[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: xterm -display 0:0 _X11TransSocketINETConnect: Can't connect: errno = 111




X11-4 box?  vi /etc/X11/xinit/xserverrc, make sure the 2
words "-nolisten tcp" aren't there on the box you are trying
to display to.



Thus spake Theodore Knab (tjk@annapolislinux.org):

> Hello I am trying to run xterm from a remote machine.
> 
> I tried xterm -display 0:0
> 	xterm -display 192.168.1.111:0.0 #host ip
> 	xterm -display 192.168.1.10:0.0 #client ip
> 
> All give the following error:
> 
> tjk@breezysolutions:~$ xterm -display 0:0
> _X11TransSocketINETConnect: Can't connect: errno = 111
> _X11TransSocketINETConnect: Can't connect: errno = 111
> _X11TransSocketINETConnect: Can't connect: errno = 111
> _X11TransSocketINETConnect: Can't connect: errno = 111
> _X11TransSocketINETConnect: Can't connect: errno = 111
> _X11TransSocketINETConnect: Can't connect: errno = 111
> xterm Xt error: Can't open display: 0:0
> 
> ==============================================
> My Questions
> ==============================================
> What does this error mean?
> 	Could it be caused by my tcpwrappers?
> 
> What needs to be running for remote xserver to work?
> 
> ==============================================
> Server (host) machine processes
> ==============================================
>  
> tjk@breezysolutions:~$ ps auxf    
> USER       PID %CPU %MEM   VSZ  RSS TTY      STAT START   TIME COMMAND
> root         1  0.1  0.2  1236  528 ?        S    13:33   0:05 init [2]
> root         2  0.0  0.0     0    0 ?        SW   13:33   0:00 [kflushd]
> root         3  0.0  0.0     0    0 ?        SW   13:33   0:00 [kupdate]
> root         4  0.0  0.0     0    0 ?        SW   13:33   0:00 [kswapd]
> root         5  0.0  0.0     0    0 ?        SW   13:33   0:00 [keventd]
> root       280  0.0  0.2  1312  628 ?        S    13:35   0:00 /sbin/syslogd
> root       284  0.0  0.2  1276  520 ?        S    13:35   0:00 /sbin/klogd
> root       291  0.0  0.1  1220  484 ?        S    13:35   0:00 /sbin/kerneld
> cyrus      301  0.0  0.1  1636  368 ?        S    13:35   0:00 /usr/sbin/pwcheck
> root       320  0.0  0.3  2460 1016 ?        S    13:35   0:01 /usr/sbin/sshd
> root      2259  0.0  0.5  2904 1504 ?        S    14:36   0:00  \_ /usr/sbin/sshd
> tjk       2260  0.0  0.5  2248 1352 pts/0    S    14:37   0:00  |   \_ -bash
> tjk       2352  0.0  0.5  2284 1440 pts/0    S    14:41   0:00  |       \_ mutt
> tjk       2365  0.0  0.5  2320 1408 pts/0    S    14:42   0:00  |           \_ vi /tmp/mutt-breezysolutions-2352-1
> root      2366  0.0  0.5  2820 1488 ?        S    14:43   0:00  \_ /usr/sbin/sshd
> tjk       2367  0.0  0.5  2240 1332 pts/1    R    14:43   0:00      \_ -bash
> tjk       2443  0.0  0.4  2856 1064 pts/1    R    14:51   0:00          \_ ps auxf
> root       324  0.0  0.2  1384  668 ?        S    13:35   0:00 /usr/sbin/cron
> root       329  0.0  0.9 37940 2468 ?        S    13:35   0:00 /usr/sbin/apache
> www-data   334  0.0  1.0 38008 2600 ?        S    13:35   0:00  \_ /usr/sbin/apache
> www-data   335  0.0  1.1 38076 2848 ?        S    13:35   0:00  \_ /usr/sbin/apache
> www-data   336  0.0  1.0 38016 2596 ?        S    13:35   0:00  \_ /usr/sbin/apache
> www-data   337  0.0  1.0 38060 2796 ?        S    13:35   0:00  \_ /usr/sbin/apache
> www-data   338  0.0  1.0 38016 2600 ?        S    13:35   0:00  \_ /usr/sbin/apache
> www-data  1808  0.0  1.0 38012 2600 ?        S    14:09   0:00  \_ /usr/sbin/apache
> www-data  2310  0.0  0.9 37956 2480 ?        S    14:38   0:00  \_ /usr/sbin/apache
> www-data  2311  0.0  0.9 37956 2480 ?        S    14:39   0:00  \_ /usr/sbin/apache
> root       340  0.0  1.1 38856 3020 ?        S    13:35   0:00 /usr/sbin/apache-ssl
> www-data   349  0.0  0.3  2688  792 ?        S    13:35   0:00  \_ gcache 33 /var/run/gcache_port
> www-data   350  0.0  1.2 38968 3140 ?        S    13:35   0:00  \_ /usr/sbin/apache-ssl
> www-data   351  0.0  1.1 38880 3020 ?        S    13:35   0:00  \_ /usr/sbin/apache-ssl
> www-data   352  0.0  1.1 38880 3020 ?        S    13:35   0:00  \_ /usr/sbin/apache-ssl
> www-data   353  0.0  1.1 38880 3020 ?        S    13:35   0:00  \_ /usr/sbin/apache-ssl
> www-data   354  0.0  1.1 38880 3020 ?        S    13:35   0:00  \_ /usr/sbin/apache-ssl
> root       344  0.0  0.1  1220  500 tty2     S    13:35   0:00 /sbin/getty 38400 tty2
> root       345  0.0  0.1  1220  500 tty3     S    13:35   0:00 /sbin/getty 38400 tty3
> root       346  0.0  0.1  1220  500 tty4     S    13:35   0:00 /sbin/getty 38400 tty4
> root       347  0.0  0.1  1220  500 tty5     S    13:35   0:00 /sbin/getty 38400 tty5
> root       348  0.0  0.1  1220  500 tty6     S    13:35   0:00 /sbin/getty 38400 tty6
> root      1642  0.0  0.1  1220  500 tty1     S    14:06   0:00 /sbin/getty 38400 tty1
> mail      1925  0.0  0.4  2304 1100 ?        S    14:16   0:00 /usr/sbin/exim -bd -q30m
> 
> Server Tcp wrappers.
> # /etc/hosts.deny: list of hosts that are _not_ allowed to access the system.
> #                  See the manual pages hosts_access(5), hosts_options(5)
> #                  and /usr/doc/netbase/portmapper.txt.gz
> #
> # Example:    ALL: some.host.name, .some.domain
> #             ALL EXCEPT in.fingerd: other.host.name, .other.domain
> #
> # If you're going to protect the portmapper use the name "portmap" for the
> # daemon name. Remember that you can only use the keyword "ALL" and IP
> # addresses (NOT host or domain names) for the portmapper. See portmap(8)
> # and /usr/doc/netbase/portmapper.txt.gz for further information.
> #
> # The PARANOID wildcard matches any host whose name does not match its
> # address.
> #ALL: PARANOID
> ALL: 204.192.47.24 204.192.47.25 204.192.47.152 #enterprise alpha aacc-webserver
> ALL:ALL 
> tjk@breezysolutions:~$ cat /etc/hosts.allow
> # /etc/hosts.allow: list of hosts that are allowed to access the system.
> #                   See the manual pages hosts_access(5), hosts_options(5)
> #                   and /usr/doc/netbase/portmapper.txt.gz
> #
> # Example:    ALL: LOCAL @some_netgroup
> #             ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
> #
> # If you're going to protect the portmapper use the name "portmap" for the
> # daemon name. Remember that you can only use the keyword "ALL" and IP
> # addresses (NOT host or domain names) for the portmapper. See portmap(8)
> # and /usr/doc/netbase/portmapper.txt.gz for further information.
> #
> sshd: 192.168.1.10 192.168.1.5  
> sshd: 204.245.156. 
> sshd: 204.192.47.
> sshd: 204.192.46.
