summaryrefslogtreecommitdiffstats
path: root/common
Commit message (Collapse)AuthorAgeFilesLines
* Second batch of initial commits:Timothy Pearson2019-03-022-0/+52
| | | | | | | * Add server/group pamming * Partially fix immediate exit after login Still will not compile due to libraptorsmiface being too new
* Add definition for ppc64 architectureTimothy Pearson2019-03-021-1/+1
|
* Fix typo s/BITMACACHE/BITMAPCACHE/Koichiro IWAO2018-12-131-1/+1
|
* use MS name for PDU typesKoichiro IWAO2018-12-121-6/+6
| | | | | RDP_PDU_REDIRECT has been removed as it is not found in MS-RDPBCGR and not used anywhere.
* use MS for orderType constantsKoichiro IWAO2018-12-121-18/+16
|
* add some more constants and use themKoichiro IWAO2018-11-271-0/+5
|
* use MS name for constantsKoichiro IWAO2018-11-271-56/+53
|
* neutrinordp: don't enable remote_app if the INFO_RAIL flag is not setdaixj2018-11-232-0/+2
|
* Merge branch 'devel' of https://github.com/neutrinolabs/xrdp into devel-macdaixj2018-10-251-0/+6
|\
| * common: add constants of glyph support levelKoichiro IWAO2018-10-251-0/+6
| |
* | Support Cache Glyph Revison 2, issue #367daixj2018-10-251-0/+1
|/
* Add TLSv1.3 supportKoichiro IWAO2018-09-141-0/+15
| | | | | | | | Actually, TLSv1.3 will be enabled without this change if xrdp is compiled with OpenSSL or alternatives which support TLSv1.3. This commit makes to enable or disable TLSv1.3 explicitly. Also, this commit adds a log "TLSv1.3 enabled by config, but not supported by system OpenSSL". if xrdp installation doesn't support TLSv1.3. It should be user-friendly.
* fix issue #1112: set SSL object's read_ahead flag to be 0daixj2018-05-211-1/+1
|
* Merge pull request #1096 from metalefty/version_infometalefty2018-04-132-1/+16
|\ | | | | Show OpenSSL version to --version
| * xrdp: add OpenSSL version to --versionKoichiro IWAO2018-04-102-1/+16
| | | | | | | | While here, cleanup --help, --version, and when unknown option.
* | UDS file deleted after first connectionBen Cohen2018-03-272-0/+20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If you run xrdp with a Unix Domain Socket (UDS) for the port specified in /etc/xrdp/xrdp.ini then the first connection succeeds but subsequent connections fail. In fact the UDS is deleted from the filesystem as soon as the first connection is established. Test case: 1. Edit /etc/xrdp/xrdp.ini to set "port=/var/run/xrdp-local.socket". 2. Restart xrdp. 3. Run the following. When rdesktop starts up and the logon dialog is displayed, press "Cancel". sudo socat TCP-LISTEN:12345 UNIX-CONNECT:/var/run/xrdp-local.socket & rdesktop localhost:12345 4. Run the following: sudo socat TCP-LISTEN:12346 UNIX-CONNECT:/var/run/xrdp-local.socket & rdesktop localhost:12346 Expected behaviour: rdesktop starts up and displays the logon dialog. Observed behaviour: rdesktop exits with "ERROR: Connection closed" and socat exits with "No such file or directory. This is because in the child process after forking, xrdp_listen_fork() calls trans_delete() which deletes the UDS. Simply commenting out the g_file_delete() and g_free() fixes this, but that isn't a proper solution because trans_delete() is called from elsewhere where the UDS might no longer be wanted. Fix by adding a function trans_delete_from_child() that frees and clears listen_filename before calling trans_delete(), and call the new function from xrdp_listen_fork(). (Workaround: set "fork=false" in /etc/xrdp/xrdp.ini, because trans_delete() is then not called.)
* | Corrected endianness detection on ppc64el.Fernando Seiti Furusato2018-03-271-4/+8
|/ | | | | | | | | In common/arch.h, the endianness detection considers all powerpc architectures as big endian. Since that is not true for ppc64el, I added a verification that checks other preprocessor macros, only for ppc cases. Signed-off-by: Fernando Seiti Furusato <ferseiti@gmail.com>
* common: ssl_calls: add support for OpenSSL>=1.1.0 API for DH keysspeidy2018-03-221-13/+68
| | | | | also fixes some memory leak introduced in PR#1024. and adds a check that DH params generated successfully. write a proper log message if not.
* common: ssl_calls: check if SSL object created right after its creation.speidy2018-03-211-7/+8
|
* common: temporarily disable DHEKoichiro IWAO2018-03-181-0/+4
| | | | until make it possible to use generated DH parameters per installation.
