INFO: Current debug levels: all: 10 tdb: 10 printdrivers: 10 lanman: 10 smb: 10 rpc_parse: 10 rpc_srv: 10 rpc_cli: 10 passdb: 10 sam: 10 auth: 10 winbind: 10 vfs: 10 idmap: 10 quota: 10 acls: 10 locking: 10 msdfs: 10 dmapi: 10 registry: 10 scavenger: 10 dns: 10 ldb: 10 tevent: 10 auth_audit: 10 auth_json_audit: 10 kerberos: 10 drs_repl: 10 smb2: 10 smb2_credits: 10 dsdb_audit: 10 dsdb_json_audit: 10 dsdb_password_audit: 10 dsdb_password_json_audit: 10 dsdb_transaction_audit: 10 dsdb_transaction_json_audit: 10 dsdb_group_audit: 10 dsdb_group_json_audit: 10 lp_load_ex: refreshing parameters Initialising global parameters rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) INFO: Current debug levels: all: 10 tdb: 10 printdrivers: 10 lanman: 10 smb: 10 rpc_parse: 10 rpc_srv: 10 rpc_cli: 10 passdb: 10 sam: 10 auth: 10 winbind: 10 vfs: 10 idmap: 10 quota: 10 acls: 10 locking: 10 msdfs: 10 dmapi: 10 registry: 10 scavenger: 10 dns: 10 ldb: 10 tevent: 10 auth_audit: 10 auth_json_audit: 10 kerberos: 10 drs_repl: 10 smb2: 10 smb2_credits: 10 dsdb_audit: 10 dsdb_json_audit: 10 dsdb_password_audit: 10 dsdb_password_json_audit: 10 dsdb_transaction_audit: 10 dsdb_transaction_json_audit: 10 dsdb_group_audit: 10 dsdb_group_json_audit: 10 pm_process() returned Yes lp_servicenumber: couldn't find homes messaging_dgm_ref: messaging_dgm_init returned Success messaging_dgm_ref: unique = 15604166658537738700 Registering messaging pointer for type 2 - private_data=(nil) Registering messaging pointer for type 9 - private_data=(nil) Registered MSG_REQ_POOL_USAGE Registering messaging pointer for type 11 - private_data=(nil) Registering messaging pointer for type 12 - private_data=(nil) Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED Registering messaging pointer for type 1 - private_data=(nil) Registering messaging pointer for type 5 - private_data=(nil) Registering messaging pointer for type 51 - private_data=(nil) messaging_init_internal: my id: 23892 lp_load_ex: refreshing parameters Freeing parametrics: Initialising global parameters rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) INFO: Current debug levels: all: 10 tdb: 10 printdrivers: 10 lanman: 10 smb: 10 rpc_parse: 10 rpc_srv: 10 rpc_cli: 10 passdb: 10 sam: 10 auth: 10 winbind: 10 vfs: 10 idmap: 10 quota: 10 acls: 10 locking: 10 msdfs: 10 dmapi: 10 registry: 10 scavenger: 10 dns: 10 ldb: 10 tevent: 10 auth_audit: 10 auth_json_audit: 10 kerberos: 10 drs_repl: 10 smb2: 10 smb2_credits: 10 dsdb_audit: 10 dsdb_json_audit: 10 dsdb_password_audit: 10 dsdb_password_json_audit: 10 dsdb_transaction_audit: 10 dsdb_transaction_json_audit: 10 dsdb_group_audit: 10 dsdb_group_json_audit: 10 pm_process() returned Yes lp_servicenumber: couldn't find homes added interface ens160 ip=10.1.1.74 bcast=10.1.1.255 netmask=255.255.255.0 Netbios name list:- my_netbios_names[0]="SMBTEST" Client started (version 4.9.4). cli_cm_open: Calling cli_cm_connect on: server (null) share \\domain.com\DFS do_connect: Making new connection to server (null) share \\domain.com\DFS Opening cache file at /usr/local/samba/var/cache/gencache.tdb Opening cache file at /usr/local/samba/var/lock/gencache_notrans.tdb Adding cache entry with key=[AD_SITENAME/DOMAIN/] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552353353 seconds in the past) Could not get allrecord lock on gencache_notrans.tdb: Locking error sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 Enter DOMAIN.COM\username's password: kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] GENSEC backend 'gssapi_spnego' registered GENSEC backend 'gssapi_krb5' registered GENSEC backend 'gssapi_krb5_sasl' registered GENSEC backend 'spnego' registered GENSEC backend 'schannel' registered GENSEC backend 'naclrpc_as_system' registered GENSEC backend 'sasl-EXTERNAL' registered GENSEC backend 'ntlmssp' registered GENSEC backend 'ntlmssp_resume_ccache' registered GENSEC backend 'http_basic' registered GENSEC backend 'http_ntlm' registered GENSEC backend 'http_negotiate' registered Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb00aa0]: subreq: 0x5589adb01090 gensec_update_send: spnego[0x5589adafc5c0]: subreq: 0x5589adafff10 gensec_update_done: ntlmssp[0x5589adb00aa0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb01090/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb01240)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adafc5c0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adafff10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb000c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb00aa0]: subreq: 0x5589adb128b0 gensec_update_send: spnego[0x5589adafc5c0]: subreq: 0x5589adb00e40 gensec_update_done: ntlmssp[0x5589adb00aa0]: NT_STATUS_OK tevent_req[0x5589adb128b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb12a60)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adafc5c0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb00e40/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb00ff0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adafc5c0]: subreq: 0x5589adb00e40 gensec_update_done: spnego[0x5589adafc5c0]: NT_STATUS_OK tevent_req[0x5589adb00e40/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb00ff0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share DFS sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adafebb0]: subreq: 0x5589adb12690 gensec_update_send: spnego[0x5589adb00da0]: subreq: 0x5589adaff4c0 gensec_update_done: ntlmssp[0x5589adafebb0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb12690/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb12840)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb00da0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adaff4c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adaff670)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adafebb0]: subreq: 0x5589adb12690 gensec_update_send: spnego[0x5589adb00da0]: subreq: 0x5589adaff4c0 gensec_update_done: ntlmssp[0x5589adafebb0]: NT_STATUS_OK tevent_req[0x5589adb12690/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb12840)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb00da0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adaff4c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adaff670)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb00da0]: subreq: 0x5589adb136e0 gensec_update_done: spnego[0x5589adb00da0]: NT_STATUS_OK tevent_req[0x5589adb136e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb13890)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok Try "help" to get a list of possible commands. smb: \> dir dos_clean_name [\*] unix_clean_name [\*] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\ signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\ signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message Total bytes listed: 0 . D 0 Fri Nov 10 23:27:03 2017 .. D 0 Fri Nov 10 23:27:03 2017 Information for Staff D 0 Tue Sep 5 04:13:14 2017 Information for Students D 0 Fri Nov 10 23:27:03 2017 10395647 blocks of size 4096. 1584691 blocks available smb: \> cd "Information for Staff" dos_clean_name [\Information for Staff\] unix_clean_name [\Information for Staff\] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_open: Calling cli_cm_connect on: server 2012FS share IPC$ do_connect: Making new connection to server 2012FS share IPC$ sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb2fdb0]: subreq: 0x5589adb304a0 gensec_update_send: spnego[0x5589adb2da00]: subreq: 0x5589adb2f3f0 gensec_update_done: ntlmssp[0x5589adb2fdb0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb304a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb30650)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb2da00]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb2f3f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb2f5a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb2fdb0]: subreq: 0x5589adb304a0 gensec_update_send: spnego[0x5589adb2da00]: subreq: 0x5589adb2f0a0 gensec_update_done: ntlmssp[0x5589adb2fdb0]: NT_STATUS_OK tevent_req[0x5589adb304a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb30650)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb2da00]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb2f0a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb2f250)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb2da00]: subreq: 0x5589adb2f910 gensec_update_done: spnego[0x5589adb2da00]: NT_STATUS_OK tevent_req[0x5589adb2f910/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb2fac0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message tconx ok cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb30f60]: subreq: 0x5589adb31e30 gensec_update_send: spnego[0x5589adb2e520]: subreq: 0x5589adb30350 gensec_update_done: ntlmssp[0x5589adb30f60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb31e30/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb31fe0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb2e520]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb30350/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb30500)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb30f60]: subreq: 0x5589adb32560 gensec_update_send: spnego[0x5589adb2e520]: subreq: 0x5589adb30000 gensec_update_done: ntlmssp[0x5589adb30f60]: NT_STATUS_OK tevent_req[0x5589adb32560/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb32710)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb2e520]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb30000/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb301b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb2e520]: subreq: 0x5589adb323c0 gensec_update_done: spnego[0x5589adb2e520]: NT_STATUS_OK tevent_req[0x5589adb323c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb32570)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb2ff70]: subreq: 0x5589adb30560 gensec_update_send: spnego[0x5589adb31a50]: subreq: 0x5589adb2f460 gensec_update_done: ntlmssp[0x5589adb2ff70]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb30560/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb30710)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb31a50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb2f460/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb2f610)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb2ff70]: subreq: 0x5589adb327e0 gensec_update_send: spnego[0x5589adb31a50]: subreq: 0x5589adb2f110 gensec_update_done: ntlmssp[0x5589adb2ff70]: NT_STATUS_OK tevent_req[0x5589adb327e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb32990)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb31a50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb2f110/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb2f2c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb31a50]: subreq: 0x5589adb33100 gensec_update_done: spnego[0x5589adb31a50]: NT_STATUS_OK tevent_req[0x5589adb33100/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb332b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] signed SMB2 message signed SMB2 message smb: \Information for Staff\> dir dos_clean_name [\Information for Staff\*] unix_clean_name [\Information for Staff\*] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb33900]: subreq: 0x5589adb33f80 gensec_update_send: spnego[0x5589adaf9990]: subreq: 0x5589adb30ab0 gensec_update_done: ntlmssp[0x5589adb33900]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb33f80/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb34130)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adaf9990]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb30ab0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb30c60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb33900]: subreq: 0x5589adb34b70 gensec_update_send: spnego[0x5589adaf9990]: subreq: 0x5589adb34130 gensec_update_done: ntlmssp[0x5589adb33900]: NT_STATUS_OK tevent_req[0x5589adb34b70/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb34d20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adaf9990]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb34130/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb342e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adaf9990]: subreq: 0x5589adb30760 gensec_update_done: spnego[0x5589adaf9990]: NT_STATUS_OK tevent_req[0x5589adb30760/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb30910)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb33e40]: subreq: 0x5589adb344c0 gensec_update_send: spnego[0x5589adb316f0]: subreq: 0x5589adb33790 gensec_update_done: ntlmssp[0x5589adb33e40]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb344c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb34670)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb316f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb33790/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb33940)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb33e40]: subreq: 0x5589adb355e0 gensec_update_send: spnego[0x5589adb316f0]: subreq: 0x5589adb304b0 gensec_update_done: ntlmssp[0x5589adb33e40]: NT_STATUS_OK tevent_req[0x5589adb355e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb35790)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb316f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb304b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb30660)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb316f0]: subreq: 0x5589adb304b0 gensec_update_done: spnego[0x5589adb316f0]: NT_STATUS_OK tevent_req[0x5589adb304b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb30660)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\ signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb370a0]: subreq: 0x5589adb37690 gensec_update_send: spnego[0x5589adb34020]: subreq: 0x5589adb36500 gensec_update_done: ntlmssp[0x5589adb370a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb37690/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb37840)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb34020]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb36500/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb366b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb370a0]: subreq: 0x5589adb37f70 gensec_update_send: spnego[0x5589adb34020]: subreq: 0x5589adb37840 gensec_update_done: ntlmssp[0x5589adb370a0]: NT_STATUS_OK tevent_req[0x5589adb37f70/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb38120)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb34020]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb37840/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb379f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb34020]: subreq: 0x5589adb37f70 gensec_update_done: spnego[0x5589adb34020]: NT_STATUS_OK tevent_req[0x5589adb37f70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb38120)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb375e0]: subreq: 0x5589adb37bd0 gensec_update_send: spnego[0x5589adb348c0]: subreq: 0x5589adb36ad0 gensec_update_done: ntlmssp[0x5589adb375e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb37bd0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb37d80)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb348c0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb36ad0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb36c80)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb375e0]: subreq: 0x5589adb37880 gensec_update_send: spnego[0x5589adb348c0]: subreq: 0x5589adb38a20 gensec_update_done: ntlmssp[0x5589adb375e0]: NT_STATUS_OK tevent_req[0x5589adb37880/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb37a30)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb348c0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb38a20/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb38bd0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb348c0]: subreq: 0x5589adb37880 gensec_update_done: spnego[0x5589adb348c0]: NT_STATUS_OK tevent_req[0x5589adb37880/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb37a30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] signed SMB2 message signed SMB2 message signed SMB2 message Total bytes listed: 0 . D 0 Mon Mar 4 11:34:13 2019 .. D 0 Mon Mar 4 11:34:13 2019 Information for Students D 0 Tue Sep 5 04:22:20 2017 10395647 blocks of size 4096. 1584691 blocks available smb: \Information for Staff\> cd "Information for Students" dos_clean_name [\Information for Staff\Information for Students\] unix_clean_name [\Information for Staff\Information for Students\] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb37300]: subreq: 0x5589adb378f0 gensec_update_send: spnego[0x5589adb2ffd0]: subreq: 0x5589adb36ad0 gensec_update_done: ntlmssp[0x5589adb37300]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb378f0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb37aa0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb2ffd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb36ad0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb36c80)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb37300]: subreq: 0x5589adb36c20 gensec_update_send: spnego[0x5589adb2ffd0]: subreq: 0x5589adb378f0 gensec_update_done: ntlmssp[0x5589adb37300]: NT_STATUS_OK tevent_req[0x5589adb36c20/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb36dd0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb2ffd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb378f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb37aa0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb2ffd0]: subreq: 0x5589adb39b50 gensec_update_done: spnego[0x5589adb2ffd0]: NT_STATUS_OK tevent_req[0x5589adb39b50/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb39d00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb37760]: subreq: 0x5589adb39a00 gensec_update_send: spnego[0x5589adb38d40]: subreq: 0x5589adb36bc0 gensec_update_done: ntlmssp[0x5589adb37760]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb39a00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb39bb0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb38d40]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb36bc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb36d70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb37760]: subreq: 0x5589adb39ef0 gensec_update_send: spnego[0x5589adb38d40]: subreq: 0x5589adb36870 gensec_update_done: ntlmssp[0x5589adb37760]: NT_STATUS_OK tevent_req[0x5589adb39ef0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3a0a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb38d40]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb36870/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb36a20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb38d40]: subreq: 0x5589adb37080 gensec_update_done: spnego[0x5589adb38d40]: NT_STATUS_OK tevent_req[0x5589adb37080/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb37230)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb3af60]: subreq: 0x5589adb3b5e0 gensec_update_send: spnego[0x5589adb38930]: subreq: 0x5589adb3a1f0 gensec_update_done: ntlmssp[0x5589adb3af60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3b5e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3b790)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb38930]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3a1f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3a3a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb3af60]: subreq: 0x5589adb3a970 gensec_update_send: spnego[0x5589adb38930]: subreq: 0x5589adb3a1f0 gensec_update_done: ntlmssp[0x5589adb3af60]: NT_STATUS_OK tevent_req[0x5589adb3a970/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3ab20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb38930]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3a1f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3a3a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb38930]: subreq: 0x5589adb3a1f0 gensec_update_done: spnego[0x5589adb38930]: NT_STATUS_OK tevent_req[0x5589adb3a1f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3a3a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb3b520]: subreq: 0x5589adb3bc10 gensec_update_send: spnego[0x5589adb38d50]: subreq: 0x5589adb3a850 gensec_update_done: ntlmssp[0x5589adb3b520]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3bc10/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3bdc0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb38d50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3a850/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3aa00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb3b520]: subreq: 0x5589adb3bc10 gensec_update_send: spnego[0x5589adb38d50]: subreq: 0x5589adb3a500 gensec_update_done: ntlmssp[0x5589adb3b520]: NT_STATUS_OK tevent_req[0x5589adb3bc10/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3bdc0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb38d50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3a500/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3a6b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb38d50]: subreq: 0x5589adb3b070 gensec_update_done: spnego[0x5589adb38d50]: NT_STATUS_OK tevent_req[0x5589adb3b070/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3b220)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] signed SMB2 message signed SMB2 message smb: \Information for Staff\Information for Students\> dir dos_clean_name [\Information for Staff\Information for Students\*] unix_clean_name [\Information for Staff\Information for Students\*] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb3c1f0]: subreq: 0x5589adb3c870 gensec_update_send: spnego[0x5589adb39690]: subreq: 0x5589adb3bc40 gensec_update_done: ntlmssp[0x5589adb3c1f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3c870/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3ca20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb39690]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3bc40/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3bdf0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb3c1f0]: subreq: 0x5589adb3bd40 gensec_update_send: spnego[0x5589adb39690]: subreq: 0x5589adb3c870 gensec_update_done: ntlmssp[0x5589adb3c1f0]: NT_STATUS_OK tevent_req[0x5589adb3bd40/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3bef0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb39690]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3c870/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3ca20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb39690]: subreq: 0x5589adb3b8a0 gensec_update_done: spnego[0x5589adb39690]: NT_STATUS_OK tevent_req[0x5589adb3b8a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3ba50)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb3c4c0]: subreq: 0x5589adb3d050 gensec_update_send: spnego[0x5589adb346d0]: subreq: 0x5589adb3be00 gensec_update_done: ntlmssp[0x5589adb3c4c0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3d050/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3d200)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb346d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3be00/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3bfb0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb3c4c0]: subreq: 0x5589adb3d9d0 gensec_update_send: spnego[0x5589adb346d0]: subreq: 0x5589adb3bab0 gensec_update_done: ntlmssp[0x5589adb3c4c0]: NT_STATUS_OK tevent_req[0x5589adb3d9d0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3db80)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb346d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3bab0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3bc60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb346d0]: subreq: 0x5589adb3c760 gensec_update_done: spnego[0x5589adb346d0]: NT_STATUS_OK tevent_req[0x5589adb3c760/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3c910)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb3e850]: subreq: 0x5589adb3eed0 gensec_update_send: spnego[0x5589adb3db50]: subreq: 0x5589adb3c300 gensec_update_done: ntlmssp[0x5589adb3e850]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3eed0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3f080)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb3db50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3c300/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3c4b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb3e850]: subreq: 0x5589adb3eed0 gensec_update_send: spnego[0x5589adb3db50]: subreq: 0x5589adb3bfb0 gensec_update_done: ntlmssp[0x5589adb3e850]: NT_STATUS_OK tevent_req[0x5589adb3eed0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3f080)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb3db50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3bfb0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3c160)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb3db50]: subreq: 0x5589adb3bfb0 gensec_update_done: spnego[0x5589adb3db50]: NT_STATUS_OK tevent_req[0x5589adb3bfb0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3c160)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb3ed90]: subreq: 0x5589adb3f480 gensec_update_send: spnego[0x5589adb3c8e0]: subreq: 0x5589adb3c390 gensec_update_done: ntlmssp[0x5589adb3ed90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3f480/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3f630)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb3c8e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3c390/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3c540)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb3ed90]: subreq: 0x5589adb3f480 gensec_update_send: spnego[0x5589adb3c8e0]: subreq: 0x5589adb3c040 gensec_update_done: ntlmssp[0x5589adb3ed90]: NT_STATUS_OK tevent_req[0x5589adb3f480/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3f630)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb3c8e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3c040/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3c1f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb3c8e0]: subreq: 0x5589adb3e8e0 gensec_update_done: spnego[0x5589adb3c8e0]: NT_STATUS_OK tevent_req[0x5589adb3e8e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3ea90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\ signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb41ca0]: subreq: 0x5589adb42290 gensec_update_send: spnego[0x5589adb408a0]: subreq: 0x5589adb41100 gensec_update_done: ntlmssp[0x5589adb41ca0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb42290/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb42440)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb408a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb41100/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb412b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb41ca0]: subreq: 0x5589adb423e0 gensec_update_send: spnego[0x5589adb408a0]: subreq: 0x5589adb41100 gensec_update_done: ntlmssp[0x5589adb41ca0]: NT_STATUS_OK tevent_req[0x5589adb423e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb42590)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb408a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb41100/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb412b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb408a0]: subreq: 0x5589adb42b70 gensec_update_done: spnego[0x5589adb408a0]: NT_STATUS_OK tevent_req[0x5589adb42b70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb42d20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb41a30]: subreq: 0x5589adb42020 gensec_update_send: spnego[0x5589adb370e0]: subreq: 0x5589adb411f0 gensec_update_done: ntlmssp[0x5589adb41a30]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb42020/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb421d0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb370e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb411f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb413a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb41a30]: subreq: 0x5589adb42150 gensec_update_send: spnego[0x5589adb370e0]: subreq: 0x5589adb3f530 gensec_update_done: ntlmssp[0x5589adb41a30]: NT_STATUS_OK tevent_req[0x5589adb42150/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb42300)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb370e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3f530/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3f6e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb370e0]: subreq: 0x5589adb411f0 gensec_update_done: spnego[0x5589adb370e0]: NT_STATUS_OK tevent_req[0x5589adb411f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb413a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb44100]: subreq: 0x5589adb446f0 gensec_update_send: spnego[0x5589adb42760]: subreq: 0x5589adb43560 gensec_update_done: ntlmssp[0x5589adb44100]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb446f0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb448a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb42760]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb43560/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb43710)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb44100]: subreq: 0x5589adb44fd0 gensec_update_send: spnego[0x5589adb42760]: subreq: 0x5589adb448a0 gensec_update_done: ntlmssp[0x5589adb44100]: NT_STATUS_OK tevent_req[0x5589adb44fd0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb45180)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb42760]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb448a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb44a50)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb42760]: subreq: 0x5589adb44fd0 gensec_update_done: spnego[0x5589adb42760]: NT_STATUS_OK tevent_req[0x5589adb44fd0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb45180)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb44280]: subreq: 0x5589adb44870 gensec_update_send: spnego[0x5589adb42b20]: subreq: 0x5589adb437d0 gensec_update_done: ntlmssp[0x5589adb44280]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44870/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb44a20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb42b20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb437d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb43980)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb44280]: subreq: 0x5589adb43480 gensec_update_send: spnego[0x5589adb42b20]: subreq: 0x5589adb44a10 gensec_update_done: ntlmssp[0x5589adb44280]: NT_STATUS_OK tevent_req[0x5589adb43480/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb43630)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb42b20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44a10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb44bc0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb42b20]: subreq: 0x5589adb45150 gensec_update_done: spnego[0x5589adb42b20]: NT_STATUS_OK tevent_req[0x5589adb45150/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb45300)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] signed SMB2 message signed SMB2 message signed SMB2 message Total bytes listed: 0 . D 0 Mon Mar 4 11:23:14 2019 .. D 0 Mon Mar 4 11:23:14 2019 All Shared D 0 Mon Mar 4 11:23:14 2019 My Subjects D 0 Fri Nov 10 14:59:41 2017 10395647 blocks of size 4096. 1584691 blocks available smb: \Information for Staff\Information for Students\> cd "My Subjects" dos_clean_name [\Information for Staff\Information for Students\My Subjects\] unix_clean_name [\Information for Staff\Information for Students\My Subjects\] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb3db20]: subreq: 0x5589adb39f60 gensec_update_send: spnego[0x5589adb3d660]: subreq: 0x5589adb455f0 gensec_update_done: ntlmssp[0x5589adb3db20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb39f60/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3a110)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb3d660]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb455f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb457a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb3db20]: subreq: 0x5589adb39c10 gensec_update_send: spnego[0x5589adb3d660]: subreq: 0x5589adb455f0 gensec_update_done: ntlmssp[0x5589adb3db20]: NT_STATUS_OK tevent_req[0x5589adb39c10/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb39dc0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb3d660]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb455f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb457a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb3d660]: subreq: 0x5589adb455f0 gensec_update_done: spnego[0x5589adb3d660]: NT_STATUS_OK tevent_req[0x5589adb455f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb457a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb45e90]: subreq: 0x5589adb39f60 gensec_update_send: spnego[0x5589adb45cc0]: subreq: 0x5589adb41150 gensec_update_done: ntlmssp[0x5589adb45e90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb39f60/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3a110)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb45cc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb41150/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb41300)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb45e90]: subreq: 0x5589adb39c10 gensec_update_send: spnego[0x5589adb45cc0]: subreq: 0x5589adb41150 gensec_update_done: ntlmssp[0x5589adb45e90]: NT_STATUS_OK tevent_req[0x5589adb39c10/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb39dc0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb45cc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb41150/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb41300)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb45cc0]: subreq: 0x5589adb41150 gensec_update_done: spnego[0x5589adb45cc0]: NT_STATUS_OK tevent_req[0x5589adb41150/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb41300)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb410e0]: subreq: 0x5589adb464c0 gensec_update_send: spnego[0x5589adb3dfc0]: subreq: 0x5589adb45000 gensec_update_done: ntlmssp[0x5589adb410e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb464c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb46670)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb3dfc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb45000/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb451b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb410e0]: subreq: 0x5589adb464c0 gensec_update_send: spnego[0x5589adb3dfc0]: subreq: 0x5589adb44cb0 gensec_update_done: ntlmssp[0x5589adb410e0]: NT_STATUS_OK tevent_req[0x5589adb464c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb46670)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb3dfc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44cb0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb44e60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb3dfc0]: subreq: 0x5589adb46b70 gensec_update_done: spnego[0x5589adb3dfc0]: NT_STATUS_OK tevent_req[0x5589adb46b70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb46d20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb461e0]: subreq: 0x5589adb467d0 gensec_update_send: spnego[0x5589adb39bf0]: subreq: 0x5589adb44cb0 gensec_update_done: ntlmssp[0x5589adb461e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb467d0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb46980)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb39bf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44cb0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb44e60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb461e0]: subreq: 0x5589adb45130 gensec_update_send: spnego[0x5589adb39bf0]: subreq: 0x5589adb46970 gensec_update_done: ntlmssp[0x5589adb461e0]: NT_STATUS_OK tevent_req[0x5589adb45130/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb452e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb39bf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb46970/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb46b20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb39bf0]: subreq: 0x5589adb467d0 gensec_update_done: spnego[0x5589adb39bf0]: NT_STATUS_OK tevent_req[0x5589adb467d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb46980)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects signed SMB2 message cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects cli_cm_find: Looking for connection to server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server 2012FS share My Subjects do_connect: Making new connection to server 2012FS share My Subjects sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb48190]: subreq: 0x5589adb48780 gensec_update_send: spnego[0x5589adb44370]: subreq: 0x5589adb47040 gensec_update_done: ntlmssp[0x5589adb48190]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb48780/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb48930)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb44370]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb47040/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb471f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb48190]: subreq: 0x5589adb48780 gensec_update_send: spnego[0x5589adb44370]: subreq: 0x5589adb46cf0 gensec_update_done: ntlmssp[0x5589adb48190]: NT_STATUS_OK tevent_req[0x5589adb48780/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb48930)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb44370]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb46cf0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb46ea0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb44370]: subreq: 0x5589adb46cf0 gensec_update_done: spnego[0x5589adb44370]: NT_STATUS_OK tevent_req[0x5589adb46cf0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb46ea0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] smb: \Information for Staff\Information for Students\My Subjects\> dir dos_clean_name [\Information for Staff\Information for Students\My Subjects\*] unix_clean_name [\Information for Staff\Information for Students\My Subjects\*] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb456b0]: subreq: 0x5589adb48120 gensec_update_send: spnego[0x5589adb435e0]: subreq: 0x5589adb46170 gensec_update_done: ntlmssp[0x5589adb456b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb48120/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb482d0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb435e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb46170/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb46320)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb456b0]: subreq: 0x5589adb464c0 gensec_update_send: spnego[0x5589adb435e0]: subreq: 0x5589adb48120 gensec_update_done: ntlmssp[0x5589adb456b0]: NT_STATUS_OK tevent_req[0x5589adb464c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb46670)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb435e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb48120/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb482d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb435e0]: subreq: 0x5589adb4a270 gensec_update_done: spnego[0x5589adb435e0]: NT_STATUS_OK tevent_req[0x5589adb4a270/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4a420)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb39d60]: subreq: 0x5589adb46650 gensec_update_send: spnego[0x5589adb3cec0]: subreq: 0x5589adb40fc0 gensec_update_done: ntlmssp[0x5589adb39d60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb46650/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb46800)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb3cec0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb40fc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb41170)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb39d60]: subreq: 0x5589adb46650 gensec_update_send: spnego[0x5589adb3cec0]: subreq: 0x5589adb40fc0 gensec_update_done: ntlmssp[0x5589adb39d60]: NT_STATUS_OK tevent_req[0x5589adb46650/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb46800)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb3cec0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb40fc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb41170)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb3cec0]: subreq: 0x5589adb40fc0 gensec_update_done: spnego[0x5589adb3cec0]: NT_STATUS_OK tevent_req[0x5589adb40fc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb41170)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb4a260]: subreq: 0x5589adb481a0 gensec_update_send: spnego[0x5589adb435e0]: subreq: 0x5589adb495b0 gensec_update_done: ntlmssp[0x5589adb4a260]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb481a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb48350)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb435e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb495b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb49760)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb4a260]: subreq: 0x5589adb495b0 gensec_update_send: spnego[0x5589adb435e0]: subreq: 0x5589adb48a80 gensec_update_done: ntlmssp[0x5589adb4a260]: NT_STATUS_OK tevent_req[0x5589adb495b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb49760)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb435e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb48a80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb48c30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb435e0]: subreq: 0x5589adb48a80 gensec_update_done: spnego[0x5589adb435e0]: NT_STATUS_OK tevent_req[0x5589adb48a80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb48c30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb4a340]: subreq: 0x5589adb486e0 gensec_update_send: spnego[0x5589adb39cd0]: subreq: 0x5589adb496b0 gensec_update_done: ntlmssp[0x5589adb4a340]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb486e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb48890)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb39cd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb496b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb49860)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb4a340]: subreq: 0x5589adb48390 gensec_update_send: spnego[0x5589adb39cd0]: subreq: 0x5589adb49360 gensec_update_done: ntlmssp[0x5589adb4a340]: NT_STATUS_OK tevent_req[0x5589adb48390/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb48540)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb39cd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb49360/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb49510)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb39cd0]: subreq: 0x5589adb49c70 gensec_update_done: spnego[0x5589adb39cd0]: NT_STATUS_OK tevent_req[0x5589adb49c70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb49e20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects signed SMB2 message cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects cli_cm_find: Looking for connection to server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: Found match server 2012FS share My Subjects dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb4c9e0]: subreq: 0x5589adb4d060 gensec_update_send: spnego[0x5589adb45060]: subreq: 0x5589adb4bdc0 gensec_update_done: ntlmssp[0x5589adb4c9e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4d060/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4d210)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb45060]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4bdc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4bf70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb4c9e0]: subreq: 0x5589adb4d850 gensec_update_send: spnego[0x5589adb45060]: subreq: 0x5589adb4d210 gensec_update_done: ntlmssp[0x5589adb4c9e0]: NT_STATUS_OK tevent_req[0x5589adb4d850/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4da00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb45060]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4d210/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4d3c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb45060]: subreq: 0x5589adb4bc70 gensec_update_done: spnego[0x5589adb45060]: NT_STATUS_OK tevent_req[0x5589adb4bc70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4be20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb4c330]: subreq: 0x5589adb4c920 gensec_update_send: spnego[0x5589adb49340]: subreq: 0x5589adb4baf0 gensec_update_done: ntlmssp[0x5589adb4c330]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4c920/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4cad0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb49340]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4baf0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4bca0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb4c330]: subreq: 0x5589adb4b7a0 gensec_update_send: spnego[0x5589adb49340]: subreq: 0x5589adb4c5d0 gensec_update_done: ntlmssp[0x5589adb4c330]: NT_STATUS_OK tevent_req[0x5589adb4b7a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4b950)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb49340]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4c5d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4c780)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb49340]: subreq: 0x5589adb4ca70 gensec_update_done: spnego[0x5589adb49340]: NT_STATUS_OK tevent_req[0x5589adb4ca70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4cc20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb4ed60]: subreq: 0x5589adb4f450 gensec_update_send: spnego[0x5589adb4b960]: subreq: 0x5589adb4d700 gensec_update_done: ntlmssp[0x5589adb4ed60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4f450/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4f600)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb4b960]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4d700/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4d8b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb4ed60]: subreq: 0x5589adb4fcb0 gensec_update_send: spnego[0x5589adb4b960]: subreq: 0x5589adb4d700 gensec_update_done: ntlmssp[0x5589adb4ed60]: NT_STATUS_OK tevent_req[0x5589adb4fcb0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4fe60)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb4b960]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4d700/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4d8b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb4b960]: subreq: 0x5589adb4e740 gensec_update_done: spnego[0x5589adb4b960]: NT_STATUS_OK tevent_req[0x5589adb4e740/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4e8f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb4cdf0]: subreq: 0x5589adb4d470 gensec_update_send: spnego[0x5589adb4a900]: subreq: 0x5589adb4c5c0 gensec_update_done: ntlmssp[0x5589adb4cdf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4d470/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4d620)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb4a900]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4c5c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4c770)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb4cdf0]: subreq: 0x5589adb4d5a0 gensec_update_send: spnego[0x5589adb4a900]: subreq: 0x5589adb4c5c0 gensec_update_done: ntlmssp[0x5589adb4cdf0]: NT_STATUS_OK tevent_req[0x5589adb4d5a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4d750)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb4a900]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4c5c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4c770)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb4a900]: subreq: 0x5589adb50070 gensec_update_done: spnego[0x5589adb4a900]: NT_STATUS_OK tevent_req[0x5589adb50070/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb50220)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects signed SMB2 message cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects cli_cm_find: Looking for connection to server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: Found match server 2012FS share My Subjects dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] signed SMB2 message signed SMB2 message signed SMB2 message Total bytes listed: 437495 . D 0 Wed Feb 6 20:08:28 2019 .. D 0 Wed Feb 6 20:08:28 2019 test.docx A 7277 Thu Feb 1 19:48:41 2018 test.png A 430218 Mon Sep 10 09:21:23 2018 Maths D 0 Tue Mar 5 16:13:04 2019 10395647 blocks of size 4096. 1584691 blocks available smb: \Information for Staff\Information for Students\My Subjects\> cd Maths dos_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\] unix_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb3f510]: subreq: 0x5589adb4e4f0 gensec_update_send: spnego[0x5589adb45e90]: subreq: 0x5589adb501e0 gensec_update_done: ntlmssp[0x5589adb3f510]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4e4f0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4e6a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb45e90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb501e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb50390)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb3f510]: subreq: 0x5589adb50400 gensec_update_send: spnego[0x5589adb45e90]: subreq: 0x5589adb4e4f0 gensec_update_done: ntlmssp[0x5589adb3f510]: NT_STATUS_OK tevent_req[0x5589adb50400/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb505b0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb45e90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4e4f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4e6a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb45e90]: subreq: 0x5589adb501e0 gensec_update_done: spnego[0x5589adb45e90]: NT_STATUS_OK tevent_req[0x5589adb501e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb50390)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb4b890]: subreq: 0x5589adb4e4f0 gensec_update_send: spnego[0x5589adb4bfe0]: subreq: 0x5589adb4fe90 gensec_update_done: ntlmssp[0x5589adb4b890]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4e4f0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4e6a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb4bfe0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4fe90/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb50040)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb4b890]: subreq: 0x5589adb4e4f0 gensec_update_send: spnego[0x5589adb4bfe0]: subreq: 0x5589adb4fe90 gensec_update_done: ntlmssp[0x5589adb4b890]: NT_STATUS_OK tevent_req[0x5589adb4e4f0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4e6a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb4bfe0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4fe90/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb50040)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb4bfe0]: subreq: 0x5589adb4fe90 gensec_update_done: spnego[0x5589adb4bfe0]: NT_STATUS_OK tevent_req[0x5589adb4fe90/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb50040)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb4c250]: subreq: 0x5589adb4c840 gensec_update_send: spnego[0x5589adb50bf0]: subreq: 0x5589adb4e9c0 gensec_update_done: ntlmssp[0x5589adb4c250]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4c840/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4c9f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb50bf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4e9c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4eb70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb4c250]: subreq: 0x5589adb4c900 gensec_update_send: spnego[0x5589adb50bf0]: subreq: 0x5589adb4e9c0 gensec_update_done: ntlmssp[0x5589adb4c250]: NT_STATUS_OK tevent_req[0x5589adb4c900/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4cab0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb50bf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4e9c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4eb70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb50bf0]: subreq: 0x5589adb4e9c0 gensec_update_done: spnego[0x5589adb50bf0]: NT_STATUS_OK tevent_req[0x5589adb4e9c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4eb70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb4c610]: subreq: 0x5589adb4cc90 gensec_update_send: spnego[0x5589adb4dd80]: subreq: 0x5589adb4ed10 gensec_update_done: ntlmssp[0x5589adb4c610]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4cc90/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4ce40)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb4dd80]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4ed10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4eec0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb4c610]: subreq: 0x5589adb4c940 gensec_update_send: spnego[0x5589adb4dd80]: subreq: 0x5589adb4ed10 gensec_update_done: ntlmssp[0x5589adb4c610]: NT_STATUS_OK tevent_req[0x5589adb4c940/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4caf0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb4dd80]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4ed10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4eec0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb4dd80]: subreq: 0x5589adb4d2f0 gensec_update_done: spnego[0x5589adb4dd80]: NT_STATUS_OK tevent_req[0x5589adb4d2f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4d4a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths signed SMB2 message cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects cli_cm_find: Looking for connection to server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: Found match server 2012FS share My Subjects dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] signed SMB2 message signed SMB2 message smb: \Information for Staff\Information for Students\My Subjects\Maths\> dir dos_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\*] unix_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\*] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb4ca20]: subreq: 0x5589adb4d5b0 gensec_update_send: spnego[0x5589adb48980]: subreq: 0x5589adb44710 gensec_update_done: ntlmssp[0x5589adb4ca20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4d5b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4d760)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb48980]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44710/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb448c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb4ca20]: subreq: 0x5589adb4ef70 gensec_update_send: spnego[0x5589adb48980]: subreq: 0x5589adb44710 gensec_update_done: ntlmssp[0x5589adb4ca20]: NT_STATUS_OK tevent_req[0x5589adb4ef70/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4f120)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb48980]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44710/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb448c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb48980]: subreq: 0x5589adb50f10 gensec_update_done: spnego[0x5589adb48980]: NT_STATUS_OK tevent_req[0x5589adb50f10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb510c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb4ec60]: subreq: 0x5589adb4c270 gensec_update_send: spnego[0x5589adb45e90]: subreq: 0x5589adb44710 gensec_update_done: ntlmssp[0x5589adb4ec60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4c270/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4c420)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb45e90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44710/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb448c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb4ec60]: subreq: 0x5589adb4c270 gensec_update_send: spnego[0x5589adb45e90]: subreq: 0x5589adb44710 gensec_update_done: ntlmssp[0x5589adb4ec60]: NT_STATUS_OK tevent_req[0x5589adb4c270/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4c420)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb45e90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44710/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb448c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb45e90]: subreq: 0x5589adb44710 gensec_update_done: spnego[0x5589adb45e90]: NT_STATUS_OK tevent_req[0x5589adb44710/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb448c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb51940]: subreq: 0x5589adb51f30 gensec_update_send: spnego[0x5589adb51160]: subreq: 0x5589adb4c270 gensec_update_done: ntlmssp[0x5589adb51940]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb51f30/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb520e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb51160]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4c270/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4c420)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb51940]: subreq: 0x5589adb52810 gensec_update_send: spnego[0x5589adb51160]: subreq: 0x5589adb51be0 gensec_update_done: ntlmssp[0x5589adb51940]: NT_STATUS_OK tevent_req[0x5589adb52810/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb529c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb51160]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb51be0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb51d90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb51160]: subreq: 0x5589adb52810 gensec_update_done: spnego[0x5589adb51160]: NT_STATUS_OK tevent_req[0x5589adb52810/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb529c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb51bc0]: subreq: 0x5589adb52240 gensec_update_send: spnego[0x5589adb4d440]: subreq: 0x5589adb515a0 gensec_update_done: ntlmssp[0x5589adb51bc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb52240/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb523f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb4d440]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb515a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb51750)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb51bc0]: subreq: 0x5589adb52240 gensec_update_send: spnego[0x5589adb4d440]: subreq: 0x5589adb515a0 gensec_update_done: ntlmssp[0x5589adb51bc0]: NT_STATUS_OK tevent_req[0x5589adb52240/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb523f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb4d440]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb515a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb51750)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb4d440]: subreq: 0x5589adb515a0 gensec_update_done: spnego[0x5589adb4d440]: NT_STATUS_OK tevent_req[0x5589adb515a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb51750)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths signed SMB2 message cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects cli_cm_find: Looking for connection to server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: Found match server 2012FS share My Subjects dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb53790]: subreq: 0x5589adb54250 gensec_update_send: spnego[0x5589adb4ac10]: subreq: 0x5589adb521f0 gensec_update_done: ntlmssp[0x5589adb53790]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb54250/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb54400)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb4ac10]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb521f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb523a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb53790]: subreq: 0x5589adb54b30 gensec_update_send: spnego[0x5589adb4ac10]: subreq: 0x5589adb54400 gensec_update_done: ntlmssp[0x5589adb53790]: NT_STATUS_OK tevent_req[0x5589adb54b30/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb54ce0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb4ac10]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb54400/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb545b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb4ac10]: subreq: 0x5589adb521f0 gensec_update_done: spnego[0x5589adb4ac10]: NT_STATUS_OK tevent_req[0x5589adb521f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb523a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb54190]: subreq: 0x5589adb54880 gensec_update_send: spnego[0x5589adb51620]: subreq: 0x5589adb527b0 gensec_update_done: ntlmssp[0x5589adb54190]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb54880/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb54a30)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb51620]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb527b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb52960)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb54190]: subreq: 0x5589adb54880 gensec_update_send: spnego[0x5589adb51620]: subreq: 0x5589adb52460 gensec_update_done: ntlmssp[0x5589adb54190]: NT_STATUS_OK tevent_req[0x5589adb54880/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb54a30)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb51620]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb52460/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb52610)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb51620]: subreq: 0x5589adb55020 gensec_update_done: spnego[0x5589adb51620]: NT_STATUS_OK tevent_req[0x5589adb55020/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb551d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb55db0]: subreq: 0x5589adb56740 gensec_update_send: spnego[0x5589adb54120]: subreq: 0x5589adb55290 gensec_update_done: ntlmssp[0x5589adb55db0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb56740/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb568f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb54120]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb55290/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb55440)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb55db0]: subreq: 0x5589adb55750 gensec_update_send: spnego[0x5589adb54120]: subreq: 0x5589adb54f40 gensec_update_done: ntlmssp[0x5589adb55db0]: NT_STATUS_OK tevent_req[0x5589adb55750/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb55900)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb54120]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb54f40/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb550f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb54120]: subreq: 0x5589adb563f0 gensec_update_done: spnego[0x5589adb54120]: NT_STATUS_OK tevent_req[0x5589adb563f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb565a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5589adb56580]: subreq: 0x5589adb56c00 gensec_update_send: spnego[0x5589adb51f70]: subreq: 0x5589adb558e0 gensec_update_done: ntlmssp[0x5589adb56580]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb56c00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb56db0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5589adb51f70]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb558e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb55a90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5589adb56580]: subreq: 0x5589adb56c00 gensec_update_send: spnego[0x5589adb51f70]: subreq: 0x5589adb558e0 gensec_update_done: ntlmssp[0x5589adb56580]: NT_STATUS_OK tevent_req[0x5589adb56c00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb56db0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5589adb51f70]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb558e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb55a90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5589adb51f70]: subreq: 0x5589adb568b0 gensec_update_done: spnego[0x5589adb51f70]: NT_STATUS_OK tevent_req[0x5589adb568b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb56a60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths signed SMB2 message cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects cli_cm_find: Looking for connection to server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: Found match server 2012FS share My Subjects dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] signed SMB2 message signed SMB2 message signed SMB2 message Total bytes listed: 0 . D 0 Tue Mar 5 16:13:04 2019 .. D 0 Tue Mar 5 16:13:04 2019 Level 1 D 0 Sat Nov 11 20:07:34 2017 10395647 blocks of size 4096. 1584691 blocks available smb: \Information for Staff\Information for Students\My Subjects\Maths\> exit signed SMB2 message