> sshd: .gl.umbc.edu
> syslogd:192.168.1.254
> imapd:192.168.1.10 localhost
> #pop3d:192.168.1.10
> #localhost
> 
> ==============================================
> Client Side 
> ==============================================
> 
> $ ps auxf 
> USER       PID %CPU %MEM   VSZ  RSS TTY      STAT START   TIME COMMAND
> root         7  0.0  0.0     0    0 ?        SW   09:33   0:00 [kupdated]
> root         6  0.0  0.0     0    0 ?        SW   09:33   0:00 [bdflush]
> root         5  0.0  0.0     0    0 ?        SW   09:33   0:00 [kreclaimd]
> root         4  0.0  0.0     0    0 ?        SW   09:33   0:00 [kswapd]
> root         3  0.0  0.0     0    0 ?        SWN  09:33   0:00 [ksoftirqd_CPU0]
> root         1  0.1  0.1  1296  520 ?        S    09:33   0:19 init [2] 
> root         2  0.0  0.0     0    0 ?        SW   09:33   0:00 [keventd]
> root         9  0.0  0.0     0    0 ?        SW   09:33   0:00 [khubd]
> root       203  0.0  0.1  1372  632 ?        S    09:33   0:00 /sbin/syslogd
> root       220  0.0  0.3  1848 1060 ?        S    09:33   0:00 /sbin/klogd
> daemon     259  0.0  0.2  1876  840 ?        S    09:33   0:00 lpd Waiting  
> root       272  0.0  0.3  2760 1208 ?        S    09:33   0:00 /usr/sbin/sshd
> root       276  0.0  1.5  6240 4996 ?        S    09:33   0:00 /usr/bin/X11/xfs -daemon
> root       280  0.0  0.2  1680  708 ?        S    09:33   0:00 /usr/sbin/cron
> root       291  0.0  0.3  3144 1080 ?        S    09:33   0:00 /usr/bin/X11/xdm
> root       299  0.9  7.8 92128 25040 ?       S<   09:33   3:02  \_ /usr/X11R6/bin/X vt7 -dpi 100 -nolisten tcp -auth /var/lib/xdm/authdir/authfiles/A:0-fotQ8U
> root       300  0.0  0.6  3584 2024 ?        S    09:33   0:00  \_ -:0             
> tjk        314  0.0  0.9  4732 2944 ?        S    09:34   0:11      \_ /usr/bin/WindowMaker
> tjk        344  0.0  0.2  2548  800 ?        S    09:34   0:00          \_ /usr/bin/ssh-agent /home/tjk/.xsession
> tjk        353  0.0  0.3  2712 1168 ?        S    09:34   0:00          \_ wmCalClock
> tjk        354  0.0  0.3  2496  992 ?        S    09:34   0:00          \_ /usr/bin/wmcube
> tjk        355  0.0  0.2  2356  944 ?        S    09:34   0:00          \_ /usr/X11R6/bin/wmSpaceWeather
> tjk        356  0.0  0.2  2364  848 ?        S    09:34   0:00          \_ /usr/X11R6/bin/wmnet -l
> tjk        357  0.0  0.3  2476 1044 ?        S    09:34   0:00          \_ wmfire
> tjk        362  0.0  0.1  1264  400 ?        S    09:34   0:00          |   \_ fireload_cpu
> tjk        494  0.0  0.2  2452  888 ?        S    09:41   0:00          \_ /usr/bin/X11/wmavgload -shape -withdrawn
> tjk       1243  0.0  0.4  2848 1548 ?        S    14:36   0:00          \_ /usr/bin/aterm
> tjk       1244  0.0  0.4  2412 1408 pts/1    S    14:36   0:00          |   \_ bash
> tjk       1245  0.0  0.4  2956 1484 pts/1    S    14:37   0:00          |       \_ ssh 192.168.1.111
> tjk       1250  2.2  7.1 31212 22816 ?       S    14:38   0:24          \_ /usr/lib/netscape/477/communicator/communicator-smotif.real http://www.debian.org/
> tjk       1293  0.0  1.1 17160 3752 ?        S    14:38   0:00          |   \_ (dns helper)
> tjk       1343  0.0  1.0  5124 3276 ?        S    14:43   0:00          \_ /usr/bin/Eterm
> tjk       1346  0.0  0.4  2404 1388 pts/2    S    14:43   0:00          |   \_ -bash
> tjk       1347  0.0  0.4  2868 1468 pts/2    S    14:43   0:00          |       \_ ssh 192.168.1.111
> tjk       1348  0.0  0.9  5252 2972 ?        S    14:48   0:00          \_ xterm
> tjk       1349  0.0  0.4  2412 1404 pts/3    S    14:48   0:00              \_ bash
> tjk       1359  0.0  0.4  3336 1428 pts/3    R    14:57   0:00                  \_ ps auxf
> root       292  0.0  0.1  1280  496 tty1     S    09:33   0:00 /sbin/getty 38400 tty1
> root       293  0.0  0.1  1280  496 tty2     S    09:33   0:00 /sbin/getty 38400 tty2
> root       294  0.0  0.1  1280  496 tty3     S    09:33   0:00 /sbin/getty 38400 tty3
> root       295  0.0  0.1  1280  496 tty4     S    09:33   0:00 /sbin/getty 38400 tty4
> root       296  0.0  0.1  1280  496 tty5     S    09:33   0:00 /sbin/getty 38400 tty5
> root       298  0.0  0.1  1280  496 tty6     S    09:33   0:00 /sbin/getty 38400 tty6
> 
> 
> client tcpwrappers
> 
> ~$ cat /etc/hosts.allow 
> # /etc/hosts.allow: list of hosts that are allowed to access the system.
> #                   See the manual pages hosts_access(5), hosts_options(5)
> #                   and /usr/doc/netbase/portmapper.txt.gz
> #
> # Example:    ALL: LOCAL @some_netgroup
> #             ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
> #
> # If you're going to protect the portmapper use the name "portmap" for the
> # daemon name. Remember that you can only use the keyword "ALL" and IP
> # addresses (NOT host or domain names) for the portmapper. See portmap(8)
> # and /usr/doc/netbase/portmapper.txt.gz for further information.
> #
> #ALL:ALL
> lpd:localhost 192.168.1.5 192.168.1.111
> printer: localhost 192.168.1.5 192.168.1.111
> sshd: 192.168.1.5 192.168.1.254 localhost 192.168.1.111
> ~$ cat /etc/hosts.deny  
> # /etc/hosts.deny: list of hosts that are _not_ allowed to access the system.
> #                  See the manual pages hosts_access(5), hosts_options(5)
> #                  and /usr/doc/netbase/portmapper.txt.gz
> #
> # Example:    ALL: some.host.name, .some.domain
> #             ALL EXCEPT in.fingerd: other.host.name, .other.domain
> #
> # If you're going to protect the portmapper use the name "portmap" for the
> # daemon name. Remember that you can only use the keyword "ALL" and IP
> # addresses (NOT host or domain names) for the portmapper. See portmap(8)
> # and /usr/doc/netbase/portmapper.txt.gz for further information.
> #
> # The PARANOID wildcard matches any host whose name does not match its
> # address.
> ALL: ALL
> 
> 
> ----- End forwarded message -----
> 
> -- 
> ----------------------------
> Ted Knab
> Breezy Network Solutions
> Tel: 410-571-8288
> 
> ----- End forwarded message -----
> 
> -- 
> ----------------------------
> Ted Knab
> Breezy Network Solutions
> Tel: 410-571-8288
> 
> 
> -- 
> To UNSUBSCRIBE, email to debian-user-request@lists.debian.org 
> with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org



:wq!
---------------------------------------------------------------------------
Robert L. Harris                |  Micros~1 :  
Senior System Engineer          |    For when quality, reliability 
  at RnD Consulting             |      and security just aren't
                                \_       that important!
DISCLAIMER:
      These are MY OPINIONS ALONE.  I speak for no-one else.
FYI:
 perl -e 'print $i=pack(c5,(41*2),sqrt(7056),(unpack(c,H)-2),oct(115),10);'



Reply to: