Created
January 17, 2013 15:34
-
-
Save kjellski/4556780 to your computer and use it in GitHub Desktop.
x2go server from ppa with different versions of the x2go client.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Debugging starts | |
| &"warning: GDB: Failed to set controlling terminal: Invalid argument\n" | |
| ONMainWindow constructor | |
| Can't load translator (:/x2goclient_en_us) ! | |
| Can't load translator :/qt_en_US | |
| ONMainWindows constructor finished, home Directory is: "/home/kjellski" | |
| read 2 sessions from config file | |
| start new ssh connection to server: "192.168.80.137" : "22" krb: false | |
| starting ssh connection without kerberos authentication | |
| SshMasterConnection, instance SshMasterConnection(0x83db00) created | |
| SshMasterConnection, instance SshMasterConnection(0x83db00) entering thread | |
| libSsh not inited yet, initting | |
| [1] libssh 0.5.2 (c) 2003-2010 Aris Adamantiadis ([email protected]) Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads_noop | |
| [3] host 192.168.80.137 matches an IP address | |
| [2] Nonblocking connection socket: 16 | |
| [2] Socket connecting, now waiting for the callbacks to work | |
| [3] ssh_connect: Actual timeout : 60000 | |
| [3] Received POLLOUT in connecting state | |
| [1] Socket connection callback: 1 (0) | |
| [3] Received banner: SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1 | |
| [1] SSH server banner: SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1 | |
| [1] Analyzing banner: SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1 | |
| [1] We are talking to an OpenSSH client version: 5.9 (50900) | |
| [3] Enabling POLLOUT for socket | |
| [3] Packet size decrypted: 980 (0x3d4) | |
| [3] Read a 980 bytes packet | |
| [3] 9 bytes padding, 979 bytes left in buffer | |
| [3] After padding, 970 bytes left in buffer | |
| [3] Final size 970 | |
| [3] Type 20 | |
| [3] Dispatching handler for packet type 20 | |
| [3] Writing on the wire a packet having 141 bytes before | |
| [3] 141 bytes after comp + 6 padding bytes = 148 bytes packet | |
| [3] Enabling POLLOUT for socket | |
| [3] Writing on the wire a packet having 133 bytes before | |
| [3] 133 bytes after comp + 6 padding bytes = 140 bytes packet | |
| [3] Enabling POLLOUT for socket | |
| [3] Packet size decrypted: 700 (0x2bc) | |
| [3] Read a 700 bytes packet | |
| [3] 7 bytes padding, 699 bytes left in buffer | |
| [3] After padding, 692 bytes left in buffer | |
| [3] Final size 692 | |
| [3] Type 31 | |
| [3] Dispatching handler for packet type 31 | |
| [2] Received SSH_KEXDH_REPLY | |
| [3] Writing on the wire a packet having 1 bytes before | |
| [3] 1 bytes after comp + 10 padding bytes = 12 bytes packet | |
| [3] Enabling POLLOUT for socket | |
| [2] SSH_MSG_NEWKEYS sent | |
| [3] Processing 16 bytes left in socket buffer | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] 10 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 1 bytes left in buffer | |
| [3] Final size 1 | |
| [3] Type 21 | |
| [3] Dispatching handler for packet type 21 | |
| [2] Received SSH_MSG_NEWKEYS | |
| [3] Set output algorithm to aes256-ctr | |
| [3] Set input algorithm to aes256-ctr | |
| [3] ssh_connect: Actual state : 7 | |
| cserverAuth | |
| state: 1 | |
| [3] Writing on the wire a packet having 17 bytes before | |
| [3] 17 bytes after comp + 10 padding bytes = 28 bytes packet | |
| [3] Encrypting packet with seq num: 3, len: 32 | |
| [3] Sent SSH_MSG_SERVICE_REQUEST (service ssh-userauth) | |
| [3] Enabling POLLOUT for socket | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 10 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 17 bytes left in buffer | |
| [3] Final size 17 | |
| [3] Type 6 | |
| [3] Dispatching handler for packet type 6 | |
| [3] Received SSH_MSG_SERVICE_ACCEPT | |
| [3] Writing on the wire a packet having 55 bytes before | |
| [3] 55 bytes after comp + 4 padding bytes = 60 bytes packet | |
| [3] Encrypting packet with seq num: 4, len: 64 | |
| [3] Enabling POLLOUT for socket | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 10 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 1 bytes left in buffer | |
| [3] Final size 1 | |
| [3] Type 52 | |
| [3] Dispatching handler for packet type 52 | |
| [3] Received SSH_USERAUTH_SUCCESS | |
| [2] Authentication successful | |
| user auth OK | |
| ssh connection ok | |
| continue normal x2go session | |
| creating new channel | |
| new channel: 0x7fffd4010160 | |
| executing remote: "sh -c "export HOSTNAME && x2golistsessions"" | |
| [2] Creating a channel 43 with 64000 window and 32768 max packet | |
| [3] Writing on the wire a packet having 24 bytes before | |
| [3] 24 bytes after comp + 19 padding bytes = 44 bytes packet | |
| [3] Encrypting packet with seq num: 5, len: 48 | |
| [3] Enabling POLLOUT for socket | |
| [3] Sent a SSH_MSG_CHANNEL_OPEN type session for channel 43 | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 10 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 17 bytes left in buffer | |
