From: Jim Diamond on
On 2010-02-09 at 09:08 AST, Mike Jones <Not(a)Arizona.Bay> wrote:
> Responding to Henrik Carlqvist:
>
>> Mike Jones <Not(a)Arizona.Bay> wrote:
>>
>>> Responding to Henrik Carlqvist:
>>>> Are you able to find any clue to the cause if you do something like:
>>>>
>>>> ssh -vvv -X remotemachine
>>
>>> Only that the connection Can't open display "localhost:10.0"
>>
>> Even if you are unable to read anything out from the debug messages
>> someone else might be able to tell something. Please do the following:
>>
>> ssh -vvv -X remotemachine ls /dev/null >& /tmp/log.txt
>>
>> Then post your contents of /tmp/log.txt
>>
>> regards Henrik
>
>
> Ok. SRVR=server USER=common_user_account

To me, that wasn't very illuminating. Perhaps someone else will see
your problem, but it might be more informative if you tried a command
that actually uses your X connection. Try this and post it:

ssh -vvv -X remotemachine xclock >& /tmp/log.txt

Cheers.
Jim
From: Mike Jones on
Responding to Jim Diamond:

> On 2010-02-09 at 09:08 AST, Mike Jones <Not(a)Arizona.Bay> wrote:
>> Responding to Henrik Carlqvist:
>>
>>> Mike Jones <Not(a)Arizona.Bay> wrote:
>>>
>>>> Responding to Henrik Carlqvist:
>>>>> Are you able to find any clue to the cause if you do something like:
>>>>>
>>>>> ssh -vvv -X remotemachine
>>>
>>>> Only that the connection Can't open display "localhost:10.0"
>>>
>>> Even if you are unable to read anything out from the debug messages
>>> someone else might be able to tell something. Please do the following:
>>>
>>> ssh -vvv -X remotemachine ls /dev/null >& /tmp/log.txt
>>>
>>> Then post your contents of /tmp/log.txt
>>>
>>> regards Henrik
>>
>>
>> Ok. SRVR=server USER=common_user_account
>
> To me, that wasn't very illuminating. Perhaps someone else will see
> your problem, but it might be more informative if you tried a command
> that actually uses your X connection. Try this and post it:
>
> ssh -vvv -X remotemachine xclock >& /tmp/log.txt
>


$> ssh -vvv -X SRVR dillo >& sshtest.out

OpenSSH_5.1p1, OpenSSL 0.9.8i 15 Sep 2008
debug1: Reading configuration data /etc/ssh/ssh_config

debug2: ssh_connect: needpriv 0

debug1: Connecting to 192.168.1.1 [192.168.1.1] port 4503.

debug1: Connection established.

debug3: Not a RSA1 key file /home/USER/.ssh/id_dsa.

debug2: key_type_from_name: unknown key type '-----BEGIN'

debug3: key_read: missing keytype

debug2: key_type_from_name: unknown key type 'Proc-Type:'

debug3: key_read: missing keytype

debug2: key_type_from_name: unknown key type 'DEK-Info:'

debug3: key_read: missing keytype

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug2: key_type_from_name: unknown key type '-----END'

debug3: key_read: missing keytype

debug1: identity file /home/USER/.ssh/id_dsa type 2

debug1: Remote protocol version 2.0, remote software version OpenSSH_5.1

debug1: match: OpenSSH_5.1 pat OpenSSH*

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_5.1

debug2: fd 3 setting O_NONBLOCK

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-
hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-
group1-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-dss

debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-
cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-
cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac-
ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac-
ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: none,zlib(a)openssh.com,zlib

debug2: kex_parse_kexinit: none,zlib(a)openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit: first_kex_follows 0

debug2: kex_parse_kexinit: reserved 0

debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-
hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-
group1-sha1

debug2: kex_parse_kexinit: ssh-dss

debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-
cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-
cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac-
ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac-
ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: none,zlib(a)openssh.com

debug2: kex_parse_kexinit: none,zlib(a)openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit: first_kex_follows 0

debug2: kex_parse_kexinit: reserved 0

debug2: mac_setup: found hmac-md5

debug1: kex: server->client aes128-cbc hmac-md5 none

debug2: mac_setup: found hmac-md5

debug1: kex: client->server aes128-cbc hmac-md5 none

debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent

debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP

debug2: dh_gen_key: priv key bits set: 122/256

debug2: bits set: 1017/2048

debug1: SSH2_MSG_KEX_DH_GEX_INIT sent

debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY

debug3: put_host_port: [192.168.1.1]:4503

debug3: put_host_port: [192.168.1.1]:4503

debug3: check_host_in_hostfile: filename /home/USER/.ssh/known_hosts

debug3: check_host_in_hostfile: match line 2

debug3: check_host_in_hostfile: filename /home/USER/.ssh/known_hosts

debug3: check_host_in_hostfile: match line 2

debug1: Host '[192.168.1.1]:4503' is known and matches the DSA host key.

debug1: Found key in /home/USER/.ssh/known_hosts:2

debug2: bits set: 1055/2048

debug1: ssh_dss_verify: signature correct

debug2: kex_derive_keys

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: SSH2_MSG_SERVICE_REQUEST sent

debug2: service_accept: ssh-userauth

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug2: key: /home/USER/.ssh/id_dsa (0x80a1900)

debug1: Authentications that can continue: publickey,password

debug3: start over, passed a different list publickey,password

debug3: preferred publickey,keyboard-interactive

debug3: authmethod_lookup publickey

debug3: remaining preferred: keyboard-interactive

debug3: authmethod_is_enabled publickey

debug1: Next authentication method: publickey

debug1: Offering public key: /home/USER/.ssh/id_dsa

debug3: send_pubkey_test

debug2: we sent a publickey packet, wait for reply

debug1: Server accepts key: pkalg ssh-dss blen 433

debug2: input_userauth_pk_ok: fp
d1:ec:dc:75:00:1e:62:8d:6c:5c:c4:5f:cb:f5:ca:96

debug3: sign_and_send_pubkey

debug1: Authentication succeeded (publickey).

debug2: fd 5 setting O_NONBLOCK

debug3: fd 6 is O_NONBLOCK

debug1: channel 0: new [client-session]

debug3: ssh_session2_open: channel_new: 0

debug2: channel 0: send open

debug1: Requesting no-more-sessions(a)openssh.com

debug1: Entering interactive session.

debug2: callback start

debug2: x11_get_proto: /usr/bin/xauth list :0.0 2>/dev/null

debug1: Requesting X11 forwarding with authentication spoofing.

debug2: channel 0: request x11-req confirm 0

debug2: client_session2_setup: id 0

debug1: Sending command: dillo

debug2: channel 0: request exec confirm 1

debug2: fd 3 setting TCP_NODELAY

debug2: callback done

debug2: channel 0: open confirm rwindow 0 rmax 32768

debug2: channel 0: rcvd adjust 2097152

debug2: channel_input_confirm: type 99 id 0

debug2: exec request accepted on channel 0

debug2: channel 0: rcvd ext data 35

debug2: channel 0: rcvd ext data 1

Can't open display "localhost:10.0"
debug2: channel 0: written 36 to efd 6

debug2: channel 0: rcvd eof

debug2: channel 0: output open -> drain

debug2: channel 0: obuf empty

debug2: channel 0: close_write

debug2: channel 0: output drain -> closed

debug1: client_input_channel_req: channel 0 rtype exit-status reply 0

debug1: client_input_channel_req: channel 0 rtype eow(a)openssh.com reply 0

debug2: channel 0: rcvd eow

debug2: channel 0: close_read

debug2: channel 0: input open -> closed

debug2: channel 0: rcvd close

debug3: channel 0: will not send data after close

debug2: channel 0: almost dead

debug2: channel 0: gc: notify user

debug2: channel 0: gc: user detached

debug2: channel 0: send close

debug2: channel 0: is dead

debug2: channel 0: garbage collecting

debug1: channel 0: free: client-session, nchannels 1

debug3: channel 0: status: The following connections are open:

#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1)



debug3: channel 0: close_fds r -1 w -1 e 6 c -1

debug1: fd 1 clearing O_NONBLOCK

debug3: fd 2 is not O_NONBLOCK

Transferred: sent 2496, received 2704 bytes, in 0.1 seconds

Bytes per second: sent 20942.4, received 22687.6

debug1: Exit status 1




....and again with the -Y flag


$> ssh -vvv -Y SRVR dillo >& sshtest.out

OpenSSH_5.1p1, OpenSSL 0.9.8i 15 Sep 2008
debug1: Reading configuration data /etc/ssh/ssh_config

debug2: ssh_connect: needpriv 0

debug1: Connecting to 192.168.1.1 [192.168.1.1] port 4503.

debug1: Connection established.

debug3: Not a RSA1 key file /home/USER/.ssh/id_dsa.

debug2: key_type_from_name: unknown key type '-----BEGIN'

debug3: key_read: missing keytype

debug2: key_type_from_name: unknown key type 'Proc-Type:'

debug3: key_read: missing keytype

debug2: key_type_from_name: unknown key type 'DEK-Info:'

debug3: key_read: missing keytype

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug3: key_read: missing whitespace

debug2: key_type_from_name: unknown key type '-----END'

debug3: key_read: missing keytype

debug1: identity file /home/USER/.ssh/id_dsa type 2

debug1: Remote protocol version 2.0, remote software version OpenSSH_5.1

debug1: match: OpenSSH_5.1 pat OpenSSH*

debug1: Enabling compatibility mode for protocol 2.0

debug1: Local version string SSH-2.0-OpenSSH_5.1

debug2: fd 3 setting O_NONBLOCK

debug1: SSH2_MSG_KEXINIT sent

debug1: SSH2_MSG_KEXINIT received

debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-
hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-
group1-sha1

debug2: kex_parse_kexinit: ssh-rsa,ssh-dss

debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-
cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-
cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac-
ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac-
ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: none,zlib(a)openssh.com,zlib

debug2: kex_parse_kexinit: none,zlib(a)openssh.com,zlib

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit: first_kex_follows 0

debug2: kex_parse_kexinit: reserved 0

debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-
hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-
group1-sha1

debug2: kex_parse_kexinit: ssh-dss

debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-
cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-
cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-
cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac-
ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac-
ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96

debug2: kex_parse_kexinit: none,zlib(a)openssh.com

debug2: kex_parse_kexinit: none,zlib(a)openssh.com

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit:

debug2: kex_parse_kexinit: first_kex_follows 0

debug2: kex_parse_kexinit: reserved 0

debug2: mac_setup: found hmac-md5

debug1: kex: server->client aes128-cbc hmac-md5 none

debug2: mac_setup: found hmac-md5

debug1: kex: client->server aes128-cbc hmac-md5 none

debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent

debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP

debug2: dh_gen_key: priv key bits set: 129/256

debug2: bits set: 1033/2048

debug1: SSH2_MSG_KEX_DH_GEX_INIT sent

debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY

debug3: put_host_port: [192.168.1.1]:4503

debug3: put_host_port: [192.168.1.1]:4503

debug3: check_host_in_hostfile: filename /home/USER/.ssh/known_hosts

debug3: check_host_in_hostfile: match line 2

debug3: check_host_in_hostfile: filename /home/USER/.ssh/known_hosts

debug3: check_host_in_hostfile: match line 2

debug1: Host '[192.168.1.1]:4503' is known and matches the DSA host key.

debug1: Found key in /home/USER/.ssh/known_hosts:2

debug2: bits set: 1011/2048

debug1: ssh_dss_verify: signature correct

debug2: kex_derive_keys

debug2: set_newkeys: mode 1

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug2: set_newkeys: mode 0

debug1: SSH2_MSG_NEWKEYS received

debug1: SSH2_MSG_SERVICE_REQUEST sent

debug2: service_accept: ssh-userauth

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug2: key: /home/USER/.ssh/id_dsa (0x80a1900)

debug1: Authentications that can continue: publickey,password

debug3: start over, passed a different list publickey,password

debug3: preferred publickey,keyboard-interactive

debug3: authmethod_lookup publickey

debug3: remaining preferred: keyboard-interactive

debug3: authmethod_is_enabled publickey

debug1: Next authentication method: publickey

debug1: Offering public key: /home/USER/.ssh/id_dsa

debug3: send_pubkey_test

debug2: we sent a publickey packet, wait for reply

debug1: Server accepts key: pkalg ssh-dss blen 433

debug2: input_userauth_pk_ok: fp
d1:ec:dc:75:00:1e:62:8d:6c:5c:c4:5f:cb:f5:ca:96

debug3: sign_and_send_pubkey

debug1: Authentication succeeded (publickey).

debug2: fd 5 setting O_NONBLOCK

debug3: fd 6 is O_NONBLOCK

debug1: channel 0: new [client-session]

debug3: ssh_session2_open: channel_new: 0

debug2: channel 0: send open

debug1: Requesting no-more-sessions(a)openssh.com

debug1: Entering interactive session.

debug2: callback start

debug2: x11_get_proto: /usr/bin/xauth list :0.0 2>/dev/null

debug1: Requesting X11 forwarding with authentication spoofing.

debug2: channel 0: request x11-req confirm 0

debug2: client_session2_setup: id 0

debug1: Sending command: dillo

debug2: channel 0: request exec confirm 1

debug2: fd 3 setting TCP_NODELAY

debug2: callback done

debug2: channel 0: open confirm rwindow 0 rmax 32768

debug2: channel 0: rcvd adjust 2097152

debug2: channel_input_confirm: type 99 id 0

debug2: exec request accepted on channel 0

debug2: channel 0: rcvd ext data 35

debug2: channel 0: rcvd ext data 1

debug2: channel 0: rcvd eof

debug2: channel 0: output open -> drain

debug1: client_input_channel_req: channel 0 rtype exit-status reply 0

debug1: client_input_channel_req: channel 0 rtype eow(a)openssh.com reply 0

debug2: channel 0: rcvd eow

debug2: channel 0: close_read

debug2: channel 0: input open -> closed

debug2: channel 0: rcvd close

debug3: channel 0: will not send data after close

debug2: channel 0: obuf_empty delayed efd 6/(36)

Can't open display "localhost:10.0"
debug2: channel 0: written 36 to efd 6

debug3: channel 0: will not send data after close

debug2: channel 0: obuf empty

debug2: channel 0: close_write

debug2: channel 0: output drain -> closed

debug2: channel 0: almost dead

debug2: channel 0: gc: notify user

debug2: channel 0: gc: user detached

debug2: channel 0: send close

debug2: channel 0: is dead

debug2: channel 0: garbage collecting

debug1: channel 0: free: client-session, nchannels 1

debug3: channel 0: status: The following connections are open:

#0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1)



debug3: channel 0: close_fds r -1 w -1 e 6 c -1

debug1: fd 1 clearing O_NONBLOCK

debug3: fd 2 is not O_NONBLOCK

Transferred: sent 2496, received 2704 bytes, in 0.1 seconds

Bytes per second: sent 21023.4, received 22775.3

debug1: Exit status 1





--
*=( http://www.thedailymash.co.uk/
*=( For all your UK news needs.
From: Jim Diamond on
On 2010-02-09 at 19:56 AST, Mike Jones <Not(a)Arizona.Bay> wrote:
> Responding to Jim Diamond:
>
>> On 2010-02-09 at 09:08 AST, Mike Jones <Not(a)Arizona.Bay> wrote:
>>> Responding to Henrik Carlqvist:
>>>
>>>> Mike Jones <Not(a)Arizona.Bay> wrote:
>>>>
>>>>> Responding to Henrik Carlqvist:
>>>>>> Are you able to find any clue to the cause if you do something like:
>>>>>>
>>>>>> ssh -vvv -X remotemachine
>>>>
>>>>> Only that the connection Can't open display "localhost:10.0"
>>>>
>>>> Even if you are unable to read anything out from the debug messages
>>>> someone else might be able to tell something. Please do the following:
>>>>
>>>> ssh -vvv -X remotemachine ls /dev/null >& /tmp/log.txt
>>>>
>>>> Then post your contents of /tmp/log.txt
>>>>
>>>> regards Henrik
>>>
>>>
>>> Ok. SRVR=server USER=common_user_account
>>
>> To me, that wasn't very illuminating. Perhaps someone else will see
>> your problem, but it might be more informative if you tried a command
>> that actually uses your X connection. Try this and post it:
>>
>> ssh -vvv -X remotemachine xclock >& /tmp/log.txt

> $> ssh -vvv -X SRVR dillo >& sshtest.out
It is possibly too bad that you didn't use xclock like I suggested,
since I don't have dillo on the remote machine. It probably doesn't
matter, but you never know.

> OpenSSH_5.1p1, OpenSSL 0.9.8i 15 Sep 2008

I have
OpenSSH_5.2p1, OpenSSL 0.9.8k 25 Mar 2009
so the noted differences below may be because of that

> debug1: Reading configuration data /etc/ssh/ssh_config
> debug2: ssh_connect: needpriv 0
> debug1: Connecting to 192.168.1.1 [192.168.1.1] port 4503.

Hmmm... I see you are using a non-standard ssh port (4503 instead of
22). I don't know whether that could cause a problem, but the fewer
variations on the usual theme, the better.

<snip>
I didn't notice anything noteworthy there, but maybe I missed something.

> debug3: put_host_port: [192.168.1.1]:4503
> debug3: put_host_port: [192.168.1.1]:4503
> debug3: check_host_in_hostfile: filename /home/USER/.ssh/known_hosts
Am I safe in assuming you edited your real username in a fit of
paranoia? Is the real userid lower case?

