LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking
User Name
Password
Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.

Notices


Reply
  Search this Thread
Old 10-08-2005, 06:42 AM   #1
Corporal
LQ Newbie
 
Registered: Oct 2005
Location: Canada
Distribution: A Highly Modded Version of Mepis
Posts: 9

Rep: Reputation: 0
VNC Errors Galore


Hello everyone! This is my first post on LinuxQuestions.Org, and I am glad to be finally Windows-free. But, alas, like many Linux semi-newbies, I've run into a problem that I cannot solve myself. xvncviewer will not connect to another computer that is running vncserver.
I've followed the basic instructions that are found in many websites: Run vncpasswd, run vncserver, and tell the other computer to connect to whatever name and number vncserver indicated (E.g. foobar:x). However, when I do the last step, I either get a "unable to resolve host by name: success (???)" error when I enter the name vncserver gave me (like foobar:x) , or a "connection refused" error when I enter the IP address of the computer running vncserver. I've made sure that both computers have no firewalls running (As far as I know, Guarddog is the only firewall installed on SimplyMepis, which is my distro). Also, I did successfully make a working connection with KRFB, but it was accidentally uninstalled, and will not reinstall without upgrading the entire distribution, which is something I really would rather not do right now. Anyway, is there any way to fix this problem? Thank you in advance.
 
Old 10-09-2005, 03:40 PM   #2
david_ross
Moderator
 
Registered: Mar 2003
Location: Scotland
Distribution: Slackware, RedHat, Debian
Posts: 12,047

Rep: Reputation: 79
Welcome to LQ.

If you want to use the hostname then make sure it is resolvable by dns or in the client's hosts file. The connection refused sounds like a firewall is blocking it. Can you post the output from these on both machines:
iptables -nL
netstat -nlp
 
Old 10-09-2005, 04:43 PM   #3
Corporal
LQ Newbie
 
Registered: Oct 2005
Location: Canada
Distribution: A Highly Modded Version of Mepis
Posts: 9

Original Poster
Rep: Reputation: 0
All right...here is the output of iptables -nL on the client:
Quote:
Chain INPUT (policy DROP)
target prot opt source destination
QUEUE all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 192.168.1.104 192.168.1.255
logaborted tcp -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED tcp flags:0x04/0x04
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 3
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 11
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 12
nicfilt all -- 0.0.0.0/0 0.0.0.0/0
srcfilt all -- 0.0.0.0/0 0.0.0.0/0

Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 3
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 11
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 12
srcfilt all -- 0.0.0.0/0 0.0.0.0/0

Chain OUTPUT (policy DROP)
target prot opt source destination
QUEUE all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 3
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 11
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 12
s1 all -- 0.0.0.0/0 0.0.0.0/0

Chain f0to1 (3 references)
target prot opt source destination
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:445 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpt:631 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:631
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpt:21 state NEW
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 4
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpt:6969 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:137 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spts:1024:65535 dpt:137
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:137 dpt:137
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spts:1024:65535 dpt:138
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:138 dpt:138
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:139 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spts:1024:65535 dpt:139
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpts:6881:6889 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpts:6970:7170
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpts:1024:65535 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:137 dpts:1024:5999
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:137 dpt:137
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:138 dpt:138
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 0
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpts:6881:6889 state NEW
logdrop all -- 0.0.0.0/0 0.0.0.0/0

Chain f1to0 (1 references)
target prot opt source destination
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:137 dpts:1024:65535
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:137 dpt:137
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:138 dpt:138
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpts:6881:6889 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:5050 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:23 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpts:5000:5001 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spts:1024:5999 dpt:5000
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:445 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:389 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:522 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1503 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1720 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1731 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpts:1024:65535 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spts:1024:5999 dpts:1024:65535
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:43 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:43
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:25 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:110 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:143 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:143
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:5060
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:631 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:631
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:3478
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:443 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:873 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:515 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpts:5190:5193 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spts:1024:5999 dpts:5190:5193
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:3030 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:123
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:123 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:11371 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:21 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:1863 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8765 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:1723 state NEW
ACCEPT 47 -- 0.0.0.0/0 0.0.0.0/0
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:995 state NEW
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 4
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:6969 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:993 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:5222 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:5223 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:22 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:0:1023 dpt:22 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:554 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:7070 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:6346 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:2628 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:4000
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpts:1024:65535 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpts:6660:6669 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:137 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spts:1024:5999 dpt:137
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:137 dpt:137
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spts:1024:5999 dpt:138
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:138 dpt:138
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:139 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spts:1024:5999 dpt:139
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:119 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpts:33434:33600
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 8
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:88 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1755 state NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:1755
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpts:6881:6889 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:7741 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:80 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:8080 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:8008 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:8000 state NEW
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:5999 dpt:8888 state NEW
logdrop all -- 0.0.0.0/0 0.0.0.0/0

