ssh: forwarding X11 connection

Michal Kochanowicz michal w michal.waw.pl
Sob, 25 Maj 2002, 21:20:44 CEST


On Sat, May 25, 2002 at 09:17:54PM +0200, Arkadiusz Miskiewicz wrote:
> Masz xauth na serwerze na który się logujesz?
Tak, przejrzałem archiwum zanim napisałem... Załączę ten log, może komuś
coś powie.
-- 
--= Michal Kochanowicz==--==--==BOFH==--==--==michal w michal.waw.pl =--
--= finger me for PGP public key or visit http://michal.waw.pl/PGP =--
--==--==--==--==--==-- Vodka. Connecting people.--==--==--==--==--==--
A chodzenie po górach SSIE!!!
-------------- następna część ---------
OpenSSH_3.2.2p1, SSH protocols 1.5/2.0, OpenSSL 0x0090603f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 501 geteuid 501 anon 1
debug1: Connecting to wieszak [172.16.0.4] port 22.
debug1: temporarily_use_uid: 501/501 (e=501)
debug1: restore_uid
debug1: temporarily_use_uid: 501/501 (e=501)
debug1: restore_uid
debug1: Connection established.
debug1: identity file /home/users/mkochano/.ssh/identity type -1
debug1: identity file /home/users/mkochano/.ssh/id_rsa type -1
debug1: identity file /home/users/mkochano/.ssh/id_dsa type -1
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.2.2p1
debug1: match: OpenSSH_3.2.2p1 pat OpenSSH*
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.2.2p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 134/256
debug1: bits set: 1598/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'wieszak' is known and matches the RSA host key.
debug1: Found key in /home/users/mkochano/.ssh/known_hosts:10
debug1: bits set: 1662/3191
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
                               _______      ___          _______              
            ###               /       `\\   |   |        /       `\\            
           #o#o#             /______    |  |   |       /______    `\\          
           # V #              .----_)   |  |   |        .---. `\\    |         
          #     ##            |         /  |   |        |   |   |   |         
         #       ##           |    ___/'   |   |______  |   |__/'   |         
         Q#      #Q           |   |        |         /  |          /'         
        QQQQ#   #QQQ          |___|        |________/   |________/'           
         QQQ####QQQ                                                           
                                                                              
                             PLD Linux Distribution                           
                        Homepage: http://www.pld.org.pl/                      

                           Welcome to %h (on pts/%l)
       Linux Version 2.2.21br, Compiled #54 Sat May 25 15:47:00 CEST 2002
           One 650MHz AMD Duron Processor, 383M RAM, 1294.33 Bogomips
                            Uptime 1 hour 37 minutes
                                        
debug1: authentications that can continue: publickey,password,keyboard-interactive
debug1: next auth method to try is publickey
debug1: try privkey: /home/users/mkochano/.ssh/identity
debug1: try privkey: /home/users/mkochano/.ssh/id_rsa
debug1: try privkey: /home/users/mkochano/.ssh/id_dsa
debug1: next auth method to try is keyboard-interactive
debug1: authentications that can continue: publickey,password,keyboard-interactive
debug1: next auth method to try is password
debug1: ssh-userauth2 successful: method password
debug1: fd 6 setting O_NONBLOCK
debug1: channel 0: new [client-session]
debug1: send channel open 0
debug1: Entering interactive session.
debug1: ssh_session2_setup: id 0
debug1: channel request 0: pty-req
debug1: Requesting X11 forwarding with authentication spoofing.
debug1: channel request 0: x11-req
debug1: channel request 0: shell
debug1: fd 3 setting TCP_NODELAY
debug1: channel 0: open confirm rwindow 0 rmax 32768
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
debug1: channel 0: rcvd eof
debug1: channel 0: output open -> drain
debug1: channel 0: obuf empty
debug1: channel 0: close_write
debug1: channel 0: output drain -> closed
debug1: channel 0: rcvd close
debug1: channel 0: close_read
debug1: channel 0: input open -> closed
debug1: channel 0: almost dead
debug1: channel 0: gc: notify user
debug1: channel 0: gc: user detached
debug1: channel 0: send close
debug1: channel 0: is dead
debug1: channel 0: garbage collecting
debug1: channel_free: channel 0: client-session, nchannels 1
debug1: fd 2 clearing O_NONBLOCK
Connection to wieszak closed.
debug1: Transferred: stdin 0, stdout 0, stderr 31 bytes in 5.1 seconds
debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 6.1
debug1: Exit status 0


Więcej informacji o liście dyskusyjnej pld-users-pl