Your message dated Mon, 7 Jun 2010 12:11:25 +0200 with message-id <20100607101125.GA7565@patate.is-a-geek.org> and subject line Re: Bug#488918: xserver-xephyr: Xephyr/Xnest broken authorization cookie generation (SECURITY extension) has caused the Debian Bug report #488918, regarding xserver-xephyr: Xephyr/Xnest broken authorization cookie generation (SECURITY extension) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 488918: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488918 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: xserver-xephyr: Xephyr/Xnest broken authorization cookie generation (SECURITY extension)
- From: Liraz Siri <liraz.siri@gmail.com>
- Date: Wed, 02 Jul 2008 04:27:53 +0000
- Message-id: <20080702042753.4583.59460.reportbug@oasis>
Package: xserver-xephyr Severity: important For some reason the server does not allow cookies were generated by xauth (regardless of whether the cookie is a trusted or untrusted type). Reproducing the bug:: # create auth rm -f /tmp/xauth xauth -f /tmp/xauth add :1 . $(mcookie) # run xephyr with auth Xephyr :1 -auth /tmp/xauth & # set Xephyr as X server DISPLAY=:1 # test XAUTHORITY=/tmp/xauth xterm # now try to connect to the server with a "generated" X # authorization rm -f /tmp/xauth2 # generate new authorization cookie into /tmp/xauth2 XAUTHORITY=/tmp/xauth xauth -f /tmp/xauth2 generate $DISPLAY . # test X connection - it fails! XAUTHORITY=/tmp/xauth2 xterm I tested the same sequence of commands with the regular X server and it worked just fine. Note that the problem seems to be shared by Xnest as well. -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.24-16-386 Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C)
--- End Message ---
--- Begin Message ---
- To: Liraz Siri <liraz.siri@gmail.com>, 488918-done@bugs.debian.org
- Subject: Re: Bug#488918: xserver-xephyr: Xephyr/Xnest broken authorization cookie generation (SECURITY extension)
- From: Julien Cristau <jcristau@debian.org>
- Date: Mon, 7 Jun 2010 12:11:25 +0200
- Message-id: <20100607101125.GA7565@patate.is-a-geek.org>
- In-reply-to: <20080702042753.4583.59460.reportbug@oasis>
- References: <20080702042753.4583.59460.reportbug@oasis>
On Wed, Jul 2, 2008 at 04:27:53 +0000, Liraz Siri wrote: > Package: xserver-xephyr > Severity: important > > > For some reason the server does not allow cookies were generated by > xauth (regardless of whether the cookie is a trusted or untrusted type). > > Reproducing the bug:: > > # create auth > rm -f /tmp/xauth > xauth -f /tmp/xauth add :1 . $(mcookie) > > # run xephyr with auth > Xephyr :1 -auth /tmp/xauth & > > # set Xephyr as X server > DISPLAY=:1 > > # test > XAUTHORITY=/tmp/xauth xterm > > # now try to connect to the server with a "generated" X > # authorization > rm -f /tmp/xauth2 > > # generate new authorization cookie into /tmp/xauth2 > XAUTHORITY=/tmp/xauth xauth -f /tmp/xauth2 generate $DISPLAY . > > # test X connection - it fails! > XAUTHORITY=/tmp/xauth2 xterm > > I tested the same sequence of commands with the regular X server and it > worked just fine. > > Note that the problem seems to be shared by Xnest as well. > The SECURITY extension is disabled in recent builds, so I'll close this bug. If you'd still like it fixed (and it still happens with newer Xephyr/Xnest) I suggest reporting the issue to bugs.freedesktop.org. Thanks for your report. Cheers, JulienAttachment: signature.asc
Description: Digital signature
--- End Message ---