On Tue, Nov 13, 2007 at 09:02:41AM -0300, Terry Laundos wrote:
> Do you have another clients work fine?
No, none of the clients will login.
That, along with the fact I can log into the client and run "startx"
w/o problems makes me think this is a server-side problem.
I can also run startx, and then in an xterm run
ssh -X [EMAIL PROTECTED]
and then run, say, xclock on my client display. How can I replicate
the process that the client uses to start the remote X session from
the command line on the client?
Again, I want to note that lts.conf has my old iMac clients set
to do:
LDM_DIRECTX = True
which IIRC say to not use ssh for the X connection.
I've got syslogd running and the server only shows this ("dell" is the
client I'm logging in with):
[boot messages]
Nov 13 06:10:59 dell /usr/bin/ltspfsd[3550]: Program started
Nov 13 06:10:59 ltsps0 ldminfod[6218]: connect from 192.168.0.250
(192.168.0.250)
Nov 13 06:11:07 dell kernel: [ 32.732305] eth0: no IPv6 routers present
Nov 13 06:11:25 ltsps0 ldminfod[6267]: connect from 192.168.0.250
(192.168.0.250)
> Have you enable X11Forwarding on sshd config?
X11Forwarding is set to "yes" in sshd_config.
I've got LogLevel set to DEBUG and I see the login:
Nov 13 06:11:24 ltsps0 sshd[6224]: Accepted password for moseley from
192.168.0.250 port 44036 ssh2
and:
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 1: new [X11 inet listener]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 2: new [X11 inet listener]
But, what I'm not sure about is I'm getting a SIGCHLD:
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: Received SIGCHLD.
If I ssh to the server from a console on the client I don't see this
SIGCHLD.
Here's the full ssh logs from the time of entering my password until
ldm shows the login prompt again:
Nov 13 06:11:24 ltsps0 sshd[6224]: debug1: PAM: password authentication
accepted for moseley
Nov 13 06:11:24 ltsps0 sshd[6224]: debug1: do_pam_account: called
Nov 13 06:11:24 ltsps0 sshd[6224]: Accepted password for moseley from
192.168.0.250 port 44036 ssh2
Nov 13 06:11:24 ltsps0 sshd[6224]: debug1: monitor_child_preauth: moseley has
been authenticated by privileged process
Nov 13 06:11:24 ltsps0 sshd[6226]: pam_unix(ssh:session): session opened for
user moseley by (uid=0)
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: PAM: reinitializing credentials
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: permanently_set_uid: 1000/1000
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: SELinux support disabled
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: Entering interactive session for
SSH2.
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_init_dispatch_20
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_open: ctype
session rchan 0 win 65536 max 16384
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: input_session_request
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 0: new [server-session]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_new: init
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_new: session 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_open: channel 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_open: session 0: link with
channel 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_open: confirm
session
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_req: channel 0
request x11-req reply 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 0
channel 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_input_channel_req: session 0
req x11-req
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 1: new [X11 inet listener]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 2: new [X11 inet listener]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_req: channel 0
request pty-req reply 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 0
channel 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_input_channel_req: session 0
req pty-req
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: Allocating pty.
Nov 13 06:11:24 ltsps0 sshd[6224]: debug1: session_new: init
Nov 13 06:11:24 ltsps0 sshd[6224]: debug1: session_new: session 0
Nov 13 06:11:24 ltsps0 sshd[6224]: debug1: SELinux support disabled
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_pty_req: session 0 alloc
/dev/pts/2
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_req: channel 0
request env reply 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 0
channel 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_input_channel_req: session 0
req env
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_req: channel 0
request exec reply 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 0
channel 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_input_channel_req: session 0
req exec
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: PAM: setting PAM_TTY to "/dev/pts/2"
Nov 13 06:11:24 ltsps0 sshd[6227]: debug1: Setting controlling tty using
TIOCSCTTY.
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_open: ctype
session rchan 1 win 131072 max 32768
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: input_session_request
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 3: new [server-session]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_new: session 1
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_open: channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_open: session 1: link with
channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_open: confirm
session
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_req: channel 3
request exec reply 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 1
channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_input_channel_req: session 1
req exec
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: X11 connection requested.
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 4: new [X11 connection from
127.0.0.1 port 36579]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 4: free: X11 connection from
127.0.0.1 port 36579, nchannels 5
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: Received SIGCHLD.
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_pid: pid 6231
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_exit_message: session 1
channel 3 pid 6231
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_exit_message: release
channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 1
channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_close_by_channel: channel 3
child 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_close: session 1 pid 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 3: free: server-session,
nchannels 4
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_open: ctype
session rchan 1 win 131072 max 32768
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: input_session_request
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 3: new [server-session]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_new: session 1
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_open: channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_open: session 1: link with
channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_open: confirm
session
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_req: channel 3
request x11-req reply 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 1
channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_input_channel_req: session 1
req x11-req
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 4: new [X11 inet listener]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 5: new [X11 inet listener]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_req: channel 3
request exec reply 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 1
channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_input_channel_req: session 1
req exec
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: X11 connection requested.
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 6: new [X11 connection from
127.0.0.1 port 40475]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 6: free: X11 connection from
127.0.0.1 port 40475, nchannels 7
Nov 13 06:11:25 ltsps0 sshd[6226]: debug1: X11 connection requested.
Nov 13 06:11:25 ltsps0 sshd[6226]: debug1: channel 6: new [X11 connection from
127.0.0.1 port 40476]
Nov 13 06:11:25 ltsps0 sshd[6226]: debug1: channel 6: free: X11 connection from
127.0.0.1 port 40476, nchannels 7
Nov 13 06:11:25 ltsps0 sshd[6224]: debug1: do_cleanup
Nov 13 06:11:25 ltsps0 sshd[6224]: debug1: PAM: cleanup
Nov 13 06:11:25 ltsps0 sshd[6224]: debug1: session_pty_cleanup: session 0
release /dev/pts/2
--
Bill Moseley
[EMAIL PROTECTED]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_____________________________________________________________________
Ltsp-discuss mailing list. To un-subscribe, or change prefs, goto:
https://lists.sourceforge.net/lists/listinfo/ltsp-discuss
For additional LTSP help, try #ltsp channel on irc.freenode.net