Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

mstshash is set to the username #10256

Open
hedwigz opened this issue Jun 5, 2024 · 6 comments
Open

mstshash is set to the username #10256

hedwigz opened this issue Jun 5, 2024 · 6 comments

Comments

@hedwigz
Copy link

hedwigz commented Jun 5, 2024

The Client X.224 Connection Request has a field routingToken which is optional. FreeRDP sets this value to the username (code). Since this message is sent before the connection is encrypted, it potentially leaks usernames to the network.

I tested to see whether mstsc sets this field to the username and I found that it does not

@akallabeth
Copy link
Member

@hedwigz
Copy link
Author

hedwigz commented Jun 6, 2024

@akallabeth what do you think is the right action here?

@akallabeth
Copy link
Member

@hedwigz good question.
so far the old behavior is working fine so far (except for the public username) with old and new systems.
if we change this, at least stuff before 2012 might break.

@hedwigz
Copy link
Author

hedwigz commented Jun 6, 2024

@akallabeth how about an opt-out command line argument? /remove-mstshash

@akallabeth
Copy link
Member

not sure a commandline is a good idea for such stuff.
should be handled automatically the best way possible (the command line already is a monster)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants