Skip to content

Instantly share code, notes, and snippets.

@kjellski
Created January 17, 2013 15:34
Show Gist options
  • Select an option

  • Save kjellski/4556780 to your computer and use it in GitHub Desktop.

Select an option

Save kjellski/4556780 to your computer and use it in GitHub Desktop.
x2go server from ppa with different versions of the x2go client.
Debugging starts
&"warning: GDB: Failed to set controlling terminal: Invalid argument\n"
ONMainWindow constructor
Can't load translator (:/x2goclient_en_us) !
Can't load translator :/qt_en_US
ONMainWindows constructor finished, home Directory is: "/home/kjellski"
read 2 sessions from config file
start new ssh connection to server: "192.168.80.137" : "22" krb: false
starting ssh connection without kerberos authentication
SshMasterConnection, instance SshMasterConnection(0x83db00) created
SshMasterConnection, instance SshMasterConnection(0x83db00) entering thread
libSsh not inited yet, initting
[1] libssh 0.5.2 (c) 2003-2010 Aris Adamantiadis ([email protected]) Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads_noop
[3] host 192.168.80.137 matches an IP address
[2] Nonblocking connection socket: 16
[2] Socket connecting, now waiting for the callbacks to work
[3] ssh_connect: Actual timeout : 60000
[3] Received POLLOUT in connecting state
[1] Socket connection callback: 1 (0)
[3] Received banner: SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1
[1] SSH server banner: SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1
[1] Analyzing banner: SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1
[1] We are talking to an OpenSSH client version: 5.9 (50900)
[3] Enabling POLLOUT for socket
[3] Packet size decrypted: 980 (0x3d4)
[3] Read a 980 bytes packet
[3] 9 bytes padding, 979 bytes left in buffer
[3] After padding, 970 bytes left in buffer
[3] Final size 970
[3] Type 20
[3] Dispatching handler for packet type 20
[3] Writing on the wire a packet having 141 bytes before
[3] 141 bytes after comp + 6 padding bytes = 148 bytes packet
[3] Enabling POLLOUT for socket
[3] Writing on the wire a packet having 133 bytes before
[3] 133 bytes after comp + 6 padding bytes = 140 bytes packet
[3] Enabling POLLOUT for socket
[3] Packet size decrypted: 700 (0x2bc)
[3] Read a 700 bytes packet
[3] 7 bytes padding, 699 bytes left in buffer
[3] After padding, 692 bytes left in buffer
[3] Final size 692
[3] Type 31
[3] Dispatching handler for packet type 31
[2] Received SSH_KEXDH_REPLY
[3] Writing on the wire a packet having 1 bytes before
[3] 1 bytes after comp + 10 padding bytes = 12 bytes packet
[3] Enabling POLLOUT for socket
[2] SSH_MSG_NEWKEYS sent
[3] Processing 16 bytes left in socket buffer
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] 10 bytes padding, 11 bytes left in buffer
[3] After padding, 1 bytes left in buffer
[3] Final size 1
[3] Type 21
[3] Dispatching handler for packet type 21
[2] Received SSH_MSG_NEWKEYS
[3] Set output algorithm to aes256-ctr
[3] Set input algorithm to aes256-ctr
[3] ssh_connect: Actual state : 7
cserverAuth
state: 1
[3] Writing on the wire a packet having 17 bytes before
[3] 17 bytes after comp + 10 padding bytes = 28 bytes packet
[3] Encrypting packet with seq num: 3, len: 32
[3] Sent SSH_MSG_SERVICE_REQUEST (service ssh-userauth)
[3] Enabling POLLOUT for socket
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 10 bytes padding, 27 bytes left in buffer
[3] After padding, 17 bytes left in buffer
[3] Final size 17
[3] Type 6
[3] Dispatching handler for packet type 6
[3] Received SSH_MSG_SERVICE_ACCEPT
[3] Writing on the wire a packet having 55 bytes before
[3] 55 bytes after comp + 4 padding bytes = 60 bytes packet
[3] Encrypting packet with seq num: 4, len: 64
[3] Enabling POLLOUT for socket
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 10 bytes padding, 11 bytes left in buffer
[3] After padding, 1 bytes left in buffer
[3] Final size 1
[3] Type 52
[3] Dispatching handler for packet type 52
[3] Received SSH_USERAUTH_SUCCESS
[2] Authentication successful
user auth OK
ssh connection ok
continue normal x2go session
creating new channel
new channel: 0x7fffd4010160
executing remote: "sh -c "export HOSTNAME && x2golistsessions""
[2] Creating a channel 43 with 64000 window and 32768 max packet
[3] Writing on the wire a packet having 24 bytes before
[3] 24 bytes after comp + 19 padding bytes = 44 bytes packet
[3] Encrypting packet with seq num: 5, len: 48
[3] Enabling POLLOUT for socket
[3] Sent a SSH_MSG_CHANNEL_OPEN type session for channel 43
