The Samba-Bugzilla – Attachment 12906 Details for
Bug 12461
smbclient unable work with DFS share
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
smbclient.log
smbclient.log (text/x-log), 24.86 KB, created by
mikhail.v.gavrilov
on 2017-02-07 19:37:42 UTC
(
hide
)
Description:
smbclient.log
Filename:
MIME Type:
Creator:
mikhail.v.gavrilov
Created:
2017-02-07 19:37:42 UTC
Size:
24.86 KB
patch
obsolete
>$ smbclient -d10 -L //10.76.4.20/DFS -U mv.gavrilov -W REGION >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 >lp_load_ex: refreshing parameters >Initialising global parameters >rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 >Processing section "[global]" >doing parameter workgroup = SAMBA >doing parameter security = user >doing parameter passdb backend = tdbsam >doing parameter printing = cups >doing parameter printcap name = cups >doing parameter load printers = yes >doing parameter cups options = raw >pm_process() returned Yes >lp_servicenumber: couldn't find homes >added interface enp2s0 ip=2a02:1c8:109:c6c:4c68:221d:c826:2b5d bcast= netmask=ffff:ffff:ffff:ffff:: >added interface enp2s0 ip=192.168.1.86 bcast=192.168.1.255 netmask=255.255.255.0 >added interface virbr0 ip=192.168.122.1 bcast=192.168.122.255 netmask=255.255.255.0 >Netbios name list:- >my_netbios_names[0]="LOCALHOST" >Client started (version 4.5.5). >Enter mv.gavrilov's password: >Connecting to 10.76.4.20 at port 445 >Connecting to 10.76.4.20 at port 139 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 46080 > SO_RCVBUF = 357440 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok >Doing spnego session setup (blob length=120) >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >got OID=1.2.840.113554.1.2.2 >got OID=1.2.840.113554.1.2.2.3 >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=not_defined_in_RFC4178@please_ignore >GENSEC backend 'gssapi_spnego' registered >GENSEC backend 'gssapi_krb5' registered >GENSEC backend 'gssapi_krb5_sasl' registered >GENSEC backend 'spnego' registered >GENSEC backend 'schannel' registered >GENSEC backend 'naclrpc_as_system' registered >GENSEC backend 'sasl-EXTERNAL' registered >GENSEC backend 'ntlmssp' registered >GENSEC backend 'ntlmssp_resume_ccache' registered >GENSEC backend 'http_basic' registered >GENSEC backend 'http_ntlm' registered >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >smb_signing_sign_pdu: sent SMB signature of >[0000] 42 53 52 53 50 59 4C 20 BSRSPYL >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >smb_signing_sign_pdu: sent SMB signature of >[0000] 42 53 52 53 50 59 4C 20 BSRSPYL >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >smb_signing_activate: user_session_key >[0000] 69 39 6A 6A BD EE 69 9B 06 63 1E CA CF 79 4B 7E i9jj..i. .c...yK~ >smb_signing_activate: NULL response_data >smb_signing_md5: sequence number 1 >smb_signing_check_pdu: seq 1: got good SMB signature of >[0000] 69 64 16 DD 6F 3B 15 73 id..o;.s >Domain=[TENSOR-CORP] OS=[Windows Server 2012 R2 Datacenter 9600] Server=[Windows Server 2012 R2 Datacenter 6.3] > session setup ok >smb_signing_md5: sequence number 2 >smb_signing_sign_pdu: sent SMB signature of >[0000] 19 06 87 BC C2 F8 3E 32 ......