| [3] Final size 17 | |
| [3] Type 91 | |
| [3] Dispatching handler for packet type 91 | |
| [3] Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION | |
| [2] Received a CHANNEL_OPEN_CONFIRMATION for channel 43:0 | |
| [2] Remote window : 0, maxpacket : 32768 | |
| [3] Writing on the wire a packet having 61 bytes before | |
| [3] 61 bytes after comp + 14 padding bytes = 76 bytes packet | |
| [3] Encrypting packet with seq num: 6, len: 80 | |
| [3] Enabling POLLOUT for socket | |
| [3] Sent a SSH_MSG_CHANNEL_REQUEST exec | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 18 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 9 bytes left in buffer | |
| [3] Final size 9 | |
| [3] Type 93 | |
| [3] Dispatching handler for packet type 93 | |
| [2] Adding 2097152 bytes to channel (43:0) (from 0 bytes) | |
| [3] Processing 36 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 6 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 5 bytes left in buffer | |
| [3] Final size 5 | |
| [3] Type 99 | |
| [3] Dispatching handler for packet type 99 | |
| [3] Received SSH_CHANNEL_SUCCESS on channel (43:0) | |
| [2] Channel request exec success | |
| new exec channel created | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 6 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 5 bytes left in buffer | |
| [3] Final size 5 | |
| [3] Type 96 | |
| [3] Dispatching handler for packet type 96 | |
| [3] Received eof on channel (43:0) | |
| [3] Processing 104 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 44 (0x2c) | |
| [3] Read a 44 bytes packet | |
| [3] Decrypting 32 bytes | |
| [3] 18 bytes padding, 43 bytes left in buffer | |
| [3] After padding, 25 bytes left in buffer | |
| [3] Final size 25 | |
| [3] Type 98 | |
| [3] Dispatching handler for packet type 98 | |
| [3] received exit-status 0 | |
| [3] Processing 36 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 6 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 5 bytes left in buffer | |
| [3] Final size 5 | |
| [3] Type 97 | |
| [3] Dispatching handler for packet type 97 | |
| [3] Received close on channel (43:0) | |
| EOF ON CHANNEL 0x7fffd4010160 | |
| [3] Writing on the wire a packet having 5 bytes before | |
| [3] 5 bytes after comp + 6 padding bytes = 12 bytes packet | |
| [3] Encrypting packet with seq num: 7, len: 16 | |
| [3] Enabling POLLOUT for socket | |
| [3] Sent a EOF on client channel (43:0) | |
| eof sent | |
| [3] Writing on the wire a packet having 5 bytes before | |
| [3] 5 bytes after comp + 6 padding bytes = 12 bytes packet | |
| [3] Encrypting packet with seq num: 8, len: 16 | |
| [3] Sent a close on client channel (43:0) | |
| channel closed | |
| ssh finished: true - "" | |
| "x2gostartagent 800x600 adsl 16m-jpeg-9 unix-kde-depth_24 us pc105/us 1 R xterm" | |
| creating new channel | |
| new channel: 0x7fffd4010160 | |
| executing remote: "sh -c "x2gostartagent 800x600 adsl 16m-jpeg-9 unix-kde-depth_24 us pc105/us 1 R xterm"" | |
| [2] Creating a channel 44 with 64000 window and 32768 max packet | |
| [3] Writing on the wire a packet having 24 bytes before | |
| [3] 24 bytes after comp + 19 padding bytes = 44 bytes packet | |
| [3] Encrypting packet with seq num: 9, len: 48 | |
| [3] Sent a SSH_MSG_CHANNEL_OPEN type session for channel 44 | |
| [3] Enabling POLLOUT for socket | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 10 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 17 bytes left in buffer | |
| [3] Final size 17 | |
| [3] Type 91 | |
| [3] Dispatching handler for packet type 91 | |
| [3] Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION | |
| [2] Received a CHANNEL_OPEN_CONFIRMATION for channel 44:1 | |
| [2] Remote window : 0, maxpacket : 32768 | |
| [3] Writing on the wire a packet having 104 bytes before | |
| [3] 104 bytes after comp + 19 padding bytes = 124 bytes packet | |
| [3] Encrypting packet with seq num: 10, len: 128 | |
| [3] Enabling POLLOUT for socket | |
| [3] Sent a SSH_MSG_CHANNEL_REQUEST exec | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 18 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 9 bytes left in buffer | |
| [3] Final size 9 | |
| [3] Type 93 | |
| [3] Dispatching handler for packet type 93 | |
| [2] Adding 2097152 bytes to channel (44:1) (from 0 bytes) | |
| [3] Processing 36 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 6 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 5 bytes left in buffer | |
| [3] Final size 5 | |
| [3] Type 99 | |
| [3] Dispatching handler for packet type 99 | |
| [3] Received SSH_CHANNEL_SUCCESS on channel (44:1) | |
| [2] Channel request exec success | |
| new exec channel created | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 10 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 17 bytes left in buffer | |
| [3] Final size 17 | |
| [3] Type 95 | |
| [3] Dispatching handler for packet type 95 | |
| [2] Channel receiving 4 bytes data in 1 (local win=64000 remote win=2097152) | |
| [1] placing 4 bytes into channel buffer (stderr=1) | |
| [2] Channel windows are now (local win=63996 remote win=2097152) | |
| [2] Read (524287) buffered : 4 bytes. Window: 63996 | |
| [3] Writing on the wire a packet having 9 bytes before | |
| [3] 9 bytes after comp + 18 padding bytes = 28 bytes packet | |
| [3] Encrypting packet with seq num: 11, len: 32 | |
| [3] Enabling POLLOUT for socket | |
| [2] growing window (channel 44:1) to 1280000 bytes | |
| new err data: "ln: " | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 124 (0x7c) | |
| [3] Read a 124 bytes packet | |
| [3] Decrypting 112 bytes | |
| [3] 7 bytes padding, 123 bytes left in buffer | |
| [3] After padding, 116 bytes left in buffer | |
| [3] Final size 116 | |
| [3] Type 95 | |
| [3] Dispatching handler for packet type 95 | |
| [2] Channel receiving 103 bytes data in 1 (local win=1280000 remote win=2097152) | |
| [1] placing 103 bytes into channel buffer (stderr=1) | |
| [2] Channel windows are now (local win=1279897 remote win=2097152) | |
| [3] Processing 120 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 44 (0x2c) | |
| [3] Read a 44 bytes packet | |
| [3] Decrypting 32 bytes | |
| [3] 17 bytes padding, 43 bytes left in buffer | |
| [3] After padding, 26 bytes left in buffer | |
| [3] Final size 26 | |
| [3] Type 95 | |
| [3] Dispatching handler for packet type 95 | |
| [2] Channel receiving 13 bytes data in 1 (local win=1279897 remote win=2097152) | |
| [1] placing 13 bytes into channel buffer (stderr=1) | |
| [2] Channel windows are now (local win=1279884 remote win=2097152) | |
| [3] Processing 52 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 13 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 14 bytes left in buffer | |
| [3] Final size 14 | |
| [3] Type 95 | |
| [3] Dispatching handler for packet type 95 | |
| [2] Channel receiving 1 bytes data in 1 (local win=1279884 remote win=2097152) | |
| [1] placing 1 bytes into channel buffer (stderr=1) | |
| [2] Channel windows are now (local win=1279883 remote win=2097152) | |
| [2] Read (524287) buffered : 117 bytes. Window: 1279883 | |
| new err data: "failed to create symbolic link `/tmp/.x2go-kjellski/session-C-kjellski-50-1358436605_stRxterm_dp24.log': File exists | |
| " | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 15 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 12 bytes left in buffer | |
| [3] Final size 12 | |
| [3] Type 94 | |
| [3] Dispatching handler for packet type 94 | |
| [2] Channel receiving 3 bytes data in 0 (local win=1279883 remote win=2097152) | |
| [1] placing 3 bytes into channel buffer (stderr=0) | |
| [2] Channel windows are now (local win=1279880 remote win=2097152) | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 60 (0x3c) | |
| [3] Read a 60 bytes packet | |
| [3] Decrypting 48 bytes | |
| [3] 17 bytes padding, 59 bytes left in buffer | |
| [3] After padding, 42 bytes left in buffer | |
| [3] Final size 42 | |
| [3] Type 94 | |
| [3] Dispatching handler for packet type 94 | |
| [2] Channel receiving 33 bytes data in 0 (local win=1279880 remote win=2097152) | |
| [1] placing 33 bytes into channel buffer (stderr=0) | |
| [2] Channel windows are now (local win=1279847 remote win=2097152) | |
| [2] Read (524287) buffered : 36 bytes. Window: 1279847 | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 12 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 15 bytes left in buffer | |
| [3] Final size 15 | |
| [3] Type 94 | |
| [3] Dispatching handler for packet type 94 | |
| [2] Channel receiving 6 bytes data in 0 (local win=1279847 remote win=2097152) | |
| [1] placing 6 bytes into channel buffer (stderr=0) | |
| [2] Channel windows are now (local win=1279841 remote win=2097152) | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 60 (0x3c) | |
| [3] Read a 60 bytes packet | |
| [3] Decrypting 48 bytes | |
| [3] 13 bytes padding, 59 bytes left in buffer | |
| [3] After padding, 46 bytes left in buffer | |
| [3] Final size 46 | |
| [3] Type 94 | |
| [3] Dispatching handler for packet type 94 | |
| [2] Channel receiving 37 bytes data in 0 (local win=1279841 remote win=2097152) | |
| [1] placing 37 bytes into channel buffer (stderr=0) | |
| [2] Channel windows are now (local win=1279804 remote win=2097152) | |
| [2] Read (524287) buffered : 43 bytes. Window: 1279804 | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 12 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 15 bytes left in buffer | |
| [3] Final size 15 | |
| [3] Type 94 | |
| [3] Dispatching handler for packet type 94 | |
| [2] Channel receiving 6 bytes data in 0 (local win=1279804 remote win=2097152) | |
| [1] placing 6 bytes into channel buffer (stderr=0) | |
| [2] Channel windows are now (local win=1279798 remote win=2097152) | |