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 10 bytes padding, 27 bytes left in buffer
[3] After padding, 17 bytes left in buffer
[3] Final size 17
[3] Type 91
[3] Dispatching handler for packet type 91
[3] Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION
[2] Received a CHANNEL_OPEN_CONFIRMATION for channel 43:0
[2] Remote window : 0, maxpacket : 32768
[3] Writing on the wire a packet having 61 bytes before
[3] 61 bytes after comp + 14 padding bytes = 76 bytes packet
[3] Encrypting packet with seq num: 6, len: 80
[3] Enabling POLLOUT for socket
[3] Sent a SSH_MSG_CHANNEL_REQUEST exec
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 18 bytes padding, 27 bytes left in buffer
[3] After padding, 9 bytes left in buffer
[3] Final size 9
[3] Type 93
[3] Dispatching handler for packet type 93
[2] Adding 2097152 bytes to channel (43:0) (from 0 bytes)
[3] Processing 36 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 6 bytes padding, 11 bytes left in buffer
[3] After padding, 5 bytes left in buffer
[3] Final size 5
[3] Type 99
[3] Dispatching handler for packet type 99
[3] Received SSH_CHANNEL_SUCCESS on channel (43:0)
[2] Channel request exec success
new exec channel created
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 6 bytes padding, 11 bytes left in buffer
[3] After padding, 5 bytes left in buffer
[3] Final size 5
[3] Type 96
[3] Dispatching handler for packet type 96
[3] Received eof on channel (43:0)
[3] Processing 104 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 44 (0x2c)
[3] Read a 44 bytes packet
[3] Decrypting 32 bytes
[3] 18 bytes padding, 43 bytes left in buffer
[3] After padding, 25 bytes left in buffer
[3] Final size 25
[3] Type 98
[3] Dispatching handler for packet type 98
[3] received exit-status 0
[3] Processing 36 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 6 bytes padding, 11 bytes left in buffer
[3] After padding, 5 bytes left in buffer
[3] Final size 5
[3] Type 97
[3] Dispatching handler for packet type 97
[3] Received close on channel (43:0)
EOF ON CHANNEL 0x7fffd4010160
[3] Writing on the wire a packet having 5 bytes before
[3] 5 bytes after comp + 6 padding bytes = 12 bytes packet
[3] Encrypting packet with seq num: 7, len: 16
[3] Enabling POLLOUT for socket
[3] Sent a EOF on client channel (43:0)
eof sent
[3] Writing on the wire a packet having 5 bytes before
[3] 5 bytes after comp + 6 padding bytes = 12 bytes packet
[3] Encrypting packet with seq num: 8, len: 16
[3] Sent a close on client channel (43:0)
channel closed
ssh finished: true - ""
"x2gostartagent 800x600 adsl 16m-jpeg-9 unix-kde-depth_24 us pc105/us 1 R xterm"
creating new channel
new channel: 0x7fffd4010160
executing remote: "sh -c "x2gostartagent 800x600 adsl 16m-jpeg-9 unix-kde-depth_24 us pc105/us 1 R xterm""
[2] Creating a channel 44 with 64000 window and 32768 max packet
[3] Writing on the wire a packet having 24 bytes before
[3] 24 bytes after comp + 19 padding bytes = 44 bytes packet
[3] Encrypting packet with seq num: 9, len: 48
[3] Sent a SSH_MSG_CHANNEL_OPEN type session for channel 44
[3] Enabling POLLOUT for socket
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 10 bytes padding, 27 bytes left in buffer
[3] After padding, 17 bytes left in buffer
[3] Final size 17
[3] Type 91
[3] Dispatching handler for packet type 91
[3] Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION
[2] Received a CHANNEL_OPEN_CONFIRMATION for channel 44:1
[2] Remote window : 0, maxpacket : 32768
[3] Writing on the wire a packet having 104 bytes before
[3] 104 bytes after comp + 19 padding bytes = 124 bytes packet
[3] Encrypting packet with seq num: 10, len: 128
[3] Enabling POLLOUT for socket
[3] Sent a SSH_MSG_CHANNEL_REQUEST exec
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 18 bytes padding, 27 bytes left in buffer
[3] After padding, 9 bytes left in buffer
[3] Final size 9
[3] Type 93
[3] Dispatching handler for packet type 93
[2] Adding 2097152 bytes to channel (44:1) (from 0 bytes)
[3] Processing 36 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 6 bytes padding, 11 bytes left in buffer
[3] After padding, 5 bytes left in buffer
[3] Final size 5
[3] Type 99
[3] Dispatching handler for packet type 99
[3] Received SSH_CHANNEL_SUCCESS on channel (44:1)
[2] Channel request exec success
new exec channel created
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 10 bytes padding, 27 bytes left in buffer
[3] After padding, 17 bytes left in buffer
[3] Final size 17
[3] Type 95
[3] Dispatching handler for packet type 95
[2] Channel receiving 4 bytes data in 1 (local win=64000 remote win=2097152)
[1] placing 4 bytes into channel buffer (stderr=1)
[2] Channel windows are now (local win=63996 remote win=2097152)
[2] Read (524287) buffered : 4 bytes. Window: 63996
[3] Writing on the wire a packet having 9 bytes before
[3] 9 bytes after comp + 18 padding bytes = 28 bytes packet
[3] Encrypting packet with seq num: 11, len: 32
[3] Enabling POLLOUT for socket
[2] growing window (channel 44:1) to 1280000 bytes
new err data: "ln: "
[3] Decrypting 16 bytes
[3] Packet size decrypted: 124 (0x7c)
[3] Read a 124 bytes packet
[3] Decrypting 112 bytes
[3] 7 bytes padding, 123 bytes left in buffer
[3] After padding, 116 bytes left in buffer
[3] Final size 116
[3] Type 95
[3] Dispatching handler for packet type 95
[2] Channel receiving 103 bytes data in 1 (local win=1280000 remote win=2097152)
[1] placing 103 bytes into channel buffer (stderr=1)
[2] Channel windows are now (local win=1279897 remote win=2097152)
[3] Processing 120 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 44 (0x2c)
[3] Read a 44 bytes packet
[3] Decrypting 32 bytes
[3] 17 bytes padding, 43 bytes left in buffer
[3] After padding, 26 bytes left in buffer
[3] Final size 26
[3] Type 95
[3] Dispatching handler for packet type 95
[2] Channel receiving 13 bytes data in 1 (local win=1279897 remote win=2097152)
[1] placing 13 bytes into channel buffer (stderr=1)
[2] Channel windows are now (local win=1279884 remote win=2097152)
[3] Processing 52 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 13 bytes padding, 27 bytes left in buffer
[3] After padding, 14 bytes left in buffer
[3] Final size 14
[3] Type 95
[3] Dispatching handler for packet type 95
[2] Channel receiving 1 bytes data in 1 (local win=1279884 remote win=2097152)
[1] placing 1 bytes into channel buffer (stderr=1)
[2] Channel windows are now (local win=1279883 remote win=2097152)
[2] Read (524287) buffered : 117 bytes. Window: 1279883
new err data: "failed to create symbolic link `/tmp/.x2go-kjellski/session-C-kjellski-50-1358436605_stRxterm_dp24.log': File exists
"
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 15 bytes padding, 27 bytes left in buffer
[3] After padding, 12 bytes left in buffer
[3] Final size 12
[3] Type 94
[3] Dispatching handler for packet type 94
[2] Channel receiving 3 bytes data in 0 (local win=1279883 remote win=2097152)
[1] placing 3 bytes into channel buffer (stderr=0)
[2] Channel windows are now (local win=1279880 remote win=2097152)
[3] Decrypting 16 bytes
[3] Packet size decrypted: 60 (0x3c)
[3] Read a 60 bytes packet
[3] Decrypting 48 bytes
[3] 17 bytes padding, 59 bytes left in buffer
[3] After padding, 42 bytes left in buffer
[3] Final size 42
[3] Type 94
[3] Dispatching handler for packet type 94
[2] Channel receiving 33 bytes data in 0 (local win=1279880 remote win=2097152)
[1] placing 33 bytes into channel buffer (stderr=0)
[2] Channel windows are now (local win=1279847 remote win=2097152)
[2] Read (524287) buffered : 36 bytes. Window: 1279847
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 12 bytes padding, 27 bytes left in buffer
[3] After padding, 15 bytes left in buffer
[3] Final size 15
[3] Type 94
[3] Dispatching handler for packet type 94
[2] Channel receiving 6 bytes data in 0 (local win=1279847 remote win=2097152)
[1] placing 6 bytes into channel buffer (stderr=0)
[2] Channel windows are now (local win=1279841 remote win=2097152)
[3] Decrypting 16 bytes
[3] Packet size decrypted: 60 (0x3c)
[3] Read a 60 bytes packet
[3] Decrypting 48 bytes
[3] 13 bytes padding, 59 bytes left in buffer
[3] After padding, 46 bytes left in buffer
[3] Final size 46
[3] Type 94
[3] Dispatching handler for packet type 94
[2] Channel receiving 37 bytes data in 0 (local win=1279841 remote win=2097152)
[1] placing 37 bytes into channel buffer (stderr=0)
[2] Channel windows are now (local win=1279804 remote win=2097152)
[2] Read (524287) buffered : 43 bytes. Window: 1279804
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 12 bytes padding, 27 bytes left in buffer
[3] After padding, 15 bytes left in buffer
[3] Final size 15
[3] Type 94
[3] Dispatching handler for packet type 94
[2] Channel receiving 6 bytes data in 0 (local win=1279804 remote win=2097152)
[1] placing 6 bytes into channel buffer (stderr=0)
[2] Channel windows are now (local win=1279798 remote win=2097152)
[2] Read (524287) buffered : 6 bytes. Window: 1279798
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 12 bytes padding, 27 bytes left in buffer
[3] After padding, 15 bytes left in buffer
[3] Final size 15
[3] Type 94
[3] Dispatching handler for packet type 94
[2] Channel receiving 6 bytes data in 0 (local win=1279798 remote win=2097152)
[1] placing 6 bytes into channel buffer (stderr=0)
[2] Channel windows are now (local win=1279792 remote win=2097152)
[2] Read (524287) buffered : 6 bytes. Window: 1279792
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 12 bytes padding, 27 bytes left in buffer
[3] After padding, 15 bytes left in buffer
[3] Final size 15
[3] Type 94
[3] Dispatching handler for packet type 94
[2] Channel receiving 6 bytes data in 0 (local win=1279792 remote win=2097152)
[1] placing 6 bytes into channel buffer (stderr=0)
[2] Channel windows are now (local win=1279786 remote win=2097152)
[2] Read (524287) buffered : 6 bytes. Window: 1279786
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 6 bytes padding, 11 bytes left in buffer
[3] After padding, 5 bytes left in buffer
[3] Final size 5
[3] Type 96
[3] Dispatching handler for packet type 96
[3] Received eof on channel (44:1)
[3] Processing 104 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 44 (0x2c)
[3] Read a 44 bytes packet
[3] Decrypting 32 bytes
[3] 18 bytes padding, 43 bytes left in buffer
[3] After padding, 25 bytes left in buffer
[3] Final size 25
[3] Type 98
[3] Dispatching handler for packet type 98
[3] received exit-status 0
[3] Processing 36 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 6 bytes padding, 11 bytes left in buffer
[3] After padding, 5 bytes left in buffer
[3] Final size 5
[3] Type 97
[3] Dispatching handler for packet type 97
[3] Received close on channel (44:1)
EOF ON CHANNEL 0x7fffd4010160
[3] Writing on the wire a packet having 5 bytes before
[3] 5 bytes after comp + 6 padding bytes = 12 bytes packet
[3] Encrypting packet with seq num: 12, len: 16
[3] Enabling POLLOUT for socket
[3] Sent a EOF on client channel (44:1)
eof sent
[3] Writing on the wire a packet having 5 bytes before
[3] 5 bytes after comp + 6 padding bytes = 12 bytes packet
[3] Encrypting packet with seq num: 13, len: 16
[3] Sent a close on client channel (44:1)
channel closed
ssh finished: true - "50
e76958b35360b79fb8f844c1947196da
24525
kjellski-50-1358436605_stRxterm_dp24
30001
30002
30003
"
Agent output: "50
e76958b35360b79fb8f844c1947196da
24525
kjellski-50-1358436605_stRxterm_dp24
30001
30002
30003
"
starting nxproxy with: "nxproxy -S nx/nx,options=/home/kjellski/.x2go/S-kjellski-50-1358436605_stRxterm_dp24/options:50"
Direct tunnel: waiting for connections on "localhost" : 31001
creating new channel
new channel: 0x7fffd4010160
executing remote: "sh -c "echo "default-server=localhost:30002"> ~/.x2go/C-kjellski-50-1358436605_stRxterm_dp24/.pulse-client.conf;echo "cookie-file=.x2go/C-kjellski-50-1358436605_stRxterm_dp24/.pulse-cookie">> ~/.x2go/C-kjellski-50-1358436605_stRxterm_dp24/.pulse-client.conf""
[2] Creating a channel 45 with 64000 window and 32768 max packet
[3] Writing on the wire a packet having 24 bytes before
[3] 24 bytes after comp + 19 padding bytes = 44 bytes packet
[3] Encrypting packet with seq num: 14, len: 48
[3] Sent a SSH_MSG_CHANNEL_OPEN type session for channel 45
[3] Enabling POLLOUT for socket
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 10 bytes padding, 27 bytes left in buffer
[3] After padding, 17 bytes left in buffer
[3] Final size 17
[3] Type 91
[3] Dispatching handler for packet type 91
[3] Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION
[2] Received a CHANNEL_OPEN_CONFIRMATION for channel 45:0
[2] Remote window : 0, maxpacket : 32768
[3] Writing on the wire a packet having 276 bytes before
[3] 276 bytes after comp + 7 padding bytes = 284 bytes packet
[3] Encrypting packet with seq num: 15, len: 288
[3] Enabling POLLOUT for socket
[3] Sent a SSH_MSG_CHANNEL_REQUEST exec
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 18 bytes padding, 27 bytes left in buffer
[3] After padding, 9 bytes left in buffer
[3] Final size 9
[3] Type 93
[3] Dispatching handler for packet type 93
[2] Adding 2097152 bytes to channel (45:0) (from 0 bytes)
[3] Processing 36 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 6 bytes padding, 11 bytes left in buffer
[3] After padding, 5 bytes left in buffer
[3] Final size 5
[3] Type 99
[3] Dispatching handler for packet type 99
[3] Received SSH_CHANNEL_SUCCESS on channel (45:0)
[2] Channel request exec success
new exec channel created
[3] Decrypting 16 bytes
[3] Packet size decrypted: 44 (0x2c)
[3] Read a 44 bytes packet
[3] Decrypting 32 bytes
[3] 18 bytes padding, 43 bytes left in buffer
[3] After padding, 25 bytes left in buffer
[3] Final size 25
[3] Type 98
[3] Dispatching handler for packet type 98
[3] received exit-status 0
[3] Processing 72 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 6 bytes padding, 11 bytes left in buffer
[3] After padding, 5 bytes left in buffer
[3] Final size 5
[3] Type 96
[3] Dispatching handler for packet type 96
[3] Received eof on channel (45:0)
[3] Processing 36 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 6 bytes padding, 11 bytes left in buffer
[3] After padding, 5 bytes left in buffer
[3] Final size 5
[3] Type 97
[3] Dispatching handler for packet type 97
[3] Received close on channel (45:0)
EOF ON CHANNEL 0x7fffd4010160
[3] Writing on the wire a packet having 5 bytes before
[3] 5 bytes after comp + 6 padding bytes = 12 bytes packet
[3] Encrypting packet with seq num: 16, len: 16
[3] Enabling POLLOUT for socket
[3] Sent a EOF on client channel (45:0)
eof sent
[3] Writing on the wire a packet having 5 bytes before
[3] 5 bytes after comp + 6 padding bytes = 12 bytes packet
[3] Encrypting packet with seq num: 17, len: 16
[3] Sent a close on client channel (45:0)
channel closed
SshMasterConnection, instance SshMasterConnection(0xc3cde0) created (reverse tunnel)
dst path: "~/.x2go/C-kjellski-50-1358436605_stRxterm_dp24" file: ".pulse-cookie"
[2] Initializing scp session write recursive on location '~/.x2go/C-kjellski-50-1358436605_stRxterm_dp24'
[2] Creating a channel 46 with 64000 window and 32768 max packet
[3] Writing on the wire a packet having 24 bytes before
[3] 24 bytes after comp + 19 padding bytes = 44 bytes packet
[3] Encrypting packet with seq num: 18, len: 48
[3] Sent a SSH_MSG_CHANNEL_OPEN type session for channel 46
[3] Enabling POLLOUT for socket
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 10 bytes padding, 27 bytes left in buffer
[3] After padding, 17 bytes left in buffer
[3] Final size 17
[3] Type 91
[3] Dispatching handler for packet type 91
[3] Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION
[2] Received a CHANNEL_OPEN_CONFIRMATION for channel 46:1
[2] Remote window : 0, maxpacket : 32768
[3] Writing on the wire a packet having 74 bytes before
[3] 74 bytes after comp + 17 padding bytes = 92 bytes packet
[3] Encrypting packet with seq num: 19, len: 96
[3] Enabling POLLOUT for socket
[3] Sent a SSH_MSG_CHANNEL_REQUEST exec
ssh finished: true - ""
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 18 bytes padding, 27 bytes left in buffer
[3] After padding, 9 bytes left in buffer
[3] Final size 9
[3] Type 93
[3] Dispatching handler for packet type 93
[2] Adding 2097152 bytes to channel (46:1) (from 0 bytes)
[3] Processing 36 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 6 bytes padding, 11 bytes left in buffer
[3] After padding, 5 bytes left in buffer
[3] Final size 5
[3] Type 99
[3] Dispatching handler for packet type 99
[3] Received SSH_CHANNEL_SUCCESS on channel (46:1)
[2] Channel request exec success
[2] Read (1) buffered : 0 bytes. Window: 64000
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 17 bytes padding, 27 bytes left in buffer
[3] After padding, 10 bytes left in buffer
[3] Final size 10
[3] Type 94
[3] Dispatching handler for packet type 94
[2] Channel receiving 1 bytes data in 0 (local win=64000 remote win=2097152)
[1] placing 1 bytes into channel buffer (stderr=0)
[2] Channel windows are now (local win=63999 remote win=2097152)
[3] Writing on the wire a packet having 9 bytes before
[3] 9 bytes after comp + 18 padding bytes = 28 bytes packet
[3] Encrypting packet with seq num: 20, len: 32
[3] Enabling POLLOUT for socket
[2] growing window (channel 46:1) to 1280000 bytes
deleting proxy
[2] SCP pushing file .pulse-cookie, size 256 with permissions '0600'
[3] Writing on the wire a packet having 33 bytes before
[3] 33 bytes after comp + 10 padding bytes = 44 bytes packet
[3] Encrypting packet with seq num: 21, len: 48
[1] channel_write wrote 24 bytes
nxproxy not running
[3] Enabling POLLOUT for socket
[2] Read (1) buffered : 0 bytes. Window: 1280000
proxy deleted
checking exit status
check command message
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 17 bytes padding, 27 bytes left in buffer
[3] After padding, 10 bytes left in buffer
[3] Final size 10
[3] Type 94
[3] Dispatching handler for packet type 94
[2] Channel receiving 1 bytes data in 0 (local win=1280000 remote win=2097128)
[1] placing 1 bytes into channel buffer (stderr=0)
