X forwarding

J. Paul Reed preed at sigkill.com
Fri Sep 15 08:10:53 EST 2000


On Thu, 14 Sep 2000, Pierre Abbat wrote:

> Check your XAUTHORITY environment variable. It should be
> /tmp/ssh-*/cookies. If it's ~/.Xauthority, try changing it. Also try
> running sshd in debug mode on a different port and see whether it is
> forwarding X.

It was set correctly; I included debug output from both the client and the
server, attached above.

However, I did notice this on the client end:
debug: channel 0: new [X11 connection from remote port 3459]
debug: X11 connection uses different authentication protocol.
debug: X11 rejected 0 i1/o16

Could that be the issue?

I changed all the names to remote and remote.server, and local and
local.server, if you're looking at the debug output.

Later,
Paul
  ----------------------------------------------------------------------
  J. Paul Reed                preed at sigkill.com || web.sigkill.com/preed
  If you put a gun to my head and said  "Name ten great bands that have 
  come out in the last 5 years," you'd be wiping my brains off the wall.
                                                         -- Trent Reznor
-------------- next part --------------
[preed at lira preed]$ ssh -v -C -p 2200 remote.server
SSH Version OpenSSH_2.1.1, protocol versions 1.5/2.0.
Compiled with SSL (0x0090581f).
debug: Reading configuration data /home/preed/.ssh/config
debug: Applying options for *
debug: Seeding random number generator
debug: ssh_connect: getuid 1000 geteuid 0 anon 0
debug: Connecting to remote.server [x.x.x.x] port 2200.
debug: Connection established.
debug: Remote protocol version 1.5, remote software version OpenSSH-1.2.3
debug: Local version string SSH-1.5-OpenSSH_2.1.1
debug: Waiting for server public key.
debug: Received server public key (768 bits) and host key (1024 bits).
debug: Host 'remote.server' is known and matches the RSA host key.
debug: Seeding random number generator
debug: Encryption type: 3des
debug: Sent encrypted session key.
debug: Installing crc compensation attack detector.
debug: Received encrypted confirmation.
debug: Doing password authentication.
preed at remote.server's password: 
debug: Requesting compression at level 6.
debug: Enabling compression at level 6.
debug: Requesting pty.
debug: Requesting X11 forwarding with authentication spoofing.
debug: Requesting shell.
debug: Entering interactive session.
Last login: Thu Sep 14 14:01:00 2000 from local.box
Environment:
  USER=preed
  LOGNAME=preed
  HOME=/home/preed
  PATH=/usr/local/java:/bin:/usr/bin:/etc:/usr/sbin:$HOME/bin:/sbin:/usr/local/bin:/usr/X11R6/bin:/usr/bin/X11:$HOME:.
  MAIL=/var/spool/mail/preed
  SHELL=/bin/bash
  SSH_CLIENT=remote.server 63941 2200
  SSH_TTY=/dev/pts/9
  TERM=xterm
  DISPLAY=remote.server:12.0
  XAUTHORITY=/tmp/ssh-FAE14707/cookies
Running /usr/X11R6/bin/xauth add remote.server:12.0 MIT-MAGIC-COOKIE-1 13e8a2bcfba9ac74a996d449d6837388

Some circumstantial evidence is very strong, as when you find a trout in
the milk.
                -- Thoreau

remote.server$ xcalc
debug: Received X11 open request.
debug: fd 4 setting O_NONBLOCK
debug: channel 0: new [X11 connection from remote port 3459]
debug: X11 connection uses different authentication protocol.
debug: X11 rejected 0 i1/o16
debug: channel 0: read failed
debug: channel 0: input open -> drain
debug: channel 0: close_read
debug: channel 0: input: no drain shortcut
debug: channel 0: ibuf empty
debug: channel 0: input drain -> wait_oclose
debug: channel 0: send ieof
debug: channel 0: write failed
debug: channel 0: output open -> wait_ieof
debug: channel 0: send oclose
debug: channel 0: close_write
debug: X11 closed 0 i4/o64
debug: channel 0: rcvd ieof
debug: channel 0: non-open
channel 0: istate 4 != open
channel 0: ostate 64 != open
debug: channel 0: rcvd oclose
debug: channel 0: input wait_oclose -> closed
X connection to remote.server:12.0 broken (explicit kill or server shutdown).
Connection to remote.server closed.
debug: Transferred: stdin 12, stdout 880, stderr 45 bytes in 48.0 seconds
debug: Bytes per second: stdin 0.2, stdout 18.3, stderr 0.9
debug: Exit status 1
debug: compress outgoing: raw data 291, compressed 275, factor 0.95
debug: compress incoming: raw data 1066, compressed 747, factor 0.70
-------------- next part --------------
debug: sshd version OpenSSH-1.2.3
debug: Bind to port 2200 on 0.0.0.0.
Server listening on 0.0.0.0 port 2200.
Generating 768 bit RSA key.
RSA key generation complete.
debug: Server will not fork when running in debugging mode.
Connection from local.server port 63941
debug: Client protocol version 1.5; client software version OpenSSH_2.1.1
debug: Sent 768 bit public key and 1024 bit host key.
debug: Encryption type: 3des
debug: Received session key; encryption turned on.
debug: Installing crc compensation attack detector.
debug: Starting up PAM with username "preed"
debug: Attempting authentication for preed.
debug: PAM Password authentication accepted for user "preed"
Accepted password for preed from local.server port 63941
debug: PAM setting rhost to "local.server"
debug: Enabling compression at level 6.
debug: Allocating pty.
debug: Received request for X11 forwarding with auth spoofing.
debug: Socket family 10 not supported [X11 disp create]
debug: bind port 6010: Address already in use
debug: Socket family 10 not supported [X11 disp create]
debug: bind port 6011: Address already in use
debug: Socket family 10 not supported [X11 disp create]
debug: channel 0: new [X11 inet listener]
debug: Forking shell.
debug: PAM setting tty to "/dev/pts/9"
debug: PAM establishing creds
debug: Entering interactive session.
debug: Setting controlling tty using TIOCSCTTY.
debug: X11 connection requested.
debug: channel 1: new [X11 connection from remote.server port 3459]
debug: Received channel open confirmation.
debug: Received channel close.
debug: channel 1: OUTPUT_OPEN -> OUTPUT_WAIT_DRAIN [rvcd IEOF]
debug: Received channel close confirmation.
debug: channel 1: INPUT_OPEN -> INPUT_CLOSED [rvcd OCLOSE, send IEOF]
debug: channel 1: shutdown_read
debug: channel 1: OUTPUT_WAIT_DRAIN -> OUTPUT_CLOSED [obuf empty, send OCLOSE]
debug: channel 1: shutdown_write
debug: channel 1: full closed
debug: Received SIGCHLD.
debug: End of interactive session; stdin 12, stdout (read 880, sent 880), stderr 0 bytes.
debug: Command exited with status 1.
debug: Received exit confirmation.
debug: xauthfile_cleanup_proc called
Closing connection to x.x.x.x 
debug: compress outgoing: raw data 1066, compressed 747, factor 0.70
debug: compress incoming: raw data 291, compressed 275, factor 0.95


More information about the openssh-unix-dev mailing list