| [2] Read (524287) buffered : 6 bytes. Window: 1279798 | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 12 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 15 bytes left in buffer | |
| [3] Final size 15 | |
| [3] Type 94 | |
| [3] Dispatching handler for packet type 94 | |
| [2] Channel receiving 6 bytes data in 0 (local win=1279798 remote win=2097152) | |
| [1] placing 6 bytes into channel buffer (stderr=0) | |
| [2] Channel windows are now (local win=1279792 remote win=2097152) | |
| [2] Read (524287) buffered : 6 bytes. Window: 1279792 | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 12 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 15 bytes left in buffer | |
| [3] Final size 15 | |
| [3] Type 94 | |
| [3] Dispatching handler for packet type 94 | |
| [2] Channel receiving 6 bytes data in 0 (local win=1279792 remote win=2097152) | |
| [1] placing 6 bytes into channel buffer (stderr=0) | |
| [2] Channel windows are now (local win=1279786 remote win=2097152) | |
| [2] Read (524287) buffered : 6 bytes. Window: 1279786 | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 6 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 5 bytes left in buffer | |
| [3] Final size 5 | |
| [3] Type 96 | |
| [3] Dispatching handler for packet type 96 | |
| [3] Received eof on channel (44:1) | |
| [3] Processing 104 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 44 (0x2c) | |
| [3] Read a 44 bytes packet | |
| [3] Decrypting 32 bytes | |
| [3] 18 bytes padding, 43 bytes left in buffer | |
| [3] After padding, 25 bytes left in buffer | |
| [3] Final size 25 | |
| [3] Type 98 | |
| [3] Dispatching handler for packet type 98 | |
| [3] received exit-status 0 | |
| [3] Processing 36 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 6 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 5 bytes left in buffer | |
| [3] Final size 5 | |
| [3] Type 97 | |
| [3] Dispatching handler for packet type 97 | |
| [3] Received close on channel (44:1) | |
| EOF ON CHANNEL 0x7fffd4010160 | |
| [3] Writing on the wire a packet having 5 bytes before | |
| [3] 5 bytes after comp + 6 padding bytes = 12 bytes packet | |
| [3] Encrypting packet with seq num: 12, len: 16 | |
| [3] Enabling POLLOUT for socket | |
| [3] Sent a EOF on client channel (44:1) | |
| eof sent | |
| [3] Writing on the wire a packet having 5 bytes before | |
| [3] 5 bytes after comp + 6 padding bytes = 12 bytes packet | |
| [3] Encrypting packet with seq num: 13, len: 16 | |
| [3] Sent a close on client channel (44:1) | |
| channel closed | |
| ssh finished: true - "50 | |
| e76958b35360b79fb8f844c1947196da | |
| 24525 | |
| kjellski-50-1358436605_stRxterm_dp24 | |
| 30001 | |
| 30002 | |
| 30003 | |
| " | |
| Agent output: "50 | |
| e76958b35360b79fb8f844c1947196da | |
| 24525 | |
| kjellski-50-1358436605_stRxterm_dp24 | |
| 30001 | |
| 30002 | |
| 30003 | |
| " | |
| starting nxproxy with: "nxproxy -S nx/nx,options=/home/kjellski/.x2go/S-kjellski-50-1358436605_stRxterm_dp24/options:50" | |
| Direct tunnel: waiting for connections on "localhost" : 31001 | |
| creating new channel | |
| new channel: 0x7fffd4010160 | |
| executing remote: "sh -c "echo "default-server=localhost:30002"> ~/.x2go/C-kjellski-50-1358436605_stRxterm_dp24/.pulse-client.conf;echo "cookie-file=.x2go/C-kjellski-50-1358436605_stRxterm_dp24/.pulse-cookie">> ~/.x2go/C-kjellski-50-1358436605_stRxterm_dp24/.pulse-client.conf"" | |
| [2] Creating a channel 45 with 64000 window and 32768 max packet | |
| [3] Writing on the wire a packet having 24 bytes before | |
| [3] 24 bytes after comp + 19 padding bytes = 44 bytes packet | |
| [3] Encrypting packet with seq num: 14, len: 48 | |
| [3] Sent a SSH_MSG_CHANNEL_OPEN type session for channel 45 | |
| [3] Enabling POLLOUT for socket | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 10 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 17 bytes left in buffer | |
| [3] Final size 17 | |
| [3] Type 91 | |
| [3] Dispatching handler for packet type 91 | |
| [3] Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION | |
| [2] Received a CHANNEL_OPEN_CONFIRMATION for channel 45:0 | |
| [2] Remote window : 0, maxpacket : 32768 | |
| [3] Writing on the wire a packet having 276 bytes before | |
| [3] 276 bytes after comp + 7 padding bytes = 284 bytes packet | |
| [3] Encrypting packet with seq num: 15, len: 288 | |
| [3] Enabling POLLOUT for socket | |
| [3] Sent a SSH_MSG_CHANNEL_REQUEST exec | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 18 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 9 bytes left in buffer | |
| [3] Final size 9 | |
| [3] Type 93 | |
| [3] Dispatching handler for packet type 93 | |
| [2] Adding 2097152 bytes to channel (45:0) (from 0 bytes) | |
| [3] Processing 36 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 6 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 5 bytes left in buffer | |
| [3] Final size 5 | |
| [3] Type 99 | |
| [3] Dispatching handler for packet type 99 | |
