Am Do, den 06.01.2005 schrieb P@xxxxxxxxxxxxxx um 18:47: > https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=141515 > > Essentially what this means is that most X applications will > break if forwarded back to a FC3 system with default config. > Now it wouldn't be so bad if they just wouldn't work. > They break in subtle ways usually related to mouse events. > This is just silly IMHO and will cause no end of hassles > for users trying to figure out what's going on and > also be a waste of time for developers of those X apps > who will receive bogus bug reports. > > So can we change the upstream default back to what it used to be? No, that would be silly. Reverting a security improvement just because users do not RTFM? As commented too in the bugzilla entry the change is made long ago in the upstream OpenSSH. See the FAQ http://www.openssh.org/faq.html#3.12 http://www.openssh.org/faq.html#3.123 > Pádraig Brady - http://www.pixelbeat.org Use OpenSSH properly and as documented and all is well. Alexander -- Alexander Dalloz | Enger, Germany | new address - new key: 0xB366A773 legal statement: http://www.uni-x.org/legal.html Fedora GNU/Linux Core 2 (Tettnang) on Athlon kernel 2.6.9-1.6_FC2smp Serendipity 21:01:02 up 14 days, 22:45, load average: 1.04, 0.72, 0.54
Attachment:
signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil