From: allend on
Probably silly question, but do you have X running on the local
machine when you attempt the X forwarding?
From: Mike Jones on
Responding to allend:

> Probably silly question, but do you have X running on the local machine
> when you attempt the X forwarding?


Yup. Not that that should make a difference, but...

Don't worry about silly questions, the problem is silly. :)

--
*=( http://www.thedailymash.co.uk/
*=( For all your UK news needs.
From: Mike Jones on
Responding to Henrik Carlqvist:

> Mike Jones <Not(a)Arizona.Bay> wrote:
>> Don't worry about silly questions, the problem is silly. :)
>
> Are you able to find any clue to the cause if you do something like:
>
> ssh -vvv -X remotemachine
>
> regards Henrik


Only that the connection Can't open display "localhost:10.0"

EVerything else works just as it did and should. I've just lost that one
single detail, and have no idea how. I'm thinking maybe that kernel bug
might be playing up due to something else otherwise inconnected changing
the results of that "race" mentioned?

--
*=( http://www.thedailymash.co.uk/
*=( For all your UK news needs.
From: Henrik Carlqvist on
"Aaron W. Hsu" <arcfide(a)sacrideo.us> wrote:
>> "ssh -Y 192.168.1.1 dillo" gets Can't open display "localhost:10.0"

> 1) Why on earth would you have 10 X sessions running on your client
> machine!?

His local display is probably set to something like localhost:0 but when
doing ssh with X tunneling the display gets a uniqueue number on the
remote machine. From that uniqueue number which really corresponds to a
tcp port X traffic is tunneled to ssh to localhost:0 at the X server on
the console that he is logged in to.

10 is the default offset used by openssh and thus it seems as this session
is his first ssh session to the remote machine. If he keeps that session
open and logs in from another xterm to the same remote machine again he
will in that xterm get the display localhost:11.

regards Henrik
--
The address in the header is only to prevent spam. My real address is:
hc3(at)poolhem.se Examples of addresses which go to spammers:
root(a)localhost postmaster(a)localhost

From: Mike Jones on
Responding to Henrik Carlqvist:

> Mike Jones <Not(a)Arizona.Bay> wrote:
>
>> Responding to Henrik Carlqvist:
>>> Are you able to find any clue to the cause if you do something like:
>>>
>>> ssh -vvv -X remotemachine
>
>> Only that the connection Can't open display "localhost:10.0"
>
> Even if you are unable to read anything out from the debug messages
> someone else might be able to tell something. Please do the following:
>
> ssh -vvv -X remotemachine ls /dev/null >& /tmp/log.txt
>
> Then post your contents of /tmp/log.txt
>
> regards Henrik


Ok. SRVR=server USER=common_user_account

============================================

OpenSSH_5.1p1, OpenSSL 0.9.8i 15 Sep 2008
debug1: Reading configuration data /etc/ssh/ssh_config

debug2: ssh_connect: needpriv 0

debug1: Connecting to SRVR [192.168.1.1] port 4503.

debug1: Connection established.

debug3: Not a RSA1 key file /home/USER/.ssh/id_dsa.

debug2: key_type_from_name: unknown key type '-----BEGIN'

debug3: key_read: missing keytype

debug2: key_type_from_name: unknown key type 'Proc-Type:'

debug3: key_read: missing keytype

debug2: key_type_from_name: unknown key type 'DEK-Info:'

debug3: key_read: missing keytype

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug2: key_type_from_name: unknown key type '-----END'

debug3: key_read: missing keytype

debug1: identity file /home/USER/.ssh/id_dsa type 2

debug1: Remote protocol version 2.0, remote software version OpenSSH_5.1

debug1: match: OpenSSH_5.1 pat OpenSSH*

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_5.1

debug2: fd 3 setting O_NONBLOCK

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-
hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-
group1-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-dss

debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-
cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-
cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac-
ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac-
ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: none,zlib(a)openssh.com,zlib

debug2: kex_parse_kexinit: none,zlib(a)openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit: first_kex_follows 0

debug2: kex_parse_kexinit: reserved 0

debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-
hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-
group1-sha1

debug2: kex_parse_kexinit: ssh-dss

debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-
cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-
cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac-
ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac-
ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: none,zlib(a)openssh.com

debug2: kex_parse_kexinit: none,zlib(a)openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit: first_kex_follows 0

debug2: kex_parse_kexinit: reserved 0

debug2: mac_setup: found hmac-md5

debug1: kex: server->client aes128-cbc hmac-md5 none

debug2: mac_setup: found hmac-md5

debug1: kex: client->server aes128-cbc hmac-md5 none

debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent

debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP

debug2: dh_gen_key: priv key bits set: 136/256

debug2: bits set: 996/2048

debug1: SSH2_MSG_KEX_DH_GEX_INIT sent

debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY

debug3: put_host_port: [192.168.1.1]:4503

debug3: put_host_port: [box1]:4503

debug3: check_host_in_hostfile: filename /home/USER/.ssh/known_hosts

debug3: check_host_in_hostfile: match line 3

debug3: check_host_in_hostfile: filename /home/USER/.ssh/known_hosts

debug3: check_host_in_hostfile: match line 2

debug1: Host '[box1]:4503' is known and matches the DSA host key.

debug1: Found key in /home/USER/.ssh/known_hosts:3

debug2: bits set: 1013/2048

debug1: ssh_dss_verify: signature correct

debug2: kex_derive_keys

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: SSH2_MSG_SERVICE_REQUEST sent

debug2: service_accept: ssh-userauth

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug2: key: /home/USER/.ssh/id_dsa (0x80a1950)

debug1: Authentications that can continue: publickey,password

debug3: start over, passed a different list publickey,password

debug3: preferred publickey,keyboard-interactive

debug3: authmethod_lookup publickey

debug3: remaining preferred: keyboard-interactive

debug3: authmethod_is_enabled publickey

debug1: Next authentication method: publickey

debug1: Offering public key: /home/USER/.ssh/id_dsa

debug3: send_pubkey_test

debug2: we sent a publickey packet, wait for reply

debug1: Server accepts key: pkalg ssh-dss blen 433

debug2: input_userauth_pk_ok: fp
d1:ec:dc:75:00:1e:62:8d:6c:5c:c4:5f:cb:f5:ca:96

debug3: sign_and_send_pubkey

debug1: Authentication succeeded (publickey).

debug2: fd 5 setting O_NONBLOCK

debug3: fd 6 is O_NONBLOCK

debug1: channel 0: new [client-session]

debug3: ssh_session2_open: channel_new: 0

debug2: channel 0: send open

debug1: Requesting no-more-sessions(a)openssh.com

debug1: Entering interactive session.

debug2: callback start

debug2: x11_get_proto: /usr/bin/xauth list :0.0 2>/dev/null

debug1: Requesting X11 forwarding with authentication spoofing.

debug2: channel 0: request x11-req confirm 0

debug2: client_session2_setup: id 0

debug1: Sending command: ls /dev/null

debug2: channel 0: request exec confirm 1

debug2: fd 3 setting TCP_NODELAY

debug2: callback done

debug2: channel 0: open confirm rwindow 0 rmax 32768

debug2: channel 0: rcvd adjust 2097152

debug2: channel_input_confirm: type 99 id 0

debug2: exec request accepted on channel 0

debug1: client_input_channel_req: channel 0 rtype exit-status reply 0

debug1: client_input_channel_req: channel 0 rtype eow(a)openssh.com reply 0

debug2: channel 0: rcvd eow

debug2: channel 0: close_read

debug2: channel 0: input open -> closed

debug2: channel 0: rcvd eof

debug2: channel 0: output open -> drain

debug2: channel 0: rcvd close

debug3: channel 0: will not send data after close

/dev/null
debug3: channel 0: will not send data after close

debug2: channel 0: obuf empty

debug2: channel 0: close_write

debug2: channel 0: output drain -> closed

debug2: channel 0: almost dead

debug2: channel 0: gc: notify user

debug2: channel 0: gc: user detached

debug2: channel 0: send close

debug2: channel 0: is dead

debug2: channel 0: garbage collecting

debug1: channel 0: free: client-session, nchannels 1

debug3: channel 0: status: The following connections are open:

#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1)



debug3: channel 0: close_fds r -1 w -1 e 6 c -1

debug1: fd 1 clearing O_NONBLOCK

debug3: fd 2 is not O_NONBLOCK

Transferred: sent 2512, received 2640 bytes, in 0.1 seconds

Bytes per second: sent 45802.6, received 48136.5

debug1: Exit status 0



============================================



--
*=( http://www.thedailymash.co.uk/
*=( For all your UK news needs.