INFO: Current debug levels: all: 10 tdb: 10 printdrivers: 10 lanman: 10 smb: 10 rpc_parse: 10 rpc_srv: 10 rpc_cli: 10 passdb: 10 sam: 10 auth: 10 winbind: 10 vfs: 10 idmap: 10 quota: 10 acls: 10 locking: 10 msdfs: 10 dmapi: 10 registry: 10 scavenger: 10 dns: 10 ldb: 10 tevent: 10 auth_audit: 10 auth_json_audit: 10 kerberos: 10 drs_repl: 10 smb2: 10 smb2_credits: 10 dsdb_audit: 10 dsdb_json_audit: 10 dsdb_password_audit: 10 dsdb_password_json_audit: 10 dsdb_transaction_audit: 10 dsdb_transaction_json_audit: 10 dsdb_group_audit: 10 dsdb_group_json_audit: 10 lp_load_ex: refreshing parameters Initialising global parameters rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) INFO: Current debug levels: all: 10 tdb: 10 printdrivers: 10 lanman: 10 smb: 10 rpc_parse: 10 rpc_srv: 10 rpc_cli: 10 passdb: 10 sam: 10 auth: 10 winbind: 10 vfs: 10 idmap: 10 quota: 10 acls: 10 locking: 10 msdfs: 10 dmapi: 10 registry: 10 scavenger: 10 dns: 10 ldb: 10 tevent: 10 auth_audit: 10 auth_json_audit: 10 kerberos: 10 drs_repl: 10 smb2: 10 smb2_credits: 10 dsdb_audit: 10 dsdb_json_audit: 10 dsdb_password_audit: 10 dsdb_password_json_audit: 10 dsdb_transaction_audit: 10 dsdb_transaction_json_audit: 10 dsdb_group_audit: 10 dsdb_group_json_audit: 10 pm_process() returned Yes lp_servicenumber: couldn't find homes messaging_dgm_ref: messaging_dgm_init returned Success messaging_dgm_ref: unique = 4634864307237352467 Registering messaging pointer for type 2 - private_data=(nil) Registering messaging pointer for type 9 - private_data=(nil) Registered MSG_REQ_POOL_USAGE Registering messaging pointer for type 11 - private_data=(nil) Registering messaging pointer for type 12 - private_data=(nil) Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED Registering messaging pointer for type 1 - private_data=(nil) Registering messaging pointer for type 5 - private_data=(nil) Registering messaging pointer for type 51 - private_data=(nil) messaging_init_internal: my id: 11869 lp_load_ex: refreshing parameters Freeing parametrics: Initialising global parameters rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) INFO: Current debug levels: all: 10 tdb: 10 printdrivers: 10 lanman: 10 smb: 10 rpc_parse: 10 rpc_srv: 10 rpc_cli: 10 passdb: 10 sam: 10 auth: 10 winbind: 10 vfs: 10 idmap: 10 quota: 10 acls: 10 locking: 10 msdfs: 10 dmapi: 10 registry: 10 scavenger: 10 dns: 10 ldb: 10 tevent: 10 auth_audit: 10 auth_json_audit: 10 kerberos: 10 drs_repl: 10 smb2: 10 smb2_credits: 10 dsdb_audit: 10 dsdb_json_audit: 10 dsdb_password_audit: 10 dsdb_password_json_audit: 10 dsdb_transaction_audit: 10 dsdb_transaction_json_audit: 10 dsdb_group_audit: 10 dsdb_group_json_audit: 10 pm_process() returned Yes lp_servicenumber: couldn't find homes added interface ens160 ip=10.1.1.74 bcast=10.1.1.255 netmask=255.255.255.0 Netbios name list:- my_netbios_names[0]="SMBTEST" Client started (version 4.9.4). cli_cm_open: Calling cli_cm_connect on: server (null) share \\domain.com\DFS do_connect: Making new connection to server (null) share \\domain.com\DFS Opening cache file at /usr/local/samba/var/cache/gencache.tdb Opening cache file at /usr/local/samba/var/lock/gencache_notrans.tdb Adding cache entry with key=[AD_SITENAME/DOMAIN/] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552423998 seconds in the past) Could not get allrecord lock on gencache_notrans.tdb: Locking error sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) Adding cache entry with key=[NBT/DOMAIN.COM#20] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552423998 seconds in the past) no entry for domain.com#20 found. resolve_hosts: Attempting host lookup for name domain.com<0x20> remove_duplicate_addrs2: looking for duplicate address/port pairs namecache_store: storing 2 addresses for domain.com#20: 10.1.1.41,10.1.1.43 Adding cache entry with key=[NBT/DOMAIN.COM#20] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552423998 seconds in the past) Adding cache entry with key=[NBT/DOMAIN.COM#20] and timeout=[Tue Mar 12 21:04:18 2019 GMT] (660 seconds ahead) internal_resolve_name: returning 2 addresses: 10.1.1.41:0 10.1.1.43:0 Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 Enter DOMAIN.COM\username's password: kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] GENSEC backend 'gssapi_spnego' registered GENSEC backend 'gssapi_krb5' registered GENSEC backend 'gssapi_krb5_sasl' registered GENSEC backend 'spnego' registered GENSEC backend 'schannel' registered GENSEC backend 'naclrpc_as_system' registered GENSEC backend 'sasl-EXTERNAL' registered GENSEC backend 'ntlmssp' registered GENSEC backend 'ntlmssp_resume_ccache' registered GENSEC backend 'http_basic' registered GENSEC backend 'http_ntlm' registered GENSEC backend 'http_negotiate' registered Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e44d40]: subreq: 0x5579c7e453c0 gensec_update_send: spnego[0x5579c7e42b20]: subreq: 0x5579c7e44120 gensec_update_done: ntlmssp[0x5579c7e44d40]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e453c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e45570)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e42b20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e44120/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e442d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e44d40]: subreq: 0x5579c7e56b70 gensec_update_send: spnego[0x5579c7e42b20]: subreq: 0x5579c7e43dd0 gensec_update_done: ntlmssp[0x5579c7e44d40]: NT_STATUS_OK tevent_req[0x5579c7e56b70/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e56d20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e42b20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e43dd0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e43f80)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e42b20]: subreq: 0x5579c7e43dd0 gensec_update_done: spnego[0x5579c7e42b20]: NT_STATUS_OK tevent_req[0x5579c7e43dd0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e43f80)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\DFS| split_dfs_path: server: |2012FS| split_dfs_path: share: |DFS| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share DFS Adding cache entry with key=[AD_SITENAME/DOMAIN/] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552424003 seconds in the past) sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) Adding cache entry with key=[NBT/2012FS#20] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552424003 seconds in the past) no entry for 2012FS#20 found. resolve_lmhosts: Attempting lmhosts lookup for name 2012FS<0x20> startlmhosts: Can't open lmhosts file /usr/local/samba/etc/lmhosts. Error was No such file or directory resolve_wins: WINS server resolution selected and no WINS servers listed. resolve_hosts: Attempting host lookup for name 2012FS<0x20> remove_duplicate_addrs2: looking for duplicate address/port pairs namecache_store: storing 1 address for 2012FS#20: 10.1.1.237 Adding cache entry with key=[NBT/2012FS#20] and timeout=[Tue Mar 12 21:04:23 2019 GMT] (660 seconds ahead) internal_resolve_name: returning 1 addresses: 10.1.1.237:0 Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e41200]: subreq: 0x5579c7e43c20 gensec_update_send: spnego[0x5579c7e45370]: subreq: 0x5579c7e409c0 gensec_update_done: ntlmssp[0x5579c7e41200]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e43c20/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e43dd0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e45370]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e409c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e40b70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e41200]: subreq: 0x5579c7e578a0 gensec_update_send: spnego[0x5579c7e45370]: subreq: 0x5579c7e44200 gensec_update_done: ntlmssp[0x5579c7e41200]: NT_STATUS_OK tevent_req[0x5579c7e578a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e57a50)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e45370]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e44200/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e443b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e45370]: subreq: 0x5579c7e44200 gensec_update_done: spnego[0x5579c7e45370]: NT_STATUS_OK tevent_req[0x5579c7e44200/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e443b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\DFS| split_dfs_path: server: |2012FS| split_dfs_path: share: |DFS| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok Try "help" to get a list of possible commands. smb: \> dir dos_clean_name [\*] unix_clean_name [\*] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\ signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\ signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message Total bytes listed: 0 . D 0 Fri Nov 10 23:27:03 2017 .. D 0 Fri Nov 10 23:27:03 2017 Information for Staff D 0 Tue Sep 5 04:13:14 2017 Information for Students D 0 Fri Nov 10 23:27:03 2017 10395647 blocks of size 4096. 1584260 blocks available smb: \> cd "Information for Staff" dos_clean_name [\Information for Staff\] unix_clean_name [\Information for Staff\] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_open: Calling cli_cm_connect on: server 2012FS share IPC$ do_connect: Making new connection to server 2012FS share IPC$ sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e74270]: subreq: 0x5579c7e74960 gensec_update_send: spnego[0x5579c7e71e90]: subreq: 0x5579c7e738b0 gensec_update_done: ntlmssp[0x5579c7e74270]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e74960/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e74b10)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e71e90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e738b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e73a60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e74270]: subreq: 0x5579c7e738b0 gensec_update_send: spnego[0x5579c7e71e90]: subreq: 0x5579c7e74610 gensec_update_done: ntlmssp[0x5579c7e74270]: NT_STATUS_OK tevent_req[0x5579c7e738b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e73a60)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e71e90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e74610/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e747c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e71e90]: subreq: 0x5579c7e74610 gensec_update_done: spnego[0x5579c7e71e90]: NT_STATUS_OK tevent_req[0x5579c7e74610/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e747c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message tconx ok cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e753b0]: subreq: 0x5579c7e762c0 gensec_update_send: spnego[0x5579c7e71ea0]: subreq: 0x5579c7e74790 gensec_update_done: ntlmssp[0x5579c7e753b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e762c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e76470)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e71ea0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e74790/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e74940)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e753b0]: subreq: 0x5579c7e769e0 gensec_update_send: spnego[0x5579c7e71ea0]: subreq: 0x5579c7e74440 gensec_update_done: ntlmssp[0x5579c7e753b0]: NT_STATUS_OK tevent_req[0x5579c7e769e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e76b90)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e71ea0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e74440/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e745f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e71ea0]: subreq: 0x5579c7e74d10 gensec_update_done: spnego[0x5579c7e71ea0]: NT_STATUS_OK tevent_req[0x5579c7e74d10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e74ec0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e743a0]: subreq: 0x5579c7e74a90 gensec_update_send: spnego[0x5579c7e71670]: subreq: 0x5579c7e770b0 gensec_update_done: ntlmssp[0x5579c7e743a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e74a90/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e74c40)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e71670]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e770b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e77260)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e743a0]: subreq: 0x5579c7e74740 gensec_update_send: spnego[0x5579c7e71670]: subreq: 0x5579c7e73ef0 gensec_update_done: ntlmssp[0x5579c7e743a0]: NT_STATUS_OK tevent_req[0x5579c7e74740/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e748f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e71670]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e73ef0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e740a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e71670]: subreq: 0x5579c7e77e30 gensec_update_done: spnego[0x5579c7e71670]: NT_STATUS_OK tevent_req[0x5579c7e77e30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e77fe0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] signed SMB2 message signed SMB2 message smb: \Information for Staff\> dir dos_clean_name [\Information for Staff\*] unix_clean_name [\Information for Staff\*] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e77be0]: subreq: 0x5579c7e78260 gensec_update_send: spnego[0x5579c7e71650]: subreq: 0x5579c7e77130 gensec_update_done: ntlmssp[0x5579c7e77be0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e78260/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e78410)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e71650]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e77130/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e772e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e77be0]: subreq: 0x5579c7e78ac0 gensec_update_send: spnego[0x5579c7e71650]: subreq: 0x5579c7e78410 gensec_update_done: ntlmssp[0x5579c7e77be0]: NT_STATUS_OK tevent_req[0x5579c7e78ac0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e78c70)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e71650]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e78410/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e785c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e71650]: subreq: 0x5579c7e78950 gensec_update_done: spnego[0x5579c7e71650]: NT_STATUS_OK tevent_req[0x5579c7e78950/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e78b00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e77460]: subreq: 0x5579c7e77a50 gensec_update_send: spnego[0x5579c7e74550]: subreq: 0x5579c7e750d0 gensec_update_done: ntlmssp[0x5579c7e77460]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e77a50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e77c00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e74550]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e750d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e75280)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e77460]: subreq: 0x5579c7e76e80 gensec_update_send: spnego[0x5579c7e74550]: subreq: 0x5579c7e74d80 gensec_update_done: ntlmssp[0x5579c7e77460]: NT_STATUS_OK tevent_req[0x5579c7e76e80/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e77030)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e74550]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e74d80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e74f30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e74550]: subreq: 0x5579c7e74d80 gensec_update_done: spnego[0x5579c7e74550]: NT_STATUS_OK tevent_req[0x5579c7e74d80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e74f30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\ signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e7b460]: subreq: 0x5579c7e7bae0 gensec_update_send: spnego[0x5579c7e78c50]: subreq: 0x5579c7e7a8b0 gensec_update_done: ntlmssp[0x5579c7e7b460]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7bae0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7bc90)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e78c50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7a8b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7aa60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e7b460]: subreq: 0x5579c7e7c480 gensec_update_send: spnego[0x5579c7e78c50]: subreq: 0x5579c7e7a560 gensec_update_done: ntlmssp[0x5579c7e7b460]: NT_STATUS_OK tevent_req[0x5579c7e7c480/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7c630)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e78c50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7a560/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7a710)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e78c50]: subreq: 0x5579c7e7a560 gensec_update_done: spnego[0x5579c7e78c50]: NT_STATUS_OK tevent_req[0x5579c7e7a560/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7a710)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e7b910]: subreq: 0x5579c7e7bf00 gensec_update_send: spnego[0x5579c7e7a320]: subreq: 0x5579c7e7ade0 gensec_update_done: ntlmssp[0x5579c7e7b910]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7bf00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7c0b0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e7a320]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7ade0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7af90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e7b910]: subreq: 0x5579c7e7bf00 gensec_update_send: spnego[0x5579c7e7a320]: subreq: 0x5579c7e7aa90 gensec_update_done: ntlmssp[0x5579c7e7b910]: NT_STATUS_OK tevent_req[0x5579c7e7bf00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7c0b0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e7a320]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7aa90/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7ac40)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e7a320]: subreq: 0x5579c7e7aa90 gensec_update_done: spnego[0x5579c7e7a320]: NT_STATUS_OK tevent_req[0x5579c7e7aa90/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7ac40)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] signed SMB2 message signed SMB2 message signed SMB2 message Total bytes listed: 0 . D 0 Mon Mar 4 11:34:13 2019 .. D 0 Mon Mar 4 11:34:13 2019 Information for Students D 0 Tue Sep 5 04:22:20 2017 10395647 blocks of size 4096. 1584260 blocks available smb: \Information for Staff\> cd "Information for Students" dos_clean_name [\Information for Staff\Information for Students\] unix_clean_name [\Information for Staff\Information for Students\] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e7be20]: subreq: 0x5579c7e7d650 gensec_update_send: spnego[0x5579c7e75b00]: subreq: 0x5579c7e7b990 gensec_update_done: ntlmssp[0x5579c7e7be20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7d650/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7d800)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e75b00]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7b990/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7bb40)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e7be20]: subreq: 0x5579c7e7d650 gensec_update_send: spnego[0x5579c7e75b00]: subreq: 0x5579c7e7b640 gensec_update_done: ntlmssp[0x5579c7e7be20]: NT_STATUS_OK tevent_req[0x5579c7e7d650/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7d800)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e75b00]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7b640/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7b7f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e75b00]: subreq: 0x5579c7e7dc80 gensec_update_done: spnego[0x5579c7e75b00]: NT_STATUS_OK tevent_req[0x5579c7e7dc80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7de30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e7c280]: subreq: 0x5579c7e7d7e0 gensec_update_send: spnego[0x5579c7e723f0]: subreq: 0x5579c7e7b9c0 gensec_update_done: ntlmssp[0x5579c7e7c280]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7d7e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7d990)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e723f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7b9c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7bb70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e7c280]: subreq: 0x5579c7e7d7e0 gensec_update_send: spnego[0x5579c7e723f0]: subreq: 0x5579c7e7b9c0 gensec_update_done: ntlmssp[0x5579c7e7c280]: NT_STATUS_OK tevent_req[0x5579c7e7d7e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7d990)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e723f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7b9c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7bb70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e723f0]: subreq: 0x5579c7e7e050 gensec_update_done: spnego[0x5579c7e723f0]: NT_STATUS_OK tevent_req[0x5579c7e7e050/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7e200)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Students| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e7efc0]: subreq: 0x5579c7e7f5b0 gensec_update_send: spnego[0x5579c7e7e620]: subreq: 0x5579c7e7bd10 gensec_update_done: ntlmssp[0x5579c7e7efc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7f5b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7f760)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e7e620]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7bd10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7bec0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e7efc0]: subreq: 0x5579c7e7bd10 gensec_update_send: spnego[0x5579c7e7e620]: subreq: 0x5579c7e7f760 gensec_update_done: ntlmssp[0x5579c7e7efc0]: NT_STATUS_OK tevent_req[0x5579c7e7bd10/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7bec0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e7e620]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7f760/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7f910)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e7e620]: subreq: 0x5579c7e7fc80 gensec_update_done: spnego[0x5579c7e7e620]: NT_STATUS_OK tevent_req[0x5579c7e7fc80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7fe30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e7f450]: subreq: 0x5579c7e7fad0 gensec_update_send: spnego[0x5579c7e7e050]: subreq: 0x5579c7e7ec20 gensec_update_done: ntlmssp[0x5579c7e7f450]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7fad0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7fc80)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e7e050]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7ec20/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7edd0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e7f450]: subreq: 0x5579c7e80330 gensec_update_send: spnego[0x5579c7e7e050]: subreq: 0x5579c7e7fc70 gensec_update_done: ntlmssp[0x5579c7e7f450]: NT_STATUS_OK tevent_req[0x5579c7e80330/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e804e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e7e050]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7fc70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7fe20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e7e050]: subreq: 0x5579c7e7eda0 gensec_update_done: spnego[0x5579c7e7e050]: NT_STATUS_OK tevent_req[0x5579c7e7eda0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7ef50)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] signed SMB2 message signed SMB2 message smb: \Information for Staff\Information for Students\> dir dos_clean_name [\Information for Staff\Information for Students\*] unix_clean_name [\Information for Staff\Information for Students\*] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e7d9f0]: subreq: 0x5579c7e80d20 gensec_update_send: spnego[0x5579c7e789d0]: subreq: 0x5579c7e805b0 gensec_update_done: ntlmssp[0x5579c7e7d9f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e80d20/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e80ed0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e789d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e805b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e80760)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e7d9f0]: subreq: 0x5579c7e80d20 gensec_update_send: spnego[0x5579c7e789d0]: subreq: 0x5579c7e805b0 gensec_update_done: ntlmssp[0x5579c7e7d9f0]: NT_STATUS_OK tevent_req[0x5579c7e80d20/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e80ed0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e789d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e805b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e80760)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e789d0]: subreq: 0x5579c7e81250 gensec_update_done: spnego[0x5579c7e789d0]: NT_STATUS_OK tevent_req[0x5579c7e81250/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e81400)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e80840]: subreq: 0x5579c7e81250 gensec_update_send: spnego[0x5579c7e789d0]: subreq: 0x5579c7e7f720 gensec_update_done: ntlmssp[0x5579c7e80840]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e81250/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e81400)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e789d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7f720/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7f8d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e80840]: subreq: 0x5579c7e81c50 gensec_update_send: spnego[0x5579c7e789d0]: subreq: 0x5579c7e7f720 gensec_update_done: ntlmssp[0x5579c7e80840]: NT_STATUS_OK tevent_req[0x5579c7e81c50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e81e00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e789d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7f720/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7f8d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e789d0]: subreq: 0x5579c7e7f720 gensec_update_done: spnego[0x5579c7e789d0]: NT_STATUS_OK tevent_req[0x5579c7e7f720/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7f8d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Students| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e82860]: subreq: 0x5579c7e82f50 gensec_update_send: spnego[0x5579c7e72dc0]: subreq: 0x5579c7e81e10 gensec_update_done: ntlmssp[0x5579c7e82860]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e82f50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e83100)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e72dc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e81e10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e81fc0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e82860]: subreq: 0x5579c7e82f50 gensec_update_send: spnego[0x5579c7e72dc0]: subreq: 0x5579c7e823b0 gensec_update_done: ntlmssp[0x5579c7e82860]: NT_STATUS_OK tevent_req[0x5579c7e82f50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e83100)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e72dc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e823b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e82560)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e72dc0]: subreq: 0x5579c7e823b0 gensec_update_done: spnego[0x5579c7e72dc0]: NT_STATUS_OK tevent_req[0x5579c7e823b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e82560)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e82ba0]: subreq: 0x5579c7e83290 gensec_update_send: spnego[0x5579c7e7f760]: subreq: 0x5579c7e82160 gensec_update_done: ntlmssp[0x5579c7e82ba0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e83290/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e83440)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e7f760]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e82160/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e82310)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e82ba0]: subreq: 0x5579c7e83af0 gensec_update_send: spnego[0x5579c7e7f760]: subreq: 0x5579c7e82f40 gensec_update_done: ntlmssp[0x5579c7e82ba0]: NT_STATUS_OK tevent_req[0x5579c7e83af0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e83ca0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e7f760]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e82f40/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e830f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e7f760]: subreq: 0x5579c7e81e10 gensec_update_done: spnego[0x5579c7e7f760]: NT_STATUS_OK tevent_req[0x5579c7e81e10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e81fc0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\ signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e85e10]: subreq: 0x5579c7e86400 gensec_update_send: spnego[0x5579c7e820f0]: subreq: 0x5579c7e85280 gensec_update_done: ntlmssp[0x5579c7e85e10]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e86400/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e865b0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e820f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e85280/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e85430)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e85e10]: subreq: 0x5579c7e86550 gensec_update_send: spnego[0x5579c7e820f0]: subreq: 0x5579c7e85280 gensec_update_done: ntlmssp[0x5579c7e85e10]: NT_STATUS_OK tevent_req[0x5579c7e86550/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e86700)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e820f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e85280/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e85430)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e820f0]: subreq: 0x5579c7e84f30 gensec_update_done: spnego[0x5579c7e820f0]: NT_STATUS_OK tevent_req[0x5579c7e84f30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e850e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e86170]: subreq: 0x5579c7e86b30 gensec_update_send: spnego[0x5579c7e81360]: subreq: 0x5579c7e856c0 gensec_update_done: ntlmssp[0x5579c7e86170]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e86b30/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e86ce0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e81360]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e856c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e85870)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e86170]: subreq: 0x5579c7e870d0 gensec_update_send: spnego[0x5579c7e81360]: subreq: 0x5579c7e86410 gensec_update_done: ntlmssp[0x5579c7e86170]: NT_STATUS_OK tevent_req[0x5579c7e870d0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e87280)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e81360]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e86410/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e865c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e81360]: subreq: 0x5579c7e86b30 gensec_update_done: spnego[0x5579c7e81360]: NT_STATUS_OK tevent_req[0x5579c7e86b30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e86ce0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Students| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e880d0]: subreq: 0x5579c7e886c0 gensec_update_send: spnego[0x5579c7e87230]: subreq: 0x5579c7e85ec0 gensec_update_done: ntlmssp[0x5579c7e880d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e886c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e88870)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e87230]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e85ec0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e86070)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e880d0]: subreq: 0x5579c7e88810 gensec_update_send: spnego[0x5579c7e87230]: subreq: 0x5579c7e85b70 gensec_update_done: ntlmssp[0x5579c7e880d0]: NT_STATUS_OK tevent_req[0x5579c7e88810/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e889c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e87230]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e85b70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e85d20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e87230]: subreq: 0x5579c7e88fa0 gensec_update_done: spnego[0x5579c7e87230]: NT_STATUS_OK tevent_req[0x5579c7e88fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e88550]: subreq: 0x5579c7e88bd0 gensec_update_send: spnego[0x5579c7e84350]: subreq: 0x5579c7e86260 gensec_update_done: ntlmssp[0x5579c7e88550]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e88bd0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e88d80)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e84350]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e86260/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e86410)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e88550]: subreq: 0x5579c7e89430 gensec_update_send: spnego[0x5579c7e84350]: subreq: 0x5579c7e88d70 gensec_update_done: ntlmssp[0x5579c7e88550]: NT_STATUS_OK tevent_req[0x5579c7e89430/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e895e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e84350]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e88d70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e88f20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e84350]: subreq: 0x5579c7e87ec0 gensec_update_done: spnego[0x5579c7e84350]: NT_STATUS_OK tevent_req[0x5579c7e87ec0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e88070)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] signed SMB2 message signed SMB2 message signed SMB2 message Total bytes listed: 0 . D 0 Mon Mar 4 11:23:14 2019 .. D 0 Mon Mar 4 11:23:14 2019 All Shared D 0 Mon Mar 4 11:23:14 2019 My Subjects D 0 Fri Nov 10 14:59:41 2017 10395647 blocks of size 4096. 1584260 blocks available smb: \Information for Staff\Information for Students\> cd "My Subjects" dos_clean_name [\Information for Staff\Information for Students\My Subjects\] unix_clean_name [\Information for Staff\Information for Students\My Subjects\] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e820f0]: subreq: 0x5579c7e89a60 gensec_update_send: spnego[0x5579c7e76110]: subreq: 0x5579c7e892f0 gensec_update_done: ntlmssp[0x5579c7e820f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e89a60/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e89c10)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e76110]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e892f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e894a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e820f0]: subreq: 0x5579c7e89a60 gensec_update_send: spnego[0x5579c7e76110]: subreq: 0x5579c7e892f0 gensec_update_done: ntlmssp[0x5579c7e820f0]: NT_STATUS_OK tevent_req[0x5579c7e89a60/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e89c10)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e76110]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e892f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e894a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e76110]: subreq: 0x5579c7e88fa0 gensec_update_done: spnego[0x5579c7e76110]: NT_STATUS_OK tevent_req[0x5579c7e88fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e81230]: subreq: 0x5579c7e89710 gensec_update_send: spnego[0x5579c7e86eb0]: subreq: 0x5579c7e88fa0 gensec_update_done: ntlmssp[0x5579c7e81230]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e89710/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e898c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e86eb0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e88fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e81230]: subreq: 0x5579c7e89710 gensec_update_send: spnego[0x5579c7e86eb0]: subreq: 0x5579c7e88fa0 gensec_update_done: ntlmssp[0x5579c7e81230]: NT_STATUS_OK tevent_req[0x5579c7e89710/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e898c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e86eb0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e88fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e86eb0]: subreq: 0x5579c7e8a3b0 gensec_update_done: spnego[0x5579c7e86eb0]: NT_STATUS_OK tevent_req[0x5579c7e8a3b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8a560)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Students| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e899b0]: subreq: 0x5579c7e8a850 gensec_update_send: spnego[0x5579c7e80160]: subreq: 0x5579c7e892f0 gensec_update_done: ntlmssp[0x5579c7e899b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8a850/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8aa00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e80160]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e892f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e894a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e899b0]: subreq: 0x5579c7e8a850 gensec_update_send: spnego[0x5579c7e80160]: subreq: 0x5579c7e88fa0 gensec_update_done: ntlmssp[0x5579c7e899b0]: NT_STATUS_OK tevent_req[0x5579c7e8a850/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8aa00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e80160]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e88fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e80160]: subreq: 0x5579c7e8a850 gensec_update_done: spnego[0x5579c7e80160]: NT_STATUS_OK tevent_req[0x5579c7e8a850/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8aa00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e89960]: subreq: 0x5579c7e8ac70 gensec_update_send: spnego[0x5579c7e80160]: subreq: 0x5579c7e893e0 gensec_update_done: ntlmssp[0x5579c7e89960]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8ac70/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8ae20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e80160]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e893e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89590)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e89960]: subreq: 0x5579c7e8b5e0 gensec_update_send: spnego[0x5579c7e80160]: subreq: 0x5579c7e89d00 gensec_update_done: ntlmssp[0x5579c7e89960]: NT_STATUS_OK tevent_req[0x5579c7e8b5e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8b790)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e80160]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e89d00/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89eb0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e80160]: subreq: 0x5579c7e89d00 gensec_update_done: spnego[0x5579c7e80160]: NT_STATUS_OK tevent_req[0x5579c7e89d00/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89eb0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\My Subjects| split_dfs_path: server: |2012FS| split_dfs_path: share: |My Subjects| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects cli_cm_find: Looking for connection to server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server 2012FS share My Subjects do_connect: Making new connection to server 2012FS share My Subjects sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e8c0f0]: subreq: 0x5579c7e8c770 gensec_update_send: spnego[0x5579c7e84320]: subreq: 0x5579c7e8b560 gensec_update_done: ntlmssp[0x5579c7e8c0f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8c770/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8c920)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e84320]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8b560/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8b710)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e8c0f0]: subreq: 0x5579c7e8cfd0 gensec_update_send: spnego[0x5579c7e84320]: subreq: 0x5579c7e8c910 gensec_update_done: ntlmssp[0x5579c7e8c0f0]: NT_STATUS_OK tevent_req[0x5579c7e8cfd0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8d180)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e84320]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8c910/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8cac0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e84320]: subreq: 0x5579c7e8b310 gensec_update_done: spnego[0x5579c7e84320]: NT_STATUS_OK tevent_req[0x5579c7e8b310/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8b4c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] smb: \Information for Staff\Information for Students\My Subjects\> dir dos_clean_name [\Information for Staff\Information for Students\My Subjects\*] unix_clean_name [\Information for Staff\Information for Students\My Subjects\*] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e7acd0]: subreq: 0x5579c7e8bb80 gensec_update_send: spnego[0x5579c7e8b580]: subreq: 0x5579c7e892f0 gensec_update_done: ntlmssp[0x5579c7e7acd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8bb80/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8bd30)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e8b580]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e892f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e894a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e7acd0]: subreq: 0x5579c7e8c4c0 gensec_update_send: spnego[0x5579c7e8b580]: subreq: 0x5579c7e88fa0 gensec_update_done: ntlmssp[0x5579c7e7acd0]: NT_STATUS_OK tevent_req[0x5579c7e8c4c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8c670)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e8b580]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e88fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e8b580]: subreq: 0x5579c7e88fa0 gensec_update_done: spnego[0x5579c7e8b580]: NT_STATUS_OK tevent_req[0x5579c7e88fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e89440]: subreq: 0x5579c7e8bfa0 gensec_update_send: spnego[0x5579c7e8a6a0]: subreq: 0x5579c7e8b830 gensec_update_done: ntlmssp[0x5579c7e89440]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8bfa0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8c150)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e8a6a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8b830/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8b9e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e89440]: subreq: 0x5579c7e8cac0 gensec_update_send: spnego[0x5579c7e8a6a0]: subreq: 0x5579c7e8d3d0 gensec_update_done: ntlmssp[0x5579c7e89440]: NT_STATUS_OK tevent_req[0x5579c7e8cac0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8cc70)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e8a6a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8d3d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8d580)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e8a6a0]: subreq: 0x5579c7e8c640 gensec_update_done: spnego[0x5579c7e8a6a0]: NT_STATUS_OK tevent_req[0x5579c7e8c640/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8c7f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Students| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e8d410]: subreq: 0x5579c7e8def0 gensec_update_send: spnego[0x5579c7e89380]: subreq: 0x5579c7e8c870 gensec_update_done: ntlmssp[0x5579c7e8d410]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8def0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8e0a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e89380]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8c870/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8ca20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e8d410]: subreq: 0x5579c7e8c870 gensec_update_send: spnego[0x5579c7e89380]: subreq: 0x5579c7e8cdf0 gensec_update_done: ntlmssp[0x5579c7e8d410]: NT_STATUS_OK tevent_req[0x5579c7e8c870/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8ca20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e89380]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8cdf0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8cfa0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e89380]: subreq: 0x5579c7e8cdf0 gensec_update_done: spnego[0x5579c7e89380]: NT_STATUS_OK tevent_req[0x5579c7e8cdf0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8cfa0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e8d750]: subreq: 0x5579c7e8e080 gensec_update_send: spnego[0x5579c7e84490]: subreq: 0x5579c7e8cc30 gensec_update_done: ntlmssp[0x5579c7e8d750]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8e080/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8e230)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e84490]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8cc30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8cde0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e8d750]: subreq: 0x5579c7e8e870 gensec_update_send: spnego[0x5579c7e84490]: subreq: 0x5579c7e8e220 gensec_update_done: ntlmssp[0x5579c7e8d750]: NT_STATUS_OK tevent_req[0x5579c7e8e870/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8ea20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e84490]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8e220/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8e3d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e84490]: subreq: 0x5579c7e8c9e0 gensec_update_done: spnego[0x5579c7e84490]: NT_STATUS_OK tevent_req[0x5579c7e8c9e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8cb90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\My Subjects| split_dfs_path: server: |2012FS| split_dfs_path: share: |My Subjects| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects cli_cm_find: Looking for connection to server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: Found match server 2012FS share My Subjects dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e90c20]: subreq: 0x5579c7e91210 gensec_update_send: spnego[0x5579c7e8ec70]: subreq: 0x5579c7e90080 gensec_update_done: ntlmssp[0x5579c7e90c20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e91210/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e913c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e8ec70]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e90080/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e90230)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e90c20]: subreq: 0x5579c7e91360 gensec_update_send: spnego[0x5579c7e8ec70]: subreq: 0x5579c7e90080 gensec_update_done: ntlmssp[0x5579c7e90c20]: NT_STATUS_OK tevent_req[0x5579c7e91360/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e91510)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e8ec70]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e90080/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e90230)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e8ec70]: subreq: 0x5579c7e8fd30 gensec_update_done: spnego[0x5579c7e8ec70]: NT_STATUS_OK tevent_req[0x5579c7e8fd30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8fee0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e91040]: subreq: 0x5579c7e919c0 gensec_update_send: spnego[0x5579c7e8e110]: subreq: 0x5579c7e904b0 gensec_update_done: ntlmssp[0x5579c7e91040]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e919c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e91b70)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e8e110]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e904b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e90660)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e91040]: subreq: 0x5579c7e904b0 gensec_update_send: spnego[0x5579c7e8e110]: subreq: 0x5579c7e912e0 gensec_update_done: ntlmssp[0x5579c7e91040]: NT_STATUS_OK tevent_req[0x5579c7e904b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e90660)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e8e110]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e912e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e91490)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e8e110]: subreq: 0x5579c7e933b0 gensec_update_done: spnego[0x5579c7e8e110]: NT_STATUS_OK tevent_req[0x5579c7e933b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e93560)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Students| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e90bf0]: subreq: 0x5579c7e91270 gensec_update_send: spnego[0x5579c7e8b810]: subreq: 0x5579c7e904b0 gensec_update_done: ntlmssp[0x5579c7e90bf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e91270/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e91420)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e8b810]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e904b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e90660)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e90bf0]: subreq: 0x5579c7e913c0 gensec_update_send: spnego[0x5579c7e8b810]: subreq: 0x5579c7e904b0 gensec_update_done: ntlmssp[0x5579c7e90bf0]: NT_STATUS_OK tevent_req[0x5579c7e913c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e91570)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e8b810]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e904b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e90660)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e8b810]: subreq: 0x5579c7e90f20 gensec_update_done: spnego[0x5579c7e8b810]: NT_STATUS_OK tevent_req[0x5579c7e90f20/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e910d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e910d0]: subreq: 0x5579c7e93bc0 gensec_update_send: spnego[0x5579c7e8e320]: subreq: 0x5579c7e905a0 gensec_update_done: ntlmssp[0x5579c7e910d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e93bc0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e93d70)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e8e320]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e905a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e90750)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e910d0]: subreq: 0x5579c7e944b0 gensec_update_send: spnego[0x5579c7e8e320]: subreq: 0x5579c7e90250 gensec_update_done: ntlmssp[0x5579c7e910d0]: NT_STATUS_OK tevent_req[0x5579c7e944b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94660)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e8e320]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e90250/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e90400)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e8e320]: subreq: 0x5579c7e95c20 gensec_update_done: spnego[0x5579c7e8e320]: NT_STATUS_OK tevent_req[0x5579c7e95c20/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e95dd0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\My Subjects| split_dfs_path: server: |2012FS| split_dfs_path: share: |My Subjects| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects cli_cm_find: Looking for connection to server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: Found match server 2012FS share My Subjects dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] signed SMB2 message signed SMB2 message signed SMB2 message Total bytes listed: 437495 . D 0 Wed Feb 6 20:08:28 2019 .. D 0 Wed Feb 6 20:08:28 2019 text.docx A 7277 Thu Feb 1 19:48:41 2018 text.png A 430218 Mon Sep 10 09:21:23 2018 Maths D 0 Tue Mar 5 16:13:04 2019 10395647 blocks of size 4096. 1584260 blocks available smb: \Information for Staff\Information for Students\My Subjects\> cd Ydos_clean_name [\Information for Staff\Information for Students\My Subjects\*] unix_clean_name [\Information for Staff\Information for Students\My Subjects\*] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e8bfb0]: subreq: 0x5579c7e94670 gensec_update_send: spnego[0x5579c7e94090]: subreq: 0x5579c7e91fc0 gensec_update_done: ntlmssp[0x5579c7e8bfb0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94670/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94820)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e94090]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e91fc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e92170)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e8bfb0]: subreq: 0x5579c7e94670 gensec_update_send: spnego[0x5579c7e94090]: subreq: 0x5579c7e950d0 gensec_update_done: ntlmssp[0x5579c7e8bfb0]: NT_STATUS_OK tevent_req[0x5579c7e94670/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94820)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e94090]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e950d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e95280)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e94090]: subreq: 0x5579c7e94320 gensec_update_done: spnego[0x5579c7e94090]: NT_STATUS_OK tevent_req[0x5579c7e94320/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e944d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e843b0]: subreq: 0x5579c7e94670 gensec_update_send: spnego[0x5579c7e95560]: subreq: 0x5579c7e91fc0 gensec_update_done: ntlmssp[0x5579c7e843b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94670/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94820)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e95560]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e91fc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e92170)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e843b0]: subreq: 0x5579c7e94a90 gensec_update_send: spnego[0x5579c7e95560]: subreq: 0x5579c7e94320 gensec_update_done: ntlmssp[0x5579c7e843b0]: NT_STATUS_OK tevent_req[0x5579c7e94a90/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94c40)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e95560]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94320/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e944d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e95560]: subreq: 0x5579c7e91300 gensec_update_done: spnego[0x5579c7e95560]: NT_STATUS_OK tevent_req[0x5579c7e91300/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e914b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Students| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e94d60]: subreq: 0x5579c7e90250 gensec_update_send: spnego[0x5579c7e72a90]: subreq: 0x5579c7e94320 gensec_update_done: ntlmssp[0x5579c7e94d60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e90250/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e90400)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e72a90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94320/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e944d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e94d60]: subreq: 0x5579c7e90960 gensec_update_send: spnego[0x5579c7e72a90]: subreq: 0x5579c7e95090 gensec_update_done: ntlmssp[0x5579c7e94d60]: NT_STATUS_OK tevent_req[0x5579c7e90960/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e90b10)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e72a90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e95090/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e95240)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e72a90]: subreq: 0x5579c7e95090 gensec_update_done: spnego[0x5579c7e72a90]: NT_STATUS_OK tevent_req[0x5579c7e95090/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e95240)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e95130]: subreq: 0x5579c7e905a0 gensec_update_send: spnego[0x5579c7e938b0]: subreq: 0x5579c7e94670 gensec_update_done: ntlmssp[0x5579c7e95130]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e905a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e90750)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e938b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94670/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e94820)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e95130]: subreq: 0x5579c7e90250 gensec_update_send: spnego[0x5579c7e938b0]: subreq: 0x5579c7e91170 gensec_update_done: ntlmssp[0x5579c7e95130]: NT_STATUS_OK tevent_req[0x5579c7e90250/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e90400)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e938b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e91170/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e91320)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e938b0]: subreq: 0x5579c7e94a40 gensec_update_done: spnego[0x5579c7e938b0]: NT_STATUS_OK tevent_req[0x5579c7e94a40/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e94bf0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\My Subjects| split_dfs_path: server: |2012FS| split_dfs_path: share: |My Subjects| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects cli_cm_find: Looking for connection to server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: Found match server 2012FS share My Subjects dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message R3\ dos_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\] unix_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e94410]: subreq: 0x5579c7e94a00 gensec_update_send: spnego[0x5579c7e90680]: subreq: 0x5579c7e92cc0 gensec_update_done: ntlmssp[0x5579c7e94410]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94a00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94bb0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e90680]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e92cc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e92e70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e94410]: subreq: 0x5579c7e94a00 gensec_update_send: spnego[0x5579c7e90680]: subreq: 0x5579c7e92cc0 gensec_update_done: ntlmssp[0x5579c7e94410]: NT_STATUS_OK tevent_req[0x5579c7e94a00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94bb0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e90680]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e92cc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e92e70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e90680]: subreq: 0x5579c7e92cc0 gensec_update_done: spnego[0x5579c7e90680]: NT_STATUS_OK tevent_req[0x5579c7e92cc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e92e70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e94850]: subreq: 0x5579c7e90b60 gensec_update_send: spnego[0x5579c7e87bd0]: subreq: 0x5579c7e94320 gensec_update_done: ntlmssp[0x5579c7e94850]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e90b60/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e90d10)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e87bd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94320/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e944d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e94850]: subreq: 0x5579c7e90250 gensec_update_send: spnego[0x5579c7e87bd0]: subreq: 0x5579c7e90810 gensec_update_done: ntlmssp[0x5579c7e94850]: NT_STATUS_OK tevent_req[0x5579c7e90250/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e90400)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e87bd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e90810/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e909c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e87bd0]: subreq: 0x5579c7e90810 gensec_update_done: spnego[0x5579c7e87bd0]: NT_STATUS_OK tevent_req[0x5579c7e90810/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e909c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Students| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e90f90]: subreq: 0x5579c7e96760 gensec_update_send: spnego[0x5579c7e956d0]: subreq: 0x5579c7e949b0 gensec_update_done: ntlmssp[0x5579c7e90f90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e96760/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e96910)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e956d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e949b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e94b60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e90f90]: subreq: 0x5579c7e949b0 gensec_update_send: spnego[0x5579c7e956d0]: subreq: 0x5579c7e91230 gensec_update_done: ntlmssp[0x5579c7e90f90]: NT_STATUS_OK tevent_req[0x5579c7e949b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94b60)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e956d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e91230/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e913e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e956d0]: subreq: 0x5579c7e91230 gensec_update_done: spnego[0x5579c7e956d0]: NT_STATUS_OK tevent_req[0x5579c7e91230/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e913e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e949e0]: subreq: 0x5579c7e96ab0 gensec_update_send: spnego[0x5579c7e91a30]: subreq: 0x5579c7e94320 gensec_update_done: ntlmssp[0x5579c7e949e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e96ab0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e96c60)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e91a30]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94320/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e944d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e949e0]: subreq: 0x5579c7e96be0 gensec_update_send: spnego[0x5579c7e91a30]: subreq: 0x5579c7e94320 gensec_update_done: ntlmssp[0x5579c7e949e0]: NT_STATUS_OK tevent_req[0x5579c7e96be0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e96d90)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e91a30]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94320/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e944d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e91a30]: subreq: 0x5579c7e94320 gensec_update_done: spnego[0x5579c7e91a30]: NT_STATUS_OK tevent_req[0x5579c7e94320/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e944d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\My Subjects| split_dfs_path: server: |2012FS| split_dfs_path: share: |My Subjects| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects cli_cm_find: Looking for connection to server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: Found match server 2012FS share My Subjects dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] signed SMB2 message signed SMB2 message smb: \Information for Staff\Information for Students\My Subjects\Maths\> dir dos_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\*] unix_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\*] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e960b0]: subreq: 0x5579c7e91410 gensec_update_send: spnego[0x5579c7e91fa0]: subreq: 0x5579c7e94850 gensec_update_done: ntlmssp[0x5579c7e960b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e91410/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e915c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e91fa0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94850/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e94a00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e960b0]: subreq: 0x5579c7e91560 gensec_update_send: spnego[0x5579c7e91fa0]: subreq: 0x5579c7e94850 gensec_update_done: ntlmssp[0x5579c7e960b0]: NT_STATUS_OK tevent_req[0x5579c7e91560/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e91710)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e91fa0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94850/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e94a00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e91fa0]: subreq: 0x5579c7e94850 gensec_update_done: spnego[0x5579c7e91fa0]: NT_STATUS_OK tevent_req[0x5579c7e94850/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e94a00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e910a0]: subreq: 0x5579c7e96760 gensec_update_send: spnego[0x5579c7e8f3f0]: subreq: 0x5579c7e94850 gensec_update_done: ntlmssp[0x5579c7e910a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e96760/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e96910)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e8f3f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94850/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e94a00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e910a0]: subreq: 0x5579c7e96760 gensec_update_send: spnego[0x5579c7e8f3f0]: subreq: 0x5579c7e95fc0 gensec_update_done: ntlmssp[0x5579c7e910a0]: NT_STATUS_OK tevent_req[0x5579c7e96760/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e96910)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e8f3f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e95fc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e96170)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e8f3f0]: subreq: 0x5579c7e96760 gensec_update_done: spnego[0x5579c7e8f3f0]: NT_STATUS_OK tevent_req[0x5579c7e96760/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e96910)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Students| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e97c90]: subreq: 0x5579c7e988b0 gensec_update_send: spnego[0x5579c7e93430]: subreq: 0x5579c7e97070 gensec_update_done: ntlmssp[0x5579c7e97c90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e988b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e98a60)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e93430]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e97070/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e97220)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e97c90]: subreq: 0x5579c7e99110 gensec_update_send: spnego[0x5579c7e93430]: subreq: 0x5579c7e98a60 gensec_update_done: ntlmssp[0x5579c7e97c90]: NT_STATUS_OK tevent_req[0x5579c7e99110/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e992c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e93430]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e98a60/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e98c10)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e93430]: subreq: 0x5579c7e98f80 gensec_update_done: spnego[0x5579c7e93430]: NT_STATUS_OK tevent_req[0x5579c7e98f80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e99130)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e986f0]: subreq: 0x5579c7e98ce0 gensec_update_send: spnego[0x5579c7e91180]: subreq: 0x5579c7e97500 gensec_update_done: ntlmssp[0x5579c7e986f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e98ce0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e98e90)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e91180]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e97500/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e976b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e986f0]: subreq: 0x5579c7e98e10 gensec_update_send: spnego[0x5579c7e91180]: subreq: 0x5579c7e971b0 gensec_update_done: ntlmssp[0x5579c7e986f0]: NT_STATUS_OK tevent_req[0x5579c7e98e10/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e98fc0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e91180]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e971b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e97360)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e91180]: subreq: 0x5579c7e995c0 gensec_update_done: spnego[0x5579c7e91180]: NT_STATUS_OK tevent_req[0x5579c7e995c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e99770)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\My Subjects| split_dfs_path: server: |2012FS| split_dfs_path: share: |My Subjects| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects cli_cm_find: Looking for connection to server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: Found match server 2012FS share My Subjects dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff cli_cm_find: Looking for connection to server domain.com share Information for Staff cli_cm_find: List entry server 2012FS share DFS cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff do_connect: Making new connection to server domain.com share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e9a430]: subreq: 0x5579c7e9ab20 gensec_update_send: spnego[0x5579c7e96d90]: subreq: 0x5579c7e99490 gensec_update_done: ntlmssp[0x5579c7e9a430]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9ab20/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9acd0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e96d90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e99490/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e99640)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e9a430]: subreq: 0x5579c7e9ac70 gensec_update_send: spnego[0x5579c7e96d90]: subreq: 0x5579c7e99140 gensec_update_done: ntlmssp[0x5579c7e9a430]: NT_STATUS_OK tevent_req[0x5579c7e9ac70/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9ae20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e96d90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e99140/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e992f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e96d90]: subreq: 0x5579c7e9b2f0 gensec_update_done: spnego[0x5579c7e96d90]: NT_STATUS_OK tevent_req[0x5579c7e9b2f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9b4a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Staff sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e9a960]: subreq: 0x5579c7e9af50 gensec_update_send: spnego[0x5579c7e919f0]: subreq: 0x5579c7e99fa0 gensec_update_done: ntlmssp[0x5579c7e9a960]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9af50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9b100)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e919f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e99fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9a150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e9a960]: subreq: 0x5579c7e9a2f0 gensec_update_send: spnego[0x5579c7e919f0]: subreq: 0x5579c7e9b0f0 gensec_update_done: ntlmssp[0x5579c7e9a960]: NT_STATUS_OK tevent_req[0x5579c7e9a2f0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9a4a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e919f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9b0f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9b2a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e919f0]: subreq: 0x5579c7e9b830 gensec_update_done: spnego[0x5579c7e919f0]: NT_STATUS_OK tevent_req[0x5579c7e9b830/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9b9e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Staff| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff] unix_clean_name [\DFS\Information for Staff] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths signed SMB2 message split_dfs_path: split_dfs_path: |\domain.com\Information for Students| split_dfs_path: server: |domain.com| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students cli_cm_find: Looking for connection to server domain.com share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share DFS cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students do_connect: Making new connection to server domain.com share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up domain.com#20 (sitename (null)) name domain.com#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.41 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[domain.com] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e9c920]: subreq: 0x5579c7e9cfa0 gensec_update_send: spnego[0x5579c7e97bf0]: subreq: 0x5579c7e9b510 gensec_update_done: ntlmssp[0x5579c7e9c920]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9cfa0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9d150)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e97bf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9b510/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9b6c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e9c920]: subreq: 0x5579c7e9cfa0 gensec_update_send: spnego[0x5579c7e97bf0]: subreq: 0x5579c7e9b1c0 gensec_update_done: ntlmssp[0x5579c7e9c920]: NT_STATUS_OK tevent_req[0x5579c7e9cfa0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9d150)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e97bf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9b1c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9b370)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e97bf0]: subreq: 0x5579c7e9b1c0 gensec_update_done: spnego[0x5579c7e97bf0]: NT_STATUS_OK tevent_req[0x5579c7e9b1c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9b370)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || do_connect: Making new connection to server 2012FS share Information for Students sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up 2012FS#20 (sitename (null)) name 2012FS#20 found. remove_duplicate_addrs2: looking for duplicate address/port pairs Connecting to 10.1.1.237 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 session request ok negotiated dialect[SMB3_02] against server[2012FS] got OID=1.3.6.1.4.1.311.2.2.30 got OID=1.2.840.48018.1.2.2 kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c7e9cab0]: subreq: 0x5579c7e9d130 gensec_update_send: spnego[0x5579c7e96ac0]: subreq: 0x5579c7e9b720 gensec_update_done: ntlmssp[0x5579c7e9cab0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9d130/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9d2e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c7e96ac0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9b720/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9b8d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c7e9cab0]: subreq: 0x5579c7e9b720 gensec_update_send: spnego[0x5579c7e96ac0]: subreq: 0x5579c7e9df00 gensec_update_done: ntlmssp[0x5579c7e9cab0]: NT_STATUS_OK tevent_req[0x5579c7e9b720/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9b8d0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c7e96ac0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9df00/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9e0b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c7e96ac0]: subreq: 0x5579c7e9c600 gensec_update_done: spnego[0x5579c7e96ac0]: NT_STATUS_OK tevent_req[0x5579c7e9c600/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9c7b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] session setup ok signed SMB2 message signed SMB2 message signed SMB2 message signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\Information for Students| split_dfs_path: server: |2012FS| split_dfs_path: share: |Information for Students| split_dfs_path: extrapath: || signed SMB2 message signed SMB2 message tconx ok dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths signed SMB2 message cli_cm_find: Looking for connection to server 2012FS share IPC$ cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share IPC$ cli_cm_find: Found match server 2012FS share IPC$ cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths signed SMB2 message split_dfs_path: split_dfs_path: |\2012FS\My Subjects| split_dfs_path: server: |2012FS| split_dfs_path: share: |My Subjects| split_dfs_path: extrapath: || cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects cli_cm_find: Looking for connection to server 2012FS share My Subjects cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share Information for Staff cli_cm_find: List entry server 2012FS share Information for Students cli_cm_find: List entry server 2012FS share My Subjects cli_cm_find: Found match server 2012FS share My Subjects dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] signed SMB2 message signed SMB2 message signed SMB2 message Total bytes listed: 0 . D 0 Tue Mar 5 16:13:04 2019 .. D 0 Tue Mar 5 16:13:04 2019 Level 1 D 0 Sat Nov 11 20:07:34 2017 10395647 blocks of size 4096. 1584260 blocks available smb: \Information for Staff\Information for Students\My Subjects\Maths\> exit signed SMB2 message