On Wed, 12 Sep 2018 14:03:17 +0200 Solene Rapenne <sol...@perso.pw> wrote:
| > | Brett Mahar <br...@coiloptic.org> wrote: | > | > | > I recently updated my amd-64-current machine to the Sept 7th snapshot (previous snapshot was July 17th). | > | > | > | > Prior to update both firefox and iridium browsers were able to be run using 'ssh -Y' as another user on the same machine. Now they do not run - firefox never finishes launching and iridium has a popup windown that says 'page unresponsive'. | | do you have X11Forwarding yes in your sshd_config? | | If so, can you check output if you add -v to ssh command line, lines related to | x11? Hi Solene, Yes I have X11Forwarding yes I added -v to the ssh command, output is below, the only line that stands out is: debug1: confirm x11 [11321:1527161448:0913/074849.948275:ERROR:process_metrics_openbsd.cc(164)] Not implemented reached in bool base::GetSystemMemoryInfo(base::SystemMemoryInfoKB *) If I use a similar command with Links browser, it still works as normal: $ ssh -v -Y -i /home/brett/.ssh/rmit_id rmit@127.0.0.1 links -g & So maybe it is by coiincidence that the behaviour of Firefox, Chrome, and Iridium has altered in the last month or so? Brett. ======================================================================================================= Full output using Iridium browser: [1] 11492 $ OpenSSH_7.8, LibreSSL 2.8.0 debug1: Reading configuration data /etc/ssh/ssh_config debug1: Connecting to 127.0.0.1 [127.0.0.1] port 22. debug1: Connection established. debug1: identity file /home/brett/.ssh/rmit_id type 0 debug1: identity file /home/brett/.ssh/rmit_id-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_7.8 debug1: Remote protocol version 2.0, remote software version OpenSSH_7.8 debug1: match: OpenSSH_7.8 pat OpenSSH* compat 0x04000000 debug1: Authenticating to 127.0.0.1:22 as 'rmit' debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: curve25519-sha256 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 debug1: kex: server->client cipher: chacha20-poly1...@openssh.com MAC: <implicit> compression: none debug1: kex: client->server cipher: chacha20-poly1...@openssh.com MAC: <implicit> compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: Server host key: ecdsa-sha2-nistp256 SHA256:qJEIrukQMIjqA8LT8vyaXBG56JZMZ8hjU62BRZ1yJYc debug1: Host '127.0.0.1' is known and matches the ECDSA host key. debug1: Found key in /home/brett/.ssh/known_hosts:2 debug1: rekey after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: ECDSA SHA256:TKDpw9aM8mq+fskjBc2G+wEYDasolxkCYwe0f6hDpX0 /home/brett/.ssh/id_ecdsa debug1: Authentications that can continue: publickey debug1: Offering public key: RSA SHA256:yKz+QK3wcQoNs/Bkx14V/WEnZ6QQ5WSMdpDQ/Itqcy4 /home/brett/.ssh/rmit_id debug1: Server accepts key: pkalg rsa-sha2-512 blen 279 debug1: Authentication succeeded (publickey). Authenticated to 127.0.0.1 ([127.0.0.1]:22). debug1: channel 0: new [client-session] debug1: Requesting no-more-sessi...@openssh.com debug1: Entering interactive session. debug1: pledge: exec debug1: client_input_global_request: rtype hostkeys...@openssh.com want_reply 0 debug1: Remote: /home/rmit/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /home/rmit/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Requesting X11 forwarding with authentication spoofing. debug1: Sending command: iridium debug1: client_input_channel_open: ctype x11 rchan 3 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 4649 debug1: channel 1: new [x11] debug1: confirm x11 debug1: client_input_channel_open: ctype x11 rchan 4 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 5579 debug1: channel 2: new [x11] debug1: confirm x11 [11321:1527161448:0913/074849.948275:ERROR:process_metrics_openbsd.cc(164)] Not implemented reached in bool base::GetSystemMemoryInfo(base::SystemMemoryInfoKB *) debug1: client_input_channel_open: ctype x11 rchan 5 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 12975 debug1: channel 3: new [x11] debug1: confirm x11 debug1: client_input_channel_open: ctype x11 rchan 6 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 18494 debug1: channel 4: new [x11] debug1: confirm x11 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 20403 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 33893 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 31712 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 24089 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 2375 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 40603 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 22604 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 3408 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 *** autoupdate was enabled, overriding with false debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 20899 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 43234 