| [3] Received SSH_CHANNEL_SUCCESS on channel (45:0) | |
| [2] Channel request exec success | |
| new exec channel created | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 44 (0x2c) | |
| [3] Read a 44 bytes packet | |
| [3] Decrypting 32 bytes | |
| [3] 18 bytes padding, 43 bytes left in buffer | |
| [3] After padding, 25 bytes left in buffer | |
| [3] Final size 25 | |
| [3] Type 98 | |
| [3] Dispatching handler for packet type 98 | |
| [3] received exit-status 0 | |
| [3] Processing 72 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 6 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 5 bytes left in buffer | |
| [3] Final size 5 | |
| [3] Type 96 | |
| [3] Dispatching handler for packet type 96 | |
| [3] Received eof on channel (45:0) | |
| [3] Processing 36 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 6 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 5 bytes left in buffer | |
| [3] Final size 5 | |
| [3] Type 97 | |
| [3] Dispatching handler for packet type 97 | |
| [3] Received close on channel (45:0) | |
| EOF ON CHANNEL 0x7fffd4010160 | |
| [3] Writing on the wire a packet having 5 bytes before | |
| [3] 5 bytes after comp + 6 padding bytes = 12 bytes packet | |
| [3] Encrypting packet with seq num: 16, len: 16 | |
| [3] Enabling POLLOUT for socket | |
| [3] Sent a EOF on client channel (45:0) | |
| eof sent | |
| [3] Writing on the wire a packet having 5 bytes before | |
| [3] 5 bytes after comp + 6 padding bytes = 12 bytes packet | |
| [3] Encrypting packet with seq num: 17, len: 16 | |
| [3] Sent a close on client channel (45:0) | |
| channel closed | |
| SshMasterConnection, instance SshMasterConnection(0xc3cde0) created (reverse tunnel) | |
| dst path: "~/.x2go/C-kjellski-50-1358436605_stRxterm_dp24" file: ".pulse-cookie" | |
| [2] Initializing scp session write recursive on location '~/.x2go/C-kjellski-50-1358436605_stRxterm_dp24' | |
| [2] Creating a channel 46 with 64000 window and 32768 max packet | |
| [3] Writing on the wire a packet having 24 bytes before | |
| [3] 24 bytes after comp + 19 padding bytes = 44 bytes packet | |
| [3] Encrypting packet with seq num: 18, len: 48 | |
| [3] Sent a SSH_MSG_CHANNEL_OPEN type session for channel 46 | |
| [3] Enabling POLLOUT for socket | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 10 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 17 bytes left in buffer | |
| [3] Final size 17 | |
| [3] Type 91 | |
| [3] Dispatching handler for packet type 91 | |
| [3] Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION | |
| [2] Received a CHANNEL_OPEN_CONFIRMATION for channel 46:1 | |
| [2] Remote window : 0, maxpacket : 32768 | |
| [3] Writing on the wire a packet having 74 bytes before | |
| [3] 74 bytes after comp + 17 padding bytes = 92 bytes packet | |
| [3] Encrypting packet with seq num: 19, len: 96 | |
| [3] Enabling POLLOUT for socket | |
| [3] Sent a SSH_MSG_CHANNEL_REQUEST exec | |
| ssh finished: true - "" | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 18 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 9 bytes left in buffer | |
| [3] Final size 9 | |
| [3] Type 93 | |
| [3] Dispatching handler for packet type 93 | |
| [2] Adding 2097152 bytes to channel (46:1) (from 0 bytes) | |
| [3] Processing 36 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 6 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 5 bytes left in buffer | |
| [3] Final size 5 | |
| [3] Type 99 | |
| [3] Dispatching handler for packet type 99 | |
| [3] Received SSH_CHANNEL_SUCCESS on channel (46:1) | |
| [2] Channel request exec success | |
| [2] Read (1) buffered : 0 bytes. Window: 64000 | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 17 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 10 bytes left in buffer | |
| [3] Final size 10 | |
| [3] Type 94 | |
| [3] Dispatching handler for packet type 94 | |
| [2] Channel receiving 1 bytes data in 0 (local win=64000 remote win=2097152) | |
| [1] placing 1 bytes into channel buffer (stderr=0) | |
| [2] Channel windows are now (local win=63999 remote win=2097152) | |
| [3] Writing on the wire a packet having 9 bytes before | |
| [3] 9 bytes after comp + 18 padding bytes = 28 bytes packet | |
| [3] Encrypting packet with seq num: 20, len: 32 | |
| [3] Enabling POLLOUT for socket | |
| [2] growing window (channel 46:1) to 1280000 bytes | |
| deleting proxy | |
| [2] SCP pushing file .pulse-cookie, size 256 with permissions '0600' | |
| [3] Writing on the wire a packet having 33 bytes before | |
| [3] 33 bytes after comp + 10 padding bytes = 44 bytes packet | |
| [3] Encrypting packet with seq num: 21, len: 48 | |
| [1] channel_write wrote 24 bytes | |
| nxproxy not running | |
| [3] Enabling POLLOUT for socket | |
| [2] Read (1) buffered : 0 bytes. Window: 1280000 | |
| proxy deleted | |
| checking exit status | |
| check command message | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 17 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 10 bytes left in buffer | |