Chain logaborted (1 references)
target prot opt source destination
logaborted2 all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 10
LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 2/min burst 1 LOG flags 0 level 4 prefix `LIMITED '

Chain logaborted2 (1 references)
target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 7 level 4 prefix `ABORTED '
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED

Chain logdrop (4 references)
target prot opt source destination
logdrop2 all -- 0.0.0.0/0 0.0.0.0/0

Chain logdrop2 (1 references)
target prot opt source destination
DROP all -- 0.0.0.0/0 0.0.0.0/0

Chain logreject (0 references)
target prot opt source destination
logreject2 all -- 0.0.0.0/0 0.0.0.0/0

Chain logreject2 (1 references)
target prot opt source destination
REJECT tcp -- 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset
REJECT udp -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
DROP all -- 0.0.0.0/0 0.0.0.0/0

Chain nicfilt (1 references)
target prot opt source destination
RETURN all -- 0.0.0.0/0 0.0.0.0/0
RETURN all -- 0.0.0.0/0 0.0.0.0/0
RETURN all -- 0.0.0.0/0 0.0.0.0/0
logdrop all -- 0.0.0.0/0 0.0.0.0/0

Chain s0 (1 references)
target prot opt source destination
f0to1 all -- 0.0.0.0/0 192.168.1.104
f0to1 all -- 0.0.0.0/0 192.168.1.255
f0to1 all -- 0.0.0.0/0 127.0.0.1
logdrop all -- 0.0.0.0/0 0.0.0.0/0

Chain s1 (1 references)
target prot opt source destination
f1to0 all -- 0.0.0.0/0 0.0.0.0/0

Chain srcfilt (2 references)
target prot opt source destination
s0 all -- 0.0.0.0/0 0.0.0.0/0
And the output of netstat -nlp on the client:

Quote:
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:1024 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:2049 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:515 0.0.0.0:* LISTEN 4031/inetd
tcp 0 0 0.0.0.0:68 0.0.0.0:* LISTEN 3165/pump
tcp 0 0 0.0.0.0:934 0.0.0.0:* LISTEN 4144/rpc.statd
tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN 4111/smbd
tcp 0 0 0.0.0.0:20012 0.0.0.0:* LISTEN 4031/inetd
tcp 0 0 127.0.0.1:783 0.0.0.0:* LISTEN 3862/spamd.pid
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN 3215/portmap
tcp 0 0 0.0.0.0:6000 0.0.0.0:* LISTEN 4252/X
tcp 0 0 0.0.0.0:5555 0.0.0.0:* LISTEN 9516/peerguardnf
tcp 0 0 0.0.0.0:886 0.0.0.0:* LISTEN 4099/rpc.mountd
tcp 0 0 0.0.0.0:631 0.0.0.0:* LISTEN 12021/cupsd
tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN 4111/smbd
tcp6 0 0 :::80 :::* LISTEN 11941/apache2
udp 0 0 0.0.0.0:2049 0.0.0.0:* -
udp 0 0 0.0.0.0:1026 0.0.0.0:* -
udp 0 0 192.168.1.104:137 0.0.0.0:* 4109/nmbd
udp 0 0 0.0.0.0:137 0.0.0.0:* 4109/nmbd
udp 0 0 192.168.1.104:138 0.0.0.0:* 4109/nmbd
udp 0 0 0.0.0.0:138 0.0.0.0:* 4109/nmbd
udp 0 0 0.0.0.0:928 0.0.0.0:* 4144/rpc.statd
udp 0 0 0.0.0.0:931 0.0.0.0:* 4144/rpc.statd
udp 0 0 0.0.0.0:111 0.0.0.0:* 3215/portmap
udp 0 0 0.0.0.0:883 0.0.0.0:* 4099/rpc.mountd
udp 0 0 0.0.0.0:631 0.0.0.0:* 12021/cupsd
Active UNIX domain sockets (only servers)
Proto RefCnt Flags Type State I-Node PID/Program name Path
unix 2 [ ACC ] STREAM LISTENING 6080 4584/dcopserver [kd /tmp/.ICE-unix/dcop4584-1128843741
unix 2 [ ACC ] STREAM LISTENING 6240 4607/ksmserver [kde /tmp/.ICE-unix/4607
unix 2 [ ACC ] STREAM LISTENING 5393 4252/X /tmp/.X11-unix/X0
unix 2 [ ACC ] STREAM LISTENING 110280 18988/kdesud /tmp/ksocket-corporal/kdesud_:0
unix 2 [ ACC ] STREAM LISTENING 14043 9311/artsd /tmp/mcop-root/localhost_localdomain-245f-4348caa9
unix 2 [ ACC ] STREAM LISTENING 248471 19755/artsd /tmp/mcop-corporal/localhost_localdomain-4d2b-43498b10
unix 2 [ ACC ] STREAM LISTENING 4862 4025/dbus-daemon-1 /var/run/dbus/system_bus_socket
unix 2 [ ACC ] STREAM LISTENING 107199 18846/xmms /tmp/xmms_corporal.0
unix 2 [ ACC ] STREAM LISTENING 6101 4586/klauncher [kde /tmp/ksocket-corporal/klauncher2GTFmb.slave-socket
unix 2 [ ACC ] STREAM LISTENING 6071 4581/kdeinit Runnin /tmp/ksocket-corporal/kdeinit__0
unix 2 [ ACC ] STREAM LISTENING 6073 4581/kdeinit Runnin /tmp/ksocket-corporal/kdeinit-:0
unix 2 [ ACC ] STREAM LISTENING 247662 19612/gconfd-2 /tmp/orbit-corporal/linc-4c9c-0-674133fccb6eb
unix 2 [ ACC ] STREAM LISTENING 247671 19583/firefox-bin /tmp/orbit-corporal/linc-4c7f-0-7bfde045da32b
unix 2 [ ACC ] STREAM LISTENING 3672 3165/pump /var/run/pump.sock
unix 2 [ ACC ] STREAM LISTENING 6022 4553/ssh-agent /tmp/ssh-uKlJHA4498/agent.4498
unix 2 [ ACC ] STREAM LISTENING 5397 4193/kdm /var/run/xdmctl/dmctl-:0/socket
unix 2 [ ACC ] STREAM LISTENING 6025 4554/ssh-agent /tmp/ssh-IETnFU4498/agent.4498
unix 2 [ ACC ] STREAM LISTENING 5332 4193/kdm /var/run/xdmctl/dmctl/socket
Now, iptables -nL on the server:
Quote:
Chain INPUT (policy ACCEPT)
target prot opt source destination

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination
And, finally, netstat -nlp on the server:
Quote:
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address StatePID/Program name
tcp 0 0 0.0.0.0:1025 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:2049 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:515 0.0.0.0:* LISTEN 3176/inetd
tcp 0 0 0.0.0.0:68 0.0.0.0:* LISTEN 2130/pump
tcp 0 0 0.0.0.0:618 0.0.0.0:* LISTEN 3404/rpc.statd
tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN 3398/smbd
tcp 0 0 0.0.0.0:20012 0.0.0.0:* LISTEN 3176/inetd
tcp 0 0 0.0.0.0:5901 0.0.0.0:* LISTEN 5667/Xvnc
tcp 0 0 127.0.0.1:783 0.0.0.0:* LISTEN 3084/spamd.pid
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN 2787/portmap
tcp 0 0 0.0.0.0:6001 0.0.0.0:* LISTEN 5667/Xvnc
tcp 0 0 0.0.0.0:5555 0.0.0.0:* LISTEN 4013/peerguardnf
tcp 0 0 0.0.0.0:884 0.0.0.0:* LISTEN 3250/rpc.mountd
tcp 0 0 0.0.0.0:4662 0.0.0.0:* LISTEN 4321/xmule
tcp 0 0 0.0.0.0:631 0.0.0.0:* LISTEN 4933/cupsd
tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN 3398/smbd
tcp6 0 0 :::80 :::* LISTEN 4864/apache2
udp 0 0 0.0.0.0:2049 0.0.0.0:* -
udp 0 0 0.0.0.0:1026 0.0.0.0:* -
udp 0 0 127.0.0.1:1030 0.0.0.0:* 3761/smbd
udp 0 0 127.0.0.1:1031 0.0.0.0:* 3778/smbd
udp 0 0 192.168.1.101:137 0.0.0.0:* 3394/nmbd
udp 0 0 0.0.0.0:137 0.0.0.0:* 3394/nmbd
udp 0 0 192.168.1.101:138 0.0.0.0:* 3394/nmbd
udp 0 0 0.0.0.0:138 0.0.0.0:* 3394/nmbd
udp 0 0 0.0.0.0:4672 0.0.0.0:* 4321/xmule
udp 0 0 0.0.0.0:612 0.0.0.0:* 3404/rpc.statd
udp 0 0 0.0.0.0:615 0.0.0.0:* 3404/rpc.statd
udp 0 0 0.0.0.0:111 0.0.0.0:* 2787/portmap
udp 0 0 0.0.0.0:881 0.0.0.0:* 3250/rpc.mountd
udp 0 0 0.0.0.0:631 0.0.0.0:* 4933/cupsd
Active UNIX domain sockets (only servers)
Proto RefCnt Flags Type State I-Node PID/Program name Path
unix 2 [ ACC ] STREAM LISTENING 19009 5667/Xvnc /tmp/.X11-unix/X1
unix 2 [ ACC ] STREAM LISTENING 3368 2130/pump /var/run/pump.sock
unix 2 [ ACC ] STREAM LISTENING 4586 3421/kdm /var/run/xdmctl/dmctl/socket
unix 2 [ ACC ] STREAM LISTENING 4646 3461/X /tmp/.X11-unix/X0
unix 2 [ ACC ] STREAM LISTENING 5513 3682/soffice.bin /tmp/OSL_PIPE_1000_SingleOfficeIPC_55211a33c294319e5ccafdca3be79b
unix 2 [ ACC ] STREAM LISTENING 4649 3421/kdm /var/run/xdmctl/dmctl-:0/socket
unix 2 [ ACC ] STREAM LISTENING 4945 3556/ssh-agent /tmp/ssh-iiYFqX3524/agent.3524
unix 2 [ ACC ] STREAM LISTENING 4997 3585/kdeinit Runnin /tmp/ksocket-corporal/kdeinit__0
unix 2 [ ACC ] STREAM LISTENING 5032 3590/klauncher [kde /tmp/ksocket-corporal/klauncherbRGV5b.slave-socket
unix 2 [ ACC ] STREAM LISTENING 4999 3585/kdeinit Runnin /tmp/ksocket-corporal/kdeinit-:0
unix 2 [ ACC ] STREAM LISTENING 5005 3588/dcopserver [kd /tmp/.ICE-unix/dcop3588-1128836807
unix 2 [ ACC ] STREAM LISTENING 4042 3170/dbus-daemon-1 /var/run/dbus/system_bus_socket
unix 2 [ ACC ] STREAM LISTENING 5135 3603/artsd /tmp/mcop-corporal/localhost_localdomain-0e13-4348aed3
unix 2 [ ACC ] STREAM LISTENING 5220 3627/ksmserver [kde /tmp/.ICE-unix/3627
unix 2 [ ACC ] STREAM LISTENING 5533 3719/gconfd-2 /tmp/orbit-corporal/linc-e87-0-20363331c25e6
I hope that helps. By the way, I do have guarddog installed on both client and server, but I had disabled it on both computers while testing out vnc.

Last edited by Corporal; 10-09-2005 at 04:44 PM.
 
Old 10-10-2005, 12:42 PM   #4
david_ross
Moderator
 
Registered: Mar 2003
Location: Scotland
Distribution: Slackware, RedHat, Debian
Posts: 12,047

Rep: Reputation: 79
That should allow the connection, what happens when you try with:
vncviewer 192.168.1.101:1
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
GMail invites galore Nargile General 2 11-05-2005 05:30 AM
Open ports galore rjkfsm Linux - Security 5 04-05-2005 12:17 PM
Bittorrent problems galore QCompson Linux - Software 10 03-28-2005 12:15 AM
headaches galore with binaries corbis_demon Linux - Newbie 1 07-10-2004 04:26 AM
Gnome errors galore !!! Axo Linux - Newbie 3 05-13-2003 05:25 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking

All times are GMT -5. The time now is 01:07 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration