summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPierre Ossman <ossman@cendio.se>2018-06-07 14:57:17 +0200
committerPierre Ossman <ossman@cendio.se>2018-06-07 14:57:17 +0200
commite6bad200e470ea675a00980b83008d63197e1858 (patch)
treec234b8e4cfb98d182d6193c6bf8ceb396fc81874
parent13364d70ddfd47e25793f03c70e05b1f42e7731c (diff)
downloadnovnc-e6bad200e470ea675a00980b83008d63197e1858.tar.gz
Add debug logging for Tight authentication
Makes it easier to diagnose user issues when we can see what the server and noVNC are trying to negotiate.
-rw-r--r--core/rfb.js6
1 files changed, 6 insertions, 0 deletions
diff --git a/core/rfb.js b/core/rfb.js
index d336d6c..2f4e815 100644
--- a/core/rfb.js
+++ b/core/rfb.js
@@ -1006,6 +1006,8 @@ RFB.prototype = {
serverSupportedTunnelTypes[cap_code] = { vendor: cap_vendor, signature: cap_signature };
}
+ Log.Debug("Server Tight tunnel types: " + serverSupportedTunnelTypes);
+
// choose the notunnel type
if (serverSupportedTunnelTypes[0]) {
if (serverSupportedTunnelTypes[0].vendor != clientSupportedTunnelTypes[0].vendor ||
@@ -1013,6 +1015,7 @@ RFB.prototype = {
return this._fail("Client's tunnel type had the incorrect " +
"vendor or signature");
}
+ Log.Debug("Selected tunnel type: " + clientSupportedTunnelTypes[0]);
this._sock.send([0, 0, 0, 0]); // use NOTUNNEL
return false; // wait until we receive the sub auth count to continue
} else {
@@ -1058,9 +1061,12 @@ RFB.prototype = {
serverSupportedTypes.push(capabilities);
}
+ Log.Debug("Server Tight authentication types: " + serverSupportedTypes);
+
for (let authType in clientSupportedTypes) {
if (serverSupportedTypes.indexOf(authType) != -1) {
this._sock.send([0, 0, 0, clientSupportedTypes[authType]]);
+ Log.Debug("Selected authentication type: " + authType);
switch (authType) {
case 'STDVNOAUTH__': // no auth