On Wed, 12 Sep 2018 14:03:17 +0200
Solene Rapenne <sol...@perso.pw> wrote:


| > | Brett Mahar <br...@coiloptic.org> wrote:
| > 
| > | > I recently updated my amd-64-current machine to the Sept 7th snapshot 
(previous snapshot was July 17th).
| > | > 
| > | > Prior to update both firefox and iridium browsers were able to be run 
using 'ssh -Y' as another user on the same machine. Now they do not run - 
firefox never finishes launching and iridium has a popup windown that says 
'page unresponsive'.


| 
| do you have X11Forwarding yes in your sshd_config?
| 
| If so, can you check output if you add -v to ssh command line, lines related 
to
| x11?

Hi Solene,

Yes I have X11Forwarding yes

I added -v to the ssh command, output is below, the only line that stands out 
is:

debug1: confirm x11
[11321:1527161448:0913/074849.948275:ERROR:process_metrics_openbsd.cc(164)] Not 
implemented reached in bool base::GetSystemMemoryInfo(base::SystemMemoryInfoKB 
*)

If I use a similar command with Links browser, it still works as normal:
$ ssh -v -Y -i /home/brett/.ssh/rmit_id rmit@127.0.0.1 links -g &
So maybe it is by coiincidence that the behaviour of Firefox, Chrome, and 
Iridium has altered in the last month or so?

Brett.


=======================================================================================================

Full output using Iridium browser:

[1] 11492
 $ OpenSSH_7.8, LibreSSL 2.8.0
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Connecting to 127.0.0.1 [127.0.0.1] port 22.
debug1: Connection established.
debug1: identity file /home/brett/.ssh/rmit_id type 0
debug1: identity file /home/brett/.ssh/rmit_id-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_7.8
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.8
debug1: match: OpenSSH_7.8 pat OpenSSH* compat 0x04000000
debug1: Authenticating to 127.0.0.1:22 as 'rmit'
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1...@openssh.com MAC: 
<implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1...@openssh.com MAC: 
<implicit> compression: none
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: Server host key: ecdsa-sha2-nistp256 
SHA256:qJEIrukQMIjqA8LT8vyaXBG56JZMZ8hjU62BRZ1yJYc
debug1: Host '127.0.0.1' is known and matches the ECDSA host key.
debug1: Found key in /home/brett/.ssh/known_hosts:2
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: 
server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey
debug1: Next authentication method: publickey
debug1: Offering public key: ECDSA 
SHA256:TKDpw9aM8mq+fskjBc2G+wEYDasolxkCYwe0f6hDpX0 /home/brett/.ssh/id_ecdsa
debug1: Authentications that can continue: publickey
debug1: Offering public key: RSA 
SHA256:yKz+QK3wcQoNs/Bkx14V/WEnZ6QQ5WSMdpDQ/Itqcy4 /home/brett/.ssh/rmit_id
debug1: Server accepts key: pkalg rsa-sha2-512 blen 279
debug1: Authentication succeeded (publickey).
Authenticated to 127.0.0.1 ([127.0.0.1]:22).
debug1: channel 0: new [client-session]
debug1: Requesting no-more-sessi...@openssh.com
debug1: Entering interactive session.
debug1: pledge: exec
debug1: client_input_global_request: rtype hostkeys...@openssh.com want_reply 0
debug1: Remote: /home/rmit/.ssh/authorized_keys:1: key options: 
agent-forwarding port-forwarding pty user-rc x11-forwarding
debug1: Remote: /home/rmit/.ssh/authorized_keys:1: key options: 
agent-forwarding port-forwarding pty user-rc x11-forwarding
debug1: Requesting X11 forwarding with authentication spoofing.
debug1: Sending command: iridium
debug1: client_input_channel_open: ctype x11 rchan 3 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 4649
debug1: channel 1: new [x11]
debug1: confirm x11
debug1: client_input_channel_open: ctype x11 rchan 4 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 5579
debug1: channel 2: new [x11]
debug1: confirm x11
[11321:1527161448:0913/074849.948275:ERROR:process_metrics_openbsd.cc(164)] Not 
implemented reached in bool base::GetSystemMemoryInfo(base::SystemMemoryInfoKB 
*)
debug1: client_input_channel_open: ctype x11 rchan 5 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 12975
debug1: channel 3: new [x11]
debug1: confirm x11
debug1: client_input_channel_open: ctype x11 rchan 6 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 18494
debug1: channel 4: new [x11]
debug1: confirm x11
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 20403
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 33893
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 31712
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 24089
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 2375
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 40603
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 22604
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 3408
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
*** autoupdate was enabled, overriding with false
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 20899
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 43234
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 40010
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 15836
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 23694
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 32930
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: client_input_channel_open: ctype x11 rchan 8 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 12858
debug1: channel 6: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 7
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 41647
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 6: FORCE input drain
debug1: channel 6: free: x11, nchannels 7
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 26898
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 3238
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 18693
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 40890
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 6140
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: client_input_channel_open: ctype x11 rchan 8 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 20612
debug1: channel 6: new [x11]
debug1: confirm x11
debug1: channel 5: free: x11, nchannels 7
debug1: channel 6: FORCE input drain
debug1: channel 6: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 12037
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 2987
debug1: channel 5: new [x11]
debug1: confirm x11
debug1: channel 5: FORCE input drain
debug1: channel 5: free: x11, nchannels 6
debug1: channel 3: FORCE input drain
debug1: channel 4: FORCE input drain
debug1: channel 3: free: x11, nchannels 5
debug1: channel 4: free: x11, nchannels 4
debug1: channel 1: FORCE input drain
debug1: channel 2: FORCE input drain
debug1: channel 1: free: x11, nchannels 3
debug1: channel 2: free: x11, nchannels 2

Then on exit:

debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
debug1: client_input_channel_req: channel 0 rtype e...@openssh.com reply 0
debug1: channel 0: free: client-session, nchannels 1
Transferred: sent 368556, received 481360 bytes, in 159.9 seconds
Bytes per second: sent 2305.2, received 3010.7
debug1: Exit status 0

=======================================================================================================
Command that works (using Links browser in graphical mode):

 $ ssh -v -Y -i /home/brett/.ssh/rmit_id rmit@127.0.0.1 links -g &    
[2] 79988
 $ OpenSSH_7.8, LibreSSL 2.8.0
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Connecting to 127.0.0.1 [127.0.0.1] port 22.
debug1: Connection established.
debug1: identity file /home/brett/.ssh/rmit_id type 0
debug1: identity file /home/brett/.ssh/rmit_id-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_7.8
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.8
debug1: match: OpenSSH_7.8 pat OpenSSH* compat 0x04000000
debug1: Authenticating to 127.0.0.1:22 as 'rmit'
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1...@openssh.com MAC: 
<implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1...@openssh.com MAC: 
<implicit> compression: none
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: Server host key: ecdsa-sha2-nistp256 
SHA256:qJEIrukQMIjqA8LT8vyaXBG56JZMZ8hjU62BRZ1yJYc
debug1: Host '127.0.0.1' is known and matches the ECDSA host key.
debug1: Found key in /home/brett/.ssh/known_hosts:2
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: 
server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey
debug1: Next authentication method: publickey
debug1: Offering public key: ECDSA 
SHA256:TKDpw9aM8mq+fskjBc2G+wEYDasolxkCYwe0f6hDpX0 /home/brett/.ssh/id_ecdsa
debug1: Authentications that can continue: publickey
debug1: Offering public key: RSA 
SHA256:yKz+QK3wcQoNs/Bkx14V/WEnZ6QQ5WSMdpDQ/Itqcy4 /home/brett/.ssh/rmit_id
debug1: Server accepts key: pkalg rsa-sha2-512 blen 279
debug1: Authentication succeeded (publickey).
Authenticated to 127.0.0.1 ([127.0.0.1]:22).
debug1: channel 0: new [client-session]
debug1: Requesting no-more-sessi...@openssh.com
debug1: Entering interactive session.
debug1: pledge: exec
debug1: client_input_global_request: rtype hostkeys...@openssh.com want_reply 0
debug1: Remote: /home/rmit/.ssh/authorized_keys:1: key options: 
agent-forwarding port-forwarding pty user-rc x11-forwarding
debug1: Remote: /home/rmit/.ssh/authorized_keys:1: key options: 
agent-forwarding port-forwarding pty user-rc x11-forwarding
debug1: Requesting X11 forwarding with authentication spoofing.
debug1: Sending command: links -g
debug1: client_input_channel_open: ctype x11 rchan 3 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1 41437
debug1: channel 1: new [x11]
debug1: confirm x11


=======================================================================================================

Reply via email to