[pechtcha:~] ssh -v -X pechtcha@slinky.cs.nyu.edu OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090607f debug1: Reading configuration data /home/igor/.ssh/config debug1: Applying options for * debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: ssh_connect: needpriv 0 debug1: Connecting to slinky.cs.nyu.edu [128.122.20.14] port 22. debug1: Connection established. debug1: identity file /home/igor/.ssh/identity type 0 debug1: identity file /home/igor/.ssh/id_rsa type -1 debug1: identity file /home/igor/.ssh/id_dsa type -1 debug1: Remote protocol version 1.99, remote software version 2.2.0 SSH Secure Shell (non-commercial) debug1: match: 2.2.0 SSH Secure Shell (non-commercial) pat 2.2.0*,2.3.0* debug1: Local version string SSH-1.5-OpenSSH_3.4p1 debug1: Waiting for server public key. debug1: Received server public key (768 bits) and host key (1024 bits). debug1: Host 'slinky.cs.nyu.edu' is known and matches the RSA1 host key. debug1: Found key in /home/igor/.ssh/known_hosts:2 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug1: cipher_init: set keylen (16 -> 32) debug1: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. debug1: Trying RSA authentication with key '/home/igor/.ssh/identity' debug1: Received RSA challenge from server. debug1: Sending response to host key RSA challenge. debug1: RSA authentication accepted by server. debug1: Requesting pty.