| [3] Final size 10 | |
| [3] Type 94 | |
| [3] Dispatching handler for packet type 94 | |
| [2] Channel receiving 1 bytes data in 0 (local win=1280000 remote win=2097128) | |
| [1] placing 1 bytes into channel buffer (stderr=0) | |
| [2] Channel windows are now (local win=1279999 remote win=2097128) | |
| [3] Writing on the wire a packet having 265 bytes before | |
| [3] 265 bytes after comp + 18 padding bytes = 284 bytes packet | |
| [3] Encrypting packet with seq num: 22, len: 288 | |
| [3] Enabling POLLOUT for socket | |
| [1] channel_write wrote 256 bytes | |
| [3] Writing on the wire a packet having 10 bytes before | |
| [3] 10 bytes after comp + 17 padding bytes = 28 bytes packet | |
| [3] Encrypting packet with seq num: 23, len: 32 | |
| [3] Enabling POLLOUT for socket | |
| [1] channel_write wrote 1 bytes | |
| scp ok: "/home/kjellski/.pulse-cookie" -> "kjellski" @ "192.168.80.137" : "~/.x2go/C-kjellski-50-1358436605_stRxterm_dp24/.pulse-cookie" | |
| [3] Writing on the wire a packet having 5 bytes before | |
| [3] 5 bytes after comp + 6 padding bytes = 12 bytes packet | |
| [3] Encrypting packet with seq num: 24, len: 16 | |
| [3] Enabling POLLOUT for socket | |
| [3] Sent a EOF on client channel (46:1) | |
| [2] Read (128) buffered : 0 bytes. Window: 1279999 | |
| SshMasterConnection, instance SshMasterConnection(0xc3cde0) entering thread | |
| already inited | |
| [1] libssh 0.5.2 (c) 2003-2010 Aris Adamantiadis ([email protected]) Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads_noop | |
| [3] host 192.168.80.137 matches an IP address | |
| [2] Nonblocking connection socket: 20 | |
| [2] Socket connecting, now waiting for the callbacks to work | |
| [3] ssh_connect: Actual timeout : 60000 | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 44 (0x2c) | |
| [3] Read a 44 bytes packet | |
| [3] Decrypting 32 bytes | |
| [3] 18 bytes padding, 43 bytes left in buffer | |
| [3] After padding, 25 bytes left in buffer | |
| [3] Final size 25 | |
| [3] Type 98 | |
| [3] Dispatching handler for packet type 98 | |
| [3] received exit-status 0 | |
| [3] Processing 124 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 17 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 10 bytes left in buffer | |
| [3] Final size 10 | |
| [3] Type 94 | |
| [3] Dispatching handler for packet type 94 | |
| [2] Channel receiving 1 bytes data in 0 (local win=1279999 remote win=2096871) | |
| [1] placing 1 bytes into channel buffer (stderr=0) | |
| [2] Channel windows are now (local win=1279998 remote win=2096871) | |
| [3] Processing 72 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 6 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 5 bytes left in buffer | |
| [3] Final size 5 | |
| [3] Type 96 | |
| [3] Dispatching handler for packet type 96 | |
| [3] Received eof on channel (46:1) | |
| [3] Processing 36 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 6 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 5 bytes left in buffer | |
| [3] Final size 5 | |
| [3] Type 97 | |
| [3] Dispatching handler for packet type 97 | |
| [3] Received close on channel (46:1) | |
| [3] Writing on the wire a packet having 5 bytes before | |
| [3] 5 bytes after comp + 6 padding bytes = 12 bytes packet | |
| [3] Encrypting packet with seq num: 25, len: 16 | |
| [3] Enabling POLLOUT for socket | |
| [3] Sent a close on client channel (46:1) | |
| creating new channel | |
| new channel: 0x7fffd4011020 | |
| executing remote: "sh -c "x2gocmdexitmessage kjellski-50-1358436605_stRxterm_dp24"" | |
| [2] Creating a channel 47 with 64000 window and 32768 max packet | |
| [3] Writing on the wire a packet having 24 bytes before | |
| [3] 24 bytes after comp + 19 padding bytes = 44 bytes packet | |
| [3] Encrypting packet with seq num: 26, len: 48 | |
| [3] Sent a SSH_MSG_CHANNEL_OPEN type session for channel 47 | |
| [3] Enabling POLLOUT for socket | |
| [3] Received POLLOUT in connecting state | |
| [1] Socket connection callback: 1 (0) | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 10 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 17 bytes left in buffer | |
| [3] Final size 17 | |
| [3] Type 91 | |
| [3] Dispatching handler for packet type 91 | |
| [3] Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION | |
| [2] Received a CHANNEL_OPEN_CONFIRMATION for channel 47:0 | |
| [2] Remote window : 0, maxpacket : 32768 | |
| [3] Writing on the wire a packet having 81 bytes before | |
| [3] 81 bytes after comp + 10 padding bytes = 92 bytes packet | |
| [3] Encrypting packet with seq num: 27, len: 96 | |
| [3] Enabling POLLOUT for socket | |
| [3] Sent a SSH_MSG_CHANNEL_REQUEST exec | |
| *** glibc detected *** /home/kjellski/x2go/x2goclient-build-desktop-Qt_4_8_1_in_PATH__System__Debug/x2goclient: corrupted double-linked list: 0x000000000085ca40 *** | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 18 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 9 bytes left in buffer | |
| [3] Final size 9 | |
| [3] Type 93 | |
| [3] Dispatching handler for packet type 93 | |
| [2] Adding 2097152 bytes to channel (47:0) (from 0 bytes) | |
| [3] Processing 36 bytes left in socket buffer | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 6 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 5 bytes left in buffer | |
| [3] Final size 5 | |
| [3] Type 99 | |
| [3] Dispatching handler for packet type 99 | |
| [3] Received SSH_CHANNEL_SUCCESS on channel (47:0) | |
| [2] Channel request exec success | |
| new exec channel created | |
| [3] Received banner: SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1 | |
| [1] SSH server banner: SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1 | |
| [1] Analyzing banner: SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1 | |
| [1] We are talking to an OpenSSH client version: 5.9 (50900) | |
| [3] Enabling POLLOUT for socket | |
| [3] Packet size decrypted: 980 (0x3d4) | |
| [3] Read a 980 bytes packet | |
| [3] 9 bytes padding, 979 bytes left in buffer | |
| [3] After padding, 970 bytes left in buffer | |
| [3] Final size 970 | |
| [3] Type 20 | |
| [3] Dispatching handler for packet type 20 | |
| [3] Writing on the wire a packet having 141 bytes before | |
| [3] 141 bytes after comp + 6 padding bytes = 148 bytes packet | |
| [3] Enabling POLLOUT for socket | |
| [3] Writing on the wire a packet having 134 bytes before | |
| [3] 134 bytes after comp + 5 padding bytes = 140 bytes packet | |
| [3] Enabling POLLOUT for socket | |
| [3] Packet size decrypted: 700 (0x2bc) | |
| [3] Read a 700 bytes packet | |
| [3] 8 bytes padding, 699 bytes left in buffer | |
| [3] After padding, 691 bytes left in buffer | |
| [3] Final size 691 | |
| [3] Type 31 | |
| [3] Dispatching handler for packet type 31 | |
| [2] Received SSH_KEXDH_REPLY | |
| [3] Writing on the wire a packet having 1 bytes before | |
| [3] 1 bytes after comp + 10 padding bytes = 12 bytes packet | |
| [3] Enabling POLLOUT for socket | |
| [2] SSH_MSG_NEWKEYS sent | |
| [3] Processing 16 bytes left in socket buffer | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] 10 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 1 bytes left in buffer | |
| [3] Final size 1 | |
| [3] Type 21 | |
| [3] Dispatching handler for packet type 21 | |
| [2] Received SSH_MSG_NEWKEYS | |
| [3] Set output algorithm to aes256-ctr | |
| [3] Set input algorithm to aes256-ctr | |
| [3] ssh_connect: Actual state : 7 | |
| cserverAuth | |
| state: 1 | |
| [3] Writing on the wire a packet having 17 bytes before | |
| [3] 17 bytes after comp + 10 padding bytes = 28 bytes packet | |
| [3] Encrypting packet with seq num: 3, len: 32 | |
| [3] Sent SSH_MSG_SERVICE_REQUEST (service ssh-userauth) | |
| [3] Enabling POLLOUT for socket | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 6 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 5 bytes left in buffer | |
| [3] Final size 5 | |
| [3] Type 96 | |
| [3] Dispatching handler for packet type 96 | |
| [3] Received eof on channel (47:0) | |
| EOF ON CHANNEL 0x7fffd4011020 | |
| [3] Writing on the wire a packet having 5 bytes before | |
| [3] 5 bytes after comp + 6 padding bytes = 12 bytes packet | |
| [3] Encrypting packet with seq num: 28, len: 16 | |
| [3] Enabling POLLOUT for socket | |
| [3] Sent a EOF on client channel (47:0) | |
| eof sent | |
| [3] Writing on the wire a packet having 5 bytes before | |
| [3] 5 bytes after comp + 6 padding bytes = 12 bytes packet | |
| [3] Encrypting packet with seq num: 29, len: 16 | |
| [3] Sent a close on client channel (47:0) | |
| channel closed | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 28 (0x1c) | |
| [3] Read a 28 bytes packet | |
| [3] Decrypting 16 bytes | |
| [3] 10 bytes padding, 27 bytes left in buffer | |
| [3] After padding, 17 bytes left in buffer | |
| [3] Final size 17 | |
| [3] Type 6 | |
| [3] Dispatching handler for packet type 6 | |
| [3] Received SSH_MSG_SERVICE_ACCEPT | |
| [3] Writing on the wire a packet having 55 bytes before | |
| [3] 55 bytes after comp + 4 padding bytes = 60 bytes packet | |
| [3] Encrypting packet with seq num: 4, len: 64 | |
| [3] Enabling POLLOUT for socket | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 10 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 1 bytes left in buffer | |
| [3] Final size 1 | |
| [3] Type 52 | |
| [3] Dispatching handler for packet type 52 | |
| [3] Received SSH_USERAUTH_SUCCESS | |
| [2] Authentication successful | |
| user auth OK | |
| [3] Writing on the wire a packet having 27 bytes before | |
| [3] 27 bytes after comp + 16 padding bytes = 44 bytes packet | |
| [3] Encrypting packet with seq num: 5, len: 48 | |
| [3] Enabling POLLOUT for socket | |
| [3] Sent a SSH_MSG_GLOBAL_REQUEST tcpip-forward | |
| [3] Decrypting 16 bytes | |
| [3] Packet size decrypted: 12 (0xc) | |
