The Samba-Bugzilla – Attachment 14917 Details for
Bug 13824
libsmbclient leaks when accessing files inside nested DFS namespaces
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Debug output from smbclient with patch
smbclient-rebuilt.txt (text/plain), 360.36 KB, created by
Chris
on 2019-03-12 00:46:34 UTC
(
hide
)
Description:
Debug output from smbclient with patch
Filename:
MIME Type:
Creator:
Chris
Created:
2019-03-12 00:46:34 UTC
Size:
360.36 KB
patch
obsolete
>INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >lp_load_ex: refreshing parameters >Initialising global parameters >rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >pm_process() returned Yes >lp_servicenumber: couldn't find homes >messaging_dgm_ref: messaging_dgm_init returned Success >messaging_dgm_ref: unique = 15604166658537738700 >Registering messaging pointer for type 2 - private_data=(nil) >Registering messaging pointer for type 9 - private_data=(nil) >Registered MSG_REQ_POOL_USAGE >Registering messaging pointer for type 11 - private_data=(nil) >Registering messaging pointer for type 12 - private_data=(nil) >Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED >Registering messaging pointer for type 1 - private_data=(nil) >Registering messaging pointer for type 5 - private_data=(nil) >Registering messaging pointer for type 51 - private_data=(nil) >messaging_init_internal: my id: 23892 >lp_load_ex: refreshing parameters >Freeing parametrics: >Initialising global parameters >rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >pm_process() returned Yes >lp_servicenumber: couldn't find homes >added interface ens160 ip=10.1.1.74 bcast=10.1.1.255 netmask=255.255.255.0 >Netbios name list:- >my_netbios_names[0]="SMBTEST" >Client started (version 4.9.4). >cli_cm_open: Calling cli_cm_connect on: server (null) share \\domain.com\DFS >do_connect: Making new connection to server (null) share \\domain.com\DFS >Opening cache file at /usr/local/samba/var/cache/gencache.tdb >Opening cache file at /usr/local/samba/var/lock/gencache_notrans.tdb >Adding cache entry with key=[AD_SITENAME/DOMAIN/] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552353353 seconds in the past) >Could not get allrecord lock on gencache_notrans.tdb: Locking error >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >Enter DOMAIN.COM\username's password: kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >GENSEC backend 'gssapi_spnego' registered >GENSEC backend 'gssapi_krb5' registered >GENSEC backend 'gssapi_krb5_sasl' registered >GENSEC backend 'spnego' registered >GENSEC backend 'schannel' registered >GENSEC backend 'naclrpc_as_system' registered >GENSEC backend 'sasl-EXTERNAL' registered >GENSEC backend 'ntlmssp' registered >GENSEC backend 'ntlmssp_resume_ccache' registered >GENSEC backend 'http_basic' registered >GENSEC backend 'http_ntlm' registered >GENSEC backend 'http_negotiate' registered >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb00aa0]: subreq: 0x5589adb01090 >gensec_update_send: spnego[0x5589adafc5c0]: subreq: 0x5589adafff10 >gensec_update_done: ntlmssp[0x5589adb00aa0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb01090/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb01240)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adafc5c0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adafff10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb000c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb00aa0]: subreq: 0x5589adb128b0 >gensec_update_send: spnego[0x5589adafc5c0]: subreq: 0x5589adb00e40 >gensec_update_done: ntlmssp[0x5589adb00aa0]: NT_STATUS_OK tevent_req[0x5589adb128b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb12a60)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adafc5c0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb00e40/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb00ff0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adafc5c0]: subreq: 0x5589adb00e40 >gensec_update_done: spnego[0x5589adafc5c0]: NT_STATUS_OK tevent_req[0x5589adb00e40/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb00ff0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share DFS >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adafebb0]: subreq: 0x5589adb12690 >gensec_update_send: spnego[0x5589adb00da0]: subreq: 0x5589adaff4c0 >gensec_update_done: ntlmssp[0x5589adafebb0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb12690/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb12840)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb00da0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adaff4c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adaff670)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adafebb0]: subreq: 0x5589adb12690 >gensec_update_send: spnego[0x5589adb00da0]: subreq: 0x5589adaff4c0 >gensec_update_done: ntlmssp[0x5589adafebb0]: NT_STATUS_OK tevent_req[0x5589adb12690/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb12840)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb00da0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adaff4c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adaff670)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb00da0]: subreq: 0x5589adb136e0 >gensec_update_done: spnego[0x5589adb00da0]: NT_STATUS_OK tevent_req[0x5589adb136e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb13890)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok > >Try "help" to get a list of possible commands. >smb: \> dir >dos_clean_name [\*] >unix_clean_name [\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\ >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\ >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 0 > . D 0 Fri Nov 10 23:27:03 2017 > .. D 0 Fri Nov 10 23:27:03 2017 > Information for Staff D 0 Tue Sep 5 04:13:14 2017 > Information for Students D 0 Fri Nov 10 23:27:03 2017 > > 10395647 blocks of size 4096. 1584691 blocks available >smb: \> cd "Information for Staff" >dos_clean_name [\Information for Staff\] >unix_clean_name [\Information for Staff\] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_open: Calling cli_cm_connect on: server 2012FS share IPC$ >do_connect: Making new connection to server 2012FS share IPC$ >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb2fdb0]: subreq: 0x5589adb304a0 >gensec_update_send: spnego[0x5589adb2da00]: subreq: 0x5589adb2f3f0 >gensec_update_done: ntlmssp[0x5589adb2fdb0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb304a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb30650)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb2da00]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb2f3f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb2f5a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb2fdb0]: subreq: 0x5589adb304a0 >gensec_update_send: spnego[0x5589adb2da00]: subreq: 0x5589adb2f0a0 >gensec_update_done: ntlmssp[0x5589adb2fdb0]: NT_STATUS_OK tevent_req[0x5589adb304a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb30650)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb2da00]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb2f0a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb2f250)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb2da00]: subreq: 0x5589adb2f910 >gensec_update_done: spnego[0x5589adb2da00]: NT_STATUS_OK tevent_req[0x5589adb2f910/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb2fac0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message > tconx ok >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb30f60]: subreq: 0x5589adb31e30 >gensec_update_send: spnego[0x5589adb2e520]: subreq: 0x5589adb30350 >gensec_update_done: ntlmssp[0x5589adb30f60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb31e30/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb31fe0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb2e520]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb30350/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb30500)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb30f60]: subreq: 0x5589adb32560 >gensec_update_send: spnego[0x5589adb2e520]: subreq: 0x5589adb30000 >gensec_update_done: ntlmssp[0x5589adb30f60]: NT_STATUS_OK tevent_req[0x5589adb32560/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb32710)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb2e520]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb30000/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb301b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb2e520]: subreq: 0x5589adb323c0 >gensec_update_done: spnego[0x5589adb2e520]: NT_STATUS_OK tevent_req[0x5589adb323c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb32570)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb2ff70]: subreq: 0x5589adb30560 >gensec_update_send: spnego[0x5589adb31a50]: subreq: 0x5589adb2f460 >gensec_update_done: ntlmssp[0x5589adb2ff70]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb30560/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb30710)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb31a50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb2f460/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb2f610)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb2ff70]: subreq: 0x5589adb327e0 >gensec_update_send: spnego[0x5589adb31a50]: subreq: 0x5589adb2f110 >gensec_update_done: ntlmssp[0x5589adb2ff70]: NT_STATUS_OK tevent_req[0x5589adb327e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb32990)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb31a50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb2f110/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb2f2c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb31a50]: subreq: 0x5589adb33100 >gensec_update_done: spnego[0x5589adb31a50]: NT_STATUS_OK tevent_req[0x5589adb33100/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb332b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >signed SMB2 message >signed SMB2 message >smb: \Information for Staff\> dir >dos_clean_name [\Information for Staff\*] >unix_clean_name [\Information for Staff\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb33900]: subreq: 0x5589adb33f80 >gensec_update_send: spnego[0x5589adaf9990]: subreq: 0x5589adb30ab0 >gensec_update_done: ntlmssp[0x5589adb33900]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb33f80/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb34130)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adaf9990]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb30ab0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb30c60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb33900]: subreq: 0x5589adb34b70 >gensec_update_send: spnego[0x5589adaf9990]: subreq: 0x5589adb34130 >gensec_update_done: ntlmssp[0x5589adb33900]: NT_STATUS_OK tevent_req[0x5589adb34b70/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb34d20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adaf9990]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb34130/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb342e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adaf9990]: subreq: 0x5589adb30760 >gensec_update_done: spnego[0x5589adaf9990]: NT_STATUS_OK tevent_req[0x5589adb30760/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb30910)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb33e40]: subreq: 0x5589adb344c0 >gensec_update_send: spnego[0x5589adb316f0]: subreq: 0x5589adb33790 >gensec_update_done: ntlmssp[0x5589adb33e40]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb344c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb34670)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb316f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb33790/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb33940)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb33e40]: subreq: 0x5589adb355e0 >gensec_update_send: spnego[0x5589adb316f0]: subreq: 0x5589adb304b0 >gensec_update_done: ntlmssp[0x5589adb33e40]: NT_STATUS_OK tevent_req[0x5589adb355e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb35790)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb316f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb304b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb30660)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb316f0]: subreq: 0x5589adb304b0 >gensec_update_done: spnego[0x5589adb316f0]: NT_STATUS_OK tevent_req[0x5589adb304b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb30660)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\ >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb370a0]: subreq: 0x5589adb37690 >gensec_update_send: spnego[0x5589adb34020]: subreq: 0x5589adb36500 >gensec_update_done: ntlmssp[0x5589adb370a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb37690/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb37840)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb34020]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb36500/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb366b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb370a0]: subreq: 0x5589adb37f70 >gensec_update_send: spnego[0x5589adb34020]: subreq: 0x5589adb37840 >gensec_update_done: ntlmssp[0x5589adb370a0]: NT_STATUS_OK tevent_req[0x5589adb37f70/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb38120)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb34020]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb37840/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb379f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb34020]: subreq: 0x5589adb37f70 >gensec_update_done: spnego[0x5589adb34020]: NT_STATUS_OK tevent_req[0x5589adb37f70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb38120)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb375e0]: subreq: 0x5589adb37bd0 >gensec_update_send: spnego[0x5589adb348c0]: subreq: 0x5589adb36ad0 >gensec_update_done: ntlmssp[0x5589adb375e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb37bd0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb37d80)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb348c0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb36ad0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb36c80)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb375e0]: subreq: 0x5589adb37880 >gensec_update_send: spnego[0x5589adb348c0]: subreq: 0x5589adb38a20 >gensec_update_done: ntlmssp[0x5589adb375e0]: NT_STATUS_OK tevent_req[0x5589adb37880/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb37a30)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb348c0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb38a20/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb38bd0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb348c0]: subreq: 0x5589adb37880 >gensec_update_done: spnego[0x5589adb348c0]: NT_STATUS_OK tevent_req[0x5589adb37880/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb37a30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 0 > . D 0 Mon Mar 4 11:34:13 2019 > .. D 0 Mon Mar 4 11:34:13 2019 > Information for Students D 0 Tue Sep 5 04:22:20 2017 > > 10395647 blocks of size 4096. 1584691 blocks available >smb: \Information for Staff\> cd "Information for Students" >dos_clean_name [\Information for Staff\Information for Students\] >unix_clean_name [\Information for Staff\Information for Students\] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb37300]: subreq: 0x5589adb378f0 >gensec_update_send: spnego[0x5589adb2ffd0]: subreq: 0x5589adb36ad0 >gensec_update_done: ntlmssp[0x5589adb37300]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb378f0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb37aa0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb2ffd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb36ad0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb36c80)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb37300]: subreq: 0x5589adb36c20 >gensec_update_send: spnego[0x5589adb2ffd0]: subreq: 0x5589adb378f0 >gensec_update_done: ntlmssp[0x5589adb37300]: NT_STATUS_OK tevent_req[0x5589adb36c20/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb36dd0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb2ffd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb378f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb37aa0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb2ffd0]: subreq: 0x5589adb39b50 >gensec_update_done: spnego[0x5589adb2ffd0]: NT_STATUS_OK tevent_req[0x5589adb39b50/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb39d00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb37760]: subreq: 0x5589adb39a00 >gensec_update_send: spnego[0x5589adb38d40]: subreq: 0x5589adb36bc0 >gensec_update_done: ntlmssp[0x5589adb37760]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb39a00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb39bb0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb38d40]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb36bc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb36d70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb37760]: subreq: 0x5589adb39ef0 >gensec_update_send: spnego[0x5589adb38d40]: subreq: 0x5589adb36870 >gensec_update_done: ntlmssp[0x5589adb37760]: NT_STATUS_OK tevent_req[0x5589adb39ef0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3a0a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb38d40]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb36870/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb36a20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb38d40]: subreq: 0x5589adb37080 >gensec_update_done: spnego[0x5589adb38d40]: NT_STATUS_OK tevent_req[0x5589adb37080/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb37230)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb3af60]: subreq: 0x5589adb3b5e0 >gensec_update_send: spnego[0x5589adb38930]: subreq: 0x5589adb3a1f0 >gensec_update_done: ntlmssp[0x5589adb3af60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3b5e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3b790)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb38930]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3a1f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3a3a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb3af60]: subreq: 0x5589adb3a970 >gensec_update_send: spnego[0x5589adb38930]: subreq: 0x5589adb3a1f0 >gensec_update_done: ntlmssp[0x5589adb3af60]: NT_STATUS_OK tevent_req[0x5589adb3a970/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3ab20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb38930]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3a1f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3a3a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb38930]: subreq: 0x5589adb3a1f0 >gensec_update_done: spnego[0x5589adb38930]: NT_STATUS_OK tevent_req[0x5589adb3a1f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3a3a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb3b520]: subreq: 0x5589adb3bc10 >gensec_update_send: spnego[0x5589adb38d50]: subreq: 0x5589adb3a850 >gensec_update_done: ntlmssp[0x5589adb3b520]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3bc10/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3bdc0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb38d50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3a850/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3aa00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb3b520]: subreq: 0x5589adb3bc10 >gensec_update_send: spnego[0x5589adb38d50]: subreq: 0x5589adb3a500 >gensec_update_done: ntlmssp[0x5589adb3b520]: NT_STATUS_OK tevent_req[0x5589adb3bc10/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3bdc0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb38d50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3a500/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3a6b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb38d50]: subreq: 0x5589adb3b070 >gensec_update_done: spnego[0x5589adb38d50]: NT_STATUS_OK tevent_req[0x5589adb3b070/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3b220)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >signed SMB2 message >signed SMB2 message >smb: \Information for Staff\Information for Students\> dir >dos_clean_name [\Information for Staff\Information for Students\*] >unix_clean_name [\Information for Staff\Information for Students\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb3c1f0]: subreq: 0x5589adb3c870 >gensec_update_send: spnego[0x5589adb39690]: subreq: 0x5589adb3bc40 >gensec_update_done: ntlmssp[0x5589adb3c1f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3c870/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3ca20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb39690]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3bc40/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3bdf0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb3c1f0]: subreq: 0x5589adb3bd40 >gensec_update_send: spnego[0x5589adb39690]: subreq: 0x5589adb3c870 >gensec_update_done: ntlmssp[0x5589adb3c1f0]: NT_STATUS_OK tevent_req[0x5589adb3bd40/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3bef0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb39690]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3c870/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3ca20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb39690]: subreq: 0x5589adb3b8a0 >gensec_update_done: spnego[0x5589adb39690]: NT_STATUS_OK tevent_req[0x5589adb3b8a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3ba50)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb3c4c0]: subreq: 0x5589adb3d050 >gensec_update_send: spnego[0x5589adb346d0]: subreq: 0x5589adb3be00 >gensec_update_done: ntlmssp[0x5589adb3c4c0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3d050/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3d200)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb346d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3be00/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3bfb0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb3c4c0]: subreq: 0x5589adb3d9d0 >gensec_update_send: spnego[0x5589adb346d0]: subreq: 0x5589adb3bab0 >gensec_update_done: ntlmssp[0x5589adb3c4c0]: NT_STATUS_OK tevent_req[0x5589adb3d9d0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3db80)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb346d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3bab0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3bc60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb346d0]: subreq: 0x5589adb3c760 >gensec_update_done: spnego[0x5589adb346d0]: NT_STATUS_OK tevent_req[0x5589adb3c760/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3c910)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb3e850]: subreq: 0x5589adb3eed0 >gensec_update_send: spnego[0x5589adb3db50]: subreq: 0x5589adb3c300 >gensec_update_done: ntlmssp[0x5589adb3e850]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3eed0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3f080)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb3db50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3c300/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3c4b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb3e850]: subreq: 0x5589adb3eed0 >gensec_update_send: spnego[0x5589adb3db50]: subreq: 0x5589adb3bfb0 >gensec_update_done: ntlmssp[0x5589adb3e850]: NT_STATUS_OK tevent_req[0x5589adb3eed0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3f080)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb3db50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3bfb0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3c160)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb3db50]: subreq: 0x5589adb3bfb0 >gensec_update_done: spnego[0x5589adb3db50]: NT_STATUS_OK tevent_req[0x5589adb3bfb0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3c160)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb3ed90]: subreq: 0x5589adb3f480 >gensec_update_send: spnego[0x5589adb3c8e0]: subreq: 0x5589adb3c390 >gensec_update_done: ntlmssp[0x5589adb3ed90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3f480/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3f630)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb3c8e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3c390/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3c540)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb3ed90]: subreq: 0x5589adb3f480 >gensec_update_send: spnego[0x5589adb3c8e0]: subreq: 0x5589adb3c040 >gensec_update_done: ntlmssp[0x5589adb3ed90]: NT_STATUS_OK tevent_req[0x5589adb3f480/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3f630)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb3c8e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3c040/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3c1f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb3c8e0]: subreq: 0x5589adb3e8e0 >gensec_update_done: spnego[0x5589adb3c8e0]: NT_STATUS_OK tevent_req[0x5589adb3e8e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3ea90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\ >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb41ca0]: subreq: 0x5589adb42290 >gensec_update_send: spnego[0x5589adb408a0]: subreq: 0x5589adb41100 >gensec_update_done: ntlmssp[0x5589adb41ca0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb42290/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb42440)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb408a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb41100/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb412b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb41ca0]: subreq: 0x5589adb423e0 >gensec_update_send: spnego[0x5589adb408a0]: subreq: 0x5589adb41100 >gensec_update_done: ntlmssp[0x5589adb41ca0]: NT_STATUS_OK tevent_req[0x5589adb423e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb42590)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb408a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb41100/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb412b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb408a0]: subreq: 0x5589adb42b70 >gensec_update_done: spnego[0x5589adb408a0]: NT_STATUS_OK tevent_req[0x5589adb42b70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb42d20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb41a30]: subreq: 0x5589adb42020 >gensec_update_send: spnego[0x5589adb370e0]: subreq: 0x5589adb411f0 >gensec_update_done: ntlmssp[0x5589adb41a30]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb42020/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb421d0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb370e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb411f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb413a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb41a30]: subreq: 0x5589adb42150 >gensec_update_send: spnego[0x5589adb370e0]: subreq: 0x5589adb3f530 >gensec_update_done: ntlmssp[0x5589adb41a30]: NT_STATUS_OK tevent_req[0x5589adb42150/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb42300)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb370e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb3f530/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb3f6e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb370e0]: subreq: 0x5589adb411f0 >gensec_update_done: spnego[0x5589adb370e0]: NT_STATUS_OK tevent_req[0x5589adb411f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb413a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb44100]: subreq: 0x5589adb446f0 >gensec_update_send: spnego[0x5589adb42760]: subreq: 0x5589adb43560 >gensec_update_done: ntlmssp[0x5589adb44100]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb446f0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb448a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb42760]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb43560/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb43710)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb44100]: subreq: 0x5589adb44fd0 >gensec_update_send: spnego[0x5589adb42760]: subreq: 0x5589adb448a0 >gensec_update_done: ntlmssp[0x5589adb44100]: NT_STATUS_OK tevent_req[0x5589adb44fd0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb45180)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb42760]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb448a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb44a50)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb42760]: subreq: 0x5589adb44fd0 >gensec_update_done: spnego[0x5589adb42760]: NT_STATUS_OK tevent_req[0x5589adb44fd0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb45180)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb44280]: subreq: 0x5589adb44870 >gensec_update_send: spnego[0x5589adb42b20]: subreq: 0x5589adb437d0 >gensec_update_done: ntlmssp[0x5589adb44280]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44870/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb44a20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb42b20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb437d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb43980)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb44280]: subreq: 0x5589adb43480 >gensec_update_send: spnego[0x5589adb42b20]: subreq: 0x5589adb44a10 >gensec_update_done: ntlmssp[0x5589adb44280]: NT_STATUS_OK tevent_req[0x5589adb43480/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb43630)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb42b20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44a10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb44bc0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb42b20]: subreq: 0x5589adb45150 >gensec_update_done: spnego[0x5589adb42b20]: NT_STATUS_OK tevent_req[0x5589adb45150/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb45300)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 0 > . D 0 Mon Mar 4 11:23:14 2019 > .. D 0 Mon Mar 4 11:23:14 2019 > All Shared D 0 Mon Mar 4 11:23:14 2019 > My Subjects D 0 Fri Nov 10 14:59:41 2017 > > 10395647 blocks of size 4096. 