The Samba-Bugzilla – Attachment 10760 Details for
Bug 11098
4.2.0rc4 Can't authenticate against a Windows 2000 DC
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
better log file log.192.168.2.23
log.192.168.2.23 (text/plain), 63.93 KB, created by
Tom Schulz
on 2015-02-20 19:14:56 UTC
(
hide
)
Description:
better log file log.192.168.2.23
Filename:
MIME Type:
Creator:
Tom Schulz
Created:
2015-02-20 19:14:56 UTC
Size:
63.93 KB
patch
obsolete
>[2015/02/20 13:51:41.442235, 3] ../source3/smbd/oplock.c:1306(init_oplocks) > init_oplocks: initializing messages. >[2015/02/20 13:51:41.442938, 3] ../source3/smbd/process.c:1879(process_smb) > Transaction 0 of length 137 (0 toread) >[2015/02/20 13:51:41.443122, 3] ../source3/smbd/process.c:1489(switch_message) > switch message SMBnegprot (pid 5878) conn 0x0 >[2015/02/20 13:51:41.443221, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:51:41.445236, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [PC NETWORK PROGRAM 1.0] >[2015/02/20 13:51:41.445483, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [LANMAN1.0] >[2015/02/20 13:51:41.445550, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [Windows for Workgroups 3.1a] >[2015/02/20 13:51:41.445609, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [LM1.2X002] >[2015/02/20 13:51:41.445668, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [LANMAN2.1] >[2015/02/20 13:51:41.445723, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [NT LM 0.12] >[2015/02/20 13:51:41.452613, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'gssapi_spnego' registered >[2015/02/20 13:51:41.452829, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'gssapi_krb5' registered >[2015/02/20 13:51:41.452892, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'gssapi_krb5_sasl' registered >[2015/02/20 13:51:41.485675, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'sasl-DIGEST-MD5' registered >[2015/02/20 13:51:41.485872, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'spnego' registered >[2015/02/20 13:51:41.485944, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'schannel' registered >[2015/02/20 13:51:41.486011, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'naclrpc_as_system' registered >[2015/02/20 13:51:41.486069, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'sasl-EXTERNAL' registered >[2015/02/20 13:51:41.486127, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'ntlmssp' registered >[2015/02/20 13:51:41.486189, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'http_basic' registered >[2015/02/20 13:51:41.486252, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'http_ntlm' registered >[2015/02/20 13:51:41.486318, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'krb5' registered >[2015/02/20 13:51:41.486375, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'fake_gssapi_krb5' registered >[2015/02/20 13:51:41.487666, 3] ../source3/smbd/negprot.c:395(reply_nt1) > using SPNEGO >[2015/02/20 13:51:41.487795, 3] ../source3/smbd/negprot.c:683(reply_negprot) > Selected protocol NT LM 0.12 >[2015/02/20 13:51:41.492339, 3] ../source3/smbd/process.c:1879(process_smb) > Transaction 1 of length 240 (0 toread) >[2015/02/20 13:51:41.492506, 3] ../source3/smbd/process.c:1489(switch_message) > switch message SMBsesssetupX (pid 5878) conn 0x0 >[2015/02/20 13:51:41.492578, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:51:41.492680, 3] ../source3/smbd/sesssetup.c:609(reply_sesssetup_and_X) > wct=12 flg2=0xc807 >[2015/02/20 13:51:41.492775, 2] ../source3/smbd/sesssetup.c:551(setup_new_vc_session) > setup_new_vc_session: New VC == 0, if NT4.x compatible we would close all old resources. >[2015/02/20 13:51:41.492843, 3] ../source3/smbd/sesssetup.c:142(reply_sesssetup_and_X_spnego) > Doing spnego session setup >[2015/02/20 13:51:41.492954, 3] ../source3/smbd/sesssetup.c:183(reply_sesssetup_and_X_spnego) > NativeOS=[Windows 2002 Service Pack 3 2600] NativeLanMan=[Windows 2002 5.1] PrimaryDomain=[] >[2015/02/20 13:51:41.494905, 4] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2015/02/20 13:51:41.495093, 4] ../source3/smbd/uid.c:491(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2015/02/20 13:51:41.495159, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2015/02/20 13:51:41.495782, 3] ../auth/ntlmssp/ntlmssp_util.c:34(debug_ntlmssp_flags) > Got NTLMSSP neg_flags=0xa2088207 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_NEGOTIATE_OEM > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_56 >[2015/02/20 13:51:41.496298, 4] ../source3/smbd/sec_ctx.c:421(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:51:41.518878, 3] ../source3/smbd/process.c:1879(process_smb) > Transaction 2 of length 326 (0 toread) >[2015/02/20 13:51:41.519003, 3] ../source3/smbd/process.c:1489(switch_message) > switch message SMBsesssetupX (pid 5878) conn 0x0 >[2015/02/20 13:51:41.519104, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:51:41.519195, 3] ../source3/smbd/sesssetup.c:609(reply_sesssetup_and_X) > wct=12 flg2=0xc807 >[2015/02/20 13:51:41.519250, 2] ../source3/smbd/sesssetup.c:551(setup_new_vc_session) > setup_new_vc_session: New VC == 0, if NT4.x compatible we would close all old resources. >[2015/02/20 13:51:41.519304, 3] ../source3/smbd/sesssetup.c:142(reply_sesssetup_and_X_spnego) > Doing spnego session setup >[2015/02/20 13:51:41.519372, 3] ../source3/smbd/sesssetup.c:183(reply_sesssetup_and_X_spnego) > NativeOS=[Windows 2002 Service Pack 3 2600] NativeLanMan=[Windows 2002 5.1] PrimaryDomain=[] >[2015/02/20 13:51:41.519467, 4] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2015/02/20 13:51:41.519527, 4] ../source3/smbd/uid.c:491(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2015/02/20 13:51:41.519579, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2015/02/20 13:51:41.519741, 3] ../auth/ntlmssp/ntlmssp_server.c:359(ntlmssp_server_preauth) > Got user=[schulz] domain=[ADI] workstation=[TETRA] len1=24 len2=24 >[2015/02/20 13:51:41.519935, 3] ../source3/param/loadparm.c:3647(lp_load_ex) > lp_load_ex: refreshing parameters >[2015/02/20 13:51:41.520364, 3] ../source3/param/loadparm.c:564(init_globals) > Initialising global parameters >[2015/02/20 13:51:41.521070, 3] ../source3/param/loadparm.c:2597(lp_do_section) > Processing section "[global]" > doing parameter max protocol = NT1 > doing parameter workgroup = adi > doing parameter server string = > doing parameter security = domain > doing parameter guest account = nobody2 > doing parameter log file = /opt/local/samba4/var/logs/%h/log.%m > doing parameter max log size = 15000 > doing parameter password server = starfish2 > doing parameter passdb backend = tdbsam > doing parameter socket options = TCP_NODELAY > doing parameter dns proxy = no > doing parameter dos filemode = yes > doing parameter delete readonly = yes > doing parameter name resolve order = bcast host > doing parameter host msdfs = yes > doing parameter msdfs root = yes > doing parameter unix extensions = no > doing parameter wide links = yes > doing parameter include = /opt/local/samba4/etc/smb.conf.%h >[2015/02/20 13:51:41.522776, 2] ../source3/param/loadparm.c:2614(lp_do_section) > Processing section "[homes]" > doing parameter comment = Home Directories > doing parameter browseable = no > doing parameter writable = yes > doing parameter inherit permissions = yes >[2015/02/20 13:51:41.523123, 2] ../source3/param/loadparm.c:2614(lp_do_section) > Processing section "[users]" > doing parameter comment = User Directories > doing parameter path = /home/users > doing parameter browseable = yes > doing parameter writable = yes > doing parameter inherit permissions = yes >[2015/02/20 13:51:41.523931, 4] ../source3/param/loadparm.c:3688(lp_load_ex) > pm_process() returned Yes >[2015/02/20 13:51:41.524046, 3] ../source3/param/loadparm.c:1495(lp_add_ipc) > adding IPC service >[2015/02/20 13:51:41.541014, 3] ../source3/libsmb/namequery.c:3103(get_dc_list) > get_dc_list: preferred server list: ", starfish2" >[2015/02/20 13:51:41.541561, 3] ../source3/libsmb/namequery.c:1806(name_resolve_bcast_send) > name_resolve_bcast: Attempting broadcast lookup for name starfish2<0x20> >[2015/02/20 13:51:41.545587, 4] ../source3/libsmb/nmblib.c:108(debug_nmb_packet) > nmb packet from 192.168.2.178(35072) header: id=27084 opcode=Query(0) response=Yes > header: flags: bcast=No rec_avail=No rec_des=Yes trunc=No auth=Yes > header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 > answers: nmb_name=STARFISH2<20> rr_type=32 rr_class=1 ttl=300000 > answers 0 char `..... hex 6000C0A802B2 >[2015/02/20 13:51:41.545943, 2] ../source3/libsmb/namequery.c:1356(name_query_validator) > Got a positive name query response from 192.168.2.178 ( 192.168.2.178 ) >[2015/02/20 13:51:41.546768, 4] ../source3/libsmb/namequery.c:3240(get_dc_list) > get_dc_list: returning 1 ip addresses in an ordered list >[2015/02/20 13:51:41.546890, 4] ../source3/libsmb/namequery.c:3241(get_dc_list) > get_dc_list: 192.168.2.178:0 >[2015/02/20 13:51:41.549861, 4] ../source3/libsmb/nmblib.c:108(debug_nmb_packet) > nmb packet from 192.168.2.178(35072) header: id=5879 opcode=Query(0) response=Yes > header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes > header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 > answers: nmb_name=ADI<1c> rr_type=33 rr_class=1 ttl=0 > answers 0 char .STARFISH2 hex 10535441524649534832202020202020 > answers 10 char .D.STARFISH2 hex 00440053544152464953483220202020 > answers 20 char D.ADI hex 20202044004144492020202020202020 > answers 30 char ...ADI hex 2020202000C400414449202020202020 > answers 40 char ...ADI hex 2020202020201CC40041444920202020 > answers 50 char .D.ADI hex 20202020202020201B44004144492020 > answers 60 char ...ADI hex 202020202020202020201EC400414449 > answers 70 char .D.. hex 2020202020202020202020201D440001 > answers 80 char .__MSBROWSE__... hex 025F5F4D5342524F5753455F5F0201C4 > answers 90 char .STARFISH2 hex 00535441524649534832202020202020 > answers a0 char .D.STARFISH2$ hex 03440053544152464953483224202020 > answers b0 char .D.INet~Servic hex 2020034400494E65747E536572766963 > answers c0 char es ...ADMINISTR hex 657320201CC40041444D494E49535452 > answers d0 char ATOR .D.IS~STAR hex 41544F52202003440049537E53544152 > answers e0 char FISH2....D.JFCEN hex 46495348320000000044004A4643454E > answers f0 char TRAL .D.STA hex 5452414C202020202020034400535441 > answers 100 char RFISH2 BD.S hex 52464953483220202020202042440053 > answers 110 char TARFISH2 .D hex 5441524649534832202020202020BE44 > answers 120 char ...[8.ó......... hex 0000065B38177F000000000000000000 > answers 130 char ................ hex 00000000000000000000000000000000 > answers 140 char ............... hex 000000000000000000000000000000 >[2015/02/20 13:51:41.551638, 3] ../source3/libsmb/namequery_dc.c:207(rpc_dc_name) > rpc_dc_name: Returning DC STARFISH2 (192.168.2.178) for domain ADI >[2015/02/20 13:51:41.552070, 3] ../source3/lib/util_sock.c:617(open_socket_out_send) > Connecting to 192.168.2.178 at port 445 >[2015/02/20 13:51:41.593832, 3] ../source3/auth/auth.c:178(auth_check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [ADI]\[schulz]@[TETRA] with the new password interface >[2015/02/20 13:51:41.594012, 3] ../source3/auth/auth.c:181(auth_check_ntlm_password) > check_ntlm_password: mapped user is: [ADI]\[schulz]@[TETRA] >[2015/02/20 13:51:41.594131, 4] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2015/02/20 13:51:41.594197, 4] ../source3/smbd/uid.c:491(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2015/02/20 13:51:41.594327, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2015/02/20 13:51:41.594846, 4] ../source3/smbd/sec_ctx.c:421(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2015/02/20 13:51:41.595093, 3] ../source3/libsmb/namequery.c:3103(get_dc_list) > get_dc_list: preferred server list: ", starfish2" >[2015/02/20 13:51:41.595591, 4] ../source3/libsmb/namequery.c:3240(get_dc_list) > get_dc_list: returning 1 ip addresses in an ordered list >[2015/02/20 13:51:41.595666, 4] ../source3/libsmb/namequery.c:3241(get_dc_list) > get_dc_list: 192.168.2.178:0 >[2015/02/20 13:51:41.598824, 4] ../source3/libsmb/nmblib.c:108(debug_nmb_packet) > nmb packet from 192.168.2.178(35072) header: id=26558 opcode=Query(0) response=Yes > header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes > header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 > answers: nmb_name=ADI<1c> rr_type=33 rr_class=1 ttl=0 > answers 0 char .STARFISH2 hex 10535441524649534832202020202020 > answers 10 char .D.STARFISH2 hex 00440053544152464953483220202020 > answers 20 char D.ADI hex 20202044004144492020202020202020 > answers 30 char ...ADI hex 2020202000C400414449202020202020 > answers 40 char ...ADI hex 2020202020201CC40041444920202020 > answers 50 char .D.ADI hex 20202020202020201B44004144492020 > answers 60 char ...ADI hex 202020202020202020201EC400414449 > answers 70 char .D.. hex 2020202020202020202020201D440001 > answers 80 char .__MSBROWSE__... hex 025F5F4D5342524F5753455F5F0201C4 > answers 90 char .STARFISH2 hex 00535441524649534832202020202020 > answers a0 char .D.STARFISH2$ hex 03440053544152464953483224202020 > answers b0 char .D.INet~Servic hex 2020034400494E65747E536572766963 > answers c0 char es ...ADMINISTR hex 657320201CC40041444D494E49535452 > answers d0 char ATOR .D.IS~STAR hex 41544F52202003440049537E53544152 > answers e0 char FISH2....D.JFCEN hex 46495348320000000044004A4643454E > answers f0 char TRAL .D.STA hex 5452414C202020202020034400535441 > answers 100 char RFISH2 BD.S hex 52464953483220202020202042440053 > answers 110 char TARFISH2 .D hex 5441524649534832202020202020BE44 > answers 120 char ...[8.ó......... hex 0000065B38177F000000000000000000 > answers 130 char ................ hex 00000000000000000000000000000000 > answers 140 char ............... hex 000000000000000000000000000000 >[2015/02/20 13:51:41.600401, 3] ../source3/libsmb/namequery_dc.c:207(rpc_dc_name) > rpc_dc_name: Returning DC STARFISH2 (192.168.2.178) for domain ADI >[2015/02/20 13:51:41.601398, 3] ../source3/lib/util_sock.c:617(open_socket_out_send) > Connecting to 192.168.2.178 at port 445 >[2015/02/20 13:51:41.656000, 0] ../lib/util/fault.c:78(fault_report) > =============================================================== >[2015/02/20 13:51:41.657068, 0] ../lib/util/fault.c:79(fault_report) > INTERNAL ERROR: Signal 11 in pid 5878 (4.2.0rc4) > Please read the Trouble-Shooting section of the Samba HOWTO >[2015/02/20 13:51:41.657226, 0] ../lib/util/fault.c:81(fault_report) > =============================================================== >[2015/02/20 13:51:41.657342, 0] ../source3/lib/util.c:788(smb_panic_s3) > PANIC (pid 5878): internal error >[2015/02/20 13:51:41.659949, 0] ../source3/lib/util.c:899(log_stack_trace) > BACKTRACE: 48 stack frames: > #0 /opt/local/samba4/lib/libsmbconf.so.0(log_stack_trace+0x2b) [0x812b94] > #1 /opt/local/samba4/lib/libsmbconf.so.0(smb_panic_s3+0x87) [0x8129e7] > #2 /opt/local/samba4/lib/libsamba-util.so.0(smb_panic+0x2a) [0x17054e] > #3 /opt/local/samba4/lib/libsamba-util.so.0 [0x17020d] > #4 /opt/local/samba4/lib/libsamba-util.so.0 [0x17021e] > #5 [0x12e400] > #6 /lib/libc.so.6(vsnprintf+0xb4) [0xdc16a4] > #7 /opt/local/samba4/lib/private/libtalloc.so.2(talloc_vasprintf+0x71) [0x4e5eaf] > #8 /opt/local/samba4/lib/private/libtalloc.so.2(talloc_asprintf+0x31) [0x4e5ff8] > #9 /opt/local/samba4/lib/private/libmsrpc3.so(netlogon_creds_cli_LogonSamLogon_send+0xad) [0x380f7205] > #10 /opt/local/samba4/lib/private/libmsrpc3.so(netlogon_creds_cli_LogonSamLogon+0x79) [0x380f82c7] > #11 /opt/local/samba4/lib/private/liblibcli_netlogon3.so(rpccli_netlogon_network_logon+0x278) [0x152127b] > #12 /opt/local/samba4/lib/private/libauth.so [0x7da934] > #13 /opt/local/samba4/lib/private/libauth.so [0x7dae46] > #14 /opt/local/samba4/lib/private/libauth.so [0x7d54c6] > #15 /opt/local/samba4/lib/private/libauth.so(auth_check_ntlm_password+0x355) [0x7dbbd6] > #16 /opt/local/samba4/lib/private/libauth.so(auth3_check_password+0x1ad) [0x7ddf87] > #17 /opt/local/samba4/lib/libgensec.so.0 [0x121cd13] > #18 /opt/local/samba4/lib/libgensec.so.0(gensec_ntlmssp_server_auth+0x11e) [0x121d80b] > #19 /opt/local/samba4/lib/libgensec.so.0(gensec_ntlmssp_update+0x10e) [0x1219f2f] > #20 /opt/local/samba4/lib/libgensec.so.0(gensec_update_ev+0xb1) [0x122182f] > #21 /opt/local/samba4/lib/libgensec.so.0 [0x1215844] > #22 /opt/local/samba4/lib/libgensec.so.0 [0x12168dd] > #23 /opt/local/samba4/lib/libgensec.so.0(gensec_update_ev+0xb1) [0x122182f] > #24 /opt/local/samba4/lib/libgensec.so.0(gensec_update+0x49) [0x1221b9b] > #25 /opt/local/samba4/lib/private/libsmbd_base.so [0x2645ec] > #26 /opt/local/samba4/lib/private/libsmbd_base.so(reply_sesssetup_and_X+0x321) [0x265bb1] > #27 /opt/local/samba4/lib/private/libsmbd_base.so [0x2be146] > #28 /opt/local/samba4/lib/private/libsmbd_base.so [0x2be2d6] > #29 /opt/local/samba4/lib/private/libsmbd_base.so [0x2bf272] > #30 /opt/local/samba4/lib/private/libsmbd_base.so [0x2c048f] > #31 /opt/local/samba4/lib/private/libsmbd_base.so [0x2c0574] > #32 /opt/local/samba4/lib/libsmbconf.so.0(run_events_poll+0x487) [0x830036] > #33 /opt/local/samba4/lib/libsmbconf.so.0 [0x83031a] > #34 /opt/local/samba4/lib/private/libtevent.so.0(_tevent_loop_once+0xf5) [0x4ed644] > #35 /opt/local/samba4/lib/private/libtevent.so.0(tevent_common_loop_wait+0x26) [0x4ed8a6] > #36 /opt/local/samba4/lib/private/libtevent.so.0(_tevent_loop_wait+0x1d) [0x4ed964] > #37 /opt/local/samba4/lib/private/libsmbd_base.so(smbd_process+0xc3c) [0x2c4f35] > #38 /opt/local/samba4/sbin/smbd [0xb7f254cc] > #39 /opt/local/samba4/lib/libsmbconf.so.0(run_events_poll+0x487) [0x830036] > #40 /opt/local/samba4/lib/libsmbconf.so.0 [0x83031a] > #41 /opt/local/samba4/lib/private/libtevent.so.0(_tevent_loop_once+0xf5) [0x4ed644] > #42 /opt/local/samba4/lib/private/libtevent.so.0(tevent_common_loop_wait+0x26) [0x4ed8a6] > #43 /opt/local/samba4/lib/private/libtevent.so.0(_tevent_loop_wait+0x1d) [0x4ed964] > #44 /opt/local/samba4/sbin/smbd [0xb7f26331] > #45 /opt/local/samba4/sbin/smbd(main+0x18b0) [0xb7f27db9] > #46 /lib/libc.so.6(__libc_start_main+0xe6) [0xd715d6] > #47 /opt/local/samba4/sbin/smbd [0xb7f20351] >[2015/02/20 13:51:41.670805, 0] ../source3/lib/dumpcore.c:318(dump_core) > dumping core in /opt/local/samba4/var/logs/bream/cores/smbd >[2015/02/20 13:51:41.730106, 3] ../source3/smbd/oplock.c:1306(init_oplocks) > init_oplocks: initializing messages. >[2015/02/20 13:51:41.730995, 3] ../source3/smbd/process.c:1879(process_smb) > Transaction 0 of length 137 (0 toread) >[2015/02/20 13:51:41.731218, 3] ../source3/smbd/process.c:1489(switch_message) > switch message SMBnegprot (pid 5881) conn 0x0 >[2015/02/20 13:51:41.731316, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:51:41.733065, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [PC NETWORK PROGRAM 1.0] >[2015/02/20 13:51:41.733262, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [LANMAN1.0] >[2015/02/20 13:51:41.733329, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [Windows for Workgroups 3.1a] >[2015/02/20 13:51:41.733390, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [LM1.2X002] >[2015/02/20 13:51:41.733670, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [LANMAN2.1] >[2015/02/20 13:51:41.733838, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [NT LM 0.12] >[2015/02/20 13:51:41.740419, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'gssapi_spnego' registered >[2015/02/20 13:51:41.740669, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'gssapi_krb5' registered >[2015/02/20 13:51:41.740735, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'gssapi_krb5_sasl' registered >[2015/02/20 13:51:41.776226, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'sasl-DIGEST-MD5' registered >[2015/02/20 13:51:41.776429, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'spnego' registered >[2015/02/20 13:51:41.776536, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'schannel' registered >[2015/02/20 13:51:41.776608, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'naclrpc_as_system' registered >[2015/02/20 13:51:41.776669, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'sasl-EXTERNAL' registered >[2015/02/20 13:51:41.776729, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'ntlmssp' registered >[2015/02/20 13:51:41.776791, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'http_basic' registered >[2015/02/20 13:51:41.776858, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'http_ntlm' registered >[2015/02/20 13:51:41.776925, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'krb5' registered >[2015/02/20 13:51:41.776984, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'fake_gssapi_krb5' registered >[2015/02/20 13:51:41.778255, 3] ../source3/smbd/negprot.c:395(reply_nt1) > using SPNEGO >[2015/02/20 13:51:41.778386, 3] ../source3/smbd/negprot.c:683(reply_negprot) > Selected protocol NT LM 0.12 >[2015/02/20 13:51:41.784357, 3] ../source3/smbd/process.c:1879(process_smb) > Transaction 1 of length 240 (0 toread) >[2015/02/20 13:51:41.784530, 3] ../source3/smbd/process.c:1489(switch_message) > switch message SMBsesssetupX (pid 5881) conn 0x0 >[2015/02/20 13:51:41.784602, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:51:41.784707, 3] ../source3/smbd/sesssetup.c:609(reply_sesssetup_and_X) > wct=12 flg2=0xc807 >[2015/02/20 13:51:41.784808, 2] ../source3/smbd/sesssetup.c:551(setup_new_vc_session) > setup_new_vc_session: New VC == 0, if NT4.x compatible we would close all old resources. >[2015/02/20 13:51:41.784879, 3] ../source3/smbd/sesssetup.c:142(reply_sesssetup_and_X_spnego) > Doing spnego session setup >[2015/02/20 13:51:41.784992, 3] ../source3/smbd/sesssetup.c:183(reply_sesssetup_and_X_spnego) > NativeOS=[Windows 2002 Service Pack 3 2600] NativeLanMan=[Windows 2002 5.1] PrimaryDomain=[] >[2015/02/20 13:51:41.786634, 4] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2015/02/20 13:51:41.786781, 