Setup PHP debugger

Posted on 2004-11-02
Last Modified: 2010-03-04

 I am trying to setup a PHP debugger on my Apache Linux Server. The client runs from Windows. It appears that the server is configured correctly except it does not listen on the Debugger Port. Is there something else I need to do? Below is the snippet from PHPINFO:

DBG php debugger, version 2.11.30, Copyright 2001, 2004, Dmitri Dmitrienko,

Version       2.11.30
Linked       as a shared library.
Profiler       compiled, enabled

Directive      Local Value      Master Value
debugger.enable_session_cookie      On      On
debugger.enabled      On      On
debugger.fail_silently      On      On
debugger.ignore_nops      Off      Off
debugger.JIT_enabled      Off      Off
debugger.JIT_host      clienthost      clienthost
debugger.JIT_level      3      3
debugger.JIT_port      7869      7869
debugger.profiler_enabled      On      On
debugger.session_nocache      On      On
debugger.timeout_seconds      300      300

Any ideas?
Question by:bobbyo
    LVL 15

    Expert Comment

    Is there a portion that runs on the server that gives out information through port 7869, or does this entirely run on the client?

    If there is a server portion, Is port 7869 configured in /etc/services?
    LVL 1

    Author Comment

    Okay, I have been fiddling and got this far:

    I have setup the client to server connection with SSH

    ssh -R 7869:localhost:7869 username@server

    This works find. Sets up the port listening on the server

    When I run the test:

    telnet localhost 7869

    The dbg listener on my workstation bombs out with "Wrong client"
    LVL 1

    Author Comment

    I have got it working. I had the wrong version of the file on the linux server.

    Please close.
    LVL 15

    Expert Comment

    Bobbyo -

    To close, you can post a note in Community Support here:

    saying that you've answered the question yourself, and wish for your points to be refunded.


    Accepted Solution

    Question PAQ'd
    500 points refunded.

    Community Support Moderator

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    Suggested Solutions

    Introduction As you’re probably aware the HTTP protocol offers basic / weak authentication, which in combination with the relevant configuration on your web server, provides the ability to password protect all or part of your host.  If you were not…
    It is possible to boost certain documents at query time in Solr. Query time boosting can be a powerful resource for finding the most relevant and "best" content. Of course the more information you index, the more fields you will be able to use for y…
    Hi everyone! This is Experts Exchange customer support.  This quick video will show you how to change your primary email address.  If you have any questions, then please Write a Comment below!
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now