On Sun, Sep 17, 2006 at 09:39:51PM +0100, Konstantinos Pachopoulos wrote: > Hi, > i cannot ssh forward, through my "ipcop" guest > (10.0.0.6/24). In the host system i have made it > "visible" via "ip addr add 10.0.0.6/24 broadcast + dev > eth0". > > Here's what i get when i try to run firestarter or > nedit or xterm for example: > > -------------------- > ipcop:~# firestarter > X11 connection rejected because of wrong > authentication. > The application 'firestarter' lost its connection to > the display localhost:10.0; > most likely the X server was shut down or you > killed/destroyed > the application. > ipcop:~# nedit > X11 connection rejected because of wrong > authentication. > X connection to localhost:10.0 broken (explicit kill > or server shutdown). > -------------------- > > Here's the /etc/ssh/sshd_config of the "ipcop" server: > -------------------- > # Package generated configuration file > # See the sshd(8) manpage for details > > # What ports, IPs and protocols we listen for > Port 22 > # Use these options to restrict which > interfaces/protocols sshd will bind to > #ListenAddress :: > #ListenAddress 0.0.0.0 > Protocol 2 > # HostKeys for protocol version 2 > HostKey /etc/ssh/ssh_host_rsa_key > HostKey /etc/ssh/ssh_host_dsa_key > #Privilege Separation is turned on for security > UsePrivilegeSeparation yes > > # Lifetime and size of ephemeral version 1 server key > KeyRegenerationInterval 3600 > ServerKeyBits 768 > > # Logging > SyslogFacility AUTH > LogLevel INFO > > # Authentication: > LoginGraceTime 600 > PermitRootLogin yes > StrictModes yes > > RSAAuthentication yes > PubkeyAuthentication yes > #AuthorizedKeysFile %h/.ssh/authorized_keys > > # Don't read the user's ~/.rhosts and ~/.shosts files > IgnoreRhosts yes > # For this to work you will also need host keys in > /etc/ssh_known_hosts > RhostsRSAAuthentication no > # similar for protocol version 2 > HostbasedAuthentication no > # Uncomment if you don't trust ~/.ssh/known_hosts for > RhostsRSAAuthentication > #IgnoreUserKnownHosts yes > > # To enable empty passwords, change to yes (NOT > RECOMMENDED) > PermitEmptyPasswords no > > # Change to no to disable s/key passwords > #ChallengeResponseAuthentication yes > > # Change to yes to enable tunnelled clear text > passwords > PasswordAuthentication no > > # To change Kerberos options > #KerberosAuthentication no > #KerberosOrLocalPasswd yes > #AFSTokenPassing no > #KerberosTicketCleanup no > > # Kerberos TGT Passing does only work with the AFS > kaserver > #KerberosTgtPassing yes > > X11Forwarding yes > X11DisplayOffset 10 > PrintMotd no > PrintLastLog yes > KeepAlive yes > #UseLogin no > > #MaxStartups 10:30:60 > #Banner /etc/issue.net > > Subsystem sftp /usr/lib/sftp-server > > UsePAM yes > X11UseLocalhost no #tried with as suggested and > without > -------------------- > > Any ideas? I have been searching for a couple days, > but found nothing. Is this a routing, firewall issue > maybe? I do not know a lot about networking. I hope i > will learn through VServer :)
check if $DISPLAY is set and what it contains, also double check that your guest has mk/xauth installed and the ssh client is not called with -x (maybe explicitely specify -X for a test) check the ssh logon with the -v option to ssh, HTH, Herbert > Thanks > > > ___________________________________________________________ > The all-new Yahoo! Mail goes wherever you go - free your email address from > your Internet provider. http://uk.docs.yahoo.com/nowyoucan.html > _______________________________________________ > Vserver mailing list > Vserver@list.linux-vserver.org > http://list.linux-vserver.org/mailman/listinfo/vserver _______________________________________________ Vserver mailing list Vserver@list.linux-vserver.org http://list.linux-vserver.org/mailman/listinfo/vserver