Commit 3f00ca5
committed
fix(pam-rdp): bypass mstsc TLS cert validation in generated .rdp
Generated .rdp file now sets `authentication level:i:0`. mstsc validates
the server's TLS cert by default and rejects the bridge's self-signed
cert with "unexpected server authentication certificate", terminating
the connection before the X.224 handshake. FreeRDP and Windows App
don't enforce the same check, so this only manifests for mstsc users.
Verified through mstsc on a Windows EC2 connecting via gateway+relay.1 parent 9357a92 commit 3f00ca5
1 file changed
Lines changed: 6 additions & 1 deletion
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
313 | 313 | | |
314 | 314 | | |
315 | 315 | | |
| 316 | + | |
| 317 | + | |
| 318 | + | |
| 319 | + | |
316 | 320 | | |
317 | 321 | | |
318 | | - | |
| 322 | + | |
| 323 | + | |
319 | 324 | | |
320 | 325 | | |
321 | 326 | | |
| |||
0 commit comments