bugzilla-daemon at mindrot.org
2002-Jul-03 19:41 UTC
[Bug 333] X11 forwarding not working in OpenSSH 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=333 ------- Additional Comments From stevesk at pobox.com 2002-07-04 05:41 ------- i will guess configure did not find an xauth when it was built ($PATH is irrelevant here). please verify. see $HOME/.ssh/rc example in sshd.8 which can be used as a workaround in this case. djm: autoconf-2.53 exposes a bug for xauth path detection. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2002-Jul-18 04:39 UTC
[Bug 333] X11 forwarding not working in OpenSSH 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=333 ------- Additional Comments From stevesk at pobox.com 2002-07-18 14:39 ------- set XAuthLocation in ssh and sshd config and test. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2002-Jul-18 16:42 UTC
[Bug 333] X11 forwarding not working in OpenSSH 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=333 ------- Additional Comments From stripes at tigerlair.com 2002-07-19 02:41 ------- Still did not work. I tried the XAuthLocation as well. I will email you the debugging output from the client and server. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
bugzilla-daemon at mindrot.org
2002-Jul-18 16:48 UTC
[Bug 333] X11 forwarding not working in OpenSSH 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=333 ------- Additional Comments From stripes at tigerlair.com 2002-07-19 02:48 ------- SSHD debugging output: Script started on Wed Jul 3 10:02:26 2002 florida:/home/gator# /usr/sbin/sshd -ddd debug1: sshd version OpenSSH_3.4p1 Debian 1:3.4p1-2 debug1: private host key: #0 type 0 RSA1 debug3: Not a RSA1 key file /etc/ssh/ssh_host_rsa_key. debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug3: Not a RSA1 key file /etc/ssh/ssh_host_dsa_key. debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA debug1: Bind to port 22 on 0.0.0.0. Server listening on 0.0.0.0 port 22. Generating 768 bit RSA key. RSA key generation complete. debug1: Server will not fork when running in debugging mode. Connection from 131.215.145.120 port 59317 debug1: Client protocol version 2.0; client software version OpenSSH_3.4p1 Debian 1:3.4p1-2 debug1: match: OpenSSH_3.4p1 Debian 1:3.4p1-2 pat OpenSSH* Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-1.99-OpenSSH_3.4p1 Debian 1:3.4p1-2 debug2: Network child is on pid 15444 debug3: preauth child monitor started debug3: mm_request_receive entering debug3: privsep user:group 101:65534 debug1: list_hostkey_types: ssh-rsa,ssh-dss debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,a es256-cbc,rijndael-cbc at lysator.liu.se debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,a es256-cbc,rijndael-cbc at lysator.liu.se debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac -sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac -sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: blowfish-cbcdebug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac -sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac -sha1-96,hmac-md5-96 debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-md5 debug1: kex: client->server blowfish-cbc hmac-md5 none debug2: mac_init: found hmac-md5 debug1: kex: server->client blowfish-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received debug3: mm_request_send entering: type 0 debug3: monitor_read: checking request 0 debug3: mm_answer_moduli: got parameters: 1024 2048 8192 debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI debug3: mm_request_receive_expect entering: type 1 debug3: mm_request_receive entering debug3: mm_request_send entering: type 1 debug2: monitor_read: 0 used once, disabling now debug3: mm_request_receive entering debug3: mm_choose_dh: remaining 0 debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent debug1: dh_gen_key: priv key bits set: 126/256 debug1: bits set: 1598/3191 debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT debug1: bits set: 1605/3191 debug3: mm_key_sign entering debug3: mm_request_send entering: type 4 debug3: monitor_read: checking request 4 debug3: mm_answer_sign debug3: mm_answer_sign: signature 0x809ade8(143) debug3: mm_request_send entering: type 5 debug2: monitor_read: 4 used once, disabling now debug3: mm_request_receive entering debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN debug3: mm_request_receive_expect entering: type 5 debug3: mm_request_receive entering debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent debug1: kex_derive_keysdebug1: waiting for SSH2_MSG_NEWKEYS debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: KEX done debug1: userauth-request for user gator service ssh-connection method none debug1: attempt 0 failures 0 debug3: mm_getpwnamallow entering debug3: mm_request_send entering: type 6 debug3: monitor_read: checking request 6 debug3: mm_answer_pwnamallow debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 debug3: mm_request_send entering: type 7 debug2: monitor_read: 6 used once, disabling now debug3: mm_request_receive entering debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM debug3: mm_request_receive_expect entering: type 7 debug3: mm_request_receive entering debug2: input_userauth_request: setting up authctxt for gator debug3: mm_start_pam entering debug3: mm_request_send entering: type 37 debug3: monitor_read: checking request 37 debug1: Starting up PAM with username "gator" debug3: Trying to reverse map address 131.215.145.120. debug3: mm_inform_authserv entering debug3: mm_request_send entering: type 3 debug2: input_userauth_request: try method none debug3: mm_auth_password entering debug1: PAM setting rhost to "swamp.cacr.caltech.edu" debug2: monitor_read: 37 used once, disabling now debug3: mm_request_receive entering debug3: monitor_read: checking request 3 debug3: mm_answer_authserv: service=ssh-connection, styledebug2: monitor_read: 3 used once, disabling now debug3: mm_request_receive entering debug3: mm_request_send entering: type 10 debug3: monitor_read: checking request 10 debug3: mm_answer_authpassword: sending result 0 debug3: mm_request_send entering: type 11 Failed none for gator from 131.215.145.120 port 59317 ssh2 debug3: mm_request_receive entering debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD debug3: mm_request_receive_expect entering: type 11 debug3: mm_request_receive entering debug3: mm_auth_password: user not authenticated Failed none for gator from 131.215.145.120 port 59317 ssh2 debug1: userauth-request for user gator service ssh-connection method publickey debug1: newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sentdebug1: attempt 1 failures 1 debug2: input_userauth_request: try method publickey debug1: test whether pkalg/pkblob are acceptable debug3: mm_key_allowed entering debug3: mm_request_send entering: type 20 debug3: monitor_read: checking request 20 debug3: mm_answer_keyallowed entering debug3: mm_answer_keyallowed: key_from_blob: 0x809ee58 debug1: temporarily_use_uid: 1000/1000 (e=0) debug1: trying public key file /home/gator/.ssh/authorized_keys debug3: secure_filename: checking '/home/gator/.ssh' debug3: secure_filename: checking '/home/gator' debug3: secure_filename: terminating check at '/home/gator' debug3: key_read: type mismatch debug2: user_key_allowed: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBAIfmujXvz4NVGS3JLDSdON ExLTZXP9IPC/xHEQq3HlC97/pceZzK1RILa4EZ+y0M+cZ2XfxUwRffWeODqJvwsTXu+OSAh1b8IwkhnReMiJ1UzwSsUu eNJH5WXc5EOKRDbus7+GSm3cCOxTg1PPQMCRVfhudZQ3UAs+rETtCC8wU7AAAAFQDQx/sUoWHaFABHnkIfnvgF7UksTw AAAIAQBZ+Kw9wkM7XiiVILs/s+zg/eCx796qJJZ/LlhnY527w0O6dydHRAFVj7GtegKSNJ4Q2Q/2DpCbG5mcrbsBantv LV8O0dz7H0twlcnJulgYVj7OEjIRvlHME3FQ+roqnRHxVMXUZciDRZYyW3IY2Vj1uMOj12tYLZvo74vWhaKgAAAIEAhw fbVWVxAa8GllFIA5l4SJYP7a5E+pe4kPi2GBlBeLonCEUUmFuIyn9sX4C0LI+98ZKSoth+QljNUOYbeB53iMrfGEy5Km NOPg5zm9DEBbsU638wRJmYWNzfqEntNr0pBE5J9+vpfCBllYGhbukEquA7dQ4AhRsG7ItpKosHhH0gator at swamp ' debug2: key_type_from_name: unknown key type 'AAAAB3NzaC1kc3MAAACBAIfmujXvz4NVGS3JLDSdONExLT ZXP9IPC/xHEQq3HlC97/pceZzK1RILa4EZ+y0M+cZ2XfxUwRffWeODqJvwsTXu+OSAh1b8IwkhnReMiJ1UzwSsUueNJH 5WXc5EOKRDbus7+GSm3cCOxTg1PPQMCRVfhudZQ3UAs+rETtCC8wU7AAAAFQDQx/sUoWHaFABHnkIfnvgF7UksTwAAAI AQBZ+Kw9wkM7XiiVILs/s+zg/eCx796qJJZ/LlhnY527w0O6dydHRAFVj7GtegKSNJ4Q2Q/2DpCbG5mcrbsBantvLV8O 0dz7H0twlcnJulgYVj7OEjIRvlHME3FQ+roqnRHxVMXUZciDRZYyW3IY2Vj1uMOj12tYLZvo74vWhaKgAAAIEAhwfbVW VxAa8GllFIA5l4SJYP7a5E+pe4kPi2GBlBeLonCEUUmFuIyn9sX4C0LI+98ZKSoth+QljNUOYbeB53iMrfGEy5KmNOPg 5zm9DEBbsU638wRJmYWNzfqEntNr0pBE5J9+vpfCBllYGhbukEquA7dQ4AhRsG7ItpKosHhH0=' debug3: key_read: no key found debug2: user_key_allowed: advance: 'AAAAB3NzaC1kc3MAAACBAIfmujXvz4NVGS3JLDSdONExLTZXP9IPC/xH EQq3HlC97/pceZzK1RILa4EZ+y0M+cZ2XfxUwRffWeODqJvwsTXu+OSAh1b8IwkhnReMiJ1UzwSsUueNJH5WXc5EOKRD bus7+GSm3cCOxTg1PPQMCRVfhudZQ3UAs+rETtCC8wU7AAAAFQDQx/sUoWHaFABHnkIfnvgF7UksTwAAAIAQBZ+Kw9wk M7XiiVILs/s+zg/eCx796qJJZ/LlhnY527w0O6dydHRAFVj7GtegKSNJ4Q2Q/2DpCbG5mcrbsBantvLV8O0dz7H0twlc nJulgYVj7OEjIRvlHME3FQ+roqnRHxVMXUZciDRZYyW3IY2Vj1uMOj12tYLZvo74vWhaKgAAAIEAhwfbVWVxAa8GllFI A5l4SJYP7a5E+pe4kPi2GBlBeLonCEUUmFuIyn9sX4C0LI+98ZKSoth+QljNUOYbeB53iMrfGEy5KmNOPg5zm9DEBbsU 638wRJmYWNzfqEntNr0pBE5J9+vpfCBllYGhbukEquA7dQ4AhRsG7ItpKosHhH0= gator at swamp ' debug3: key_read: type mismatch debug2: user_key_allowed: check options: 'ssh-dss AAAAB3NzaC1kc3MAAACBALQAYY2jizgVw7Q4GZ0Ygs LZxgjt/0DEmVbjDGULPyYFesu6uMf6izcmE/1urXaZPNWVGL3C4VU7mdSHJ1F24nZRc2qrXQlHD2p76m0Q1rQKV+FTF8 BLOvHZ44cMWR3xcHTn0+b0egrPRVCn1OQxz/aRQ/9IqPPdmAsw0DqJGP93AAAAFQDZs2rVXGnuIx+2HYXmyOayBHIdYQ AAAIAtolAP8QmUd+8WKQN6jes/SnPH9gDoYJp+S0vBdg4adoZWDq92/Nx0m8n8iEIfQVkMR/qca/eTXrnfpsFLAPBwXd vFU/bZYf6KPCZoMRUT+fiC0lgacSAkgtFBBQa+TSq69h4Zunc2NW5jOPvLQMfIkFy34b6+rAs4rnYGLMT9wAAAAIBZls 9gB1jkR/uvgvStF5Kbc+k8fUjXxA8BOT9LvwW2KUruMxfYfuL9brykkhgUwT6GTSj6gmpP6LOArita/FXECJkz9nWZUX jiROgmanmSSKuK1KKZ4ypqdwqQE/DV26n/ZGsCiF6pimuQZaBj4UgOErdTMUn9A47LSHfS/Ty0ng=stripes at tiger debug2: key_type_from_name: unknown key type 'AAAAB3NzaC1kc3MAAACBALQAYY2jizgVw7Q4GZ0YgsLZxg jt/0DEmVbjDGULPyYFesu6uMf6izcmE/1urXaZPNWVGL3C4VU7mdSHJ1F24nZRc2qrXQlHD2p76m0Q1rQKV+FTF8BLOv HZ44cMWR3xcHTn0+b0egrPRVCn1OQxz/aRQ/9IqPPdmAsw0DqJGP93AAAAFQDZs2rVXGnuIx+2HYXmyOayBHIdYQAAAI AtolAP8QmUd+8WKQN6jes/SnPH9gDoYJp+S0vBdg4adoZWDq92/Nx0m8n8iEIfQVkMR/qca/eTXrnfpsFLAPBwXdvFU/ bZYf6KPCZoMRUT+fiC0lgacSAkgtFBBQa+TSq69h4Zunc2NW5jOPvLQMfIkFy34b6+rAs4rnYGLMT9wAAAAIBZls9gB1 jkR/uvgvStF5Kbc+k8fUjXxA8BOT9LvwW2KUruMxfYfuL9brykkhgUwT6GTSj6gmpP6LOArita/FXECJkz9nWZUXjiRO gmanmSSKuK1KKZ4ypqdwqQE/DV26n/ZGsCiF6pimuQZaBj4UgOErdTMUn9A47LSHfS/Ty0ng==' debug3: key_read: no key found debug2: user_key_allowed: advance: 'AAAAB3NzaC1kc3MAAACBALQAYY2jizgVw7Q4GZ0YgsLZxgjt/0DEmVbj DGULPyYFesu6uMf6izcmE/1urXaZPNWVGL3C4VU7mdSHJ1F24nZRc2qrXQlHD2p76m0Q1rQKV+FTF8BLOvHZ44cMWR3x cHTn0+b0egrPRVCn1OQxz/aRQ/9IqPPdmAsw0DqJGP93AAAAFQDZs2rVXGnuIx+2HYXmyOayBHIdYQAAAIAtolAP8QmU d+8WKQN6jes/SnPH9gDoYJp+S0vBdg4adoZWDq92/Nx0m8n8iEIfQVkMR/qca/eTXrnfpsFLAPBwXdvFU/bZYf6KPCZo MRUT+fiC0lgacSAkgtFBBQa+TSq69h4Zunc2NW5jOPvLQMfIkFy34b6+rAs4rnYGLMT9wAAAAIBZls9gB1jkR/uvgvSt F5Kbc+k8fUjXxA8BOT9LvwW2KUruMxfYfuL9brykkhgUwT6GTSj6gmpP6LOArita/FXECJkz9nWZUXjiROgmanmSSKuK 1KKZ4ypqdwqQE/DV26n/ZGsCiF6pimuQZaBj4UgOErdTMUn9A47LSHfS/Ty0ng== stripes at tigerden ' debug1: restore_uid debug2: key not found debug1: temporarily_use_uid: 1000/1000 (e=0) debug1: trying public key file /home/gator/.ssh/authorized_keys2 debug1: restore_uid debug3: mm_answer_keyallowed: key 0x809ee58 is disallowed debug3: mm_request_send entering: type 21 debug3: mm_request_receive entering debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED debug3: mm_request_receive_expect entering: type 21 debug3: mm_request_receive entering debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa Failed publickey for gator from 131.215.145.120 port 59317 ssh2 debug1: userauth-request for user gator service ssh-connection method publickey debug1: attempt 2 failures 2 debug2: input_userauth_request: try method publickey debug1: test whether pkalg/pkblob are acceptable debug3: mm_key_allowed entering debug3: mm_request_send entering: type 20 debug3: monitor_read: checking request 20 debug3: mm_answer_keyallowed entering debug3: mm_answer_keyallowed: key_from_blob: 0x809e088 debug1: temporarily_use_uid: 1000/1000 (e=0) debug1: trying public key file /home/gator/.ssh/authorized_keys debug3: secure_filename: checking '/home/gator/.ssh' debug3: secure_filename: checking '/home/gator' debug3: secure_filename: terminating check at '/home/gator' debug1: matching key found: file /home/gator/.ssh/authorized_keys, line 1 Found matching DSA key: dc:6a:b9:03:1b:18:29:47:c3:20:49:1e:59:89:94:66 debug1: restore_uid debug3: mm_answer_keyallowed: key 0x809e088 is allowed debug3: mm_request_send entering: type 21 debug3: mm_request_receive entering debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED debug3: mm_request_receive_expect entering: type 21 debug3: mm_request_receive entering debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss Postponed publickey for gator from 131.215.145.120 port 59317 ssh2 debug1: userauth-request for user gator service ssh-connection method publickey debug1: attempt 3 failures 2 debug2: input_userauth_request: try method publickey debug3: mm_key_allowed entering debug3: mm_request_send entering: type 20 debug3: monitor_read: checking request 20 debug3: mm_answer_keyallowed entering debug3: mm_answer_keyallowed: key_from_blob: 0x809e260 debug1: temporarily_use_uid: 1000/1000 (e=0) debug1: trying public key file /home/gator/.ssh/authorized_keys debug3: secure_filename: checking '/home/gator/.ssh' debug3: secure_filename: checking '/home/gator' debug3: secure_filename: terminating check at '/home/gator' debug1: matching key found: file /home/gator/.ssh/authorized_keys, line 1 Found matching DSA key: dc:6a:b9:03:1b:18:29:47:c3:20:49:1e:59:89:94:66 debug1: restore_uid debug3: mm_answer_keyallowed: key 0x809e260 is allowed debug3: mm_request_send entering: type 21 debug3: mm_request_receive entering debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED debug3: mm_request_receive_expect entering: type 21 debug3: mm_request_receive entering debug3: mm_key_verify entering debug3: mm_request_send entering: type 22 debug3: monitor_read: checking request 22 debug1: ssh_dss_verify: signature correct debug3: mm_answer_keyverify: key 0x809deb0 signature verified debug3: mm_request_send entering: type 23 debug2: pam_acct_mgmt() = 0 Accepted publickey for gator from 131.215.145.120 port 59317 ssh2 debug1: monitor_child_preauth: gator has been authenticated by privileged process debug3: mm_get_keystate: Waiting for new keys debug3: mm_request_receive_expect entering: type 24 debug3: mm_request_receive entering debug3: mm_key_verify: waiting for MONITOR_ANS_KEYVERIFY debug3: mm_request_receive_expect entering: type 23 debug3: mm_request_receive entering debug2: userauth_pubkey: authenticated 1 pkalg ssh-dss Accepted publickey for gator from 131.215.145.120 port 59317 ssh2 debug3: mm_send_keystate: Sending new keys: 0x8094ef8 0x8094d90 debug3: mm_newkeys_to_blob: converting 0x8094ef8 debug3: mm_newkeys_to_blob: converting 0x8094d90 debug3: mm_send_keystate: New keys have been sent debug3: mm_send_keystate: Sending compression state debug3: mm_request_send entering: type 24 debug3: mm_send_keystate: Finished sending state debug3: mm_newkeys_from_blob: 0x809a0f8(112) debug2: mac_init: found hmac-md5 debug3: mm_get_keystate: Waiting for second key debug3: mm_newkeys_from_blob: 0x809a0f8(112) debug2: mac_init: found hmac-md5 debug3: mm_get_keystate: Getting compression state debug3: mm_get_keystate: Getting Network I/O buffers debug3: mm_share_sync: Share sync debug3: mm_share_sync: Share sync end debug2: User child is on pid 15445 debug3: mm_request_receive entering debug1: PAM establishing creds debug1: newkeys: mode 0 debug1: newkeys: mode 1 debug1: Entering interactive session for SSH2. debug1: fd 7 setting O_NONBLOCK debug1: fd 8 setting O_NONBLOCK debug1: server_init_dispatch_20 debug1: server_input_channel_open: ctype session rchan 0 win 65536 max 16384 debug1: input_session_request debug1: channel 0: new [server-session] debug1: session_new: init debug1: session_new: session 0 debug1: session_open: channel 0 debug1: session_open: session 0: link with channel 0 debug1: server_input_channel_open: confirm session debug1: server_input_channel_req: channel 0 request pty-req reply 0 debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req pty-req debug1: Allocating pty. debug3: mm_request_send entering: type 25 debug3: monitor_read: checking request 25 debug3: mm_answer_pty entering debug1: session_new: init debug1: session_new: session 0debug3: mm_answer_pty: tty /dev/pts/3 ptyfd 3 debug3: mm_request_receive entering debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY debug3: mm_request_receive_expect entering: type 26 debug3: mm_request_receive entering debug1: session_pty_req: session 0 alloc /dev/pts/3 debug3: tty_parse_modes: SSH2 n_bytes 256 debug3: tty_parse_modes: ospeed 38400 debug3: tty_parse_modes: ispeed 38400 debug3: tty_parse_modes: 1 3 debug3: tty_parse_modes: 2 28 debug3: tty_parse_modes: 3 8 debug3: tty_parse_modes: 4 21 debug3: tty_parse_modes: 5 4 debug3: tty_parse_modes: 6 0 debug3: tty_parse_modes: 7 0 debug3: tty_parse_modes: 8 17 debug3: tty_parse_modes: 9 19 debug3: tty_parse_modes: 10 26 debug3: tty_parse_modes: 12 18 debug3: tty_parse_modes: 13 127 debug3: tty_parse_modes: 14 22 debug3: tty_parse_modes: 18 15 debug3: tty_parse_modes: 30 1 debug3: tty_parse_modes: 31 0 debug3: tty_parse_modes: 32 0 debug3: tty_parse_modes: 33 0 debug3: tty_parse_modes: 34 0 debug3: tty_parse_modes: 35 0 debug3: tty_parse_modes: 36 1 debug3: tty_parse_modes: 37 0 debug3: tty_parse_modes: 38 1 debug3: tty_parse_modes: 39 0 debug3: tty_parse_modes: 40 0 debug3: tty_parse_modes: 41 1 debug3: tty_parse_modes: 50 1 debug3: tty_parse_modes: 51 1 debug3: tty_parse_modes: 52 0 debug3: tty_parse_modes: 53 1 debug3: tty_parse_modes: 54 1 debug3: tty_parse_modes: 55 1 debug3: tty_parse_modes: 56 0 debug3: tty_parse_modes: 57 0 debug3: tty_parse_modes: 58 0 debug3: tty_parse_modes: 59 1 debug3: tty_parse_modes: 60 1 debug3: tty_parse_modes: 61 1 debug3: tty_parse_modes: 62 0 debug3: tty_parse_modes: 70 1 debug3: tty_parse_modes: 71 0 debug3: tty_parse_modes: 72 1 debug3: tty_parse_modes: 73 0 debug3: tty_parse_modes: 74 0 debug3: tty_parse_modes: 75 0 debug3: tty_parse_modes: 90 1 debug3: tty_parse_modes: 91 1 debug3: tty_parse_modes: 92 0 debug3: tty_parse_modes: 93 0 debug1: server_input_channel_req: channel 0 request x11-req reply 0 debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req x11-req debug1: fd 11 setting O_NONBLOCK debug2: fd 11 is O_NONBLOCK debug1: channel 1: new [X11 inet listener] debug1: server_input_channel_req: channel 0 request shell reply 0 debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req shell debug1: PAM setting tty to "/dev/pts/3" debug1: PAM establishing creds debug1: fd 4 setting TCP_NODELAY debug1: channel 0: rfd 10 isatty debug1: fd 10 setting O_NONBLOCK debug2: fd 9 is O_NONBLOCK debug1: Setting controlling tty using TIOCSCTTY. debug1: Received SIGCHLD. debug1: session_by_pid: pid 15446 debug1: session_exit_message: session 0 channel 0 pid 15446 debug1: channel request 0: exit-status debug1: session_exit_message: release channel 0 debug1: channel 0: write failed debug1: channel 0: close_write debug1: channel 0: output open -> closed debug1: session_close: session 0 pid 15446 debug3: mm_request_send entering: type 27 debug2: notify_done: reading debug1: channel 0: read<=0 rfd 10 len -1 debug1: channel 0: read failed debug1: channel 0: close_read debug1: channel 0: input open -> drain debug1: channel 0: ibuf empty debug1: channel 0: send eof debug1: channel 0: input drain -> closed debug1: channel 0: send close debug3: channel 0: will not send data after close debug3: monitor_read: checking request 27 debug3: mm_answer_pty_cleanup entering debug1: session_by_tty: session 0 tty /dev/pts/3 debug3: mm_session_close: session 0 pid 15445 debug3: mm_session_close: tty /dev/pts/3 ptyfd 3 debug1: session_pty_cleanup: session 0 release /dev/pts/3 debug3: mm_request_receive entering debug1: channel 0: rcvd close debug3: channel 0: will not send data after close debug1: channel 0: is dead debug1: channel 0: garbage collecting debug1: channel_free: channel 0: server-session, nchannels 2 debug3: channel_free: status: The following connections are open: #0 server-session (t4 r0 i3/0 o3/0 fd -1/-1) debug3: channel_close_fds: channel 0: r -1 w -1 e -1 Connection closed by remote host. debug1: channel_free: channel 1: X11 inet listener, nchannels 1 debug3: channel_free: status: The following connections are open: debug3: channel_close_fds: channel 1: r 11 w 11 e -1 Closing connection to 131.215.145.120 debug3: mm_request_send entering: type 38 debug3: monitor_read: checking request 38 debug3: mm_answer_term: tearing down sessions debug3: mm_request_send entering: type 26 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.