From: Jim Diamond on 9 Feb 2010 12:50 On 2010-02-09 at 09:08 AST, Mike Jones <Not(a)Arizona.Bay> wrote: > Responding to Henrik Carlqvist: > >> Mike Jones <Not(a)Arizona.Bay> wrote: >> >>> Responding to Henrik Carlqvist: >>>> Are you able to find any clue to the cause if you do something like: >>>> >>>> ssh -vvv -X remotemachine >> >>> Only that the connection Can't open display "localhost:10.0" >> >> Even if you are unable to read anything out from the debug messages >> someone else might be able to tell something. Please do the following: >> >> ssh -vvv -X remotemachine ls /dev/null >& /tmp/log.txt >> >> Then post your contents of /tmp/log.txt >> >> regards Henrik > > > Ok. SRVR=server USER=common_user_account To me, that wasn't very illuminating. Perhaps someone else will see your problem, but it might be more informative if you tried a command that actually uses your X connection. Try this and post it: ssh -vvv -X remotemachine xclock >& /tmp/log.txt Cheers. Jim
From: Mike Jones on 9 Feb 2010 18:56 Responding to Jim Diamond: > On 2010-02-09 at 09:08 AST, Mike Jones <Not(a)Arizona.Bay> wrote: >> Responding to Henrik Carlqvist: >> >>> Mike Jones <Not(a)Arizona.Bay> wrote: >>> >>>> Responding to Henrik Carlqvist: >>>>> Are you able to find any clue to the cause if you do something like: >>>>> >>>>> ssh -vvv -X remotemachine >>> >>>> Only that the connection Can't open display "localhost:10.0" >>> >>> Even if you are unable to read anything out from the debug messages >>> someone else might be able to tell something. Please do the following: >>> >>> ssh -vvv -X remotemachine ls /dev/null >& /tmp/log.txt >>> >>> Then post your contents of /tmp/log.txt >>> >>> regards Henrik >> >> >> Ok. SRVR=server USER=common_user_account > > To me, that wasn't very illuminating. Perhaps someone else will see > your problem, but it might be more informative if you tried a command > that actually uses your X connection. Try this and post it: > > ssh -vvv -X remotemachine xclock >& /tmp/log.txt > $> ssh -vvv -X SRVR dillo >& sshtest.out OpenSSH_5.1p1, OpenSSL 0.9.8i 15 Sep 2008 debug1: Reading configuration data /etc/ssh/ssh_config debug2: ssh_connect: needpriv 0 debug1: Connecting to 192.168.1.1 [192.168.1.1] port 4503. debug1: Connection established. debug3: Not a RSA1 key file /home/USER/.ssh/id_dsa. debug2: key_type_from_name: unknown key type '-----BEGIN' debug3: key_read: missing keytype debug2: key_type_from_name: unknown key type 'Proc-Type:' debug3: key_read: missing keytype debug2: key_type_from_name: unknown key type 'DEK-Info:' debug3: key_read: missing keytype debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug2: key_type_from_name: unknown key type '-----END' debug3: key_read: missing keytype debug1: identity file /home/USER/.ssh/id_dsa type 2 debug1: Remote protocol version 2.0, remote software version OpenSSH_5.1 debug1: match: OpenSSH_5.1 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_5.1 debug2: fd 3 setting O_NONBLOCK debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie- hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman- group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael- cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael- cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac- ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac- ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib(a)openssh.com,zlib debug2: kex_parse_kexinit: none,zlib(a)openssh.com,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie- hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman- group1-sha1 debug2: kex_parse_kexinit: ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael- cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael- cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac- ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac- ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib(a)openssh.com debug2: kex_parse_kexinit: none,zlib(a)openssh.com debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_setup: found hmac-md5 debug1: kex: server->client aes128-cbc hmac-md5 none debug2: mac_setup: found hmac-md5 debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug2: dh_gen_key: priv key bits set: 122/256 debug2: bits set: 1017/2048 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug3: put_host_port: [192.168.1.1]:4503 debug3: put_host_port: [192.168.1.1]:4503 debug3: check_host_in_hostfile: filename /home/USER/.ssh/known_hosts debug3: check_host_in_hostfile: match line 2 debug3: check_host_in_hostfile: filename /home/USER/.ssh/known_hosts debug3: check_host_in_hostfile: match line 2 debug1: Host '[192.168.1.1]:4503' is known and matches the DSA host key. debug1: Found key in /home/USER/.ssh/known_hosts:2 debug2: bits set: 1055/2048 debug1: ssh_dss_verify: signature correct debug2: kex_derive_keys debug2: set_newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug2: set_newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: SSH2_MSG_SERVICE_REQUEST sent debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug2: key: /home/USER/.ssh/id_dsa (0x80a1900) debug1: Authentications that can continue: publickey,password debug3: start over, passed a different list publickey,password debug3: preferred publickey,keyboard-interactive debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering public key: /home/USER/.ssh/id_dsa debug3: send_pubkey_test debug2: we sent a publickey packet, wait for reply debug1: Server accepts key: pkalg ssh-dss blen 433 debug2: input_userauth_pk_ok: fp d1:ec:dc:75:00:1e:62:8d:6c:5c:c4:5f:cb:f5:ca:96 debug3: sign_and_send_pubkey debug1: Authentication succeeded (publickey). debug2: fd 5 setting O_NONBLOCK debug3: fd 6 is O_NONBLOCK debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug2: channel 0: send open debug1: Requesting no-more-sessions(a)openssh.com debug1: Entering interactive session. debug2: callback start debug2: x11_get_proto: /usr/bin/xauth list :0.0 2>/dev/null debug1: Requesting X11 forwarding with authentication spoofing. debug2: channel 0: request x11-req confirm 0 debug2: client_session2_setup: id 0 debug1: Sending command: dillo debug2: channel 0: request exec confirm 1 debug2: fd 3 setting TCP_NODELAY debug2: callback done debug2: channel 0: open confirm rwindow 0 rmax 32768 debug2: channel 0: rcvd adjust 2097152 debug2: channel_input_confirm: type 99 id 0 debug2: exec request accepted on channel 0 debug2: channel 0: rcvd ext data 35 debug2: channel 0: rcvd ext data 1 Can't open display "localhost:10.0" debug2: channel 0: written 36 to efd 6 debug2: channel 0: rcvd eof debug2: channel 0: output open -> drain debug2: channel 0: obuf empty debug2: channel 0: close_write debug2: channel 0: output drain -> closed debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: client_input_channel_req: channel 0 rtype eow(a)openssh.com reply 0 debug2: channel 0: rcvd eow debug2: channel 0: close_read debug2: channel 0: input open -> closed debug2: channel 0: rcvd close debug3: channel 0: will not send data after close debug2: channel 0: almost dead debug2: channel 0: gc: notify user debug2: channel 0: gc: user detached debug2: channel 0: send close debug2: channel 0: is dead debug2: channel 0: garbage collecting debug1: channel 0: free: client-session, nchannels 1 debug3: channel 0: status: The following connections are open: #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1) debug3: channel 0: close_fds r -1 w -1 e 6 c -1 debug1: fd 1 clearing O_NONBLOCK debug3: fd 2 is not O_NONBLOCK Transferred: sent 2496, received 2704 bytes, in 0.1 seconds Bytes per second: sent 20942.4, received 22687.6 debug1: Exit status 1 ....and again with the -Y flag $> ssh -vvv -Y SRVR dillo >& sshtest.out OpenSSH_5.1p1, OpenSSL 0.9.8i 15 Sep 2008 debug1: Reading configuration data /etc/ssh/ssh_config debug2: ssh_connect: needpriv 0 debug1: Connecting to 192.168.1.1 [192.168.1.1] port 4503. debug1: Connection established. debug3: Not a RSA1 key file /home/USER/.ssh/id_dsa. debug2: key_type_from_name: unknown key type '-----BEGIN' debug3: key_read: missing keytype debug2: key_type_from_name: unknown key type 'Proc-Type:' debug3: key_read: missing keytype debug2: key_type_from_name: unknown key type 'DEK-Info:' debug3: key_read: missing keytype debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug2: key_type_from_name: unknown key type '-----END' debug3: key_read: missing keytype debug1: identity file /home/USER/.ssh/id_dsa type 2 debug1: Remote protocol version 2.0, remote software version OpenSSH_5.1 debug1: match: OpenSSH_5.1 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_5.1 debug2: fd 3 setting O_NONBLOCK debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie- hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman- group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael- cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael- cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac- ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac- ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib(a)openssh.com,zlib debug2: kex_parse_kexinit: none,zlib(a)openssh.com,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie- hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman- group1-sha1 debug2: kex_parse_kexinit: ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael- cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael- cbc(a)lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac- ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64(a)openssh.com,hmac- ripemd160,hmac-ripemd160(a)openssh.com,hmac-sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib(a)openssh.com debug2: kex_parse_kexinit: none,zlib(a)openssh.com debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_setup: found hmac-md5 debug1: kex: server->client aes128-cbc hmac-md5 none debug2: mac_setup: found hmac-md5 debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug2: dh_gen_key: priv key bits set: 129/256 debug2: bits set: 1033/2048 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug3: put_host_port: [192.168.1.1]:4503 debug3: put_host_port: [192.168.1.1]:4503 debug3: check_host_in_hostfile: filename /home/USER/.ssh/known_hosts debug3: check_host_in_hostfile: match line 2 debug3: check_host_in_hostfile: filename /home/USER/.ssh/known_hosts debug3: check_host_in_hostfile: match line 2 debug1: Host '[192.168.1.1]:4503' is known and matches the DSA host key. debug1: Found key in /home/USER/.ssh/known_hosts:2 debug2: bits set: 1011/2048 debug1: ssh_dss_verify: signature correct debug2: kex_derive_keys debug2: set_newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug2: set_newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: SSH2_MSG_SERVICE_REQUEST sent debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug2: key: /home/USER/.ssh/id_dsa (0x80a1900) debug1: Authentications that can continue: publickey,password debug3: start over, passed a different list publickey,password debug3: preferred publickey,keyboard-interactive debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering public key: /home/USER/.ssh/id_dsa debug3: send_pubkey_test debug2: we sent a publickey packet, wait for reply debug1: Server accepts key: pkalg ssh-dss blen 433 debug2: input_userauth_pk_ok: fp d1:ec:dc:75:00:1e:62:8d:6c:5c:c4:5f:cb:f5:ca:96 debug3: sign_and_send_pubkey debug1: Authentication succeeded (publickey). debug2: fd 5 setting O_NONBLOCK debug3: fd 6 is O_NONBLOCK debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug2: channel 0: send open debug1: Requesting no-more-sessions(a)openssh.com debug1: Entering interactive session. debug2: callback start debug2: x11_get_proto: /usr/bin/xauth list :0.0 2>/dev/null debug1: Requesting X11 forwarding with authentication spoofing. debug2: channel 0: request x11-req confirm 0 debug2: client_session2_setup: id 0 debug1: Sending command: dillo debug2: channel 0: request exec confirm 1 debug2: fd 3 setting TCP_NODELAY debug2: callback done debug2: channel 0: open confirm rwindow 0 rmax 32768 debug2: channel 0: rcvd adjust 2097152 debug2: channel_input_confirm: type 99 id 0 debug2: exec request accepted on channel 0 debug2: channel 0: rcvd ext data 35 debug2: channel 0: rcvd ext data 1 debug2: channel 0: rcvd eof debug2: channel 0: output open -> drain debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: client_input_channel_req: channel 0 rtype eow(a)openssh.com reply 0 debug2: channel 0: rcvd eow debug2: channel 0: close_read debug2: channel 0: input open -> closed debug2: channel 0: rcvd close debug3: channel 0: will not send data after close debug2: channel 0: obuf_empty delayed efd 6/(36) Can't open display "localhost:10.0" debug2: channel 0: written 36 to efd 6 debug3: channel 0: will not send data after close debug2: channel 0: obuf empty debug2: channel 0: close_write debug2: channel 0: output drain -> closed debug2: channel 0: almost dead debug2: channel 0: gc: notify user debug2: channel 0: gc: user detached debug2: channel 0: send close debug2: channel 0: is dead debug2: channel 0: garbage collecting debug1: channel 0: free: client-session, nchannels 1 debug3: channel 0: status: The following connections are open: #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1) debug3: channel 0: close_fds r -1 w -1 e 6 c -1 debug1: fd 1 clearing O_NONBLOCK debug3: fd 2 is not O_NONBLOCK Transferred: sent 2496, received 2704 bytes, in 0.1 seconds Bytes per second: sent 21023.4, received 22775.3 debug1: Exit status 1 -- *=( http://www.thedailymash.co.uk/ *=( For all your UK news needs.
