The Samba-Bugzilla – Attachment 12887 Details for
Bug 12461
smbclient unable work with DFS share
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
samba.log
samba.log (text/x-log), 9.64 KB, created by
mikhail.v.gavrilov
on 2017-01-31 17:09:17 UTC
(
hide
)
Description:
samba.log
Filename:
MIME Type:
Creator:
mikhail.v.gavrilov
Created:
2017-01-31 17:09:17 UTC
Size:
9.64 KB
patch
obsolete
>$ smbclient -d10 //corp.tensor.ru/DFS -U mv.gavrilov -W REGION -c "ls Usersspace/*" >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 >lp_load_ex: refreshing parameters >Initialising global parameters >rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 >Processing section "[global]" >doing parameter workgroup = SAMBA >doing parameter security = user >doing parameter passdb backend = tdbsam >doing parameter printing = cups >doing parameter printcap name = cups >doing parameter load printers = yes >doing parameter cups options = raw >pm_process() returned Yes >lp_servicenumber: couldn't find homes >added interface enp2s0 ip=2a02:1c8:109:c08:5abc:14a8:ace8:47f1 bcast= netmask=ffff:ffff:ffff:ffff:: >added interface enp2s0 ip=192.168.1.86 bcast=192.168.1.255 netmask=255.255.255.0 >added interface virbr0 ip=192.168.122.1 bcast=192.168.122.255 netmask=255.255.255.0 >Netbios name list:- >my_netbios_names[0]="LOCALHOST" >Client started (version 4.5.4). >Enter mv.gavrilov's password: >Opening cache file at /var/lib/samba/gencache.tdb >tdb(/var/lib/samba/gencache.tdb): tdb_open_ex: could not open file /var/lib/samba/gencache.tdb: Permission denied >tdb(/var/lib/samba/gencache.tdb): tdb_open_ex: could not open file /var/lib/samba/gencache.tdb: No such file or directory >Attempt to open gencache.tdb has failed. >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up corp.tensor.ru#20 (sitename (null)) >Opening cache file at /var/lib/samba/gencache.tdb >tdb(/var/lib/samba/gencache.tdb): tdb_open_ex: could not open file /var/lib/samba/gencache.tdb: Permission denied >tdb(/var/lib/samba/gencache.tdb): tdb_open_ex: could not open file /var/lib/samba/gencache.tdb: No such file or directory >Attempt to open gencache.tdb has failed. >no entry for corp.tensor.ru#20 found. >resolve_hosts: Attempting host lookup for name corp.tensor.ru<0x20> >remove_duplicate_addrs2: looking for duplicate address/port pairs >namecache_store: storing 7 addresses for corp.tensor.ru#20: 10.76.101.131,10.76.163.189,10.76.4.252,10.76.4.253,10.76.4.20,10.76.163.190,10.76.101.124 >Opening cache file at /var/lib/samba/gencache.tdb >tdb(/var/lib/samba/gencache.tdb): tdb_open_ex: could not open file /var/lib/samba/gencache.tdb: Permission denied >tdb(/var/lib/samba/gencache.tdb): tdb_open_ex: could not open file /var/lib/samba/gencache.tdb: No such file or directory >Attempt to open gencache.tdb has failed. >internal_resolve_name: returning 7 addresses: 10.76.101.131:0 10.76.163.189:0 10.76.4.252:0 10.76.4.253:0 10.76.4.20:0 10.76.163.190:0 10.76.101.124:0 >Connecting to 10.76.101.131 at port 445 >Connecting to 10.76.101.131 at port 139 >Connecting to 10.76.163.189 at port 445 >Connecting to 10.76.4.252 at port 445 >Connecting to 10.76.4.253 at port 445 >Connecting to 10.76.4.20 at port 445 >Connecting to 10.76.163.190 at port 445 >Connecting to 10.76.101.124 at port 445 >Connecting to 10.76.163.189 at port 139 >Connecting to 10.76.4.252 at port 139 >Connecting to 10.76.4.253 at port 139 >Connecting to 10.76.4.20 at port 139 >Connecting to 10.76.163.190 at port 139 >Connecting to 10.76.101.124 at port 139 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 46080 > SO_RCVBUF = 357440 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok >Doing spnego session setup (blob length=120) >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >got OID=1.2.840.113554.1.2.2 >got OID=1.2.840.113554.1.2.2.3 >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=not_defined_in_RFC4178@please_ignore >GENSEC backend 'gssapi_spnego' registered >GENSEC backend 'gssapi_krb5' registered >GENSEC backend 'gssapi_krb5_sasl' registered >GENSEC backend 'spnego' registered >GENSEC backend 'schannel' registered >GENSEC backend 'naclrpc_as_system' registered >GENSEC backend 'sasl-EXTERNAL' registered >GENSEC backend 'ntlmssp' registered >GENSEC backend 'ntlmssp_resume_ccache' registered >GENSEC backend 'http_basic' registered >GENSEC backend 'http_ntlm' registered >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >smb_signing_sign_pdu: sent SMB signature of >[0000] 42 53 52 53 50 59 4C 20 BSRSPYL >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >smb_signing_sign_pdu: sent SMB signature of >[0000] 42 53 52 53 50 59 4C 20 BSRSPYL >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >smb_signing_activate: user_session_key >[0000] 3F 9E 1A 92 A4 06 50 B3 53 C1 4E BE BD DB A1 6D ?.....P. S.N....m >smb_signing_activate: NULL response_data >smb_signing_md5: sequence number 1 >smb_signing_check_pdu: seq 1: got good SMB signature of >[0000] 2B 7F FB FB 3F 36 79 49 +...?6yI >Domain=[TENSOR-CORP] OS=[Windows Server 2012 R2 Standard 9600] Server=[Windows Server 2012 R2 Standard 6.3] > session setup ok >smb_signing_md5: sequence number 2 >smb_signing_sign_pdu: sent SMB signature of >[0000] 99 08 47 AD 80 5C 8B 2D ..G..\.- >smb_signing_md5: sequence number 3 >smb_signing_check_pdu: seq 3: got good SMB signature of >[0000] 48 BD C5 40 90 54 E1 AA H..@.T.. >smb_signing_md5: sequence number 4 >smb_signing_sign_pdu: sent SMB signature of >[0000] 12 BA E8 24 D0 D5 E1 D8 ...$.... >smb_signing_md5: sequence number 5 >smb_signing_check_pdu: seq 5: got good SMB signature of >[0000] E3 E1 77 F0 DB 22 A8 ED ..w..".. >tree connect failed: NT_STATUS_BAD_NETWORK_NAME
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 12461
:
12862
|
12863
|
12867
|
12869
|
12885
|
12886
| 12887 |
12888
|
12906
|
12907
|
12908