Hey Chris, worked like a charm. Here are the log files.<b> </b> There is a segmentation fault in terminal 2.<b><br><br>Terminal 1:<br></b><br>eric@eric-desktop:~$ sudo /usr/sbin/sshd -d -d -d -p 22457
<br>[sudo] password for eric:
<br>debug2: load_server_config: filename /etc/ssh/sshd_config
<br>debug2: load_server_config: done config len = 713
<br>debug2: parse_server_config: config /etc/ssh/sshd_config len 713
<br>debug3: /etc/ssh/sshd_config:5 setting Port 22457
<br>debug3: /etc/ssh/sshd_config:9 setting Protocol 2
<br>debug3: /etc/ssh/sshd_config:11 setting HostKey /etc/ssh/ssh_host_rsa_key
<br>debug3: /etc/ssh/sshd_config:12 setting HostKey /etc/ssh/ssh_host_dsa_key
<br>debug3: /etc/ssh/sshd_config:14 setting UsePrivilegeSeparation yes
<br>debug3: /etc/ssh/sshd_config:17 setting KeyRegenerationInterval 3600
<br>debug3: /etc/ssh/sshd_config:18 setting ServerKeyBits 768
<br>debug3: /etc/ssh/sshd_config:21 setting SyslogFacility AUTH
<br>debug3: /etc/ssh/sshd_config:22 setting LogLevel INFO
<br>debug3: /etc/ssh/sshd_config:25 setting LoginGraceTime 120
<br>debug3: /etc/ssh/sshd_config:26 setting PermitRootLogin yes
<br>debug3: /etc/ssh/sshd_config:27 setting StrictModes yes
<br>debug3: /etc/ssh/sshd_config:29 setting RSAAuthentication yes
<br>debug3: /etc/ssh/sshd_config:30 setting PubkeyAuthentication yes
<br>debug3: /etc/ssh/sshd_config:31 setting AuthorizedKeysFile %h/.ssh/authorized_keys2
<br>debug3: /etc/ssh/sshd_config:34 setting IgnoreRhosts yes
<br>debug3: /etc/ssh/sshd_config:36 setting RhostsRSAAuthentication no
<br>debug3: /etc/ssh/sshd_config:38 setting HostbasedAuthentication no
<br>debug3: /etc/ssh/sshd_config:43 setting PermitEmptyPasswords no
<br>debug3: /etc/ssh/sshd_config:47 setting ChallengeResponseAuthentication no
<br>debug3: /etc/ssh/sshd_config:62 setting X11Forwarding yes
<br>debug3: /etc/ssh/sshd_config:63 setting X11DisplayOffset 10
<br>debug3: /etc/ssh/sshd_config:64 setting PrintMotd no
<br>debug3: /etc/ssh/sshd_config:65 setting PrintLastLog yes
<br>debug3: /etc/ssh/sshd_config:66 setting TCPKeepAlive yes
<br>debug3: /etc/ssh/sshd_config:73 setting AcceptEnv LANG LC_*
<br>debug3: /etc/ssh/sshd_config:75 setting Subsystem sftp /usr/lib/openssh/sftp-server
<br>debug3: /etc/ssh/sshd_config:86 setting UsePAM yes
<br>debug3: /etc/ssh/sshd_config:88 setting AllowUsers nx eric
<br>debug1: sshd version OpenSSH_5.3p1 Debian-3ubuntu7
<br>debug3: Not a RSA1 key file /etc/ssh/ssh_host_rsa_key.
<br>debug1: read PEM private key done: type RSA
<br>debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048
<br>debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
<br>debug1: private host key: #0 type 1 RSA
<br>debug3: Not a RSA1 key file /etc/ssh/ssh_host_dsa_key.
<br>debug1: read PEM private key done: type DSA
<br>debug1: Checking blacklist file /usr/share/ssh/blacklist.DSA-1024
<br>debug1: Checking blacklist file /etc/ssh/blacklist.DSA-1024
<br>debug1: private host key: #1 type 2 DSA
<br>debug1: rexec_argv[0]='/usr/sbin/sshd'
<br>debug1: rexec_argv[1]='-d'
<br>debug1: rexec_argv[2]='-d'
<br>debug1: rexec_argv[3]='-d'
<br>debug1: rexec_argv[4]='-p'
<br>debug1: rexec_argv[5]='22457'
<br>debug2: fd 3 setting O_NONBLOCK
<br>debug1: Bind to port 22457 on 0.0.0.0.
<br>Server listening on 0.0.0.0 port 22457.
<br>debug2: fd 4 setting O_NONBLOCK
<br>debug1: Bind to port 22457 on ::.
<br>Server listening on :: port 22457.
<br>debug3: fd 5 is not O_NONBLOCK
<br>debug1: Server will not fork when running in debugging mode.
