Hi Wolfgang, On Di 20 Nov 2018 15:27:25 CET, Wolfgang Schweer wrote:
On Mon, Nov 19, 2018 at 12:00:20AM +0100, Petter Reinholdtsen wrote:I had a look at the patch, and it is not obviously wrong, at least. I do not know the code well any more, but did test and read it, and it might work. I do not have x2go myself, so I can not test that part, though.Thanks for the feedback. I've now tested the patched killer script once again in a virtual machine environment: X2Go server running on a Debian Edu Buster combined server, X2Go Client on a Debian Edu Buster workstation with profile 'Standalone'. The complete set of X2Go component packages is available in testing since March 2018. The killer script works like expected. A git format-patch is attatted, generated against killer.git as of today. Wolfgang
I am not sure, if the patch is not a functional overkill. My observation was, that the x2goagent processes got killed by killer.
So maybe, we should protect those only. For the session applications, I am currently working on a sessreg based utmp/wtmp patch against X2Go Server.
I'll provide more info later today. Mike -- DAS-NETZWERKTEAM mike gabriel, herweg 7, 24357 fleckeby mobile: +49 (1520) 1976 148 landline: +49 (4354) 8390 139 GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22 0782 9AF4 6B30 2577 1B31 mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de
pgpHNsNontocG.pgp
Description: Digitale PGP-Signatur