[2] Channel windows are now (local win=1279999 remote win=2097128)
[3] Writing on the wire a packet having 265 bytes before
[3] 265 bytes after comp + 18 padding bytes = 284 bytes packet
[3] Encrypting packet with seq num: 22, len: 288
[3] Enabling POLLOUT for socket
[1] channel_write wrote 256 bytes
[3] Writing on the wire a packet having 10 bytes before
[3] 10 bytes after comp + 17 padding bytes = 28 bytes packet
[3] Encrypting packet with seq num: 23, len: 32
[3] Enabling POLLOUT for socket
[1] channel_write wrote 1 bytes
scp ok: "/home/kjellski/.pulse-cookie" -> "kjellski" @ "192.168.80.137" : "~/.x2go/C-kjellski-50-1358436605_stRxterm_dp24/.pulse-cookie"
[3] Writing on the wire a packet having 5 bytes before
[3] 5 bytes after comp + 6 padding bytes = 12 bytes packet
[3] Encrypting packet with seq num: 24, len: 16
[3] Enabling POLLOUT for socket
[3] Sent a EOF on client channel (46:1)
[2] Read (128) buffered : 0 bytes. Window: 1279999
SshMasterConnection, instance SshMasterConnection(0xc3cde0) entering thread
already inited
[1] libssh 0.5.2 (c) 2003-2010 Aris Adamantiadis ([email protected]) Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads_noop
[3] host 192.168.80.137 matches an IP address
[2] Nonblocking connection socket: 20
[2] Socket connecting, now waiting for the callbacks to work
[3] ssh_connect: Actual timeout : 60000
[3] Decrypting 16 bytes
[3] Packet size decrypted: 44 (0x2c)
[3] Read a 44 bytes packet
[3] Decrypting 32 bytes
[3] 18 bytes padding, 43 bytes left in buffer
[3] After padding, 25 bytes left in buffer
[3] Final size 25
[3] Type 98
[3] Dispatching handler for packet type 98
[3] received exit-status 0
[3] Processing 124 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 17 bytes padding, 27 bytes left in buffer
[3] After padding, 10 bytes left in buffer
[3] Final size 10
[3] Type 94
[3] Dispatching handler for packet type 94
[2] Channel receiving 1 bytes data in 0 (local win=1279999 remote win=2096871)
[1] placing 1 bytes into channel buffer (stderr=0)
[2] Channel windows are now (local win=1279998 remote win=2096871)
[3] Processing 72 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 6 bytes padding, 11 bytes left in buffer
[3] After padding, 5 bytes left in buffer
[3] Final size 5
[3] Type 96
[3] Dispatching handler for packet type 96
[3] Received eof on channel (46:1)
[3] Processing 36 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 6 bytes padding, 11 bytes left in buffer
[3] After padding, 5 bytes left in buffer
[3] Final size 5
[3] Type 97
[3] Dispatching handler for packet type 97
[3] Received close on channel (46:1)
[3] Writing on the wire a packet having 5 bytes before
[3] 5 bytes after comp + 6 padding bytes = 12 bytes packet
[3] Encrypting packet with seq num: 25, len: 16
[3] Enabling POLLOUT for socket
[3] Sent a close on client channel (46:1)
creating new channel
new channel: 0x7fffd4011020
executing remote: "sh -c "x2gocmdexitmessage kjellski-50-1358436605_stRxterm_dp24""
[2] Creating a channel 47 with 64000 window and 32768 max packet
[3] Writing on the wire a packet having 24 bytes before
[3] 24 bytes after comp + 19 padding bytes = 44 bytes packet
[3] Encrypting packet with seq num: 26, len: 48
[3] Sent a SSH_MSG_CHANNEL_OPEN type session for channel 47
[3] Enabling POLLOUT for socket
[3] Received POLLOUT in connecting state
[1] Socket connection callback: 1 (0)
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 10 bytes padding, 27 bytes left in buffer
[3] After padding, 17 bytes left in buffer
[3] Final size 17
[3] Type 91
[3] Dispatching handler for packet type 91
[3] Received SSH2_MSG_CHANNEL_OPEN_CONFIRMATION
[2] Received a CHANNEL_OPEN_CONFIRMATION for channel 47:0
[2] Remote window : 0, maxpacket : 32768
[3] Writing on the wire a packet having 81 bytes before
[3] 81 bytes after comp + 10 padding bytes = 92 bytes packet
[3] Encrypting packet with seq num: 27, len: 96
[3] Enabling POLLOUT for socket
[3] Sent a SSH_MSG_CHANNEL_REQUEST exec
*** glibc detected *** /home/kjellski/x2go/x2goclient-build-desktop-Qt_4_8_1_in_PATH__System__Debug/x2goclient: corrupted double-linked list: 0x000000000085ca40 ***
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 18 bytes padding, 27 bytes left in buffer
[3] After padding, 9 bytes left in buffer
[3] Final size 9
[3] Type 93
[3] Dispatching handler for packet type 93
[2] Adding 2097152 bytes to channel (47:0) (from 0 bytes)
[3] Processing 36 bytes left in socket buffer
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 6 bytes padding, 11 bytes left in buffer
[3] After padding, 5 bytes left in buffer
[3] Final size 5
[3] Type 99
[3] Dispatching handler for packet type 99
[3] Received SSH_CHANNEL_SUCCESS on channel (47:0)
[2] Channel request exec success
new exec channel created
[3] Received banner: SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1
[1] SSH server banner: SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1
[1] Analyzing banner: SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1
[1] We are talking to an OpenSSH client version: 5.9 (50900)
[3] Enabling POLLOUT for socket
[3] Packet size decrypted: 980 (0x3d4)
[3] Read a 980 bytes packet
[3] 9 bytes padding, 979 bytes left in buffer
[3] After padding, 970 bytes left in buffer
[3] Final size 970
[3] Type 20
[3] Dispatching handler for packet type 20
[3] Writing on the wire a packet having 141 bytes before
[3] 141 bytes after comp + 6 padding bytes = 148 bytes packet
[3] Enabling POLLOUT for socket
[3] Writing on the wire a packet having 134 bytes before
[3] 134 bytes after comp + 5 padding bytes = 140 bytes packet
[3] Enabling POLLOUT for socket
[3] Packet size decrypted: 700 (0x2bc)
[3] Read a 700 bytes packet
[3] 8 bytes padding, 699 bytes left in buffer
[3] After padding, 691 bytes left in buffer
[3] Final size 691
[3] Type 31
[3] Dispatching handler for packet type 31
[2] Received SSH_KEXDH_REPLY
[3] Writing on the wire a packet having 1 bytes before
[3] 1 bytes after comp + 10 padding bytes = 12 bytes packet
[3] Enabling POLLOUT for socket
[2] SSH_MSG_NEWKEYS sent
[3] Processing 16 bytes left in socket buffer
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] 10 bytes padding, 11 bytes left in buffer
[3] After padding, 1 bytes left in buffer
[3] Final size 1
[3] Type 21
[3] Dispatching handler for packet type 21
[2] Received SSH_MSG_NEWKEYS
[3] Set output algorithm to aes256-ctr
[3] Set input algorithm to aes256-ctr
[3] ssh_connect: Actual state : 7
cserverAuth
state: 1
[3] Writing on the wire a packet having 17 bytes before
[3] 17 bytes after comp + 10 padding bytes = 28 bytes packet
[3] Encrypting packet with seq num: 3, len: 32
[3] Sent SSH_MSG_SERVICE_REQUEST (service ssh-userauth)
[3] Enabling POLLOUT for socket
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 6 bytes padding, 11 bytes left in buffer
[3] After padding, 5 bytes left in buffer
[3] Final size 5
[3] Type 96
[3] Dispatching handler for packet type 96
[3] Received eof on channel (47:0)
EOF ON CHANNEL 0x7fffd4011020
[3] Writing on the wire a packet having 5 bytes before
[3] 5 bytes after comp + 6 padding bytes = 12 bytes packet
[3] Encrypting packet with seq num: 28, len: 16
[3] Enabling POLLOUT for socket
[3] Sent a EOF on client channel (47:0)
eof sent
[3] Writing on the wire a packet having 5 bytes before
[3] 5 bytes after comp + 6 padding bytes = 12 bytes packet
[3] Encrypting packet with seq num: 29, len: 16
[3] Sent a close on client channel (47:0)
channel closed
[3] Decrypting 16 bytes
[3] Packet size decrypted: 28 (0x1c)
[3] Read a 28 bytes packet
[3] Decrypting 16 bytes
[3] 10 bytes padding, 27 bytes left in buffer
[3] After padding, 17 bytes left in buffer
[3] Final size 17
[3] Type 6
[3] Dispatching handler for packet type 6
[3] Received SSH_MSG_SERVICE_ACCEPT
[3] Writing on the wire a packet having 55 bytes before
[3] 55 bytes after comp + 4 padding bytes = 60 bytes packet
[3] Encrypting packet with seq num: 4, len: 64
[3] Enabling POLLOUT for socket
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 10 bytes padding, 11 bytes left in buffer
[3] After padding, 1 bytes left in buffer
[3] Final size 1
[3] Type 52
[3] Dispatching handler for packet type 52
[3] Received SSH_USERAUTH_SUCCESS
[2] Authentication successful
user auth OK
[3] Writing on the wire a packet having 27 bytes before
[3] 27 bytes after comp + 16 padding bytes = 44 bytes packet
[3] Encrypting packet with seq num: 5, len: 48
[3] Enabling POLLOUT for socket
[3] Sent a SSH_MSG_GLOBAL_REQUEST tcpip-forward
[3] Decrypting 16 bytes
[3] Packet size decrypted: 12 (0xc)
[3] Read a 12 bytes packet
[3] Decrypting 0 bytes
[3] 10 bytes padding, 11 bytes left in buffer
[3] After padding, 1 bytes left in buffer
[3] Final size 1
[3] Type 81
[3] Dispatching handler for packet type 81
[3] Received SSH_REQUEST_SUCCESS
[2] Global request tcpip-forward success
channel_forward_listen ok
[1] Error : No channel request of this type from server
[1] Error : No channel request of this type from server
[1] Error : No channel request of this type from server
...
thread loops this till the end of days ;)
Jan 17 16:18:46 ubuntuserver /usr/bin/x2golistsessions[12517]: x2golistsessions has been called with no option
Jan 17 16:18:46 ubuntuserver /usr/bin/x2gostartagent: x2gostartagent called with options: 800x600 adsl 16m-jpeg-9 unix-kde-depth_24 us pc105/us 1 R xterm
Jan 17 16:18:46 ubuntuserver /usr/bin/x2gostartagent: client announced itself as ,,192.168.80.144''
Jan 17 16:18:46 ubuntuserver /usr/bin/x2gosessionlimit[12544]: x2gosessionlimit has been called
Jan 17 16:18:46 ubuntuserver /usr/bin/x2golistsessions[12548]: x2golistsessions has been called with options: --all-servers
Jan 17 16:18:46 ubuntuserver /usr/lib/x2go/x2gogetdisplays[12565]: db_getdisplays called, server: ubuntuserver; return value:
Jan 17 16:18:46 ubuntuserver /usr/lib/x2go/x2gogetports[12588]: db_getports called, server: ubuntuserver; return value:
Jan 17 16:18:46 ubuntuserver /usr/lib/x2go/x2goinsertsession[12609]: db_insertsession called, session ID: kjellski-50-1358435926_stRxterm_dp24, server: ubuntuserver, session ID: kjellski-50-1358435926_stRxterm_dp24
Jan 17 16:18:47 ubuntuserver /usr/lib/x2go/x2goinsertport[12624]: db_insertport called, session ID: kjellski-50-1358435926_stRxterm_dp24, server: ubuntuserver, SSH port: 30001
Jan 17 16:18:47 ubuntuserver /usr/lib/x2go/x2goinsertport[12639]: db_insertport called, session ID: kjellski-50-1358435926_stRxterm_dp24, server: ubuntuserver, SSH port: 30002
Jan 17 16:18:47 ubuntuserver /usr/lib/x2go/x2goinsertport[12654]: db_insertport called, session ID: kjellski-50-1358435926_stRxterm_dp24, server: ubuntuserver, SSH port: 30003
Jan 17 16:18:47 ubuntuserver /usr/bin/x2gofeature: x2gofeature called with options: X2GO_RUN_EXTENSIONS
Jan 17 16:18:47 ubuntuserver /usr/share/x2go/x2gofeature.d/x2goserver-extensions.features: x2goserver-extensions.features called with options: X2GO_RUN_EXTENSIONS
Jan 17 16:18:47 ubuntuserver /usr/bin/x2goserver-run-extensions: x2goserver-run-extensions called with options: kjellski-50-1358435926_stRxterm_dp24 pre-start
Jan 17 16:18:47 ubuntuserver /usr/bin/x2gostartagent: successfully started X2Go agent session with ID kjellski-50-1358435926_stRxterm_dp24
Jan 17 16:18:47 ubuntuserver /usr/bin/x2gofeature: x2gofeature called with options: X2GO_RUN_EXTENSIONS
Jan 17 16:18:47 ubuntuserver /usr/share/x2go/x2gofeature.d/x2goserver-extensions.features: x2goserver-extensions.features called with options: X2GO_RUN_EXTENSIONS
Jan 17 16:18:47 ubuntuserver /usr/bin/x2goserver-run-extensions: x2goserver-run-extensions called with options: kjellski-50-1358435926_stRxterm_dp24 post-start
Jan 17 16:18:47 ubuntuserver /usr/lib/x2go/x2gocreatesession[12758]: db_createsession called, session ID: kjellski-50-1358435926_stRxterm_dp24, cookie: e9ec653e2d72373bc74cc63e3eaf760c, client: 192.168.80.144, pid: 12722, graphics port: 30001, sound port: 30002, file sharing port: 30003
Jan 17 16:18:47 ubuntuserver /usr/bin/x2gostartagent: blocking creation of agent's keyboard file /home/kjellski/.x2go/C-kjellski-50-1358435926_stRxterm_dp24/keyboard as requested by session startup command
Jan 17 16:18:48 ubuntuserver /usr/bin/x2gocmdexitmessage: x2gocmdexitmessage called with options: kjellski-50-1358435926_stRxterm_dp24
Jan 17 16:19:51 ubuntuserver /usr/lib/x2go/x2gochangestatus[14012]: db_changestatus called, session ID: kjellski-50-1358435926_stRxterm_dp24, new status: F
Jan 17 16:19:51 ubuntuserver /usr/sbin/x2gocleansessions[11411]: kjellski-50-1358435926_stRxterm_dp24, pid 12722 does not exist, changing status from R to F
Jan 17 16:19:51 ubuntuserver /usr/sbin/x2gocleansessions[11411]: kjellski-50-1358435926_stRxterm_dp24: unmounting all shares
Jan 17 16:19:51 ubuntuserver /usr/bin/x2goumount-session[14026]: x2goumount-session has been called with options: kjellski-50-1358435926_stRxterm_dp24
Jan 17 16:19:51 ubuntuserver /usr/bin/x2goumount-session[14026]: db_getdisplay called, session ID: kjellski-50-1358435926_stRxterm_dp24; return value: 50
Jan 17 16:19:51 ubuntuserver /usr/bin/x2goumount-session[14026]: db_getmounts called, session ID: kjellski-50-1358435926_stRxterm_dp24; return value:
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment