On Sat, Jul 17, 2010 at 04:47:22PM +0200, Martin Koegler wrote:
> This patchset contains various fixes/changes related to the security type 
> handling.

Hello Martin,

I've reviewed & commited your patches, you can read my comments. Thank
you very much, they really cleaned up the VeNCrypt code.

> 1 removes a leftover declaration

Accepted.

> 2-4 fixes the security type parameter in the vncviewer. The viewer has the 
> problem, that
> the handshake phase in the viewer uses a hardcoded list containing all 
> security types.
> The code creating CSecurity only honors the SecurityTypes parameter, which 
> only defaults to VncAuth.
> If multiple types are active in the server, vncviewer can select a type 
> disallowed by SecurityTypes.
> 
> The problem is fixed by:
> * Overriding the default value of SecurityTypes in the viewer
> * Using the content of SecurityTypes in the handshake phase

In my opinion those fixes were too complicated. I reused code from
Security class and now viewer uses same mechanism as server. Allowed
security types are controlled via -SecurityTypes option, as in server.

> The rest 5-12 implements a seamless integration of the VeNCrypt security type.
> The VeNCrypt security type was intended to be a generic selector allowing to 
> extend
> the number of possible security types from 2^8 to 2^32, so that every little 
> project
> can get their security types. The VeNCrypt code allowed to also negotiate 
> "traditional"
> security types like None and VncAuth. This patch aligns tigervnc with the 
> VeNCrypt behaviour.
> 
> With the patch, only the SecurityTypes parameter is left. It allows specifing 
> "old" and "new"
> security types in one list, eg: VncAuth,TLSNone,None
> The code will negotiate the first type of the server SecurityTypes paramter, 
> which is also enabled 
> on the client (unless the viewer would enable the client preference option).
> 
> Internally, server and client will always add VeNCrypt as first element of 
> their list and add all
> "old" security types of SecurityTypes after that. So if client or server 
> don't support VeNCrypt,
> they can only negotiate None or VncAuth.

In my opinion this should be configurable, not hardcoded. I haven't
updated default SecurityTypes value yet, I will do it when I merge
X509 support.

VeNCrypt related patches were accepted with minor changes.

Regards, Adam

-- 
Adam Tkac, Red Hat, Inc.

------------------------------------------------------------------------------
This SF.net email is sponsored by Sprint
What will you do first with EVO, the first 4G phone?
Visit sprint.com/first -- http://p.sf.net/sfu/sprint-com-first
_______________________________________________
Tigervnc-devel mailing list
Tigervnc-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/tigervnc-devel

Reply via email to