<br>debug3: send_rexec_state: entering fd = 8 config len 713
<br>debug3: ssh_msg_send: type 0
<br>debug3: send_rexec_state: done
<br>debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
<br>debug1: inetd sockets after dupping: 3, 3
<br>Connection from 192.168.76.105 port 4348
<br>debug1: Client protocol version 2.0; client software version OpenSSH_4.7
<br>debug1: match: OpenSSH_4.7 pat OpenSSH_4*
<br>debug1: Enabling compatibility mode for protocol 2.0
<br>debug1: Local version string SSH-2.0-OpenSSH_5.3p1 Debian-3ubuntu7
<br>debug2: fd 3 setting O_NONBLOCK
<br>debug2: Network child is on pid 9826
<br>debug3: preauth child monitor started
<br>debug3: mm_request_receive entering
<br>debug3: privsep user:group 108:65534
<br>debug1: permanently_set_uid: 108/65534
<br>debug1: list_hostkey_types: ssh-rsa,ssh-dss
<br>debug1: SSH2_MSG_KEXINIT sent
<br>debug3: Wrote 784 bytes for a total of 823
<br>debug1: SSH2_MSG_KEXINIT received
<br>debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
<br>debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
<br>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a>
<br>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a>
<br>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com">umac-64@openssh.com</a>,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96
<br>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com">umac-64@openssh.com</a>,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96
<br>debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com">zlib@openssh.com</a>
<br>debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com">zlib@openssh.com</a>
<br>debug2: kex_parse_kexinit:
<br>debug2: kex_parse_kexinit:
<br>debug2: kex_parse_kexinit: first_kex_follows 0
<br>debug2: kex_parse_kexinit: reserved 0
<br>debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
<br>debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
<br>debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,<a href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a>,aes128-ctr,aes192-ctr,aes256-ctr
<br>debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,<a href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a>,aes128-ctr,aes192-ctr,aes256-ctr
<br>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com">umac-64@openssh.com</a>,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96
<br>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com">umac-64@openssh.com</a>,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96
<br>debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com">zlib@openssh.com</a>,zlib
<br>debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com">zlib@openssh.com</a>,zlib
<br>debug2: kex_parse_kexinit:
<br>debug2: kex_parse_kexinit:
<br>debug2: kex_parse_kexinit: first_kex_follows 0
<br>debug2: kex_parse_kexinit: reserved 0
<br>debug2: mac_setup: found hmac-md5
<br>debug1: kex: client->server aes128-cbc hmac-md5 none
<br>debug2: mac_setup: found hmac-md5
<br>debug1: kex: server->client aes128-cbc hmac-md5 none
<br>debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
<br>debug3: mm_request_send entering: type 0
<br>debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI
<br>debug3: monitor_read: checking request 0
<br>debug3: mm_request_receive_expect entering: type 1
<br>debug3: mm_answer_moduli: got parameters: 1024 1024 8192
<br>debug3: mm_request_receive entering
<br>debug3: mm_request_send entering: type 1
<br>debug2: monitor_read: 0 used once, disabling now
<br>debug3: mm_request_receive entering
<br>debug3: mm_choose_dh: remaining 0
<br>debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
<br>debug3: Wrote 152 bytes for a total of 975
<br>debug2: dh_gen_key: priv key bits set: 130/256
<br>debug2: bits set: 504/1024
<br>debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
<br>debug2: bits set: 514/1024
<br>debug3: mm_key_sign entering
<br>debug3: mm_request_send entering: type 5
<br>debug3: monitor_read: checking request 5
<br>debug3: mm_answer_sign
<br>debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN
<br>debug3: mm_request_receive_expect entering: type 6
<br>debug3: mm_request_receive entering
<br>debug3: mm_answer_sign: signature 0x216d32f0(271)
<br>debug3: mm_request_send entering: type 6
<br>debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
<br>debug2: kex_derive_keys
<br>debug2: set_newkeys: mode 1
<br>debug1: SSH2_MSG_NEWKEYS sent
<br>debug1: expecting SSH2_MSG_NEWKEYS
<br>debug3: Wrote 720 bytes for a total of 1695
<br>debug2: monitor_read: 5 used once, disabling now
<br>debug3: mm_request_receive entering
<br>debug2: set_newkeys: mode 0
<br>debug1: SSH2_MSG_NEWKEYS received
<br>debug1: KEX done
<br>debug3: Wrote 48 bytes for a total of 1743
<br>debug1: userauth-request for user nx service ssh-connection method none
<br>debug1: attempt 0 failures 0
<br>debug3: mm_getpwnamallow entering
<br>debug3: mm_request_send entering: type 7
<br>debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM
<br>debug3: mm_request_receive_expect entering: type 8
<br>debug3: mm_request_receive entering
<br>debug3: monitor_read: checking request 7
<br>debug3: mm_answer_pwnamallow
<br>debug3: Trying to reverse map address 192.168.76.105.
<br>debug2: parse_server_config: config reprocess config len 713
<br>debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
<br>debug3: mm_request_send entering: type 8
<br>debug2: monitor_read: 7 used once, disabling now
<br>debug3: mm_request_receive entering
<br>debug2: input_userauth_request: setting up authctxt for nx
<br>debug3: mm_start_pam entering
<br>debug3: mm_request_send entering: type 50
<br>debug3: mm_inform_authserv entering
<br>debug3: mm_request_send entering: type 3
<br>debug2: input_userauth_request: try method none
<br>debug3: mm_auth_password entering
<br>debug3: mm_request_send entering: type 11
<br>debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD
<br>debug3: mm_request_receive_expect entering: type 12
<br>debug3: mm_request_receive entering
<br>debug3: monitor_read: checking request 50
<br>debug1: PAM: initializing for "nx"
<br>debug1: PAM: setting PAM_RHOST to "192.168.76.105"
<br>debug1: PAM: setting PAM_TTY to "ssh"
<br>debug2: monitor_read: 50 used once, disabling now
<br>debug3: mm_request_receive entering
<br>debug3: monitor_read: checking request 3
<br>debug3: mm_answer_authserv: service=ssh-connection, style=, role=
<br>debug2: monitor_read: 3 used once, disabling now
<br>debug3: mm_request_receive entering
<br>debug3: monitor_read: checking request 11
<br>debug3: mm_answer_authpassword: sending result 0
<br>debug3: mm_request_send entering: type 12
<br>debug3: mm_auth_password: user not authenticated
<br>debug3: Wrote 64 bytes for a total of 1807
<br>Failed none for nx from 192.168.76.105 port 4348 ssh2
<br>debug3: mm_request_receive entering
<br>debug1: userauth-request for user nx service ssh-connection method publickey
<br>debug1: attempt 1 failures 0
<br>debug2: input_userauth_request: try method publickey
<br>debug3: mm_key_allowed entering
<br>debug3: mm_request_send entering: type 21
<br>debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED
<br>debug3: mm_request_receive_expect entering: type 22
<br>debug3: mm_request_receive entering
<br>debug3: monitor_read: checking request 21
<br>debug3: mm_answer_keyallowed entering
<br>debug3: mm_answer_keyallowed: key_from_blob: 0x216d9718
<br>debug1: Checking blacklist file /usr/share/ssh/blacklist.DSA-1024
<br>debug1: Checking blacklist file /etc/ssh/blacklist.DSA-1024
<br>debug1: temporarily_use_uid: 116/126 (e=0/0)
<br>debug1: trying public key file /var/lib/nxserver/home//.ssh/authorized_keys2
<br>debug1: fd 4 clearing O_NONBLOCK
<br>debug3: secure_filename: checking '/var/lib/nxserver/home/.ssh'
<br>debug3: secure_filename: checking '/var/lib/nxserver/home'
<br>debug3: secure_filename: terminating check at '/var/lib/nxserver/home'
<br>debug2: key_type_from_name: unknown key type 'no-port-forwarding,no-agent-forwarding,command="/usr/lib/nx/nxserver"'
<br>debug3: key_read: missing keytype
<br>debug2: user_key_allowed: check options: 'no-port-forwarding,no-agent-forwarding,command="/usr/lib/nx/nxserver" ssh-dss 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 root@nettuno
<br>'
<br>debug1: matching key found: file /var/lib/nxserver/home//.ssh/authorized_keys2, line 1
<br>Found matching DSA key: 4b:9b:38:6b:24:33:6b:48:e4:f8:c4:5b:c9:f1:fd:98
<br>debug1: restore_uid: 0/0
<br>debug3: mm_answer_keyallowed: key 0x216d9718 is allowed
<br>debug3: mm_append_debug: Appending debug messages for child
<br>debug3: mm_request_send entering: type 22
<br>debug3: mm_send_debug: Sending debug: Port forwarding disabled.
<br>debug3: Wrote 64 bytes for a total of 1871
<br>debug3: mm_send_debug: Sending debug: Agent forwarding disabled.
<br>debug3: Wrote 64 bytes for a total of 1935
<br>debug3: mm_send_debug: Sending debug: Forced command: /usr/lib/nx/nxserver
<br>debug3: Wrote 80 bytes for a total of 2015
<br>debug3: mm_key_verify entering
<br>debug3: mm_request_send entering: type 23
<br>debug3: mm_key_verify: waiting for MONITOR_ANS_KEYVERIFY
<br>debug3: mm_request_receive_expect entering: type 24
<br>debug3: mm_request_receive entering
<br>debug3: mm_request_receive entering
<br>debug3: monitor_read: checking request 23
<br>debug1: ssh_dss_verify: signature correct
<br>debug3: mm_answer_keyverify: key 0x216d2978 signature verified
<br>debug3: mm_request_send entering: type 24
<br>debug2: userauth_pubkey: authenticated 1 pkalg ssh-dss
<br>debug3: mm_do_pam_account entering
<br>debug3: mm_request_send entering: type 51
<br>debug3: mm_request_receive_expect entering: type 52
<br>debug3: mm_request_receive entering
<br>debug3: mm_request_receive_expect entering: type 51
<br>debug3: mm_request_receive entering
<br>debug1: do_pam_account: called
<br>debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success)
<br>debug3: mm_request_send entering: type 52
<br>debug3: mm_do_pam_account returning 1
<br>debug3: Wrote 32 bytes for a total of 2047
<br>debug3: mm_send_keystate: Sending new keys: 0x216d2e68 0x216ca9e0
<br>debug3: mm_newkeys_to_blob: converting 0x216d2e68
<br>debug3: mm_newkeys_to_blob: converting 0x216ca9e0
<br>debug3: mm_send_keystate: New keys have been sent
<br>debug3: mm_send_keystate: Sending compression state
<br>debug3: mm_request_send entering: type 25
<br>debug3: mm_send_keystate: Finished sending state
<br>Accepted publickey for nx from 192.168.76.105 port 4348 ssh2
<br>debug1: monitor_child_preauth: nx has been authenticated by privileged process
<br>debug3: mm_get_keystate: Waiting for new keys
<br>debug3: mm_request_receive_expect entering: type 25
<br>debug3: mm_request_receive entering
<br>debug3: mm_newkeys_from_blob: 0x216db200(118)
<br>debug2: mac_setup: found hmac-md5
<br>debug3: mm_get_keystate: Waiting for second key
<br>debug3: mm_newkeys_from_blob: 0x216db200(118)
<br>debug2: mac_setup: found hmac-md5
<br>debug3: mm_get_keystate: Getting compression state
<br>debug3: mm_get_keystate: Getting Network I/O buffers
<br>debug3: mm_share_sync: Share sync
<br>debug3: mm_share_sync: Share sync end
<br>debug1: PAM: establishing credentials
<br>debug3: PAM: opening session
<br>debug3: PAM: sshpam_store_conv called with 1 messages
<br>User child is on pid 9889
<br>debug3: mm_request_receive entering
<br>debug1: SELinux support disabled
<br>debug1: PAM: establishing credentials
<br>debug1: permanently_set_uid: 116/126
<br>debug2: set_newkeys: mode 0
<br>debug2: set_newkeys: mode 1
<br>debug1: Entering interactive session for SSH2.
<br>debug2: fd 7 setting O_NONBLOCK
<br>debug2: fd 8 setting O_NONBLOCK
<br>debug1: server_init_dispatch_20
<br>debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max 32768
<br>debug1: input_session_request
<br>debug1: channel 0: new [server-session]
<br>debug2: session_new: allocate (allocated 0 max 10)
<br>debug3: session_unused: session id 0 unused
<br>debug1: session_new: session 0
<br>debug1: session_open: channel 0
<br>debug1: session_open: session 0: link with channel 0
<br>debug1: server_input_channel_open: confirm session
<br>debug3: Wrote 48 bytes for a total of 2095
<br>debug1: server_input_channel_req: channel 0 request x11-req reply 0
<br>debug1: session_by_channel: session 0 channel 0
<br>debug1: session_input_channel_req: session 0 req x11-req
<br>debug2: fd 9 setting O_NONBLOCK
<br>debug3: fd 9 is O_NONBLOCK
<br>debug1: channel 1: new [X11 inet listener]
<br>debug2: fd 10 setting O_NONBLOCK
<br>debug3: fd 10 is O_NONBLOCK
<br>debug1: channel 2: new [X11 inet listener]
<br>debug1: server_input_channel_req: channel 0 request shell reply 0
<br>debug1: session_by_channel: session 0 channel 0
<br>debug1: session_input_channel_req: session 0 req shell
<br>debug1: Forced command (key option) '/usr/lib/nx/nxserver'
<br>debug2: fd 3 setting TCP_NODELAY
<br>debug2: fd 13 setting O_NONBLOCK
<br>debug2: fd 12 setting O_NONBLOCK
<br>debug2: fd 15 setting O_NONBLOCK
<br>debug3: Wrote 48 bytes for a total of 2143
<br>debug2: channel 0: read 104 from efd 15
<br>debug2: channel 0: rwin 2097152 elen 104 euse 1
<br>debug2: channel 0: sent ext data 104
<br>debug3: Wrote 144 bytes for a total of 2287
<br>debug2: channel 0: read 44 from efd 15
<br>debug2: channel 0: rwin 2097048 elen 44 euse 1
<br>debug2: channel 0: sent ext data 44
<br>debug3: Wrote 96 bytes for a total of 2383
<br>debug2: channel 0: read 107 from efd 15
<br>debug2: channel 0: rwin 2097004 elen 107 euse 1
<br>debug2: channel 0: sent ext data 107
<br>debug3: Wrote 160 bytes for a total of 2543
<br>debug2: channel 0: read 13 from efd 15
<br>debug2: channel 0: rwin 2096897 elen 13 euse 1
<br>debug2: channel 0: sent ext data 13
<br>debug3: Wrote 64 bytes for a total of 2607
<br>debug2: channel 0: read 10 from efd 15
<br>debug2: channel 0: rwin 2096884 elen 10 euse 1
<br>debug2: channel 0: sent ext data 10
<br>debug3: Wrote 48 bytes for a total of 2655
<br>debug2: channel 0: read 13 from efd 15
<br>debug2: channel 0: rwin 2096874 elen 13 euse 1
<br>debug2: channel 0: sent ext data 13
<br>debug3: Wrote 64 bytes for a total of 2719
<br>debug2: channel 0: read 31 from efd 15
<br>debug2: channel 0: rwin 2096861 elen 31 euse 1
<br>debug2: channel 0: sent ext data 31
<br>debug3: Wrote 80 bytes for a total of 2799
<br>debug2: channel 0: read 79 from efd 15
<br>debug2: channel 0: rwin 2096830 elen 79 euse 1
<br>debug2: channel 0: sent ext data 79
<br>debug3: Wrote 128 bytes for a total of 2927
<br>debug2: channel 0: read 20 from efd 15
<br>debug2: channel 0: rwin 2096751 elen 20 euse 1
<br>debug2: channel 0: sent ext data 20
<br>debug3: Wrote 64 bytes for a total of 2991
