On 2012-09-04 13:43:55, Ted Gould wrote:
> On Mon, 2012-09-03 at 21:34 +0000, Tyler Hicks wrote:
> > After reviewing revision 30 in the upstream libpam-freerdp project, a
> > privileged kill() of session_pid still exists at the beginning of
> > pam_sm_open_session(). All other issues seem to be addressed. Thanks!
> 
> Merge proposal posted:
> 
> https://code.launchpad.net/~ted/libpam-freerdp/unpriviledged-
> kill/+merge/122680

Looks good.

> > Also, have you confirmed that freerdp-auth-check.c's use of the
> > libfreerdp API attempts to negotiate encrypted connections (TLS,
> > preferably) to the RDP server by default? I'm still not finding any
> > documentation of the API.
> 
> So, it seems that what it does is use what the server asks it to.  If
> the server has TLS enabled it definitely uses it, and gives cert errors
> (we had a misconfigured cert on a test server), but when we disabled TLS
> server side it is happy.  So does that satisfy "by default" ?

Yes. When I said "by default", I meant "does freerdp-auth-check try to
use the most secure authentication option supported by the server?".

I'm happy from a security standpoint. Thanks for fixing everything so
quickly!

ACK

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1039634

Title:
  [MIR] libpam-freerdp

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libpam-freerdp/+bug/1039634/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to