packages: x2goclient, x2goplugin, x2goplugin-provider. + Make sure lrelease-qt4 is executed (not just lrelease). . [ Ricardo Díaz Martín ] * New upstream versino (4.0.1.2): - Strip whitespaces off of user name, host name and other strings when loading / saving session profiles.(Fixes: #315). - New option --tray-icon. Force showing the tray icon, even for hidden sessions. Also allow creation of .desktop files with --tray-icon optionally being enabled. (Fixes: #316). - Update Spanish translation. . [ Oleksandr Shneyder ] * New upstream version (4.0.1.2): - Support for keys "shadowuser" "shadowdisplay" and "shadowmode" in config file. This allows choosing the default display for shadow sessions. - Support for GSSApi(Kerberos 5) authentication. Using ssh/scp commands on Linux and Mac and plink/pscp on Windows. - Support for ChallengeResponseAuthentication (Google Authenticator) - Setting main window focus on mac (Fixes: #139). - Additional check if authentication with GSSApi successfull - c121b7e2d3d83abdc2d7a29637bc3294e38b2ec3 broke checking if remote command produce only stderr and not stdout. It made x2goclient crash if x2gostartagent send LIMIT error. Current commit fixes this issue. - SshMasterConnection should use current user name if no user name is specified in session settings - GSSApi(Kerberos 5) authentication for sshproxy and sshbroker - fixed GSSApi(Kerberos 5) authentication for sshproxy and sshbroker on windows . [ Heinrich Schuchardt ] * New upstream version (4.0.1.2): - Handle SSH host key changes more elegantly and allow user interaction if such a host key change occurs. (Fixes: #241). . [ Michael DePaulo ] * New upstream version (4.0.1.2): - win32: Add uninstall information to Add/Remove Programs. (Fixes: #230). ------------=_1387292587-10965-0 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at submit) by bugs.x2go.org; 24 Sep 2013 11:49:31 +0000 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on ymir.das-netzwerkteam.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,URIBL_BLOCKED autolearn=ham version=3.3.2 Received: from freya.das-netzwerkteam.de (freya.das-netzwerkteam.de [88.198.48.199]) by ymir (Postfix) with ESMTPS id CF2725DA6C for ; Tue, 24 Sep 2013 13:49:30 +0200 (CEST) Received: from grimnir.das-netzwerkteam.de (grimnir.das-netzwerkteam.de [78.46.204.98]) by freya.das-netzwerkteam.de (Postfix) with ESMTPS id 32680BB9 for ; Tue, 24 Sep 2013 13:49:30 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by grimnir.das-netzwerkteam.de (Postfix) with ESMTP id 116F73BCD4 for ; Tue, 24 Sep 2013 13:49:30 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at grimnir.das-netzwerkteam.de Received: from grimnir.das-netzwerkteam.de ([127.0.0.1]) by localhost (grimnir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xy+Hb7uBarkV for ; Tue, 24 Sep 2013 13:49:29 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by grimnir.das-netzwerkteam.de (Postfix) with ESMTP id E13D93C143 for ; Tue, 24 Sep 2013 13:49:29 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by grimnir.das-netzwerkteam.de (Postfix) with ESMTP id BB9F53BCD4 for ; Tue, 24 Sep 2013 13:49:29 +0200 (CEST) Received: by grimnir.das-netzwerkteam.de (Postfix, from userid 33) id 4AA483C143; Tue, 24 Sep 2013 13:49:29 +0200 (CEST) Received: from m-047.informatik.uni-kiel.de (m-047.informatik.uni-kiel.de [134.245.254.47]) by mail.das-netzwerkteam.de (Horde Framework) with HTTP; Tue, 24 Sep 2013 13:49:29 +0200 Message-ID: <20130924134929.16381jrelch6kthl@mail.das-netzwerkteam.de> X-Priority: 3 (Normal) Date: Tue, 24 Sep 2013 13:49:29 +0200 From: Mike Gabriel To: submit@bugs.x2go.org Subject: http broker: Add cmd-line option for loading self-signed root-CA certificates MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=_ah1qhz9o3ex"; protocol="application/pgp-signature"; micalg="pgp-sha1" Content-Transfer-Encoding: 7bit User-Agent: Internet Messaging Program (IMP) H3 (4.3.4) This message is in MIME format and has been PGP signed. --=_ah1qhz9o3ex Content-Type: text/plain; charset=UTF-8; DelSp="Yes"; format="flowed" Content-Disposition: inline Content-Transfer-Encoding: 7bit Package: x2goclient Severity: wishlist Version: 4.0.1.1 Add a command line options that allows to load a self-signed / custom CA certificate that is used when accessing the HTTP session broker via https. For an example, see: http://www.thomaskeller.biz/blog/2009/01/03/ssl-verification-with-qt-and-a-custom-ca-certificate/ Mike -- DAS-NETZWERKTEAM mike gabriel, herweg 7, 24357 fleckeby fon: +49 (1520) 1976 148 GnuPG Key ID 0x25771B31 mail: mike.gabriel@das-netzwerkteam.de, http://das-netzwerkteam.de freeBusy: https://mail.das-netzwerkteam.de/freebusy/m.gabriel%40das-netzwerkteam.de.xfb --=_ah1qhz9o3ex Content-Type: application/pgp-signature Content-Description: Digitale PGP-Unterschrift Content-Disposition: inline Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAABAgAGBQJSQXxIAAoJEJr0azAldxsxK4gQAKla9ByCQsOfmV6M0Gz1nrpw Jud2VOHTUOanoiAG87mUloivsDtV0NpLqqDYRE6O11I8ignNFrk3LF+VmT1oc/Lf 1WQZxuLEmYUEVhENFJjgDbfnFN4vF7oaQdF82k6A5EAVdBsZsheP0WN0d82hD8xS K6u8e08Z2xeV0TXNjfi3x0nyX0Ua+7bsgtSEP7VlFwfGb8k2+2CFVTZZlPJ2zX2q bescrA1/sraQ/tCJ6JziVgwwWrSbetIocGKJ7tc0mI0XYFOs9geg/uvNtF0MSGdU 1MeaqPihCV1jOiYNJdcKcLnnbVj/mQfcxWx0/C0EK2dCOb7BZo+32Te8pNdoPkk9 w7tPNaZxThkWeYVg3+cCTYoGfmuOHY00gLKLJHCylUcGtOlxMJ+R85ngJBYZCuDM El7hJBTu5geAD8sN7Fzwkiwc7gpM+pmL3gZsCja2tOx+BAEogVs3c/JIOUh2YQIQ uTVY8P+a2VRzSc8TqY6YKQd1lvI0lJtQ/OmQV1Bv4U3Jl0pBe1+e6s5fLjVUKj// MIos9cL5YH+BiDOTWMO3S2Au8GePcZPzjonnx3YbHiksJcYpFYhVNkDYZguVv/g6 ITYRk9gCbVfLbS9Q4WzYQFhM5pO8UMBofYSMhmG8uZr9sKBRFrEJgIhfa+Llh7T+ y+XQvOwn/PkFB8foRDja =hRaS -----END PGP SIGNATURE----- --=_ah1qhz9o3ex-- ------------=_1387292587-10965-0--