Hi, yes, it is the same issue. Your build has gss/kerberos activated. Support for that is still buggy.
Regards Armin Am October 17, 2019 4:00:39 PM UTC schrieb "Joshua A. Shaw via FreeRDP-devel" <freerdp-devel@lists.sourceforge.net>: >Good Day, > >I am trying to get a thinstation deployment up and running, but I >cannot get FreeRDP to connect to our RDS Deployment. The trouble seems >similar to https://github.com/FreeRDP/FreeRDP/issues/5069, but that >should be fixed in this version. My preference is to get the command >line version working, rather than requiring the users to go to the >extra step of logging in through RDWeb. So far, I cannot get either >option to work, but I am getting further with the RDP connection file >from RDWeb. What am I doing wrong? > >FreeRDP version is 2.0.0--dev5 >RDS Server is 2016 >RDS Security Layer is TLS 1.0 >RDS Encryption Level is Client Compatible >RDS NLA requirement is off for testing, but it didn't seem to have any >impact. >Load Balancing is split between 2 hosts. >My gateway is bypassed for local connections. >I have both the External CA and Local CA certs loaded to image. > >I have tried several command line options, but here are my most recent >attempts, with corresponding logs. >Command Options: >/v:<mybrokerFQDN> /u:<myusername> /p:<mypassword> /cert-ignore >/log-level:TRACE /g:<mygateway> /load-balance-info:'tsv://MS Termininal >Services Plugin.1.<mycollectionname>' /d:<mydomain> >/app-name:'<myappname>' /gum:detect >Resulting Log: >[09:58:51:187] [5354:5355] [WARN][com.winpr.sspi.Kerberos] - could not >get Kerberos default realm >[09:58:51:187] [5354:5355] [WARN][com.winpr.negotiate] - No Kerberos >credentials. Retry with NTLM >[09:58:51:187] [5354:5355] [WARN][com.winpr.sspi] - >InitializeSecurityContextA status SEC_E_NO_CREDENTIALS [0x8009030E] >[09:58:51:146] [5354:5355] [INFO][com.freerdp.client.common.cmdline] - >loading channelEx rdpdr >[09:58:51:146] [5354:5355] [INFO][com.freerdp.client.common.cmdline] - >loading channelEx rdpsnd >[09:58:51:146] [5354:5355] [DEBUG][com.freerdp.channels.cliprdr.client] >- VirtualChannelEntryEx >[09:58:51:146] [5354:5355] [INFO][com.freerdp.client.common.cmdline] - >loading channelEx cliprdr >[09:58:51:148] [5354:5355] [DEBUG][com.freerdp.client.x11] - Searching >for XInput pointer device >[09:58:51:149] [5354:5355] [DEBUG][com.freerdp.client.x11] - Pointer >device: 6 >[09:58:51:155] [5354:5355] [DEBUG][com.freerdp.core.nego] - Enabling >security layer negotiation: TRUE >[09:58:51:155] [5354:5355] [DEBUG][com.freerdp.core.nego] - Enabling >restricted admin mode: FALSE >[09:58:51:155] [5354:5355] [DEBUG][com.freerdp.core.nego] - Enabling >RDP security: TRUE >[09:58:51:155] [5354:5355] [DEBUG][com.freerdp.core.nego] - Enabling >TLS security: TRUE >[09:58:51:155] [5354:5355] [DEBUG][com.freerdp.core.nego] - Enabling >NLA security: TRUE >[09:58:51:155] [5354:5355] [DEBUG][com.freerdp.core.nego] - Enabling >NLA extended security: FALSE >[09:58:51:155] [5354:5355] [DEBUG][com.freerdp.core.nego] - state: >NEGO_STATE_NLA >[09:58:51:155] [5354:5355] [DEBUG][com.freerdp.core.nego] - Attempting >NLA security >[09:58:51:155] [5354:5355] [INFO][com.freerdp.core.nego] - Detecting if >host can be reached locally. - This might take some time. >[09:58:51:155] [5354:5355] [INFO][com.freerdp.core.nego] - To disable >auto detection use /gateway-usage-method:direct >[09:58:51:157] [5354:5355] [DEBUG][com.freerdp.core] - connecting to >peer 192.168.90.25 >[09:58:51:158] [5354:5355] [DEBUG][com.freerdp.core.nego] - Adding >terminating CRLF to routing token >[09:58:51:158] [5354:5355] [DEBUG][com.freerdp.core.nego] - >RequestedProtocols: 3 >[09:58:51:162] [5354:5355] [DEBUG][com.freerdp.core.nego] - RDP_NEG_RSP >[09:58:51:162] [5354:5355] [DEBUG][com.freerdp.core.nego] - >selected_protocol: 2 >[09:58:51:162] [5354:5355] [DEBUG][com.freerdp.core.nego] - state: >NEGO_STATE_FINAL >[09:58:51:162] [5354:5355] [DEBUG][com.freerdp.core.nego] - Negotiated >NLA security >[09:58:51:162] [5354:5355] [DEBUG][com.freerdp.core.nego] - >nego_security_connect with PROTOCOL_HYBRID >[09:58:51:172] [5354:5355] [DEBUG][com.winpr.sspi] - >InitSecurityInterfaceExA >[09:58:51:172] [5354:5355] [DEBUG][com.freerdp.core.nla] - >nla_client_init 400 : packageName=Kerberos ; cbMaxToken=48000 >[09:58:51:172] [5354:5355] [DEBUG][com.winpr.sspi.gss] - >gss_import_name: SEC_E_OK (0x00000000) >[09:58:51:177] [5354:5355] [DEBUG][com.winpr.sspi.gss] - >gss_init_sec_context: SEC_E_UNKNOWN (0x000D0000) >[09:58:51:187] [5354:5355] [DEBUG][com.winpr.sspi.gss] - >gss_release_name: SEC_E_OK (0x00000000) >[09:58:51:187] [5354:5355] [TRACE][com.freerdp.core.nla] - >InitializeSecurityContext status SEC_E_NO_CREDENTIALS [0x8009030E] >[09:58:51:187] [5354:5355] [TRACE][com.freerdp.core.nla] - >InitializeSecurityContext status SEC_I_CONTINUE_NEEDED [0x00090312] >[09:58:51:187] [5354:5355] [DEBUG][com.freerdp.core.nla] - Sending >Authentication Token >[09:58:51:188] [5354:5355] [DEBUG][com.freerdp.core.nla] - CredSSP >protocol support 6, peer supports 6 >[09:58:51:188] [5354:5355] [TRACE][com.freerdp.core.nla] - >InitializeSecurityContext SEC_I_COMPLETE_NEEDED [0x00090313] >[09:58:51:188] [5354:5355] [DEBUG][com.freerdp.core.nla] - Sending >Authentication Token >[09:58:51:197] [5354:5355] [DEBUG][com.freerdp.core.gcc] - Server rdp >encryption method: NONE >[09:58:51:205] [5354:5355] [DEBUG][com.freerdp.core.info] - Client Info >Packet Flags = >INFO_MOUSE|INFO_DISABLECTRLALTDEL|INFO_UNICODE|INFO_MAXIMIZESHELL|INFO_LOGONNOTIFY|INFO_COMPRESSION|INFO_ENABLEWINDOWSKEY|INFO_FORCE_ENCRYPTED_CS_PDU|INFO_LOGONERRORS|INFO_MOUSE_HAS_WHEEL|INFO_NOAUDIOPLAYBACK >[09:58:51:206] [5354:5355] [DEBUG][com.winpr.timezone] - tz: Bias=300 >sn='Eastern Standard Time' dln='Eastern Daylight Time' >[09:58:51:240] [5354:5355] [DEBUG][com.freerdp.core.rdp] - recv Set >Error Info Data PDU (0x2F), length: 22 >[09:58:51:240] [5354:5355] [INFO][com.freerdp.core] - >ERRINFO_CB_CONNECTION_ERROR_INVALID_SETTINGS (0x00000410):The settings >contained in the routingToken field of the X.224 Connection Request PDU >(section 2.2.1.1) cannot be validated. >[09:58:51:240] [5354:5355] [DEBUG][com.freerdp.core.rdp] - recv Set >Error Info Data PDU (0x2F), length: 22 >[09:58:51:240] [5354:5355] [INFO][com.freerdp.core] - >ERRINFO_CB_CONNECTION_ERROR_INVALID_SETTINGS (0x00000410):The settings >contained in the routingToken field of the X.224 Connection Request PDU >(section 2.2.1.1) cannot be validated. >[09:58:51:240] [5354:5355] [DEBUG][com.freerdp.core.rdp] - >DisconnectProviderUltimatum: reason: 1 >[09:58:51:240] [5354:5355] [DEBUG][com.freerdp.core.rdp] - >DisconnectProviderUltimatum: reason: 1 >[09:58:51:240] [5354:5355] [DEBUG][com.freerdp.core.rdp] - >transport_check_fds() - -1 > >On the RDP Server Side I get the following events: >802 RD Connection Broker Failed to process the connection request >for user <domain>\<username>. User's RDP file has invalid hint format. >Error: The request is not supported. >1296 Remote Desktop Connection Broker Client failed while getting >redirrection packet from Connection Broker. User: <domain>\<username>. >Error: Element not found. >1306 Remote Desktop Connection Broker Client failed to redirect the >user <domain>/<username>. Error: NULL > > >I also tried downloading the RDP connection file from RDWeb and opening >it with FreeRDP. This option gets me through to the host, but then >fails at the host without generating any events >Command Options: /u:<myusername> /p:<mypassword> /cert-ignore >/log-level:TRACE /d:<mydomain> > >Resulting Log: >[11:07:03:390] [6202:6203] [WARN][com.winpr.sspi.Kerberos] - could not >get Kerberos default realm >[11:07:03:390] [6202:6203] [WARN][com.winpr.negotiate] - No Kerberos >credentials. Retry with NTLM >[11:07:03:390] [6202:6203] [WARN][com.winpr.sspi] - >InitializeSecurityContextA status SEC_E_NO_CREDENTIALS [0x8009030E] >[11:07:02:357] [6202:6203] [INFO][com.freerdp.client.common.cmdline] - >loading channelEx rdpdr >[11:07:02:357] [6202:6203] [INFO][com.freerdp.client.common.cmdline] - >loading channelEx rdpsnd >[11:07:02:357] [6202:6203] [DEBUG][com.freerdp.channels.rail.client] - >VirtualChannelEntryEx >[11:07:02:357] [6202:6203] [INFO][com.freerdp.client.common.cmdline] - >loading channelEx rail >[11:07:02:357] [6202:6203] [DEBUG][com.freerdp.channels.drdynvc.client] >- VirtualChannelEntryEx >[11:07:02:357] [6202:6203] [INFO][com.freerdp.client.common.cmdline] - >loading channelEx drdynvc >[11:07:02:358] [6202:6203] [DEBUG][com.freerdp.client.x11] - Searching >for XInput pointer device >[11:07:02:358] [6202:6203] [DEBUG][com.freerdp.client.x11] - Pointer >device: 6 >[11:07:02:362] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >security layer negotiation: TRUE >[11:07:02:362] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >restricted admin mode: FALSE >[11:07:02:362] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >RDP security: TRUE >[11:07:02:362] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >TLS security: TRUE >[11:07:02:362] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >NLA security: TRUE >[11:07:02:362] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >NLA extended security: FALSE >[11:07:02:362] [6202:6203] [DEBUG][com.freerdp.core.nego] - state: >NEGO_STATE_NLA >[11:07:02:362] [6202:6203] [DEBUG][com.freerdp.core.nego] - Attempting >NLA security >[11:07:02:362] [6202:6203] [INFO][com.freerdp.core.nego] - Detecting if >host can be reached locally. - This might take some time. >[11:07:02:362] [6202:6203] [INFO][com.freerdp.core.nego] - To disable >auto detection use /gateway-usage-method:direct >[11:07:03:367] [6202:6203] [DEBUG][com.freerdp.core] - connecting to >peer 192.168.90.25 >[11:07:03:368] [6202:6203] [DEBUG][com.freerdp.core.nego] - Adding >terminating CRLF to routing token >[11:07:03:368] [6202:6203] [DEBUG][com.freerdp.core.nego] - >RequestedProtocols: 3 >[11:07:03:372] [6202:6203] [DEBUG][com.freerdp.core.nego] - RDP_NEG_RSP >[11:07:03:372] [6202:6203] [DEBUG][com.freerdp.core.nego] - >selected_protocol: 2 >[11:07:03:372] [6202:6203] [DEBUG][com.freerdp.core.nego] - state: >NEGO_STATE_FINAL >[11:07:03:372] [6202:6203] [DEBUG][com.freerdp.core.nego] - Negotiated >NLA security >[11:07:03:372] [6202:6203] [DEBUG][com.freerdp.core.nego] - >nego_security_connect with PROTOCOL_HYBRID >[11:07:03:378] [6202:6203] [DEBUG][com.winpr.sspi] - >InitSecurityInterfaceExA >[11:07:03:378] [6202:6203] [DEBUG][com.freerdp.core.nla] - >nla_client_init 400 : packageName=Kerberos ; cbMaxToken=48000 >[11:07:03:378] [6202:6203] [DEBUG][com.winpr.sspi.gss] - >gss_import_name: SEC_E_OK (0x00000000) >[11:07:03:385] [6202:6203] [DEBUG][com.winpr.sspi.gss] - >gss_init_sec_context: SEC_E_UNKNOWN (0x000D0000) >[11:07:03:390] [6202:6203] [DEBUG][com.winpr.sspi.gss] - >gss_release_name: SEC_E_OK (0x00000000) >[11:07:03:390] [6202:6203] [TRACE][com.freerdp.core.nla] - >InitializeSecurityContext status SEC_E_NO_CREDENTIALS [0x8009030E] >[11:07:03:390] [6202:6203] [TRACE][com.freerdp.core.nla] - >InitializeSecurityContext status SEC_I_CONTINUE_NEEDED [0x00090312] >[11:07:03:390] [6202:6203] [DEBUG][com.freerdp.core.nla] - Sending >Authentication Token >[11:07:03:391] [6202:6203] [DEBUG][com.freerdp.core.nla] - CredSSP >protocol support 6, peer supports 6 >[11:07:03:391] [6202:6203] [TRACE][com.freerdp.core.nla] - >InitializeSecurityContext SEC_I_COMPLETE_NEEDED [0x00090313] >[11:07:03:391] [6202:6203] [DEBUG][com.freerdp.core.nla] - Sending >Authentication Token >[11:07:03:399] [6202:6203] [DEBUG][com.freerdp.core.gcc] - Server rdp >encryption method: NONE >[11:07:03:404] [6202:6203] [DEBUG][com.freerdp.core.info] - Client Info >Packet Flags = >INFO_MOUSE|INFO_DISABLECTRLALTDEL|INFO_UNICODE|INFO_MAXIMIZESHELL|INFO_LOGONNOTIFY|INFO_COMPRESSION|INFO_ENABLEWINDOWSKEY|INFO_FORCE_ENCRYPTED_CS_PDU|INFO_RAIL|INFO_LOGONERRORS|INFO_MOUSE_HAS_WHEEL|INFO_NOAUDIOPLAYBACK|INFO_AUDIOCAPTURE >[11:07:03:404] [6202:6203] [DEBUG][com.winpr.timezone] - tz: Bias=300 >sn='Eastern Standard Time' dln='Easte[11:07:03:638] [6202:6203] >[ERROR][com.winpr.sspi] - EncryptMessage status SEC_E_INVALID_TOKEN >[0x80090308] >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - >flags: 0x0400, redirFlags: 0x00000B0D length: 192, sessionID: >0x50A0B364 >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - >redirectionFlags = { >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - > LB_TARGET_NET_ADDRESS >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - > LB_USERNAME >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - > LB_DOMAIN >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - > LB_TARGET_FQDN >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - > LB_TARGET_NETBIOS_NAME >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - > LB_TARGET_NET_ADDRESSES >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - } >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - >Username: <username> >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - >Domain: <domain> >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - >TargetFQDN: <hostname>.<domain>.local >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - >TargetNetBiosName: <hostname> >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - >TargetNetAddressesCount: 1 >[11:07:03:623] [6202:6203] [DEBUG][com.freerdp.core.redirection] - >TargetNetAddresses[0]: 192.168.90.28 >[11:07:03:625] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >security layer negotiation: TRUE >[11:07:03:625] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >restricted admin mode: FALSE >[11:07:03:625] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >RDP security: TRUE >[11:07:03:625] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >TLS security: TRUE >[11:07:03:625] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >NLA security: TRUE >[11:07:03:625] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >NLA extended security: FALSE >[11:07:03:625] [6202:6203] [DEBUG][com.freerdp.core.nego] - state: >NEGO_STATE_NLA >[11:07:03:625] [6202:6203] [DEBUG][com.freerdp.core.nego] - Attempting >NLA security >[11:07:03:625] [6202:6203] [INFO][com.freerdp.core.nego] - Detecting if >host can be reached locally. - This might take some time. >[11:07:03:626] [6202:6203] [INFO][com.freerdp.core.nego] - To disable >auto detection use /gateway-usage-method:direct >[11:07:03:628] [6202:6203] [DEBUG][com.freerdp.core] - connecting to >peer 192.168.90.28 >[11:07:03:628] [6202:6203] [DEBUG][com.freerdp.core.nego] - >RequestedProtocols: 3 >[11:07:03:632] [6202:6203] [DEBUG][com.freerdp.core.nego] - RDP_NEG_RSP >[11:07:03:632] [6202:6203] [DEBUG][com.freerdp.core.nego] - >selected_protocol: 2 >[11:07:03:632] [6202:6203] [DEBUG][com.freerdp.core.nego] - state: >NEGO_STATE_FINAL >[11:07:03:632] [6202:6203] [DEBUG][com.freerdp.core.nego] - Negotiated >NLA security >[11:07:03:632] [6202:6203] [DEBUG][com.freerdp.core.nego] - >nego_security_connect with PROTOCOL_HYBRID >[11:07:03:637] [6202:6203] [DEBUG][com.winpr.sspi] - >InitSecurityInterfaceExA >[11:07:03:637] [6202:6203] [DEBUG][com.freerdp.core.nla] - >nla_client_init 400 : packageName=Kerberos ; cbMaxToken=48000 >[11:07:03:637] [6202:6203] [TRACE][com.freerdp.core.nla] - >InitializeSecurityContext status SEC_I_CONTINUE_NEEDED [0x00090312] >[11:07:03:637] [6202:6203] [DEBUG][com.freerdp.core.nla] - Sending >Authentication Token >[11:07:03:638] [6202:6203] [DEBUG][com.freerdp.core.nla] - CredSSP >protocol support 6, peer supports 6 >[11:07:03:638] [6202:6203] [TRACE][com.freerdp.core.nla] - >InitializeSecurityContext SEC_I_COMPLETE_NEEDED [0x00090313] >[11:07:03:638] [6202:6203] [DEBUG][com.freerdp.core.rdp] - >transport_check_fds() - -1 >[11:07:03:638] [6202:6203] [ERROR][com.freerdp.core.nla] - >EncryptMessage status SEC_E_INVALID_TOKEN [0x80090308] >[11:07:03:638] [6202:6203] [ERROR][com.freerdp.core.rdp] - >rdp_recv_callback: CONNECTION_STATE_NLA - nla_recv_pdu() fail >[11:07:03:638] [6202:6203] [ERROR][com.freerdp.core.transport] - >transport_check_fds: transport->ReceiveCallback() - -1 >[11:07:03:638] [6202:6203] [ERROR][com.freerdp.core] - >freerdp_set_last_error ERRCONNECT_CONNECT_TRANSPORT_FAILED [0x0002000D] >rn Daylight Time' >[11:07:03:647] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >security layer negotiation: TRUE >[11:07:03:647] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >restricted admin mode: FALSE >[11:07:03:647] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >RDP security: TRUE >[11:07:03:647] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >TLS security: TRUE >[11:07:03:647] [6202:6203] [DEBUG][com.[11:07:03:660] [6202:6203] >[ERROR][com.winpr.sspi] - EncryptMessage status SEC_E_INVALID_TOKEN >[0x80090308] >[11:07:03:647] [6202:6203] [DEBUG][com.freerdp.core.nego] - Enabling >NLA extended security: FALSE >[11:07:03:647] [6202:6203] [DEBUG][com.freerdp.core.nego] - state: >NEGO_STATE_NLA >[11:07:03:648] [6202:6203] [DEBUG][com.freerdp.core.nego] - Attempting >NLA security >[11:07:03:648] [6202:6203] [INFO][com.freerdp.core.nego] - Detecting if >host can be reached locally. - This might take some time. >[11:07:03:648] [6202:6203] [INFO][com.freerdp.core.nego] - To disable >auto detection use /gateway-usage-method:direct >[11:07:03:649] [6202:6203] [DEBUG][com.freerdp.core] - connecting to >peer 192.168.90.28 >[11:07:03:650] [6202:6203] [DEBUG][com.freerdp.core.nego] - >RequestedProtocols: 3 >[11:07:03:654] [6202:6203] [DEBUG][com.freerdp.core.nego] - RDP_NEG_RSP >[11:07:03:654] [6202:6203] [DEBUG][com.freerdp.core.nego] - >selected_protocol: 2 >[11:07:03:654] [6202:6203] [DEBUG][com.freerdp.core.nego] - state: >NEGO_STATE_FINAL >[11:07:03:654] [6202:6203] [DEBUG][com.freerdp.core.nego] - Negotiated >NLA security >[11:07:03:654] [6202:6203] [DEBUG][com.freerdp.core.nego] - >nego_security_connect with PROTOCOL_HYBRID >[11:07:03:659] [6202:6203] [DEBUG][com.winpr.sspi] - >InitSecurityInterfaceExA >[11:07:03:659] [6202:6203] [DEBUG][com.freerdp.core.nla] - >nla_client_init 400 : packageName=Kerberos ; cbMaxToken=48000 >[11:07:03:659] [6202:6203] [TRACE][com.freerdp.core.nla] - >InitializeSecurityContext status SEC_I_CONTINUE_NEEDED [0x00090312] >[11:07:03:659] [6202:6203] [DEBUG][com.freerdp.core.nla] - Sending >Authentication Token >[11:07:03:660] [6202:6203] [ERROR][com.freerdp.core.nla] - >EncryptMessage status SEC_E_INVALID_TOKEN [0x80090308] >[11:07:03:660] [6202:6203] [ERROR][com.freerdp.core.rdp] - >rdp_recv_callback: CONNECTION_STATE_NLA - nla_recv_pdu() fail >[11:07:03:660] [6202:6203] [ERROR][com.freerdp.core.transport] - >transport_check_fds: transport->ReceiveCallback() - -1 >[11:07:03:660] [6202:6203] [ERROR][com.freerdp.core] - >freerdp_set_last_error ERRCONNECT_CONNECT_TRANSPORT_FAILED [0x0002000D] >[11:07:03:660] [6202:6203] [ERROR][com.freerdp.core] - >freerdp_post_connect failed >freerdp.core.nego] - Enabling NLA security: TRUE >[11:07:03:660] [6202:6203] [DEBUG][com.freerdp.core.nla] - CredSSP >protocol support 6, peer supports 6 >[11:07:03:660] [6202:6203] [TRACE][com.freerdp.core.nla] - >InitializeSecurityContext SEC_I_COMPLETE_NEEDED [0x00090313] >[11:07:03:660] [6202:6203] [DEBUG][com.freerdp.core.rdp] - >transport_check_fds() - -1 > >The RDP Connection file contains: >redirectclipboard:i:0 >redirectprinters:i:0 >redirectcomports:i:0 >redirectsmartcards:i:1 >devicestoredirect:s: >drivestoredirect:s: >session bpp:i:32 >prompt for credentials on client:i:1 >span monitors:i:1 >use multimon:i:1 >remoteapplicationmode:i:1 >server port:i:3389 >allow font smoothing:i:1 >promptcredentialonce:i:1 >videoplaybackmode:i:1 >audiocapturemode:i:1 >gatewayusagemethod:i:2 >gatewayprofileusagemethod:i:1 >gatewaycredentialssource:i:0 >full address:s:<brokername>.<domain>.LOCAL >alternate shell:s:||<appalias> >remoteapplicationprogram:s:||<appalias> >gatewayhostname:s:<externalgatewayaddress> >remoteapplicationname:s:Clinical Module >remoteapplicationcmdline:s: >workspace id:s: <brokername>.<domain>.LOCAL >use redirection server name:i:1 >loadbalanceinfo:s:tsv://MS Terminal Services Plugin.1.<collectionname> >alternate full address:s: <brokername>.<domain>.LOCAL >signscope:s:Full Address,Alternate Full Address,Use Redirection Server >Name,Server >Port,GatewayHostname,GatewayUsageMethod,GatewayProfileUsageMethod,GatewayCredentialsSource,PromptCredentialOnce,Alternate >Shell,RemoteApplicationProgram,RemoteApplicationMode,RemoteApplicationName,RemoteApplicationCmdLine,RedirectPrinters,RedirectCOMPorts,RedirectSmartCards,RedirectClipboard,DevicesToRedirect,DrivesToRedirect,LoadBalanceInfo >signature:s:AQABAAEAAAC4D..... > > >Thanks, > >Josh > >Joshua A. Shaw >js...@piedmontpediatrics.net<mailto:js...@piedmontpediatrics.net> > >Piedmont Pediatrics <http://www.piedmontpediatrics.net> >Mailing Address: 900 Rio East Court, Suite A, Charlottesville, VA 22901 >Main Phone (24 hour coverage): 434-975-7777 > >CONFIDENTIALITY NOTICE: > >This message is intended only for the use of the individual or entity >to which it is addressed and may contain information that is privileged >and confidential. If the reader of this message is not the intended >recipient, you are hereby notified that any review, use, disclosure, >dissemination, distribution or copying of this communication is >strictly prohibited. If you have received this communication in error, >please notify me immediately and destroy the original message. > >_______________________________________________ >FreeRDP-devel mailing list >FreeRDP-devel@lists.sourceforge.net >https://lists.sourceforge.net/lists/listinfo/freerdp-devel _______________________________________________ FreeRDP-devel mailing list FreeRDP-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/freerdp-devel