4] ../source3/smbd/uid.c:491(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2015/02/20 13:51:41.787130, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2015/02/20 13:51:41.787811, 3] ../auth/ntlmssp/ntlmssp_util.c:34(debug_ntlmssp_flags) > Got NTLMSSP neg_flags=0xa2088207 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_NEGOTIATE_OEM > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_56 >[2015/02/20 13:51:41.788345, 4] ../source3/smbd/sec_ctx.c:421(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:51:41.790072, 3] ../source3/smbd/process.c:1879(process_smb) > Transaction 2 of length 326 (0 toread) >[2015/02/20 13:51:41.790240, 3] ../source3/smbd/process.c:1489(switch_message) > switch message SMBsesssetupX (pid 5881) conn 0x0 >[2015/02/20 13:51:41.790424, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:51:41.790582, 3] ../source3/smbd/sesssetup.c:609(reply_sesssetup_and_X) > wct=12 flg2=0xc807 >[2015/02/20 13:51:41.790640, 2] ../source3/smbd/sesssetup.c:551(setup_new_vc_session) > setup_new_vc_session: New VC == 0, if NT4.x compatible we would close all old resources. >[2015/02/20 13:51:41.790695, 3] ../source3/smbd/sesssetup.c:142(reply_sesssetup_and_X_spnego) > Doing spnego session setup >[2015/02/20 13:51:41.790768, 3] ../source3/smbd/sesssetup.c:183(reply_sesssetup_and_X_spnego) > NativeOS=[Windows 2002 Service Pack 3 2600] NativeLanMan=[Windows 2002 5.1] PrimaryDomain=[] >[2015/02/20 13:51:41.790829, 4] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2015/02/20 13:51:41.790887, 4] ../source3/smbd/uid.c:491(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2015/02/20 13:51:41.790940, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2015/02/20 13:51:41.791117, 3] ../auth/ntlmssp/ntlmssp_server.c:359(ntlmssp_server_preauth) > Got user=[schulz] domain=[ADI] workstation=[TETRA] len1=24 len2=24 >[2015/02/20 13:51:41.791320, 3] ../source3/param/loadparm.c:3647(lp_load_ex) > lp_load_ex: refreshing parameters >[2015/02/20 13:51:41.791791, 3] ../source3/param/loadparm.c:564(init_globals) > Initialising global parameters >[2015/02/20 13:51:41.792486, 3] ../source3/param/loadparm.c:2597(lp_do_section) > Processing section "[global]" > doing parameter max protocol = NT1 > doing parameter workgroup = adi > doing parameter server string = > doing parameter security = domain > doing parameter guest account = nobody2 > doing parameter log file = /opt/local/samba4/var/logs/%h/log.%m > doing parameter max log size = 15000 > doing parameter password server = starfish2 > doing parameter passdb backend = tdbsam > doing parameter socket options = TCP_NODELAY > doing parameter dns proxy = no > doing parameter dos filemode = yes > doing parameter delete readonly = yes > doing parameter name resolve order = bcast host > doing parameter host msdfs = yes > doing parameter msdfs root = yes > doing parameter unix extensions = no > doing parameter wide links = yes > doing parameter include = /opt/local/samba4/etc/smb.conf.%h >[2015/02/20 13:51:41.794109, 2] ../source3/param/loadparm.c:2614(lp_do_section) > Processing section "[homes]" > doing parameter comment = Home Directories > doing parameter browseable = no > doing parameter writable = yes > doing parameter inherit permissions = yes >[2015/02/20 13:51:41.794482, 2] ../source3/param/loadparm.c:2614(lp_do_section) > Processing section "[users]" > doing parameter comment = User Directories > doing parameter path = /home/users > doing parameter browseable = yes > doing parameter writable = yes > doing parameter inherit permissions = yes >[2015/02/20 13:51:41.795265, 4] ../source3/param/loadparm.c:3688(lp_load_ex) > pm_process() returned Yes >[2015/02/20 13:51:41.795377, 3] ../source3/param/loadparm.c:1495(lp_add_ipc) > adding IPC service >[2015/02/20 13:51:41.879412, 3] ../source3/libsmb/namequery.c:3103(get_dc_list) > get_dc_list: preferred server list: "STARFISH2, starfish2" >[2015/02/20 13:51:41.880311, 4] ../source3/libsmb/namequery.c:3240(get_dc_list) > get_dc_list: returning 1 ip addresses in an ordered list >[2015/02/20 13:51:41.880406, 4] ../source3/libsmb/namequery.c:3241(get_dc_list) > get_dc_list: 192.168.2.178:0 >[2015/02/20 13:51:41.884007, 4] ../source3/libsmb/nmblib.c:108(debug_nmb_packet) > nmb packet from 192.168.2.178(35072) header: id=31058 opcode=Query(0) response=Yes > header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes > header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 > answers: nmb_name=ADI<1c> rr_type=33 rr_class=1 ttl=0 > answers 0 char .STARFISH2 hex 10535441524649534832202020202020 > answers 10 char .D.STARFISH2 hex 00440053544152464953483220202020 > answers 20 char D.ADI hex 20202044004144492020202020202020 > answers 30 char ...ADI hex 2020202000C400414449202020202020 > answers 40 char ...ADI hex 2020202020201CC40041444920202020 > answers 50 char .D.ADI hex 20202020202020201B44004144492020 > answers 60 char ...ADI hex 202020202020202020201EC400414449 > answers 70 char .D.. hex 2020202020202020202020201D440001 > answers 80 char .__MSBROWSE__... hex 025F5F4D5342524F5753455F5F0201C4 > answers 90 char .STARFISH2 hex 00535441524649534832202020202020 > answers a0 char .D.STARFISH2$ hex 03440053544152464953483224202020 > answers b0 char .D.INet~Servic hex 2020034400494E65747E536572766963 > answers c0 char es ...ADMINISTR hex 657320201CC40041444D494E49535452 > answers d0 char ATOR .D.IS~STAR hex 41544F52202003440049537E53544152 > answers e0 char FISH2....D.JFCEN hex 46495348320000000044004A4643454E > answers f0 char TRAL .D.STA hex 5452414C202020202020034400535441 > answers 100 char RFISH2 BD.S hex 52464953483220202020202042440053 > answers 110 char TARFISH2 .D hex 5441524649534832202020202020BE44 > answers 120 char ...[8.ó......... hex 0000065B38177F000000000000000000 > answers 130 char ................ hex 00000000000000000000000000000000 > answers 140 char ............... hex 000000000000000000000000000000 >[2015/02/20 13:51:41.885943, 3] ../source3/libsmb/namequery_dc.c:207(rpc_dc_name) > rpc_dc_name: Returning DC STARFISH2 (192.168.2.178) for domain ADI >[2015/02/20 13:51:41.886381, 3] ../source3/lib/util_sock.c:617(open_socket_out_send) > Connecting to 192.168.2.178 at port 445 >[2015/02/20 13:51:41.924091, 3] ../source3/auth/auth.c:178(auth_check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [ADI]\[schulz]@[TETRA] with the new password interface >[2015/02/20 13:51:41.924271, 3] ../source3/auth/auth.c:181(auth_check_ntlm_password) > check_ntlm_password: mapped user is: [ADI]\[schulz]@[TETRA] >[2015/02/20 13:51:41.924392, 4] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2015/02/20 13:51:41.924511, 4] ../source3/smbd/uid.c:491(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2015/02/20 13:51:41.924699, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2015/02/20 13:51:41.925035, 4] ../source3/smbd/sec_ctx.c:421(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2015/02/20 13:51:41.925269, 3] ../source3/libsmb/namequery.c:3103(get_dc_list) > get_dc_list: preferred server list: "STARFISH2, starfish2" >[2015/02/20 13:51:41.925859, 4] ../source3/libsmb/namequery.c:3240(get_dc_list) > get_dc_list: returning 1 ip addresses in an ordered list >[2015/02/20 13:51:41.925929, 4] ../source3/libsmb/namequery.c:3241(get_dc_list) > get_dc_list: 192.168.2.178:0 >[2015/02/20 13:51:41.929013, 4] ../source3/libsmb/nmblib.c:108(debug_nmb_packet) > nmb packet from 192.168.2.178(35072) header: id=9174 opcode=Query(0) response=Yes > header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes > header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 > answers: nmb_name=ADI<1c> rr_type=33 rr_class=1 ttl=0 > answers 0 char .STARFISH2 hex 10535441524649534832202020202020 > answers 10 char .D.STARFISH2 hex 00440053544152464953483220202020 > answers 20 char D.ADI hex 20202044004144492020202020202020 > answers 30 char ...ADI hex 2020202000C400414449202020202020 > answers 40 char ...ADI hex 2020202020201CC40041444920202020 > answers 50 char .D.ADI hex 20202020202020201B44004144492020 > answers 60 char ...ADI hex 202020202020202020201EC400414449 > answers 70 char .D.. hex 2020202020202020202020201D440001 > answers 80 char .