saída estranha no tunelamento ssh: falha na saída; conexão falhou: Tempo limite da conexão esgotado;

16

Eu uso o comando ssh [email protected] -p 1234 -D 9898 para tunelamento, e eu configurei o firefox socks5 ip para 127.0.0.1 e sua porta para 9898. Ele funciona com sucesso, mas no terminal eu tenho erro na saída:

channel 39: open failed: connect failed: Connection timed out
channel 41: open failed: connect failed: Connection timed out
channel 42: open failed: connect failed: Connection timed out
channel 43: open failed: connect failed: Connection timed out
channel 44: open failed: connect failed: Connection timed out

Ocorre periodicamente. O que é isso? Isso é um problema? O que posso fazer?

    
por Arash Mousavi 19.02.2013 / 11:22

2 respostas

19

Eu tive problemas semelhantes. Se você estiver tunelando com o Firefox por meio do ssh, algumas conexões http podem simplesmente ter um tempo limite devido à carga do servidor ou à configuração incorreta. Quando a conexão realmente faz o tempo limite, você receberá uma mensagem de erro como a que você indicou.

Você pode suprimir essas mensagens com o seguinte comando

ssh [email protected] -p 1234 -D 9898 -q

Na página do manual ssh(1)

 -q      Quiet mode.  Causes most warning and diagnostic messages to be sup-
         pressed.

Suprimir a mensagem impedirá que os avisos atrapalhem suas sessões de ssh ou de tela.

    
por 03.02.2014 / 17:42
2

Defina o GatewayPorts para yes e tente novamente.

ssh -o 'GatewayPorts yes' [email protected] -p 1234 -D 9898

man ssh_config

 DynamicForward
         Specifies that a TCP port on the local machine be forwarded over the secure channel, and the application protocol
         is then used to determine where to connect to from the remote machine.

         The argument must be [bind_address:]port.  IPv6 addresses can be specified by enclosing addresses in square
         brackets.  By default, the local port is bound in accordance with the GatewayPorts setting.  However, an explicit
         bind_address may be used to bind the connection to a specific address.  The bind_address of “localhost” indicates
         that the listening port be bound for local use only, while an empty address or ‘*’ indicates that the port should
         be available from all interfaces.

         Currently the SOCKS4 and SOCKS5 protocols are supported, and ssh(1) will act as a SOCKS server.  Multiple for‐
         wardings may be specified, and additional forwardings can be given on the command line.  Only the superuser can
         forward privileged ports.

 GatewayPorts
         Specifies whether remote hosts are allowed to connect to local forwarded ports.  By default, ssh(1) binds local
         port forwardings to the loopback address.  This prevents other remote hosts from connecting to forwarded ports.
         GatewayPorts can be used to specify that ssh should bind local port forwardings to the wildcard address, thus
         allowing remote hosts to connect to forwarded ports.  The argument must be “yes” or “no”.  The default is “no”.
    
por 20.02.2013 / 11:46