<snip>

> debug2: fd 5 setting O_NONBLOCK
> debug3: fd 6 is O_NONBLOCK
Interesting. Later in the conversation I get
debug2: fd 7 setting O_NONBLOCK
debug3: fd 7 is O_NONBLOCK
I wonder why your fd's are different (from each other).

> debug1: channel 0: new [client-session]
> debug3: ssh_session2_open: channel_new: 0
> debug2: channel 0: send open
> debug1: Requesting no-more-sessions(a)openssh.com
> debug1: Entering interactive session.
> debug2: callback start
> debug2: x11_get_proto: /usr/bin/xauth list :0.0 2>/dev/null
> debug1: Requesting X11 forwarding with authentication spoofing.
> debug2: channel 0: request x11-req confirm 0
> debug2: client_session2_setup: id 0
> debug1: Sending command: dillo
> debug2: channel 0: request exec confirm 1
> debug2: fd 3 setting TCP_NODELAY
> debug2: callback done
> debug2: channel 0: open confirm rwindow 0 rmax 32768
> debug2: channel 0: rcvd adjust 2097152
> debug2: channel_input_confirm: type 99 id 0
> debug2: exec request accepted on channel 0

> debug2: channel 0: rcvd ext data 35
> debug2: channel 0: rcvd ext data 1
> Can't open display "localhost:10.0"

Here are my last few lines, for comparison:

debug1: Authentication succeeded (publickey).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug1: Requesting no-more-sessions(a)openssh.com
debug1: Entering interactive session.
debug2: callback start
debug2: x11_get_proto: /usr/bin/xauth list :0.0 2>/dev/null
debug1: Requesting X11 forwarding with authentication spoofing.
debug2: channel 0: request x11-req confirm 0
debug2: client_session2_setup: id 0
debug1: Sending command: xclock
debug2: channel 0: request exec confirm 1
debug2: fd 3 setting TCP_NODELAY
debug2: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug2: channel 0: rcvd adjust 2097152
debug2: channel_input_status_confirm: type 99 id 0
debug2: exec request accepted on channel 0

Pretty much the same as yours, and then:

debug1: client_input_channel_open: ctype x11 rchan 3 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 43365
debug2: fd 7 setting O_NONBLOCK
debug3: fd 7 is O_NONBLOCK
debug1: channel 1: new [x11]
debug1: confirm x11


Sorry that I can't help, aside from my probably-spurious comments above.

Jim
From: Mike Jones on
Responding to Jim Diamond:

> On 2010-02-09 at 19:56 AST, Mike Jones <Not(a)Arizona.Bay> wrote:
>> Responding to Jim Diamond:
>>
>>> On 2010-02-09 at 09:08 AST, Mike Jones <Not(a)Arizona.Bay> wrote:
>>>> Responding to Henrik Carlqvist:
>>>>
>>>>> Mike Jones <Not(a)Arizona.Bay> wrote:
>>>>>
>>>>>> Responding to Henrik Carlqvist:
>>>>>>> Are you able to find any clue to the cause if you do something
>>>>>>> like:
>>>>>>>
>>>>>>> ssh -vvv -X remotemachine
>>>>>
>>>>>> Only that the connection Can't open display "localhost:10.0"
>>>>>
>>>>> Even if you are unable to read anything out from the debug messages
>>>>> someone else might be able to tell something. Please do the
>>>>> following:
>>>>>
>>>>> ssh -vvv -X remotemachine ls /dev/null >& /tmp/log.txt
>>>>>
>>>>> Then post your contents of /tmp/log.txt
>>>>>
>>>>> regards Henrik
>>>>
>>>>
>>>> Ok. SRVR=server USER=common_user_account
>>>
>>> To me, that wasn't very illuminating. Perhaps someone else will see
>>> your problem, but it might be more informative if you tried a command
>>> that actually uses your X connection. Try this and post it:
>>>
>>> ssh -vvv -X remotemachine xclock >& /tmp/log.txt
>
>> $> ssh -vvv -X SRVR dillo >& sshtest.out
> It is possibly too bad that you didn't use xclock like I suggested,
> since I don't have dillo on the remote machine. It probably doesn't
> matter, but you never know.
>
>> OpenSSH_5.1p1, OpenSSL 0.9.8i 15 Sep 2008
>
> I have
> OpenSSH_5.2p1, OpenSSL 0.9.8k 25 Mar 2009 so the noted differences below
> may be because of that
>
>> debug1: Reading configuration data /etc/ssh/ssh_config debug2:
>> ssh_connect: needpriv 0
>> debug1: Connecting to 192.168.1.1 [192.168.1.1] port 4503.
>
> Hmmm... I see you are using a non-standard ssh port (4503 instead of
> 22). I don't know whether that could cause a problem, but the fewer
> variations on the usual theme, the better.
>
> <snip>
> I didn't notice anything noteworthy there, but maybe I missed something.
>
>> debug3: put_host_port: [192.168.1.1]:4503 debug3: put_host_port:
>> [192.168.1.1]:4503 debug3: check_host_in_hostfile: filename
>> /home/USER/.ssh/known_hosts
> Am I safe in assuming you edited your real username in a fit of
> paranoia? Is the real userid lower case?
>
> <snip>
>
>> debug2: fd 5 setting O_NONBLOCK
>> debug3: fd 6 is O_NONBLOCK
> Interesting. Later in the conversation I get
> debug2: fd 7 setting O_NONBLOCK
> debug3: fd 7 is O_NONBLOCK
> I wonder why your fd's are different (from each other).
>
>> debug1: channel 0: new [client-session] debug3: ssh_session2_open:
>> channel_new: 0 debug2: channel 0: send open
>> debug1: Requesting no-more-sessions(a)openssh.com debug1: Entering
>> interactive session. debug2: callback start
>> debug2: x11_get_proto: /usr/bin/xauth list :0.0 2>/dev/null debug1:
>> Requesting X11 forwarding with authentication spoofing. debug2: channel
>> 0: request x11-req confirm 0 debug2: client_session2_setup: id 0
>> debug1: Sending command: dillo
>> debug2: channel 0: request exec confirm 1 debug2: fd 3 setting
>> TCP_NODELAY
>> debug2: callback done
>> debug2: channel 0: open confirm rwindow 0 rmax 32768 debug2: channel 0:
>> rcvd adjust 2097152 debug2: channel_input_confirm: type 99 id 0 debug2:
>> exec request accepted on channel 0
>
>> debug2: channel 0: rcvd ext data 35
>> debug2: channel 0: rcvd ext data 1
>> Can't open display "localhost:10.0"
>
> Here are my last few lines, for comparison:
>
> debug1: Authentication succeeded (publickey). debug1: channel 0: new
> [client-session] debug3: ssh_session2_open: channel_new: 0 debug2:
> channel 0: send open
> debug1: Requesting no-more-sessions(a)openssh.com debug1: Entering
> interactive session. debug2: callback start
> debug2: x11_get_proto: /usr/bin/xauth list :0.0 2>/dev/null debug1:
> Requesting X11 forwarding with authentication spoofing. debug2: channel
> 0: request x11-req confirm 0 debug2: client_session2_setup: id 0
> debug1: Sending command: xclock
> debug2: channel 0: request exec confirm 1 debug2: fd 3 setting
> TCP_NODELAY
> debug2: callback done
> debug2: channel 0: open confirm rwindow 0 rmax 32768 debug2: channel 0:
> rcvd adjust 2097152 debug2: channel_input_status_confirm: type 99 id 0
> debug2: exec request accepted on channel 0
>
> Pretty much the same as yours, and then:
>
> debug1: client_input_channel_open: ctype x11 rchan 3 win 65536 max 16384
> debug1: client_request_x11: request from 127.0.0.1 43365 debug2: fd 7
> setting O_NONBLOCK
> debug3: fd 7 is O_NONBLOCK
> debug1: channel 1: new [x11]
> debug1: confirm x11
>
>
> Sorry that I can't help, aside from my probably-spurious comments above.
>
> Jim




No worries. Its a headscratcher for sure.

Don't forget that all this worked fine (rock-solid and dependable) for
some time, and this is the first time I've ever seen a glitch like this.

Either I've done something somewhere else thats affecting this by some
curious WTH? thing, or there is a sneaky bug that has now decided to
surface, or my MOBO is as carp as I think it is and something is on the
cusp of failing.

--
*=( http://www.thedailymash.co.uk/
*=( For all your UK news needs.
From: allend on
Just wondering whether there is something in your setup that is
stopping traffic on port 6010.
When I do 'ssh -Y server' then 'netstat -atn' then I see a line:
"tcp 0 0 127.0.0.1:6010 0.0.0.0:*
LISTEN"
This line does not appear when I do 'ssh server'.