1584691 blocks available >smb: \Information for Staff\Information for Students\> cd "My Subjects" >dos_clean_name [\Information for Staff\Information for Students\My Subjects\] >unix_clean_name [\Information for Staff\Information for Students\My Subjects\] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb3db20]: subreq: 0x5589adb39f60 >gensec_update_send: spnego[0x5589adb3d660]: subreq: 0x5589adb455f0 >gensec_update_done: ntlmssp[0x5589adb3db20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb39f60/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3a110)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb3d660]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb455f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb457a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb3db20]: subreq: 0x5589adb39c10 >gensec_update_send: spnego[0x5589adb3d660]: subreq: 0x5589adb455f0 >gensec_update_done: ntlmssp[0x5589adb3db20]: NT_STATUS_OK tevent_req[0x5589adb39c10/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb39dc0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb3d660]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb455f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb457a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb3d660]: subreq: 0x5589adb455f0 >gensec_update_done: spnego[0x5589adb3d660]: NT_STATUS_OK tevent_req[0x5589adb455f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb457a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb45e90]: subreq: 0x5589adb39f60 >gensec_update_send: spnego[0x5589adb45cc0]: subreq: 0x5589adb41150 >gensec_update_done: ntlmssp[0x5589adb45e90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb39f60/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb3a110)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb45cc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb41150/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb41300)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb45e90]: subreq: 0x5589adb39c10 >gensec_update_send: spnego[0x5589adb45cc0]: subreq: 0x5589adb41150 >gensec_update_done: ntlmssp[0x5589adb45e90]: NT_STATUS_OK tevent_req[0x5589adb39c10/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb39dc0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb45cc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb41150/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb41300)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb45cc0]: subreq: 0x5589adb41150 >gensec_update_done: spnego[0x5589adb45cc0]: NT_STATUS_OK tevent_req[0x5589adb41150/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb41300)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb410e0]: subreq: 0x5589adb464c0 >gensec_update_send: spnego[0x5589adb3dfc0]: subreq: 0x5589adb45000 >gensec_update_done: ntlmssp[0x5589adb410e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb464c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb46670)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb3dfc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb45000/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb451b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb410e0]: subreq: 0x5589adb464c0 >gensec_update_send: spnego[0x5589adb3dfc0]: subreq: 0x5589adb44cb0 >gensec_update_done: ntlmssp[0x5589adb410e0]: NT_STATUS_OK tevent_req[0x5589adb464c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb46670)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb3dfc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44cb0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb44e60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb3dfc0]: subreq: 0x5589adb46b70 >gensec_update_done: spnego[0x5589adb3dfc0]: NT_STATUS_OK tevent_req[0x5589adb46b70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb46d20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb461e0]: subreq: 0x5589adb467d0 >gensec_update_send: spnego[0x5589adb39bf0]: subreq: 0x5589adb44cb0 >gensec_update_done: ntlmssp[0x5589adb461e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb467d0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb46980)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb39bf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44cb0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb44e60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb461e0]: subreq: 0x5589adb45130 >gensec_update_send: spnego[0x5589adb39bf0]: subreq: 0x5589adb46970 >gensec_update_done: ntlmssp[0x5589adb461e0]: NT_STATUS_OK tevent_req[0x5589adb45130/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb452e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb39bf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb46970/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb46b20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb39bf0]: subreq: 0x5589adb467d0 >gensec_update_done: spnego[0x5589adb39bf0]: NT_STATUS_OK tevent_req[0x5589adb467d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb46980)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server 2012FS share My Subjects >do_connect: Making new connection to server 2012FS share My Subjects >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb48190]: subreq: 0x5589adb48780 >gensec_update_send: spnego[0x5589adb44370]: subreq: 0x5589adb47040 >gensec_update_done: ntlmssp[0x5589adb48190]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb48780/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb48930)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb44370]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb47040/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb471f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb48190]: subreq: 0x5589adb48780 >gensec_update_send: spnego[0x5589adb44370]: subreq: 0x5589adb46cf0 >gensec_update_done: ntlmssp[0x5589adb48190]: NT_STATUS_OK tevent_req[0x5589adb48780/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb48930)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb44370]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb46cf0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb46ea0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb44370]: subreq: 0x5589adb46cf0 >gensec_update_done: spnego[0x5589adb44370]: NT_STATUS_OK tevent_req[0x5589adb46cf0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb46ea0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >smb: \Information for Staff\Information for Students\My Subjects\> dir >dos_clean_name [\Information for Staff\Information for Students\My Subjects\*] >unix_clean_name [\Information for Staff\Information for Students\My Subjects\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb456b0]: subreq: 0x5589adb48120 >gensec_update_send: spnego[0x5589adb435e0]: subreq: 0x5589adb46170 >gensec_update_done: ntlmssp[0x5589adb456b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb48120/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb482d0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb435e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb46170/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb46320)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb456b0]: subreq: 0x5589adb464c0 >gensec_update_send: spnego[0x5589adb435e0]: subreq: 0x5589adb48120 >gensec_update_done: ntlmssp[0x5589adb456b0]: NT_STATUS_OK tevent_req[0x5589adb464c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb46670)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb435e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb48120/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb482d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb435e0]: subreq: 0x5589adb4a270 >gensec_update_done: spnego[0x5589adb435e0]: NT_STATUS_OK tevent_req[0x5589adb4a270/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4a420)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb39d60]: subreq: 0x5589adb46650 >gensec_update_send: spnego[0x5589adb3cec0]: subreq: 0x5589adb40fc0 >gensec_update_done: ntlmssp[0x5589adb39d60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb46650/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb46800)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb3cec0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb40fc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb41170)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb39d60]: subreq: 0x5589adb46650 >gensec_update_send: spnego[0x5589adb3cec0]: subreq: 0x5589adb40fc0 >gensec_update_done: ntlmssp[0x5589adb39d60]: NT_STATUS_OK tevent_req[0x5589adb46650/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb46800)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb3cec0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb40fc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb41170)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb3cec0]: subreq: 0x5589adb40fc0 >gensec_update_done: spnego[0x5589adb3cec0]: NT_STATUS_OK tevent_req[0x5589adb40fc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb41170)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb4a260]: subreq: 0x5589adb481a0 >gensec_update_send: spnego[0x5589adb435e0]: subreq: 0x5589adb495b0 >gensec_update_done: ntlmssp[0x5589adb4a260]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb481a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb48350)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb435e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb495b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb49760)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb4a260]: subreq: 0x5589adb495b0 >gensec_update_send: spnego[0x5589adb435e0]: subreq: 0x5589adb48a80 >gensec_update_done: ntlmssp[0x5589adb4a260]: NT_STATUS_OK tevent_req[0x5589adb495b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb49760)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb435e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb48a80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb48c30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb435e0]: subreq: 0x5589adb48a80 >gensec_update_done: spnego[0x5589adb435e0]: NT_STATUS_OK tevent_req[0x5589adb48a80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb48c30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb4a340]: subreq: 0x5589adb486e0 >gensec_update_send: spnego[0x5589adb39cd0]: subreq: 0x5589adb496b0 >gensec_update_done: ntlmssp[0x5589adb4a340]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb486e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb48890)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb39cd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb496b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb49860)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb4a340]: subreq: 0x5589adb48390 >gensec_update_send: spnego[0x5589adb39cd0]: subreq: 0x5589adb49360 >gensec_update_done: ntlmssp[0x5589adb4a340]: NT_STATUS_OK tevent_req[0x5589adb48390/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb48540)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb39cd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb49360/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb49510)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb39cd0]: subreq: 0x5589adb49c70 >gensec_update_done: spnego[0x5589adb39cd0]: NT_STATUS_OK tevent_req[0x5589adb49c70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb49e20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb4c9e0]: subreq: 0x5589adb4d060 >gensec_update_send: spnego[0x5589adb45060]: subreq: 0x5589adb4bdc0 >gensec_update_done: ntlmssp[0x5589adb4c9e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4d060/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4d210)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb45060]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4bdc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4bf70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb4c9e0]: subreq: 0x5589adb4d850 >gensec_update_send: spnego[0x5589adb45060]: subreq: 0x5589adb4d210 >gensec_update_done: ntlmssp[0x5589adb4c9e0]: NT_STATUS_OK tevent_req[0x5589adb4d850/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4da00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb45060]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4d210/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4d3c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb45060]: subreq: 0x5589adb4bc70 >gensec_update_done: spnego[0x5589adb45060]: NT_STATUS_OK tevent_req[0x5589adb4bc70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4be20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb4c330]: subreq: 0x5589adb4c920 >gensec_update_send: spnego[0x5589adb49340]: subreq: 0x5589adb4baf0 >gensec_update_done: ntlmssp[0x5589adb4c330]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4c920/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4cad0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb49340]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4baf0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4bca0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb4c330]: subreq: 0x5589adb4b7a0 >gensec_update_send: spnego[0x5589adb49340]: subreq: 0x5589adb4c5d0 >gensec_update_done: ntlmssp[0x5589adb4c330]: NT_STATUS_OK tevent_req[0x5589adb4b7a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4b950)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb49340]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4c5d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4c780)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb49340]: subreq: 0x5589adb4ca70 >gensec_update_done: spnego[0x5589adb49340]: NT_STATUS_OK tevent_req[0x5589adb4ca70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4cc20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb4ed60]: subreq: 0x5589adb4f450 >gensec_update_send: spnego[0x5589adb4b960]: subreq: 0x5589adb4d700 >gensec_update_done: ntlmssp[0x5589adb4ed60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4f450/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4f600)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb4b960]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4d700/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4d8b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb4ed60]: subreq: 0x5589adb4fcb0 >gensec_update_send: spnego[0x5589adb4b960]: subreq: 0x5589adb4d700 >gensec_update_done: ntlmssp[0x5589adb4ed60]: NT_STATUS_OK tevent_req[0x5589adb4fcb0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4fe60)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb4b960]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4d700/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4d8b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb4b960]: subreq: 0x5589adb4e740 >gensec_update_done: spnego[0x5589adb4b960]: NT_STATUS_OK tevent_req[0x5589adb4e740/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4e8f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb4cdf0]: subreq: 0x5589adb4d470 >gensec_update_send: spnego[0x5589adb4a900]: subreq: 0x5589adb4c5c0 >gensec_update_done: ntlmssp[0x5589adb4cdf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4d470/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4d620)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb4a900]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4c5c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4c770)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb4cdf0]: subreq: 0x5589adb4d5a0 >gensec_update_send: spnego[0x5589adb4a900]: subreq: 0x5589adb4c5c0 >gensec_update_done: ntlmssp[0x5589adb4cdf0]: NT_STATUS_OK tevent_req[0x5589adb4d5a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4d750)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb4a900]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4c5c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4c770)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb4a900]: subreq: 0x5589adb50070 >gensec_update_done: spnego[0x5589adb4a900]: NT_STATUS_OK tevent_req[0x5589adb50070/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb50220)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 437495 > . D 0 Wed Feb 6 20:08:28 2019 > .. D 0 Wed Feb 6 20:08:28 2019 > test.docx A 7277 Thu Feb 1 19:48:41 2018 > test.png A 430218 Mon Sep 10 09:21:23 2018 > Maths D 0 Tue Mar 5 16:13:04 2019 > > 10395647 blocks of size 4096. 1584691 blocks available >smb: \Information for Staff\Information for Students\My Subjects\> cd Maths >dos_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\] >unix_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb3f510]: subreq: 0x5589adb4e4f0 >gensec_update_send: spnego[0x5589adb45e90]: subreq: 0x5589adb501e0 >gensec_update_done: ntlmssp[0x5589adb3f510]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4e4f0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4e6a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb45e90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb501e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb50390)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb3f510]: subreq: 0x5589adb50400 >gensec_update_send: spnego[0x5589adb45e90]: subreq: 0x5589adb4e4f0 >gensec_update_done: ntlmssp[0x5589adb3f510]: NT_STATUS_OK tevent_req[0x5589adb50400/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb505b0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb45e90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4e4f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4e6a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb45e90]: subreq: 0x5589adb501e0 >gensec_update_done: spnego[0x5589adb45e90]: NT_STATUS_OK tevent_req[0x5589adb501e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb50390)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb4b890]: subreq: 0x5589adb4e4f0 >gensec_update_send: spnego[0x5589adb4bfe0]: subreq: 0x5589adb4fe90 >gensec_update_done: ntlmssp[0x5589adb4b890]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4e4f0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4e6a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb4bfe0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4fe90/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb50040)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb4b890]: subreq: 0x5589adb4e4f0 >gensec_update_send: spnego[0x5589adb4bfe0]: subreq: 0x5589adb4fe90 >gensec_update_done: ntlmssp[0x5589adb4b890]: NT_STATUS_OK tevent_req[0x5589adb4e4f0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4e6a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb4bfe0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4fe90/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb50040)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb4bfe0]: subreq: 0x5589adb4fe90 >gensec_update_done: spnego[0x5589adb4bfe0]: NT_STATUS_OK tevent_req[0x5589adb4fe90/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb50040)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb4c250]: subreq: 0x5589adb4c840 >gensec_update_send: spnego[0x5589adb50bf0]: subreq: 0x5589adb4e9c0 >gensec_update_done: ntlmssp[0x5589adb4c250]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4c840/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4c9f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb50bf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4e9c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4eb70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb4c250]: subreq: 0x5589adb4c900 >gensec_update_send: spnego[0x5589adb50bf0]: subreq: 0x5589adb4e9c0 >gensec_update_done: ntlmssp[0x5589adb4c250]: NT_STATUS_OK tevent_req[0x5589adb4c900/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4cab0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb50bf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4e9c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4eb70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb50bf0]: subreq: 0x5589adb4e9c0 >gensec_update_done: spnego[0x5589adb50bf0]: NT_STATUS_OK tevent_req[0x5589adb4e9c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4eb70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb4c610]: subreq: 0x5589adb4cc90 >gensec_update_send: spnego[0x5589adb4dd80]: subreq: 0x5589adb4ed10 >gensec_update_done: ntlmssp[0x5589adb4c610]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4cc90/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4ce40)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb4dd80]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4ed10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4eec0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb4c610]: subreq: 0x5589adb4c940 >gensec_update_send: spnego[0x5589adb4dd80]: subreq: 0x5589adb4ed10 >gensec_update_done: ntlmssp[0x5589adb4c610]: NT_STATUS_OK tevent_req[0x5589adb4c940/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4caf0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb4dd80]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4ed10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4eec0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb4dd80]: subreq: 0x5589adb4d2f0 >gensec_update_done: spnego[0x5589adb4dd80]: NT_STATUS_OK tevent_req[0x5589adb4d2f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4d4a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >smb: \Information for Staff\Information for Students\My Subjects\Maths\> dir >dos_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\*] >unix_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb4ca20]: subreq: 0x5589adb4d5b0 >gensec_update_send: spnego[0x5589adb48980]: subreq: 0x5589adb44710 >gensec_update_done: ntlmssp[0x5589adb4ca20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4d5b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4d760)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb48980]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44710/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb448c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb4ca20]: subreq: 0x5589adb4ef70 >gensec_update_send: spnego[0x5589adb48980]: subreq: 0x5589adb44710 >gensec_update_done: ntlmssp[0x5589adb4ca20]: NT_STATUS_OK tevent_req[0x5589adb4ef70/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4f120)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb48980]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44710/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb448c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb48980]: subreq: 0x5589adb50f10 >gensec_update_done: spnego[0x5589adb48980]: NT_STATUS_OK tevent_req[0x5589adb50f10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb510c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb4ec60]: subreq: 0x5589adb4c270 >gensec_update_send: spnego[0x5589adb45e90]: subreq: 0x5589adb44710 >gensec_update_done: ntlmssp[0x5589adb4ec60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4c270/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4c420)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb45e90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44710/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb448c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb4ec60]: subreq: 0x5589adb4c270 >gensec_update_send: spnego[0x5589adb45e90]: subreq: 0x5589adb44710 >gensec_update_done: ntlmssp[0x5589adb4ec60]: NT_STATUS_OK tevent_req[0x5589adb4c270/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb4c420)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb45e90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb44710/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb448c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb45e90]: subreq: 0x5589adb44710 >gensec_update_done: spnego[0x5589adb45e90]: NT_STATUS_OK tevent_req[0x5589adb44710/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb448c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb51940]: subreq: 0x5589adb51f30 >gensec_update_send: spnego[0x5589adb51160]: subreq: 0x5589adb4c270 >gensec_update_done: ntlmssp[0x5589adb51940]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb51f30/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb520e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb51160]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb4c270/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb4c420)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb51940]: subreq: 0x5589adb52810 >gensec_update_send: spnego[0x5589adb51160]: subreq: 0x5589adb51be0 >gensec_update_done: ntlmssp[0x5589adb51940]: NT_STATUS_OK tevent_req[0x5589adb52810/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb529c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb51160]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb51be0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb51d90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb51160]: subreq: 0x5589adb52810 >gensec_update_done: spnego[0x5589adb51160]: NT_STATUS_OK tevent_req[0x5589adb52810/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb529c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb51bc0]: subreq: 0x5589adb52240 >gensec_update_send: spnego[0x5589adb4d440]: subreq: 0x5589adb515a0 >gensec_update_done: ntlmssp[0x5589adb51bc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb52240/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb523f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb4d440]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb515a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb51750)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb51bc0]: subreq: 0x5589adb52240 >gensec_update_send: spnego[0x5589adb4d440]: subreq: 0x5589adb515a0 >gensec_update_done: ntlmssp[0x5589adb51bc0]: NT_STATUS_OK tevent_req[0x5589adb52240/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb523f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb4d440]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb515a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb51750)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb4d440]: subreq: 0x5589adb515a0 >gensec_update_done: spnego[0x5589adb4d440]: NT_STATUS_OK tevent_req[0x5589adb515a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb51750)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb53790]: subreq: 0x5589adb54250 >gensec_update_send: spnego[0x5589adb4ac10]: subreq: 0x5589adb521f0 >gensec_update_done: ntlmssp[0x5589adb53790]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb54250/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb54400)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb4ac10]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb521f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb523a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb53790]: subreq: 0x5589adb54b30 >gensec_update_send: spnego[0x5589adb4ac10]: subreq: 0x5589adb54400 >gensec_update_done: ntlmssp[0x5589adb53790]: NT_STATUS_OK tevent_req[0x5589adb54b30/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb54ce0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb4ac10]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb54400/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb545b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb4ac10]: subreq: 0x5589adb521f0 >gensec_update_done: spnego[0x5589adb4ac10]: NT_STATUS_OK tevent_req[0x5589adb521f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb523a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb54190]: subreq: 0x5589adb54880 >gensec_update_send: spnego[0x5589adb51620]: subreq: 0x5589adb527b0 >gensec_update_done: ntlmssp[0x5589adb54190]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb54880/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb54a30)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb51620]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb527b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb52960)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb54190]: subreq: 0x5589adb54880 >gensec_update_send: spnego[0x5589adb51620]: subreq: 0x5589adb52460 >gensec_update_done: ntlmssp[0x5589adb54190]: NT_STATUS_OK tevent_req[0x5589adb54880/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb54a30)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb51620]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb52460/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb52610)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb51620]: subreq: 0x5589adb55020 >gensec_update_done: spnego[0x5589adb51620]: NT_STATUS_OK tevent_req[0x5589adb55020/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb551d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb55db0]: subreq: 0x5589adb56740 >gensec_update_send: spnego[0x5589adb54120]: subreq: 0x5589adb55290 >gensec_update_done: ntlmssp[0x5589adb55db0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb56740/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb568f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb54120]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb55290/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb55440)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb55db0]: subreq: 0x5589adb55750 >gensec_update_send: spnego[0x5589adb54120]: subreq: 0x5589adb54f40 >gensec_update_done: ntlmssp[0x5589adb55db0]: NT_STATUS_OK tevent_req[0x5589adb55750/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb55900)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb54120]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb54f40/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb550f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb54120]: subreq: 0x5589adb563f0 >gensec_update_done: spnego[0x5589adb54120]: NT_STATUS_OK tevent_req[0x5589adb563f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb565a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5589adb56580]: subreq: 0x5589adb56c00 >gensec_update_send: spnego[0x5589adb51f70]: subreq: 0x5589adb558e0 >gensec_update_done: ntlmssp[0x5589adb56580]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb56c00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb56db0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5589adb51f70]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb558e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb55a90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5589adb56580]: subreq: 0x5589adb56c00 >gensec_update_send: spnego[0x5589adb51f70]: subreq: 0x5589adb558e0 >gensec_update_done: ntlmssp[0x5589adb56580]: NT_STATUS_OK tevent_req[0x5589adb56c00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5589adb56db0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5589adb51f70]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5589adb558e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb55a90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5589adb51f70]: subreq: 0x5589adb568b0 >gensec_update_done: spnego[0x5589adb51f70]: NT_STATUS_OK tevent_req[0x5589adb568b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5589adb56a60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 0 > . D 0 Tue Mar 5 16:13:04 2019 > .. D 0 Tue Mar 5 16:13:04 2019 > Level 1 D 0 Sat Nov 11 20:07:34 2017 > > 10395647 blocks of size 4096. 1584691 blocks available >smb: \Information for Staff\Information for Students\My Subjects\Maths\> exit >signed SMB2 message
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 13824
:
14912
|
14916
| 14917 |
14920
|
14921
|
14922
|
14925
|
14926