[ALTSP] Проблемы с ldm и курсором

Led ledest at gmail.com
Tue Mar 18 11:03:16 MSK 2008


Tuesday, 18 March 2008 09:44:34 Mike Grozak написав:
> Добрый день!
>
> 1. Я поправил утилитку ltsp-update-sshkeys (что бы она работала в альте)
> - кому и куда мне выслать исправленную версию?

Патч в багзиллу, пожалуйста, на соответствующий пакет.

>
> 2. Задача была такая - поднять терминальный сервер с компрессией
> траффика. Соответственно, для этого я использовал пакет ldm из
> стабильной ветки,

Что значит "ldm из стабильной ветки"?

> lts.conf следующего вида: 
> [default]
>     NETWORK_COMPRESSION=Y
>     SSH_SESSION=Y
>     SERVER=192.168.1.154
>     USE_XFS=Y
>     XFS_SERVER=192.168.1.154
>     XKBLAYOUT="us,ru"
>     XKBVARIANT=",winkeys"
>     XKBOPTIONS="grp:ctrl_shift_toggle"
>     X_COLOR_DEPTH=16
>     NBD_SWAP=Y
>     SOUND=N
>     SOUND_DAEMON=pulseaudio
>     SOUND_VOL=80
>     LOCALDEV=Y
>     INFO=Y
>     POWER_BUTTON=Y
>
> После старта ldm курсор имеет вид тёмного, мигающего при перемещении
> (движение мышью) небольшого квадратика. Такой же курсор наблюдался при
> использовании стандартной XDMCP сессии с менеджером дисплеев gdm
> (присоединялись к терминальному серверу на SLES). При присоединении к
> тому же серверу из Thinstation - всё отлично. Т.е. косяк где до внутри
> (A)LTSP. Никто не сталкивался?
>
> При вводе логина и пароля в ldm - выдаётся чёрный экран и снова окно ldm
> после некоторого ожидания.
>
> В /var/log/ldm.log пишется следующее:
>
> info: Not enabling sound support.
> info: Enabling localdev support.
> ssh command line: ['ssh', '-v', '-X', '-c',
> 'blowfish-cbc,aes128-cbc,3des-cbc', '-M', '-S', '/tmp/.ltspfs-socket',
> '-C', 'mike at 192.168.1.154', '/bin/bash', '--l
> ogin', '-c', '\' env  LTSP_CLIENT="localhost.localdomain"
> /etc/X11/Xsession && /usr/sbin/ltspfsmounter all cleanup \' ', ';',
> 'kill -1 $PPID']
> OpenSSH_4.7p1, OpenSSL 0.9.8d 28 Sep 2006
> debug1: Reading configuration data /etc/openssh/ssh_config
> debug1: Applying options for *
> debug1: Connecting to 10.109.64.154 [10.109.64.154] port 22.
> debug1: Connection established.
> debug1: permanently_set_uid: 0/0
> ssh: Could not create directory '/root/.ssh'.
> debug1: identity file /root/.ssh/id_rsa type -1
> debug1: identity file /root/.ssh/id_dsa type -1
> debug1: Remote protocol version 2.0, remote software version OpenSSH_4.7
> debug1: match: OpenSSH_4.7 pat OpenSSH*
> debug1: Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_4.7
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug1: kex: server->client blowfish-cbc hmac-md5 zlib at openssh.com
> debug1: kex: client->server blowfish-cbc hmac-md5 zlib at openssh.com
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
> debug1: Host '10.109.64.154' is known and matches the DSA host key.
> debug1: Found key in /etc/openssh/ssh_known_hosts:3
> debug1: ssh_dss_verify: signature correct
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug1: SSH2_MSG_NEWKEYS received
> debug1: SSH2_MSG_SERVICE_REQUEST sent
> debug1: SSH2_MSG_SERVICE_ACCEPT received
> debug1: Authentications that can continue: publickey,password
> debug1: Next authentication method: publickey
> debug1: Trying private key: /root/.ssh/id_rsa
> debug1: Trying private key: /root/.ssh/id_dsa
> debug1: Next authentication method: password
> debug1: read_passphrase: can't open /dev/tty: No such device or address
> debug1: permanently_drop_suid: 0
> debug1: Enabling compression at level 6.
> debug1: Authentication succeeded (password).
> debug1: channel 0: new [client-session]
> debug1: setting up multiplex master socket
> debug1: Entering interactive session.
> debug1: Requesting X11 forwarding with authentication spoofing.
> debug1: Sending environment.
> debug1: Sending command: /bin/bash --login -c ' env
> LTSP_CLIENT="localhost.localdomain" /etc/X11/Xsession &&
> /usr/sbin/ltspfsmounter all cleanup ' ; kill -1 $PPID
> debug1: client_input_channel_open: ctype x11 rchan 2 win 65536 max 16384
> debug1: client_request_x11: request from 127.0.0.1 40056
> debug1: channel 1: new [x11]
> debug1: confirm x11
> debug1: channel 1: FORCE input drain
> debug1: channel 1: free: x11, nchannels 2
> debug1: client_input_channel_open: ctype x11 rchan 2 win 65536 max 16384
> debug1: client_request_x11: request from 127.0.0.1 40057
> debug1: channel 1: new [x11]
> debug1: confirm x11
> debug1: channel 1: FORCE input drain
> debug1: channel 1: free: x11, nchannels 2
> debug1: client_input_channel_open: ctype x11 rchan 2 win 65536 max 16384
> debug1: client_request_x11: request from 127.0.0.1 40058
> debug1: channel 1: new [x11]
> debug1: confirm x11
> debug1: channel 1: FORCE input drain
> debug1: channel 1: free: x11, nchannels 2
> debug1: client_input_channel_open: ctype x11 rchan 2 win 65536 max 16384
> debug1: client_request_x11: request from 127.0.0.1 40059
> debug1: channel 1: new [x11]
> debug1: confirm x11
> debug1: client_input_channel_open: ctype x11 rchan 3 win 65536 max 16384
> debug1: client_request_x11: request from 127.0.0.1 40060
> debug1: channel 2: new [x11]
> debug1: confirm x11
> debug1: client_input_channel_open: ctype x11 rchan 4 win 65536 max 16384
> debug1: client_request_x11: request from 127.0.0.1 40061
> debug1: channel 3: new [x11]
> debug1: confirm x11
> debug1: channel 2: FORCE input drain
> debug1: channel 2: free: x11, nchannels 4
> debug1: client_input_channel_open: ctype x11 rchan 3 win 65536 max 16384
> debug1: client_request_x11: request from 127.0.0.1 40063
> debug1: channel 2: new [x11]
> debug1: confirm x11
> debug1: client_input_channel_open: ctype x11 rchan 5 win 65536 max 16384
> debug1: client_request_x11: request from 127.0.0.1 40064
> debug1: channel 4: new [x11]
> debug1: confirm x11
> debug1: client_input_channel_open: ctype x11 rchan 6 win 65536 max 16384
> debug1: client_request_x11: request from 127.0.0.1 40065
> debug1: channel 5: new [x11]
> debug1: confirm x11
> debug1: channel 3: FORCE input drain
> debug1: channel 4: FORCE input drain
> debug1: client_input_channel_open: ctype x11 rchan 7 win 65536 max 16384
> debug1: client_request_x11: request from 127.0.0.1 40066
> debug1: channel 6: new [x11]
> debug1: confirm x11
> debug1: channel 3: free: x11, nchannels 7
> debug1: channel 4: free: x11, nchannels 6
> debug1: channel 6: FORCE input drain
> debug1: channel 6: free: x11, nchannels 5
> debug1: channel 2: FORCE input drain
> debug1: channel 5: FORCE input drain
> debug1: channel 0: free: client-session, nchannels 4
> debug1: channel 1: free: x11, nchannels 3
> debug1: channel 2: free: x11, nchannels 2
> debug1: channel 5: free: x11, nchannels 1
> debug1: fd 0 clearing O_NONBLOCK
> debug1: fd 1 clearing O_NONBLOCK
> Connection to 10.109.64.154 closed by remote host.
> debug1: Transferred: stdin 0, stdout 0, stderr 52 bytes in 0.9 seconds
> debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 56.6
> debug1: Exit status -1
> debug1: compress outgoing: raw data 7675, compressed 1782, factor 0.23
> debug1: compress incoming: raw data 3152277, compressed 1024566, factor
> 0.33
>
> Что делать? Куда копать, что читать?

Боюсь, что ничего не чинить, а подождать новый ldm в Сизифе.


-- 
Led



More information about the Ltsp-server mailing list