<br>debug2: channel 0: read 26 from efd 15
<br>debug2: channel 0: rwin 2096731 elen 26 euse 1
<br>debug2: channel 0: sent ext data 26
<br>debug3: Wrote 64 bytes for a total of 3055
<br>debug2: channel 0: read 39 from efd 15
<br>debug2: channel 0: rwin 2096705 elen 39 euse 1
<br>debug2: channel 0: sent ext data 39
<br>debug3: Wrote 80 bytes for a total of 3135
<br>debug2: channel 0: read 58 from efd 15
<br>debug2: channel 0: rwin 2096666 elen 58 euse 1
<br>debug2: channel 0: sent ext data 58
<br>debug3: Wrote 96 bytes for a total of 3231
<br>debug2: channel 0: read 25 from efd 15
<br>debug2: channel 0: rwin 2096608 elen 25 euse 1
<br>debug2: channel 0: sent ext data 25
<br>debug3: Wrote 64 bytes for a total of 3295
<br>debug2: channel 0: read 19 from efd 15
<br>debug2: channel 0: rwin 2096583 elen 19 euse 1
<br>debug2: channel 0: sent ext data 19
<br>debug3: Wrote 64 bytes for a total of 3359
<br>debug2: channel 0: read 82 from efd 15
<br>debug2: channel 0: rwin 2096564 elen 82 euse 1
<br>debug2: channel 0: sent ext data 82
<br>debug3: Wrote 128 bytes for a total of 3487
<br>debug2: channel 0: read 50 from efd 15
<br>debug2: channel 0: rwin 2096482 elen 50 euse 1
<br>debug2: channel 0: sent ext data 50
<br>debug3: Wrote 96 bytes for a total of 3583
<br>debug2: channel 0: read 48 from efd 15
<br>debug2: channel 0: rwin 2096432 elen 48 euse 1
<br>debug2: channel 0: sent ext data 48
<br>debug3: Wrote 96 bytes for a total of 3679
<br>debug2: channel 0: read 50 from efd 15
<br>debug2: channel 0: rwin 2096384 elen 50 euse 1
<br>debug2: channel 0: sent ext data 50
<br>debug3: Wrote 96 bytes for a total of 3775
<br>debug2: channel 0: read 40 from efd 15
<br>debug2: channel 0: rwin 2096334 elen 40 euse 1
<br>debug2: channel 0: sent ext data 40
<br>debug3: Wrote 80 bytes for a total of 3855
<br>debug2: channel 0: read 81 from efd 15
<br>debug2: channel 0: rwin 2096294 elen 81 euse 1
<br>debug2: channel 0: sent ext data 81
<br>debug3: Wrote 128 bytes for a total of 3983
<br>debug3: Wrote 112 bytes for a total of 4095
<br>debug3: Wrote 80 bytes for a total of 4175
<br>debug3: Wrote 80 bytes for a total of 4255
<br>debug3: Wrote 48 bytes for a total of 4303
<br>debug3: Wrote 64 bytes for a total of 4367
<br>debug3: Wrote 48 bytes for a total of 4415
<br>debug3: Wrote 64 bytes for a total of 4479
<br>debug3: Wrote 48 bytes for a total of 4527
<br>debug3: Wrote 48 bytes for a total of 4575
<br>debug3: Wrote 48 bytes for a total of 4623
<br>debug3: Wrote 48 bytes for a total of 4671
<br>debug3: Wrote 64 bytes for a total of 4735
<br>debug3: Wrote 48 bytes for a total of 4783
<br>debug3: Wrote 96 bytes for a total of 4879
<br>debug3: Wrote 144 bytes for a total of 5023
<br>debug3: Wrote 48 bytes for a total of 5071
<br>debug2: channel 0: read failed
<br>debug2: channel 0: close_read
<br>debug2: channel 0: input open -> drain
<br>debug2: channel 0: read 0 from efd 15
<br>debug2: channel 0: closing read-efd 15
<br>debug2: channel 0: ibuf empty
<br>debug2: channel 0: send eof
<br>debug2: channel 0: input drain -> closed
<br>debug2: notify_done: reading
<br>debug1: Received SIGCHLD.
<br>debug1: session_by_pid: pid 9890
<br>debug1: session_exit_message: session 0 channel 0 pid 9890
<br>debug2: channel 0: request exit-status confirm 0
<br>debug1: session_exit_message: release channel 0
<br>debug2: channel 0: write failed
<br>debug2: channel 0: close_write
<br>debug2: channel 0: send eow
<br>debug2: channel 0: output open -> closed
<br>debug2: channel 0: send close
<br>debug3: Wrote 128 bytes for a total of 5199
<br>debug3: channel 0: will not send data after close
<br>Connection closed by 192.168.76.105
<br>debug1: channel 0: free: server-session, nchannels 3
<br>debug3: channel 0: status: The following connections are open:
<br> #0 server-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1)
<br>
<br>debug3: channel 0: close_fds r -1 w -1 e -1 c -1
<br>debug1: channel 1: free: X11 inet listener, nchannels 2
<br>debug3: channel 1: status: The following connections are open:
<br>
<br>debug3: channel 1: close_fds r 9 w 9 e -1 c -1
<br>debug1: channel 2: free: X11 inet listener, nchannels 1
<br>debug3: channel 2: status: The following connections are open:
<br>
<br>debug3: channel 2: close_fds r 10 w 10 e -1 c -1
<br>debug1: session_close: session 0 pid 0
<br>debug3: session_unused: session id 0 unused
<br>debug1: do_cleanup
<br>debug3: PAM: sshpam_thread_cleanup entering
<br>Transferred: sent 4408, received 1968 bytes
<br>Closing connection to 192.168.76.105 port 4348
<br>debug3: mm_request_send entering: type 65
<br>debug3: monitor_read: checking request 65
<br>debug3: mm_answer_term: tearing down sessions
<br>debug1: PAM: cleanup
<br>debug1: PAM: closing session
<br>debug1: PAM: deleting credentials
<br>eric@eric-desktop:~$ exit
<br>exit
<br><br>Script done on Thu 16 Feb 2012 12:40:39 AM MST<br><b><br><br>Terminal 2:<br><br></b>Script started on Thu 16 Feb 2012 12:39:37 AM MST<br>eric@eric-desktop:~$ sudo /usr/sbin/sshd -d -d -d -p 1000
<br>[sudo] password for eric:
<br>debug2: load_server_config: filename /etc/ssh/sshd_config
<br>debug2: load_server_config: done config len = 713
<br>debug2: parse_server_config: config /etc/ssh/sshd_config len 713
<br>debug3: /etc/ssh/sshd_config:5 setting Port 22457
<br>debug3: /etc/ssh/sshd_config:9 setting Protocol 2
<br>debug3: /etc/ssh/sshd_config:11 setting HostKey /etc/ssh/ssh_host_rsa_key
<br>debug3: /etc/ssh/sshd_config:12 setting HostKey /etc/ssh/ssh_host_dsa_key
<br>debug3: /etc/ssh/sshd_config:14 setting UsePrivilegeSeparation yes
<br>debug3: /etc/ssh/sshd_config:17 setting KeyRegenerationInterval 3600
<br>debug3: /etc/ssh/sshd_config:18 setting ServerKeyBits 768
<br>debug3: /etc/ssh/sshd_config:21 setting SyslogFacility AUTH
<br>debug3: /etc/ssh/sshd_config:22 setting LogLevel INFO
<br>debug3: /etc/ssh/sshd_config:25 setting LoginGraceTime 120
<br>debug3: /etc/ssh/sshd_config:26 setting PermitRootLogin yes
<br>debug3: /etc/ssh/sshd_config:27 setting StrictModes yes
<br>debug3: /etc/ssh/sshd_config:29 setting RSAAuthentication yes
<br>debug3: /etc/ssh/sshd_config:30 setting PubkeyAuthentication yes
<br>debug3: /etc/ssh/sshd_config:31 setting AuthorizedKeysFile %h/.ssh/authorized_keys2
<br>debug3: /etc/ssh/sshd_config:34 setting IgnoreRhosts yes
<br>debug3: /etc/ssh/sshd_config:36 setting RhostsRSAAuthentication no
<br>debug3: /etc/ssh/sshd_config:38 setting HostbasedAuthentication no
<br>debug3: /etc/ssh/sshd_config:43 setting PermitEmptyPasswords no
<br>debug3: /etc/ssh/sshd_config:47 setting ChallengeResponseAuthentication no
<br>debug3: /etc/ssh/sshd_config:62 setting X11Forwarding yes
<br>debug3: /etc/ssh/sshd_config:63 setting X11DisplayOffset 10
<br>debug3: /etc/ssh/sshd_config:64 setting PrintMotd no
<br>debug3: /etc/ssh/sshd_config:65 setting PrintLastLog yes
<br>debug3: /etc/ssh/sshd_config:66 setting TCPKeepAlive yes
<br>debug3: /etc/ssh/sshd_config:73 setting AcceptEnv LANG LC_*
<br>debug3: /etc/ssh/sshd_config:75 setting Subsystem sftp /usr/lib/openssh/sftp-server
<br>debug3: /etc/ssh/sshd_config:86 setting UsePAM yes
<br>debug3: /etc/ssh/sshd_config:88 setting AllowUsers nx eric
<br>debug1: sshd version OpenSSH_5.3p1 Debian-3ubuntu7
<br>debug3: Not a RSA1 key file /etc/ssh/ssh_host_rsa_key.
<br>debug1: read PEM private key done: type RSA
<br>debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048
<br>debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
<br>debug1: private host key: #0 type 1 RSA
<br>debug3: Not a RSA1 key file /etc/ssh/ssh_host_dsa_key.
<br>debug1: read PEM private key done: type DSA
<br>debug1: Checking blacklist file /usr/share/ssh/blacklist.DSA-1024
<br>debug1: Checking blacklist file /etc/ssh/blacklist.DSA-1024
<br>debug1: private host key: #1 type 2 DSA
<br>debug1: rexec_argv[0]='/usr/sbin/sshd'
<br>debug1: rexec_argv[1]='-d'
<br>debug1: rexec_argv[2]='-d'
<br>debug1: rexec_argv[3]='-d'
<br>debug1: rexec_argv[4]='-p'
<br>debug1: rexec_argv[5]='1000'
<br>debug2: fd 3 setting O_NONBLOCK
<br>debug1: Bind to port 1000 on 0.0.0.0.
<br>Server listening on 0.0.0.0 port 1000.
<br>debug2: fd 4 setting O_NONBLOCK
<br>debug1: Bind to port 1000 on ::.
<br>Server listening on :: port 1000.
<br>debug3: fd 5 is not O_NONBLOCK
<br>debug1: Server will not fork when running in debugging mode.
<br>debug3: send_rexec_state: entering fd = 8 config len 713
<br>debug3: ssh_msg_send: type 0
<br>debug3: send_rexec_state: done
<br>debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
<br>debug1: inetd sockets after dupping: 3, 3
<br>Connection from 127.0.0.1 port 48318
<br>debug1: Client protocol version 2.0; client software version OpenSSH_5.3p1 Debian-3ubuntu7
<br>debug1: match: OpenSSH_5.3p1 Debian-3ubuntu7 pat OpenSSH*
<br>debug1: Enabling compatibility mode for protocol 2.0
<br>debug1: Local version string SSH-2.0-OpenSSH_5.3p1 Debian-3ubuntu7
<br>debug2: fd 3 setting O_NONBLOCK
<br>debug2: Network child is on pid 10064
<br>debug3: preauth child monitor started
<br>debug3: mm_request_receive entering
<br>debug3: privsep user:group 108:65534
<br>debug1: permanently_set_uid: 108/65534
<br>debug1: list_hostkey_types: ssh-rsa,ssh-dss
<br>debug1: SSH2_MSG_KEXINIT sent
<br>debug3: Wrote 784 bytes for a total of 823
<br>debug1: SSH2_MSG_KEXINIT received
<br>debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
<br>debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
<br>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a>
<br>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a>
<br>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com">umac-64@openssh.com</a>,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96
<br>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com">umac-64@openssh.com</a>,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96
<br>debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com">zlib@openssh.com</a>
<br>debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com">zlib@openssh.com</a>
<br>debug2: kex_parse_kexinit:
<br>debug2: kex_parse_kexinit:
<br>debug2: kex_parse_kexinit: first_kex_follows 0
<br>debug2: kex_parse_kexinit: reserved 0
<br>debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
<br>debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
<br>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a>
<br>debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,<a href="mailto:rijndael-cbc@lysator.liu.se">rijndael-cbc@lysator.liu.se</a>
<br>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com">umac-64@openssh.com</a>,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96
<br>debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,<a href="mailto:umac-64@openssh.com">umac-64@openssh.com</a>,hmac-ripemd160,<a href="mailto:hmac-ripemd160@openssh.com">hmac-ripemd160@openssh.com</a>,hmac-sha1-96,hmac-md5-96
<br>debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com">zlib@openssh.com</a>,zlib
<br>debug2: kex_parse_kexinit: none,<a href="mailto:zlib@openssh.com">zlib@openssh.com</a>,zlib
<br>debug2: kex_parse_kexinit:
<br>debug2: kex_parse_kexinit:
<br>debug2: kex_parse_kexinit: first_kex_follows 0
<br>debug2: kex_parse_kexinit: reserved 0
<br>debug2: mac_setup: found hmac-md5
<br>debug1: kex: client->server aes128-ctr hmac-md5 none
<br>debug2: mac_setup: found hmac-md5
<br>debug1: kex: server->client aes128-ctr hmac-md5 none
<br>debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
<br>debug3: mm_request_send entering: type 0
<br>debug3: monitor_read: checking request 0
<br>debug3: mm_answer_moduli: got parameters: 1024 1024 8192
<br>debug3: mm_request_send entering: type 1
<br>debug2: monitor_read: 0 used once, disabling now
<br>debug3: mm_request_receive entering
<br>debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI
<br>debug3: mm_request_receive_expect entering: type 1
<br>debug3: mm_request_receive entering
<br>debug3: mm_choose_dh: remaining 0
<br>debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
<br>debug3: Wrote 152 bytes for a total of 975
<br>debug2: dh_gen_key: priv key bits set: 128/256
<br>debug2: bits set: 544/1024
<br>debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
<br>debug2: bits set: 492/1024
<br>debug3: mm_key_sign entering
<br>debug3: mm_request_send entering: type 5
<br>debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN
<br>debug3: mm_request_receive_expect entering: type 6
<br>debug3: monitor_read: checking request 5
<br>debug3: mm_request_receive entering
<br>debug3: mm_answer_sign
<br>debug3: mm_answer_sign: signature 0x223ef2e8(271)
<br>debug3: mm_request_send entering: type 6
<br>debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
<br>debug2: kex_derive_keys
<br>debug2: set_newkeys: mode 1
<br>debug1: SSH2_MSG_NEWKEYS sent
<br>debug1: expecting SSH2_MSG_NEWKEYS
<br>debug3: Wrote 720 bytes for a total of 1695
<br>debug2: monitor_read: 5 used once, disabling now
<br>debug3: mm_request_receive entering
<br>debug2: set_newkeys: mode 0
<br>debug1: SSH2_MSG_NEWKEYS received
<br>debug1: KEX done
<br>debug3: Wrote 48 bytes for a total of 1743
<br>debug1: userauth-request for user eric service ssh-connection method none
<br>debug1: attempt 0 failures 0
<br>debug3: mm_getpwnamallow entering
<br>debug3: mm_request_send entering: type 7
<br>debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM
<br>debug3: mm_request_receive_expect entering: type 8
<br>debug3: mm_request_receive entering
<br>debug3: monitor_read: checking request 7
<br>debug3: mm_answer_pwnamallow
<br>debug3: Trying to reverse map address 127.0.0.1.
<br>debug1: do_cleanup
<br>debug3: PAM: sshpam_thread_cleanup entering
<br>Segmentation fault
<br>eric@eric-desktop:~$ exit
<br>exit
<br><br>Script done on Thu 16 Feb 2012 12:40:35 AM MST<br><b><br></b><br><div class="gmail_quote">On Tue, Feb 14, 2012 at 1:07 PM, <span dir="ltr"><<a href="mailto:chris@ccburton.com">chris@ccburton.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<br><tt><font><a href="mailto:freenx-knx-bounces@kde.org" target="_blank">freenx-knx-bounces@kde.org</a> wrote on 14/02/2012 17:45:42:<div class="im"><br>
<br>
> Thanks for the information Chris. I'll give it another shot,
but <br>
> I'm unable to even get into my machine with the nxclient from my <br>
> Windows machines. The server experiences the segfault and says
<br>
> authentication failed. I think the problem started when I was
last <br>
> able to remote in and started a session where I was using Firefox
<br>
> and FireFTP. I closed the session (didn't terminate it), and
I've <br>
> not been able to get back in since.<br>
> <br>
> I'll get you more information, and I really appreciate your help this
far. <br>
</div></font></tt>
<br>
<br><tt><font>Actually I've just had a look through your debug again.</font></tt>
<br>
<br><tt><font>NOTE</font></tt>
<br><tt><font>NX makes two ssh connections, a remote using rsa and
then</font></tt>
<br><tt><font>another to localhost using password.</font></tt>
<br>
<br><tt><font>On yours the second one fails, but running sshd in
debug mode</font></tt>
<br><tt><font>means you only get one connection.</font></tt>
<br>
<br><tt><font>so</font></tt>
<br>
<br><tt><font>to debug this second connection you will need to run</font></tt>
<br><tt><font>a separate sshd in debug mode.</font></tt>
<br><tt><font>and</font></tt>
<br><tt><font>tell FreeNX to use that one using SSHD_PORT=</font></tt>
<br>
<br>
<br><tt><font>It's just as easy to run two in debug mode so</font></tt>
<br><tt><font>you get a full picture</font></tt>
<br>
<br>
<br>
<br>
<br><tt><font>You will need two "root" terminal sessions
on your server.</font></tt>
<br>
<br>
<br><tt><font>Stop the ssh service</font></tt>
<br>
<br><tt><font>In terminal 1 run</font></tt>
<br>
<br><tt><font> /usr/sbin/sshd
-d -d -d -p 22 </font></tt>
<br>
<br><tt><font> If you have changed
from port 22 to another one</font></tt>
<br><tt><font>
- use the other one.</font></tt>
<br>
<br><tt><font>In terminal 2</font></tt>
<br>
<br><tt><font> edit /etc/nxserver/node.conf
and change</font></tt>
<br><tt><font> #SSHD_PORT=22
(or whater you use)</font></tt>
<br><tt><font>
to a different port eg.1000</font></tt>
<br><tt><font> & uncomment
it if necessary</font></tt>
<br><tt><font> SSHD_PORT=1000</font></tt>
<br>
<br><tt><font>then run</font></tt>
<br>
<br><tt><font> /usr/sbin/sshd
-d -d -d -p 1000-or-whatever</font></tt>
<br>
<br><tt><font>to start the second sshd in term2</font></tt>
<br>
<br>
<br><tt><font>Then you can try your nxclient</font></tt>
<br><tt><font> (against the sshd
on the port in t1) </font></tt>
<br>
<br><tt><font>and see if it falls over . . .</font></tt>
<br>
<br>
<br><tt><font>I note the sshd pid from the segfault does not</font></tt>
<br><tt><font>correspond to any of the sshd pids in your debug.</font></tt>
<br>
<br><tt><font>Are you sure they are related ??</font></tt>
<br>
<br>
<br><br>________________________________________________________________<br>
Were you helped on this list with your FreeNX problem?<br>
Then please write up the solution in the FreeNX Wiki/FAQ:<br>
<br>
<a href="http://openfacts2.berlios.de/wikien/index.php/BerliosProject:FreeNX_-_FAQ" target="_blank">http://openfacts2.berlios.de/wikien/index.php/BerliosProject:FreeNX_-_FAQ</a><br>
<br>
Don't forget to check the NX Knowledge Base:<br>
<a href="http://www.nomachine.com/kb/" target="_blank">http://www.nomachine.com/kb/</a><br>
<br>
________________________________________________________________<br>
FreeNX-kNX mailing list --- <a href="mailto:FreeNX-kNX@kde.org">FreeNX-kNX@kde.org</a><br>
<a href="https://mail.kde.org/mailman/listinfo/freenx-knx" target="_blank">https://mail.kde.org/mailman/listinfo/freenx-knx</a><br>
________________________________________________________________<br></blockquote></div><br>