ibtest20# /usr/bin/smbcacls -d 5 -U 'Domain\Administrator'%'pwd' '//win_server/testshare' 'TestFolder\Test.txt' -S 'REVISION:1','OWNER:BUILTIN\Administrators','GROUP:S-1-5-21-940271623-2132819429-2555886558-513','ACL:Domain\llawyer:ALLOWED/0/0x1f01ff','ACL:BUILTIN\Administrators:ALLOWED/19/FULL','ACL:CREATOR OWNER:ALLOWED/27/0x10000000','ACL:NT AUTHORITY\SYSTEM:ALLOWED/19/FULL','ACL:Everyone:ALLOWED/3/READ','ACL:S-1-5-21-940271623-2132819429-2555886558-1313:ALLOWED/3/FULL','ACL:BUILTIN\Users:ALLOWED/19/READ','ACL:BUILTIN\Users:ALLOWED/18/0x00000004','ACL:BUILTIN\Users:ALLOWED/18/0x00000002','ACL:S-1-5-21-940271623-2132819429-2555886558-500:ALLOWED/3/FULL' INFO: Current debug levels: all: 5 tdb: 5 printdrivers: 5 lanman: 5 smb: 5 rpc_parse: 5 rpc_srv: 5 rpc_cli: 5 passdb: 5 sam: 5 auth: 5 winbind: 5 vfs: 5 idmap: 5 quota: 5 acls: 5 locking: 5 msdfs: 5 dmapi: 5 registry: 5 scavenger: 5 dns: 5 ldb: 5 tevent: 5 lp_load_ex: refreshing parameters Initialising global parameters rlimit_max: increasing rlimit_max (4096) to minimum Windows limit (16384) INFO: Current debug levels: all: 5 tdb: 5 printdrivers: 5 lanman: 5 smb: 5 rpc_parse: 5 rpc_srv: 5 rpc_cli: 5 passdb: 5 sam: 5 auth: 5 winbind: 5 vfs: 5 idmap: 5 quota: 5 acls: 5 locking: 5 msdfs: 5 dmapi: 5 registry: 5 scavenger: 5 dns: 5 ldb: 5 tevent: 5 Processing section "[global]" doing parameter workgroup = WORKGROUP doing parameter server string = %h server (Samba, Ubuntu) doing parameter dns proxy = no doing parameter client max protocol = SMB3 doing parameter log file = /var/log/samba/log.%m doing parameter max log size = 1000 doing parameter syslog = 0 WARNING: The "syslog" option is deprecated doing parameter panic action = /usr/share/samba/panic-action %d doing parameter encrypt passwords = true doing parameter passdb backend = tdbsam doing parameter obey pam restrictions = yes doing parameter unix password sync = yes doing parameter passwd program = /usr/bin/passwd %u doing parameter passwd chat = *Enter\snew\s*\spassword:* %n\n *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* . doing parameter pam password change = yes doing parameter map to guest = bad user doing parameter usershare allow guests = yes pm_process() returned Yes added interface eth0 ip=10.146.4.120 bcast=10.147.255.255 netmask=255.254.0.0 Opening cache file at /var/cache/samba/gencache.tdb Opening cache file at /var/run/samba/gencache_notrans.tdb sitename_fetch: No stored sitename for name xxx.xxxxx.xxx#20 found. Connecting to 10.146.1.97 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 372480 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 Doing spnego session setup (blob length=108) got OID=1.2.840.48018.1.2.2 got OID=1.2.840.113554.1.2.2 got OID=1.2.840.113554.1.2.2.3 got OID=1.3.6.1.4.1.311.2.2.10 got principal=not_defined_in_RFC4178@please_ignore GENSEC backend 'gssapi_spnego' registered GENSEC backend 'gssapi_krb5' registered GENSEC backend 'gssapi_krb5_sasl' registered GENSEC backend 'spnego' registered GENSEC backend 'schannel' registered GENSEC backend 'naclrpc_as_system' registered GENSEC backend 'sasl-EXTERNAL' registered GENSEC backend 'ntlmssp' registered GENSEC backend 'ntlmssp_resume_ccache' registered GENSEC backend 'http_basic' registered GENSEC backend 'http_ntlm' registered GENSEC backend 'krb5' registered GENSEC backend 'fake_gssapi_krb5' registered Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH signed SMB2 message signed SMB2 message string_to_sid: SID BUILTIN\Administrators is not in a valid format signed SMB2 message signed SMB2 message Bind RPC Pipe: host xxx.xxxxx.xxx auth_type 0, auth_level 1 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 52 check_bind_response: accepted! rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 32 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 116 string_to_sid: SID Domain\llawyer is not in a valid format signed SMB2 message signed SMB2 message Bind RPC Pipe: host xxx.xxxxx.xxx auth_type 0, auth_level 1 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 52 check_bind_response: accepted! rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 32 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 124 string_to_sid: SID BUILTIN\Administrators is not in a valid format signed SMB2 message signed SMB2 message Bind RPC Pipe: host xxx.xxxxx.xxx auth_type 0, auth_level 1 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 52 check_bind_response: accepted! rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 32 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 116 string_to_sid: SID CREATOR OWNER is not in a valid format signed SMB2 message signed SMB2 message Bind RPC Pipe: host xxx.xxxxx.xxx auth_type 0, auth_level 1 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 52 check_bind_response: accepted! rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 32 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 96 string_to_sid: SID NT AUTHORITY\SYSTEM is not in a valid format signed SMB2 message signed SMB2 message Bind RPC Pipe: host xxx.xxxxx.xxx auth_type 0, auth_level 1 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 52 check_bind_response: accepted! rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 32 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 120 string_to_sid: SID Everyone is not in a valid format signed SMB2 message signed SMB2 message Bind RPC Pipe: host xxx.xxxxx.xxx auth_type 0, auth_level 1 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 52 check_bind_response: accepted! rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 32 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 96 string_to_sid: SID BUILTIN\Users is not in a valid format signed SMB2 message signed SMB2 message Bind RPC Pipe: host xxx.xxxxx.xxx auth_type 0, auth_level 1 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 52 check_bind_response: accepted! rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 32 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 116 string_to_sid: SID BUILTIN\Users is not in a valid format signed SMB2 message signed SMB2 message Bind RPC Pipe: host xxx.xxxxx.xxx auth_type 0, auth_level 1 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 52 check_bind_response: accepted! rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 32 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 116 string_to_sid: SID BUILTIN\Users is not in a valid format signed SMB2 message signed SMB2 message Bind RPC Pipe: host xxx.xxxxx.xxx auth_type 0, auth_level 1 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 52 check_bind_response: accepted! rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 32 rpc_api_pipe: host xxx.xxxxx.xxx rpc_read_send: data_to_read: 116 Failed to open \TestFolder\Test.txt: NT_STATUS_NETWORK_NAME_DELETED