strange output on ssh tunneling: output failed; connect failed: Connection timed out;
I use ssh [email protected] -p 1234 -D 9898
command for tunneling, and I set firefox socks5 ip to 127.0.0.1 and its port to 9898. It works successfully ,but in terminal I have error in output:
channel 39: open failed: connect failed: Connection timed out
channel 41: open failed: connect failed: Connection timed out
channel 42: open failed: connect failed: Connection timed out
channel 43: open failed: connect failed: Connection timed out
channel 44: open failed: connect failed: Connection timed out
It's occurs periodically. What's this? Is it a problem? What can I do?
I have experienced similar issues. If you are tunneling with Firefox through ssh, some http connections can simply timeout due to server load or improper configuration. When the connection actually does timeout, you'll get an error message like the one you indicated.
You can suppress these messages with the following command
ssh [email protected] -p 1234 -D 9898 -q
From the man page ssh(1)
-q Quiet mode. Causes most warning and diagnostic messages to be sup-
pressed.
Suppressing the message will keep the warnings from messing up your ssh or screen sessions.
Set the GatewayPorts
to yes
and try again.
ssh -o 'GatewayPorts yes' [email protected] -p 1234 -D 9898
man ssh_config
DynamicForward
Specifies that a TCP port on the local machine be forwarded over the secure channel, and the application protocol
is then used to determine where to connect to from the remote machine.
The argument must be [bind_address:]port. IPv6 addresses can be specified by enclosing addresses in square
brackets. By default, the local port is bound in accordance with the GatewayPorts setting. However, an explicit
bind_address may be used to bind the connection to a specific address. The bind_address of “localhost” indicates
that the listening port be bound for local use only, while an empty address or ‘*’ indicates that the port should
be available from all interfaces.
Currently the SOCKS4 and SOCKS5 protocols are supported, and ssh(1) will act as a SOCKS server. Multiple for‐
wardings may be specified, and additional forwardings can be given on the command line. Only the superuser can
forward privileged ports.
GatewayPorts
Specifies whether remote hosts are allowed to connect to local forwarded ports. By default, ssh(1) binds local
port forwardings to the loopback address. This prevents other remote hosts from connecting to forwarded ports.
GatewayPorts can be used to specify that ssh should bind local port forwardings to the wildcard address, thus
allowing remote hosts to connect to forwarded ports. The argument must be “yes” or “no”. The default is “no”.