* common: regenerate dhparamKoichiro IWAO2018-03-011-28/+24
| | | | Generated by: openssl dhparam -C 2236
* common: obey coding style, remove trailing spaceKoichiro IWAO2018-03-011-11/+15
|
* add support for DHE ciphers via compiled in dhparamEnrico Tagliavini2018-03-011-0/+61
| | | | | | | | | | | | | | | | | make it possible to use regular (non EC) EDH ciphers. To make this possible a Diffie-Hellman parameter must be passed to the openssl library. There are a few options possible as described in the manuals at [1] and [2]. Simplest approach is to generate a DH parameter using openssl dhparam -C <lenght> and include the code into the application. The lenght used for this commit is 2236 bits long, which is the longest possible without risking backward incompatibilities with old systems as stated in [1]. Newer systems should use ECDH anyway, so it makes sense to keep this method as compatible with older system as possible. Paramters longer than 2048 should still be secure enough at the time of writing. [1] https://wiki.openssl.org/index.php/Diffie-Hellman_parameters [2] https://wiki.openssl.org/index.php/Manual:SSL_CTX_set_tmp_dh_callback(3)
* enable automatic ECDH when possible (openssl 1.0.2)Enrico Tagliavini2018-03-011-0/+3
| | | | | | | | | | | Openssl 1.1.0 and later are enabling ECDH automatically, but for older version it must be enabled explicitly or all Perfect Forward Secrecy ciphers will be silently ignored. See also [1]. This commit applies the same fix as found in CnetOS 7 httpd package to enable automatic ECDH as found in [2]. [1] https://wiki.openssl.org/index.php/Diffie-Hellman_parameters [2] https://git.centos.org/blob/rpms!httpd.git/c7/SOURCES!httpd-2.4.6-ssl-ecdh-auto.patch
* common: log what value is set to tls_ciphersKoichiro IWAO2018-02-201-0/+1
| | | | Related to #1033.
* common: quit using `!` as comment out symbol in config filesKoichiro IWAO2018-02-201-1/+1
| | | | | | | | | It is not used anywhere in default config. Some config like `tls_ciphers` might contain `!` like this: tls_ciphers=FIPS:!aNULL:!eNULL Fixes #1033.
* log: revert permissiondaixj2018-02-131-0/+0
|
* log: fix fd checkingdaixj2018-02-131-2/+2
|
* log: remove unused code and fix potential memory leakdaixj2018-02-131-11/+0
|
* common: add more capset constantsKoichiro IWAO2017-12-011-4/+16
| | | | | | defined at MS-RDPBCGR 2.2.1.13.1.1.1 [1] and sort [1] https://msdn.microsoft.com/en-us/library/cc240486.aspx
* common: express capability set constants in hexKoichiro IWAO2017-12-011-19/+19
| | | | | | as same as done in MS-RDPBCGR 2.2.1.13.1.1.1 [1]. [1] https://msdn.microsoft.com/en-us/library/cc240486.aspx
* xrdp_sec: constify color depth valueKoichiro IWAO2017-12-011-0/+7
|
* common: suppress log when closing log filesKoichiro IWAO2017-11-301-3/+0
| | | | | | | because if xrdp is running 'fork=yes' mode, the log message 'shutting down log subsystem...' is logged everytime when the child process is exitting. In other words, everytime when clients are disconnecting. This is a little bit too vebose.
* common: add more references to constants' originKoichiro IWAO2017-11-241-438/+498
| | | | | | | | | | classify constants into these 5 types * constants for xrdp * constants come from ITU-T Recommendations * constants come from Remote Desktop Protocol * constants come from other MS products * unclassified yet
* common: add references to constants' originKoichiro IWAO2017-11-241-65/+93
|
* common: avoid 100% cpu on ssl accept, can be fake clientJay Sorg2017-11-221-0/+9
|
* Implements the accept/close logic for vsockJustin Terry (VM)2017-11-171-0/+42
|
* remove crc16.h from common/Makefile.amJay Sorg2017-11-091-1/+0
|
* remove empty crc16.h fileJay Sorg2017-11-091-0/+0
|
* common, return -1 for bad socketJay Sorg2017-11-071-2/+2
|
* use g_memcpy, bracesJay Sorg2017-11-072-1/+3
|
* vsock, move some definesJay Sorg2017-11-074-26/+8
|
* Implements XRDP over vsockJustin Terry (VM)2017-11-074-1/+72
| | | | | 1. Implements the ability to use AV_VSOCK for the transport rather than TCP. 2. Updates the ini file to be able to conditionally turn this feature on.
* fix typo s/Roration/Rotation/Koichiro IWAO2017-11-061-1/+1
|
* Constify extended mouse eventsKoichiro IWAO2017-11-061-0/+5
|
* Constify mouse event flags, use the MS name for constantsKoichiro IWAO2017-11-061-7/+10
|
* Add some more Input Capability Set constantsKoichiro IWAO2017-11-061-5/+10
|
* log: add log level TRACEKoichiro IWAO2017-10-132-1/+11
| | | | | TRACE means more verbose than DEBUG. syslog doesn't have more verbose level than DEBUG, map TRACE to DEBUG for syslog.
* common: prevent raw use of snprintfKoichiro IWAO2017-10-031-7/+7
|
* xrdp: constify input event typeKoichiro IWAO2017-10-021-0/+1
|