Yes, I am using SecureCRT, but even when I use cygwin I dont get X to fw...
here is the log:
$ ssh -v -X critic.dyndns.org
OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090604f
debug1: Reading configuration data /etc/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: ssh_connect: needpriv 0
debug1: Connecting to critic.dyndns.org [24.99.75.109] port 22.
debug1: Connection established.
debug1: identity file /home/bshuler/.ssh/identity type 0
debug1: identity file /home/bshuler/.ssh/id_rsa type 1
debug1: identity file /home/bshuler/.ssh/id_dsa type 2
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.4p1
debug1: match: OpenSSH_3.4p1 pat OpenSSH*
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.4p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 130/256
debug1: bits set: 1576/3191
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'critic.dyndns.org' is known and matches the RSA host key.
debug1: Found key in /home/bshuler/.ssh/known_hosts:12
debug1: bits set: 1587/3191
debug1: ssh_rsa_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue:
publickey,password,keyboard-interacti
ve
debug1: next auth method to try is publickey
debug1: try pubkey: /home/bshuler/.ssh/id_rsa
debug1: authentications that can continue:
publickey,password,keyboard-interacti
ve
debug1: try pubkey: /home/bshuler/.ssh/id_dsa
debug1: input_userauth_pk_ok: pkalg ssh-dss blen 434 lastkey 0x100b4ad0 hint
2
debug1: read PEM private key done: type DSA
debug1: ssh-userauth2 successful: method publickey
debug1: channel 0: new [client-session]
debug1: send channel open 0
debug1: Entering interactive session.
debug1: ssh_session2_setup: id 0
debug1: channel request 0: pty-req
debug1: channel request 0: shell
debug1: fd 3 setting TCP_NODELAY
debug1: channel 0: open confirm rwindow 0 rmax 32768
Environment:
  USER=bshuler
  LOGNAME=bshuler
  HOME=/home/bshuler
  PATH=/usr/local/bin:/bin:/usr/bin
  MAIL=/var/mail/bshuler
  SHELL=/bin/bash
  SSH_CLIENT=139.76.64.29 30972 22
  SSH_TTY=/dev/pts/5
  TERM=cygwin



Then I did a set to see if sshd had exported a display for me... it did not:


[bshuler@localhost bshuler]$ set
BASH=/bin/bash
BASH_VERSINFO=([0]="2" [1]="05b" [2]="0" [3]="1" [4]="release"
[5]="i686-pc-linu
x-gnu")
BASH_VERSION='2.05b.0(1)-release'
COLORS=/etc/DIR_COLORS
COLUMNS=80
DIRSTACK=()
EUID=500
GROUPS=()
G_BROKEN_FILENAMES=1
HISTFILE=/home/bshuler/.bash_history
HISTFILESIZE=1000
HISTSIZE=1000
HOME=/home/bshuler
HOSTNAME=localhost.localdomain
HOSTTYPE=i686
IFS=$' \t\n'
INPUTRC=/etc/inputrc
LANG=c
LESSOPEN='|/usr/bin/lesspipe.sh %s'
LINES=25
LOGNAME=bshuler
LS_COLORS=
MACHTYPE=i686-pc-linux-gnu
MAIL=/var/spool/mail/bshuler
MAILCHECK=60
OPTERR=1
OPTIND=1
OSTYPE=linux-gnu
PATH=/usr/local/bin:/bin:/usr/bin:/usr/X11R6/bin:/home/bshuler/bin
PIPESTATUS=([0]="0")
PPID=23473
PS1='[\u@\h \W]\$ '
PS2='> '
PS4='+ '
PWD=/home/bshuler
SHELL=/bin/bash
SHELLOPTS=braceexpand:emacs:hashall:histexpand:history:interactive-comments:
moni
tor
SHLVL=1
SSH_CLIENT='139.76.64.29 30972 22'
SSH_TTY=/dev/pts/5
SUPPORTED=en_US.UTF-8:en_US:en
TERM=cygwin
UID=500
USER=bshuler
_=USERNAME
langfile=/home/bshuler/.i18n
[bshuler@localhost bshuler]$



