The Samba-Bugzilla – Attachment 13188 Details for
Bug 12765
smbcacls fails if no password is specified
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
level 10 debug log
log10.txt (text/plain), 8.96 KB, created by
Marc Muehlfeld
on 2017-05-03 08:13:39 UTC
(
hide
)
Description:
level 10 debug log
Filename:
MIME Type:
Creator:
Marc Muehlfeld
Created:
2017-05-03 08:13:39 UTC
Size:
8.96 KB
patch
obsolete
>INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 >lp_load_ex: refreshing parameters >Initialising global parameters >rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 >Processing section "[global]" >doing parameter netbios name = M1 >doing parameter server string = >doing parameter workgroup = SAMDOM >doing parameter security = ADS >doing parameter realm = SAMDOM.EXAMPLE.COM >doing parameter encrypt passwords = yes >doing parameter interfaces = localhost eth0 >doing parameter bind interfaces only = true >doing parameter log file = /var/log/samba/%m.log >doing parameter debug pid = yes >doing parameter log level = 1 >doing parameter max log size = 5000 >doing parameter spoolss: architecture = Windows x64 >doing parameter lock directory = /usr/var/samba/lock >doing parameter state directory = /usr/var/samba/state >doing parameter cache directory = /usr/var/samba/cache >doing parameter local master = no >doing parameter domain master = no >doing parameter preferred master = no >doing parameter veto files = /.bash_history/Platform.ini/ >doing parameter delete veto files = yes >doing parameter wins server = 10.99.0.1 >doing parameter name resolve order = wins bcast host >doing parameter unix extensions = yes >doing parameter use sendfile = yes >doing parameter guest account = nobody >doing parameter load printers = no >doing parameter vfs objects = acl_xattr >doing parameter map acl inherit = yes >doing parameter store dos attributes = Yes >doing parameter idmap config *:backend = tdb >doing parameter idmap config *:range = 70001-80000 >doing parameter idmap config SAMDOM:backend = ad >doing parameter idmap config SAMDOM:schema_mode = rfc2307 >doing parameter idmap config SAMDOM:range = 500-40000 >doing parameter winbind nss info = rfc2307 >doing parameter winbind expand groups = 2 >doing parameter winbind trusted domains only = no >doing parameter winbind use default domain = yes >doing parameter winbind enum users = yes >doing parameter winbind enum groups = yes >doing parameter admin users = SAMDOM\Administrator >doing parameter map archive = no >doing parameter map system = no >doing parameter map hidden = no >doing parameter writeable = yes >doing parameter inherit permissions = yes >doing parameter include = /etc/samba/shares.conf >pm_process() returned Yes >lp_servicenumber: couldn't find homes >added interface lo ip=127.0.0.1 bcast=127.255.255.255 netmask=255.0.0.0 >added interface eth0 ip=10.99.0.5 bcast=10.99.0.255 netmask=255.255.255.0 >Opening cache file at /usr/var/samba/cache/gencache.tdb >Opening cache file at /usr/var/samba/lock/gencache_notrans.tdb >sitename_fetch: Returning sitename for realm 'SAMDOM.EXAMPLE.COM': "Default-First-Site-Name" >internal_resolve_name: looking up M1#20 (sitename Default-First-Site-Name) >Adding cache entry with key=[NBT/M1#20] and timeout=[Do Jan 1 01:00:00 1970 CET] (-1493799053 seconds in the past) >no entry for M1#20 found. >Adding cache entry with key=[WINS_SRV_DEAD/10.99.0.1,0.0.0.0] and timeout=[Do Jan 1 01:00:00 1970 CET] (-1493799053 seconds in the past) >wins_srv_is_dead: 10.99.0.1 is alive >resolve_wins: using WINS server 10.99.0.1 and tag '*' >wins_srv_is_dead: 10.99.0.1 is alive >Adding cache entry with key=[WINS_SRV_DEAD/10.99.0.1,0.0.0.0] and timeout=[Mi Mai 3 10:20:55 2017 CEST] (600 seconds ahead) >Marking wins server 10.99.0.1 dead for 600 seconds from source 10.99.0.1 >name_resolve_bcast: Attempting broadcast lookup for name M1<0x20> >parse_nmb: packet id = 20039 >nmb packet from 10.99.0.5(35072) header: id=20039 opcode=Query(0) response=Yes > header: flags: bcast=No rec_avail=Yes rec_des=Yes trunc=No auth=Yes > header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 > answers: nmb_name=M1<20> rr_type=32 rr_class=1 ttl=259200 > answers 0 char `..c.. hex 60000A630005 >Got a positive name query response from 10.99.0.5 ( 10.99.0.5 ) >remove_duplicate_addrs2: looking for duplicate address/port pairs >namecache_store: storing 1 address for M1#20: 10.99.0.5 >Adding cache entry with key=[NBT/M1#20] and timeout=[Do Jan 1 01:00:00 1970 CET] (-1493799055 seconds in the past) >Adding cache entry with key=[NBT/M1#20] and timeout=[Mi Mai 3 10:21:55 2017 CEST] (660 seconds ahead) >internal_resolve_name: returning 1 addresses: 10.99.0.5:0 >Connecting to 10.99.0.5 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 2626560 > SO_RCVBUF = 1061296 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >got OID=1.2.840.48018.1.2.2 >GENSEC backend 'gssapi_spnego' registered >GENSEC backend 'gssapi_krb5' registered >GENSEC backend 'gssapi_krb5_sasl' registered >GENSEC backend 'spnego' registered >GENSEC backend 'schannel' registered >GENSEC backend 'naclrpc_as_system' registered >GENSEC backend 'sasl-EXTERNAL' registered >GENSEC backend 'ntlmssp' registered >GENSEC backend 'ntlmssp_resume_ccache' registered >GENSEC backend 'http_basic' registered >GENSEC backend 'http_ntlm' registered >GENSEC backend 'krb5' registered >GENSEC backend 'fake_gssapi_krb5' registered >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62008215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62008215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - using NTLM1 >SPNEGO login failed: Logon failure >cli_full_connection failed! (NT_STATUS_LOGON_FAILURE)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 12765
: 13188 |
13189
|
13207