>2 >smb_signing_md5: sequence number 3 >smb_signing_check_pdu: seq 3: got good SMB signature of >[0000] 5B 3E 21 97 75 33 16 08 [>!.u3.. > tconx ok > > Sharename Type Comment > --------- ---- ------- >smb_signing_md5: sequence number 4 >smb_signing_sign_pdu: sent SMB signature of >[0000] 7D E6 58 C1 17 50 BC 6A }.X..P.j >smb_signing_md5: sequence number 5 >smb_signing_check_pdu: seq 5: got good SMB signature of >[0000] F7 2D 65 53 45 A1 6E 7B .-eSE.n{ >Bind RPC Pipe: host 10.76.4.20 auth_type 0, auth_level 1 > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND (11) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0048 (72) > auth_length : 0x0000 (0) > call_id : 0x00000001 (1) > u : union dcerpc_payload(case 11) > bind: struct dcerpc_bind > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x00000000 (0) > num_contexts : 0x01 (1) > ctx_list: ARRAY(1) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0000 (0) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 4b324fc8-1670-01d3-1278-5a47bf6ee188 > if_version : 0x00000003 (3) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > auth_info : DATA_BLOB length=0 >rpc_api_pipe: host 10.76.4.20 >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0 >smb_signing_md5: sequence number 6 >smb_signing_sign_pdu: sent SMB signature of >[0000] 56 F8 98 1A 7B D5 6F 97 V...{.o. >smb_signing_md5: sequence number 7 >smb_signing_check_pdu: seq 7: got good SMB signature of >[0000] 0C F7 7E 0D 5A F4 CD E7 ..~.Z... >rpc_read_send: data_to_read: 52 > r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND_ACK (12) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0044 (68) > auth_length : 0x0000 (0) > call_id : 0x00000001 (1) > u : union dcerpc_payload(case 12) > bind_ack: struct dcerpc_bind_ack > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x000f47ce (1001422) > secondary_address_size : 0x000d (13) > secondary_address : '\PIPE\srvsvc' > _pad1 : DATA_BLOB length=1 >[0000] 8A . > num_results : 0x01 (1) > ctx_list: ARRAY(1) > ctx_list: struct dcerpc_ack_ctx > result : DCERPC_BIND_ACK_RESULT_ACCEPTANCE (0) > reason : union dcerpc_bind_ack_reason(case 0) > value : DCERPC_BIND_ACK_REASON_NOT_SPECIFIED (0) > syntax: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > auth_info : DATA_BLOB length=0 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host 10.76.4.20 returned 68 bytes. >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe srvsvc to machine 10.76.4.20 and bound anonymously. > srvsvc_NetShareEnumAll: struct srvsvc_NetShareEnumAll > in: struct srvsvc_NetShareEnumAll > server_unc : * > server_unc : '10.76.4.20' > info_ctr : * > info_ctr: struct srvsvc_NetShareInfoCtr > level : 0x00000001 (1) > ctr : union srvsvc_NetShareCtr(case 1) > ctr1 : * > ctr1: struct srvsvc_NetShareCtr1 > count : 0x00000000 (0) > array : NULL > max_buffer : 0xffffffff (4294967295) > resume_handle : * > resume_handle : 0x00000000 (0) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_REQUEST (0) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0018 (24) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 0) > request: struct dcerpc_request > alloc_hint : 0x00000048 (72) > context_id : 0x0000 (0) > opnum : 0x000f (15) > object : union dcerpc_object(case 0) > empty: struct dcerpc_empty > _pad : DATA_BLOB length=0 > stub_and_verifier : DATA_BLOB length=0 >rpc_api_pipe: host 10.76.4.20 >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=96, this_data=96, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0 >smb_signing_md5: sequence number 8 >smb_signing_sign_pdu: sent SMB signature of >[0000] 3E 9A AB 05 82 78 C3 19 >....x.. >smb_signing_md5: sequence number 9 >smb_signing_check_pdu: seq 9: got good SMB signature of >[0000] C3 1E A1 40 D3 D2 F1 26 ...@...& >rpc_read_send: data_to_read: 632 > r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_RESPONSE (2) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0288 (648) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 2) > response: struct dcerpc_response > alloc_hint : 0x00000270 (624) > context_id : 0x0000 (0) > cancel_count : 0x00 (0) > _pad : DATA_BLOB length=1 >[0000] 00 . > stub_and_verifier : DATA_BLOB length=624 >[0000] 01 00 00 00 01 00 00 00 00 00 02 00 07 00 00 00 ........ ........ >[0010] 04 00 02 00 07 00 00 00 08 00 02 00 00 00 00 80 ........ ........ >[0020] 0C 00 02 00 10 00 02 00 00 00 00 80 14 00 02 00 ........ ........ >[0030] 18 00 02 00 00 00 00 00 1C 00 02 00 20 00 02 00 ........ .... ... >[0040] 03 00 00 80 24 00 02 00 28 00 02 00 00 00 00 00 ....$... (....... >[0050] 2C 00 02 00 30 00 02 00 00 00 00 00 34 00 02 00 ,...0... ....4... >[0060] 38 00 02 00 00 00 00 00 3C 00 02 00 07 00 00 00 8....... <....... >[0070] 00 00 00 00 07 00 00 00 41 00 44 00 4D 00 49 00 ........ A.D.M.I. >[0080] 4E 00 24 00 00 00 00 00 10 00 00 00 00 00 00 00 N.$..... ........ >[0090] 10 00 00 00 23 04 34 04 30 04 3B 04 35 04 3D 04 ....#.4. 0.;.5.=. >[00A0] 3D 04 4B 04 39 04 20 00 41 00 64 00 6D 00 69 00 =.K.9. . A.d.m.i. >[00B0] 6E 00 00 00 03 00 00 00 00 00 00 00 03 00 00 00 n....... ........ >[00C0] 43 00 24 00 00 00 00 00 19 00 00 00 00 00 00 00 C.$..... ........ >[00D0] 19 00 00 00 21 04 42 04 30 04 3D 04 34 04 30 04 ....!.B. 0.=.4.0. >[00E0] 40 04 42 04 3D 04 4B 04 39 04 20 00 3E 04 31 04 @.B.=.K. 9. .>.1. >[00F0] 49 04 38 04 39 04 20 00 40 04 35 04 41 04 43 04 I.8.9. . @.5.A.C. >[0100] 40 04 41 04 00 00 00 00 04 00 00 00 00 00 00 00 @.A..... ........ >[0110] 04 00 00 00 44 00 46 00 53 00 00 00 01 00 00 00 ....D.F. S....... >[0120] 00 00 00 00 01 00 00 00 00 00 00 00 05 00 00 00 ........ ........ >[0130] 00 00 00 00 05 00 00 00 49 00 50 00 43 00 24 00 ........ I.P.C.$. >[0140] 00 00 00 00 0E 00 00 00 00 00 00 00 0E 00 00 00 ........ ........ >[0150] 23 04 34 04 30 04 3B 04 35 04 3D 04 3D 04 4B 04 #.4.0.;. 5.=.=.K. >[0160] 39 04 20 00 49 00 50 00 43 00 00 00 09 00 00 00 9. .I.P. C....... >[0170] 00 00 00 00 09 00 00 00 4E 00 45 00 54 00 4C 00 ........ N.E.T.L. >[0180] 4F 00 47 00 4F 00 4E 00 00 00 00 00 14 00 00 00 O.G.O.N. ........ >[0190] 00 00 00 00 14 00 00 00 1E 04 31 04 49 04 38 04 ........ ..1.I.8. >[01A0] 39 04 20 00 41 04 35 04 40 04 32 04 35 04 40 04 9. .A.5. @.2.5.@. >[01B0] 20 00 32 04 45 04 3E 04 34 04 30 04 20 00 00 00 .2.E.>. 4.0. ... >[01C0] 07 00 00 00 00 00 00 00 07 00 00 00 70 00 72 00 ........ ....p.r. >[01D0] 69 00 6E 00 74 00 24 00 00 00 00 00 13 00 00 00 i.n.t.$. ........ >[01E0] 00 00 00 00 13 00 00 00 14 04 40 04 30 04 39 04 ........ ..@.0.9. >[01F0] 32 04 35 04 40 04 4B 04 20 00 3F 04 40 04 38 04 2.5.@.K. .?.@.8. >[0200] 3D 04 42 04 35 04 40 04 3E 04 32 04 00 00 00 00 =.B.5.@. >.2..... >[0210] 07 00 00 00 00 00 00 00 07 00 00 00 53 00 59 00 ........ ....S.Y. >[0220] 53 00 56 00 4F 00 4C 00 00 00 00 00 14 00 00 00 S.V.O.L. ........ >[0230] 00 00 00 00 14 00 00 00 1E 04 31 04 49 04 38 04 ........ ..1.I.8. >[0240] 39 04 20 00 41 04 35 04 40 04 32 04 35 04 40 04 9. .A.5. @.2.5.@. >[0250] 20 00 32 04 45 04 3E 04 34 04 30 04 20 00 00 00 .2.E.>. 4.0. ... >[0260] 07 00 00 00 40 00 02 00 00 00 00 00 00 00 00 00 ....@... ........ >Got pdu len 648, data_len 624 >rpc_api_pipe: got frag len of 648 at offset 0: NT_STATUS_OK >rpc_api_pipe: host 10.76.4.20 returned 624 bytes. > srvsvc_NetShareEnumAll: struct srvsvc_NetShareEnumAll > out: struct srvsvc_NetShareEnumAll > info_ctr : * > info_ctr: struct srvsvc_NetShareInfoCtr > level : 0x00000001 (1) > ctr : union srvsvc_NetShareCtr(case 1) > ctr1 : * > ctr1: struct srvsvc_NetShareCtr1 > count : 0x00000007 (7) > array : * > array: ARRAY(7) > array: struct srvsvc_NetShareInfo1 > name : * > name : 'ADMIN$' > type : STYPE_DISKTREE_HIDDEN (0x80000000) > comment : * > comment : 'УдаленнÑй Admin' > array: struct srvsvc_NetShareInfo1 > name : * > name : 'C$' > type : STYPE_DISKTREE_HIDDEN (0x80000000) > comment : * > comment : 'СÑандаÑÑнÑй обÑий ÑеÑÑÑÑ' > array: struct srvsvc_NetShareInfo1 > name : * > name : 'DFS' > type : STYPE_DISKTREE (0x0) > comment : * > comment : '' > array: struct srvsvc_NetShareInfo1 > name : * > name : 'IPC$' > type : STYPE_IPC_HIDDEN (0x80000003) > comment : * > comment : 'УдаленнÑй IPC' > array: struct srvsvc_NetShareInfo1 > name : * > name : 'NETLOGON' > type : STYPE_DISKTREE (0x0) > comment : * > comment : 'ÐбÑий ÑеÑÐ²ÐµÑ Ð²Ñода ' > array: struct srvsvc_NetShareInfo1 > name : * > name : 'print$' > type : STYPE_DISKTREE (0x0) > comment : * > comment : 'ÐÑайвеÑÑ Ð¿ÑинÑеÑов' > array: struct srvsvc_NetShareInfo1 > name : * > name : 'SYSVOL' > type : STYPE_DISKTREE (0x0) > comment : * > comment : 'ÐбÑий ÑеÑÐ²ÐµÑ Ð²Ñода ' > totalentries : * > totalentries : 0x00000007 (7) > resume_handle : * > resume_handle : 0x00000000 (0) > result : WERR_OK > ADMIN$ Disk УдаленнÑй Admin > C$ Disk СÑандаÑÑнÑй обÑий ÑеÑÑÑÑ > DFS Disk > IPC$ IPC УдаленнÑй IPC > NETLOGON Disk ÐбÑий ÑеÑÐ²ÐµÑ Ð²Ñода > print$ Disk ÐÑайвеÑÑ Ð¿ÑинÑеÑов > SYSVOL Disk ÐбÑий ÑеÑÐ²ÐµÑ Ð²Ñода >smb_signing_md5: sequence number 10 >smb_signing_sign_pdu: sent SMB signature of >[0000] D5 65 9E 4C 5C 2D C8 F0 .e.L\-.. >smb_signing_md5: sequence number 11 >smb_signing_check_pdu: seq 11: got good SMB signature of >[0000] 31 F0 AA 01 9E 8E 73 87 1.....s. >smb_signing_md5: sequence number 12 >smb_signing_sign_pdu: sent SMB signature of >[0000] 4C 8F 53 1A E5 35 B1 07 L.S..5.. >smb_signing_md5: sequence number 13 >smb_signing_check_pdu: seq 13: got good SMB signature of >[0000] F6 66 2E 84 2C EB 5A 58 .f..,.ZX >Connecting to 10.76.4.20 at port 139 >Connecting to 10.76.4.20 at port 139 >Connection to 10.76.4.20 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND) >NetBIOS over TCP disabled -- no workgroup available
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 12461
:
12862
|
12863
|
12867
|
12869
|
12885
|
12886
|
12887
|
12888
| 12906 |
12907
|
12908