Re: x11_request_forwarding: bad authentication data: Pro/unix:0
Re: x11_request_forwarding: bad authentication data: Pro/unix:0
- Subject: Re: x11_request_forwarding: bad authentication data: Pro/unix:0
- From: David Sheffield <email@hidden>
- Date: Tue, 2 Jun 2009 12:36:05 -0700
On the machine I'm attempting to log in to:
[dsheffie@octomom elmcc]$ xauth list
localhost/unix:10 MIT-MAGIC-COOKIE-1 1b77c5c9edd96ec73a0ada6250b6ecf3
sour-milk/unix:11 MIT-MAGIC-COOKIE-1 938a7198f357e1ae672c21c02e9f8ad4
sour-milk/unix:12 MIT-MAGIC-COOKIE-1 52fa19f692461ac88be8be3370eafecd
sour-milk/unix:10 MIT-MAGIC-COOKIE-1 8e5cdf115ea82494301f343514626e12
octomom/unix:11 MIT-MAGIC-COOKIE-1 701bd6715b0e6911d6852afe6b31ea90
octomom/unix:12 MIT-MAGIC-COOKIE-1 5afe989becc6ebe29d7b2166889d5367
octomom/unix:13 MIT-MAGIC-COOKIE-1 ec7cae45f26b87fc364da25c90ce3b36
octomom/unix:14 MIT-MAGIC-COOKIE-1 5b755e87f03f411fd6f37ac01a0a8c75
octomom/unix:15 MIT-MAGIC-COOKIE-1 26aa3dbe56b9f944b27c911410fab665
octomom/unix:10 MIT-MAGIC-COOKIE-1 e7f3bb9add117b96e5a130d172b044d8
On my mac "auth list" prints nothing. .Xauthority file is empty.
I've attached the SSH log
Thanks for the help,
David
On Tue, Jun 2, 2009 at 12:12 PM, Jeremy Huddleston
<email@hidden> wrote:
Well your DISPLAY is correct. I was assuming that you had a bad $DISPLAY set...
My hunch is that you have a corrupted ~/.Xauthority file.
Use '-vv' in your ssh command line to get some verbose data.
Also run 'xauth list' on both the local and remote machine.
On Jun 2, 2009, at 11:30, David Sheffield wrote:
bash-3.2$ echo $DISPLAY
/tmp/launch-sJdUwj/:0
bash-3.2$ file /tmp/launch-sJdUwj/\:0
/tmp/launch-sJdUwj/:0: socket
I don't know where the display variable is being set.
On 6/2/09, Jeremy Huddleston <email@hidden> wrote:
What is your $DISPLAY environment variable? Where is it being set?
On Jun 2, 2009, at 09:45, David Sheffield wrote:
Hello,
I've installed X11 2.3.3.2 on 10.5.7. When I ssh into any machine,
I get
the following error:
"x11_request_forwarding: bad authentication data: Pro/unix:0"
X11 used to work before 10.5.7 and X11 2.3.3.2.
I've tried both the "ssh -X" and "ssh -Y" commands.
Anyone else seen this?
Thanks,
David
_______________________________________________
Do not post admin requests to the list. They will be ignored.
X11-users mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden
_______________________________________________
Do not post admin requests to the list. They will be ignored.
X11-users mailing list (email@hidden)
This email sent to email@hidden
bash-3.2$ ssh -X -vv octomom.stanford.edu
OpenSSH_5.1p1, OpenSSL 0.9.7l 28 Sep 2006
debug1: Reading configuration data /etc/ssh_config
debug2: ssh_connect: needpriv 0
debug1: Connecting to octomom.stanford.edu [172.24.73.145] port 22.
debug1: Connection established.
debug1: identity file /Users/dsheffie/.ssh/identity type -1
debug1: identity file /Users/dsheffie/.ssh/id_rsa type -1
debug1: identity file /Users/dsheffie/.ssh/id_dsa type -1
debug1: Remote protocol version 2.0, remote software version OpenSSH_5.1
debug1: match: OpenSSH_5.1 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_5.1
debug2: fd 3 setting O_NONBLOCK
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-gr
oup1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator
.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator
.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,email@hidden,hmac-ripemd160,email@hidden,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,email@hidden,hmac-ripemd160,email@hidden,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,email@hidden,zlib
debug2: kex_parse_kexinit: none,email@hidden,zlib
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-gr
oup1-sha1
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator
.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator
.liu.se,aes128-ctr,aes192-ctr,aes256-ctr
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,email@hidden,hmac-ripemd160,email@hidden,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,email@hidden,hmac-ripemd160,email@hidden,hmac-sha1-96,hmac-md5-96
debug2: kex_parse_kexinit: none,email@hidden
debug2: kex_parse_kexinit: none,email@hidden
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_setup: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_setup: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug2: dh_gen_key: priv key bits set: 126/256
debug2: bits set: 514/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'octomom.stanford.edu' is known and matches the RSA host key.
debug1: Found key in /Users/dsheffie/.ssh/known_hosts:11
debug2: bits set: 506/1024
debug1: ssh_rsa_verify: signature correct
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug2: set_newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug2: service_accept: ssh-userauth
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug2: key: /Users/dsheffie/.ssh/identity (0x0)
debug2: key: /Users/dsheffie/.ssh/id_rsa (0x0)
debug2: key: /Users/dsheffie/.ssh/id_dsa (0x0)
debug1: Authentications that can continue: publickey,gssapi-with-mic,password
debug1: Next authentication method: publickey
debug1: Trying private key: /Users/dsheffie/.ssh/identity
debug1: Trying private key: /Users/dsheffie/.ssh/id_rsa
debug1: Trying private key: /Users/dsheffie/.ssh/id_dsa
debug2: we did not send a packet, disable method
debug1: Next authentication method: password
email@hidden's password:
debug2: we sent a password packet, wait for reply
debug1: Authentication succeeded (password).
debug1: channel 0: new [client-session]
debug2: channel 0: send open
debug1: Requesting email@hidden
debug1: Entering interactive session.
debug2: callback start
debug2: x11_get_proto: /usr/X11R6/bin/xauth -f /tmp/ssh-3Bonmqkia6/xauthfile generate /tmp/launch-sJdUwj/:0 MIT-MAGIC-COOKIE-1 untrusted timeout
1200 2>/dev/null
debug2: x11_get_proto: /usr/X11R6/bin/xauth -f /tmp/ssh-3Bonmqkia6/xauthfile list /tmp/launch-sJdUwj/:0 2>/dev/null
debug1: Requesting X11 forwarding with authentication spoofing.
x11_request_forwarding: bad authentication data: Pro/unix:0
bash-3.2$
_______________________________________________
Do not post admin requests to the list. They will be ignored.
X11-users mailing list (email@hidden)
This email sent to email@hidden