Go to file
2021-07-14 05:38:58 +10:00
.gitignore Bump up to 0.9.16. 2021-05-01 09:23:33 +10:00
openssl.conf Add expanded openssl.conf to sources, use no location in certificate 2017-01-22 22:23:24 -08:00
README.Fedora Adjust README.Fedora file (do not use wrapper for Xorg any more). 2021-01-01 12:32:05 +11:00
sources Bump up to 0.9.16. 2021-05-01 09:23:33 +10:00
xrdp-0.9.4-service.patch Bump up to 0.9.4. 2017-10-06 14:36:47 +11:00
xrdp-0.9.6-script-interpreter.patch Actually add the script interpreter patch. 2018-04-23 15:22:45 +10:00
xrdp-0.9.9-sesman.patch Fix sesman.ini patch. 2019-01-11 19:22:02 +11:00
xrdp-0.9.10-scripts-libexec.patch Fix syntax errors in the scripts path patch. 2019-05-03 08:13:14 +10:00
xrdp-0.9.14-vnc-uninit.patch Add a patch for uninitialised variables, courtesy of Dan Horák. 2020-09-01 18:19:43 +10:00
xrdp-0.9.15-sesman-ini.patch Use /usr/libexec/Xorg for Xorg session on Fedora and RHEL8+. 2021-01-01 12:28:47 +11:00
xrdp-0.9.16-arch.patch Adjust arch patch. 2021-05-01 09:39:52 +10:00
xrdp-0.9.16-xrdp-ini.patch Adjust xrdp.ini patch. 2021-05-01 09:32:48 +10:00
xrdp-polkit-1.rules README.Fedora: VSOCK support. 2020-01-30 05:55:40 +11:00
xrdp-sesman.pamd upgrade to 0.9.0 2015-07-15 14:34:45 -03:00
xrdp.logrotate Remove daily and compress from logrotate file (BZ #1977175). 2021-07-14 05:38:58 +10:00
xrdp.spec Adjust arch patch. 2021-05-01 09:39:52 +10:00
xrdp.sysconfig initial version 2009-08-14 18:01:35 +00:00
xrdp.te Remove setpriv patch and adjust SELinux policy to match. 2021-01-02 11:19:51 +11:00

Restarts
========

Service restarts after RPM package upgrades have been disabled on purpose.
This is to avoid a situation where an update is performed from within a
session running on xrdp, which can then cause dnf to only perform part of the
transaction and leave the system in a state that requires further manual
intervention, including removal of duplicate packages etc.

So, it will be up to the user/admin to restart xrdp service after any RPM
package upgrade. This is in line with what other GUI systems like Xorg and
Wayland do.

xorgxrdp
========

Note that xorgxrdp is not installed and configured by default. Each build
depends on specific binary version of Xorg, which tends to create very strict
installation dependencies that can be an inconvenience in EPEL.

SELinux
=======

Please note that you may need to install xrdp-selinux package in order to get
the required SELinux policy that will allow xrdp and associated processes to
run successfully if SELinux is enabled. On versions of Fedora and RHEL that
support weak dependencies, xrdp-selinux will be a recommended package.

WARNING: The policy module contains a rule that permits unconfined_service_t
processes to transition into unconfined_t. If xrdp is not the only service
that runs as unconfined_service_t on your system, this policy will allow any
other such service to transition as well.

Default configuration in /etc/pam.d/xrdp-sesman uses password-auth for auth,
account, password and session. This may result in an incorrect context for
the processes in the session. Please adjust this file to match your desktop
environment. An example for Gnome desktop is given in the file.

TigerVNC >= 1.8.0
=================

TigerVNC 1.8.0 enables clipboard support by default (i.e. no need to run
vncconfig), which may cause disconnections in xrdp. To avoid the issue, these
can be added to [Xvnc] stanza in /etc/xrdp/sesman.ini:

param=-AcceptCutText=0
param=-SendCutText=0
param=-SendPrimary=0
param=-SetPrimary=0

Of course, cut and paste support will not work with these set.

Runlevel
========

If the system is configured to boot into graphical target, you may experience
problems with xrdp Gnome sessions. In order to avoid this, put the system into
multi user target. Like this:

systemctl set-default multi-user.target

Then reboot.

VSOCK
========
An example of a how to set up xrdp with VSOCK can be found here:

https://bugzilla.redhat.com/show_bug.cgi?id=1787953#c22

Please note that polkit rules for active sessions, allowing access to colord
and repository updates are already shipped, but in a current, JavaScript
format.