From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on sa.int.altlinux.org X-Spam-Level: X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00 autolearn=ham version=3.2.5 Date: Sun, 5 Aug 2012 11:10:29 +0300 From: Michael Shigorin To: community-en@lists.altlinux.org Message-ID: <20120805081029.GW31317@osdn.org.ua> Mail-Followup-To: community-en@lists.altlinux.org References: <501DB1F8.6090105@prpcompany.com> <501DB248.1020901@prpcompany.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <501DB248.1020901@prpcompany.com> User-Agent: Mutt/1.4.2.1i Subject: Re: [Comm-en] Terminal presents text localhost login X-BeenThere: community-en@lists.altlinux.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: shigorin@gmail.com, "ALT Linux users \(in English only\)" List-Id: "ALT Linux users \(in English only\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 05 Aug 2012 08:10:35 -0000 Archived-At: List-Archive: On Sat, Aug 04, 2012 at 07:37:44PM -0400, JD Hupp wrote: > I'm testing the 5.0.2 School Terminal release to see how it > compares to Michael Shigorin's 5.0.2 Terminal snapshot. Forget ltsp-tde-t6_20120803-i586.iso -- I have stumbled upon the very same problem later in testing that night and so far didn't diagnose it; it's not related to School Terminal 5.0.x. > On both terminals, after credentials are submitted at the GUI login, > terminal responds with a text localhost login That's weird, do these credentials result in GUI desktop session when submitted to GUI login screen at the *server*? (should do; at least in my testing it was fine and that was enough to publish the image as the difference like this never manifested itself) > and rejects all login attempts over several accounts > with "Incorrect login." The text login is running local to the client thus the relevant accounts are those in the client's root (which is what's stored in /var/lib/ltsp/i586 on the server). There's little to be done with those: only the root login does help with debugging of things going wrong at the client itself, thus the most recent builds are now setting the root password in that chroot as identical to the terminal server's one. I'll work on that t6 (or unstable, or future t7 -- the trouble is so far the same) based image but so far it's moved to "untested" subdirectory on the FTP to indicate "a problem". If you have some kind of a detect list/wishlist, would be nice to see it (the "software poweroff" item is well known already). The timeframe is rather unpredictable though. -- ---- WBR, Michael Shigorin ------ Linux.Kiev http://www.linux.kiev.ua/