| [3] Read a 12 bytes packet | |
| [3] Decrypting 0 bytes | |
| [3] 10 bytes padding, 11 bytes left in buffer | |
| [3] After padding, 1 bytes left in buffer | |
| [3] Final size 1 | |
| [3] Type 81 | |
| [3] Dispatching handler for packet type 81 | |
| [3] Received SSH_REQUEST_SUCCESS | |
| [2] Global request tcpip-forward success | |
| channel_forward_listen ok | |
| [1] Error : No channel request of this type from server | |
| [1] Error : No channel request of this type from server | |
| [1] Error : No channel request of this type from server | |
| ... | |
| thread loops this till the end of days ;) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Jan 17 16:18:46 ubuntuserver /usr/bin/x2golistsessions[12517]: x2golistsessions has been called with no option | |
| Jan 17 16:18:46 ubuntuserver /usr/bin/x2gostartagent: x2gostartagent called with options: 800x600 adsl 16m-jpeg-9 unix-kde-depth_24 us pc105/us 1 R xterm | |
| Jan 17 16:18:46 ubuntuserver /usr/bin/x2gostartagent: client announced itself as ,,192.168.80.144'' | |
| Jan 17 16:18:46 ubuntuserver /usr/bin/x2gosessionlimit[12544]: x2gosessionlimit has been called | |
| Jan 17 16:18:46 ubuntuserver /usr/bin/x2golistsessions[12548]: x2golistsessions has been called with options: --all-servers | |
| Jan 17 16:18:46 ubuntuserver /usr/lib/x2go/x2gogetdisplays[12565]: db_getdisplays called, server: ubuntuserver; return value: | |
| Jan 17 16:18:46 ubuntuserver /usr/lib/x2go/x2gogetports[12588]: db_getports called, server: ubuntuserver; return value: | |
| Jan 17 16:18:46 ubuntuserver /usr/lib/x2go/x2goinsertsession[12609]: db_insertsession called, session ID: kjellski-50-1358435926_stRxterm_dp24, server: ubuntuserver, session ID: kjellski-50-1358435926_stRxterm_dp24 | |
| Jan 17 16:18:47 ubuntuserver /usr/lib/x2go/x2goinsertport[12624]: db_insertport called, session ID: kjellski-50-1358435926_stRxterm_dp24, server: ubuntuserver, SSH port: 30001 | |
| Jan 17 16:18:47 ubuntuserver /usr/lib/x2go/x2goinsertport[12639]: db_insertport called, session ID: kjellski-50-1358435926_stRxterm_dp24, server: ubuntuserver, SSH port: 30002 | |
| Jan 17 16:18:47 ubuntuserver /usr/lib/x2go/x2goinsertport[12654]: db_insertport called, session ID: kjellski-50-1358435926_stRxterm_dp24, server: ubuntuserver, SSH port: 30003 | |
| Jan 17 16:18:47 ubuntuserver /usr/bin/x2gofeature: x2gofeature called with options: X2GO_RUN_EXTENSIONS | |
| Jan 17 16:18:47 ubuntuserver /usr/share/x2go/x2gofeature.d/x2goserver-extensions.features: x2goserver-extensions.features called with options: X2GO_RUN_EXTENSIONS | |
| Jan 17 16:18:47 ubuntuserver /usr/bin/x2goserver-run-extensions: x2goserver-run-extensions called with options: kjellski-50-1358435926_stRxterm_dp24 pre-start | |
| Jan 17 16:18:47 ubuntuserver /usr/bin/x2gostartagent: successfully started X2Go agent session with ID kjellski-50-1358435926_stRxterm_dp24 | |
| Jan 17 16:18:47 ubuntuserver /usr/bin/x2gofeature: x2gofeature called with options: X2GO_RUN_EXTENSIONS | |
| Jan 17 16:18:47 ubuntuserver /usr/share/x2go/x2gofeature.d/x2goserver-extensions.features: x2goserver-extensions.features called with options: X2GO_RUN_EXTENSIONS | |
| Jan 17 16:18:47 ubuntuserver /usr/bin/x2goserver-run-extensions: x2goserver-run-extensions called with options: kjellski-50-1358435926_stRxterm_dp24 post-start | |
| Jan 17 16:18:47 ubuntuserver /usr/lib/x2go/x2gocreatesession[12758]: db_createsession called, session ID: kjellski-50-1358435926_stRxterm_dp24, cookie: e9ec653e2d72373bc74cc63e3eaf760c, client: 192.168.80.144, pid: 12722, graphics port: 30001, sound port: 30002, file sharing port: 30003 | |
| Jan 17 16:18:47 ubuntuserver /usr/bin/x2gostartagent: blocking creation of agent's keyboard file /home/kjellski/.x2go/C-kjellski-50-1358435926_stRxterm_dp24/keyboard as requested by session startup command | |
| Jan 17 16:18:48 ubuntuserver /usr/bin/x2gocmdexitmessage: x2gocmdexitmessage called with options: kjellski-50-1358435926_stRxterm_dp24 | |
| Jan 17 16:19:51 ubuntuserver /usr/lib/x2go/x2gochangestatus[14012]: db_changestatus called, session ID: kjellski-50-1358435926_stRxterm_dp24, new status: F | |
| Jan 17 16:19:51 ubuntuserver /usr/sbin/x2gocleansessions[11411]: kjellski-50-1358435926_stRxterm_dp24, pid 12722 does not exist, changing status from R to F | |
| Jan 17 16:19:51 ubuntuserver /usr/sbin/x2gocleansessions[11411]: kjellski-50-1358435926_stRxterm_dp24: unmounting all shares | |
| Jan 17 16:19:51 ubuntuserver /usr/bin/x2goumount-session[14026]: x2goumount-session has been called with options: kjellski-50-1358435926_stRxterm_dp24 | |
| Jan 17 16:19:51 ubuntuserver /usr/bin/x2goumount-session[14026]: db_getdisplay called, session ID: kjellski-50-1358435926_stRxterm_dp24; return value: 50 | |
| Jan 17 16:19:51 ubuntuserver /usr/bin/x2goumount-session[14026]: db_getmounts called, session ID: kjellski-50-1358435926_stRxterm_dp24; return value: |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment