Bugzilla – Attachment 617 Details for
Bug 851
some X11 prgs generate ``BadAtom (invalid Atom parameter)'' in X_GetProperty when using X11 forwarding
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
``ssh -Xvvv'' login to local machine (openssh-3.8.1p1) starting nedit -> BadMatch X error
openssh-3.8.1p1-bug851 (text/plain), 10.52 KB, created by
Niki W. Waibel
on 2004-04-22 22:53:11 AEST
(
hide
)
Description:
``ssh -Xvvv'' login to local machine (openssh-3.8.1p1) starting nedit -> BadMatch X error
Filename:
MIME Type:
Creator:
Niki W. Waibel
Created:
2004-04-22 22:53:11 AEST
Size:
10.52 KB
patch
obsolete
>nwaibel@blade100-2 ~ $ ssh -Xvvv blade100-2 >OpenSSH_3.8.1p1, OpenSSL 0.9.7d 17 Mar 2004 >debug1: Reading configuration data /home/nwaibel/.ssh/config >debug1: Reading configuration data /opt/newlogic/opt/openssh/3.8.1p1/etc/ssh_config >debug1: Applying options for * >debug3: cipher ok: aes256-cbc [aes256-cbc] >debug3: ciphers ok: [aes256-cbc] >debug2: ssh_connect: needpriv 0 >debug1: Connecting to blade100-2 [172.27.120.2] port 22. >debug1: Connection established. >debug3: Not a RSA1 key file /home/nwaibel/.ssh/id_dsa. >debug2: key_type_from_name: unknown key type '-----BEGIN' >debug3: key_read: missing keytype >debug2: key_type_from_name: unknown key type 'Proc-Type:' >debug3: key_read: missing keytype >debug2: key_type_from_name: unknown key type 'DEK-Info:' >debug3: key_read: missing keytype >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug3: key_read: missing whitespace >debug2: key_type_from_name: unknown key type '-----END' >debug3: key_read: missing keytype >debug1: identity file /home/nwaibel/.ssh/id_dsa type 2 >debug1: Remote protocol version 2.0, remote software version OpenSSH_3.8.1p1 >debug1: match: OpenSSH_3.8.1p1 pat OpenSSH* >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 >debug1: SSH2_MSG_KEXINIT sent >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes256-cbc >debug2: kex_parse_kexinit: aes256-cbc >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-dss >debug2: kex_parse_kexinit: aes256-cbc >debug2: kex_parse_kexinit: aes256-cbc >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_init: found hmac-md5 >debug1: kex: server->client aes256-cbc hmac-md5 none >debug2: mac_init: found hmac-md5 >debug1: kex: client->server aes256-cbc hmac-md5 none >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<4096<8192) sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP >debug2: dh_gen_key: priv key bits set: 259/512 >debug2: bits set: 2072/4096 >debug1: SSH2_MSG_KEX_DH_GEX_INIT sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY >debug3: check_host_in_hostfile: filename /home/nwaibel/.ssh/known_hosts >debug3: check_host_in_hostfile: match line 71 >debug3: check_host_in_hostfile: filename /home/nwaibel/.ssh/known_hosts >debug3: check_host_in_hostfile: match line 67 >debug1: Host 'blade100-2' is known and matches the DSA host key. >debug1: Found key in /home/nwaibel/.ssh/known_hosts:71 >debug2: bits set: 2025/4096 >debug1: ssh_dss_verify: signature correct >debug2: kex_derive_keys >debug2: set_newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: expecting SSH2_MSG_NEWKEYS >debug2: set_newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: SSH2_MSG_SERVICE_REQUEST sent >debug2: service_accept: ssh-userauth >debug1: SSH2_MSG_SERVICE_ACCEPT received >debug2: key: /home/nwaibel/.ssh/id_dsa (684a8) >debug1: Authentications that can continue: publickey >debug3: start over, passed a different list publickey >debug3: preferred publickey,keyboard-interactive >debug3: authmethod_lookup publickey >debug3: remaining preferred: keyboard-interactive >debug3: authmethod_is_enabled publickey >debug1: Next authentication method: publickey >debug1: Offering public key: /home/nwaibel/.ssh/id_dsa >debug3: send_pubkey_test >debug2: we sent a publickey packet, wait for reply >debug1: Server accepts key: pkalg ssh-dss blen 1586 >debug2: input_userauth_pk_ok: fp 37:b2:bf:79:12:a8:5f:8a:e6:6d:32:e0:9f:f2:c7:2b >debug3: sign_and_send_pubkey >debug1: PEM_read_PrivateKey failed >debug1: read PEM private key done: type <unknown> >Enter passphrase for key '/home/nwaibel/.ssh/id_dsa': >debug1: read PEM private key done: type DSA >debug1: Authentication succeeded (publickey). >debug1: channel 0: new [client-session] >debug3: ssh_session2_open: channel_new: 0 >debug2: channel 0: send open >debug1: Entering interactive session. >debug2: callback start >debug2: ssh_session2_setup: id 0 >debug2: channel 0: request pty-req >debug3: tty_make_modes: ospeed 9600 >debug3: tty_make_modes: ispeed 0 >debug3: tty_make_modes: 1 3 >debug3: tty_make_modes: 2 28 >debug3: tty_make_modes: 3 8 >debug3: tty_make_modes: 4 21 >debug3: tty_make_modes: 5 4 >debug3: tty_make_modes: 6 0 >debug3: tty_make_modes: 7 0 >debug3: tty_make_modes: 8 17 >debug3: tty_make_modes: 9 19 >debug3: tty_make_modes: 10 26 >debug3: tty_make_modes: 11 25 >debug3: tty_make_modes: 12 18 >debug3: tty_make_modes: 13 23 >debug3: tty_make_modes: 14 22 >debug3: tty_make_modes: 16 0 >debug3: tty_make_modes: 18 15 >debug3: tty_make_modes: 30 0 >debug3: tty_make_modes: 31 0 >debug3: tty_make_modes: 32 0 >debug3: tty_make_modes: 33 0 >debug3: tty_make_modes: 34 0 >debug3: tty_make_modes: 35 0 >debug3: tty_make_modes: 36 1 >debug3: tty_make_modes: 37 0 >debug3: tty_make_modes: 38 1 >debug3: tty_make_modes: 39 0 >debug3: tty_make_modes: 40 0 >debug3: tty_make_modes: 41 0 >debug3: tty_make_modes: 50 1 >debug3: tty_make_modes: 51 1 >debug3: tty_make_modes: 52 0 >debug3: tty_make_modes: 53 1 >debug3: tty_make_modes: 54 1 >debug3: tty_make_modes: 55 1 >debug3: tty_make_modes: 56 0 >debug3: tty_make_modes: 57 0 >debug3: tty_make_modes: 58 0 >debug3: tty_make_modes: 59 1 >debug3: tty_make_modes: 60 1 >debug3: tty_make_modes: 61 1 >debug3: tty_make_modes: 62 0 >debug3: tty_make_modes: 70 1 >debug3: tty_make_modes: 71 0 >debug3: tty_make_modes: 72 1 >debug3: tty_make_modes: 73 0 >debug3: tty_make_modes: 74 0 >debug3: tty_make_modes: 75 0 >debug3: tty_make_modes: 90 1 >debug3: tty_make_modes: 91 1 >debug3: tty_make_modes: 92 1 >debug3: tty_make_modes: 93 0 >debug2: x11_get_proto: /usr/openwin/bin/xauth -f /tmp/ssh-RFwXXd5115/xauthfile generate blade100-2:0.0 MIT-MAGIC-COOKIE-1 untrusted timeout 1200 2>/dev/null >debug2: x11_get_proto: /usr/openwin/bin/xauth -f /tmp/ssh-RFwXXd5115/xauthfile list blade100-2:0.0 . 2>/dev/null >debug1: Requesting X11 forwarding with authentication spoofing. >debug2: channel 0: request x11-req >debug2: channel 0: request shell >debug2: fd 4 setting TCP_NODELAY >debug2: callback done >debug2: channel 0: open confirm rwindow 0 rmax 32768 >debug2: channel 0: rcvd adjust 131072 >Last login: Thu Apr 22 14:51:05 2004 from blade100-2.newl >Sun Microsystems Inc. SunOS 5.8 Generic Patch October 2001 > 2:51pm up 203 days 22:32, 43 users, load average: 0.43, 0.26, 0.23 >Sun Microsystems Inc. SunOS 5.8 Generic Patch October 2001 >nwaibel@blade100-2 ~ $ nedit >debug1: client_input_channel_open: ctype x11 rchan 2 win 65536 max 16384 >debug1: client_request_x11: request from 127.0.0.1 34741 >debug2: fd 10 setting TCP_NODELAY >debug2: fd 10 setting O_NONBLOCK >debug2: fd 10 is O_NONBLOCK >debug1: channel 1: new [x11] >debug1: confirm x11 >X Error of failed request: BadAtom (invalid Atom parameter) > Major opcode of failed request: 20 (X_GetProperty) > Atom id in failed request: 0x8c > Serial number of failed request: 29 > Current serial number in output stream: 29 >debug2: channel 1: rcvd eof >debug2: channel 1: output open -> drain >debug2: channel 1: obuf empty >debug2: channel 1: close_write >debug2: channel 1: output drain -> closed >debug1: channel 1: FORCE input drain >debug2: channel 1: ibuf empty >debug2: channel 1: send eof >debug2: channel 1: input drain -> closed >debug2: channel 1: send close >debug3: channel 1: will not send data after close >debug2: channel 1: rcvd close >debug3: channel 1: will not send data after close >debug2: channel 1: is dead >debug2: channel 1: garbage collecting >debug1: channel 1: free: x11, nchannels 2 >debug3: channel 1: status: The following connections are open: > #0 client-session (t4 r0 i0/0 o0/0 fd 7/8) > #1 x11 (t4 r2 i3/0 o3/0 fd 10/10) > >debug3: channel 1: close_fds r 10 w 10 e -1 >nwaibel@blade100-2 ~ $ exit >logout >debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 >debug2: channel 0: rcvd eof >debug2: channel 0: output open -> drain >debug2: channel 0: obuf empty >debug2: channel 0: close_write >debug2: channel 0: output drain -> closed >debug2: channel 0: rcvd close >debug2: channel 0: close_read >debug2: channel 0: input open -> closed >debug3: channel 0: will not send data after close >debug2: channel 0: almost dead >debug2: channel 0: gc: notify user >debug2: channel 0: gc: user detached >debug2: channel 0: send close >debug2: channel 0: is dead >debug2: channel 0: garbage collecting >debug1: channel 0: free: client-session, nchannels 1 >debug3: channel 0: status: The following connections are open: > #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1) > >debug3: channel 0: close_fds r -1 w -1 e 9 >Connection to blade100-2 closed. >debug1: Transferred: stdin 0, stdout 0, stderr 34 bytes in 7.2 seconds >debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 4.7 >debug1: Exit status 1 >nwaibel@blade100-2 ~ $ >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 851
: 617