On Tue, Nov 13, 2007 at 09:02:41AM -0300, Terry Laundos wrote:
> Do you have another clients work fine?

No, none of the clients will login.

That, along with the fact I can log into the client and run "startx"
w/o problems makes me think this is a server-side problem.

I can also run startx, and then in an xterm run

    ssh -X [EMAIL PROTECTED]

and then run, say, xclock on my client display.  How can I replicate
the process that the client uses to start the remote X session from
the command line on the client?

Again, I want to note that lts.conf has my old iMac clients set
to do:

    LDM_DIRECTX            = True

which IIRC say to not use ssh for the X connection.


I've got syslogd running and the server only shows this ("dell" is the
client I'm logging in with):

[boot messages]
Nov 13 06:10:59 dell /usr/bin/ltspfsd[3550]: Program started  
Nov 13 06:10:59 ltsps0 ldminfod[6218]: connect from 192.168.0.250 
(192.168.0.250)
Nov 13 06:11:07 dell kernel: [   32.732305] eth0: no IPv6 routers present 
Nov 13 06:11:25 ltsps0 ldminfod[6267]: connect from 192.168.0.250 
(192.168.0.250)

> Have you enable X11Forwarding on sshd config?

X11Forwarding is set to "yes" in sshd_config.

I've got LogLevel set to DEBUG and I see the login:


Nov 13 06:11:24 ltsps0 sshd[6224]: Accepted password for moseley from 
192.168.0.250 port 44036 ssh2

and:

Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 1: new [X11 inet listener]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 2: new [X11 inet listener]


But, what I'm not sure about is I'm getting a SIGCHLD:

Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: Received SIGCHLD.

If I ssh to the server from a console on the client I don't see this
SIGCHLD.




Here's the full ssh logs from the time of entering my password until
ldm shows the login prompt again:

Nov 13 06:11:24 ltsps0 sshd[6224]: debug1: PAM: password authentication 
accepted for moseley
Nov 13 06:11:24 ltsps0 sshd[6224]: debug1: do_pam_account: called
Nov 13 06:11:24 ltsps0 sshd[6224]: Accepted password for moseley from 
192.168.0.250 port 44036 ssh2
Nov 13 06:11:24 ltsps0 sshd[6224]: debug1: monitor_child_preauth: moseley has 
been authenticated by privileged process
Nov 13 06:11:24 ltsps0 sshd[6226]: pam_unix(ssh:session): session opened for 
user moseley by (uid=0)
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: PAM: reinitializing credentials
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: permanently_set_uid: 1000/1000
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: SELinux support disabled
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: Entering interactive session for 
SSH2.
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_init_dispatch_20
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_open: ctype 
session rchan 0 win 65536 max 16384
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: input_session_request
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 0: new [server-session]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_new: init
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_new: session 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_open: channel 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_open: session 0: link with 
channel 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_open: confirm 
session
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_req: channel 0 
request x11-req reply 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 0 
channel 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_input_channel_req: session 0 
req x11-req
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 1: new [X11 inet listener]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 2: new [X11 inet listener]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_req: channel 0 
request pty-req reply 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 0 
channel 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_input_channel_req: session 0 
req pty-req
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: Allocating pty.
Nov 13 06:11:24 ltsps0 sshd[6224]: debug1: session_new: init
Nov 13 06:11:24 ltsps0 sshd[6224]: debug1: session_new: session 0
Nov 13 06:11:24 ltsps0 sshd[6224]: debug1: SELinux support disabled
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_pty_req: session 0 alloc 
/dev/pts/2
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_req: channel 0 
request env reply 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 0 
channel 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_input_channel_req: session 0 
req env
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_req: channel 0 
request exec reply 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 0 
channel 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_input_channel_req: session 0 
req exec
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: PAM: setting PAM_TTY to "/dev/pts/2"
Nov 13 06:11:24 ltsps0 sshd[6227]: debug1: Setting controlling tty using 
TIOCSCTTY.
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_open: ctype 
session rchan 1 win 131072 max 32768
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: input_session_request
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 3: new [server-session]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_new: session 1
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_open: channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_open: session 1: link with 
channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_open: confirm 
session
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_req: channel 3 
request exec reply 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 1 
channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_input_channel_req: session 1 
req exec
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: X11 connection requested.
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 4: new [X11 connection from 
127.0.0.1 port 36579]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 4: free: X11 connection from 
127.0.0.1 port 36579, nchannels 5
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: Received SIGCHLD.
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_pid: pid 6231
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_exit_message: session 1 
channel 3 pid 6231
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_exit_message: release 
channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 1 
channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_close_by_channel: channel 3 
child 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_close: session 1 pid 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 3: free: server-session, 
nchannels 4
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_open: ctype 
session rchan 1 win 131072 max 32768
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: input_session_request
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 3: new [server-session]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_new: session 1
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_open: channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_open: session 1: link with 
channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_open: confirm 
session
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_req: channel 3 
request x11-req reply 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 1 
channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_input_channel_req: session 1 
req x11-req
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 4: new [X11 inet listener]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 5: new [X11 inet listener]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: server_input_channel_req: channel 3 
request exec reply 0
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_by_channel: session 1 
channel 3
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: session_input_channel_req: session 1 
req exec
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: X11 connection requested.
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 6: new [X11 connection from 
127.0.0.1 port 40475]
Nov 13 06:11:24 ltsps0 sshd[6226]: debug1: channel 6: free: X11 connection from 
127.0.0.1 port 40475, nchannels 7
Nov 13 06:11:25 ltsps0 sshd[6226]: debug1: X11 connection requested.
Nov 13 06:11:25 ltsps0 sshd[6226]: debug1: channel 6: new [X11 connection from 
127.0.0.1 port 40476]
Nov 13 06:11:25 ltsps0 sshd[6226]: debug1: channel 6: free: X11 connection from 
127.0.0.1 port 40476, nchannels 7
Nov 13 06:11:25 ltsps0 sshd[6224]: debug1: do_cleanup
Nov 13 06:11:25 ltsps0 sshd[6224]: debug1: PAM: cleanup
Nov 13 06:11:25 ltsps0 sshd[6224]: debug1: session_pty_cleanup: session 0 
release /dev/pts/2


-- 
Bill Moseley
[EMAIL PROTECTED]


-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_____________________________________________________________________
Ltsp-discuss mailing list.   To un-subscribe, or change prefs, goto:
      https://lists.sourceforge.net/lists/listinfo/ltsp-discuss
For additional LTSP help,   try #ltsp channel on irc.freenode.net

Reply via email to