Your message dated Mon, 7 Jun 2010 12:11:25 +0200
with message-id <[email protected]>
and subject line Re: Bug#488918: xserver-xephyr: Xephyr/Xnest broken
authorization cookie generation (SECURITY extension)
has caused the Debian Bug report #488918,
regarding xserver-xephyr: Xephyr/Xnest broken authorization cookie generation
(SECURITY extension)
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
488918: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488918
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: xserver-xephyr
Severity: important
For some reason the server does not allow cookies were generated by
xauth (regardless of whether the cookie is a trusted or untrusted type).
Reproducing the bug::
# create auth
rm -f /tmp/xauth
xauth -f /tmp/xauth add :1 . $(mcookie)
# run xephyr with auth
Xephyr :1 -auth /tmp/xauth &
# set Xephyr as X server
DISPLAY=:1
# test
XAUTHORITY=/tmp/xauth xterm
# now try to connect to the server with a "generated" X
# authorization
rm -f /tmp/xauth2
# generate new authorization cookie into /tmp/xauth2
XAUTHORITY=/tmp/xauth xauth -f /tmp/xauth2 generate $DISPLAY .
# test X connection - it fails!
XAUTHORITY=/tmp/xauth2 xterm
I tested the same sequence of commands with the regular X server and it
worked just fine.
Note that the problem seems to be shared by Xnest as well.
-- System Information:
Debian Release: 4.0
APT prefers stable
APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.24-16-386
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=ANSI_X3.4-1968)
(ignored: LC_ALL set to C)
--- End Message ---
--- Begin Message ---
On Wed, Jul 2, 2008 at 04:27:53 +0000, Liraz Siri wrote:
> Package: xserver-xephyr
> Severity: important
>
>
> For some reason the server does not allow cookies were generated by
> xauth (regardless of whether the cookie is a trusted or untrusted type).
>
> Reproducing the bug::
>
> # create auth
> rm -f /tmp/xauth
> xauth -f /tmp/xauth add :1 . $(mcookie)
>
> # run xephyr with auth
> Xephyr :1 -auth /tmp/xauth &
>
> # set Xephyr as X server
> DISPLAY=:1
>
> # test
> XAUTHORITY=/tmp/xauth xterm
>
> # now try to connect to the server with a "generated" X
> # authorization
> rm -f /tmp/xauth2
>
> # generate new authorization cookie into /tmp/xauth2
> XAUTHORITY=/tmp/xauth xauth -f /tmp/xauth2 generate $DISPLAY .
>
> # test X connection - it fails!
> XAUTHORITY=/tmp/xauth2 xterm
>
> I tested the same sequence of commands with the regular X server and it
> worked just fine.
>
> Note that the problem seems to be shared by Xnest as well.
>
The SECURITY extension is disabled in recent builds, so I'll close this
bug. If you'd still like it fixed (and it still happens with newer
Xephyr/Xnest) I suggest reporting the issue to bugs.freedesktop.org.
Thanks for your report.
Cheers,
Julien
signature.asc
Description: Digital signature
--- End Message ---