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 40010 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 15836 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 23694 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 32930 debug1: channel 5: new [x11] debug1: confirm x11 debug1: client_input_channel_open: ctype x11 rchan 8 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 12858 debug1: channel 6: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 7 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 41647 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 6: FORCE input drain debug1: channel 6: free: x11, nchannels 7 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 26898 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 3238 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 18693 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 40890 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 6140 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: client_input_channel_open: ctype x11 rchan 8 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 20612 debug1: channel 6: new [x11] debug1: confirm x11 debug1: channel 5: free: x11, nchannels 7 debug1: channel 6: FORCE input drain debug1: channel 6: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 12037 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 2987 debug1: channel 5: new [x11] debug1: confirm x11 debug1: channel 5: FORCE input drain debug1: channel 5: free: x11, nchannels 6 debug1: channel 3: FORCE input drain debug1: channel 4: FORCE input drain debug1: channel 3: free: x11, nchannels 5 debug1: channel 4: free: x11, nchannels 4 debug1: channel 1: FORCE input drain debug1: channel 2: FORCE input drain debug1: channel 1: free: x11, nchannels 3 debug1: channel 2: free: x11, nchannels 2 Then on exit: debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: client_input_channel_req: channel 0 rtype e...@openssh.com reply 0 debug1: channel 0: free: client-session, nchannels 1 Transferred: sent 368556, received 481360 bytes, in 159.9 seconds Bytes per second: sent 2305.2, received 3010.7 debug1: Exit status 0 ======================================================================================================= Command that works (using Links browser in graphical mode): $ ssh -v -Y -i /home/brett/.ssh/rmit_id rmit@127.0.0.1 links -g & [2] 79988 $ OpenSSH_7.8, LibreSSL 2.8.0 debug1: Reading configuration data /etc/ssh/ssh_config debug1: Connecting to 127.0.0.1 [127.0.0.1] port 22. debug1: Connection established. debug1: identity file /home/brett/.ssh/rmit_id type 0 debug1: identity file /home/brett/.ssh/rmit_id-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_7.8 debug1: Remote protocol version 2.0, remote software version OpenSSH_7.8 debug1: match: OpenSSH_7.8 pat OpenSSH* compat 0x04000000 debug1: Authenticating to 127.0.0.1:22 as 'rmit' debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: algorithm: curve25519-sha256 debug1: kex: host key algorithm: ecdsa-sha2-nistp256 debug1: kex: server->client cipher: chacha20-poly1...@openssh.com MAC: <implicit> compression: none debug1: kex: client->server cipher: chacha20-poly1...@openssh.com MAC: <implicit> compression: none debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: Server host key: ecdsa-sha2-nistp256 SHA256:qJEIrukQMIjqA8LT8vyaXBG56JZMZ8hjU62BRZ1yJYc debug1: Host '127.0.0.1' is known and matches the ECDSA host key. debug1: Found key in /home/brett/.ssh/known_hosts:2 debug1: rekey after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: rekey after 134217728 blocks debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521> debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering public key: ECDSA SHA256:TKDpw9aM8mq+fskjBc2G+wEYDasolxkCYwe0f6hDpX0 /home/brett/.ssh/id_ecdsa debug1: Authentications that can continue: publickey debug1: Offering public key: RSA SHA256:yKz+QK3wcQoNs/Bkx14V/WEnZ6QQ5WSMdpDQ/Itqcy4 /home/brett/.ssh/rmit_id debug1: Server accepts key: pkalg rsa-sha2-512 blen 279 debug1: Authentication succeeded (publickey). Authenticated to 127.0.0.1 ([127.0.0.1]:22). debug1: channel 0: new [client-session] debug1: Requesting no-more-sessi...@openssh.com debug1: Entering interactive session. debug1: pledge: exec debug1: client_input_global_request: rtype hostkeys...@openssh.com want_reply 0 debug1: Remote: /home/rmit/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Remote: /home/rmit/.ssh/authorized_keys:1: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding debug1: Requesting X11 forwarding with authentication spoofing. debug1: Sending command: links -g debug1: client_input_channel_open: ctype x11 rchan 3 win 65536 max 16384 debug1: client_request_x11: request from 127.0.0.1 41437 debug1: channel 1: new [x11] debug1: confirm x11 =======================================================================================================