Arik Baratz wrote:


Leonid,

Can you please do ssh -X to the machine, and then:

echo $DISPLAY

will give you something along the lines of "localhost:10.0"

[EMAIL PROTECTED] leonid $ echo $DISPLAY
localhost:10.0
[EMAIL PROTECTED] leonid $


Then take the number after the ':' (10 in this example) and add 6000 to it, and run telnet:


telnet localhost 6010

[EMAIL PROTECTED] leonid $ su -
Password:
lenik root # netstat -lntp
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:4000 0.0.0.0:* LISTEN 1121/mlnet
tcp 0 0 0.0.0.0:4001 0.0.0.0:* LISTEN 1121/mlnet
tcp 0 0 0.0.0.0:4002 0.0.0.0:* LISTEN 1121/mlnet
tcp 0 0 0.0.0.0:6882 0.0.0.0:* LISTEN 1121/mlnet
tcp 0 0 0.0.0.0:4080 0.0.0.0:* LISTEN 1121/mlnet
tcp 0 0 0.0.0.0:4721 0.0.0.0:* LISTEN 1121/mlnet
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 1282/sshd
tcp 0 0 0.0.0.0:4662 0.0.0.0:* LISTEN 1121/mlnet
tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN 1241/
tcp 0 0 127.0.0.1:6010 0.0.0.0:* LISTEN 31614/



Replace the 6010 with the number you got (if it's different than 10). Let us all know what that gives you - the exact error message.


Can you also do

iptables -L -v -n

and mail the result? I'm assuming that the machine has iptables. The ipchains command is very similar.

lenik root # iptables-save
# Generated by iptables-save v1.2.8 on Tue Nov 18 13:50:24 2003
*filter
:INPUT ACCEPT [7248:493703]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [7557:528586]
COMMIT
# Completed on Tue Nov 18 13:50:24 2003

lenik root # iptables -L -v -n
Chain INPUT (policy ACCEPT 7295 packets, 497K bytes)
pkts bytes target prot opt in out source destination


Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination


Chain OUTPUT (policy ACCEPT 7588 packets, 532K bytes)
pkts bytes target prot opt in out source destination
lenik root #


My usual configuration of iptables allows all connections from localhost, but i removed all rules nevertheless for the testing, and no good.


My current guess is that you have ipchains/iptables rules on computer "A" that prevent local users from connecting to port 6010 from localhost, but that needs to be confirmed. What's baffeling to me is that the error message mentions the socket() function rather than the connect() function as I would expect in the case that my assumption is correct.


-- Arik
**********************************************************************
This email and attachments have been scanned for
potential proprietary or sensitive information leakage.


PortAuthority(TM) Server Keeping Information Inside
Vidius, Inc. www.vidius.com
**********************************************************************



===============================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]





================================================================= To unsubscribe, send mail to [EMAIL PROTECTED] with the word "unsubscribe" in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]



Reply via email to