The Samba-Bugzilla – Attachment 12920 Details for
Bug 12579
force user results in share not available for active directory users
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
samba log debug level 10
192.168.180.30.log (text/plain), 187.80 KB, created by
Tony Guepin
on 2017-02-13 10:13:39 UTC
(
hide
)
Description:
samba log debug level 10
Filename:
MIME Type:
Creator:
Tony Guepin
Created:
2017-02-13 10:13:39 UTC
Size:
187.80 KB
patch
obsolete
>[2017/02/13 08:48:51.700615, 6, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2148(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 13 08:21:56 2017 > >[2017/02/13 08:48:51.700650, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:384(messaging_register) > Registering messaging pointer for type 774 - private_data=0x55c3f02af780 >[2017/02/13 08:48:51.700658, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:384(messaging_register) > Registering messaging pointer for type 778 - private_data=0x55c3f02af780 >[2017/02/13 08:48:51.700664, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:384(messaging_register) > Registering messaging pointer for type 770 - private_data=0x55c3f02af780 >[2017/02/13 08:48:51.700670, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:384(messaging_register) > Registering messaging pointer for type 787 - private_data=0x55c3f02af780 >[2017/02/13 08:48:51.700677, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:384(messaging_register) > Registering messaging pointer for type 779 - private_data=0x55c3f02af780 >[2017/02/13 08:48:51.700683, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:384(messaging_register) > Registering messaging pointer for type 15 - private_data=(nil) >[2017/02/13 08:48:51.700689, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:399(messaging_register) > Overriding messaging pointer for type 15 - private_data=(nil) >[2017/02/13 08:48:51.700695, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:431(messaging_deregister) > Deregistering messaging pointer for type 16 - private_data=(nil) >[2017/02/13 08:48:51.700701, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:384(messaging_register) > Registering messaging pointer for type 16 - private_data=0x55c3f02af780 >[2017/02/13 08:48:51.700707, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:431(messaging_deregister) > Deregistering messaging pointer for type 33 - private_data=0x55c3f02adf40 >[2017/02/13 08:48:51.700713, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:384(messaging_register) > Registering messaging pointer for type 33 - private_data=0x55c3f02af780 >[2017/02/13 08:48:51.700719, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:431(messaging_deregister) > Deregistering messaging pointer for type 790 - private_data=(nil) >[2017/02/13 08:48:51.700725, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:384(messaging_register) > Registering messaging pointer for type 790 - private_data=0x55c3f02af780 >[2017/02/13 08:48:51.700731, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:431(messaging_deregister) > Deregistering messaging pointer for type 791 - private_data=(nil) >[2017/02/13 08:48:51.700737, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:431(messaging_deregister) > Deregistering messaging pointer for type 1 - private_data=(nil) >[2017/02/13 08:48:51.700743, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:384(messaging_register) > Registering messaging pointer for type 1 - private_data=(nil) >[2017/02/13 08:48:51.700752, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/events.c:483(event_add_idle) > event_add_idle: idle_evt(keepalive) 0x55c3f02aee10 >[2017/02/13 08:48:51.700759, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/events.c:483(event_add_idle) > event_add_idle: idle_evt(deadtime) 0x55c3f02af060 >[2017/02/13 08:48:51.700765, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/events.c:483(event_add_idle) > event_add_idle: idle_evt(housekeeping) 0x55c3f02cc6a0 >[2017/02/13 08:48:51.700785, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/util_sock.c:369(read_smb_length_return_keepalive) > got smb length of 155 >[2017/02/13 08:48:51.700798, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/util.c:168(show_msg) >[2017/02/13 08:48:51.700806, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/util.c:178(show_msg) > size=155 > smb_com=0x72 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51283 > smb_tid=65535 > smb_pid=65279 > smb_uid=0 > smb_mid=0 > smt_wct=0 > smb_bcc=120 >[2017/02/13 08:48:51.700828, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/util/util.c:559(dump_data) > [0000] 02 50 43 20 4E 45 54 57 4F 52 4B 20 50 52 4F 47 .PC NETW ORK PROG > [0010] 52 41 4D 20 31 2E 30 00 02 4C 41 4E 4D 41 4E 31 RAM 1.0. .LANMAN1 > [0020] 2E 30 00 02 57 69 6E 64 6F 77 73 20 66 6F 72 20 .0..Wind ows for > [0030] 57 6F 72 6B 67 72 6F 75 70 73 20 33 2E 31 61 00 Workgrou ps 3.1a. > [0040] 02 4C 4D 31 2E 32 58 30 30 32 00 02 4C 41 4E 4D .LM1.2X0 02..LANM > [0050] 41 4E 32 2E 31 00 02 4E 54 20 4C 4D 20 30 2E 31 AN2.1..N T LM 0.1 > [0060] 32 00 02 53 4D 42 20 32 2E 30 30 32 00 02 53 4D 2..SMB 2 .002..SM > [0070] 42 20 32 2E 3F 3F 3F 00 B 2.???. >[2017/02/13 08:48:51.700920, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:51.700935, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:51.701463, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/util.c:1291(set_remote_arch) > set_remote_arch: Client arch is 'UNKNOWN' >[2017/02/13 08:48:51.701484, 6, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2148(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 13 08:21:56 2017 > >[2017/02/13 08:48:51.701499, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 2 for /var/run/samba/serverid.tdb >[2017/02/13 08:48:51.701505, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:/var/run/samba/serverid.tdb 3:<none> >[2017/02/13 08:48:51.701514, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key A77C000000000000FFFF >[2017/02/13 08:48:51.701523, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02cd4d0 >[2017/02/13 08:48:51.701538, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key A77C000000000000FFFF >[2017/02/13 08:48:51.701546, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 2 for /var/run/samba/serverid.tdb >[2017/02/13 08:48:51.701552, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:48:51.701567, 6, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2148(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 13 08:21:56 2017 > >[2017/02/13 08:48:51.701593, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:51.701603, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:51.701622, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/util.c:1291(set_remote_arch) > set_remote_arch: Client arch is 'Vista' >[2017/02/13 08:48:51.701635, 6, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2148(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 13 08:21:56 2017 > >[2017/02/13 08:48:51.701654, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:477(make_auth_context_subsystem) > Making default auth method list for server role = 'domain member' >[2017/02/13 08:48:51.701669, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend sam >[2017/02/13 08:48:51.701678, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'sam' >[2017/02/13 08:48:51.701684, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend sam_ignoredomain >[2017/02/13 08:48:51.701690, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'sam_ignoredomain' >[2017/02/13 08:48:51.701696, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend unix >[2017/02/13 08:48:51.701702, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'unix' >[2017/02/13 08:48:51.701708, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend winbind >[2017/02/13 08:48:51.701714, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'winbind' >[2017/02/13 08:48:51.701720, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend wbc >[2017/02/13 08:48:51.701726, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'wbc' >[2017/02/13 08:48:51.701732, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend trustdomain >[2017/02/13 08:48:51.701738, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'trustdomain' >[2017/02/13 08:48:51.701744, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend ntdomain >[2017/02/13 08:48:51.701749, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'ntdomain' >[2017/02/13 08:48:51.701755, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend guest >[2017/02/13 08:48:51.701762, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'guest' >[2017/02/13 08:48:51.701767, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:378(load_auth_module) > load_auth_module: Attempting to find an auth method to match guest >[2017/02/13 08:48:51.701774, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:403(load_auth_module) > load_auth_module: auth method guest has a valid init >[2017/02/13 08:48:51.701780, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:378(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam >[2017/02/13 08:48:51.701786, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:403(load_auth_module) > load_auth_module: auth method sam has a valid init >[2017/02/13 08:48:51.701792, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:378(load_auth_module) > load_auth_module: Attempting to find an auth method to match winbind:ntdomain >[2017/02/13 08:48:51.701799, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:378(load_auth_module) > load_auth_module: Attempting to find an auth method to match ntdomain >[2017/02/13 08:48:51.701808, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:403(load_auth_module) > load_auth_module: auth method ntdomain has a valid init >[2017/02/13 08:48:51.701814, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:403(load_auth_module) > load_auth_module: auth method winbind has a valid init >[2017/02/13 08:48:51.701929, 5, pid=31911, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:672(gensec_start_mech) > Starting GENSEC mechanism spnego >[2017/02/13 08:48:51.701956, 5, pid=31911, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:672(gensec_start_mech) > Starting GENSEC submechanism gse_krb5 >[2017/02/13 08:48:51.736625, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/util.c:1884(name_to_fqdn) > name_to_fqdn: lookup for LENO -> leno.vk.guepin.com. >[2017/02/13 08:48:51.799471, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:51.799507, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:51.799560, 6, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2148(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 13 08:21:56 2017 > >[2017/02/13 08:48:51.799582, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:477(make_auth_context_subsystem) > Making default auth method list for server role = 'domain member' >[2017/02/13 08:48:51.799592, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:378(load_auth_module) > load_auth_module: Attempting to find an auth method to match guest >[2017/02/13 08:48:51.799600, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:403(load_auth_module) > load_auth_module: auth method guest has a valid init >[2017/02/13 08:48:51.799606, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:378(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam >[2017/02/13 08:48:51.799613, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:403(load_auth_module) > load_auth_module: auth method sam has a valid init >[2017/02/13 08:48:51.799619, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:378(load_auth_module) > load_auth_module: Attempting to find an auth method to match winbind:ntdomain >[2017/02/13 08:48:51.799626, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:378(load_auth_module) > load_auth_module: Attempting to find an auth method to match ntdomain >[2017/02/13 08:48:51.799632, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:403(load_auth_module) > load_auth_module: auth method ntdomain has a valid init >[2017/02/13 08:48:51.799638, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:403(load_auth_module) > load_auth_module: auth method winbind has a valid init >[2017/02/13 08:48:51.799674, 5, pid=31911, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:672(gensec_start_mech) > Starting GENSEC mechanism spnego >[2017/02/13 08:48:51.799694, 5, pid=31911, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:672(gensec_start_mech) > Starting GENSEC submechanism gse_krb5 >[2017/02/13 08:48:51.834039, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/util.c:1884(name_to_fqdn) > name_to_fqdn: lookup for LENO -> leno.vk.guepin.com. >[2017/02/13 08:48:52.004318, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.004353, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.004386, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_session_global.tdb >[2017/02/13 08:48:52.004395, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> >[2017/02/13 08:48:52.004404, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 47B1D803 >[2017/02/13 08:48:52.004424, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02d0760 >[2017/02/13 08:48:52.004577, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 47B1D803 >[2017/02/13 08:48:52.004588, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_session_global.tdb >[2017/02/13 08:48:52.004595, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:48:52.004606, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:477(make_auth_context_subsystem) > Making default auth method list for server role = 'domain member' >[2017/02/13 08:48:52.004616, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:378(load_auth_module) > load_auth_module: Attempting to find an auth method to match guest >[2017/02/13 08:48:52.004624, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:403(load_auth_module) > load_auth_module: auth method guest has a valid init >[2017/02/13 08:48:52.004630, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:378(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam >[2017/02/13 08:48:52.004637, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:403(load_auth_module) > load_auth_module: auth method sam has a valid init >[2017/02/13 08:48:52.004643, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:378(load_auth_module) > load_auth_module: Attempting to find an auth method to match winbind:ntdomain >[2017/02/13 08:48:52.004650, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:378(load_auth_module) > load_auth_module: Attempting to find an auth method to match ntdomain >[2017/02/13 08:48:52.004656, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:403(load_auth_module) > load_auth_module: auth method ntdomain has a valid init >[2017/02/13 08:48:52.004662, 5, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:403(load_auth_module) > load_auth_module: auth method winbind has a valid init >[2017/02/13 08:48:52.004698, 5, pid=31911, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:672(gensec_start_mech) > Starting GENSEC mechanism spnego >[2017/02/13 08:48:52.004711, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.004717, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.004771, 5, pid=31911, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:672(gensec_start_mech) > Starting GENSEC submechanism gse_krb5 >[2017/02/13 08:48:52.039331, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/util.c:1884(name_to_fqdn) > name_to_fqdn: lookup for LENO -> leno.vk.guepin.com. >[2017/02/13 08:48:52.040207, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.040222, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.040344, 3, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/user_krb5.c:51(get_user_from_kerberos_info) > Kerberos ticket principal name is [toon@VONDERKAMP.VK.GUEPIN.COM] >[2017/02/13 08:48:52.040357, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/user_krb5.c:83(get_user_from_kerberos_info) > Domain is [VONDERKAMP] (using PAC) >[2017/02/13 08:48:52.040373, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/user_util.c:362(map_username) > Scanning username map /etc/samba/user.map >[2017/02/13 08:48:52.040387, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/user_util.c:196(user_in_list) > user_in_list: checking user VONDERKAMP\toon in list >[2017/02/13 08:48:52.040394, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/user_util.c:201(user_in_list) > user_in_list: checking user |VONDERKAMP\toon| against |VONDERKAMP\Administrator| >[2017/02/13 08:48:52.040403, 8, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/user_util.c:435(map_username) > The user 'VONDERKAMP\toon' has no mapping. Skip it next time. >[2017/02/13 08:48:52.040413, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user VONDERKAMP\toon >[2017/02/13 08:48:52.040420, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is vonderkamp\toon >[2017/02/13 08:48:52.071756, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:128(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as given is VONDERKAMP\toon >[2017/02/13 08:48:52.102336, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:141(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as uppercase is VONDERKAMP\TOON >[2017/02/13 08:48:52.207844, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:153(Get_Pwnam_internals) > Checking combinations of 0 uppercase letters in vonderkamp\toon >[2017/02/13 08:48:52.207866, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals didn't find user [VONDERKAMP\toon]! >[2017/02/13 08:48:52.207875, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user toon >[2017/02/13 08:48:52.207881, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is toon >[2017/02/13 08:48:52.207935, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [toon]! >[2017/02/13 08:48:52.208010, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/libsmb/samlogon_cache.c:148(netsamlogon_cache_store) > netsamlogon_cache_store: SID [S-1-5-21-2784292050-724950362-990980605-1001] >[2017/02/13 08:48:52.208019, 1, pid=31911, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:402(ndr_print_debug) > &r: struct netsamlogoncache_entry > timestamp : Mon Feb 13 08:48:52 AM 2017 CET > info3: struct netr_SamInfo3 > base: struct netr_SamBaseInfo > logon_time : NTTIME(0) > logoff_time : Thu Sep 14 04:48:05 AM 30828 CEST > kickoff_time : Wed Sep 14 02:00:00 AM 2050 CEST > last_password_change : Sat Sep 3 03:30:47 PM 2016 CEST > allow_password_change : Sun Sep 4 03:30:47 PM 2016 CEST > force_password_change : Thu May 30 03:30:47 PM 2019 CEST > account_name: struct lsa_String > length : 0x0008 (8) > size : 0x0008 (8) > string : * > string : 'toon' > full_name: struct lsa_String > length : 0x0016 (22) > size : 0x0016 (22) > string : * > string : 'Tony Guepin' > logon_script: struct lsa_String > length : 0x0000 (0) > size : 0x0000 (0) > string : * > string : '' > profile_path: struct lsa_String > length : 0x0000 (0) > size : 0x0000 (0) > string : * > string : '' > home_directory: struct lsa_String > length : 0x0018 (24) > size : 0x0018 (24) > string : * > string : '\\cheap\toon' > home_drive: struct lsa_String > length : 0x0004 (4) > size : 0x0004 (4) > string : * > string : 'H:' > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > rid : 0x000003e9 (1001) > primary_gid : 0x00000201 (513) > groups: struct samr_RidWithAttributeArray > count : 0x00000006 (6) > rids : * > rids: ARRAY(6) > rids: struct samr_RidWithAttribute > rid : 0x00000224 (548) > attributes : 0x00000007 (7) > 1: SE_GROUP_MANDATORY > 1: SE_GROUP_ENABLED_BY_DEFAULT > 1: SE_GROUP_ENABLED > 0: SE_GROUP_OWNER > 0: SE_GROUP_USE_FOR_DENY_ONLY > 0: SE_GROUP_RESOURCE > 0x00: SE_GROUP_LOGON_ID (0) > rids: struct samr_RidWithAttribute > rid : 0x000013f2 (5106) > attributes : 0x00000007 (7) > 1: SE_GROUP_MANDATORY > 1: SE_GROUP_ENABLED_BY_DEFAULT > 1: SE_GROUP_ENABLED > 0: SE_GROUP_OWNER > 0: SE_GROUP_USE_FOR_DENY_ONLY > 0: SE_GROUP_RESOURCE > 0x00: SE_GROUP_LOGON_ID (0) > rids: struct samr_RidWithAttribute > rid : 0x00000bb9 (3001) > attributes : 0x00000007 (7) > 1: SE_GROUP_MANDATORY > 1: SE_GROUP_ENABLED_BY_DEFAULT > 1: SE_GROUP_ENABLED > 0: SE_GROUP_OWNER > 0: SE_GROUP_USE_FOR_DENY_ONLY > 0: SE_GROUP_RESOURCE > 0x00: SE_GROUP_LOGON_ID (0) > rids: struct samr_RidWithAttribute > rid : 0x00000223 (547) > attributes : 0x00000007 (7) > 1: SE_GROUP_MANDATORY > 1: SE_GROUP_ENABLED_BY_DEFAULT > 1: SE_GROUP_ENABLED > 0: SE_GROUP_OWNER > 0: SE_GROUP_USE_FOR_DENY_ONLY > 0: SE_GROUP_RESOURCE > 0x00: SE_GROUP_LOGON_ID (0) > rids: struct samr_RidWithAttribute > rid : 0x00000200 (512) > attributes : 0x00000007 (7) > 1: SE_GROUP_MANDATORY > 1: SE_GROUP_ENABLED_BY_DEFAULT > 1: SE_GROUP_ENABLED > 0: SE_GROUP_OWNER > 0: SE_GROUP_USE_FOR_DENY_ONLY > 0: SE_GROUP_RESOURCE > 0x00: SE_GROUP_LOGON_ID (0) > rids: struct samr_RidWithAttribute > rid : 0x0000023c (572) > attributes : 0x00000007 (7) > 1: SE_GROUP_MANDATORY > 1: SE_GROUP_ENABLED_BY_DEFAULT > 1: SE_GROUP_ENABLED > 0: SE_GROUP_OWNER > 0: SE_GROUP_USE_FOR_DENY_ONLY > 0: SE_GROUP_RESOURCE > 0x00: SE_GROUP_LOGON_ID (0) > user_flags : 0x00000000 (0) > 0: NETLOGON_GUEST > 0: NETLOGON_NOENCRYPTION > 0: NETLOGON_CACHED_ACCOUNT > 0: NETLOGON_USED_LM_PASSWORD > 0: NETLOGON_EXTRA_SIDS > 0: NETLOGON_SUBAUTH_SESSION_KEY > 0: NETLOGON_SERVER_TRUST_ACCOUNT > 0: NETLOGON_NTLMV2_ENABLED > 0: NETLOGON_RESOURCE_GROUPS > 0: NETLOGON_PROFILE_PATH_RETURNED > 0: NETLOGON_GRACE_LOGON > key: struct netr_UserSessionKey > key : 00000000000000000000000000000000 > logon_server: struct lsa_StringLarge > length : 0x000a (10) > size : 0x000c (12) > string : * > string : 'VKDC1' > logon_domain: struct lsa_StringLarge > length : 0x0014 (20) > size : 0x0016 (22) > string : * > string : 'VONDERKAMP' > domain_sid : * > domain_sid : S-1-5-21-2784292050-724950362-990980605 > LMSessKey: struct netr_LMSessionKey > key : 0000000000000000 > acct_flags : 0x00000010 (16) > 0: ACB_DISABLED > 0: ACB_HOMDIRREQ > 0: ACB_PWNOTREQ > 0: ACB_TEMPDUP > 1: ACB_NORMAL > 0: ACB_MNS > 0: ACB_DOMTRUST > 0: ACB_WSTRUST > 0: ACB_SVRTRUST > 0: ACB_PWNOEXP > 0: ACB_AUTOLOCK > 0: ACB_ENC_TXT_PWD_ALLOWED > 0: ACB_SMARTCARD_REQUIRED > 0: ACB_TRUSTED_FOR_DELEGATION > 0: ACB_NOT_DELEGATED > 0: ACB_USE_DES_KEY_ONLY > 0: ACB_DONT_REQUIRE_PREAUTH > 0: ACB_PW_EXPIRED > 0: ACB_TRUSTED_TO_AUTHENTICATE_FOR_DELEGATION > 0: ACB_NO_AUTH_DATA_REQD > 0: ACB_PARTIAL_SECRETS_ACCOUNT > 0: ACB_USE_AES_KEYS > sub_auth_status : 0x00000000 (0) > last_successful_logon : NTTIME(0) > last_failed_logon : NTTIME(0) > failed_logon_count : 0x00000000 (0) > reserved : 0x00000000 (0) > sidcount : 0x00000000 (0) > sids : NULL >[2017/02/13 08:48:52.208556, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:3650(lp_load_ex) > lp_load_ex: refreshing parameters >[2017/02/13 08:48:52.208566, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:1215(free_param_opts) > Freeing parametrics: >[2017/02/13 08:48:52.208607, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:530(init_globals) > Initialising global parameters >[2017/02/13 08:48:52.208675, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2593(lp_do_section) > Processing section "[global]" > doing parameter security = ADS > doing parameter workgroup = VONDERKAMP > doing parameter realm = VONDERKAMP.VK.GUEPIN.COM > doing parameter netbios name = LENO > doing parameter log file = /var/log/samba/%m.log > doing parameter log level = 10 >[2017/02/13 08:48:52.208710, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/util/debug.c:334(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > doing parameter idmap config *:backend = tdb > doing parameter idmap config *:range = 100-999 > doing parameter idmap config VONDERKAMP:backend = ad > doing parameter idmap config VONDERKAMP:schema_mode = rfc2307 > doing parameter idmap config VONDERKAMP:range = 1000-99999 > doing parameter username map = /etc/samba/user.map > doing parameter kerberos method = secrets and keytab > doing parameter winbind nss info = rfc2307 >[2017/02/13 08:48:52.208885, 2, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2610(lp_do_section) > Processing section "[homes]" > doing parameter browseable = yes > doing parameter comment = Home Directories > doing parameter valid users = %S > doing parameter writable = yes > doing parameter create mode = 0644 > doing parameter directory mode = 0755 >[2017/02/13 08:48:52.208941, 2, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2610(lp_do_section) > Processing section "[printers]" > doing parameter comment = All Printers > doing parameter browseable = no > doing parameter path = /var/spool/samba > doing parameter printable = yes > doing parameter public = no > doing parameter writable = no > doing parameter create mode = 0700 >[2017/02/13 08:48:52.208987, 2, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2610(lp_do_section) > Processing section "[print$]" > doing parameter comment = Printer Drivers > doing parameter path = /var/lib/samba/printers > doing parameter browseable = yes > doing parameter read only = yes > doing parameter guest ok = no >[2017/02/13 08:48:52.209028, 2, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2610(lp_do_section) > Processing section "[root]" > doing parameter valid users = toon,floris,maura,monique > doing parameter path = / >[2017/02/13 08:48:52.209046, 2, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2610(lp_do_section) > Processing section "[svn]" > doing parameter writeable = yes > doing parameter valid users = stelendegijsel,toon,@guepin > doing parameter write list = guepin > doing parameter path = /home/toon/svn > doing parameter force group = guepin > doing parameter force user = toon >[2017/02/13 08:48:52.209088, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:3691(lp_load_ex) > pm_process() returned Yes >[2017/02/13 08:48:52.209102, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:1490(lp_add_ipc) > adding IPC service >[2017/02/13 08:48:52.209129, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user VONDERKAMP\toon >[2017/02/13 08:48:52.209136, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is vonderkamp\toon >[2017/02/13 08:48:52.209214, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:128(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as given is VONDERKAMP\toon >[2017/02/13 08:48:52.209277, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:141(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as uppercase is VONDERKAMP\TOON >[2017/02/13 08:48:52.209335, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:153(Get_Pwnam_internals) > Checking combinations of 0 uppercase letters in vonderkamp\toon >[2017/02/13 08:48:52.209346, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals didn't find user [VONDERKAMP\toon]! >[2017/02/13 08:48:52.209352, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user toon >[2017/02/13 08:48:52.209358, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is toon >[2017/02/13 08:48:52.209365, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [toon]! >[2017/02/13 08:48:52.209644, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:224(create_local_nt_token_from_info3) > Create local NT token for toon >[2017/02/13 08:48:52.209683, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:56(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-1001]: value=[1001:U] >[2017/02/13 08:48:52.209691, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-1001]: id=[1001], endptr=[:U] >[2017/02/13 08:48:52.209699, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1454(sid_to_uid) > sid S-1-5-21-2784292050-724950362-990980605-1001 -> uid 1001 >[2017/02/13 08:48:52.209745, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/system_smbd.c:176(sys_getgrouplist) > sys_getgrouplist: user [toon] >[2017/02/13 08:48:52.209967, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1286(gid_to_sid) > gid 1000 -> sid S-1-5-21-2784292050-724950362-990980605-3001 >[2017/02/13 08:48:52.210151, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1278(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 24 >[2017/02/13 08:48:52.210166, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.210173, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.210207, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.210217, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.210235, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1141(legacy_gid_to_sid) > LEGACY: gid 24 -> sid S-1-22-2-24 >[2017/02/13 08:48:52.210354, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1278(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 25 >[2017/02/13 