From e6bad200e470ea675a00980b83008d63197e1858 Mon Sep 17 00:00:00 2001 From: Pierre Ossman Date: Thu, 7 Jun 2018 14:57:17 +0200 Subject: [PATCH] Add debug logging for Tight authentication Makes it easier to diagnose user issues when we can see what the server and noVNC are trying to negotiate. --- core/rfb.js | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/core/rfb.js b/core/rfb.js index d336d6c..2f4e815 100644 --- a/core/rfb.js +++ b/core/rfb.js @@ -1006,6 +1006,8 @@ RFB.prototype = { serverSupportedTunnelTypes[cap_code] = { vendor: cap_vendor, signature: cap_signature }; } + Log.Debug("Server Tight tunnel types: " + serverSupportedTunnelTypes); + // choose the notunnel type if (serverSupportedTunnelTypes[0]) { if (serverSupportedTunnelTypes[0].vendor != clientSupportedTunnelTypes[0].vendor || @@ -1013,6 +1015,7 @@ RFB.prototype = { return this._fail("Client's tunnel type had the incorrect " + "vendor or signature"); } + Log.Debug("Selected tunnel type: " + clientSupportedTunnelTypes[0]); this._sock.send([0, 0, 0, 0]); // use NOTUNNEL return false; // wait until we receive the sub auth count to continue } else { @@ -1058,9 +1061,12 @@ RFB.prototype = { serverSupportedTypes.push(capabilities); } + Log.Debug("Server Tight authentication types: " + serverSupportedTypes); + for (let authType in clientSupportedTypes) { if (serverSupportedTypes.indexOf(authType) != -1) { this._sock.send([0, 0, 0, clientSupportedTypes[authType]]); + Log.Debug("Selected authentication type: " + authType); switch (authType) { case 'STDVNOAUTH__': // no auth -- 2.39.2