Run the following server command: xpra proxy :14500 --daemon=no --tcp-auth=sys:client-username=yes:verify-username=no --ssl-cert=/etc/xpra/ssl/cert.pem --ssl-key=/etc/xpra/ssl/key.pem --bind-tcp=0.0.0.0:14500 -d auth
this is the error that appears in the web browser:
Log:
2024-10-14 16:29:32,104 PAM: verify_username=True, client_username=False
2024-10-14 16:29:32,104 <class 'xpra.server.auth.pam.Authenticator'>({'client-username': {'yes:verify-username': 'no'}, 'exec_cwd': '/etc/xpra/ssl', 'remote': {'uuid': '23456789ab9abcd56789ab8234012-01231234-89abcd00-abc3456789a56-4456789abcd85689abcd01233', 'username': 'comsearch'}, 'connection': wss socket: 192.168.0.32:14500 <- 192.168.0.19:58596, 'socket-dirs': ['/run/user/$UID/xpra', '/run/xpra', '~/.xpra']})
Traceback (most recent call last):
File "/usr/lib64/python3.11/site-packages/xpra/server/core.py", line 1971, in make_authenticators
authenticator = aclass(**opts)
^^^^^^^^^^^^^^
File "/usr/lib64/python3.11/site-packages/xpra/server/auth/pam.py", line 50, in __init__
super().__init__(**kwargs)
File "/usr/lib64/python3.11/site-packages/xpra/server/auth/sys_auth_base.py", line 280, in __init__
super().__init__(**kwargs)
File "/usr/lib64/python3.11/site-packages/xpra/server/auth/sys_auth_base.py", line 88, in __init__
raise ValueError(f"invalid username {remote_username!r}")
ValueError: invalid username 'comsearch'
2024-10-14 16:29:32,104 instantiating authenticator for tcp
Traceback (most recent call last):
File "/usr/lib64/python3.11/site-packages/xpra/server/core.py", line 2006, in verify_auth
proto.authenticators = self.make_authenticators(socktype, remote, conn)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib64/python3.11/site-packages/xpra/server/core.py", line 1971, in make_authenticators
authenticator = aclass(**opts)
^^^^^^^^^^^^^^
File "/usr/lib64/python3.11/site-packages/xpra/server/auth/pam.py", line 50, in __init__
super().__init__(**kwargs)
File "/usr/lib64/python3.11/site-packages/xpra/server/auth/sys_auth_base.py", line 280, in __init__
super().__init__(**kwargs)
File "/usr/lib64/python3.11/site-packages/xpra/server/auth/sys_auth_base.py", line 88, in __init__
raise ValueError(f"invalid username {remote_username!r}")
ValueError: invalid username 'comsearch'
2024-10-14 16:29:32,105 Warning: authentication failed
2024-10-14 16:29:32,105 invalid username 'comsearch'
2024-10-14 16:29:33,107 Disconnecting client 192.168.0.19:58596:
2024-10-14 16:29:33,107 invalid username 'comsearch'
2024-10-14 16:29:33,111 1 packets received (1K bytes)
2024-10-14 16:29:33,111 1 packets sent (51 bytes)
2024-10-14 16:29:34,268 New socket connection received
2024-10-14 16:29:34,268 on '/run/user/0/xpra/iqlr8vm-14500'
2024-10-14 16:29:34,269 socktype=socket, encryption=None, keyfile=None
2024-10-14 16:29:34,321 New socket connection received
2024-10-14 16:29:34,321 on '/run/user/0/xpra/iqlr8vm-14500'
2024-10-14 16:29:34,322 socktype=socket, encryption=None, keyfile=None
2024-10-14 16:29:34,369 make_authenticators('socket', {'uuid': 'badfe5a29a292c3c6db1b3da3ad69475b55db97f18c2a19e6c8440065ad56ecf', 'session-id': '8a8c9397929a481389896924b3c2f8d8'}, socket socket:/run/user/0/xpra/iqlr8vm-14500) socket options={}
2024-10-14 16:29:34,370 processing authentication with (), remaining=(), digest_modes=('xor', 'hmac+sha512', 'hmac+sha3_512', 'hmac+sha3_384', 'hmac+sha3_256', 'hmac+sha3_224', 'hmac+sha384', 'hmac+sha256', 'hmac+sha224', 'hmac+blake2s', 'hmac+blake2b', 'des', 'kerberos', 'gss', 'u2f'), salt_digest_modes=('hmac+sha512', 'hmac+sha3_512', 'hmac+sha3_384', 'hmac+sha3_256', 'hmac+sha3_224', 'hmac+sha384', 'hmac+sha256', 'hmac+sha224', 'hmac+blake2s', 'hmac+blake2b')
2024-10-14 16:29:34,370 all 0 authentication modules passed
2024-10-14 16:29:34,379 make_authenticators('socket', {'uuid': 'badfe5a29a292c3c6db1b3da3ad69475b55db97f18c2a19e6c8440065ad56ecf', 'session-id': '5ca4bc26e86d4ec3a6f59c7f994446b1'}, socket socket:/run/user/0/xpra/iqlr8vm-14500) socket options={}
2024-10-14 16:29:34,380 processing authentication with (), remaining=(), digest_modes=('xor', 'hmac+sha512', 'hmac+sha3_512', 'hmac+sha3_384', 'hmac+sha3_256', 'hmac+sha3_224', 'hmac+sha384', 'hmac+sha256', 'hmac+sha224', 'hmac+blake2s', 'hmac+blake2b', 'des', 'kerberos', 'gss', 'u2f'), salt_digest_modes=('hmac+sha512', 'hmac+sha3_512', 'hmac+sha3_384', 'hmac+sha3_256', 'hmac+sha3_224', 'hmac+sha384', 'hmac+sha256', 'hmac+sha224', 'hmac+blake2s', 'hmac+blake2b')
2024-10-14 16:29:34,380 all 0 authentication modules passed
2024-10-14 16:29:34,619 New socket connection received
2024-10-14 16:29:34,619 on '/run/xpra/iqlr8vm-14500'
2024-10-14 16:29:34,619 socktype=socket, encryption=None, keyfile=None
2024-10-14 16:29:34,620 New socket connection received
2024-10-14 16:29:34,620 on '/run/xpra/iqlr8vm-14500'
when using this command:
xpra proxy :14500 --daemon=no --tcp-auth=sys --ssl-cert=/etc/xpra/ssl/cert.pem --ssl-key=/etc/xpra/ssl/key.pem --bind-tcp=0.0.0.0:14500 -d auth
Additionally, I had to manually change the cert and key directory in /usr/lib/systemd/system/xpra.service because the default installation does not reflect the new directory /etc/xpra/ssl/.... Proxy still not working because of a socket issue, but I will investigate and possibly open another ticket for that if necessary.
Hi ! After updating to the latest version of XPRA, I am still encountering the login issue
Description:
Unable to login to XPRA using proxy or directly launching from terminal. Invalid user error. This is from a new fresh installation.
System Information (please complete the following information):
EDIT: Also tested today with this version:
To Reproduce Steps to reproduce the behavior:
Run the following server command:
xpra proxy :14500 --daemon=no --tcp-auth=sys:client-username=yes:verify-username=no --ssl-cert=/etc/xpra/ssl/cert.pem --ssl-key=/etc/xpra/ssl/key.pem --bind-tcp=0.0.0.0:14500 -d auth
this is the error that appears in the web browser:
when using this command:
xpra proxy :14500 --daemon=no --tcp-auth=sys --ssl-cert=/etc/xpra/ssl/cert.pem --ssl-key=/etc/xpra/ssl/key.pem --bind-tcp=0.0.0.0:14500 -d auth
I get this log:
Additional info
thanks!