X2Go Bug report logs - #1590
x2goclient fails to connect after updating qt5 libs to 5.15.x

Package: x2goclient; Maintainer for x2goclient is X2Go Developers <x2go-dev@lists.x2go.org>; Source for x2goclient is src:x2goclient.

Reported by: Baese Alexander <alexander.baese@gi-de.com>

Date: Thu, 21 Jul 2022 15:00:01 UTC

Severity: normal

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.x2go.org
Subject: Bug#1590: [X2Go-Dev] Bug#1590: x2goclient hangs with Qt5.15 on EL8 - Reproduced on AlmaLinux 8
Reply-To: Peter Bieringer <pb@bieringer.de>, 1590@bugs.x2go.org
Resent-From: Peter Bieringer <pb@bieringer.de>
Resent-To: x2go-dev@lists.x2go.org
Resent-CC: X2Go Developers <x2go-dev@lists.x2go.org>
X-Loop: owner@bugs.x2go.org
Resent-Date: Fri, 29 Jul 2022 19:45:01 +0000
Resent-Message-ID: <handler.1590.B1590.165912374521249@bugs.x2go.org>
Resent-Sender: owner@bugs.x2go.org
X-X2Go-PR-Message: followup 1590
X-X2Go-PR-Package: x2goclient
X-X2Go-PR-Keywords: 
References: <692b223ade54469aae2ff349b64756af@gi-de.com> <41aa8aba-9b4e-5f7c-4a78-a21ced2e4dad@bieringer.de> <CAMOQsSMWOq-0ie_f5QYq+Ft4PsWJrebt7jjj_T+DgB=pedL=LA@mail.gmail.com> <8ce25f5b-d58c-ead9-f836-d3fb59b57e20@bieringer.de> <692b223ade54469aae2ff349b64756af@gi-de.com>
Received: via spool by 1590-submit@bugs.x2go.org id=B1590.165912374521249
          (code B ref 1590); Fri, 29 Jul 2022 19:45:01 +0000
Received: (at 1590) by bugs.x2go.org; 29 Jul 2022 19:42:25 +0000
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on
	ymir.das-netzwerkteam.de
X-Spam-Level: 
X-Spam-Status: No, score=-2.0 required=3.0 tests=BAYES_00,DKIM_SIGNED,
	DKIM_VALID,DKIM_VALID_AU,NICE_REPLY_A,SPF_HELO_PASS,URIBL_BLOCKED
	autolearn=ham autolearn_force=no version=3.4.2
Received: from co1.bieringer.net (co1.bieringer.net [5.189.185.206])
	by ymir.das-netzwerkteam.de (Postfix) with ESMTPS id 69B915DAD4
	for <1590@bugs.x2go.org>; Fri, 29 Jul 2022 21:42:22 +0200 (CEST)
Received: from localhost (localhost.localdomain [127.0.0.1])
	by co1.bieringer.net (Postfix) with ESMTP id 045D2900D29
	for <1590@bugs.x2go.org>; Fri, 29 Jul 2022 21:42:22 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=bieringer.de; h=
	content-transfer-encoding:content-type:content-type:in-reply-to
	:references:from:from:content-language:subject:subject
	:user-agent:mime-version:date:date:message-id:received:received;
	 s=dkim20210605; t=1659123741; x=1659987742; bh=l1sqYBSkOjbW0jKF
	W9TBkqtE3OGKHDKIemjDhANeT08=; b=wczoph8Cf9G7kbDXlFw8GgNqGPBJJ+hh
	YqkH4sPNneXhTzT95w546Im99tfDI744qjv7iLVdSKzuecRN35NeLxZ3GgWsLUmb
	+0pN3le4p0hCO2iHubP5byOm3EXG0QwI8IrRmkZPzE95auwTW5RZCeS2omY9Wwkr
	KJT+JsD3Ywtv8/2wHoKonI7E4CeyQDrtsOSXHWkbQ9QzqHtdkP+tX2gLjcKH9b8P
	WG6TBkOWLxFV91p2KydczQhKt4tjeBMtQLvOp75Z6IfVEe+daGFv19UB3xhybsrJ
	7XzAmQXCBlBvwOH/WFdEbB6W6CEmX2Y/zxSlONtFVnJE31NZ1YXLMQ==
X-Virus-Scanned: amavisd-new at bieringer.net
Received: from co1.bieringer.net ([127.0.0.1])
	by localhost (co1.bieringer.net [127.0.0.1]) (amavisd-new, port 10022)
	with LMTP id 4Td7p5g42IoD for <1590@bugs.x2go.org>;
	Fri, 29 Jul 2022 21:42:21 +0200 (CEST)
Received: from [IPV6:2001:a61:3b47:d901:9d52:d79e:e70a:369e] (unknown [IPv6:2001:a61:3b47:d901:9d52:d79e:e70a:369e])
	(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
	 key-exchange X25519 server-signature RSA-PSS (2048 bits))
	(No client certificate requested)
	by co1.bieringer.net (Postfix) with ESMTPSA id AE13C90030D
	for <1590@bugs.x2go.org>; Fri, 29 Jul 2022 21:42:21 +0200 (CEST)
Message-ID: <0e554da1-ce32-41ef-b92c-f39d5cc7062b@bieringer.de>
Date: Fri, 29 Jul 2022 21:42:20 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.11.0
Content-Language: de-DE
From: Peter Bieringer <pb@bieringer.de>
To: 1590@bugs.x2go.org
In-Reply-To: <8ce25f5b-d58c-ead9-f836-d3fb59b57e20@bieringer.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Sorry, have now read how --debug works...

Now started with: x2goclient --debug --libssh-debug 2>&1 | tee 
/tmp/x2goclient-<QTversion>.log

with Qt5.15:

[2022/07/29 19:34:20.759320, 2] channel_open:  Creating a channel 46 
with 64000 window and 32768 max packet
[2022/07/29 19:34:20.760544, 2] ssh_packet_channel_open_conf:  Received 
a CHANNEL_OPEN_CONFIRMATION for channel 46:0
[2022/07/29 19:34:20.760601, 2] ssh_packet_channel_open_conf:  Remote 
window : 0, maxpacket : 32768
[2022/07/29 19:34:20.764500, 2] channel_rcv_change_window:  Adding 
2097152 bytes to channel (46:0) (from 0 bytes)
[2022/07/29 19:34:20.764587, 2] channel_request:  Channel request exec 
success
[2022/07/29 19:34:21.075221, 2] grow_window:  growing window (channel 
46:0) to 1280000 bytes

then it loops here forever:

[2022/07/29 19:29:54.114274, 1] ssh_channel_accept:  No channel request 
of this type from server

Stopping after 4x CHANNEL_OPEN_CONFIRMATION (43...46)

# grep CHANNEL_OPEN_CONFIRMATION /tmp/x2goclient-5.15.log
[2022/07/29 19:34:12.681745, 2] ssh_packet_channel_open_conf:  Received 
a CHANNEL_OPEN_CONFIRMATION for channel 43:0
[2022/07/29 19:34:12.897503, 2] ssh_packet_channel_open_conf:  Received 
a CHANNEL_OPEN_CONFIRMATION for channel 44:0
[2022/07/29 19:34:17.564870, 2] ssh_packet_channel_open_conf:  Received 
a CHANNEL_OPEN_CONFIRMATION for channel 45:0
[2022/07/29 19:34:20.760544, 2] ssh_packet_channel_open_conf:  Received 
a CHANNEL_OPEN_CONFIRMATION for channel 46:0


with Qt5.12: results in 8x CHANNEL_OPEN_CONFIRMATION (43...50)

# grep CHANNEL_OPEN_CONFIRMATION /tmp/x2goclient-5.12.log
[2022/07/29 19:35:27.930657, 2] ssh_packet_channel_open_conf:  Received 
a CHANNEL_OPEN_CONFIRMATION for channel 43:0
[2022/07/29 19:35:28.147269, 2] ssh_packet_channel_open_conf:  Received 
a CHANNEL_OPEN_CONFIRMATION for channel 44:0
[2022/07/29 19:35:37.330360, 2] ssh_packet_channel_open_conf:  Received 
a CHANNEL_OPEN_CONFIRMATION for channel 45:0
[2022/07/29 19:35:41.191864, 2] ssh_packet_channel_open_conf:  Received 
a CHANNEL_OPEN_CONFIRMATION for channel 46:0
[2022/07/29 19:35:47.790986, 2] ssh_packet_channel_open_conf:  Received 
a CHANNEL_OPEN_CONFIRMATION for channel 47:0
[2022/07/29 19:35:47.968874, 2] ssh_packet_channel_open_conf:  Received 
a CHANNEL_OPEN_CONFIRMATION for channel 48:1
[2022/07/29 19:35:48.649804, 2] ssh_packet_channel_open_conf:  Received 
a CHANNEL_OPEN_CONFIRMATION for channel 49:1
[2022/07/29 19:36:06.888934, 2] ssh_packet_channel_open_conf:  Received 
a CHANNEL_OPEN_CONFIRMATION for channel 50:0


Any further idea how to trace this down?

Send a report that this bug log contains spam.


X2Go Developers <owner@bugs.x2go.org>. Last modified: Thu Nov 21 16:25:55 2024; Machine Name: ymir.das-netzwerkteam.de

X2Go Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.