[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: ssh X forwarding change in FC3

Am Do, den 06.01.2005 schrieb P draigBrady com um 18:47:

> https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=141515
> Essentially what this means is that most X applications will
> break if forwarded back to a FC3 system with default config.
> Now it wouldn't be so bad if they just wouldn't work.
> They break in subtle ways usually related to mouse events.
> This is just silly IMHO and will cause no end of hassles
> for users trying to figure out what's going on and
> also be a waste of time for developers of those X apps
> who will receive bogus bug reports.
> So can we change the upstream default back to what it used to be?

No, that would be silly. Reverting a security improvement just because
users do not RTFM?

As commented too in the bugzilla entry the change is made long ago in
the upstream OpenSSH. See the FAQ


> Pádraig Brady - http://www.pixelbeat.org

Use OpenSSH properly and as documented and all is well.


Alexander Dalloz | Enger, Germany | new address - new key: 0xB366A773
legal statement: http://www.uni-x.org/legal.html
Fedora GNU/Linux Core 2 (Tettnang) on Athlon kernel 2.6.9-1.6_FC2smp 
Serendipity 21:01:02 up 14 days, 22:45, load average: 1.04, 0.72, 0.54 

Attachment: signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil

[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]