Scheduled Maintenance: We are aware of an issue with Google, AOL, and Yahoo services as email providers which are blocking new registrations. We are trying to fix the issue and we have several internal and external support tickets in process to resolve the issue. Please see: viewtopic.php?t=158230

 

 

 

x11vnc fails after Jessie upgrade

If none of the specific sub-forums seem right for your thread, ask here.
Post Reply
Message
Author
User avatar
vortis
Posts: 74
Joined: 2009-03-11 00:40
Location: New Zealand

x11vnc fails after Jessie upgrade

#1 Post by vortis »

Using x11vnc server on Debian host, and TightVNC viewer client on Windows 7. All was working fine until a server host upgrade, from Wheezy to Jessie. Now, when I try to connect, TightVNC retrieves the certificate as normal, compares and accepts it, and starts stunnel. The next step would normally be to prompt for the VNC password. Instead it gives an error:

ReadExact: Socket error while reading.

I'm guessing that some thing is missing or misconfigured after the Jessie upgrade, which broke many other things too, as Debian upgrades always seem to do. I have removed and reinstalled the x11vnc package, no effect.

I would be pleased to get some clues as to how to debug this. The errors in the log file don't mean a lot to me.

The server is started with this command:

Code: Select all

x11vnc -ssl -display :0 -usepw >>vnc-log 2>&1 &
If I start it up without the -ssl flag, and connect from the Windows system with a different client (Mobaxterm) it all goes well.

Relevant part (tail) of the server log file:

Code: Select all

The SSL VNC desktop is:  myhost:0
PORT=5900
SSLPORT=5900

19/01/2016 12:31:10 SSL: accept_openssl(OPENSSL_VNC)
19/01/2016 12:31:10 SSL: spawning helper process to handle: 192.168.2.3:51942
19/01/2016 12:31:10 SSL: helper for peerport 51942 is pid 11193:
19/01/2016 12:31:10 connect_tcp: trying:   127.0.0.1 20000
19/01/2016 12:31:10 check_vnc_tls_mode: waited: 0.000014 / 1.40 input: SSL Handshake
19/01/2016 12:31:10 SSL: ssl_init[11193]: 12/12 initialization timeout: 20 secs.
19/01/2016 12:31:10 SSL: ssl_helper[11193]: SSL_accept() succeeded for: 192.168.2.3:51942
19/01/2016 12:31:10 SSL: ssl_helper[11193]: Cipher: TLSv1/SSLv3 AES256-SHA Proto: TLSv1
19/01/2016 12:31:10 SSL: ssl_helper[11193]: accepted client 192.168.2.3 x509 peer cert is null
19/01/2016 12:31:10 SSL: handshake with helper process[11193] succeeded.
19/01/2016 12:31:10   other clients:
19/01/2016 12:31:10 Normal socket connection
19/01/2016 12:31:10 Disabled X server key autorepeat.
19/01/2016 12:31:10   to force back on run: 'xset r on' (3 times)
19/01/2016 12:31:10 incr accepted_client=1 for 127.0.0.1:49904  sock=12
19/01/2016 12:31:10 accept_openssl: renaming client '127.0.0.1' -> '192.168.2.3'
19/01/2016 12:31:10 client progressed=0 in 15/10 0.009456 s
19/01/2016 12:31:10 created   xdamage object: 0x1000040
19/01/2016 12:31:11 SSL: ssl_xfer[11193]: closing sockets 0, 12, 12
19/01/2016 12:31:11 SSL: ssl_helper[11193]: exit case 7 (ssl_xfer done)
19/01/2016 12:31:11 rfbProcessClientProtocolVersion: client gone
19/01/2016 12:31:11 client_count: 0
19/01/2016 12:31:11 Restored X server key autorepeat to: 1
19/01/2016 12:31:11 sending SIGTERM to ssl_helper_pid: 11193
19/01/2016 12:31:11 connect_once: invalid password or early disconnect.  0
19/01/2016 12:31:11 connect_once: waiting for next connection.
19/01/2016 12:31:11 Client 192.168.2.3 gone
19/01/2016 12:31:11 Statistics             events    Transmit/ RawEquiv ( saved)
19/01/2016 12:31:11  TOTALS              :      0 |         0/        0 (  0.0%)
19/01/2016 12:31:11 Statistics             events    Received/ RawEquiv ( saved)
19/01/2016 12:31:11  TOTALS              :      0 |         0/        0 (  0.0%)
19/01/2016 12:31:11 destroyed xdamage object: 0x1000040
19/01/2016 12:31:13 SSL: accept_openssl(OPENSSL_VNC)
19/01/2016 12:31:13 SSL: spawning helper process to handle: 192.168.2.3:51944
19/01/2016 12:31:13 SSL: helper for peerport 51944 is pid 11195:
19/01/2016 12:31:13 connect_tcp: trying:   127.0.0.1 20000
19/01/2016 12:31:14 check_vnc_tls_mode: waited: 0.000014 / 1.40 input: SSL Handshake
19/01/2016 12:31:14 SSL: ssl_init[11195]: 12/12 initialization timeout: 20 secs.
19/01/2016 12:31:14 SSL: ssl_helper[11195]: SSL_accept() *FATAL: -1 SSL FAILED
19/01/2016 12:31:14 SSL: error:14076102:SSL routines:SSL23_GET_CLIENT_HELLO:unsupported protocol
19/01/2016 12:31:14 SSL: ssl_helper[11195]: Proto: nosession
19/01/2016 12:31:14 SSL: ssl_helper[11195]: exit case 2 (ssl_init failed)
19/01/2016 12:31:14 SSL: accept_openssl: cookie from ssl_helper[11195] FAILED. 0

Post Reply