From owner-freebsd-ports-bugs@FreeBSD.ORG Sat Sep 28 23:40:01 2013 Return-Path: Delivered-To: freebsd-ports-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 80B4B594 for ; Sat, 28 Sep 2013 23:40:01 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 5C28D29D9 for ; Sat, 28 Sep 2013 23:40:01 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r8SNe1LE029050 for ; Sat, 28 Sep 2013 23:40:01 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r8SNe1cx029039; Sat, 28 Sep 2013 23:40:01 GMT (envelope-from gnats) Resent-Date: Sat, 28 Sep 2013 23:40:01 GMT Resent-Message-Id: <201309282340.r8SNe1cx029039@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Peter Jeremy Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id CBA21554 for ; Sat, 28 Sep 2013 23:38:51 +0000 (UTC) (envelope-from peter@rulingia.com) Received: from vps.rulingia.com (host-122-100-2-194.octopus.com.au [122.100.2.194]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 6709029CE for ; Sat, 28 Sep 2013 23:38:51 +0000 (UTC) Received: from server.rulingia.com (c220-239-237-213.belrs5.nsw.optusnet.com.au [220.239.237.213]) by vps.rulingia.com (8.14.7/8.14.5) with ESMTP id r8SNcmdY030082 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for ; Sun, 29 Sep 2013 09:38:48 +1000 (EST) (envelope-from peter@rulingia.com) Received: from server.rulingia.com (localhost.rulingia.com [127.0.0.1]) by server.rulingia.com (8.14.7/8.14.7) with ESMTP id r8SNcgW0081046 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Sun, 29 Sep 2013 09:38:42 +1000 (EST) (envelope-from peter@server.rulingia.com) Received: (from peter@localhost) by server.rulingia.com (8.14.7/8.14.7/Submit) id r8SNcg0v081021; Sun, 29 Sep 2013 09:38:42 +1000 (EST) (envelope-from peter) Message-Id: <201309282338.r8SNcg0v081021@server.rulingia.com> Date: Sun, 29 Sep 2013 09:38:42 +1000 (EST) From: Peter Jeremy To: FreeBSD-gnats-submit@freebsd.org X-Send-Pr-Version: 3.114 Subject: ports/182474: net/tightvnc vncviewer can't handle null authentication X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list Reply-To: Peter Jeremy List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 28 Sep 2013 23:40:01 -0000 >Number: 182474 >Category: ports >Synopsis: net/tightvnc vncviewer can't handle null authentication >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sat Sep 28 23:40:00 UTC 2013 >Closed-Date: >Last-Modified: >Originator: Peter Jeremy >Release: FreeBSD 10.0-CURRENT amd64 >Organization: n/a >Environment: System: FreeBSD aspire.rulingia.com 8.3-STABLE FreeBSD 8.3-STABLE #19: Sun Jan 13 17:55:03 EST 2013 root@builder.rulingia.com:/obj/usr/src/sys/aspire i386 virtualbox-ose-4.2.18_1 tightvnc-1.3.10_3 >Description: vncviewer rejects empty passwords and therefore can't be used with VNC sessions that don't require authentication. Specifically, VBoxHeadless with the default null authentication still triggers vncviewer to request a password but vncviewer rejects an empty password. See also PR ports/182471 >How-To-Repeat: $ vncviewer server:6213 Connected to RFB server, using protocol version 3.8 Performing standard VNC authentication Password: Reading password failed >Fix: The following patch allows empty passwords to be entered. --- vncviewer/rfbproto.c~ 2006-12-08 18:20:03.000000000 +1100 +++ vncviewer/rfbproto.c 2013-09-29 09:19:34.782746129 +1000 @@ -569,7 +569,7 @@ passwd = getpass("Password: "); } - if (!passwd || strlen(passwd) == 0) { + if (!passwd) { fprintf(stderr, "Reading password failed\n"); return False; } >Release-Note: >Audit-Trail: >Unformatted: