<Snip> debug1: server_input_channel_req: channel 0 request x11-req reply 0^M debug1: session_by_channel: session 0 channel 0^M debug1: session_input_channel_req: session 0 req x11-req^M debug1: bind port 6010: Can't assign requested address^M debug1: fd 11 setting O_NONBLOCK^M debug2: fd 11 is O_NONBLOCK^M debug1: channel 1: new [X11 inet listener]^M debug1: server_input_channel_req: channel 0 request shell reply 0^M debug1: session_by_channel: session 0 channel 0^M debug1: session_input_channel_req: session 0 req shell^M debug1: fd 4 setting TCP_NODELAY^M debug1: channel 0: rfd 10 isatty^M debug1: fd 10 setting O_NONBLOCK^M debug2: fd 9 is O_NONBLOCK^M debug1: Setting controlling tty using TIOCSCTTY.^M Connection closed by remote host.^M debug1: channel_free: channel 0: server-session, nchannels 2^M debug3: channel_free: status: The following connections are open:^M #0 server-session (t4 r0 i0/43 o0/0 fd 10/9)^M ^M debug3: channel_close_fds: channel 0: r 10 w 9 e -1^M debug1: channel_free: channel 1: X11 inet listener, nchannels 1^M debug3: channel_free: status: The following connections are open:^M I tried setting user sshd as a member of group terminals, reseting protection of /dev/pts, etc. Also, when loging in as user root, the log progresses to the line debug1: Setting controlling tty using TIOCSCTTY.^M when the session is established. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.