
Code: Select all
net-misc/nxserver-freenx ~x86
net-misc/nxssh ~x86
net-misc/nxproxy ~x86
net-misc/nx-x11 ~x86
net-misc/nxclient ~x86
net-misc/nxesd ~x86
net-misc/nxcomp ~x86Code: Select all
home warrenfaith # nxsetup --install --setup-nomachine-key --clean --purge
Removing special user "nx" ...done
Removing session database ...done
Removing logfile ...done
Removing home directory of special user "nx" ...done
Removing configuration files ...done
Setting up /etc/nxserver ...done
Generating public/private dsa key pair.
Your identification has been saved in /etc/nxserver/users.id_dsa.
Your public key has been saved in /etc/nxserver/users.id_dsa.pub.
The key fingerprint is:
f9:06:7c:e3:46:94:81:3c:04:3e:8f:a9:7f:21:43:c2 root@home
Setting up /var/lib/nxserver/db ...done
Setting up /var/log/nxserver.log ...done
Setting up special user "nx" ...Kennwort geändert.
done
Setting up known_hosts and authorized_keys2 ...done
Setting up permissions ...done
Setting up cups nxipp backend ...done
----> Testing your nxserver configuration ...
Warning: Could not find rdesktop in /usr/bin. RDP sessions won't work.
Warning: Could not find vncviewer in /usr/bin. VNC sessions won't work.
Warning: Invalid value "COMMAND_FOOMATIC=/usr/lib/cups/driver/foomatic-ppdfile"
Users will not be able to use foomatic.
Warning: Invalid value "COMMAND_START_GNOME=gnome-session"
Users will not be able to request a Gnome session.
Warning: Invalid value "COMMAND_START_CDE=cdwm"
Users will not be able to request a CDE session.
Warnings occured during config check.
To enable these features please correct the configuration file.
<---- done
----> Testing your nxserver connection ...
Permission denied (publickey,password,keyboard-interactive).
Fatal error: Could not connect to NX Server.
Please check your ssh setup:
The following are _examples_ of what you might need to check.
- Make sure "nx" is one of the AllowUsers in sshd_config.
(or that the line is outcommented/not there)
- Make sure your sshd allows public key authentication.
- Make sure your sshd is really running on port 22.
- Make sure your sshd_config AuthorizedKeysFile in sshd_config is set to authorized_keys2.
(this should be a filename not a pathname+filename)Did you try these suggestions? Failing at this point means a configuration problem in your ssh server, not freenx.WarrenFaith wrote:----> Testing your nxserver connection ...
Permission denied (publickey,password,keyboard-interactive).
Fatal error: Could not connect to NX Server.
Please check your ssh setup:
The following are _examples_ of what you might need to check.
- Make sure "nx" is one of the AllowUsers in sshd_config.
(or that the line is outcommented/not there)
- Make sure your sshd allows public key authentication.
- Make sure your sshd is really running on port 22.
- Make sure your sshd_config AuthorizedKeysFile in sshd_config is set to authorized_keys2.
(this should be a filename not a pathname+filename)
Code: Select all
# USE=nxclient emerge -vp nxserver-freenx
These are the packages that would be merged, in order:
Calculating dependencies... done!
[ebuild R ] net-misc/nxserver-freenx-0.7.0-r1 USE="cups esd nxclient* -arts" 0 kB
[ebuild N ] net-misc/nxclient-3.0.0-r3 3,777 kB
[blocks B ] net-misc/nxclient (is blocking net-misc/nxserver-freenx-0.7.0-r1)
# dep -e nxserver-freenx nxclient
net-misc/nxserver-freenx:
[ I] 0.7.0-r1 (0)
net-misc/nxclient:
[ ] 3.0.0-r3 (0)Thanks for your reply, but I don't see a new package of nxserver-freenx in portage. I only see v0.7.0-r1 of nxserver-freenx and v3.0.0-r3 of nxclient in portage, and they appear to be blocking each otherVoyageur wrote:To handle blocked packages, the best way is usually to remove the old package and then emerge the new package (in this case nxserver-freenx)
The blocker is here because switching the nxclient USE flag would cause file collisions on nxclient between nxclient and freenx
Code: Select all
emerge -C nxserver-freenx; emerge -av nxserver-freenxThat did it, THANKS!Voyageur wrote:Bad choice of words then, I meant "new" as in "newly emerged", not "new version compared to the current one"
Your "old" nxserver-freenx (with USE=-nxclient) owns the file /usr/bin/nxclient. Emerging freenx with USE=nxclient will pull in net-misc/nxclient, which would also install /usr/bin/nxclient. Removing the old nxserver-freenx would remove this file, and you would end up with net-misc/nxclient installed, but no nxclient binary anymore
Hmm, I hope I did not confuse you even moreBut in short:
Code: Select all
emerge -C nxserver-freenx; emerge -av nxserver-freenx
I have tried editing /etc/nxserver/node.conf to get some type of logging information out of the nxserver to /var/log/nxserver.log (which I check is owned and writeable by nx user), but the file remains empty.NX> 203 NXSSH running with pid: 3168
NX> 285 Enabling check on switch command
NX> 285 Enabling skip of SSH config files
NX> 285 Setting the preferred NX options
NX> 200 Connected to address: 98.193.58.128 on port: 22
NX> 202 Authenticating user: nx
This system is a restricted access system. All activity on this system is subject to monitoring. If information collected reveals possible criminal activity or activity that exceeds privileges, evidence of such activity may be provided to the relevant authorities for further action. By continuing past this point, you expressly consent to this monitoring.
NX> 208 Using auth method: publickey
Connection closed by 98.193.58.128
Hopefully someone has already encountered and resolved whatever issue I cannot get past. Not being able to get any valuable debug information out of nxserver is definitely limiting my diagnosis capabilities...#%PAM-1.0
auth required pam_env.so
auth sufficient pam_unix.so try_first_pass likeauth nullok
auth sufficient pam_ldap.so use_first_pass
auth required pam_deny.so
account required pam_unix.so
account required pam_ldap.so
# This can be used only if you enabled the cracklib USE flag
password required pam_cracklib.so difok=2 minlen=8 dcredit=2 ocredit=2 try
_first_pass retry=3
# This can be used only if you enabled the cracklib USE flag
password sufficient pam_unix.so try_first_pass use_authtok nullok md5 shadow
# This can be used only if you enabled the !cracklib USE flag
# password sufficient pam_unix.so try_first_pass nullok md5 shadow
password sufficient pam_ldap.so use_authtok use_first_pass
password required pam_deny.so
session required pam_limits.so
session required pam_unix.so
session optional pam_ldap.so
Code: Select all
Section "Screen"
Identifier "Screen0"
Device "Videocard0"
Monitor "Monitor0"
DefaultDepth 24
Option "NoLogo" "0"
Option "RenderAccel" "true"
Option "AllowGLXWithComposite" "true"
Option "MultiGPU" "on"
Option "SLI" "on"
SubSection "Display"
Depth 24
Modes "1280x1024" "1024x768" "800x600" "640x480"
EndSubSection
EndSectionCode: Select all
(--) NVIDIA(0): Acer AL1917 (CRT-0): 342.0 MHz maximum pixel clock
(II) NVIDIA(0): Assigned Display Device: CRT-0
(II) NVIDIA(0): Validated modes:
(II) NVIDIA(0): "1280x1024_75+0+0"
(II) NVIDIA(0): "1280x1024+0+0"
(II) NVIDIA(0): "1024x768+0+0"
(II) NVIDIA(0): "800x600+0+0"
(II) NVIDIA(0): "640x480+0+0"
(II) NVIDIA(0): Virtual screen size determined to be 1280 x 1024
(--) NVIDIA(0): DPI set to (85, 86); computed from "UseEdidDpi" X config
...
(II) NVIDIA(0): Initialized GART.
(II) NVIDIA(0): Setting mode "1280x1024_75+0+0"
Here is the output from /var/log/messages when I increase SSH logging to DEBUG:Voyageur wrote: lorenct, at this point it is normal that you do not get any log from nxserver, as it has not started yet. If you still have the problem, increase the verbosity of sshd and look through its log
Code: Select all
Nov 8 15:16:42 gentoo sshd[17678]: debug1: rexec start in 4 out 4 newsock 4 pipe 6 sock 7
Nov 8 15:16:42 gentoo sshd[17662]: debug1: Forked child 17678.
Nov 8 15:16:42 gentoo sshd[17678]: debug1: inetd sockets after dupping: 3, 3
Nov 8 15:16:42 gentoo sshd[17678]: Connection from XX.XX.XX.XX port 40960
Nov 8 15:16:42 gentoo sshd[17678]: debug1: Client protocol version 2.0; client software version OpenSSH_4.4
Nov 8 15:16:42 gentoo sshd[17678]: debug1: match: OpenSSH_4.4 pat OpenSSH*
Nov 8 15:16:42 gentoo sshd[17678]: debug1: Enabling compatibility mode for protocol 2.0
Nov 8 15:16:42 gentoo sshd[17678]: debug1: Local version string SSH-2.0-OpenSSH_4.7
Nov 8 15:16:43 gentoo sshd[17678]: debug1: PAM: initializing for "nx"
Nov 8 15:16:43 gentoo sshd[17678]: debug1: PAM: setting PAM_RHOST to "outbound2.domainname.com"
Nov 8 15:16:43 gentoo sshd[17678]: debug1: PAM: setting PAM_TTY to "ssh"
Nov 8 15:16:43 gentoo sshd[17678]: Failed none for nx from XX.XX.XX.XX port 40960 ssh2
Nov 8 15:16:43 gentoo sshd[17678]: debug1: temporarily_use_uid: 1003/553 (e=0/0)
Nov 8 15:16:43 gentoo sshd[17678]: debug1: trying public key file /var/lib/nxserver/home/.ssh/authorized_keys2
Nov 8 15:16:43 gentoo sshd[17678]: debug1: matching key found: file /var/lib/nxserver/home/.ssh/authorized_keys2, line 1
Nov 8 15:16:43 gentoo sshd[17678]: Found matching DSA key: ee:88:aa:33:77:11:44:cc:99:88:ee:cc:77:aa:ee:ee
Nov 8 15:16:43 gentoo sshd[17678]: debug1: restore_uid: 0/0
Nov 8 15:16:43 gentoo sshd[17678]: debug1: ssh_dss_verify: signature correct
Nov 8 15:16:43 gentoo sshd[17678]: debug1: do_pam_account: called
Nov 8 15:16:43 gentoo sshd[17678]: Failed publickey for nx from XX.XX.XX.XX port 40960 ssh2
Nov 8 15:16:43 gentoo sshd[17678]: debug1: do_cleanup
Nov 8 15:16:43 gentoo sshd[17678]: debug1: PAM: cleanupCode: Select all
#%PAM-1.0
auth required pam_env.so
auth sufficient pam_unix.so try_first_pass likeauth nullok
auth sufficient pam_ldap.so use_first_pass
auth required pam_deny.so
account required pam_unix.so
account required pam_ldap.so
password required pam_cracklib.so difok=2 minlen=8 dcredit=2 ocredit=2 try_first_pass retry=3
password sufficient pam_unix.so try_first_pass use_authtok nullok md5 shadow
password sufficient pam_ldap.so use_authtok use_first_pass
password required pam_deny.so
session required pam_limits.so
session required pam_unix.so
session optional pam_ldap.so
Code: Select all
account required pam_ldap.so
Code: Select all
account sufficient pam_ldap.so
Also in that file you may have a line like:lorenct wrote:Looks like the issue was with my /etc/pam.d/system-auth file.
Code: Select all
account required pam_access.so accessfile=/etc/security/access.confCode: Select all
ALL : 127.0.0.1
ALL : localhost