Re: xterm -display 0:0 _X11TransSocketINETConnect: Can't connect: errno = 111
X11-4 box? vi /etc/X11/xinit/xserverrc, make sure the 2
words "-nolisten tcp" aren't there on the box you are trying
to display to.
Thus spake Theodore Knab (tjk@annapolislinux.org):
> Hello I am trying to run xterm from a remote machine.
>
> I tried xterm -display 0:0
> xterm -display 192.168.1.111:0.0 #host ip
> xterm -display 192.168.1.10:0.0 #client ip
>
> All give the following error:
>
> tjk@breezysolutions:~$ xterm -display 0:0
> _X11TransSocketINETConnect: Can't connect: errno = 111
> _X11TransSocketINETConnect: Can't connect: errno = 111
> _X11TransSocketINETConnect: Can't connect: errno = 111
> _X11TransSocketINETConnect: Can't connect: errno = 111
> _X11TransSocketINETConnect: Can't connect: errno = 111
> _X11TransSocketINETConnect: Can't connect: errno = 111
> xterm Xt error: Can't open display: 0:0
>
> ==============================================
> My Questions
> ==============================================
> What does this error mean?
> Could it be caused by my tcpwrappers?
>
> What needs to be running for remote xserver to work?
>
> ==============================================
> Server (host) machine processes
> ==============================================
>
> tjk@breezysolutions:~$ ps auxf
> USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
> root 1 0.1 0.2 1236 528 ? S 13:33 0:05 init [2]
> root 2 0.0 0.0 0 0 ? SW 13:33 0:00 [kflushd]
> root 3 0.0 0.0 0 0 ? SW 13:33 0:00 [kupdate]
> root 4 0.0 0.0 0 0 ? SW 13:33 0:00 [kswapd]
> root 5 0.0 0.0 0 0 ? SW 13:33 0:00 [keventd]
> root 280 0.0 0.2 1312 628 ? S 13:35 0:00 /sbin/syslogd
> root 284 0.0 0.2 1276 520 ? S 13:35 0:00 /sbin/klogd
> root 291 0.0 0.1 1220 484 ? S 13:35 0:00 /sbin/kerneld
> cyrus 301 0.0 0.1 1636 368 ? S 13:35 0:00 /usr/sbin/pwcheck
> root 320 0.0 0.3 2460 1016 ? S 13:35 0:01 /usr/sbin/sshd
> root 2259 0.0 0.5 2904 1504 ? S 14:36 0:00 \_ /usr/sbin/sshd
> tjk 2260 0.0 0.5 2248 1352 pts/0 S 14:37 0:00 | \_ -bash
> tjk 2352 0.0 0.5 2284 1440 pts/0 S 14:41 0:00 | \_ mutt
> tjk 2365 0.0 0.5 2320 1408 pts/0 S 14:42 0:00 | \_ vi /tmp/mutt-breezysolutions-2352-1
> root 2366 0.0 0.5 2820 1488 ? S 14:43 0:00 \_ /usr/sbin/sshd
> tjk 2367 0.0 0.5 2240 1332 pts/1 R 14:43 0:00 \_ -bash
> tjk 2443 0.0 0.4 2856 1064 pts/1 R 14:51 0:00 \_ ps auxf
> root 324 0.0 0.2 1384 668 ? S 13:35 0:00 /usr/sbin/cron
> root 329 0.0 0.9 37940 2468 ? S 13:35 0:00 /usr/sbin/apache
> www-data 334 0.0 1.0 38008 2600 ? S 13:35 0:00 \_ /usr/sbin/apache
> www-data 335 0.0 1.1 38076 2848 ? S 13:35 0:00 \_ /usr/sbin/apache
> www-data 336 0.0 1.0 38016 2596 ? S 13:35 0:00 \_ /usr/sbin/apache
> www-data 337 0.0 1.0 38060 2796 ? S 13:35 0:00 \_ /usr/sbin/apache
> www-data 338 0.0 1.0 38016 2600 ? S 13:35 0:00 \_ /usr/sbin/apache
> www-data 1808 0.0 1.0 38012 2600 ? S 14:09 0:00 \_ /usr/sbin/apache
> www-data 2310 0.0 0.9 37956 2480 ? S 14:38 0:00 \_ /usr/sbin/apache
> www-data 2311 0.0 0.9 37956 2480 ? S 14:39 0:00 \_ /usr/sbin/apache
> root 340 0.0 1.1 38856 3020 ? S 13:35 0:00 /usr/sbin/apache-ssl
> www-data 349 0.0 0.3 2688 792 ? S 13:35 0:00 \_ gcache 33 /var/run/gcache_port
> www-data 350 0.0 1.2 38968 3140 ? S 13:35 0:00 \_ /usr/sbin/apache-ssl
> www-data 351 0.0 1.1 38880 3020 ? S 13:35 0:00 \_ /usr/sbin/apache-ssl
> www-data 352 0.0 1.1 38880 3020 ? S 13:35 0:00 \_ /usr/sbin/apache-ssl
> www-data 353 0.0 1.1 38880 3020 ? S 13:35 0:00 \_ /usr/sbin/apache-ssl
> www-data 354 0.0 1.1 38880 3020 ? S 13:35 0:00 \_ /usr/sbin/apache-ssl
> root 344 0.0 0.1 1220 500 tty2 S 13:35 0:00 /sbin/getty 38400 tty2
> root 345 0.0 0.1 1220 500 tty3 S 13:35 0:00 /sbin/getty 38400 tty3
> root 346 0.0 0.1 1220 500 tty4 S 13:35 0:00 /sbin/getty 38400 tty4
> root 347 0.0 0.1 1220 500 tty5 S 13:35 0:00 /sbin/getty 38400 tty5
> root 348 0.0 0.1 1220 500 tty6 S 13:35 0:00 /sbin/getty 38400 tty6
> root 1642 0.0 0.1 1220 500 tty1 S 14:06 0:00 /sbin/getty 38400 tty1
> mail 1925 0.0 0.4 2304 1100 ? S 14:16 0:00 /usr/sbin/exim -bd -q30m
>
> Server Tcp wrappers.
> # /etc/hosts.deny: list of hosts that are _not_ allowed to access the system.
> # See the manual pages hosts_access(5), hosts_options(5)
> # and /usr/doc/netbase/portmapper.txt.gz
> #
> # Example: ALL: some.host.name, .some.domain
> # ALL EXCEPT in.fingerd: other.host.name, .other.domain
> #
> # If you're going to protect the portmapper use the name "portmap" for the
> # daemon name. Remember that you can only use the keyword "ALL" and IP
> # addresses (NOT host or domain names) for the portmapper. See portmap(8)
> # and /usr/doc/netbase/portmapper.txt.gz for further information.
> #
> # The PARANOID wildcard matches any host whose name does not match its
> # address.
> #ALL: PARANOID
> ALL: 204.192.47.24 204.192.47.25 204.192.47.152 #enterprise alpha aacc-webserver
> ALL:ALL
> tjk@breezysolutions:~$ cat /etc/hosts.allow
> # /etc/hosts.allow: list of hosts that are allowed to access the system.
> # See the manual pages hosts_access(5), hosts_options(5)
> # and /usr/doc/netbase/portmapper.txt.gz
> #
> # Example: ALL: LOCAL @some_netgroup
> # ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
> #
> # If you're going to protect the portmapper use the name "portmap" for the
> # daemon name. Remember that you can only use the keyword "ALL" and IP
> # addresses (NOT host or domain names) for the portmapper. See portmap(8)
> # and /usr/doc/netbase/portmapper.txt.gz for further information.
> #
> sshd: 192.168.1.10 192.168.1.5
> sshd: 204.245.156.
> sshd: 204.192.47.
> sshd: 204.192.46.
> sshd: .gl.umbc.edu
> syslogd:192.168.1.254
> imapd:192.168.1.10 localhost
> #pop3d:192.168.1.10
> #localhost
>
> ==============================================
> Client Side
> ==============================================
>
> $ ps auxf
> USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
> root 7 0.0 0.0 0 0 ? SW 09:33 0:00 [kupdated]
> root 6 0.0 0.0 0 0 ? SW 09:33 0:00 [bdflush]
> root 5 0.0 0.0 0 0 ? SW 09:33 0:00 [kreclaimd]
> root 4 0.0 0.0 0 0 ? SW 09:33 0:00 [kswapd]
> root 3 0.0 0.0 0 0 ? SWN 09:33 0:00 [ksoftirqd_CPU0]
> root 1 0.1 0.1 1296 520 ? S 09:33 0:19 init [2]
> root 2 0.0 0.0 0 0 ? SW 09:33 0:00 [keventd]
> root 9 0.0 0.0 0 0 ? SW 09:33 0:00 [khubd]
> root 203 0.0 0.1 1372 632 ? S 09:33 0:00 /sbin/syslogd
> root 220 0.0 0.3 1848 1060 ? S 09:33 0:00 /sbin/klogd
> daemon 259 0.0 0.2 1876 840 ? S 09:33 0:00 lpd Waiting
> root 272 0.0 0.3 2760 1208 ? S 09:33 0:00 /usr/sbin/sshd
> root 276 0.0 1.5 6240 4996 ? S 09:33 0:00 /usr/bin/X11/xfs -daemon
> root 280 0.0 0.2 1680 708 ? S 09:33 0:00 /usr/sbin/cron
> root 291 0.0 0.3 3144 1080 ? S 09:33 0:00 /usr/bin/X11/xdm
> root 299 0.9 7.8 92128 25040 ? S< 09:33 3:02 \_ /usr/X11R6/bin/X vt7 -dpi 100 -nolisten tcp -auth /var/lib/xdm/authdir/authfiles/A:0-fotQ8U
> root 300 0.0 0.6 3584 2024 ? S 09:33 0:00 \_ -:0
> tjk 314 0.0 0.9 4732 2944 ? S 09:34 0:11 \_ /usr/bin/WindowMaker
> tjk 344 0.0 0.2 2548 800 ? S 09:34 0:00 \_ /usr/bin/ssh-agent /home/tjk/.xsession
> tjk 353 0.0 0.3 2712 1168 ? S 09:34 0:00 \_ wmCalClock
> tjk 354 0.0 0.3 2496 992 ? S 09:34 0:00 \_ /usr/bin/wmcube
> tjk 355 0.0 0.2 2356 944 ? S 09:34 0:00 \_ /usr/X11R6/bin/wmSpaceWeather
> tjk 356 0.0 0.2 2364 848 ? S 09:34 0:00 \_ /usr/X11R6/bin/wmnet -l
> tjk 357 0.0 0.3 2476 1044 ? S 09:34 0:00 \_ wmfire
> tjk 362 0.0 0.1 1264 400 ? S 09:34 0:00 | \_ fireload_cpu
> tjk 494 0.0 0.2 2452 888 ? S 09:41 0:00 \_ /usr/bin/X11/wmavgload -shape -withdrawn
> tjk 1243 0.0 0.4 2848 1548 ? S 14:36 0:00 \_ /usr/bin/aterm
> tjk 1244 0.0 0.4 2412 1408 pts/1 S 14:36 0:00 | \_ bash
> tjk 1245 0.0 0.4 2956 1484 pts/1 S 14:37 0:00 | \_ ssh 192.168.1.111
> tjk 1250 2.2 7.1 31212 22816 ? S 14:38 0:24 \_ /usr/lib/netscape/477/communicator/communicator-smotif.real http://www.debian.org/
> tjk 1293 0.0 1.1 17160 3752 ? S 14:38 0:00 | \_ (dns helper)
> tjk 1343 0.0 1.0 5124 3276 ? S 14:43 0:00 \_ /usr/bin/Eterm
> tjk 1346 0.0 0.4 2404 1388 pts/2 S 14:43 0:00 | \_ -bash
> tjk 1347 0.0 0.4 2868 1468 pts/2 S 14:43 0:00 | \_ ssh 192.168.1.111
> tjk 1348 0.0 0.9 5252 2972 ? S 14:48 0:00 \_ xterm
> tjk 1349 0.0 0.4 2412 1404 pts/3 S 14:48 0:00 \_ bash
> tjk 1359 0.0 0.4 3336 1428 pts/3 R 14:57 0:00 \_ ps auxf
> root 292 0.0 0.1 1280 496 tty1 S 09:33 0:00 /sbin/getty 38400 tty1
> root 293 0.0 0.1 1280 496 tty2 S 09:33 0:00 /sbin/getty 38400 tty2
> root 294 0.0 0.1 1280 496 tty3 S 09:33 0:00 /sbin/getty 38400 tty3
> root 295 0.0 0.1 1280 496 tty4 S 09:33 0:00 /sbin/getty 38400 tty4
> root 296 0.0 0.1 1280 496 tty5 S 09:33 0:00 /sbin/getty 38400 tty5
> root 298 0.0 0.1 1280 496 tty6 S 09:33 0:00 /sbin/getty 38400 tty6
>
>
> client tcpwrappers
>
> ~$ cat /etc/hosts.allow
> # /etc/hosts.allow: list of hosts that are allowed to access the system.
> # See the manual pages hosts_access(5), hosts_options(5)
> # and /usr/doc/netbase/portmapper.txt.gz
> #
> # Example: ALL: LOCAL @some_netgroup
> # ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
> #
> # If you're going to protect the portmapper use the name "portmap" for the
> # daemon name. Remember that you can only use the keyword "ALL" and IP
> # addresses (NOT host or domain names) for the portmapper. See portmap(8)
> # and /usr/doc/netbase/portmapper.txt.gz for further information.
> #
> #ALL:ALL
> lpd:localhost 192.168.1.5 192.168.1.111
> printer: localhost 192.168.1.5 192.168.1.111
> sshd: 192.168.1.5 192.168.1.254 localhost 192.168.1.111
> ~$ cat /etc/hosts.deny
> # /etc/hosts.deny: list of hosts that are _not_ allowed to access the system.
> # See the manual pages hosts_access(5), hosts_options(5)
> # and /usr/doc/netbase/portmapper.txt.gz
> #
> # Example: ALL: some.host.name, .some.domain
> # ALL EXCEPT in.fingerd: other.host.name, .other.domain
> #
> # If you're going to protect the portmapper use the name "portmap" for the
> # daemon name. Remember that you can only use the keyword "ALL" and IP
> # addresses (NOT host or domain names) for the portmapper. See portmap(8)
> # and /usr/doc/netbase/portmapper.txt.gz for further information.
> #
> # The PARANOID wildcard matches any host whose name does not match its
> # address.
> ALL: ALL
>
>
> ----- End forwarded message -----
>
> --
> ----------------------------
> Ted Knab
> Breezy Network Solutions
> Tel: 410-571-8288
>
> ----- End forwarded message -----
>
> --
> ----------------------------
> Ted Knab
> Breezy Network Solutions
> Tel: 410-571-8288
>
>
> --
> To UNSUBSCRIBE, email to debian-user-request@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
:wq!
---------------------------------------------------------------------------
Robert L. Harris | Micros~1 :
Senior System Engineer | For when quality, reliability
at RnD Consulting | and security just aren't
\_ that important!
DISCLAIMER:
These are MY OPINIONS ALONE. I speak for no-one else.
FYI:
perl -e 'print $i=pack(c5,(41*2),sqrt(7056),(unpack(c,H)-2),oct(115),10);'
Reply to: