From: allend on 8 Feb 2010 06:27 Probably silly question, but do you have X running on the local machine when you attempt the X forwarding?
From: Mike Jones on 8 Feb 2010 07:40 Responding to allend: > Probably silly question, but do you have X running on the local machine > when you attempt the X forwarding? Yup. Not that that should make a difference, but... Don't worry about silly questions, the problem is silly. :) -- *=( http://www.thedailymash.co.uk/ *=( For all your UK news needs.
From: Mike Jones on 8 Feb 2010 18:20 Responding to Henrik Carlqvist: > Mike Jones <Not(a)Arizona.Bay> wrote: >> Don't worry about silly questions, the problem is silly. :) > > Are you able to find any clue to the cause if you do something like: > > ssh -vvv -X remotemachine > > regards Henrik Only that the connection Can't open display "localhost:10.0" EVerything else works just as it did and should. I've just lost that one single detail, and have no idea how. I'm thinking maybe that kernel bug might be playing up due to something else otherwise inconnected changing the results of that "race" mentioned? -- *=( http://www.thedailymash.co.uk/ *=( For all your UK news needs.
From: Henrik Carlqvist on 9 Feb 2010 02:35 "Aaron W. Hsu" <arcfide(a)sacrideo.us> wrote: >> "ssh -Y 192.168.1.1 dillo" gets Can't open display "localhost:10.0" > 1) Why on earth would you have 10 X sessions running on your client > machine!? His local display is probably set to something like localhost:0 but when doing ssh with X tunneling the display gets a uniqueue number on the remote machine. From that uniqueue number which really corresponds to a tcp port X traffic is tunneled to ssh to localhost:0 at the X server on the console that he is logged in to. 10 is the default offset used by openssh and thus it seems as this session is his first ssh session to the remote machine. If he keeps that session open and logs in from another xterm to the same remote machine again he will in that xterm get the display localhost:11. regards Henrik -- The address in the header is only to prevent spam. My real address is: hc3(at)poolhem.se Examples of addresses which go to spammers: root(a)localhost postmaster(a)localhost
From: Mike Jones on 9 Feb 2010 08:08 Responding to Henrik Carlqvist: > Mike Jones <Not(a)Arizona.Bay> wrote: > >> Responding to Henrik Carlqvist: >>> Are you able to find any clue to the cause if you do something like: >>> >>> ssh -vvv -X remotemachine > >> Only that the connection Can't open display "localhost:10.0" > > Even if you are unable to read anything out from the debug messages > someone else might be able to tell something. Please do the following: > > ssh -vvv -X remotemachine ls /dev/null >& /tmp/log.txt > > Then post your contents of /tmp/log.txt > > regards Henrik Ok. SRVR=server USER=common_user_account ============================================ OpenSSH_5.1p1, OpenSSL 0.9.8i 15 Sep 2008 debug1: Reading configuration data /etc/ssh/ssh_config debug2: ssh_connect: needpriv 0 debug1: Connecting to SRVR [192.168.1.1] port 4503. debug1: Connection established. debug3: Not a RSA1 key file /home/USER/.ssh/id_dsa. debug2: key_type_from_name: unknown key type '-----BEGIN' debug3: key_read: missing keytype debug2: key_type_from_name: unknown key type 'Proc-Type:' debug3: key_read: missing keytype debug2: key_type_from_name: unknown key type 'DEK-Info:' debug3: key_read: missing keytype debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug2: key_type_from_name: unknown key type '-----END' debug3: key_read: missing keytype debug1: identity file /home/USER/.ssh/id_dsa type 2 debug1: Remote protocol version 2.0, remote software version OpenSSH_5.1 debug1: match: OpenSSH_5.1 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_5.1 debug2: fd 3 setting O_NONBLOCK debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie- hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman- group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael- cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael- cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac- ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac- ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib(a)openssh.com,zlib debug2: kex_parse_kexinit: none,zlib(a)openssh.com,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie- hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman- group1-sha1 debug2: kex_parse_kexinit: ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael- cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael- cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac- ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac- ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib(a)openssh.com debug2: kex_parse_kexinit: none,zlib(a)openssh.com debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_setup: found hmac-md5 debug1: kex: server->client aes128-cbc hmac-md5 none debug2: mac_setup: found hmac-md5 debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug2: dh_gen_key: priv key bits set: 136/256 debug2: bits set: 996/2048 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug3: put_host_port: [192.168.1.1]:4503 debug3: put_host_port: [box1]:4503 debug3: check_host_in_hostfile: filename /home/USER/.ssh/known_hosts debug3: check_host_in_hostfile: match line 3 debug3: check_host_in_hostfile: filename /home/USER/.ssh/known_hosts debug3: check_host_in_hostfile: match line 2 debug1: Host '[box1]:4503' is known and matches the DSA host key. debug1: Found key in /home/USER/.ssh/known_hosts:3 debug2: bits set: 1013/2048 debug1: ssh_dss_verify: signature correct debug2: kex_derive_keys debug2: set_newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug2: set_newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: SSH2_MSG_SERVICE_REQUEST sent debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug2: key: /home/USER/.ssh/id_dsa (0x80a1950) debug1: Authentications that can continue: publickey,password debug3: start over, passed a different list publickey,password debug3: preferred publickey,keyboard-interactive debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering public key: /home/USER/.ssh/id_dsa debug3: send_pubkey_test debug2: we sent a publickey packet, wait for reply debug1: Server accepts key: pkalg ssh-dss blen 433 debug2: input_userauth_pk_ok: fp d1:ec:dc:75:00:1e:62:8d:6c:5c:c4:5f:cb:f5:ca:96 debug3: sign_and_send_pubkey debug1: Authentication succeeded (publickey). debug2: fd 5 setting O_NONBLOCK debug3: fd 6 is O_NONBLOCK debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug2: channel 0: send open debug1: Requesting no-more-sessions(a)openssh.com debug1: Entering interactive session. debug2: callback start debug2: x11_get_proto: /usr/bin/xauth list :0.0 2>/dev/null debug1: Requesting X11 forwarding with authentication spoofing. debug2: channel 0: request x11-req confirm 0 debug2: client_session2_setup: id 0 debug1: Sending command: ls /dev/null debug2: channel 0: request exec confirm 1 debug2: fd 3 setting TCP_NODELAY debug2: callback done debug2: channel 0: open confirm rwindow 0 rmax 32768 debug2: channel 0: rcvd adjust 2097152 debug2: channel_input_confirm: type 99 id 0 debug2: exec request accepted on channel 0 debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: client_input_channel_req: channel 0 rtype eow(a)openssh.com reply 0 debug2: channel 0: rcvd eow debug2: channel 0: close_read debug2: channel 0: input open -> closed debug2: channel 0: rcvd eof debug2: channel 0: output open -> drain debug2: channel 0: rcvd close debug3: channel 0: will not send data after close /dev/null debug3: channel 0: will not send data after close debug2: channel 0: obuf empty debug2: channel 0: close_write debug2: channel 0: output drain -> closed debug2: channel 0: almost dead debug2: channel 0: gc: notify user debug2: channel 0: gc: user detached debug2: channel 0: send close debug2: channel 0: is dead debug2: channel 0: garbage collecting debug1: channel 0: free: client-session, nchannels 1 debug3: channel 0: status: The following connections are open: #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1) debug3: channel 0: close_fds r -1 w -1 e 6 c -1 debug1: fd 1 clearing O_NONBLOCK debug3: fd 2 is not O_NONBLOCK Transferred: sent 2512, received 2640 bytes, in 0.1 seconds Bytes per second: sent 45802.6, received 48136.5 debug1: Exit status 0 ============================================ -- *=( http://www.thedailymash.co.uk/ *=( For all your UK news needs.
First
|
Prev
|
Next
|
Last
Pages: 1 2 3 4 Prev: network mirror Next: Sudden X11 forwarding glitch - Can't open display"localhost:10.0" |