X11-4 box? vi /etc/X11/xinit/xserverrc, make sure the 2 words "-nolisten tcp" aren't there on the box you are trying to display to.
Thus spake Theodore Knab ([EMAIL PROTECTED]): > Hello I am trying to run xterm from a remote machine. > > I tried xterm -display 0:0 > xterm -display 192.168.1.111:0.0 #host ip > xterm -display 192.168.1.10:0.0 #client ip > > All give the following error: > > [EMAIL PROTECTED]:~$ xterm -display 0:0 > _X11TransSocketINETConnect: Can't connect: errno = 111 > _X11TransSocketINETConnect: Can't connect: errno = 111 > _X11TransSocketINETConnect: Can't connect: errno = 111 > _X11TransSocketINETConnect: Can't connect: errno = 111 > _X11TransSocketINETConnect: Can't connect: errno = 111 > _X11TransSocketINETConnect: Can't connect: errno = 111 > xterm Xt error: Can't open display: 0:0 > > ============================================== > My Questions > ============================================== > What does this error mean? > Could it be caused by my tcpwrappers? > > What needs to be running for remote xserver to work? > > ============================================== > Server (host) machine processes > ============================================== > > [EMAIL PROTECTED]:~$ ps auxf > USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND > root 1 0.1 0.2 1236 528 ? S 13:33 0:05 init [2] > root 2 0.0 0.0 0 0 ? SW 13:33 0:00 [kflushd] > root 3 0.0 0.0 0 0 ? SW 13:33 0:00 [kupdate] > root 4 0.0 0.0 0 0 ? SW 13:33 0:00 [kswapd] > root 5 0.0 0.0 0 0 ? SW 13:33 0:00 [keventd] > root 280 0.0 0.2 1312 628 ? S 13:35 0:00 /sbin/syslogd > root 284 0.0 0.2 1276 520 ? S 13:35 0:00 /sbin/klogd > root 291 0.0 0.1 1220 484 ? S 13:35 0:00 /sbin/kerneld > cyrus 301 0.0 0.1 1636 368 ? S 13:35 0:00 > /usr/sbin/pwcheck > root 320 0.0 0.3 2460 1016 ? S 13:35 0:01 /usr/sbin/sshd > root 2259 0.0 0.5 2904 1504 ? S 14:36 0:00 \_ > /usr/sbin/sshd > tjk 2260 0.0 0.5 2248 1352 pts/0 S 14:37 0:00 | \_ -bash > tjk 2352 0.0 0.5 2284 1440 pts/0 S 14:41 0:00 | \_ > mutt > tjk 2365 0.0 0.5 2320 1408 pts/0 S 14:42 0:00 | > \_ vi /tmp/mutt-breezysolutions-2352-1 > root 2366 0.0 0.5 2820 1488 ? S 14:43 0:00 \_ > /usr/sbin/sshd > tjk 2367 0.0 0.5 2240 1332 pts/1 R 14:43 0:00 \_ -bash > tjk 2443 0.0 0.4 2856 1064 pts/1 R 14:51 0:00 \_ ps > auxf > root 324 0.0 0.2 1384 668 ? S 13:35 0:00 /usr/sbin/cron > root 329 0.0 0.9 37940 2468 ? S 13:35 0:00 > /usr/sbin/apache > www-data 334 0.0 1.0 38008 2600 ? S 13:35 0:00 \_ > /usr/sbin/apache > www-data 335 0.0 1.1 38076 2848 ? S 13:35 0:00 \_ > /usr/sbin/apache > www-data 336 0.0 1.0 38016 2596 ? S 13:35 0:00 \_ > /usr/sbin/apache > www-data 337 0.0 1.0 38060 2796 ? S 13:35 0:00 \_ > /usr/sbin/apache > www-data 338 0.0 1.0 38016 2600 ? S 13:35 0:00 \_ > /usr/sbin/apache > www-data 1808 0.0 1.0 38012 2600 ? S 14:09 0:00 \_ > /usr/sbin/apache > www-data 2310 0.0 0.9 37956 2480 ? S 14:38 0:00 \_ > /usr/sbin/apache > www-data 2311 0.0 0.9 37956 2480 ? S 14:39 0:00 \_ > /usr/sbin/apache > root 340 0.0 1.1 38856 3020 ? S 13:35 0:00 > /usr/sbin/apache-ssl > www-data 349 0.0 0.3 2688 792 ? S 13:35 0:00 \_ gcache 33 > /var/run/gcache_port > www-data 350 0.0 1.2 38968 3140 ? S 13:35 0:00 \_ > /usr/sbin/apache-ssl > www-data 351 0.0 1.1 38880 3020 ? S 13:35 0:00 \_ > /usr/sbin/apache-ssl > www-data 352 0.0 1.1 38880 3020 ? S 13:35 0:00 \_ > /usr/sbin/apache-ssl > www-data 353 0.0 1.1 38880 3020 ? S 13:35 0:00 \_ > /usr/sbin/apache-ssl > www-data 354 0.0 1.1 38880 3020 ? S 13:35 0:00 \_ > /usr/sbin/apache-ssl > root 344 0.0 0.1 1220 500 tty2 S 13:35 0:00 /sbin/getty > 38400 tty2 > root 345 0.0 0.1 1220 500 tty3 S 13:35 0:00 /sbin/getty > 38400 tty3 > root 346 0.0 0.1 1220 500 tty4 S 13:35 0:00 /sbin/getty > 38400 tty4 > root 347 0.0 0.1 1220 500 tty5 S 13:35 0:00 /sbin/getty > 38400 tty5 > root 348 0.0 0.1 1220 500 tty6 S 13:35 0:00 /sbin/getty > 38400 tty6 > root 1642 0.0 0.1 1220 500 tty1 S 14:06 0:00 /sbin/getty > 38400 tty1 > mail 1925 0.0 0.4 2304 1100 ? S 14:16 0:00 /usr/sbin/exim > -bd -q30m > > Server Tcp wrappers. > # /etc/hosts.deny: list of hosts that are _not_ allowed to access the system. > # See the manual pages hosts_access(5), hosts_options(5) > # and /usr/doc/netbase/portmapper.txt.gz > # > # Example: ALL: some.host.name, .some.domain > # ALL EXCEPT in.fingerd: other.host.name, .other.domain > # > # If you're going to protect the portmapper use the name "portmap" for the > # daemon name. Remember that you can only use the keyword "ALL" and IP > # addresses (NOT host or domain names) for the portmapper. See portmap(8) > # and /usr/doc/netbase/portmapper.txt.gz for further information. > # > # The PARANOID wildcard matches any host whose name does not match its > # address. > #ALL: PARANOID > ALL: 204.192.47.24 204.192.47.25 204.192.47.152 #enterprise alpha > aacc-webserver > ALL:ALL > [EMAIL PROTECTED]:~$ cat /etc/hosts.allow > # /etc/hosts.allow: list of hosts that are allowed to access the system. > # See the manual pages hosts_access(5), hosts_options(5) > # and /usr/doc/netbase/portmapper.txt.gz > # > # Example: ALL: LOCAL @some_netgroup > # ALL: .foobar.edu EXCEPT terminalserver.foobar.edu > # > # If you're going to protect the portmapper use the name "portmap" for the > # daemon name. Remember that you can only use the keyword "ALL" and IP > # addresses (NOT host or domain names) for the portmapper. See portmap(8) > # and /usr/doc/netbase/portmapper.txt.gz for further information. > # > sshd: 192.168.1.10 192.168.1.5 > sshd: 204.245.156. > sshd: 204.192.47. > sshd: 204.192.46. > sshd: .gl.umbc.edu > syslogd:192.168.1.254 > imapd:192.168.1.10 localhost > #pop3d:192.168.1.10 > #localhost > > ============================================== > Client Side > ============================================== > > $ ps auxf > USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND > root 7 0.0 0.0 0 0 ? SW 09:33 0:00 [kupdated] > root 6 0.0 0.0 0 0 ? SW 09:33 0:00 [bdflush] > root 5 0.0 0.0 0 0 ? SW 09:33 0:00 [kreclaimd] > root 4 0.0 0.0 0 0 ? SW 09:33 0:00 [kswapd] > root 3 0.0 0.0 0 0 ? SWN 09:33 0:00 > [ksoftirqd_CPU0] > root 1 0.1 0.1 1296 520 ? S 09:33 0:19 init [2] > root 2 0.0 0.0 0 0 ? SW 09:33 0:00 [keventd] > root 9 0.0 0.0 0 0 ? SW 09:33 0:00 [khubd] > root 203 0.0 0.1 1372 632 ? S 09:33 0:00 /sbin/syslogd > root 220 0.0 0.3 1848 1060 ? S 09:33 0:00 /sbin/klogd > daemon 259 0.0 0.2 1876 840 ? S 09:33 0:00 lpd Waiting > root 272 0.0 0.3 2760 1208 ? S 09:33 0:00 /usr/sbin/sshd > root 276 0.0 1.5 6240 4996 ? S 09:33 0:00 > /usr/bin/X11/xfs -daemon > root 280 0.0 0.2 1680 708 ? S 09:33 0:00 /usr/sbin/cron > root 291 0.0 0.3 3144 1080 ? S 09:33 0:00 > /usr/bin/X11/xdm > root 299 0.9 7.8 92128 25040 ? S< 09:33 3:02 \_ > /usr/X11R6/bin/X vt7 -dpi 100 -nolisten tcp -auth > /var/lib/xdm/authdir/authfiles/A:0-fotQ8U > root 300 0.0 0.6 3584 2024 ? S 09:33 0:00 \_ -:0 > > tjk 314 0.0 0.9 4732 2944 ? S 09:34 0:11 \_ > /usr/bin/WindowMaker > tjk 344 0.0 0.2 2548 800 ? S 09:34 0:00 \_ > /usr/bin/ssh-agent /home/tjk/.xsession > tjk 353 0.0 0.3 2712 1168 ? S 09:34 0:00 \_ > wmCalClock > tjk 354 0.0 0.3 2496 992 ? S 09:34 0:00 \_ > /usr/bin/wmcube > tjk 355 0.0 0.2 2356 944 ? S 09:34 0:00 \_ > /usr/X11R6/bin/wmSpaceWeather > tjk 356 0.0 0.2 2364 848 ? S 09:34 0:00 \_ > /usr/X11R6/bin/wmnet -l > tjk 357 0.0 0.3 2476 1044 ? S 09:34 0:00 \_ > wmfire > tjk 362 0.0 0.1 1264 400 ? S 09:34 0:00 | > \_ fireload_cpu > tjk 494 0.0 0.2 2452 888 ? S 09:41 0:00 \_ > /usr/bin/X11/wmavgload -shape -withdrawn > tjk 1243 0.0 0.4 2848 1548 ? S 14:36 0:00 \_ > /usr/bin/aterm > tjk 1244 0.0 0.4 2412 1408 pts/1 S 14:36 0:00 | > \_ bash > tjk 1245 0.0 0.4 2956 1484 pts/1 S 14:37 0:00 | > \_ ssh 192.168.1.111 > tjk 1250 2.2 7.1 31212 22816 ? S 14:38 0:24 \_ > /usr/lib/netscape/477/communicator/communicator-smotif.real > http://www.debian.org/ > tjk 1293 0.0 1.1 17160 3752 ? S 14:38 0:00 | > \_ (dns helper) > tjk 1343 0.0 1.0 5124 3276 ? S 14:43 0:00 \_ > /usr/bin/Eterm > tjk 1346 0.0 0.4 2404 1388 pts/2 S 14:43 0:00 | > \_ -bash > tjk 1347 0.0 0.4 2868 1468 pts/2 S 14:43 0:00 | > \_ ssh 192.168.1.111 > tjk 1348 0.0 0.9 5252 2972 ? S 14:48 0:00 \_ > xterm > tjk 1349 0.0 0.4 2412 1404 pts/3 S 14:48 0:00 > \_ bash > tjk 1359 0.0 0.4 3336 1428 pts/3 R 14:57 0:00 > \_ ps auxf > root 292 0.0 0.1 1280 496 tty1 S 09:33 0:00 /sbin/getty > 38400 tty1 > root 293 0.0 0.1 1280 496 tty2 S 09:33 0:00 /sbin/getty > 38400 tty2 > root 294 0.0 0.1 1280 496 tty3 S 09:33 0:00 /sbin/getty > 38400 tty3 > root 295 0.0 0.1 1280 496 tty4 S 09:33 0:00 /sbin/getty > 38400 tty4 > root 296 0.0 0.1 1280 496 tty5 S 09:33 0:00 /sbin/getty > 38400 tty5 > root 298 0.0 0.1 1280 496 tty6 S 09:33 0:00 /sbin/getty > 38400 tty6 > > > client tcpwrappers > > ~$ cat /etc/hosts.allow > # /etc/hosts.allow: list of hosts that are allowed to access the system. > # See the manual pages hosts_access(5), hosts_options(5) > # and /usr/doc/netbase/portmapper.txt.gz > # > # Example: ALL: LOCAL @some_netgroup > # ALL: .foobar.edu EXCEPT terminalserver.foobar.edu > # > # If you're going to protect the portmapper use the name "portmap" for the > # daemon name. Remember that you can only use the keyword "ALL" and IP > # addresses (NOT host or domain names) for the portmapper. See portmap(8) > # and /usr/doc/netbase/portmapper.txt.gz for further information. > # > #ALL:ALL > lpd:localhost 192.168.1.5 192.168.1.111 > printer: localhost 192.168.1.5 192.168.1.111 > sshd: 192.168.1.5 192.168.1.254 localhost 192.168.1.111 > ~$ cat /etc/hosts.deny > # /etc/hosts.deny: list of hosts that are _not_ allowed to access the system. > # See the manual pages hosts_access(5), hosts_options(5) > # and /usr/doc/netbase/portmapper.txt.gz > # > # Example: ALL: some.host.name, .some.domain > # ALL EXCEPT in.fingerd: other.host.name, .other.domain > # > # If you're going to protect the portmapper use the name "portmap" for the > # daemon name. Remember that you can only use the keyword "ALL" and IP > # addresses (NOT host or domain names) for the portmapper. See portmap(8) > # and /usr/doc/netbase/portmapper.txt.gz for further information. > # > # The PARANOID wildcard matches any host whose name does not match its > # address. > ALL: ALL > > > ----- End forwarded message ----- > > -- > ---------------------------- > Ted Knab > Breezy Network Solutions > Tel: 410-571-8288 > > ----- End forwarded message ----- > > -- > ---------------------------- > Ted Knab > Breezy Network Solutions > Tel: 410-571-8288 > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] :wq! --------------------------------------------------------------------------- Robert L. Harris | Micros~1 : Senior System Engineer | For when quality, reliability at RnD Consulting | and security just aren't \_ that important! DISCLAIMER: These are MY OPINIONS ALONE. I speak for no-one else. FYI: perl -e 'print $i=pack(c5,(41*2),sqrt(7056),(unpack(c,H)-2),oct(115),10);'