[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#488918: marked as done (xserver-xephyr: Xephyr/Xnest broken authorization cookie generation (SECURITY extension))



Your message dated Mon, 7 Jun 2010 12:11:25 +0200
with message-id <20100607101125.GA7565@patate.is-a-geek.org>
and subject line Re: Bug#488918: xserver-xephyr: Xephyr/Xnest broken authorization cookie generation (SECURITY extension)
has caused the Debian Bug report #488918,
regarding xserver-xephyr: Xephyr/Xnest broken authorization cookie generation (SECURITY extension)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
488918: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488918
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: xserver-xephyr
Severity: important


For some reason the server does not allow cookies were generated by
xauth (regardless of whether the cookie is a trusted or untrusted type).

Reproducing the bug::

	# create auth
	rm -f /tmp/xauth
	xauth -f /tmp/xauth add :1 . $(mcookie)

	# run xephyr with auth
	Xephyr :1 -auth /tmp/xauth &

	# set Xephyr as X server
	DISPLAY=:1

	# test
	XAUTHORITY=/tmp/xauth xterm

	# now try to connect to the server with a "generated" X
	# authorization
	rm -f /tmp/xauth2

	# generate new authorization cookie into /tmp/xauth2
	XAUTHORITY=/tmp/xauth xauth -f /tmp/xauth2 generate $DISPLAY .

	# test X connection - it fails!
	XAUTHORITY=/tmp/xauth2 xterm

I tested the same sequence of commands with the regular X server and it
worked just fine.

Note that the problem seems to be shared by Xnest as well.

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.24-16-386
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C)



--- End Message ---
--- Begin Message ---
On Wed, Jul  2, 2008 at 04:27:53 +0000, Liraz Siri wrote:

> Package: xserver-xephyr
> Severity: important
> 
> 
> For some reason the server does not allow cookies were generated by
> xauth (regardless of whether the cookie is a trusted or untrusted type).
> 
> Reproducing the bug::
> 
> 	# create auth
> 	rm -f /tmp/xauth
> 	xauth -f /tmp/xauth add :1 . $(mcookie)
> 
> 	# run xephyr with auth
> 	Xephyr :1 -auth /tmp/xauth &
> 
> 	# set Xephyr as X server
> 	DISPLAY=:1
> 
> 	# test
> 	XAUTHORITY=/tmp/xauth xterm
> 
> 	# now try to connect to the server with a "generated" X
> 	# authorization
> 	rm -f /tmp/xauth2
> 
> 	# generate new authorization cookie into /tmp/xauth2
> 	XAUTHORITY=/tmp/xauth xauth -f /tmp/xauth2 generate $DISPLAY .
> 
> 	# test X connection - it fails!
> 	XAUTHORITY=/tmp/xauth2 xterm
> 
> I tested the same sequence of commands with the regular X server and it
> worked just fine.
> 
> Note that the problem seems to be shared by Xnest as well.
> 
The SECURITY extension is disabled in recent builds, so I'll close this
bug.  If you'd still like it fixed (and it still happens with newer
Xephyr/Xnest) I suggest reporting the issue to bugs.freedesktop.org.
Thanks for your report.

Cheers,
Julien

Attachment: signature.asc
Description: Digital signature


--- End Message ---

Reply to: