From owner-freebsd-ports-bugs@freebsd.org Fri Sep 7 00:11:49 2018 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C30C6FEA303 for ; Fri, 7 Sep 2018 00:11:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 460B072600 for ; Fri, 7 Sep 2018 00:11:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 0A3EEFEA302; Fri, 7 Sep 2018 00:11:49 +0000 (UTC) Delivered-To: ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DC635FEA300 for ; Fri, 7 Sep 2018 00:11:48 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 7DABC725F4 for ; Fri, 7 Sep 2018 00:11:48 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id B357F3A10 for ; Fri, 7 Sep 2018 00:11:47 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id w870BluQ051197 for ; Fri, 7 Sep 2018 00:11:47 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id w870BlGT051187 for ports-bugs@FreeBSD.org; Fri, 7 Sep 2018 00:11:47 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 231210] net/xrdp clipboard copy/paste broken in 0.9.x releases Date: Fri, 07 Sep 2018 00:11:46 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: dnewman@networktest.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: meta@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 07 Sep 2018 00:11:50 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D231210 Bug ID: 231210 Summary: net/xrdp clipboard copy/paste broken in 0.9.x releases Product: Ports & Packages Version: Latest Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: meta@FreeBSD.org Reporter: dnewman@networktest.com Assignee: meta@FreeBSD.org Flags: maintainer-feedback?(meta@FreeBSD.org) Starting with xrdp-0.9.x releases, copy and paste functions no longer work = in xrdp when using a MacOS client and an xrdp server running on FreeBSD. In this case, the xrdp-0.9.7_1,1 server runs on a FreeBSD 11.2-RELEASE-p2 machine that also runs xfce4. Here is the output of 'uname -a': FreeBSD obfuscated.example.com 11.2-RELEASE-p2 FreeBSD 11.2-RELEASE-p2 #0: = Tue Aug 14 21:45:40 UTC 2018=20=20=20=20 root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC amd64 If it's relevant the FreeBSD machine runs in VMware vSphere Enterprise 5.5.= =20 The clients run MacOS 10.13.6 and the RDP client is Microsoft Remote Deskto= p v. 10.2.1 (1143). Also, copy-paste from this client using xrdp 0.6.x and earli= er versions. I have pasted below the contents of /usr/local/etc/xrdp/xrdp.ini as install= ed by the pkg system. Please let me know if you need other info.=20 Thanks. xrdp.ini: [dnewman@lemond3 ~]$ sudo cat /usr/local/etc/xrdp/xrdp.ini [Globals] ; xrdp.ini file version number ini_version=3D1 ; fork a new process for each incoming connection fork=3Dtrue ; tcp port to listen port=3D3389 ; 'port' above should be connected to with vsock instead of tcp use_vsock=3Dfalse ; regulate if the listening socket use socket option tcp_nodelay ; no buffering will be performed in the TCP stack tcp_nodelay=3Dtrue ; regulate if the listening socket use socket option keepalive ; if the network connection disappear without close messages the connection will be closed tcp_keepalive=3Dtrue #tcp_send_buffer_bytes=3D32768 #tcp_recv_buffer_bytes=3D32768 ; security layer can be 'tls', 'rdp' or 'negotiate' ; for client compatible layer security_layer=3Dnegotiate ; minimum security level allowed for client ; can be 'none', 'low', 'medium', 'high', 'fips' crypt_level=3Dhigh ; X.509 certificate and private key ; openssl req -x509 -newkey rsa:2048 -nodes -keyout key.pem -out cert.pem -= days 365 certificate=3D key_file=3D ; set SSL protocols ; can be comma separated list of 'SSLv3', 'TLSv1', 'TLSv1.1', 'TLSv1.2' ssl_protocols=3DTLSv1, TLSv1.1, TLSv1.2 ; set TLS cipher suites #tls_ciphers=3DHIGH ; Section name to use for automatic login if the client sends username ; and password. If empty, the domain name sent by the client is used. ; If empty and no domain name is given, the first suitable section in ; this file will be used. autorun=3D allow_channels=3Dtrue allow_multimon=3Dtrue bitmap_cache=3Dtrue bitmap_compression=3Dtrue bulk_compression=3Dtrue #hidelogwindow=3Dtrue max_bpp=3D32 new_cursors=3Dtrue ; fastpath - can be 'input', 'output', 'both', 'none' use_fastpath=3Dboth ; when true, userid/password *must* be passed on cmd line #require_credentials=3Dtrue ; You can set the PAM error text in a gateway setup (MAX 256 chars) #pamerrortxt=3Dchange your password according to policy at http://url ; ; colors used by windows in RGB format ; blue=3D009cb5 grey=3Ddedede #black=3D000000 #dark_grey=3D808080 #blue=3D08246b #dark_blue=3D08246b #white=3Dffffff #red=3Dff0000 #green=3D00ff00 #background=3D626c72 ; ; configure login screen ; ; Login Screen Window Title #ls_title=3DMy Login Title ; top level window background color in RGB format ls_top_window_bg_color=3D009cb5 ; width and height of login screen ls_width=3D350 ls_height=3D430 ; login screen background color in RGB format ls_bg_color=3Ddedede ; optional background image filename (bmp format). #ls_background_image=3D ; logo ; full path to bmp-file or file in shared folder ls_logo_filename=3D ls_logo_x_pos=3D55 ls_logo_y_pos=3D50 ; for positioning labels such as username, password etc ls_label_x_pos=3D30 ls_label_width=3D60 ; for positioning text and combo boxes next to above labels ls_input_x_pos=3D110 ls_input_width=3D210 ; y pos for first label and combo box ls_input_y_pos=3D220 ; OK button ls_btn_ok_x_pos=3D142 ls_btn_ok_y_pos=3D370 ls_btn_ok_width=3D85 ls_btn_ok_height=3D30 ; Cancel button ls_btn_cancel_x_pos=3D237 ls_btn_cancel_y_pos=3D370 ls_btn_cancel_width=3D85 ls_btn_cancel_height=3D30 [Logging] LogFile=3Dxrdp.log LogLevel=3DDEBUG EnableSyslog=3Dtrue SyslogLevel=3DDEBUG ; LogLevel and SysLogLevel could by any of: core, error, warning, info or d= ebug [Channels] ; Channel names not listed here will be blocked by XRDP. ; You can block any channel by setting its value to false. ; IMPORTANT! All channels are not supported in all use ; cases even if you set all values to true. ; You can override these settings on each session type ; These settings are only used if allow_channels=3Dtrue rdpdr=3Dtrue rdpsnd=3Dtrue drdynvc=3Dtrue cliprdr=3Dtrue rail=3Dtrue xrdpvr=3Dtrue tcutils=3Dtrue ; for debugging xrdp, in section xrdp1, change port=3D-1 to this: #port=3D/tmp/.xrdp/xrdp_display_10 ; for debugging xrdp, add following line to section xrdp1 #chansrvport=3D/tmp/.xrdp/xrdp_chansrv_socket_7210 ; ; Session types ; ; Some session types such as Xorg, X11rdp and Xvnc start a display server. ; Startup command-line parameters for the display server are configured ; in sesman.ini. See and configure also sesman.ini. [Xorg] name=3DXorg lib=3Dlibxup.so username=3Dask password=3Dask ip=3D127.0.0.1 port=3D-1 code=3D20 [X11rdp] name=3DX11rdp lib=3Dlibxup.so username=3Dask password=3Dask ip=3D127.0.0.1 port=3D-1 xserverbpp=3D24 code=3D10 [Xvnc] name=3DXvnc lib=3Dlibvnc.so username=3Dask password=3Dask ip=3D127.0.0.1 port=3D-1 #xserverbpp=3D24 #delay_ms=3D2000 [console] name=3Dconsole lib=3Dlibvnc.so ip=3D127.0.0.1 port=3D5900 username=3Dna password=3Dask #delay_ms=3D2000 [vnc-any] name=3Dvnc-any lib=3Dlibvnc.so ip=3Dask port=3Dask5900 username=3Dna password=3Dask #pamusername=3Dasksame #pampassword=3Dasksame #pamsessionmng=3D127.0.0.1 #delay_ms=3D2000 [sesman-any] name=3Dsesman-any lib=3Dlibvnc.so ip=3Dask port=3D-1 username=3Dask password=3Dask #delay_ms=3D2000 [neutrinordp-any] name=3Dneutrinordp-any lib=3Dlibxrdpneutrinordp.so ip=3Dask port=3Dask3389 username=3Dask password=3Dask ; You can override the common channel settings for each session type #channel.rdpdr=3Dtrue #channel.rdpsnd=3Dtrue #channel.drdynvc=3Dtrue channel.cliprdr=3Dtrue #channel.rail=3Dtrue #channel.xrdpvr=3Dtrue --=20 You are receiving this mail because: You are the assignee for the bug.=