From: Jim Diamond on 9 Feb 2010 20:35 On 2010-02-09 at 19:56 AST, Mike Jones <Not(a)Arizona.Bay> wrote: > Responding to Jim Diamond: > >> On 2010-02-09 at 09:08 AST, Mike Jones <Not(a)Arizona.Bay> wrote: >>> Responding to Henrik Carlqvist: >>> >>>> Mike Jones <Not(a)Arizona.Bay> wrote: >>>> >>>>> Responding to Henrik Carlqvist: >>>>>> Are you able to find any clue to the cause if you do something like: >>>>>> >>>>>> ssh -vvv -X remotemachine >>>> >>>>> Only that the connection Can't open display "localhost:10.0" >>>> >>>> Even if you are unable to read anything out from the debug messages >>>> someone else might be able to tell something. Please do the following: >>>> >>>> ssh -vvv -X remotemachine ls /dev/null >& /tmp/log.txt >>>> >>>> Then post your contents of /tmp/log.txt >>>> >>>> regards Henrik >>> >>> >>> Ok. SRVR=server USER=common_user_account >> >> To me, that wasn't very illuminating. Perhaps someone else will see >> your problem, but it might be more informative if you tried a command >> that actually uses your X connection. Try this and post it: >> >> ssh -vvv -X remotemachine xclock >& /tmp/log.txt > $> ssh -vvv -X SRVR dillo >& sshtest.out It is possibly too bad that you didn't use xclock like I suggested, since I don't have dillo on the remote machine. It probably doesn't matter, but you never know. > OpenSSH_5.1p1, OpenSSL 0.9.8i 15 Sep 2008 I have OpenSSH_5.2p1, OpenSSL 0.9.8k 25 Mar 2009 so the noted differences below may be because of that > debug1: Reading configuration data /etc/ssh/ssh_config > debug2: ssh_connect: needpriv 0 > debug1: Connecting to 192.168.1.1 [192.168.1.1] port 4503. Hmmm... I see you are using a non-standard ssh port (4503 instead of 22). I don't know whether that could cause a problem, but the fewer variations on the usual theme, the better. <snip> I didn't notice anything noteworthy there, but maybe I missed something. > debug3: put_host_port: [192.168.1.1]:4503 > debug3: put_host_port: [192.168.1.1]:4503 > debug3: check_host_in_hostfile: filename /home/USER/.ssh/known_hosts Am I safe in assuming you edited your real username in a fit of paranoia? Is the real userid lower case? <snip> > debug2: fd 5 setting O_NONBLOCK > debug3: fd 6 is O_NONBLOCK Interesting. Later in the conversation I get debug2: fd 7 setting O_NONBLOCK debug3: fd 7 is O_NONBLOCK I wonder why your fd's are different (from each other). > debug1: channel 0: new [client-session] > debug3: ssh_session2_open: channel_new: 0 > debug2: channel 0: send open > debug1: Requesting no-more-sessions(a)openssh.com > debug1: Entering interactive session. > debug2: callback start > debug2: x11_get_proto: /usr/bin/xauth list :0.0 2>/dev/null > debug1: Requesting X11 forwarding with authentication spoofing. > debug2: channel 0: request x11-req confirm 0 > debug2: client_session2_setup: id 0 > debug1: Sending command: dillo > debug2: channel 0: request exec confirm 1 > debug2: fd 3 setting TCP_NODELAY > debug2: callback done > debug2: channel 0: open confirm rwindow 0 rmax 32768 > debug2: channel 0: rcvd adjust 2097152 > debug2: channel_input_confirm: type 99 id 0 > debug2: exec request accepted on channel 0 > debug2: channel 0: rcvd ext data 35 > debug2: channel 0: rcvd ext data 1 > Can't open display "localhost:10.0" Here are my last few lines, for comparison: debug1: Authentication succeeded (publickey). debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug2: channel 0: send open debug1: Requesting no-more-sessions(a)openssh.com debug1: Entering interactive session. debug2: callback start debug2: x11_get_proto: /usr/bin/xauth list :0.0 2>/dev/null debug1: Requesting X11 forwarding with authentication spoofing. debug2: channel 0: request x11-req confirm 0 debug2: client_session2_setup: id 0 debug1: Sending command: xclock debug2: channel 0: request exec confirm 1 debug2: fd 3 setting TCP_NODELAY debug2: callback done debug2: channel 0: open confirm rwindow 0 rmax 32768 debug2: channel 0: rcvd adjust 2097152 debug2: channel_input_status_confirm: type 99 id 0 debug2: exec request accepted on channel 0 Pretty much the same as yours, and then: debug1: client_input_channel_open: ctype x11 rchan 3 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 43365 debug2: fd 7 setting O_NONBLOCK debug3: fd 7 is O_NONBLOCK debug1: channel 1: new [x11] debug1: confirm x11 Sorry that I can't help, aside from my probably-spurious comments above. Jim
From: Mike Jones on 10 Feb 2010 05:25 Responding to Jim Diamond: > On 2010-02-09 at 19:56 AST, Mike Jones <Not(a)Arizona.Bay> wrote: >> Responding to Jim Diamond: >> >>> On 2010-02-09 at 09:08 AST, Mike Jones <Not(a)Arizona.Bay> wrote: >>>> Responding to Henrik Carlqvist: >>>> >>>>> Mike Jones <Not(a)Arizona.Bay> wrote: >>>>> >>>>>> Responding to Henrik Carlqvist: >>>>>>> Are you able to find any clue to the cause if you do something >>>>>>> like: >>>>>>> >>>>>>> ssh -vvv -X remotemachine >>>>> >>>>>> Only that the connection Can't open display "localhost:10.0" >>>>> >>>>> Even if you are unable to read anything out from the debug messages >>>>> someone else might be able to tell something. Please do the >>>>> following: >>>>> >>>>> ssh -vvv -X remotemachine ls /dev/null >& /tmp/log.txt >>>>> >>>>> Then post your contents of /tmp/log.txt >>>>> >>>>> regards Henrik >>>> >>>> >>>> Ok. SRVR=server USER=common_user_account >>> >>> To me, that wasn't very illuminating. Perhaps someone else will see >>> your problem, but it might be more informative if you tried a command >>> that actually uses your X connection. Try this and post it: >>> >>> ssh -vvv -X remotemachine xclock >& /tmp/log.txt > >> $> ssh -vvv -X SRVR dillo >& sshtest.out > It is possibly too bad that you didn't use xclock like I suggested, > since I don't have dillo on the remote machine. It probably doesn't > matter, but you never know. > >> OpenSSH_5.1p1, OpenSSL 0.9.8i 15 Sep 2008 > > I have > OpenSSH_5.2p1, OpenSSL 0.9.8k 25 Mar 2009 so the noted differences below > may be because of that > >> debug1: Reading configuration data /etc/ssh/ssh_config debug2: >> ssh_connect: needpriv 0 >> debug1: Connecting to 192.168.1.1 [192.168.1.1] port 4503. > > Hmmm... I see you are using a non-standard ssh port (4503 instead of > 22). I don't know whether that could cause a problem, but the fewer > variations on the usual theme, the better. > > <snip> > I didn't notice anything noteworthy there, but maybe I missed something. > >> debug3: put_host_port: [192.168.1.1]:4503 debug3: put_host_port: >> [192.168.1.1]:4503 debug3: check_host_in_hostfile: filename >> /home/USER/.ssh/known_hosts > Am I safe in assuming you edited your real username in a fit of > paranoia? Is the real userid lower case? > > <snip> > >> debug2: fd 5 setting O_NONBLOCK >> debug3: fd 6 is O_NONBLOCK > Interesting. Later in the conversation I get > debug2: fd 7 setting O_NONBLOCK > debug3: fd 7 is O_NONBLOCK > I wonder why your fd's are different (from each other). > >> debug1: channel 0: new [client-session] debug3: ssh_session2_open: >> channel_new: 0 debug2: channel 0: send open >> debug1: Requesting no-more-sessions(a)openssh.com debug1: Entering >> interactive session. debug2: callback start >> debug2: x11_get_proto: /usr/bin/xauth list :0.0 2>/dev/null debug1: >> Requesting X11 forwarding with authentication spoofing. debug2: channel >> 0: request x11-req confirm 0 debug2: client_session2_setup: id 0 >> debug1: Sending command: dillo >> debug2: channel 0: request exec confirm 1 debug2: fd 3 setting >> TCP_NODELAY >> debug2: callback done >> debug2: channel 0: open confirm rwindow 0 rmax 32768 debug2: channel 0: >> rcvd adjust 2097152 debug2: channel_input_confirm: type 99 id 0 debug2: >> exec request accepted on channel 0 > >> debug2: channel 0: rcvd ext data 35 >> debug2: channel 0: rcvd ext data 1 >> Can't open display "localhost:10.0" > > Here are my last few lines, for comparison: > > debug1: Authentication succeeded (publickey). debug1: channel 0: new > [client-session] debug3: ssh_session2_open: channel_new: 0 debug2: > channel 0: send open > debug1: Requesting no-more-sessions(a)openssh.com debug1: Entering > interactive session. debug2: callback start > debug2: x11_get_proto: /usr/bin/xauth list :0.0 2>/dev/null debug1: > Requesting X11 forwarding with authentication spoofing. debug2: channel > 0: request x11-req confirm 0 debug2: client_session2_setup: id 0 > debug1: Sending command: xclock > debug2: channel 0: request exec confirm 1 debug2: fd 3 setting > TCP_NODELAY > debug2: callback done > debug2: channel 0: open confirm rwindow 0 rmax 32768 debug2: channel 0: > rcvd adjust 2097152 debug2: channel_input_status_confirm: type 99 id 0 > debug2: exec request accepted on channel 0 > > Pretty much the same as yours, and then: > > debug1: client_input_channel_open: ctype x11 rchan 3 win 65536 max 16384 > debug1: client_request_x11: request from 127.0.0.1 43365 debug2: fd 7 > setting O_NONBLOCK > debug3: fd 7 is O_NONBLOCK > debug1: channel 1: new [x11] > debug1: confirm x11 > > > Sorry that I can't help, aside from my probably-spurious comments above. > > Jim No worries. Its a headscratcher for sure. Don't forget that all this worked fine (rock-solid and dependable) for some time, and this is the first time I've ever seen a glitch like this. Either I've done something somewhere else thats affecting this by some curious WTH? thing, or there is a sneaky bug that has now decided to surface, or my MOBO is as carp as I think it is and something is on the cusp of failing. -- *=( http://www.thedailymash.co.uk/ *=( For all your UK news needs.
From: allend on 10 Feb 2010 07:15 Just wondering whether there is something in your setup that is stopping traffic on port 6010. When I do 'ssh -Y server' then 'netstat -atn' then I see a line: "tcp 0 0 127.0.0.1:6010 0.0.0.0:* LISTEN" This line does not appear when I do 'ssh server'.
First
|
Prev
|
Next
|
Last
Pages: 1 2 3 4 Prev: network mirror Next: Sudden X11 forwarding glitch - Can't open display"localhost:10.0" |