X11 Forwarding and Red Hat
Michael H. Warfield
mhw at wittsend.com
Fri May 19 01:57:46 EST 2000
On Thu, May 18, 2000 at 12:50:35PM -0400, Matthew C. Weigel wrote:
> So, have any idea how to fix it? Would upgrading to 2.1.0 fix it, or just
> give me your problem <g>?
Right at the moment, I've confirmed that the problem still exists
with 2.1.0p1 and, using a verbose mode connection, it seems to be something
weird in the authentication protocol... Here's what I get when connect
with ssh -v and then run xterm:
] [mhw at canyon mhw]$ xterm
] debug: Received X11 open request.
] debug: fd 6 setting O_NONBLOCK
] debug: channel 0: new [X11 connection from canyon port 1055]
] debug: X11 connection uses different authentication protocol.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
What the hell is this?
] debug: X11 rejected 0 i1/o16
] debug: channel 0: read failed
] debug: channel 0: input open -> drain
] debug: channel 0: close_read
] debug: channel 0: input: no drain shortcut
] debug: channel 0: ibuf empty
] debug: channel 0: input drain -> wait_oclose
] debug: channel 0: send ieof
] debug: channel 0: write failed
] debug: channel 0: output open -> wait_ieof
] debug: channel 0: send oclose
] debug: channel 0: close_write
] debug: X11 closed 0 i4/o64
] debug: channel 0: rcvd ieof
] debug: channel 0: non-open
] channel 0: istate 4 != open
] channel 0: ostate 64 != open
] debug: channel 0: rcvd oclose
] debug: channel 0: input wait_oclose -> closed
] X connection to canyon:10.0 broken (explicit kill or server shutdown).
So to answer your question? I don't know. I'm afraid that it
would just give you my problem (but it would confirm that it's not
a cockpit error on my part :-) ).
> Matthew Weigel
> Programmer/Sysadmin/Student
> weigel+ at pitt.edu
Mike
--
Michael H. Warfield | (770) 985-6132 | mhw at WittsEnd.com
(The Mad Wizard) | (770) 331-2437 | http://www.wittsend.com/mhw/
NIC whois: MHW9 | An optimist believes we live in the best of all
PGP Key: 0xDF1DD471 | possible worlds. A pessimist is sure of it!
More information about the openssh-unix-dev
mailing list