Here is the log from the server:
[root@localhost root]# sshd -d
debug1: sshd version OpenSSH_3.4p1
debug1: private host key: #0 type 0 RSA1
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
socket: Address family not supported by protocol
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from 139.76.64.29 port 30972
debug1: Client protocol version 2.0; client software version OpenSSH_3.4p1
debug1: match: OpenSSH_3.4p1 pat OpenSSH*
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-1.99-OpenSSH_3.4p1
debug1: list_hostkey_types: ssh-rsa,ssh-dss
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug1: dh_gen_key: priv key bits set: 127/256
debug1: bits set: 1587/3191
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug1: bits set: 1576/3191
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug1: userauth-request for user bshuler service ssh-connection method none
debug1: attempt 0 failures 0
debug1: Starting up PAM with username "bshuler"
debug1: PAM setting rhost to "connectandcreate2.bls.com"
Failed none for bshuler from 139.76.64.29 port 30972 ssh2
Failed none for bshuler from 139.76.64.29 port 30972 ssh2
debug1: userauth-request for user bshuler service ssh-connection method
publickey
debug1: attempt 1 failures 1
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 500/500 (e=0)
debug1: trying public key file /home/bshuler/.ssh/authorized_keys
debug1: restore_uid
debug1: temporarily_use_uid: 500/500 (e=0)
debug1: trying public key file /home/bshuler/.ssh/authorized_keys
debug1: restore_uid
Failed publickey for bshuler from 139.76.64.29 port 30972 ssh2
debug1: userauth-request for user bshuler service ssh-connection method
publickey
debug1: attempt 2 failures 2
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 500/500 (e=0)
debug1: trying public key file /home/bshuler/.ssh/authorized_keys
debug1: matching key found: file /home/bshuler/.ssh/authorized_keys, line 2
Found matching DSA key: 63:ce:5d:1f:21:0f:ef:c1:4c:65:9b:e9:83:dc:23:3b
debug1: restore_uid
Postponed publickey for bshuler from 139.76.64.29 port 30972 ssh2
debug1: userauth-request for user bshuler service ssh-connection method
publickey
debug1: attempt 3 failures 2
debug1: temporarily_use_uid: 500/500 (e=0)
debug1: trying public key file /home/bshuler/.ssh/authorized_keys
debug1: matching key found: file /home/bshuler/.ssh/authorized_keys, line 2
Found matching DSA key: 63:ce:5d:1f:21:0f:ef:c1:4c:65:9b:e9:83:dc:23:3b
debug1: restore_uid
debug1: ssh_dss_verify: signature correct
Accepted publickey for bshuler from 139.76.64.29 port 30972 ssh2
debug1: monitor_child_preauth: bshuler has been authenticated by privileged
process
Accepted publickey for bshuler from 139.76.64.29 port 30972 ssh2
debug1: PAM establishing creds
debug1: newkeys: mode 0
debug1: newkeys: mode 1
debug1: Entering interactive session for SSH2.
debug1: fd 7 setting O_NONBLOCK
debug1: fd 8 setting O_NONBLOCK
debug1: server_init_dispatch_20
debug1: server_input_channel_open: ctype session rchan 0 win 65536 max 16384
debug1: input_session_request
debug1: channel 0: new [server-session]
debug1: session_new: init
debug1: session_new: session 0
debug1: session_open: channel 0
debug1: session_open: session 0: link with channel 0
debug1: server_input_channel_open: confirm session
debug1: server_input_channel_req: channel 0 request pty-req reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req pty-req
debug1: lastlog_openseek: Couldn't open /var/log/lastlog: Permission denied
debug1: Allocating pty.
debug1: session_new: init
debug1: session_new: session 0
debug1: session_pty_req: session 0 alloc /dev/pts/5
debug1: server_input_channel_req: channel 0 request shell reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req shell
debug1: PAM setting tty to "/dev/pts/5"
debug1: PAM establishing creds
debug1: fd 4 setting TCP_NODELAY
debug1: channel 0: rfd 10 isatty
debug1: fd 10 setting O_NONBLOCK
debug1: Setting controlling tty using TIOCSCTTY.
debug1: Received SIGCHLD.
debug1: session_by_pid: pid 23474
debug1: session_exit_message: session 0 channel 0 pid 23474
debug1: channel request 0: exit-status
debug1: session_exit_message: release channel 0
debug1: channel 0: write failed
debug1: channel 0: close_write
debug1: channel 0: output open -> closed
debug1: session_close: session 0 pid 23474
debug1: channel 0: read<=0 rfd 10 len -1
debug1: channel 0: read failed
debug1: channel 0: close_read
debug1: channel 0: input open -> drain
debug1: channel 0: ibuf empty
debug1: channel 0: send eof
debug1: channel 0: input drain -> closed
debug1: channel 0: send close
debug1: session_by_tty: session 0 tty /dev/pts/5
debug1: session_pty_cleanup: session 0 release /dev/pts/5
debug1: channel 0: rcvd close
debug1: channel 0: is dead
debug1: channel 0: garbage collecting
debug1: channel_free: channel 0: server-session, nchannels 1
Connection closed by remote host.
debug1: krb5_cleanup_proc called
Closing connection to 139.76.64.29
[root@localhost root]# 


Any ideas?

-----Original Message-----
From: Bret Hughes [mailto:bhughes@;elevating.com]
Sent: Wednesday, November 13, 2002 2:12 PM
To: [EMAIL PROTECTED]
Subject: Re: rh 8.0 sshd will not fw x11


On Wed, 2002-11-13 at 12:45, Shuler, Bert wrote:
> I have installed rh 8.0 and sshd will not allow me to fw x11.
> in /etc/hosts.allow I have ALL:ALL
> I have also tried ALL:IP where IP is the ip of the client ssh
> 
> nothing seems to work...
> also, in the sshd_config file I have:
> X11Forwarding yes
> X11DisplayOffset 10
> 
> Am i missing something?
> 

What errors/symptoms are you getting?  from an ealrier post it looks
like you are using secureCRT.  is there an X server on the client to
connect to?

Bret



-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@;redhat.com?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list


*****
"The information transmitted is intended only for the person or entity to
which it is addressed and may contain confidential, proprietary, and/or
privileged material. Any review, retransmission, dissemination or other use
of, or taking of any action in reliance upon, this information by persons or
entities other than the intended recipient is prohibited. If you received
this in error, please contact the sender and delete the material from all
computers."



-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@;redhat.com?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to