xterm -display 0:0 _X11TransSocketINETConnect: Can't connect: errno = 111
Hello I am trying to run xterm from a remote machine.
I tried xterm -display 0:0
xterm -display 192.168.1.111:0.0 #host ip
xterm -display 192.168.1.10:0.0 #client ip
All give the following error:
tjk@breezysolutions:~$ xterm -display 0:0
_X11TransSocketINETConnect: Can't connect: errno = 111
_X11TransSocketINETConnect: Can't connect: errno = 111
_X11TransSocketINETConnect: Can't connect: errno = 111
_X11TransSocketINETConnect: Can't connect: errno = 111
_X11TransSocketINETConnect: Can't connect: errno = 111
_X11TransSocketINETConnect: Can't connect: errno = 111
xterm Xt error: Can't open display: 0:0
==============================================
My Questions
==============================================
What does this error mean?
Could it be caused by my tcpwrappers?
What needs to be running for remote xserver to work?
==============================================
Server (host) machine processes
==============================================
tjk@breezysolutions:~$ ps auxf
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 1 0.1 0.2 1236 528 ? S 13:33 0:05 init [2]
root 2 0.0 0.0 0 0 ? SW 13:33 0:00 [kflushd]
root 3 0.0 0.0 0 0 ? SW 13:33 0:00 [kupdate]
root 4 0.0 0.0 0 0 ? SW 13:33 0:00 [kswapd]
root 5 0.0 0.0 0 0 ? SW 13:33 0:00 [keventd]
root 280 0.0 0.2 1312 628 ? S 13:35 0:00 /sbin/syslogd
root 284 0.0 0.2 1276 520 ? S 13:35 0:00 /sbin/klogd
root 291 0.0 0.1 1220 484 ? S 13:35 0:00 /sbin/kerneld
cyrus 301 0.0 0.1 1636 368 ? S 13:35 0:00 /usr/sbin/pwcheck
root 320 0.0 0.3 2460 1016 ? S 13:35 0:01 /usr/sbin/sshd
root 2259 0.0 0.5 2904 1504 ? S 14:36 0:00 \_ /usr/sbin/sshd
tjk 2260 0.0 0.5 2248 1352 pts/0 S 14:37 0:00 | \_ -bash
tjk 2352 0.0 0.5 2284 1440 pts/0 S 14:41 0:00 | \_ mutt
tjk 2365 0.0 0.5 2320 1408 pts/0 S 14:42 0:00 | \_ vi /tmp/mutt-breezysolutions-2352-1
root 2366 0.0 0.5 2820 1488 ? S 14:43 0:00 \_ /usr/sbin/sshd
tjk 2367 0.0 0.5 2240 1332 pts/1 R 14:43 0:00 \_ -bash
tjk 2443 0.0 0.4 2856 1064 pts/1 R 14:51 0:00 \_ ps auxf
root 324 0.0 0.2 1384 668 ? S 13:35 0:00 /usr/sbin/cron
root 329 0.0 0.9 37940 2468 ? S 13:35 0:00 /usr/sbin/apache
www-data 334 0.0 1.0 38008 2600 ? S 13:35 0:00 \_ /usr/sbin/apache
www-data 335 0.0 1.1 38076 2848 ? S 13:35 0:00 \_ /usr/sbin/apache
www-data 336 0.0 1.0 38016 2596 ? S 13:35 0:00 \_ /usr/sbin/apache
www-data 337 0.0 1.0 38060 2796 ? S 13:35 0:00 \_ /usr/sbin/apache
www-data 338 0.0 1.0 38016 2600 ? S 13:35 0:00 \_ /usr/sbin/apache
www-data 1808 0.0 1.0 38012 2600 ? S 14:09 0:00 \_ /usr/sbin/apache
www-data 2310 0.0 0.9 37956 2480 ? S 14:38 0:00 \_ /usr/sbin/apache
www-data 2311 0.0 0.9 37956 2480 ? S 14:39 0:00 \_ /usr/sbin/apache
root 340 0.0 1.1 38856 3020 ? S 13:35 0:00 /usr/sbin/apache-ssl
www-data 349 0.0 0.3 2688 792 ? S 13:35 0:00 \_ gcache 33 /var/run/gcache_port
www-data 350 0.0 1.2 38968 3140 ? S 13:35 0:00 \_ /usr/sbin/apache-ssl
www-data 351 0.0 1.1 38880 3020 ? S 13:35 0:00 \_ /usr/sbin/apache-ssl
www-data 352 0.0 1.1 38880 3020 ? S 13:35 0:00 \_ /usr/sbin/apache-ssl
www-data 353 0.0 1.1 38880 3020 ? S 13:35 0:00 \_ /usr/sbin/apache-ssl
www-data 354 0.0 1.1 38880 3020 ? S 13:35 0:00 \_ /usr/sbin/apache-ssl
root 344 0.0 0.1 1220 500 tty2 S 13:35 0:00 /sbin/getty 38400 tty2
root 345 0.0 0.1 1220 500 tty3 S 13:35 0:00 /sbin/getty 38400 tty3
root 346 0.0 0.1 1220 500 tty4 S 13:35 0:00 /sbin/getty 38400 tty4
root 347 0.0 0.1 1220 500 tty5 S 13:35 0:00 /sbin/getty 38400 tty5
root 348 0.0 0.1 1220 500 tty6 S 13:35 0:00 /sbin/getty 38400 tty6
root 1642 0.0 0.1 1220 500 tty1 S 14:06 0:00 /sbin/getty 38400 tty1
mail 1925 0.0 0.4 2304 1100 ? S 14:16 0:00 /usr/sbin/exim -bd -q30m
Server Tcp wrappers.