08:48:52.210366, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.210372, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.210386, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.210396, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.210412, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1141(legacy_gid_to_sid) > LEGACY: gid 25 -> sid S-1-22-2-25 >[2017/02/13 08:48:52.210523, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1278(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 29 >[2017/02/13 08:48:52.210535, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.210541, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.210555, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.210564, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.210581, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1141(legacy_gid_to_sid) > LEGACY: gid 29 -> sid S-1-22-2-29 >[2017/02/13 08:48:52.210705, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1278(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 30 >[2017/02/13 08:48:52.210718, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.210724, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.210739, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.210748, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.210764, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1141(legacy_gid_to_sid) > LEGACY: gid 30 -> sid S-1-22-2-30 >[2017/02/13 08:48:52.210931, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1278(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 33 >[2017/02/13 08:48:52.210944, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.210953, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.210975, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.210988, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.211007, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1141(legacy_gid_to_sid) > LEGACY: gid 33 -> sid S-1-22-2-33 >[2017/02/13 08:48:52.211173, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1278(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 44 >[2017/02/13 08:48:52.211186, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.211195, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.211213, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.211225, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.211244, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1141(legacy_gid_to_sid) > LEGACY: gid 44 -> sid S-1-22-2-44 >[2017/02/13 08:48:52.211411, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1278(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 46 >[2017/02/13 08:48:52.211424, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.211433, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.211451, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.211463, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.211483, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1141(legacy_gid_to_sid) > LEGACY: gid 46 -> sid S-1-22-2-46 >[2017/02/13 08:48:52.211607, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1278(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 108 >[2017/02/13 08:48:52.211618, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.211624, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.211638, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.211648, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.211663, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1141(legacy_gid_to_sid) > LEGACY: gid 108 -> sid S-1-22-2-108 >[2017/02/13 08:48:52.211777, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1278(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 111 >[2017/02/13 08:48:52.211788, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.211795, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.211808, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.211822, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.211838, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1141(legacy_gid_to_sid) > LEGACY: gid 111 -> sid S-1-22-2-111 >[2017/02/13 08:48:52.211951, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1278(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 116 >[2017/02/13 08:48:52.211965, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.211975, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.211995, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.212011, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.212038, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1141(legacy_gid_to_sid) > LEGACY: gid 116 -> sid S-1-22-2-116 >[2017/02/13 08:48:52.212062, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1286(gid_to_sid) > gid 1004 -> sid S-1-5-21-2784292050-724950362-990980605-7112 >[2017/02/13 08:48:52.212083, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1286(gid_to_sid) > gid 1002 -> sid S-1-5-21-2784292050-724950362-990980605-7113 >[2017/02/13 08:48:52.212104, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1286(gid_to_sid) > gid 1003 -> sid S-1-5-21-2784292050-724950362-990980605-7111 >[2017/02/13 08:48:52.212137, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.212150, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.212349, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2784292050-724950362-990980605-1001] >[2017/02/13 08:48:52.212368, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2784292050-724950362-990980605-513] >[2017/02/13 08:48:52.212382, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2784292050-724950362-990980605-548] >[2017/02/13 08:48:52.212397, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2784292050-724950362-990980605-5106] >[2017/02/13 08:48:52.212411, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2784292050-724950362-990980605-3001] >[2017/02/13 08:48:52.212426, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2784292050-724950362-990980605-547] >[2017/02/13 08:48:52.212440, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2784292050-724950362-990980605-512] >[2017/02/13 08:48:52.212455, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2784292050-724950362-990980605-572] >[2017/02/13 08:48:52.212470, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-24] >[2017/02/13 08:48:52.212492, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-25] >[2017/02/13 08:48:52.212507, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-29] >[2017/02/13 08:48:52.212523, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-30] >[2017/02/13 08:48:52.212538, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-33] >[2017/02/13 08:48:52.212552, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-44] >[2017/02/13 08:48:52.212566, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-46] >[2017/02/13 08:48:52.212580, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-108] >[2017/02/13 08:48:52.212595, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-111] >[2017/02/13 08:48:52.212612, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-116] >[2017/02/13 08:48:52.212628, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2784292050-724950362-990980605-7112] >[2017/02/13 08:48:52.212644, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2784292050-724950362-990980605-7113] >[2017/02/13 08:48:52.212660, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2784292050-724950362-990980605-7111] >[2017/02/13 08:48:52.212676, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:176(get_privileges_for_sids) > get_privileges_for_sids: sid = S-1-1-0 > Privilege set: 0x0 >[2017/02/13 08:48:52.212694, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-2] >[2017/02/13 08:48:52.212709, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-11] >[2017/02/13 08:48:52.212723, 4, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-32-545] >[2017/02/13 08:48:52.212738, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:176(get_privileges_for_sids) > get_privileges_for_sids: sid = S-1-5-32-544 > Privilege set: 0x1ffffff0 >[2017/02/13 08:48:52.212776, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:56(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-1001]: value=[1001:U] >[2017/02/13 08:48:52.212789, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-1001]: id=[1001], endptr=[:U] >[2017/02/13 08:48:52.212810, 10, pid=31911, effective(0, 0), real(0, 0), class=tdb] ../source3/lib/gencache.c:313(gencache_set_data_blob) > Adding cache entry with key=[IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-513] and timeout=[Thu Jan 1 01:00:00 AM 1970 CET] (-1486972132 seconds in the past) >[2017/02/13 08:48:52.212858, 10, pid=31911, effective(0, 0), real(0, 0), class=tdb] ../source3/lib/gencache.c:313(gencache_set_data_blob) > Adding cache entry with key=[IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-548] and timeout=[Thu Jan 1 01:00:00 AM 1970 CET] (-1486972132 seconds in the past) >[2017/02/13 08:48:52.212894, 10, pid=31911, effective(0, 0), real(0, 0), class=tdb] ../source3/lib/gencache.c:313(gencache_set_data_blob) > Adding cache entry with key=[IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-5106] and timeout=[Thu Jan 1 01:00:00 AM 1970 CET] (-1486972132 seconds in the past) >[2017/02/13 08:48:52.212925, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:56(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-3001]: value=[1000:G] >[2017/02/13 08:48:52.212937, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-3001]: id=[1000], endptr=[:G] >[2017/02/13 08:48:52.212959, 10, pid=31911, effective(0, 0), real(0, 0), class=tdb] ../source3/lib/gencache.c:313(gencache_set_data_blob) > Adding cache entry with key=[IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-547] and timeout=[Thu Jan 1 01:00:00 AM 1970 CET] (-1486972132 seconds in the past) >[2017/02/13 08:48:52.212993, 10, pid=31911, effective(0, 0), real(0, 0), class=tdb] ../source3/lib/gencache.c:313(gencache_set_data_blob) > Adding cache entry with key=[IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-512] and timeout=[Thu Jan 1 01:00:00 AM 1970 CET] (-1486972132 seconds in the past) >[2017/02/13 08:48:52.213028, 10, pid=31911, effective(0, 0), real(0, 0), class=tdb] ../source3/lib/gencache.c:313(gencache_set_data_blob) > Adding cache entry with key=[IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-572] and timeout=[Thu Jan 1 01:00:00 AM 1970 CET] (-1486972132 seconds in the past) >[2017/02/13 08:48:52.213062, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:56(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-7112]: value=[1004:G] >[2017/02/13 08:48:52.213075, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-7112]: id=[1004], endptr=[:G] >[2017/02/13 08:48:52.213094, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:56(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-7113]: value=[1002:G] >[2017/02/13 08:48:52.213107, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-7113]: id=[1002], endptr=[:G] >[2017/02/13 08:48:52.213126, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:56(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-7111]: value=[1003:G] >[2017/02/13 08:48:52.213138, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2784292050-724950362-990980605-7111]: id=[1003], endptr=[:G] >[2017/02/13 08:48:52.213157, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:56(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-1-0]: value=[102:G] >[2017/02/13 08:48:52.213168, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-1-0]: id=[102], endptr=[:G] >[2017/02/13 08:48:52.213187, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:56(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-2]: value=[103:G] >[2017/02/13 08:48:52.213198, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-2]: id=[103], endptr=[:G] >[2017/02/13 08:48:52.213222, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:56(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[104:G] >[2017/02/13 08:48:52.213234, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[104], endptr=[:G] >[2017/02/13 08:48:52.213254, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:56(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-32-545]: value=[101:G] >[2017/02/13 08:48:52.213266, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-32-545]: id=[101], endptr=[:G] >[2017/02/13 08:48:52.213284, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:56(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[100:G] >[2017/02/13 08:48:52.213296, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[100], endptr=[:G] >[2017/02/13 08:48:52.294959, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.294984, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.295012, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1160(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2784292050-724950362-990980605-513 >[2017/02/13 08:48:52.295024, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.295030, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.295041, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1160(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2784292050-724950362-990980605-513 >[2017/02/13 08:48:52.295049, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.295054, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.295064, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1160(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2784292050-724950362-990980605-548 >[2017/02/13 08:48:52.295072, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.295078, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.295088, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1160(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2784292050-724950362-990980605-548 >[2017/02/13 08:48:52.295095, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.295101, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.295110, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1160(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2784292050-724950362-990980605-5106 >[2017/02/13 08:48:52.295125, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.295131, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.295141, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1160(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2784292050-724950362-990980605-5106 >[2017/02/13 08:48:52.295149, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.295154, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.295165, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1160(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2784292050-724950362-990980605-547 >[2017/02/13 08:48:52.295172, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.295178, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.295188, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1160(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2784292050-724950362-990980605-547 >[2017/02/13 08:48:52.295195, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.295201, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.295211, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1160(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2784292050-724950362-990980605-512 >[2017/02/13 08:48:52.295218, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.295224, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.295234, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1160(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2784292050-724950362-990980605-512 >[2017/02/13 08:48:52.295241, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.295247, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.295257, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1160(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2784292050-724950362-990980605-572 >[2017/02/13 08:48:52.295265, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.295270, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.295280, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1160(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2784292050-724950362-990980605-572 >[2017/02/13 08:48:52.295291, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:609(create_local_token) > Could not convert SID S-1-5-21-2784292050-724950362-990980605-513 to gid, ignoring it >[2017/02/13 08:48:52.295299, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:609(create_local_token) > Could not convert SID S-1-5-21-2784292050-724950362-990980605-548 to gid, ignoring it >[2017/02/13 08:48:52.295306, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:609(create_local_token) > Could not convert SID S-1-5-21-2784292050-724950362-990980605-5106 to gid, ignoring it >[2017/02/13 08:48:52.295314, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:609(create_local_token) > Could not convert SID S-1-5-21-2784292050-724950362-990980605-547 to gid, ignoring it >[2017/02/13 08:48:52.295321, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:609(create_local_token) > Could not convert SID S-1-5-21-2784292050-724950362-990980605-512 to gid, ignoring it >[2017/02/13 08:48:52.295327, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:609(create_local_token) > Could not convert SID S-1-5-21-2784292050-724950362-990980605-572 to gid, ignoring it >[2017/02/13 08:48:52.295343, 10, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (36): > SID[ 0]: S-1-5-21-2784292050-724950362-990980605-1001 > SID[ 1]: S-1-5-21-2784292050-724950362-990980605-513 > SID[ 2]: S-1-5-21-2784292050-724950362-990980605-548 > SID[ 3]: S-1-5-21-2784292050-724950362-990980605-5106 > SID[ 4]: S-1-5-21-2784292050-724950362-990980605-3001 > SID[ 5]: S-1-5-21-2784292050-724950362-990980605-547 > SID[ 6]: S-1-5-21-2784292050-724950362-990980605-512 > SID[ 7]: S-1-5-21-2784292050-724950362-990980605-572 > SID[ 8]: S-1-22-2-24 > SID[ 9]: S-1-22-2-25 > SID[ 10]: S-1-22-2-29 > SID[ 11]: S-1-22-2-30 > SID[ 12]: S-1-22-2-33 > SID[ 13]: S-1-22-2-44 > SID[ 14]: S-1-22-2-46 > SID[ 15]: S-1-22-2-108 > SID[ 16]: S-1-22-2-111 > SID[ 17]: S-1-22-2-116 > SID[ 18]: S-1-5-21-2784292050-724950362-990980605-7112 > SID[ 19]: S-1-5-21-2784292050-724950362-990980605-7113 > SID[ 20]: S-1-5-21-2784292050-724950362-990980605-7111 > SID[ 21]: S-1-1-0 > SID[ 22]: S-1-5-2 > SID[ 23]: S-1-5-11 > SID[ 24]: S-1-5-32-545 > SID[ 25]: S-1-5-32-544 > SID[ 26]: S-1-22-1-1001 > SID[ 27]: S-1-22-2-1000 > SID[ 28]: S-1-22-2-1004 > SID[ 29]: S-1-22-2-1002 > SID[ 30]: S-1-22-2-1003 > SID[ 31]: S-1-22-2-102 > SID[ 32]: S-1-22-2-103 > SID[ 33]: S-1-22-2-104 > SID[ 34]: S-1-22-2-101 > SID[ 35]: S-1-22-2-100 > Privileges (0x 1FFFFFF0): > Privilege[ 0]: SeMachineAccountPrivilege > Privilege[ 1]: SeTakeOwnershipPrivilege > Privilege[ 2]: SeBackupPrivilege > Privilege[ 3]: SeRestorePrivilege > Privilege[ 4]: SeRemoteShutdownPrivilege > Privilege[ 5]: SePrintOperatorPrivilege > Privilege[ 6]: SeAddUsersPrivilege > Privilege[ 7]: SeDiskOperatorPrivilege > Privilege[ 8]: SeSecurityPrivilege > Privilege[ 9]: SeSystemtimePrivilege > Privilege[ 10]: SeShutdownPrivilege > Privilege[ 11]: SeDebugPrivilege > Privilege[ 12]: SeSystemEnvironmentPrivilege > Privilege[ 13]: SeSystemProfilePrivilege > Privilege[ 14]: SeProfileSingleProcessPrivilege > Privilege[ 15]: SeIncreaseBasePriorityPrivilege > Privilege[ 16]: SeLoadDriverPrivilege > Privilege[ 17]: SeCreatePagefilePrivilege > Privilege[ 18]: SeIncreaseQuotaPrivilege > Privilege[ 19]: SeChangeNotifyPrivilege > Privilege[ 20]: SeUndockPrivilege > Privilege[ 21]: SeManageVolumePrivilege > Privilege[ 22]: SeImpersonatePrivilege > Privilege[ 23]: SeCreateGlobalPrivilege > Privilege[ 24]: SeEnableDelegationPrivilege > Rights (0x 0): >[2017/02/13 08:48:52.295480, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 1001 > Primary group is 1000 and contains 19 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 24 > Group[ 2]: 25 > Group[ 3]: 29 > Group[ 4]: 30 > Group[ 5]: 33 > Group[ 6]: 44 > Group[ 7]: 46 > Group[ 8]: 108 > Group[ 9]: 111 > Group[ 10]: 116 > Group[ 11]: 1004 > Group[ 12]: 1002 > Group[ 13]: 1003 > Group[ 14]: 102 > Group[ 15]: 103 > Group[ 16]: 104 > Group[ 17]: 101 > Group[ 18]: 100 >[2017/02/13 08:48:52.295521, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/auth_generic.c:133(auth3_generate_session_info_pac) > ../source3/auth/auth_generic.c:133OK: user: toon domain: VONDERKAMP client: 192.168.180.30 >[2017/02/13 08:48:52.295581, 7, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:3998(lp_servicenumber) > lp_servicenumber: couldn't find toon >[2017/02/13 08:48:52.295591, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user toon >[2017/02/13 08:48:52.295597, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is toon >[2017/02/13 08:48:52.295605, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [toon]! >[2017/02/13 08:48:52.295634, 8, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:1332(add_a_service) > add_a_service: Creating snum = 6 for toon >[2017/02/13 08:48:52.295642, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:1382(hash_a_service) > hash_a_service: hashing index 6 for service name toon >[2017/02/13 08:48:52.295651, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:1440(lp_add_home) > adding home's share [toon] for user 'toon' at '/home/toon' >[2017/02/13 08:48:52.295677, 6, pid=31911, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2148(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 13 08:21:56 2017 > >[2017/02/13 08:48:52.295698, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_session_global.tdb >[2017/02/13 08:48:52.295705, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> >[2017/02/13 08:48:52.295713, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 47B1D803 >[2017/02/13 08:48:52.295724, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02e45c0 >[2017/02/13 08:48:52.295770, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 47B1D803 >[2017/02/13 08:48:52.295780, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_session_global.tdb >[2017/02/13 08:48:52.295787, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:48:52.295806, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/smb/smb2_signing.c:92(smb2_signing_sign_pdu) > signed SMB2 message >[2017/02/13 08:48:52.298627, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.298649, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.298703, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:52.298721, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:48:52.298731, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key BE41AB14 >[2017/02/13 08:48:52.298744, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02e2b00 >[2017/02/13 08:48:52.298795, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key BE41AB14 >[2017/02/13 08:48:52.298806, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:52.298812, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:48:52.298825, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/access.c:338(allow_access) > Allowed connection from 192.168.180.30 (192.168.180.30) >[2017/02/13 08:48:52.298882, 10, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/access_check.c:337(se_file_access_check) > se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >[2017/02/13 08:48:52.298916, 10, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/access_check.c:337(se_file_access_check) > se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >[2017/02/13 08:48:52.298946, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (36): > SID[ 0]: S-1-5-21-2784292050-724950362-990980605-1001 > SID[ 1]: S-1-5-21-2784292050-724950362-990980605-513 > SID[ 2]: S-1-5-21-2784292050-724950362-990980605-548 > SID[ 3]: S-1-5-21-2784292050-724950362-990980605-5106 > SID[ 4]: S-1-5-21-2784292050-724950362-990980605-3001 > SID[ 5]: S-1-5-21-2784292050-724950362-990980605-547 > SID[ 6]: S-1-5-21-2784292050-724950362-990980605-512 > SID[ 7]: S-1-5-21-2784292050-724950362-990980605-572 > SID[ 8]: S-1-22-2-24 > SID[ 9]: S-1-22-2-25 > SID[ 10]: S-1-22-2-29 > SID[ 11]: S-1-22-2-30 > SID[ 12]: S-1-22-2-33 > SID[ 13]: S-1-22-2-44 > SID[ 14]: S-1-22-2-46 > SID[ 15]: S-1-22-2-108 > SID[ 16]: S-1-22-2-111 > SID[ 17]: S-1-22-2-116 > SID[ 18]: S-1-5-21-2784292050-724950362-990980605-7112 > SID[ 19]: S-1-5-21-2784292050-724950362-990980605-7113 > SID[ 20]: S-1-5-21-2784292050-724950362-990980605-7111 > SID[ 21]: S-1-1-0 > SID[ 22]: S-1-5-2 > SID[ 23]: S-1-5-11 > SID[ 24]: S-1-5-32-545 > SID[ 25]: S-1-5-32-544 > SID[ 26]: S-1-22-1-1001 > SID[ 27]: S-1-22-2-1000 > SID[ 28]: S-1-22-2-1004 > SID[ 29]: S-1-22-2-1002 > SID[ 30]: S-1-22-2-1003 > SID[ 31]: S-1-22-2-102 > SID[ 32]: S-1-22-2-103 > SID[ 33]: S-1-22-2-104 > SID[ 34]: S-1-22-2-101 > SID[ 35]: S-1-22-2-100 > Privileges (0x 1FFFFFF0): > Privilege[ 0]: SeMachineAccountPrivilege > Privilege[ 1]: SeTakeOwnershipPrivilege > Privilege[ 2]: SeBackupPrivilege > Privilege[ 3]: SeRestorePrivilege > Privilege[ 4]: SeRemoteShutdownPrivilege > Privilege[ 5]: SePrintOperatorPrivilege > Privilege[ 6]: SeAddUsersPrivilege > Privilege[ 7]: SeDiskOperatorPrivilege > Privilege[ 8]: SeSecurityPrivilege > Privilege[ 9]: SeSystemtimePrivilege > Privilege[ 10]: SeShutdownPrivilege > Privilege[ 11]: SeDebugPrivilege > Privilege[ 12]: SeSystemEnvironmentPrivilege > Privilege[ 13]: SeSystemProfilePrivilege > Privilege[ 14]: SeProfileSingleProcessPrivilege > Privilege[ 15]: SeIncreaseBasePriorityPrivilege > Privilege[ 16]: SeLoadDriverPrivilege > Privilege[ 17]: SeCreatePagefilePrivilege > Privilege[ 18]: SeIncreaseQuotaPrivilege > Privilege[ 19]: SeChangeNotifyPrivilege > Privilege[ 20]: SeUndockPrivilege > Privilege[ 21]: SeManageVolumePrivilege > Privilege[ 22]: SeImpersonatePrivilege > Privilege[ 23]: SeCreateGlobalPrivilege > Privilege[ 24]: SeEnableDelegationPrivilege > Rights (0x 0): >[2017/02/13 08:48:52.299084, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 1001 > Primary group is 1000 and contains 19 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 24 > Group[ 2]: 25 > Group[ 3]: 29 > Group[ 4]: 30 > Group[ 5]: 33 > Group[ 6]: 44 > Group[ 7]: 46 > Group[ 8]: 108 > Group[ 9]: 111 > Group[ 10]: 116 > Group[ 11]: 1004 > Group[ 12]: 1002 > Group[ 13]: 1003 > Group[ 14]: 102 > Group[ 15]: 103 > Group[ 16]: 104 > Group[ 17]: 101 > Group[ 18]: 100 >[2017/02/13 08:48:52.299129, 5, pid=31911, effective(1001, 1000), real(1001, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.299137, 5, pid=31911, effective(1001, 1000), real(1001, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.299167, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:52.299175, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:48:52.299182, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key BE41AB14 >[2017/02/13 08:48:52.299191, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02c3ee0 >[2017/02/13 08:48:52.299202, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key BE41AB14 >[2017/02/13 08:48:52.299210, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:52.299216, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:48:52.302297, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (36): > SID[ 0]: S-1-5-21-2784292050-724950362-990980605-1001 > SID[ 1]: S-1-5-21-2784292050-724950362-990980605-513 > SID[ 2]: S-1-5-21-2784292050-724950362-990980605-548 > SID[ 3]: S-1-5-21-2784292050-724950362-990980605-5106 > SID[ 4]: S-1-5-21-2784292050-724950362-990980605-3001 > SID[ 5]: S-1-5-21-2784292050-724950362-990980605-547 > SID[ 6]: S-1-5-21-2784292050-724950362-990980605-512 > SID[ 7]: S-1-5-21-2784292050-724950362-990980605-572 > SID[ 8]: S-1-22-2-24 > SID[ 9]: S-1-22-2-25 > SID[ 10]: S-1-22-2-29 > SID[ 11]: S-1-22-2-30 > SID[ 12]: S-1-22-2-33 > SID[ 13]: S-1-22-2-44 > SID[ 14]: S-1-22-2-46 > SID[ 15]: S-1-22-2-108 > SID[ 16]: S-1-22-2-111 > SID[ 17]: S-1-22-2-116 > SID[ 18]: S-1-5-21-2784292050-724950362-990980605-7112 > SID[ 19]: S-1-5-21-2784292050-724950362-990980605-7113 > SID[ 20]: S-1-5-21-2784292050-724950362-990980605-7111 > SID[ 21]: S-1-1-0 > SID[ 22]: S-1-5-2 > SID[ 23]: S-1-5-11 > SID[ 24]: S-1-5-32-545 > SID[ 25]: S-1-5-32-544 > SID[ 26]: S-1-22-1-1001 > SID[ 27]: S-1-22-2-1000 > SID[ 28]: S-1-22-2-1004 > SID[ 29]: S-1-22-2-1002 > SID[ 30]: S-1-22-2-1003 > SID[ 31]: S-1-22-2-102 > SID[ 32]: S-1-22-2-103 > SID[ 33]: S-1-22-2-104 > SID[ 34]: S-1-22-2-101 > SID[ 35]: S-1-22-2-100 > Privileges (0x 1FFFFFF0): > Privilege[ 0]: SeMachineAccountPrivilege > Privilege[ 1]: SeTakeOwnershipPrivilege > Privilege[ 2]: SeBackupPrivilege > Privilege[ 3]: SeRestorePrivilege > Privilege[ 4]: SeRemoteShutdownPrivilege > Privilege[ 5]: SePrintOperatorPrivilege > Privilege[ 6]: SeAddUsersPrivilege > Privilege[ 7]: SeDiskOperatorPrivilege > Privilege[ 8]: SeSecurityPrivilege > Privilege[ 9]: SeSystemtimePrivilege > Privilege[ 10]: SeShutdownPrivilege > Privilege[ 11]: SeDebugPrivilege > Privilege[ 12]: SeSystemEnvironmentPrivilege > Privilege[ 13]: SeSystemProfilePrivilege > Privilege[ 14]: SeProfileSingleProcessPrivilege > Privilege[ 15]: SeIncreaseBasePriorityPrivilege > Privilege[ 16]: SeLoadDriverPrivilege > Privilege[ 17]: SeCreatePagefilePrivilege > Privilege[ 18]: SeIncreaseQuotaPrivilege > Privilege[ 19]: SeChangeNotifyPrivilege > Privilege[ 20]: SeUndockPrivilege > Privilege[ 21]: SeManageVolumePrivilege > Privilege[ 22]: SeImpersonatePrivilege > Privilege[ 23]: SeCreateGlobalPrivilege > Privilege[ 24]: SeEnableDelegationPrivilege > Rights (0x 0): >[2017/02/13 08:48:52.302459, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 1001 > Primary group is 1000 and contains 19 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 24 > Group[ 2]: 25 > Group[ 3]: 29 > Group[ 4]: 30 > Group[ 5]: 33 > Group[ 6]: 44 > Group[ 7]: 46 > Group[ 8]: 108 > Group[ 9]: 111 > Group[ 10]: 116 > Group[ 11]: 1004 > Group[ 12]: 1002 > Group[ 13]: 1003 > Group[ 14]: 102 > Group[ 15]: 103 > Group[ 16]: 104 > Group[ 17]: 101 > Group[ 18]: 100 >[2017/02/13 08:48:52.305045, 5, pid=31911, effective(1001, 1000), real(1001, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.305068, 5, pid=31911, effective(1001, 1000), real(1001, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.305102, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:52.305113, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:48:52.305121, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 4EF585C8 >[2017/02/13 08:48:52.305134, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02e2b00 >[2017/02/13 08:48:52.305156, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 4EF585C8 >[2017/02/13 08:48:52.305164, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:52.305171, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:48:52.305183, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/access.c:338(allow_access) > Allowed connection from 192.168.180.30 (192.168.180.30) >[2017/02/13 08:48:52.305195, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID stelendegijsel is not in a valid format >[2017/02/13 08:48:52.305207, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\stelendegijsel => domain=[LENO], name=[stelendegijsel] >[2017/02/13 08:48:52.305213, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:52.305223, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.305229, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.305249, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_stelendegijsel >[2017/02/13 08:48:52.305268, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.305275, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.305290, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.305299, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.305319, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\stelendegijsel => domain=[Unix User], name=[stelendegijsel] >[2017/02/13 08:48:52.305326, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:52.305987, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID toon is not in a valid format >[2017/02/13 08:48:52.306009, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:48:52.306019, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:52.306031, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.306040, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.306062, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:48:52.306074, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.306080, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.306094, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.306103, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.306121, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:48:52.306128, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:52.306393, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user toon >[2017/02/13 08:48:52.306406, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is toon >[2017/02/13 08:48:52.306414, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [toon]! >[2017/02/13 08:48:52.306423, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:48:52.306429, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:52.306437, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.306448, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.306462, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:48:52.306472, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.306478, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.306491, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.306500, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.306518, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:48:52.306525, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:52.306860, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1286(gid_to_sid) > gid 1000 -> sid S-1-5-21-2784292050-724950362-990980605-3001 >[2017/02/13 08:48:52.306883, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:360(SamInfo3_handle_sids) > Unix User found. Rid marked as special and sid (S-1-22-1-1001) saved as extra sid >[2017/02/13 08:48:52.306895, 1, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:396(SamInfo3_handle_sids) > The primary group domain sid(S-1-5-21-2784292050-724950362-990980605-3001) does not match the domain sid(S-1-5-21-437306792-4118923543-1308149834) for toon(S-1-22-1-1001) >[2017/02/13 08:48:52.306914, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:52.306922, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:48:52.306930, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 4EF585C8 >[2017/02/13 08:48:52.306939, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02d03f0 >[2017/02/13 08:48:52.306950, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 4EF585C8 >[2017/02/13 08:48:52.306957, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:52.306963, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:48:52.310192, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.310215, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.310249, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:52.310259, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:48:52.310273, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 55FD8483 >[2017/02/13 08:48:52.310284, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02e2440 >[2017/02/13 08:48:52.310305, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 55FD8483 >[2017/02/13 08:48:52.310313, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:52.310320, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:48:52.310331, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/access.c:338(allow_access) > Allowed connection from 192.168.180.30 (192.168.180.30) >[2017/02/13 08:48:52.310344, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID stelendegijsel is not in a valid format >[2017/02/13 08:48:52.310354, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\stelendegijsel => domain=[LENO], name=[stelendegijsel] >[2017/02/13 08:48:52.310360, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:52.310369, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.310375, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.310388, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_stelendegijsel >[2017/02/13 08:48:52.310400, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.310406, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.310420, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.310429, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.310448, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\stelendegijsel => domain=[Unix User], name=[stelendegijsel] >[2017/02/13 08:48:52.310454, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:52.310810, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID toon is not in a valid format >[2017/02/13 08:48:52.310833, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:48:52.310842, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:52.310854, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.310863, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.310879, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:48:52.310899, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.310905, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.310918, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.310928, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.310946, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:48:52.310953, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:52.311291, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user toon >[2017/02/13 08:48:52.311310, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is toon >[2017/02/13 08:48:52.311320, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [toon]! >[2017/02/13 08:48:52.311330, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:48:52.311337, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:52.311345, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.311351, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.311366, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:48:52.311377, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:52.311383, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:52.311396, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.311405, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:52.311423, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:48:52.311430, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:52.311825, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1286(gid_to_sid) > gid 1000 -> sid S-1-5-21-2784292050-724950362-990980605-3001 >[2017/02/13 08:48:52.311847, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:360(SamInfo3_handle_sids) > Unix User found. Rid marked as special and sid (S-1-22-1-1001) saved as extra sid >[2017/02/13 08:48:52.311859, 1, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:396(SamInfo3_handle_sids) > The primary group domain sid(S-1-5-21-2784292050-724950362-990980605-3001) does not match the domain sid(S-1-5-21-437306792-4118923543-1308149834) for toon(S-1-22-1-1001) >[2017/02/13 08:48:52.311882, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:52.311890, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:48:52.311898, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 55FD8483 >[2017/02/13 08:48:52.311906, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02c9060 >[2017/02/13 08:48:52.311917, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 55FD8483 >[2017/02/13 08:48:52.311924, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:52.311930, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:48:56.636959, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (36): > SID[ 0]: S-1-5-21-2784292050-724950362-990980605-1001 > SID[ 1]: S-1-5-21-2784292050-724950362-990980605-513 > SID[ 2]: S-1-5-21-2784292050-724950362-990980605-548 > SID[ 3]: S-1-5-21-2784292050-724950362-990980605-5106 > SID[ 4]: S-1-5-21-2784292050-724950362-990980605-3001 > SID[ 5]: S-1-5-21-2784292050-724950362-990980605-547 > SID[ 6]: S-1-5-21-2784292050-724950362-990980605-512 > SID[ 7]: S-1-5-21-2784292050-724950362-990980605-572 > SID[ 8]: S-1-22-2-24 > SID[ 9]: S-1-22-2-25 > SID[ 10]: S-1-22-2-29 > SID[ 11]: S-1-22-2-30 > SID[ 12]: S-1-22-2-33 > SID[ 13]: S-1-22-2-44 > SID[ 14]: S-1-22-2-46 > SID[ 15]: S-1-22-2-108 > SID[ 16]: S-1-22-2-111 > SID[ 17]: S-1-22-2-116 > SID[ 18]: S-1-5-21-2784292050-724950362-990980605-7112 > SID[ 19]: S-1-5-21-2784292050-724950362-990980605-7113 > SID[ 20]: S-1-5-21-2784292050-724950362-990980605-7111 > SID[ 21]: S-1-1-0 > SID[ 22]: S-1-5-2 > SID[ 23]: S-1-5-11 > SID[ 24]: S-1-5-32-545 > SID[ 25]: S-1-5-32-544 > SID[ 26]: S-1-22-1-1001 > SID[ 27]: S-1-22-2-1000 > SID[ 28]: S-1-22-2-1004 > SID[ 29]: S-1-22-2-1002 > SID[ 30]: S-1-22-2-1003 > SID[ 31]: S-1-22-2-102 > SID[ 32]: S-1-22-2-103 > SID[ 33]: S-1-22-2-104 > SID[ 34]: S-1-22-2-101 > SID[ 35]: S-1-22-2-100 > Privileges (0x 1FFFFFF0): > Privilege[ 0]: SeMachineAccountPrivilege > Privilege[ 1]: SeTakeOwnershipPrivilege > Privilege[ 2]: SeBackupPrivilege > Privilege[ 3]: SeRestorePrivilege > Privilege[ 4]: SeRemoteShutdownPrivilege > Privilege[ 5]: SePrintOperatorPrivilege > Privilege[ 6]: SeAddUsersPrivilege > Privilege[ 7]: SeDiskOperatorPrivilege > Privilege[ 8]: SeSecurityPrivilege > Privilege[ 9]: SeSystemtimePrivilege > Privilege[ 10]: SeShutdownPrivilege > Privilege[ 11]: SeDebugPrivilege > Privilege[ 12]: SeSystemEnvironmentPrivilege > Privilege[ 13]: SeSystemProfilePrivilege > Privilege[ 14]: SeProfileSingleProcessPrivilege > Privilege[ 15]: SeIncreaseBasePriorityPrivilege > Privilege[ 16]: SeLoadDriverPrivilege > Privilege[ 17]: SeCreatePagefilePrivilege > Privilege[ 18]: SeIncreaseQuotaPrivilege > Privilege[ 19]: SeChangeNotifyPrivilege > Privilege[ 20]: SeUndockPrivilege > Privilege[ 21]: SeManageVolumePrivilege > Privilege[ 22]: SeImpersonatePrivilege > Privilege[ 23]: SeCreateGlobalPrivilege > Privilege[ 24]: SeEnableDelegationPrivilege > Rights (0x 0): >[2017/02/13 08:48:56.637146, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 1001 > Primary group is 1000 and contains 19 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 24 > Group[ 2]: 25 > Group[ 3]: 29 > Group[ 4]: 30 > Group[ 5]: 33 > Group[ 6]: 44 > Group[ 7]: 46 > Group[ 8]: 108 > Group[ 9]: 111 > Group[ 10]: 116 > Group[ 11]: 1004 > Group[ 12]: 1002 > Group[ 13]: 1003 > Group[ 14]: 102 > Group[ 15]: 103 > Group[ 16]: 104 > Group[ 17]: 101 > Group[ 18]: 100 >[2017/02/13 08:48:56.641463, 5, pid=31911, effective(1001, 1000), real(1001, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:56.641494, 5, pid=31911, effective(1001, 1000), real(1001, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:56.641529, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:56.641540, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:48:56.641549, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 61A4F0C8 >[2017/02/13 08:48:56.641564, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02e54d0 >[2017/02/13 08:48:56.641590, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 61A4F0C8 >[2017/02/13 08:48:56.641598, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:56.641605, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:48:56.641618, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/access.c:338(allow_access) > Allowed connection from 192.168.180.30 (192.168.180.30) >[2017/02/13 08:48:56.641631, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID stelendegijsel is not in a valid format >[2017/02/13 08:48:56.641643, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\stelendegijsel => domain=[LENO], name=[stelendegijsel] >[2017/02/13 08:48:56.641650, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:56.641659, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:56.641665, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:56.641680, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_stelendegijsel >[2017/02/13 08:48:56.641693, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:56.641699, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:56.641714, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:56.641723, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:56.641743, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\stelendegijsel => domain=[Unix User], name=[stelendegijsel] >[2017/02/13 08:48:56.641755, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:56.642253, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID toon is not in a valid format >[2017/02/13 08:48:56.642285, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:48:56.642295, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:56.642307, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:56.642315, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:56.642331, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:48:56.642343, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:56.642349, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:56.642362, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:56.642371, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:56.642390, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:48:56.642396, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:56.642709, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user toon >[2017/02/13 08:48:56.642723, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is toon >[2017/02/13 08:48:56.642731, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [toon]! >[2017/02/13 08:48:56.642740, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:48:56.642746, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:56.642754, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:56.642760, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:56.642774, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:48:56.642785, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:56.642790, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:56.642803, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:56.642818, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:56.642835, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:48:56.642842, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:56.643236, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1286(gid_to_sid) > gid 1000 -> sid S-1-5-21-2784292050-724950362-990980605-3001 >[2017/02/13 08:48:56.643270, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:360(SamInfo3_handle_sids) > Unix User found. Rid marked as special and sid (S-1-22-1-1001) saved as extra sid >[2017/02/13 08:48:56.643282, 1, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:396(SamInfo3_handle_sids) > The primary group domain sid(S-1-5-21-2784292050-724950362-990980605-3001) does not match the domain sid(S-1-5-21-437306792-4118923543-1308149834) for toon(S-1-22-1-1001) >[2017/02/13 08:48:56.643300, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:56.643308, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:48:56.643316, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 61A4F0C8 >[2017/02/13 08:48:56.643326, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02c9060 >[2017/02/13 08:48:56.643337, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 61A4F0C8 >[2017/02/13 08:48:56.643344, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:56.643351, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:48:56.645722, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:56.645753, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:56.645783, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:56.645792, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:48:56.645801, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 20004D12 >[2017/02/13 08:48:56.645811, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02e54d0 >[2017/02/13 08:48:56.645829, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 20004D12 >[2017/02/13 08:48:56.645837, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:56.645843, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:48:56.645859, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/access.c:338(allow_access) > Allowed connection from 192.168.180.30 (192.168.180.30) >[2017/02/13 08:48:56.645871, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID stelendegijsel is not in a valid format >[2017/02/13 08:48:56.645880, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\stelendegijsel => domain=[LENO], name=[stelendegijsel] >[2017/02/13 08:48:56.645886, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:56.645894, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:56.645900, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:56.645913, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_stelendegijsel >[2017/02/13 08:48:56.645924, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:56.645930, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:56.645943, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:56.645953, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:56.645971, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\stelendegijsel => domain=[Unix User], name=[stelendegijsel] >[2017/02/13 08:48:56.645978, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:56.646323, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID toon is not in a valid format >[2017/02/13 08:48:56.646346, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:48:56.646365, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:56.646376, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:56.646385, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:56.646400, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:48:56.646412, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:56.646419, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:56.646432, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:56.646441, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:56.646459, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:48:56.646471, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:56.646781, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user toon >[2017/02/13 08:48:56.646800, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is toon >[2017/02/13 08:48:56.646809, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [toon]! >[2017/02/13 08:48:56.646819, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:48:56.646825, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:56.646834, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:56.646840, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:56.646855, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:48:56.646867, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:48:56.646873, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:48:56.646886, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:56.646895, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:48:56.646913, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:48:56.646920, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:48:56.647287, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1286(gid_to_sid) > gid 1000 -> sid S-1-5-21-2784292050-724950362-990980605-3001 >[2017/02/13 08:48:56.647311, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:360(SamInfo3_handle_sids) > Unix User found. Rid marked as special and sid (S-1-22-1-1001) saved as extra sid >[2017/02/13 08:48:56.647331, 1, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:396(SamInfo3_handle_sids) > The primary group domain sid(S-1-5-21-2784292050-724950362-990980605-3001) does not match the domain sid(S-1-5-21-437306792-4118923543-1308149834) for toon(S-1-22-1-1001) >[2017/02/13 08:48:56.647349, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:56.647357, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:48:56.647366, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 20004D12 >[2017/02/13 08:48:56.647374, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02c3d20 >[2017/02/13 08:48:56.647386, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 20004D12 >[2017/02/13 08:48:56.647398, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:48:56.647404, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:49:00.914472, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (36): > SID[ 0]: S-1-5-21-2784292050-724950362-990980605-1001 > SID[ 1]: S-1-5-21-2784292050-724950362-990980605-513 > SID[ 2]: S-1-5-21-2784292050-724950362-990980605-548 > SID[ 3]: S-1-5-21-2784292050-724950362-990980605-5106 > SID[ 4]: S-1-5-21-2784292050-724950362-990980605-3001 > SID[ 5]: S-1-5-21-2784292050-724950362-990980605-547 > SID[ 6]: S-1-5-21-2784292050-724950362-990980605-512 > SID[ 7]: S-1-5-21-2784292050-724950362-990980605-572 > SID[ 8]: S-1-22-2-24 > SID[ 9]: S-1-22-2-25 > SID[ 10]: S-1-22-2-29 > SID[ 11]: S-1-22-2-30 > SID[ 12]: S-1-22-2-33 > SID[ 13]: S-1-22-2-44 > SID[ 14]: S-1-22-2-46 > SID[ 15]: S-1-22-2-108 > SID[ 16]: S-1-22-2-111 > SID[ 17]: S-1-22-2-116 > SID[ 18]: S-1-5-21-2784292050-724950362-990980605-7112 > SID[ 19]: S-1-5-21-2784292050-724950362-990980605-7113 > SID[ 20]: S-1-5-21-2784292050-724950362-990980605-7111 > SID[ 21]: S-1-1-0 > SID[ 22]: S-1-5-2 > SID[ 23]: S-1-5-11 > SID[ 24]: S-1-5-32-545 > SID[ 25]: S-1-5-32-544 > SID[ 26]: S-1-22-1-1001 > SID[ 27]: S-1-22-2-1000 > SID[ 28]: S-1-22-2-1004 > SID[ 29]: S-1-22-2-1002 > SID[ 30]: S-1-22-2-1003 > SID[ 31]: S-1-22-2-102 > SID[ 32]: S-1-22-2-103 > SID[ 33]: S-1-22-2-104 > SID[ 34]: S-1-22-2-101 > SID[ 35]: S-1-22-2-100 > Privileges (0x 1FFFFFF0): > Privilege[ 0]: SeMachineAccountPrivilege > Privilege[ 1]: SeTakeOwnershipPrivilege > Privilege[ 2]: SeBackupPrivilege > Privilege[ 3]: SeRestorePrivilege > Privilege[ 4]: SeRemoteShutdownPrivilege > Privilege[ 5]: SePrintOperatorPrivilege > Privilege[ 6]: SeAddUsersPrivilege > Privilege[ 7]: SeDiskOperatorPrivilege > Privilege[ 8]: SeSecurityPrivilege > Privilege[ 9]: SeSystemtimePrivilege > Privilege[ 10]: SeShutdownPrivilege > Privilege[ 11]: SeDebugPrivilege > Privilege[ 12]: SeSystemEnvironmentPrivilege > Privilege[ 13]: SeSystemProfilePrivilege > Privilege[ 14]: SeProfileSingleProcessPrivilege > Privilege[ 15]: SeIncreaseBasePriorityPrivilege > Privilege[ 16]: SeLoadDriverPrivilege > Privilege[ 17]: SeCreatePagefilePrivilege > Privilege[ 18]: SeIncreaseQuotaPrivilege > Privilege[ 19]: SeChangeNotifyPrivilege > Privilege[ 20]: SeUndockPrivilege > Privilege[ 21]: SeManageVolumePrivilege > Privilege[ 22]: SeImpersonatePrivilege > Privilege[ 23]: SeCreateGlobalPrivilege > Privilege[ 24]: SeEnableDelegationPrivilege > Rights (0x 0): >[2017/02/13 08:49:00.914632, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 1001 > Primary group is 1000 and contains 19 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 24 > Group[ 2]: 25 > Group[ 3]: 29 > Group[ 4]: 30 > Group[ 5]: 33 > Group[ 6]: 44 > Group[ 7]: 46 > Group[ 8]: 108 > Group[ 9]: 111 > Group[ 10]: 116 > Group[ 11]: 1004 > Group[ 12]: 1002 > Group[ 13]: 1003 > Group[ 14]: 102 > Group[ 15]: 103 > Group[ 16]: 104 > Group[ 17]: 101 > Group[ 18]: 100 >[2017/02/13 08:49:00.921342, 5, pid=31911, effective(1001, 1000), real(1001, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:00.921364, 5, pid=31911, effective(1001, 1000), real(1001, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:00.921399, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:00.921419, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:49:00.921428, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 86A18194 >[2017/02/13 08:49:00.921443, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02e54d0 >[2017/02/13 08:49:00.921468, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 86A18194 >[2017/02/13 08:49:00.921477, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:00.921483, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:49:00.921496, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/access.c:338(allow_access) > Allowed connection from 192.168.180.30 (192.168.180.30) >[2017/02/13 08:49:00.921510, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID stelendegijsel is not in a valid format >[2017/02/13 08:49:00.921522, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\stelendegijsel => domain=[LENO], name=[stelendegijsel] >[2017/02/13 08:49:00.921529, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:00.921538, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:00.921544, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:00.921560, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_stelendegijsel >[2017/02/13 08:49:00.921572, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:00.921578, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:00.921593, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:00.921602, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:00.921622, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\stelendegijsel => domain=[Unix User], name=[stelendegijsel] >[2017/02/13 08:49:00.921629, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:00.922093, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID toon is not in a valid format >[2017/02/13 08:49:00.922115, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:49:00.922124, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:00.922136, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:00.922151, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:00.922168, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:49:00.922180, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:00.922186, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:00.922199, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:00.922209, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:00.922227, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:49:00.922234, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:00.922520, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user toon >[2017/02/13 08:49:00.922533, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is toon >[2017/02/13 08:49:00.922541, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [toon]! >[2017/02/13 08:49:00.922550, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:49:00.922556, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:00.922564, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:00.922570, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:00.922584, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:49:00.922595, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:00.922601, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:00.922613, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:00.922623, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:00.922640, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:49:00.922647, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:00.922975, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1286(gid_to_sid) > gid 1000 -> sid S-1-5-21-2784292050-724950362-990980605-3001 >[2017/02/13 08:49:00.922999, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:360(SamInfo3_handle_sids) > Unix User found. Rid marked as special and sid (S-1-22-1-1001) saved as extra sid >[2017/02/13 08:49:00.923018, 1, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:396(SamInfo3_handle_sids) > The primary group domain sid(S-1-5-21-2784292050-724950362-990980605-3001) does not match the domain sid(S-1-5-21-437306792-4118923543-1308149834) for toon(S-1-22-1-1001) >[2017/02/13 08:49:00.923036, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:00.923044, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:49:00.923052, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 86A18194 >[2017/02/13 08:49:00.923062, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02c3d20 >[2017/02/13 08:49:00.923073, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 86A18194 >[2017/02/13 08:49:00.923080, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:00.923086, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:49:00.925927, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:00.925947, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:00.925976, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:00.925987, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:49:00.925995, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 87322543 >[2017/02/13 08:49:00.926005, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02e54d0 >[2017/02/13 08:49:00.926022, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 87322543 >[2017/02/13 08:49:00.926031, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:00.926037, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:49:00.926047, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/access.c:338(allow_access) > Allowed connection from 192.168.180.30 (192.168.180.30) >[2017/02/13 08:49:00.926058, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID stelendegijsel is not in a valid format >[2017/02/13 08:49:00.926066, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\stelendegijsel => domain=[LENO], name=[stelendegijsel] >[2017/02/13 08:49:00.926073, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:00.926080, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:00.926086, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:00.926106, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_stelendegijsel >[2017/02/13 08:49:00.926117, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:00.926123, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:00.926136, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:00.926145, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:00.926164, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\stelendegijsel => domain=[Unix User], name=[stelendegijsel] >[2017/02/13 08:49:00.926170, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:00.926447, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID toon is not in a valid format >[2017/02/13 08:49:00.926461, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:49:00.926468, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:00.926475, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:00.926482, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:00.926496, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:49:00.926507, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:00.926513, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:00.926525, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:00.926535, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:00.926552, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:49:00.926559, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:00.926844, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user toon >[2017/02/13 08:49:00.926863, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is toon >[2017/02/13 08:49:00.926874, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [toon]! >[2017/02/13 08:49:00.926884, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:49:00.926896, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:00.926904, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:00.926911, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:00.926926, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:49:00.926937, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:00.926944, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:00.926957, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:00.926966, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:00.926984, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:49:00.926991, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:00.927354, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1286(gid_to_sid) > gid 1000 -> sid S-1-5-21-2784292050-724950362-990980605-3001 >[2017/02/13 08:49:00.927374, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:360(SamInfo3_handle_sids) > Unix User found. Rid marked as special and sid (S-1-22-1-1001) saved as extra sid >[2017/02/13 08:49:00.927385, 1, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:396(SamInfo3_handle_sids) > The primary group domain sid(S-1-5-21-2784292050-724950362-990980605-3001) does not match the domain sid(S-1-5-21-437306792-4118923543-1308149834) for toon(S-1-22-1-1001) >[2017/02/13 08:49:00.927402, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:00.927412, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:49:00.927422, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 87322543 >[2017/02/13 08:49:00.927431, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02c9060 >[2017/02/13 08:49:00.927442, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 87322543 >[2017/02/13 08:49:00.927449, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:00.927455, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:49:03.010542, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (36): > SID[ 0]: S-1-5-21-2784292050-724950362-990980605-1001 > SID[ 1]: S-1-5-21-2784292050-724950362-990980605-513 > SID[ 2]: S-1-5-21-2784292050-724950362-990980605-548 > SID[ 3]: S-1-5-21-2784292050-724950362-990980605-5106 > SID[ 4]: S-1-5-21-2784292050-724950362-990980605-3001 > SID[ 5]: S-1-5-21-2784292050-724950362-990980605-547 > SID[ 6]: S-1-5-21-2784292050-724950362-990980605-512 > SID[ 7]: S-1-5-21-2784292050-724950362-990980605-572 > SID[ 8]: S-1-22-2-24 > SID[ 9]: S-1-22-2-25 > SID[ 10]: S-1-22-2-29 > SID[ 11]: S-1-22-2-30 > SID[ 12]: S-1-22-2-33 > SID[ 13]: S-1-22-2-44 > SID[ 14]: S-1-22-2-46 > SID[ 15]: S-1-22-2-108 > SID[ 16]: S-1-22-2-111 > SID[ 17]: S-1-22-2-116 > SID[ 18]: S-1-5-21-2784292050-724950362-990980605-7112 > SID[ 19]: S-1-5-21-2784292050-724950362-990980605-7113 > SID[ 20]: S-1-5-21-2784292050-724950362-990980605-7111 > SID[ 21]: S-1-1-0 > SID[ 22]: S-1-5-2 > SID[ 23]: S-1-5-11 > SID[ 24]: S-1-5-32-545 > SID[ 25]: S-1-5-32-544 > SID[ 26]: S-1-22-1-1001 > SID[ 27]: S-1-22-2-1000 > SID[ 28]: S-1-22-2-1004 > SID[ 29]: S-1-22-2-1002 > SID[ 30]: S-1-22-2-1003 > SID[ 31]: S-1-22-2-102 > SID[ 32]: S-1-22-2-103 > SID[ 33]: S-1-22-2-104 > SID[ 34]: S-1-22-2-101 > SID[ 35]: S-1-22-2-100 > Privileges (0x 1FFFFFF0): > Privilege[ 0]: SeMachineAccountPrivilege > Privilege[ 1]: SeTakeOwnershipPrivilege > Privilege[ 2]: SeBackupPrivilege > Privilege[ 3]: SeRestorePrivilege > Privilege[ 4]: SeRemoteShutdownPrivilege > Privilege[ 5]: SePrintOperatorPrivilege > Privilege[ 6]: SeAddUsersPrivilege > Privilege[ 7]: SeDiskOperatorPrivilege > Privilege[ 8]: SeSecurityPrivilege > Privilege[ 9]: SeSystemtimePrivilege > Privilege[ 10]: SeShutdownPrivilege > Privilege[ 11]: SeDebugPrivilege > Privilege[ 12]: SeSystemEnvironmentPrivilege > Privilege[ 13]: SeSystemProfilePrivilege > Privilege[ 14]: SeProfileSingleProcessPrivilege > Privilege[ 15]: SeIncreaseBasePriorityPrivilege > Privilege[ 16]: SeLoadDriverPrivilege > Privilege[ 17]: SeCreatePagefilePrivilege > Privilege[ 18]: SeIncreaseQuotaPrivilege > Privilege[ 19]: SeChangeNotifyPrivilege > Privilege[ 20]: SeUndockPrivilege > Privilege[ 21]: SeManageVolumePrivilege > Privilege[ 22]: SeImpersonatePrivilege > Privilege[ 23]: SeCreateGlobalPrivilege > Privilege[ 24]: SeEnableDelegationPrivilege > Rights (0x 0): >[2017/02/13 08:49:03.010788, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 1001 > Primary group is 1000 and contains 19 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 24 > Group[ 2]: 25 > Group[ 3]: 29 > Group[ 4]: 30 > Group[ 5]: 33 > Group[ 6]: 44 > Group[ 7]: 46 > Group[ 8]: 108 > Group[ 9]: 111 > Group[ 10]: 116 > Group[ 11]: 1004 > Group[ 12]: 1002 > Group[ 13]: 1003 > Group[ 14]: 102 > Group[ 15]: 103 > Group[ 16]: 104 > Group[ 17]: 101 > Group[ 18]: 100 >[2017/02/13 08:49:03.019708, 5, pid=31911, effective(1001, 1000), real(1001, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:03.019738, 5, pid=31911, effective(1001, 1000), real(1001, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:03.019788, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:03.019806, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:49:03.019824, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 769D6A62 >[2017/02/13 08:49:03.019844, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02e54d0 >[2017/02/13 08:49:03.019885, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 769D6A62 >[2017/02/13 08:49:03.019903, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:03.019927, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:49:03.019951, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/access.c:338(allow_access) > Allowed connection from 192.168.180.30 (192.168.180.30) >[2017/02/13 08:49:03.019976, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID stelendegijsel is not in a valid format >[2017/02/13 08:49:03.019996, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\stelendegijsel => domain=[LENO], name=[stelendegijsel] >[2017/02/13 08:49:03.020012, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:03.020030, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:03.020042, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:03.020072, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_stelendegijsel >[2017/02/13 08:49:03.020097, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:03.020112, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:03.020139, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:03.020160, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:03.020199, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\stelendegijsel => domain=[Unix User], name=[stelendegijsel] >[2017/02/13 08:49:03.020215, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:03.020696, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID toon is not in a valid format >[2017/02/13 08:49:03.020723, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:49:03.020742, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:03.020761, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:03.020774, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:03.020801, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:49:03.020825, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:03.020840, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:03.020866, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:03.020895, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:03.020933, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:49:03.020948, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:03.021221, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user toon >[2017/02/13 08:49:03.021238, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is toon >[2017/02/13 08:49:03.021253, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [toon]! >[2017/02/13 08:49:03.021271, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:49:03.021284, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:03.021300, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:03.021315, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:03.021341, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:49:03.021365, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:03.021380, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:03.021406, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:03.021426, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:03.021462, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:49:03.021478, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:03.021745, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1286(gid_to_sid) > gid 1000 -> sid S-1-5-21-2784292050-724950362-990980605-3001 >[2017/02/13 08:49:03.021766, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:360(SamInfo3_handle_sids) > Unix User found. Rid marked as special and sid (S-1-22-1-1001) saved as extra sid >[2017/02/13 08:49:03.021784, 1, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:396(SamInfo3_handle_sids) > The primary group domain sid(S-1-5-21-2784292050-724950362-990980605-3001) does not match the domain sid(S-1-5-21-437306792-4118923543-1308149834) for toon(S-1-22-1-1001) >[2017/02/13 08:49:03.021809, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:03.021825, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:49:03.021843, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 769D6A62 >[2017/02/13 08:49:03.021868, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02c9060 >[2017/02/13 08:49:03.021891, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 769D6A62 >[2017/02/13 08:49:03.021907, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:03.021920, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:49:05.126634, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (36): > SID[ 0]: S-1-5-21-2784292050-724950362-990980605-1001 > SID[ 1]: S-1-5-21-2784292050-724950362-990980605-513 > SID[ 2]: S-1-5-21-2784292050-724950362-990980605-548 > SID[ 3]: S-1-5-21-2784292050-724950362-990980605-5106 > SID[ 4]: S-1-5-21-2784292050-724950362-990980605-3001 > SID[ 5]: S-1-5-21-2784292050-724950362-990980605-547 > SID[ 6]: S-1-5-21-2784292050-724950362-990980605-512 > SID[ 7]: S-1-5-21-2784292050-724950362-990980605-572 > SID[ 8]: S-1-22-2-24 > SID[ 9]: S-1-22-2-25 > SID[ 10]: S-1-22-2-29 > SID[ 11]: S-1-22-2-30 > SID[ 12]: S-1-22-2-33 > SID[ 13]: S-1-22-2-44 > SID[ 14]: S-1-22-2-46 > SID[ 15]: S-1-22-2-108 > SID[ 16]: S-1-22-2-111 > SID[ 17]: S-1-22-2-116 > SID[ 18]: S-1-5-21-2784292050-724950362-990980605-7112 > SID[ 19]: S-1-5-21-2784292050-724950362-990980605-7113 > SID[ 20]: S-1-5-21-2784292050-724950362-990980605-7111 > SID[ 21]: S-1-1-0 > SID[ 22]: S-1-5-2 > SID[ 23]: S-1-5-11 > SID[ 24]: S-1-5-32-545 > SID[ 25]: S-1-5-32-544 > SID[ 26]: S-1-22-1-1001 > SID[ 27]: S-1-22-2-1000 > SID[ 28]: S-1-22-2-1004 > SID[ 29]: S-1-22-2-1002 > SID[ 30]: S-1-22-2-1003 > SID[ 31]: S-1-22-2-102 > SID[ 32]: S-1-22-2-103 > SID[ 33]: S-1-22-2-104 > SID[ 34]: S-1-22-2-101 > SID[ 35]: S-1-22-2-100 > Privileges (0x 1FFFFFF0): > Privilege[ 0]: SeMachineAccountPrivilege > Privilege[ 1]: SeTakeOwnershipPrivilege > Privilege[ 2]: SeBackupPrivilege > Privilege[ 3]: SeRestorePrivilege > Privilege[ 4]: SeRemoteShutdownPrivilege > Privilege[ 5]: SePrintOperatorPrivilege > Privilege[ 6]: SeAddUsersPrivilege > Privilege[ 7]: SeDiskOperatorPrivilege > Privilege[ 8]: SeSecurityPrivilege > Privilege[ 9]: SeSystemtimePrivilege > Privilege[ 10]: SeShutdownPrivilege > Privilege[ 11]: SeDebugPrivilege > Privilege[ 12]: SeSystemEnvironmentPrivilege > Privilege[ 13]: SeSystemProfilePrivilege > Privilege[ 14]: SeProfileSingleProcessPrivilege > Privilege[ 15]: SeIncreaseBasePriorityPrivilege > Privilege[ 16]: SeLoadDriverPrivilege > Privilege[ 17]: SeCreatePagefilePrivilege > Privilege[ 18]: SeIncreaseQuotaPrivilege > Privilege[ 19]: SeChangeNotifyPrivilege > Privilege[ 20]: SeUndockPrivilege > Privilege[ 21]: SeManageVolumePrivilege > Privilege[ 22]: SeImpersonatePrivilege > Privilege[ 23]: SeCreateGlobalPrivilege > Privilege[ 24]: SeEnableDelegationPrivilege > Rights (0x 0): >[2017/02/13 08:49:05.127888, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 1001 > Primary group is 1000 and contains 19 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 24 > Group[ 2]: 25 > Group[ 3]: 29 > Group[ 4]: 30 > Group[ 5]: 33 > Group[ 6]: 44 > Group[ 7]: 46 > Group[ 8]: 108 > Group[ 9]: 111 > Group[ 10]: 116 > Group[ 11]: 1004 > Group[ 12]: 1002 > Group[ 13]: 1003 > Group[ 14]: 102 > Group[ 15]: 103 > Group[ 16]: 104 > Group[ 17]: 101 > Group[ 18]: 100 >[2017/02/13 08:49:05.136589, 5, pid=31911, effective(1001, 1000), real(1001, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:05.136674, 5, pid=31911, effective(1001, 1000), real(1001, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:05.136840, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:05.136906, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:49:05.136969, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 4044CC0D >[2017/02/13 08:49:05.137041, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02e54d0 >[2017/02/13 08:49:05.137162, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 4044CC0D >[2017/02/13 08:49:05.137229, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:05.137285, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:49:05.137359, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/access.c:338(allow_access) > Allowed connection from 192.168.180.30 (192.168.180.30) >[2017/02/13 08:49:05.137437, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID stelendegijsel is not in a valid format >[2017/02/13 08:49:05.137504, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\stelendegijsel => domain=[LENO], name=[stelendegijsel] >[2017/02/13 08:49:05.137555, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:05.137616, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:05.137665, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:05.137760, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_stelendegijsel >[2017/02/13 08:49:05.137835, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:05.137884, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:05.137984, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:05.138052, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:05.138189, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\stelendegijsel => domain=[Unix User], name=[stelendegijsel] >[2017/02/13 08:49:05.138232, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:05.139330, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID toon is not in a valid format >[2017/02/13 08:49:05.139406, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:49:05.139450, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:05.139544, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:05.139613, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:05.139718, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:49:05.139805, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:05.139863, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:05.139992, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:05.140077, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:05.140243, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:49:05.140285, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:05.141114, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user toon >[2017/02/13 08:49:05.141156, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is toon >[2017/02/13 08:49:05.141186, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [toon]! >[2017/02/13 08:49:05.141233, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:49:05.141275, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:05.141322, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:05.141363, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:05.141439, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:49:05.141498, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:05.141541, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:05.141617, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:05.141672, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:05.141774, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:49:05.141804, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:05.142571, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1286(gid_to_sid) > gid 1000 -> sid S-1-5-21-2784292050-724950362-990980605-3001 >[2017/02/13 08:49:05.142633, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:360(SamInfo3_handle_sids) > Unix User found. Rid marked as special and sid (S-1-22-1-1001) saved as extra sid >[2017/02/13 08:49:05.142676, 1, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:396(SamInfo3_handle_sids) > The primary group domain sid(S-1-5-21-2784292050-724950362-990980605-3001) does not match the domain sid(S-1-5-21-437306792-4118923543-1308149834) for toon(S-1-22-1-1001) >[2017/02/13 08:49:05.142771, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:05.142818, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:49:05.142874, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key 4044CC0D >[2017/02/13 08:49:05.142924, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02c9060 >[2017/02/13 08:49:05.142990, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key 4044CC0D >[2017/02/13 08:49:05.143033, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:05.143071, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:49:05.149341, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:05.149403, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:05.149489, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:05.149537, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:49:05.149586, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key B10E65FF >[2017/02/13 08:49:05.149637, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02e54d0 >[2017/02/13 08:49:05.149723, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key B10E65FF >[2017/02/13 08:49:05.149765, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:05.149787, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2017/02/13 08:49:05.149820, 3, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/access.c:338(allow_access) > Allowed connection from 192.168.180.30 (192.168.180.30) >[2017/02/13 08:49:05.149865, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID stelendegijsel is not in a valid format >[2017/02/13 08:49:05.149913, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\stelendegijsel => domain=[LENO], name=[stelendegijsel] >[2017/02/13 08:49:05.149955, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:05.150024, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:05.150065, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:05.150141, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_stelendegijsel >[2017/02/13 08:49:05.150206, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:05.150248, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:05.150324, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:05.150377, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:05.150477, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\stelendegijsel => domain=[Unix User], name=[stelendegijsel] >[2017/02/13 08:49:05.150507, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:05.151228, 3, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/dom_sid.c:209(dom_sid_parse_endp) > string_to_sid: SID toon is not in a valid format >[2017/02/13 08:49:05.151273, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:49:05.151295, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:05.151335, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:05.151372, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:05.151438, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:49:05.151498, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:05.151537, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:05.151606, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:05.151653, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:05.151746, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:49:05.151774, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:05.152451, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user toon >[2017/02/13 08:49:05.152490, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is toon >[2017/02/13 08:49:05.152518, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [toon]! >[2017/02/13 08:49:05.152582, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: LENO\toon => domain=[LENO], name=[toon] >[2017/02/13 08:49:05.152623, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:05.152669, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:05.152705, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:05.152774, 5, pid=31911, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_toon >[2017/02/13 08:49:05.152835, 5, pid=31911, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2017/02/13 08:49:05.152872, 5, pid=31911, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:639(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2017/02/13 08:49:05.152941, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:05.152989, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/groupdb/mapping_tdb.c:270(find_map) > failed to unpack map >[2017/02/13 08:49:05.153078, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: Unix User\toon => domain=[Unix User], name=[toon] >[2017/02/13 08:49:05.153106, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2017/02/13 08:49:05.153764, 10, pid=31911, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1286(gid_to_sid) > gid 1000 -> sid S-1-5-21-2784292050-724950362-990980605-3001 >[2017/02/13 08:49:05.153818, 10, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:360(SamInfo3_handle_sids) > Unix User found. Rid marked as special and sid (S-1-22-1-1001) saved as extra sid >[2017/02/13 08:49:05.153857, 1, pid=31911, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info.c:396(SamInfo3_handle_sids) > The primary group domain sid(S-1-5-21-2784292050-724950362-990980605-3001) does not match the domain sid(S-1-5-21-437306792-4118923543-1308149834) for toon(S-1-22-1-1001) >[2017/02/13 08:49:05.153936, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:178(dbwrap_check_lock_order) > check lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:05.153978, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/var/run/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2017/02/13 08:49:05.154025, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Locking key B10E65FF >[2017/02/13 08:49:05.154070, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:144(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x55c3f02c3ee0 >[2017/02/13 08:49:05.154127, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > Unlocking key B10E65FF >[2017/02/13 08:49:05.154169, 5, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /var/run/samba/smbXsrv_tcon_global.tdb >[2017/02/13 08:49:05.154206, 10, pid=31911, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none>
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 12579
: 12920