__MSBROWSE__... hex 025F5F4D5342524F5753455F5F0201C4 > answers 90 char .STARFISH2 hex 00535441524649534832202020202020 > answers a0 char .D.STARFISH2$ hex 03440053544152464953483224202020 > answers b0 char .D.INet~Servic hex 2020034400494E65747E536572766963 > answers c0 char es ...ADMINISTR hex 657320201CC40041444D494E49535452 > answers d0 char ATOR .D.IS~STAR hex 41544F52202003440049537E53544152 > answers e0 char FISH2....D.JFCEN hex 46495348320000000044004A4643454E > answers f0 char TRAL .D.STA hex 5452414C202020202020034400535441 > answers 100 char RFISH2 BD.S hex 52464953483220202020202042440053 > answers 110 char TARFISH2 .D hex 5441524649534832202020202020BE44 > answers 120 char ...[8.ó......... hex 0000065B38177F000000000000000000 > answers 130 char ................ hex 00000000000000000000000000000000 > answers 140 char ............... hex 000000000000000000000000000000 >[2015/02/20 13:51:41.930757, 3] ../source3/libsmb/namequery_dc.c:207(rpc_dc_name) > rpc_dc_name: Returning DC STARFISH2 (192.168.2.178) for domain ADI >[2015/02/20 13:51:41.931770, 3] ../source3/lib/util_sock.c:617(open_socket_out_send) > Connecting to 192.168.2.178 at port 445 >[2015/02/20 13:51:41.984168, 1] ../librpc/ndr/ndr.c:578(ndr_pull_error) > ndr_pull_error(11): Pull bytes 8 (../librpc/ndr/ndr_basic.c:234) >[2015/02/20 13:51:41.984611, 0] ../source3/auth/auth_domain.c:302(domain_client_validate) > domain_client_validate: unable to validate password for user schulz in domain ADI to Domain controller STARFISH2. Error was NT_STATUS_BUFFER_TOO_SMALL. >[2015/02/20 13:51:41.989910, 2] ../source3/auth/auth.c:315(auth_check_ntlm_password) > check_ntlm_password: Authentication for user [schulz] -> [schulz] FAILED with error NT_STATUS_BUFFER_TOO_SMALL >[2015/02/20 13:51:41.990100, 2] ../auth/gensec/spnego.c:746(gensec_spnego_server_negTokenTarg) > SPNEGO login failed: NT_STATUS_BUFFER_TOO_SMALL >[2015/02/20 13:51:41.990250, 4] ../source3/smbd/sec_ctx.c:421(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:51:41.990620, 3] ../source3/smbd/error.c:82(error_packet_set) > NT error packet at ../source3/smbd/sesssetup.c(267) cmd=115 (SMBsesssetupX) NT_STATUS_BUFFER_TOO_SMALL >[2015/02/20 13:51:42.004491, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:51:42.004900, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:51:42.004990, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:51:42.005230, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:51:42.006190, 3] ../source3/smbd/server_exit.c:246(exit_server_common) > Server exit (failed to receive smb request) >[2015/02/20 13:52:16.277730, 3] ../source3/smbd/oplock.c:1306(init_oplocks) > init_oplocks: initializing messages. >[2015/02/20 13:52:16.278240, 3] ../source3/smbd/process.c:1879(process_smb) > Transaction 0 of length 137 (0 toread) >[2015/02/20 13:52:16.278410, 3] ../source3/smbd/process.c:1489(switch_message) > switch message SMBnegprot (pid 5888) conn 0x0 >[2015/02/20 13:52:16.278552, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.280195, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [PC NETWORK PROGRAM 1.0] >[2015/02/20 13:52:16.280394, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [LANMAN1.0] >[2015/02/20 13:52:16.280511, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [Windows for Workgroups 3.1a] >[2015/02/20 13:52:16.280574, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [LM1.2X002] >[2015/02/20 13:52:16.280633, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [LANMAN2.1] >[2015/02/20 13:52:16.280689, 3] ../source3/smbd/negprot.c:575(reply_negprot) > Requested protocol [NT LM 0.12] >[2015/02/20 13:52:16.287216, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'gssapi_spnego' registered >[2015/02/20 13:52:16.287562, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'gssapi_krb5' registered >[2015/02/20 13:52:16.287629, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'gssapi_krb5_sasl' registered >[2015/02/20 13:52:16.320220, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'sasl-DIGEST-MD5' registered >[2015/02/20 13:52:16.320421, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'spnego' registered >[2015/02/20 13:52:16.320526, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'schannel' registered >[2015/02/20 13:52:16.320596, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'naclrpc_as_system' registered >[2015/02/20 13:52:16.320657, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'sasl-EXTERNAL' registered >[2015/02/20 13:52:16.320716, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'ntlmssp' registered >[2015/02/20 13:52:16.320778, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'http_basic' registered >[2015/02/20 13:52:16.320843, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'http_ntlm' registered >[2015/02/20 13:52:16.320912, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'krb5' registered >[2015/02/20 13:52:16.320970, 3] ../auth/gensec/gensec_start.c:885(gensec_register) > GENSEC backend 'fake_gssapi_krb5' registered >[2015/02/20 13:52:16.322278, 3] ../source3/smbd/negprot.c:395(reply_nt1) > using SPNEGO >[2015/02/20 13:52:16.322417, 3] ../source3/smbd/negprot.c:683(reply_negprot) > Selected protocol NT LM 0.12 >[2015/02/20 13:52:16.342124, 3] ../source3/smbd/process.c:1879(process_smb) > Transaction 1 of length 240 (0 toread) >[2015/02/20 13:52:16.342260, 3] ../source3/smbd/process.c:1489(switch_message) > switch message SMBsesssetupX (pid 5888) conn 0x0 >[2015/02/20 13:52:16.342331, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.342464, 3] ../source3/smbd/sesssetup.c:609(reply_sesssetup_and_X) > wct=12 flg2=0xc807 >[2015/02/20 13:52:16.342566, 2] ../source3/smbd/sesssetup.c:551(setup_new_vc_session) > setup_new_vc_session: New VC == 0, if NT4.x compatible we would close all old resources. >[2015/02/20 13:52:16.342637, 3] ../source3/smbd/sesssetup.c:142(reply_sesssetup_and_X_spnego) > Doing spnego session setup >[2015/02/20 13:52:16.342747, 3] ../source3/smbd/sesssetup.c:183(reply_sesssetup_and_X_spnego) > NativeOS=[Windows 2002 Service Pack 3 2600] NativeLanMan=[Windows 2002 5.1] PrimaryDomain=[] >[2015/02/20 13:52:16.344296, 4] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2015/02/20 13:52:16.344489, 4] ../source3/smbd/uid.c:491(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.344561, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2015/02/20 13:52:16.345128, 3] ../auth/ntlmssp/ntlmssp_util.c:34(debug_ntlmssp_flags) > Got NTLMSSP neg_flags=0xa2088207 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_NEGOTIATE_OEM > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_56 >[2015/02/20 13:52:16.345684, 4] ../source3/smbd/sec_ctx.c:421(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.350662, 3] ../source3/smbd/process.c:1879(process_smb) > Transaction 2 of length 326 (0 toread) >[2015/02/20 13:52:16.350778, 3] ../source3/smbd/process.c:1489(switch_message) > switch message SMBsesssetupX (pid 5888) conn 0x0 >[2015/02/20 13:52:16.350881, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.350968, 3] ../source3/smbd/sesssetup.c:609(reply_sesssetup_and_X) > wct=12 flg2=0xc807 >[2015/02/20 13:52:16.351082, 2] ../source3/smbd/sesssetup.c:551(setup_new_vc_session) > setup_new_vc_session: New VC == 0, if NT4.x compatible we would close all old resources. >[2015/02/20 13:52:16.351136, 3] ../source3/smbd/sesssetup.c:142(reply_sesssetup_and_X_spnego) > Doing spnego session setup >[2015/02/20 13:52:16.351206, 3] ../source3/smbd/sesssetup.c:183(reply_sesssetup_and_X_spnego) > NativeOS=[Windows 2002 Service Pack 3 2600] NativeLanMan=[Windows 2002 5.1] PrimaryDomain=[] >[2015/02/20 13:52:16.351268, 4] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2015/02/20 13:52:16.351326, 4] ../source3/smbd/uid.c:491(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.351377, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2015/02/20 13:52:16.351581, 3] ../auth/ntlmssp/ntlmssp_server.c:359(ntlmssp_server_preauth) > Got user=[schulz] domain=[ADI] workstation=[TETRA] len1=24 len2=24 >[2015/02/20 13:52:16.351783, 3] ../source3/param/loadparm.c:3647(lp_load_ex) > lp_load_ex: refreshing parameters >[2015/02/20 13:52:16.352204, 3] ../source3/param/loadparm.c:564(init_globals) > Initialising global parameters >[2015/02/20 13:52:16.352896, 3] ../source3/param/loadparm.c:2597(lp_do_section) > Processing section "[global]" > doing parameter max protocol = NT1 > doing parameter workgroup = adi > doing parameter server string = > doing parameter security = domain > doing parameter guest account = nobody2 > doing parameter log file = /opt/local/samba4/var/logs/%h/log.%m > doing parameter max log size = 15000 > doing parameter password server = starfish2 > doing parameter passdb backend = tdbsam > doing parameter socket options = TCP_NODELAY > doing parameter dns proxy = no > doing parameter dos filemode = yes > doing parameter delete readonly = yes > doing parameter name resolve order = bcast host > doing parameter host msdfs = yes > doing parameter msdfs root = yes > doing parameter unix extensions = no > doing parameter wide links = yes > doing parameter include = /opt/local/samba4/etc/smb.conf.%h >[2015/02/20 13:52:16.354544, 2] ../source3/param/loadparm.c:2614(lp_do_section) > Processing section "[homes]" > doing parameter comment = Home Directories > doing parameter browseable = no > doing parameter writable = yes > doing parameter inherit permissions = yes >[2015/02/20 13:52:16.354892, 2] ../source3/param/loadparm.c:2614(lp_do_section) > Processing section "[users]" > doing parameter comment = User Directories > doing parameter path = /home/users > doing parameter browseable = yes > doing parameter writable = yes > doing parameter inherit permissions = yes >[2015/02/20 13:52:16.355696, 4] ../source3/param/loadparm.c:3688(lp_load_ex) > pm_process() returned Yes >[2015/02/20 13:52:16.355809, 3] ../source3/param/loadparm.c:1495(lp_add_ipc) > adding IPC service >[2015/02/20 13:52:16.357182, 3] ../source3/libsmb/namequery.c:3103(get_dc_list) > get_dc_list: preferred server list: "STARFISH2, starfish2" >[2015/02/20 13:52:16.358032, 4] ../source3/libsmb/namequery.c:3240(get_dc_list) > get_dc_list: returning 1 ip addresses in an ordered list >[2015/02/20 13:52:16.358135, 4] ../source3/libsmb/namequery.c:3241(get_dc_list) > get_dc_list: 192.168.2.178:0 >[2015/02/20 13:52:16.360618, 4] ../source3/libsmb/nmblib.c:108(debug_nmb_packet) > nmb packet from 192.168.2.178(35072) header: id=16877 opcode=Query(0) response=Yes > header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes > header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 > answers: nmb_name=ADI<1c> rr_type=33 rr_class=1 ttl=0 > answers 0 char .STARFISH2 hex 10535441524649534832202020202020 > answers 10 char .D.STARFISH2 hex 00440053544152464953483220202020 > answers 20 char D.ADI hex 20202044004144492020202020202020 > answers 30 char ...ADI hex 2020202000C400414449202020202020 > answers 40 char ...ADI hex 2020202020201CC40041444920202020 > answers 50 char .D.ADI hex 20202020202020201B44004144492020 > answers 60 char ...ADI hex 202020202020202020201EC400414449 > answers 70 char .D.. hex 2020202020202020202020201D440001 > answers 80 char .__MSBROWSE__... hex 025F5F4D5342524F5753455F5F0201C4 > answers 90 char .STARFISH2 hex 00535441524649534832202020202020 > answers a0 char .D.STARFISH2$ hex 03440053544152464953483224202020 > answers b0 char .D.INet~Servic hex 2020034400494E65747E536572766963 > answers c0 char es ...ADMINISTR hex 657320201CC40041444D494E49535452 > answers d0 char ATOR .D.IS~STAR hex 41544F52202003440049537E53544152 > answers e0 char FISH2....D.JFCEN hex 46495348320000000044004A4643454E > answers f0 char TRAL .D.STA hex 5452414C202020202020034400535441 > answers 100 char RFISH2 BD.S hex 52464953483220202020202042440053 > answers 110 char TARFISH2 .D hex 5441524649534832202020202020BE44 > answers 120 char ...[8.ó......... hex 0000065B38177F000000000000000000 > answers 130 char ................ hex 00000000000000000000000000000000 > answers 140 char ............... hex 000000000000000000000000000000 >[2015/02/20 13:52:16.362541, 3] ../source3/libsmb/namequery_dc.c:207(rpc_dc_name) > rpc_dc_name: Returning DC STARFISH2 (192.168.2.178) for domain ADI >[2015/02/20 13:52:16.362967, 3] ../source3/lib/util_sock.c:617(open_socket_out_send) > Connecting to 192.168.2.178 at port 445 >[2015/02/20 13:52:16.390713, 3] ../source3/auth/auth.c:178(auth_check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [ADI]\[schulz]@[TETRA] with the new password interface >[2015/02/20 13:52:16.390895, 3] ../source3/auth/auth.c:181(auth_check_ntlm_password) > check_ntlm_password: mapped user is: [ADI]\[schulz]@[TETRA] >[2015/02/20 13:52:16.391012, 4] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2015/02/20 13:52:16.391078, 4] ../source3/smbd/uid.c:491(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2015/02/20 13:52:16.391133, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2015/02/20 13:52:16.391430, 4] ../source3/smbd/sec_ctx.c:421(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2015/02/20 13:52:16.391899, 3] ../source3/libsmb/namequery.c:3103(get_dc_list) > get_dc_list: preferred server list: "STARFISH2, starfish2" >[2015/02/20 13:52:16.392425, 4] ../source3/libsmb/namequery.c:3240(get_dc_list) > get_dc_list: returning 1 ip addresses in an ordered list >[2015/02/20 13:52:16.392538, 4] ../source3/libsmb/namequery.c:3241(get_dc_list) > get_dc_list: 192.168.2.178:0 >[2015/02/20 13:52:16.397331, 4] ../source3/libsmb/nmblib.c:108(debug_nmb_packet) > nmb packet from 192.168.2.178(35072) header: id=9156 opcode=Query(0) response=Yes > header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes > header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 > answers: nmb_name=ADI<1c> rr_type=33 rr_class=1 ttl=0 > answers 0 char .STARFISH2 hex 10535441524649534832202020202020 > answers 10 char .D.STARFISH2 hex 00440053544152464953483220202020 > answers 20 char D.ADI hex 20202044004144492020202020202020 > answers 30 char ...ADI hex 2020202000C400414449202020202020 > answers 40 char ...ADI hex 2020202020201CC40041444920202020 > answers 50 char .D.ADI hex 20202020202020201B44004144492020 > answers 60 char ...ADI hex 202020202020202020201EC400414449 > answers 70 char .D.. hex 2020202020202020202020201D440001 > answers 80 char .__MSBROWSE__... hex 025F5F4D5342524F5753455F5F0201C4 > answers 90 char .STARFISH2 hex 00535441524649534832202020202020 > answers a0 char .D.STARFISH2$ hex 03440053544152464953483224202020 > answers b0 char .D.INet~Servic hex 2020034400494E65747E536572766963 > answers c0 char es ...ADMINISTR hex 657320201CC40041444D494E49535452 > answers d0 char ATOR .D.IS~STAR hex 41544F52202003440049537E53544152 > answers e0 char FISH2....D.JFCEN hex 46495348320000000044004A4643454E > answers f0 char TRAL .D.STA hex 5452414C202020202020034400535441 > answers 100 char RFISH2 BD.S hex 52464953483220202020202042440053 > answers 110 char TARFISH2 .D hex 5441524649534832202020202020BE44 > answers 120 char ...[8.ó......... hex 0000065B38177F000000000000000000 > answers 130 char ................ hex 00000000000000000000000000000000 > answers 140 char ............... hex 000000000000000000000000000000 >[2015/02/20 13:52:16.399062, 3] ../source3/libsmb/namequery_dc.c:207(rpc_dc_name) > rpc_dc_name: Returning DC STARFISH2 (192.168.2.178) for domain ADI >[2015/02/20 13:52:16.400065, 3] ../source3/lib/util_sock.c:617(open_socket_out_send) > Connecting to 192.168.2.178 at port 445 >[2015/02/20 13:52:16.455955, 1] ../librpc/ndr/ndr.c:578(ndr_pull_error) > ndr_pull_error(11): Pull bytes 8 (../librpc/ndr/ndr_basic.c:234) >[2015/02/20 13:52:16.456351, 0] ../source3/auth/auth_domain.c:302(domain_client_validate) > domain_client_validate: unable to validate password for user schulz in domain ADI to Domain controller STARFISH2. Error was NT_STATUS_BUFFER_TOO_SMALL. >[2015/02/20 13:52:16.460147, 2] ../source3/auth/auth.c:315(auth_check_ntlm_password) > check_ntlm_password: Authentication for user [schulz] -> [schulz] FAILED with error NT_STATUS_BUFFER_TOO_SMALL >[2015/02/20 13:52:16.460344, 2] ../auth/gensec/spnego.c:746(gensec_spnego_server_negTokenTarg) > SPNEGO login failed: NT_STATUS_BUFFER_TOO_SMALL >[2015/02/20 13:52:16.460525, 4] ../source3/smbd/sec_ctx.c:421(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.460841, 3] ../source3/smbd/error.c:82(error_packet_set) > NT error packet at ../source3/smbd/sesssetup.c(267) cmd=115 (SMBsesssetupX) NT_STATUS_BUFFER_TOO_SMALL >[2015/02/20 13:52:16.464122, 3] ../source3/smbd/process.c:1879(process_smb) > Transaction 3 of length 240 (0 toread) >[2015/02/20 13:52:16.464225, 3] ../source3/smbd/process.c:1489(switch_message) > switch message SMBsesssetupX (pid 5888) conn 0x0 >[2015/02/20 13:52:16.464318, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.464408, 3] ../source3/smbd/sesssetup.c:609(reply_sesssetup_and_X) > wct=12 flg2=0xc807 >[2015/02/20 13:52:16.464506, 2] ../source3/smbd/sesssetup.c:551(setup_new_vc_session) > setup_new_vc_session: New VC == 0, if NT4.x compatible we would close all old resources. >[2015/02/20 13:52:16.464562, 3] ../source3/smbd/sesssetup.c:142(reply_sesssetup_and_X_spnego) > Doing spnego session setup >[2015/02/20 13:52:16.464635, 3] ../source3/smbd/sesssetup.c:183(reply_sesssetup_and_X_spnego) > NativeOS=[Windows 2002 Service Pack 3 2600] NativeLanMan=[Windows 2002 5.1] PrimaryDomain=[] >[2015/02/20 13:52:16.465199, 4] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2015/02/20 13:52:16.465281, 4] ../source3/smbd/uid.c:491(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.465337, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2015/02/20 13:52:16.465635, 3] ../auth/ntlmssp/ntlmssp_util.c:34(debug_ntlmssp_flags) > Got NTLMSSP neg_flags=0xa2088207 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_NEGOTIATE_OEM > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_56 >[2015/02/20 13:52:16.465949, 4] ../source3/smbd/sec_ctx.c:421(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.469199, 3] ../source3/smbd/process.c:1879(process_smb) > Transaction 4 of length 326 (0 toread) >[2015/02/20 13:52:16.469296, 3] ../source3/smbd/process.c:1489(switch_message) > switch message SMBsesssetupX (pid 5888) conn 0x0 >[2015/02/20 13:52:16.469431, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.469550, 3] ../source3/smbd/sesssetup.c:609(reply_sesssetup_and_X) > wct=12 flg2=0xc807 >[2015/02/20 13:52:16.469607, 2] ../source3/smbd/sesssetup.c:551(setup_new_vc_session) > setup_new_vc_session: New VC == 0, if NT4.x compatible we would close all old resources. >[2015/02/20 13:52:16.469660, 3] ../source3/smbd/sesssetup.c:142(reply_sesssetup_and_X_spnego) > Doing spnego session setup >[2015/02/20 13:52:16.469727, 3] ../source3/smbd/sesssetup.c:183(reply_sesssetup_and_X_spnego) > NativeOS=[Windows 2002 Service Pack 3 2600] NativeLanMan=[Windows 2002 5.1] PrimaryDomain=[] >[2015/02/20 13:52:16.469788, 4] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2015/02/20 13:52:16.469844, 4] ../source3/smbd/uid.c:491(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.469896, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2015/02/20 13:52:16.470031, 3] ../auth/ntlmssp/ntlmssp_server.c:359(ntlmssp_server_preauth) > Got user=[schulz] domain=[ADI] workstation=[TETRA] len1=24 len2=24 >[2015/02/20 13:52:16.470136, 3] ../source3/param/loadparm.c:3647(lp_load_ex) > lp_load_ex: refreshing parameters >[2015/02/20 13:52:16.470519, 3] ../source3/param/loadparm.c:564(init_globals) > Initialising global parameters >[2015/02/20 13:52:16.471151, 3] ../source3/param/loadparm.c:2597(lp_do_section) > Processing section "[global]" > doing parameter max protocol = NT1 > doing parameter workgroup = adi > doing parameter server string = > doing parameter security = domain > doing parameter guest account = nobody2 > doing parameter log file = /opt/local/samba4/var/logs/%h/log.%m > doing parameter max log size = 15000 > doing parameter password server = starfish2 > doing parameter passdb backend = tdbsam > doing parameter socket options = TCP_NODELAY > doing parameter dns proxy = no > doing parameter dos filemode = yes > doing parameter delete readonly = yes > doing parameter name resolve order = bcast host > doing parameter host msdfs = yes > doing parameter msdfs root = yes > doing parameter unix extensions = no > doing parameter wide links = yes > doing parameter include = /opt/local/samba4/etc/smb.conf.%h >[2015/02/20 13:52:16.472765, 2] ../source3/param/loadparm.c:2614(lp_do_section) > Processing section "[homes]" > doing parameter comment = Home Directories > doing parameter browseable = no > doing parameter writable = yes > doing parameter inherit permissions = yes >[2015/02/20 13:52:16.473071, 2] ../source3/param/loadparm.c:2614(lp_do_section) > Processing section "[users]" > doing parameter comment = User Directories > doing parameter path = /home/users > doing parameter browseable = yes > doing parameter writable = yes > doing parameter inherit permissions = yes >[2015/02/20 13:52:16.473866, 4] ../source3/param/loadparm.c:3688(lp_load_ex) > pm_process() returned Yes >[2015/02/20 13:52:16.473970, 3] ../source3/param/loadparm.c:1495(lp_add_ipc) > adding IPC service >[2015/02/20 13:52:16.474581, 3] ../source3/libsmb/namequery.c:3103(get_dc_list) > get_dc_list: preferred server list: "STARFISH2, starfish2" >[2015/02/20 13:52:16.475116, 4] ../source3/libsmb/namequery.c:3240(get_dc_list) > get_dc_list: returning 1 ip addresses in an ordered list >[2015/02/20 13:52:16.475180, 4] ../source3/libsmb/namequery.c:3241(get_dc_list) > get_dc_list: 192.168.2.178:0 >[2015/02/20 13:52:16.477513, 4] ../source3/libsmb/nmblib.c:108(debug_nmb_packet) > nmb packet from 192.168.2.178(35072) header: id=10194 opcode=Query(0) response=Yes > header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes > header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 > answers: nmb_name=ADI<1c> rr_type=33 rr_class=1 ttl=0 > answers 0 char .STARFISH2 hex 10535441524649534832202020202020 > answers 10 char .D.STARFISH2 hex 00440053544152464953483220202020 > answers 20 char D.ADI hex 20202044004144492020202020202020 > answers 30 char ...ADI hex 2020202000C400414449202020202020 > answers 40 char ...ADI hex 2020202020201CC40041444920202020 > answers 50 char .D.ADI hex 20202020202020201B44004144492020 > answers 60 char ...ADI hex 202020202020202020201EC400414449 > answers 70 char .D.. hex 2020202020202020202020201D440001 > answers 80 char .__MSBROWSE__... hex 025F5F4D5342524F5753455F5F0201C4 > answers 90 char .STARFISH2 hex 00535441524649534832202020202020 > answers a0 char .D.STARFISH2$ hex 03440053544152464953483224202020 > answers b0 char .D.INet~Servic hex 2020034400494E65747E536572766963 > answers c0 char es ...ADMINISTR hex 657320201CC40041444D494E49535452 > answers d0 char ATOR .D.IS~STAR hex 41544F52202003440049537E53544152 > answers e0 char FISH2....D.JFCEN hex 46495348320000000044004A4643454E > answers f0 char TRAL .D.STA hex 5452414C202020202020034400535441 > answers 100 char RFISH2 BD.S hex 52464953483220202020202042440053 > answers 110 char TARFISH2 .D hex 5441524649534832202020202020BE44 > answers 120 char ...[8.ó......... hex 0000065B38177F000000000000000000 > answers 130 char ................ hex 00000000000000000000000000000000 > answers 140 char ............... hex 000000000000000000000000000000 >[2015/02/20 13:52:16.479171, 3] ../source3/libsmb/namequery_dc.c:207(rpc_dc_name) > rpc_dc_name: Returning DC STARFISH2 (192.168.2.178) for domain ADI >[2015/02/20 13:52:16.479364, 3] ../source3/lib/util_sock.c:617(open_socket_out_send) > Connecting to 192.168.2.178 at port 445 >[2015/02/20 13:52:16.508934, 3] ../source3/auth/auth.c:178(auth_check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [ADI]\[schulz]@[TETRA] with the new password interface >[2015/02/20 13:52:16.509112, 3] ../source3/auth/auth.c:181(auth_check_ntlm_password) > check_ntlm_password: mapped user is: [ADI]\[schulz]@[TETRA] >[2015/02/20 13:52:16.509212, 4] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2015/02/20 13:52:16.509276, 4] ../source3/smbd/uid.c:491(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2015/02/20 13:52:16.509520, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2015/02/20 13:52:16.509717, 4] ../source3/smbd/sec_ctx.c:421(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2015/02/20 13:52:16.509888, 3] ../source3/libsmb/namequery.c:3103(get_dc_list) > get_dc_list: preferred server list: "STARFISH2, starfish2" >[2015/02/20 13:52:16.510398, 4] ../source3/libsmb/namequery.c:3240(get_dc_list) > get_dc_list: returning 1 ip addresses in an ordered list >[2015/02/20 13:52:16.510503, 4] ../source3/libsmb/namequery.c:3241(get_dc_list) > get_dc_list: 192.168.2.178:0 >[2015/02/20 13:52:16.514191, 4] ../source3/libsmb/nmblib.c:108(debug_nmb_packet) > nmb packet from 192.168.2.178(35072) header: id=4825 opcode=Query(0) response=Yes > header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes > header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 > answers: nmb_name=ADI<1c> rr_type=33 rr_class=1 ttl=0 > answers 0 char .STARFISH2 hex 10535441524649534832202020202020 > answers 10 char .D.STARFISH2 hex 00440053544152464953483220202020 > answers 20 char D.ADI hex 20202044004144492020202020202020 > answers 30 char ...ADI hex 2020202000C400414449202020202020 > answers 40 char ...ADI hex 2020202020201CC40041444920202020 > answers 50 char .D.ADI hex 20202020202020201B44004144492020 > answers 60 char ...ADI hex 202020202020202020201EC400414449 > answers 70 char .D.. hex 2020202020202020202020201D440001 > answers 80 char .__MSBROWSE__... hex 025F5F4D5342524F5753455F5F0201C4 > answers 90 char .STARFISH2 hex 00535441524649534832202020202020 > answers a0 char .D.STARFISH2$ hex 03440053544152464953483224202020 > answers b0 char .D.INet~Servic hex 2020034400494E65747E536572766963 > answers c0 char es ...ADMINISTR hex 657320201CC40041444D494E49535452 > answers d0 char ATOR .D.IS~STAR hex 41544F52202003440049537E53544152 > answers e0 char FISH2....D.JFCEN hex 46495348320000000044004A4643454E > answers f0 char TRAL .D.STA hex 5452414C202020202020034400535441 > answers 100 char RFISH2 BD.S hex 52464953483220202020202042440053 > answers 110 char TARFISH2 .D hex 5441524649534832202020202020BE44 > answers 120 char ...[8.ó......... hex 0000065B38177F000000000000000000 > answers 130 char ................ hex 00000000000000000000000000000000 > answers 140 char ............... hex 000000000000000000000000000000 >[2015/02/20 13:52:16.515847, 3] ../source3/libsmb/namequery_dc.c:207(rpc_dc_name) > rpc_dc_name: Returning DC STARFISH2 (192.168.2.178) for domain ADI >[2015/02/20 13:52:16.516491, 3] ../source3/lib/util_sock.c:617(open_socket_out_send) > Connecting to 192.168.2.178 at port 445 >[2015/02/20 13:52:16.540490, 3] ../lib/util/charset/convert_string.c:297(convert_string_handle) > convert_string_internal: Conversion error: Incomplete multibyte sequence(+ã) >[2015/02/20 13:52:16.540698, 1] ../librpc/ndr/ndr.c:604(ndr_push_error) > ndr_push_error(5): Bad character conversion >[2015/02/20 13:52:16.540843, 0] ../source3/auth/auth_domain.c:302(domain_client_validate) > domain_client_validate: unable to validate password for user schulz in domain ADI to Domain controller STARFISH2. Error was NT_STATUS_INVALID_PARAMETER. >[2015/02/20 13:52:16.547292, 2] ../source3/auth/auth.c:315(auth_check_ntlm_password) > check_ntlm_password: Authentication for user [schulz] -> [schulz] FAILED with error NT_STATUS_INVALID_PARAMETER >[2015/02/20 13:52:16.547511, 2] ../auth/gensec/spnego.c:746(gensec_spnego_server_negTokenTarg) > SPNEGO login failed: NT_STATUS_INVALID_PARAMETER >[2015/02/20 13:52:16.547650, 4] ../source3/smbd/sec_ctx.c:421(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.547900, 3] ../source3/smbd/error.c:82(error_packet_set) > NT error packet at ../source3/smbd/sesssetup.c(267) cmd=115 (SMBsesssetupX) NT_STATUS_INVALID_PARAMETER >[2015/02/20 13:52:16.568218, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.568333, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.568411, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.568525, 4] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2015/02/20 13:52:16.569021, 3] ../source3/smbd/server_exit.c:246(exit_server_common) > Server exit (failed to receive smb request)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 11098
:
10722
|
10723
|
10724
| 10760