# /etc/hosts.deny: list of hosts that are _not_ allowed to access the system.
# See the manual pages hosts_access(5), hosts_options(5)
# and /usr/doc/netbase/portmapper.txt.gz
#
# Example: ALL: some.host.name, .some.domain
# ALL EXCEPT in.fingerd: other.host.name, .other.domain
#
# If you're going to protect the portmapper use the name "portmap" for the
# daemon name. Remember that you can only use the keyword "ALL" and IP
# addresses (NOT host or domain names) for the portmapper. See portmap(8)
# and /usr/doc/netbase/portmapper.txt.gz for further information.
#
# The PARANOID wildcard matches any host whose name does not match its
# address.
#ALL: PARANOID
ALL: 204.192.47.24 204.192.47.25 204.192.47.152 #enterprise alpha aacc-webserver
ALL:ALL
tjk@breezysolutions:~$ cat /etc/hosts.allow
# /etc/hosts.allow: list of hosts that are allowed to access the system.
# See the manual pages hosts_access(5), hosts_options(5)
# and /usr/doc/netbase/portmapper.txt.gz
#
# Example: ALL: LOCAL @some_netgroup
# ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
#
# If you're going to protect the portmapper use the name "portmap" for the
# daemon name. Remember that you can only use the keyword "ALL" and IP
# addresses (NOT host or domain names) for the portmapper. See portmap(8)
# and /usr/doc/netbase/portmapper.txt.gz for further information.
#
sshd: 192.168.1.10 192.168.1.5
sshd: 204.245.156.
sshd: 204.192.47.
sshd: 204.192.46.
sshd: .gl.umbc.edu
syslogd:192.168.1.254
imapd:192.168.1.10 localhost
#pop3d:192.168.1.10
#localhost
==============================================
Client Side
==============================================
$ ps auxf
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 7 0.0 0.0 0 0 ? SW 09:33 0:00 [kupdated]
root 6 0.0 0.0 0 0 ? SW 09:33 0:00 [bdflush]
root 5 0.0 0.0 0 0 ? SW 09:33 0:00 [kreclaimd]
root 4 0.0 0.0 0 0 ? SW 09:33 0:00 [kswapd]
root 3 0.0 0.0 0 0 ? SWN 09:33 0:00 [ksoftirqd_CPU0]
root 1 0.1 0.1 1296 520 ? S 09:33 0:19 init [2]
root 2 0.0 0.0 0 0 ? SW 09:33 0:00 [keventd]
root 9 0.0 0.0 0 0 ? SW 09:33 0:00 [khubd]
root 203 0.0 0.1 1372 632 ? S 09:33 0:00 /sbin/syslogd
root 220 0.0 0.3 1848 1060 ? S 09:33 0:00 /sbin/klogd
daemon 259 0.0 0.2 1876 840 ? S 09:33 0:00 lpd Waiting
root 272 0.0 0.3 2760 1208 ? S 09:33 0:00 /usr/sbin/sshd
root 276 0.0 1.5 6240 4996 ? S 09:33 0:00 /usr/bin/X11/xfs -daemon
root 280 0.0 0.2 1680 708 ? S 09:33 0:00 /usr/sbin/cron
root 291 0.0 0.3 3144 1080 ? S 09:33 0:00 /usr/bin/X11/xdm
root 299 0.9 7.8 92128 25040 ? S< 09:33 3:02 \_ /usr/X11R6/bin/X vt7 -dpi 100 -nolisten tcp -auth /var/lib/xdm/authdir/authfiles/A:0-fotQ8U
root 300 0.0 0.6 3584 2024 ? S 09:33 0:00 \_ -:0
tjk 314 0.0 0.9 4732 2944 ? S 09:34 0:11 \_ /usr/bin/WindowMaker
tjk 344 0.0 0.2 2548 800 ? S 09:34 0:00 \_ /usr/bin/ssh-agent /home/tjk/.xsession
tjk 353 0.0 0.3 2712 1168 ? S 09:34 0:00 \_ wmCalClock
tjk 354 0.0 0.3 2496 992 ? S 09:34 0:00 \_ /usr/bin/wmcube
tjk 355 0.0 0.2 2356 944 ? S 09:34 0:00 \_ /usr/X11R6/bin/wmSpaceWeather
tjk 356 0.0 0.2 2364 848 ? S 09:34 0:00 \_ /usr/X11R6/bin/wmnet -l
tjk 357 0.0 0.3 2476 1044 ? S 09:34 0:00 \_ wmfire
tjk 362 0.0 0.1 1264 400 ? S 09:34 0:00 | \_ fireload_cpu
tjk 494 0.0 0.2 2452 888 ? S 09:41 0:00 \_ /usr/bin/X11/wmavgload -shape -withdrawn
tjk 1243 0.0 0.4 2848 1548 ? S 14:36 0:00 \_ /usr/bin/aterm
tjk 1244 0.0 0.4 2412 1408 pts/1 S 14:36 0:00 | \_ bash
tjk 1245 0.0 0.4 2956 1484 pts/1 S 14:37 0:00 | \_ ssh 192.168.1.111
tjk 1250 2.2 7.1 31212 22816 ? S 14:38 0:24 \_ /usr/lib/netscape/477/communicator/communicator-smotif.real http://www.debian.org/
tjk 1293 0.0 1.1 17160 3752 ? S 14:38 0:00 | \_ (dns helper)
tjk 1343 0.0 1.0 5124 3276 ? S 14:43 0:00 \_ /usr/bin/Eterm
tjk 1346 0.0 0.4 2404 1388 pts/2 S 14:43 0:00 | \_ -bash
tjk 1347 0.0 0.4 2868 1468 pts/2 S 14:43 0:00 | \_ ssh 192.168.1.111
tjk 1348 0.0 0.9 5252 2972 ? S 14:48 0:00 \_ xterm
tjk 1349 0.0 0.4 2412 1404 pts/3 S 14:48 0:00 \_ bash
tjk 1359 0.0 0.4 3336 1428 pts/3 R 14:57 0:00 \_ ps auxf
root 292 0.0 0.1 1280 496 tty1 S 09:33 0:00 /sbin/getty 38400 tty1
root 293 0.0 0.1 1280 496 tty2 S 09:33 0:00 /sbin/getty 38400 tty2
root 294 0.0 0.1 1280 496 tty3 S 09:33 0:00 /sbin/getty 38400 tty3
root 295 0.0 0.1 1280 496 tty4 S 09:33 0:00 /sbin/getty 38400 tty4
root 296 0.0 0.1 1280 496 tty5 S 09:33 0:00 /sbin/getty 38400 tty5
root 298 0.0 0.1 1280 496 tty6 S 09:33 0:00 /sbin/getty 38400 tty6
client tcpwrappers
~$ cat /etc/hosts.allow
# /etc/hosts.allow: list of hosts that are allowed to access the system.
# See the manual pages hosts_access(5), hosts_options(5)
# and /usr/doc/netbase/portmapper.txt.gz
#
# Example: ALL: LOCAL @some_netgroup
# ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
#
# If you're going to protect the portmapper use the name "portmap" for the
# daemon name. Remember that you can only use the keyword "ALL" and IP
# addresses (NOT host or domain names) for the portmapper. See portmap(8)
# and /usr/doc/netbase/portmapper.txt.gz for further information.
#
#ALL:ALL
lpd:localhost 192.168.1.5 192.168.1.111
printer: localhost 192.168.1.5 192.168.1.111
sshd: 192.168.1.5 192.168.1.254 localhost 192.168.1.111
~$ cat /etc/hosts.deny
# /etc/hosts.deny: list of hosts that are _not_ allowed to access the system.
# See the manual pages hosts_access(5), hosts_options(5)
# and /usr/doc/netbase/portmapper.txt.gz
#
# Example: ALL: some.host.name, .some.domain
# ALL EXCEPT in.fingerd: other.host.name, .other.domain
#
# If you're going to protect the portmapper use the name "portmap" for the
# daemon name. Remember that you can only use the keyword "ALL" and IP
# addresses (NOT host or domain names) for the portmapper. See portmap(8)
# and /usr/doc/netbase/portmapper.txt.gz for further information.
#
# The PARANOID wildcard matches any host whose name does not match its
# address.
ALL: ALL
----- End forwarded message -----
--
----------------------------
Ted Knab
Breezy Network Solutions
Tel: 410-571-8288
----- End forwarded message -----
--
----------------------------
Ted Knab
Breezy Network Solutions
Tel: 410-571-8288
Reply to: