The Samba-Bugzilla – Attachment 14921 Details for
Bug 13824
libsmbclient leaks when accessing files inside nested DFS namespaces
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Debug output from smbclient with patch v2
smbclient-rebuilt-v2.txt (text/plain), 411.47 KB, created by
Chris
on 2019-03-12 20:22:18 UTC
(
hide
)
Description:
Debug output from smbclient with patch v2
Filename:
MIME Type:
Creator:
Chris
Created:
2019-03-12 20:22:18 UTC
Size:
411.47 KB
patch
obsolete
>INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >lp_load_ex: refreshing parameters >Initialising global parameters >rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >pm_process() returned Yes >lp_servicenumber: couldn't find homes >messaging_dgm_ref: messaging_dgm_init returned Success >messaging_dgm_ref: unique = 4634864307237352467 >Registering messaging pointer for type 2 - private_data=(nil) >Registering messaging pointer for type 9 - private_data=(nil) >Registered MSG_REQ_POOL_USAGE >Registering messaging pointer for type 11 - private_data=(nil) >Registering messaging pointer for type 12 - private_data=(nil) >Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED >Registering messaging pointer for type 1 - private_data=(nil) >Registering messaging pointer for type 5 - private_data=(nil) >Registering messaging pointer for type 51 - private_data=(nil) >messaging_init_internal: my id: 11869 >lp_load_ex: refreshing parameters >Freeing parametrics: >Initialising global parameters >rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >pm_process() returned Yes >lp_servicenumber: couldn't find homes >added interface ens160 ip=10.1.1.74 bcast=10.1.1.255 netmask=255.255.255.0 >Netbios name list:- >my_netbios_names[0]="SMBTEST" >Client started (version 4.9.4). >cli_cm_open: Calling cli_cm_connect on: server (null) share \\domain.com\DFS >do_connect: Making new connection to server (null) share \\domain.com\DFS >Opening cache file at /usr/local/samba/var/cache/gencache.tdb >Opening cache file at /usr/local/samba/var/lock/gencache_notrans.tdb >Adding cache entry with key=[AD_SITENAME/DOMAIN/] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552423998 seconds in the past) >Could not get allrecord lock on gencache_notrans.tdb: Locking error >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >Adding cache entry with key=[NBT/DOMAIN.COM#20] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552423998 seconds in the past) >no entry for domain.com#20 found. >resolve_hosts: Attempting host lookup for name domain.com<0x20> >remove_duplicate_addrs2: looking for duplicate address/port pairs >namecache_store: storing 2 addresses for domain.com#20: 10.1.1.41,10.1.1.43 >Adding cache entry with key=[NBT/DOMAIN.COM#20] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552423998 seconds in the past) >Adding cache entry with key=[NBT/DOMAIN.COM#20] and timeout=[Tue Mar 12 21:04:18 2019 GMT] (660 seconds ahead) >internal_resolve_name: returning 2 addresses: 10.1.1.41:0 10.1.1.43:0 >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >Enter DOMAIN.COM\username's password: kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >GENSEC backend 'gssapi_spnego' registered >GENSEC backend 'gssapi_krb5' registered >GENSEC backend 'gssapi_krb5_sasl' registered >GENSEC backend 'spnego' registered >GENSEC backend 'schannel' registered >GENSEC backend 'naclrpc_as_system' registered >GENSEC backend 'sasl-EXTERNAL' registered >GENSEC backend 'ntlmssp' registered >GENSEC backend 'ntlmssp_resume_ccache' registered >GENSEC backend 'http_basic' registered >GENSEC backend 'http_ntlm' registered >GENSEC backend 'http_negotiate' registered >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e44d40]: subreq: 0x5579c7e453c0 >gensec_update_send: spnego[0x5579c7e42b20]: subreq: 0x5579c7e44120 >gensec_update_done: ntlmssp[0x5579c7e44d40]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e453c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e45570)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e42b20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e44120/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e442d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e44d40]: subreq: 0x5579c7e56b70 >gensec_update_send: spnego[0x5579c7e42b20]: subreq: 0x5579c7e43dd0 >gensec_update_done: ntlmssp[0x5579c7e44d40]: NT_STATUS_OK tevent_req[0x5579c7e56b70/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e56d20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e42b20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e43dd0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e43f80)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e42b20]: subreq: 0x5579c7e43dd0 >gensec_update_done: spnego[0x5579c7e42b20]: NT_STATUS_OK tevent_req[0x5579c7e43dd0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e43f80)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\DFS| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |DFS| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share DFS >Adding cache entry with key=[AD_SITENAME/DOMAIN/] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552424003 seconds in the past) >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >Adding cache entry with key=[NBT/2012FS#20] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552424003 seconds in the past) >no entry for 2012FS#20 found. >resolve_lmhosts: Attempting lmhosts lookup for name 2012FS<0x20> >startlmhosts: Can't open lmhosts file /usr/local/samba/etc/lmhosts. Error was No such file or directory >resolve_wins: WINS server resolution selected and no WINS servers listed. >resolve_hosts: Attempting host lookup for name 2012FS<0x20> >remove_duplicate_addrs2: looking for duplicate address/port pairs >namecache_store: storing 1 address for 2012FS#20: 10.1.1.237 >Adding cache entry with key=[NBT/2012FS#20] and timeout=[Tue Mar 12 21:04:23 2019 GMT] (660 seconds ahead) >internal_resolve_name: returning 1 addresses: 10.1.1.237:0 >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e41200]: subreq: 0x5579c7e43c20 >gensec_update_send: spnego[0x5579c7e45370]: subreq: 0x5579c7e409c0 >gensec_update_done: ntlmssp[0x5579c7e41200]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e43c20/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e43dd0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e45370]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e409c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e40b70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e41200]: subreq: 0x5579c7e578a0 >gensec_update_send: spnego[0x5579c7e45370]: subreq: 0x5579c7e44200 >gensec_update_done: ntlmssp[0x5579c7e41200]: NT_STATUS_OK tevent_req[0x5579c7e578a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e57a50)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e45370]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e44200/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e443b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e45370]: subreq: 0x5579c7e44200 >gensec_update_done: spnego[0x5579c7e45370]: NT_STATUS_OK tevent_req[0x5579c7e44200/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e443b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\DFS| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |DFS| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok > >Try "help" to get a list of possible commands. >smb: \> dir >dos_clean_name [\*] >unix_clean_name [\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\ >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\ >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 0 > . D 0 Fri Nov 10 23:27:03 2017 > .. D 0 Fri Nov 10 23:27:03 2017 > Information for Staff D 0 Tue Sep 5 04:13:14 2017 > Information for Students D 0 Fri Nov 10 23:27:03 2017 > > 10395647 blocks of size 4096. 1584260 blocks available >smb: \> cd "Information for Staff" >dos_clean_name [\Information for Staff\] >unix_clean_name [\Information for Staff\] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_open: Calling cli_cm_connect on: server 2012FS share IPC$ >do_connect: Making new connection to server 2012FS share IPC$ >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e74270]: subreq: 0x5579c7e74960 >gensec_update_send: spnego[0x5579c7e71e90]: subreq: 0x5579c7e738b0 >gensec_update_done: ntlmssp[0x5579c7e74270]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e74960/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e74b10)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e71e90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e738b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e73a60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e74270]: subreq: 0x5579c7e738b0 >gensec_update_send: spnego[0x5579c7e71e90]: subreq: 0x5579c7e74610 >gensec_update_done: ntlmssp[0x5579c7e74270]: NT_STATUS_OK tevent_req[0x5579c7e738b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e73a60)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e71e90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e74610/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e747c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e71e90]: subreq: 0x5579c7e74610 >gensec_update_done: spnego[0x5579c7e71e90]: NT_STATUS_OK tevent_req[0x5579c7e74610/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e747c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message > tconx ok >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e753b0]: subreq: 0x5579c7e762c0 >gensec_update_send: spnego[0x5579c7e71ea0]: subreq: 0x5579c7e74790 >gensec_update_done: ntlmssp[0x5579c7e753b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e762c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e76470)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e71ea0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e74790/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e74940)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e753b0]: subreq: 0x5579c7e769e0 >gensec_update_send: spnego[0x5579c7e71ea0]: subreq: 0x5579c7e74440 >gensec_update_done: ntlmssp[0x5579c7e753b0]: NT_STATUS_OK tevent_req[0x5579c7e769e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e76b90)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e71ea0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e74440/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e745f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e71ea0]: subreq: 0x5579c7e74d10 >gensec_update_done: spnego[0x5579c7e71ea0]: NT_STATUS_OK tevent_req[0x5579c7e74d10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e74ec0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e743a0]: subreq: 0x5579c7e74a90 >gensec_update_send: spnego[0x5579c7e71670]: subreq: 0x5579c7e770b0 >gensec_update_done: ntlmssp[0x5579c7e743a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e74a90/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e74c40)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e71670]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e770b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e77260)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e743a0]: subreq: 0x5579c7e74740 >gensec_update_send: spnego[0x5579c7e71670]: subreq: 0x5579c7e73ef0 >gensec_update_done: ntlmssp[0x5579c7e743a0]: NT_STATUS_OK tevent_req[0x5579c7e74740/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e748f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e71670]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e73ef0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e740a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e71670]: subreq: 0x5579c7e77e30 >gensec_update_done: spnego[0x5579c7e71670]: NT_STATUS_OK tevent_req[0x5579c7e77e30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e77fe0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >signed SMB2 message >signed SMB2 message >smb: \Information for Staff\> dir >dos_clean_name [\Information for Staff\*] >unix_clean_name [\Information for Staff\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e77be0]: subreq: 0x5579c7e78260 >gensec_update_send: spnego[0x5579c7e71650]: subreq: 0x5579c7e77130 >gensec_update_done: ntlmssp[0x5579c7e77be0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e78260/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e78410)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e71650]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e77130/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e772e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e77be0]: subreq: 0x5579c7e78ac0 >gensec_update_send: spnego[0x5579c7e71650]: subreq: 0x5579c7e78410 >gensec_update_done: ntlmssp[0x5579c7e77be0]: NT_STATUS_OK tevent_req[0x5579c7e78ac0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e78c70)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e71650]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e78410/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e785c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e71650]: subreq: 0x5579c7e78950 >gensec_update_done: spnego[0x5579c7e71650]: NT_STATUS_OK tevent_req[0x5579c7e78950/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e78b00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e77460]: subreq: 0x5579c7e77a50 >gensec_update_send: spnego[0x5579c7e74550]: subreq: 0x5579c7e750d0 >gensec_update_done: ntlmssp[0x5579c7e77460]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e77a50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e77c00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e74550]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e750d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e75280)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e77460]: subreq: 0x5579c7e76e80 >gensec_update_send: spnego[0x5579c7e74550]: subreq: 0x5579c7e74d80 >gensec_update_done: ntlmssp[0x5579c7e77460]: NT_STATUS_OK tevent_req[0x5579c7e76e80/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e77030)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e74550]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e74d80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e74f30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e74550]: subreq: 0x5579c7e74d80 >gensec_update_done: spnego[0x5579c7e74550]: NT_STATUS_OK tevent_req[0x5579c7e74d80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e74f30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\ >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e7b460]: subreq: 0x5579c7e7bae0 >gensec_update_send: spnego[0x5579c7e78c50]: subreq: 0x5579c7e7a8b0 >gensec_update_done: ntlmssp[0x5579c7e7b460]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7bae0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7bc90)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e78c50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7a8b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7aa60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e7b460]: subreq: 0x5579c7e7c480 >gensec_update_send: spnego[0x5579c7e78c50]: subreq: 0x5579c7e7a560 >gensec_update_done: ntlmssp[0x5579c7e7b460]: NT_STATUS_OK tevent_req[0x5579c7e7c480/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7c630)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e78c50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7a560/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7a710)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e78c50]: subreq: 0x5579c7e7a560 >gensec_update_done: spnego[0x5579c7e78c50]: NT_STATUS_OK tevent_req[0x5579c7e7a560/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7a710)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e7b910]: subreq: 0x5579c7e7bf00 >gensec_update_send: spnego[0x5579c7e7a320]: subreq: 0x5579c7e7ade0 >gensec_update_done: ntlmssp[0x5579c7e7b910]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7bf00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7c0b0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e7a320]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7ade0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7af90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e7b910]: subreq: 0x5579c7e7bf00 >gensec_update_send: spnego[0x5579c7e7a320]: subreq: 0x5579c7e7aa90 >gensec_update_done: ntlmssp[0x5579c7e7b910]: NT_STATUS_OK tevent_req[0x5579c7e7bf00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7c0b0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e7a320]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7aa90/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7ac40)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e7a320]: subreq: 0x5579c7e7aa90 >gensec_update_done: spnego[0x5579c7e7a320]: NT_STATUS_OK tevent_req[0x5579c7e7aa90/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7ac40)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 0 > . D 0 Mon Mar 4 11:34:13 2019 > .. D 0 Mon Mar 4 11:34:13 2019 > Information for Students D 0 Tue Sep 5 04:22:20 2017 > > 10395647 blocks of size 4096. 1584260 blocks available >smb: \Information for Staff\> cd "Information for Students" >dos_clean_name [\Information for Staff\Information for Students\] >unix_clean_name [\Information for Staff\Information for Students\] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e7be20]: subreq: 0x5579c7e7d650 >gensec_update_send: spnego[0x5579c7e75b00]: subreq: 0x5579c7e7b990 >gensec_update_done: ntlmssp[0x5579c7e7be20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7d650/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7d800)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e75b00]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7b990/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7bb40)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e7be20]: subreq: 0x5579c7e7d650 >gensec_update_send: spnego[0x5579c7e75b00]: subreq: 0x5579c7e7b640 >gensec_update_done: ntlmssp[0x5579c7e7be20]: NT_STATUS_OK tevent_req[0x5579c7e7d650/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7d800)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e75b00]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7b640/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7b7f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e75b00]: subreq: 0x5579c7e7dc80 >gensec_update_done: spnego[0x5579c7e75b00]: NT_STATUS_OK tevent_req[0x5579c7e7dc80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7de30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e7c280]: subreq: 0x5579c7e7d7e0 >gensec_update_send: spnego[0x5579c7e723f0]: subreq: 0x5579c7e7b9c0 >gensec_update_done: ntlmssp[0x5579c7e7c280]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7d7e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7d990)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e723f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7b9c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7bb70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e7c280]: subreq: 0x5579c7e7d7e0 >gensec_update_send: spnego[0x5579c7e723f0]: subreq: 0x5579c7e7b9c0 >gensec_update_done: ntlmssp[0x5579c7e7c280]: NT_STATUS_OK tevent_req[0x5579c7e7d7e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7d990)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e723f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7b9c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7bb70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e723f0]: subreq: 0x5579c7e7e050 >gensec_update_done: spnego[0x5579c7e723f0]: NT_STATUS_OK tevent_req[0x5579c7e7e050/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7e200)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e7efc0]: subreq: 0x5579c7e7f5b0 >gensec_update_send: spnego[0x5579c7e7e620]: subreq: 0x5579c7e7bd10 >gensec_update_done: ntlmssp[0x5579c7e7efc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7f5b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7f760)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e7e620]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7bd10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7bec0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e7efc0]: subreq: 0x5579c7e7bd10 >gensec_update_send: spnego[0x5579c7e7e620]: subreq: 0x5579c7e7f760 >gensec_update_done: ntlmssp[0x5579c7e7efc0]: NT_STATUS_OK tevent_req[0x5579c7e7bd10/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7bec0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e7e620]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7f760/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7f910)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e7e620]: subreq: 0x5579c7e7fc80 >gensec_update_done: spnego[0x5579c7e7e620]: NT_STATUS_OK tevent_req[0x5579c7e7fc80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7fe30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e7f450]: subreq: 0x5579c7e7fad0 >gensec_update_send: spnego[0x5579c7e7e050]: subreq: 0x5579c7e7ec20 >gensec_update_done: ntlmssp[0x5579c7e7f450]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7fad0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e7fc80)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e7e050]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7ec20/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7edd0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e7f450]: subreq: 0x5579c7e80330 >gensec_update_send: spnego[0x5579c7e7e050]: subreq: 0x5579c7e7fc70 >gensec_update_done: ntlmssp[0x5579c7e7f450]: NT_STATUS_OK tevent_req[0x5579c7e80330/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e804e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e7e050]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7fc70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7fe20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e7e050]: subreq: 0x5579c7e7eda0 >gensec_update_done: spnego[0x5579c7e7e050]: NT_STATUS_OK tevent_req[0x5579c7e7eda0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7ef50)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >signed SMB2 message >signed SMB2 message >smb: \Information for Staff\Information for Students\> dir >dos_clean_name [\Information for Staff\Information for Students\*] >unix_clean_name [\Information for Staff\Information for Students\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e7d9f0]: subreq: 0x5579c7e80d20 >gensec_update_send: spnego[0x5579c7e789d0]: subreq: 0x5579c7e805b0 >gensec_update_done: ntlmssp[0x5579c7e7d9f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e80d20/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e80ed0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e789d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e805b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e80760)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e7d9f0]: subreq: 0x5579c7e80d20 >gensec_update_send: spnego[0x5579c7e789d0]: subreq: 0x5579c7e805b0 >gensec_update_done: ntlmssp[0x5579c7e7d9f0]: NT_STATUS_OK tevent_req[0x5579c7e80d20/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e80ed0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e789d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e805b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e80760)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e789d0]: subreq: 0x5579c7e81250 >gensec_update_done: spnego[0x5579c7e789d0]: NT_STATUS_OK tevent_req[0x5579c7e81250/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e81400)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e80840]: subreq: 0x5579c7e81250 >gensec_update_send: spnego[0x5579c7e789d0]: subreq: 0x5579c7e7f720 >gensec_update_done: ntlmssp[0x5579c7e80840]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e81250/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e81400)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e789d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7f720/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7f8d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e80840]: subreq: 0x5579c7e81c50 >gensec_update_send: spnego[0x5579c7e789d0]: subreq: 0x5579c7e7f720 >gensec_update_done: ntlmssp[0x5579c7e80840]: NT_STATUS_OK tevent_req[0x5579c7e81c50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e81e00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e789d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e7f720/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7f8d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e789d0]: subreq: 0x5579c7e7f720 >gensec_update_done: spnego[0x5579c7e789d0]: NT_STATUS_OK tevent_req[0x5579c7e7f720/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e7f8d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e82860]: subreq: 0x5579c7e82f50 >gensec_update_send: spnego[0x5579c7e72dc0]: subreq: 0x5579c7e81e10 >gensec_update_done: ntlmssp[0x5579c7e82860]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e82f50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e83100)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e72dc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e81e10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e81fc0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e82860]: subreq: 0x5579c7e82f50 >gensec_update_send: spnego[0x5579c7e72dc0]: subreq: 0x5579c7e823b0 >gensec_update_done: ntlmssp[0x5579c7e82860]: NT_STATUS_OK tevent_req[0x5579c7e82f50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e83100)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e72dc0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e823b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e82560)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e72dc0]: subreq: 0x5579c7e823b0 >gensec_update_done: spnego[0x5579c7e72dc0]: NT_STATUS_OK tevent_req[0x5579c7e823b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e82560)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e82ba0]: subreq: 0x5579c7e83290 >gensec_update_send: spnego[0x5579c7e7f760]: subreq: 0x5579c7e82160 >gensec_update_done: ntlmssp[0x5579c7e82ba0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e83290/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e83440)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e7f760]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e82160/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e82310)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e82ba0]: subreq: 0x5579c7e83af0 >gensec_update_send: spnego[0x5579c7e7f760]: subreq: 0x5579c7e82f40 >gensec_update_done: ntlmssp[0x5579c7e82ba0]: NT_STATUS_OK tevent_req[0x5579c7e83af0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e83ca0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e7f760]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e82f40/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e830f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e7f760]: subreq: 0x5579c7e81e10 >gensec_update_done: spnego[0x5579c7e7f760]: NT_STATUS_OK tevent_req[0x5579c7e81e10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e81fc0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\ >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e85e10]: subreq: 0x5579c7e86400 >gensec_update_send: spnego[0x5579c7e820f0]: subreq: 0x5579c7e85280 >gensec_update_done: ntlmssp[0x5579c7e85e10]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e86400/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e865b0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e820f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e85280/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e85430)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e85e10]: subreq: 0x5579c7e86550 >gensec_update_send: spnego[0x5579c7e820f0]: subreq: 0x5579c7e85280 >gensec_update_done: ntlmssp[0x5579c7e85e10]: NT_STATUS_OK tevent_req[0x5579c7e86550/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e86700)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e820f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e85280/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e85430)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e820f0]: subreq: 0x5579c7e84f30 >gensec_update_done: spnego[0x5579c7e820f0]: NT_STATUS_OK tevent_req[0x5579c7e84f30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e850e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e86170]: subreq: 0x5579c7e86b30 >gensec_update_send: spnego[0x5579c7e81360]: subreq: 0x5579c7e856c0 >gensec_update_done: ntlmssp[0x5579c7e86170]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e86b30/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e86ce0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e81360]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e856c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e85870)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e86170]: subreq: 0x5579c7e870d0 >gensec_update_send: spnego[0x5579c7e81360]: subreq: 0x5579c7e86410 >gensec_update_done: ntlmssp[0x5579c7e86170]: NT_STATUS_OK tevent_req[0x5579c7e870d0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e87280)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e81360]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e86410/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e865c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e81360]: subreq: 0x5579c7e86b30 >gensec_update_done: spnego[0x5579c7e81360]: NT_STATUS_OK tevent_req[0x5579c7e86b30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e86ce0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e880d0]: subreq: 0x5579c7e886c0 >gensec_update_send: spnego[0x5579c7e87230]: subreq: 0x5579c7e85ec0 >gensec_update_done: ntlmssp[0x5579c7e880d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e886c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e88870)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e87230]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e85ec0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e86070)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e880d0]: subreq: 0x5579c7e88810 >gensec_update_send: spnego[0x5579c7e87230]: subreq: 0x5579c7e85b70 >gensec_update_done: ntlmssp[0x5579c7e880d0]: NT_STATUS_OK tevent_req[0x5579c7e88810/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e889c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e87230]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e85b70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e85d20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e87230]: subreq: 0x5579c7e88fa0 >gensec_update_done: spnego[0x5579c7e87230]: NT_STATUS_OK tevent_req[0x5579c7e88fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e88550]: subreq: 0x5579c7e88bd0 >gensec_update_send: spnego[0x5579c7e84350]: subreq: 0x5579c7e86260 >gensec_update_done: ntlmssp[0x5579c7e88550]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e88bd0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e88d80)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e84350]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e86260/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e86410)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e88550]: subreq: 0x5579c7e89430 >gensec_update_send: spnego[0x5579c7e84350]: subreq: 0x5579c7e88d70 >gensec_update_done: ntlmssp[0x5579c7e88550]: NT_STATUS_OK tevent_req[0x5579c7e89430/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e895e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e84350]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e88d70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e88f20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e84350]: subreq: 0x5579c7e87ec0 >gensec_update_done: spnego[0x5579c7e84350]: NT_STATUS_OK tevent_req[0x5579c7e87ec0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e88070)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 0 > . D 0 Mon Mar 4 11:23:14 2019 > .. D 0 Mon Mar 4 11:23:14 2019 > All Shared D 0 Mon Mar 4 11:23:14 2019 > My Subjects D 0 Fri Nov 10 14:59:41 2017 > > 10395647 blocks of size 4096. 1584260 blocks available >smb: \Information for Staff\Information for Students\> cd "My Subjects" >dos_clean_name [\Information for Staff\Information for Students\My Subjects\] >unix_clean_name [\Information for Staff\Information for Students\My Subjects\] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e820f0]: subreq: 0x5579c7e89a60 >gensec_update_send: spnego[0x5579c7e76110]: subreq: 0x5579c7e892f0 >gensec_update_done: ntlmssp[0x5579c7e820f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e89a60/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e89c10)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e76110]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e892f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e894a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e820f0]: subreq: 0x5579c7e89a60 >gensec_update_send: spnego[0x5579c7e76110]: subreq: 0x5579c7e892f0 >gensec_update_done: ntlmssp[0x5579c7e820f0]: NT_STATUS_OK tevent_req[0x5579c7e89a60/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e89c10)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e76110]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e892f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e894a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e76110]: subreq: 0x5579c7e88fa0 >gensec_update_done: spnego[0x5579c7e76110]: NT_STATUS_OK tevent_req[0x5579c7e88fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e81230]: subreq: 0x5579c7e89710 >gensec_update_send: spnego[0x5579c7e86eb0]: subreq: 0x5579c7e88fa0 >gensec_update_done: ntlmssp[0x5579c7e81230]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e89710/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e898c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e86eb0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e88fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e81230]: subreq: 0x5579c7e89710 >gensec_update_send: spnego[0x5579c7e86eb0]: subreq: 0x5579c7e88fa0 >gensec_update_done: ntlmssp[0x5579c7e81230]: NT_STATUS_OK tevent_req[0x5579c7e89710/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e898c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e86eb0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e88fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e86eb0]: subreq: 0x5579c7e8a3b0 >gensec_update_done: spnego[0x5579c7e86eb0]: NT_STATUS_OK tevent_req[0x5579c7e8a3b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8a560)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e899b0]: subreq: 0x5579c7e8a850 >gensec_update_send: spnego[0x5579c7e80160]: subreq: 0x5579c7e892f0 >gensec_update_done: ntlmssp[0x5579c7e899b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8a850/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8aa00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e80160]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e892f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e894a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e899b0]: subreq: 0x5579c7e8a850 >gensec_update_send: spnego[0x5579c7e80160]: subreq: 0x5579c7e88fa0 >gensec_update_done: ntlmssp[0x5579c7e899b0]: NT_STATUS_OK tevent_req[0x5579c7e8a850/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8aa00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e80160]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e88fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e80160]: subreq: 0x5579c7e8a850 >gensec_update_done: spnego[0x5579c7e80160]: NT_STATUS_OK tevent_req[0x5579c7e8a850/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8aa00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e89960]: subreq: 0x5579c7e8ac70 >gensec_update_send: spnego[0x5579c7e80160]: subreq: 0x5579c7e893e0 >gensec_update_done: ntlmssp[0x5579c7e89960]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8ac70/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8ae20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e80160]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e893e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89590)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e89960]: subreq: 0x5579c7e8b5e0 >gensec_update_send: spnego[0x5579c7e80160]: subreq: 0x5579c7e89d00 >gensec_update_done: ntlmssp[0x5579c7e89960]: NT_STATUS_OK tevent_req[0x5579c7e8b5e0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8b790)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e80160]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e89d00/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89eb0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e80160]: subreq: 0x5579c7e89d00 >gensec_update_done: spnego[0x5579c7e80160]: NT_STATUS_OK tevent_req[0x5579c7e89d00/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89eb0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\My Subjects| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |My Subjects| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server 2012FS share My Subjects >do_connect: Making new connection to server 2012FS share My Subjects >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e8c0f0]: subreq: 0x5579c7e8c770 >gensec_update_send: spnego[0x5579c7e84320]: subreq: 0x5579c7e8b560 >gensec_update_done: ntlmssp[0x5579c7e8c0f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8c770/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8c920)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e84320]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8b560/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8b710)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e8c0f0]: subreq: 0x5579c7e8cfd0 >gensec_update_send: spnego[0x5579c7e84320]: subreq: 0x5579c7e8c910 >gensec_update_done: ntlmssp[0x5579c7e8c0f0]: NT_STATUS_OK tevent_req[0x5579c7e8cfd0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8d180)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e84320]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8c910/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8cac0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e84320]: subreq: 0x5579c7e8b310 >gensec_update_done: spnego[0x5579c7e84320]: NT_STATUS_OK tevent_req[0x5579c7e8b310/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8b4c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >smb: \Information for Staff\Information for Students\My Subjects\> dir >dos_clean_name [\Information for Staff\Information for Students\My Subjects\*] >unix_clean_name [\Information for Staff\Information for Students\My Subjects\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e7acd0]: subreq: 0x5579c7e8bb80 >gensec_update_send: spnego[0x5579c7e8b580]: subreq: 0x5579c7e892f0 >gensec_update_done: ntlmssp[0x5579c7e7acd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8bb80/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8bd30)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e8b580]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e892f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e894a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e7acd0]: subreq: 0x5579c7e8c4c0 >gensec_update_send: spnego[0x5579c7e8b580]: subreq: 0x5579c7e88fa0 >gensec_update_done: ntlmssp[0x5579c7e7acd0]: NT_STATUS_OK tevent_req[0x5579c7e8c4c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8c670)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e8b580]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e88fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e8b580]: subreq: 0x5579c7e88fa0 >gensec_update_done: spnego[0x5579c7e8b580]: NT_STATUS_OK tevent_req[0x5579c7e88fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e89150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e89440]: subreq: 0x5579c7e8bfa0 >gensec_update_send: spnego[0x5579c7e8a6a0]: subreq: 0x5579c7e8b830 >gensec_update_done: ntlmssp[0x5579c7e89440]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8bfa0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8c150)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e8a6a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8b830/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8b9e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e89440]: subreq: 0x5579c7e8cac0 >gensec_update_send: spnego[0x5579c7e8a6a0]: subreq: 0x5579c7e8d3d0 >gensec_update_done: ntlmssp[0x5579c7e89440]: NT_STATUS_OK tevent_req[0x5579c7e8cac0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8cc70)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e8a6a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8d3d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8d580)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e8a6a0]: subreq: 0x5579c7e8c640 >gensec_update_done: spnego[0x5579c7e8a6a0]: NT_STATUS_OK tevent_req[0x5579c7e8c640/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8c7f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e8d410]: subreq: 0x5579c7e8def0 >gensec_update_send: spnego[0x5579c7e89380]: subreq: 0x5579c7e8c870 >gensec_update_done: ntlmssp[0x5579c7e8d410]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8def0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8e0a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e89380]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8c870/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8ca20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e8d410]: subreq: 0x5579c7e8c870 >gensec_update_send: spnego[0x5579c7e89380]: subreq: 0x5579c7e8cdf0 >gensec_update_done: ntlmssp[0x5579c7e8d410]: NT_STATUS_OK tevent_req[0x5579c7e8c870/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8ca20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e89380]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8cdf0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8cfa0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e89380]: subreq: 0x5579c7e8cdf0 >gensec_update_done: spnego[0x5579c7e89380]: NT_STATUS_OK tevent_req[0x5579c7e8cdf0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8cfa0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e8d750]: subreq: 0x5579c7e8e080 >gensec_update_send: spnego[0x5579c7e84490]: subreq: 0x5579c7e8cc30 >gensec_update_done: ntlmssp[0x5579c7e8d750]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8e080/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8e230)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e84490]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8cc30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8cde0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e8d750]: subreq: 0x5579c7e8e870 >gensec_update_send: spnego[0x5579c7e84490]: subreq: 0x5579c7e8e220 >gensec_update_done: ntlmssp[0x5579c7e8d750]: NT_STATUS_OK tevent_req[0x5579c7e8e870/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e8ea20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e84490]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e8e220/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8e3d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e84490]: subreq: 0x5579c7e8c9e0 >gensec_update_done: spnego[0x5579c7e84490]: NT_STATUS_OK tevent_req[0x5579c7e8c9e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8cb90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\My Subjects| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |My Subjects| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e90c20]: subreq: 0x5579c7e91210 >gensec_update_send: spnego[0x5579c7e8ec70]: subreq: 0x5579c7e90080 >gensec_update_done: ntlmssp[0x5579c7e90c20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e91210/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e913c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e8ec70]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e90080/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e90230)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e90c20]: subreq: 0x5579c7e91360 >gensec_update_send: spnego[0x5579c7e8ec70]: subreq: 0x5579c7e90080 >gensec_update_done: ntlmssp[0x5579c7e90c20]: NT_STATUS_OK tevent_req[0x5579c7e91360/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e91510)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e8ec70]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e90080/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e90230)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e8ec70]: subreq: 0x5579c7e8fd30 >gensec_update_done: spnego[0x5579c7e8ec70]: NT_STATUS_OK tevent_req[0x5579c7e8fd30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e8fee0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e91040]: subreq: 0x5579c7e919c0 >gensec_update_send: spnego[0x5579c7e8e110]: subreq: 0x5579c7e904b0 >gensec_update_done: ntlmssp[0x5579c7e91040]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e919c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e91b70)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e8e110]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e904b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e90660)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e91040]: subreq: 0x5579c7e904b0 >gensec_update_send: spnego[0x5579c7e8e110]: subreq: 0x5579c7e912e0 >gensec_update_done: ntlmssp[0x5579c7e91040]: NT_STATUS_OK tevent_req[0x5579c7e904b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e90660)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e8e110]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e912e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e91490)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e8e110]: subreq: 0x5579c7e933b0 >gensec_update_done: spnego[0x5579c7e8e110]: NT_STATUS_OK tevent_req[0x5579c7e933b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e93560)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e90bf0]: subreq: 0x5579c7e91270 >gensec_update_send: spnego[0x5579c7e8b810]: subreq: 0x5579c7e904b0 >gensec_update_done: ntlmssp[0x5579c7e90bf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e91270/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e91420)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e8b810]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e904b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e90660)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e90bf0]: subreq: 0x5579c7e913c0 >gensec_update_send: spnego[0x5579c7e8b810]: subreq: 0x5579c7e904b0 >gensec_update_done: ntlmssp[0x5579c7e90bf0]: NT_STATUS_OK tevent_req[0x5579c7e913c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e91570)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e8b810]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e904b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e90660)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e8b810]: subreq: 0x5579c7e90f20 >gensec_update_done: spnego[0x5579c7e8b810]: NT_STATUS_OK tevent_req[0x5579c7e90f20/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e910d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e910d0]: subreq: 0x5579c7e93bc0 >gensec_update_send: spnego[0x5579c7e8e320]: subreq: 0x5579c7e905a0 >gensec_update_done: ntlmssp[0x5579c7e910d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e93bc0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e93d70)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e8e320]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e905a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e90750)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e910d0]: subreq: 0x5579c7e944b0 >gensec_update_send: spnego[0x5579c7e8e320]: subreq: 0x5579c7e90250 >gensec_update_done: ntlmssp[0x5579c7e910d0]: NT_STATUS_OK tevent_req[0x5579c7e944b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94660)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e8e320]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e90250/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e90400)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e8e320]: subreq: 0x5579c7e95c20 >gensec_update_done: spnego[0x5579c7e8e320]: NT_STATUS_OK tevent_req[0x5579c7e95c20/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e95dd0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\My Subjects| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |My Subjects| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 437495 > . D 0 Wed Feb 6 20:08:28 2019 > .. D 0 Wed Feb 6 20:08:28 2019 > text.docx A 7277 Thu Feb 1 19:48:41 2018 > text.png A 430218 Mon Sep 10 09:21:23 2018 > Maths D 0 Tue Mar 5 16:13:04 2019 > > 10395647 blocks of size 4096. 1584260 blocks available >smb: \Information for Staff\Information for Students\My Subjects\> cd Ydos_clean_name [\Information for Staff\Information for Students\My Subjects\*] >unix_clean_name [\Information for Staff\Information for Students\My Subjects\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e8bfb0]: subreq: 0x5579c7e94670 >gensec_update_send: spnego[0x5579c7e94090]: subreq: 0x5579c7e91fc0 >gensec_update_done: ntlmssp[0x5579c7e8bfb0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94670/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94820)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e94090]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e91fc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e92170)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e8bfb0]: subreq: 0x5579c7e94670 >gensec_update_send: spnego[0x5579c7e94090]: subreq: 0x5579c7e950d0 >gensec_update_done: ntlmssp[0x5579c7e8bfb0]: NT_STATUS_OK tevent_req[0x5579c7e94670/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94820)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e94090]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e950d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e95280)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e94090]: subreq: 0x5579c7e94320 >gensec_update_done: spnego[0x5579c7e94090]: NT_STATUS_OK tevent_req[0x5579c7e94320/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e944d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e843b0]: subreq: 0x5579c7e94670 >gensec_update_send: spnego[0x5579c7e95560]: subreq: 0x5579c7e91fc0 >gensec_update_done: ntlmssp[0x5579c7e843b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94670/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94820)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e95560]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e91fc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e92170)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e843b0]: subreq: 0x5579c7e94a90 >gensec_update_send: spnego[0x5579c7e95560]: subreq: 0x5579c7e94320 >gensec_update_done: ntlmssp[0x5579c7e843b0]: NT_STATUS_OK tevent_req[0x5579c7e94a90/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94c40)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e95560]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94320/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e944d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e95560]: subreq: 0x5579c7e91300 >gensec_update_done: spnego[0x5579c7e95560]: NT_STATUS_OK tevent_req[0x5579c7e91300/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e914b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e94d60]: subreq: 0x5579c7e90250 >gensec_update_send: spnego[0x5579c7e72a90]: subreq: 0x5579c7e94320 >gensec_update_done: ntlmssp[0x5579c7e94d60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e90250/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e90400)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e72a90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94320/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e944d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e94d60]: subreq: 0x5579c7e90960 >gensec_update_send: spnego[0x5579c7e72a90]: subreq: 0x5579c7e95090 >gensec_update_done: ntlmssp[0x5579c7e94d60]: NT_STATUS_OK tevent_req[0x5579c7e90960/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e90b10)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e72a90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e95090/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e95240)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e72a90]: subreq: 0x5579c7e95090 >gensec_update_done: spnego[0x5579c7e72a90]: NT_STATUS_OK tevent_req[0x5579c7e95090/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e95240)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e95130]: subreq: 0x5579c7e905a0 >gensec_update_send: spnego[0x5579c7e938b0]: subreq: 0x5579c7e94670 >gensec_update_done: ntlmssp[0x5579c7e95130]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e905a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e90750)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e938b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94670/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e94820)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e95130]: subreq: 0x5579c7e90250 >gensec_update_send: spnego[0x5579c7e938b0]: subreq: 0x5579c7e91170 >gensec_update_done: ntlmssp[0x5579c7e95130]: NT_STATUS_OK tevent_req[0x5579c7e90250/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e90400)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e938b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e91170/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e91320)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e938b0]: subreq: 0x5579c7e94a40 >gensec_update_done: spnego[0x5579c7e938b0]: NT_STATUS_OK tevent_req[0x5579c7e94a40/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e94bf0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\My Subjects| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |My Subjects| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >R3\ >dos_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\] >unix_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e94410]: subreq: 0x5579c7e94a00 >gensec_update_send: spnego[0x5579c7e90680]: subreq: 0x5579c7e92cc0 >gensec_update_done: ntlmssp[0x5579c7e94410]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94a00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94bb0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e90680]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e92cc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e92e70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e94410]: subreq: 0x5579c7e94a00 >gensec_update_send: spnego[0x5579c7e90680]: subreq: 0x5579c7e92cc0 >gensec_update_done: ntlmssp[0x5579c7e94410]: NT_STATUS_OK tevent_req[0x5579c7e94a00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94bb0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e90680]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e92cc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e92e70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e90680]: subreq: 0x5579c7e92cc0 >gensec_update_done: spnego[0x5579c7e90680]: NT_STATUS_OK tevent_req[0x5579c7e92cc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e92e70)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e94850]: subreq: 0x5579c7e90b60 >gensec_update_send: spnego[0x5579c7e87bd0]: subreq: 0x5579c7e94320 >gensec_update_done: ntlmssp[0x5579c7e94850]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e90b60/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e90d10)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e87bd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94320/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e944d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e94850]: subreq: 0x5579c7e90250 >gensec_update_send: spnego[0x5579c7e87bd0]: subreq: 0x5579c7e90810 >gensec_update_done: ntlmssp[0x5579c7e94850]: NT_STATUS_OK tevent_req[0x5579c7e90250/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e90400)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e87bd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e90810/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e909c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e87bd0]: subreq: 0x5579c7e90810 >gensec_update_done: spnego[0x5579c7e87bd0]: NT_STATUS_OK tevent_req[0x5579c7e90810/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e909c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e90f90]: subreq: 0x5579c7e96760 >gensec_update_send: spnego[0x5579c7e956d0]: subreq: 0x5579c7e949b0 >gensec_update_done: ntlmssp[0x5579c7e90f90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e96760/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e96910)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e956d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e949b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e94b60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e90f90]: subreq: 0x5579c7e949b0 >gensec_update_send: spnego[0x5579c7e956d0]: subreq: 0x5579c7e91230 >gensec_update_done: ntlmssp[0x5579c7e90f90]: NT_STATUS_OK tevent_req[0x5579c7e949b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e94b60)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e956d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e91230/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e913e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e956d0]: subreq: 0x5579c7e91230 >gensec_update_done: spnego[0x5579c7e956d0]: NT_STATUS_OK tevent_req[0x5579c7e91230/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e913e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e949e0]: subreq: 0x5579c7e96ab0 >gensec_update_send: spnego[0x5579c7e91a30]: subreq: 0x5579c7e94320 >gensec_update_done: ntlmssp[0x5579c7e949e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e96ab0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e96c60)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e91a30]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94320/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e944d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e949e0]: subreq: 0x5579c7e96be0 >gensec_update_send: spnego[0x5579c7e91a30]: subreq: 0x5579c7e94320 >gensec_update_done: ntlmssp[0x5579c7e949e0]: NT_STATUS_OK tevent_req[0x5579c7e96be0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e96d90)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e91a30]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94320/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e944d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e91a30]: subreq: 0x5579c7e94320 >gensec_update_done: spnego[0x5579c7e91a30]: NT_STATUS_OK tevent_req[0x5579c7e94320/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e944d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\My Subjects| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |My Subjects| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >smb: \Information for Staff\Information for Students\My Subjects\Maths\> dir >dos_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\*] >unix_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e960b0]: subreq: 0x5579c7e91410 >gensec_update_send: spnego[0x5579c7e91fa0]: subreq: 0x5579c7e94850 >gensec_update_done: ntlmssp[0x5579c7e960b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e91410/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e915c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e91fa0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94850/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e94a00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e960b0]: subreq: 0x5579c7e91560 >gensec_update_send: spnego[0x5579c7e91fa0]: subreq: 0x5579c7e94850 >gensec_update_done: ntlmssp[0x5579c7e960b0]: NT_STATUS_OK tevent_req[0x5579c7e91560/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e91710)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e91fa0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94850/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e94a00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e91fa0]: subreq: 0x5579c7e94850 >gensec_update_done: spnego[0x5579c7e91fa0]: NT_STATUS_OK tevent_req[0x5579c7e94850/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e94a00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e910a0]: subreq: 0x5579c7e96760 >gensec_update_send: spnego[0x5579c7e8f3f0]: subreq: 0x5579c7e94850 >gensec_update_done: ntlmssp[0x5579c7e910a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e96760/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e96910)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e8f3f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e94850/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e94a00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e910a0]: subreq: 0x5579c7e96760 >gensec_update_send: spnego[0x5579c7e8f3f0]: subreq: 0x5579c7e95fc0 >gensec_update_done: ntlmssp[0x5579c7e910a0]: NT_STATUS_OK tevent_req[0x5579c7e96760/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e96910)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e8f3f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e95fc0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e96170)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e8f3f0]: subreq: 0x5579c7e96760 >gensec_update_done: spnego[0x5579c7e8f3f0]: NT_STATUS_OK tevent_req[0x5579c7e96760/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e96910)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e97c90]: subreq: 0x5579c7e988b0 >gensec_update_send: spnego[0x5579c7e93430]: subreq: 0x5579c7e97070 >gensec_update_done: ntlmssp[0x5579c7e97c90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e988b0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e98a60)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e93430]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e97070/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e97220)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e97c90]: subreq: 0x5579c7e99110 >gensec_update_send: spnego[0x5579c7e93430]: subreq: 0x5579c7e98a60 >gensec_update_done: ntlmssp[0x5579c7e97c90]: NT_STATUS_OK tevent_req[0x5579c7e99110/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e992c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e93430]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e98a60/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e98c10)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e93430]: subreq: 0x5579c7e98f80 >gensec_update_done: spnego[0x5579c7e93430]: NT_STATUS_OK tevent_req[0x5579c7e98f80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e99130)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e986f0]: subreq: 0x5579c7e98ce0 >gensec_update_send: spnego[0x5579c7e91180]: subreq: 0x5579c7e97500 >gensec_update_done: ntlmssp[0x5579c7e986f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e98ce0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e98e90)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e91180]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e97500/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e976b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e986f0]: subreq: 0x5579c7e98e10 >gensec_update_send: spnego[0x5579c7e91180]: subreq: 0x5579c7e971b0 >gensec_update_done: ntlmssp[0x5579c7e986f0]: NT_STATUS_OK tevent_req[0x5579c7e98e10/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e98fc0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e91180]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e971b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e97360)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e91180]: subreq: 0x5579c7e995c0 >gensec_update_done: spnego[0x5579c7e91180]: NT_STATUS_OK tevent_req[0x5579c7e995c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e99770)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\My Subjects| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |My Subjects| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\DFS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share DFS >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e9a430]: subreq: 0x5579c7e9ab20 >gensec_update_send: spnego[0x5579c7e96d90]: subreq: 0x5579c7e99490 >gensec_update_done: ntlmssp[0x5579c7e9a430]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9ab20/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9acd0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e96d90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e99490/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e99640)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e9a430]: subreq: 0x5579c7e9ac70 >gensec_update_send: spnego[0x5579c7e96d90]: subreq: 0x5579c7e99140 >gensec_update_done: ntlmssp[0x5579c7e9a430]: NT_STATUS_OK tevent_req[0x5579c7e9ac70/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9ae20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e96d90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e99140/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e992f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e96d90]: subreq: 0x5579c7e9b2f0 >gensec_update_done: spnego[0x5579c7e96d90]: NT_STATUS_OK tevent_req[0x5579c7e9b2f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9b4a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e9a960]: subreq: 0x5579c7e9af50 >gensec_update_send: spnego[0x5579c7e919f0]: subreq: 0x5579c7e99fa0 >gensec_update_done: ntlmssp[0x5579c7e9a960]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9af50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9b100)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e919f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e99fa0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9a150)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e9a960]: subreq: 0x5579c7e9a2f0 >gensec_update_send: spnego[0x5579c7e919f0]: subreq: 0x5579c7e9b0f0 >gensec_update_done: ntlmssp[0x5579c7e9a960]: NT_STATUS_OK tevent_req[0x5579c7e9a2f0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9a4a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e919f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9b0f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9b2a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e919f0]: subreq: 0x5579c7e9b830 >gensec_update_done: spnego[0x5579c7e919f0]: NT_STATUS_OK tevent_req[0x5579c7e9b830/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9b9e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff] >unix_clean_name [\DFS\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share DFS >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.41 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e9c920]: subreq: 0x5579c7e9cfa0 >gensec_update_send: spnego[0x5579c7e97bf0]: subreq: 0x5579c7e9b510 >gensec_update_done: ntlmssp[0x5579c7e9c920]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9cfa0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9d150)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e97bf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9b510/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9b6c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e9c920]: subreq: 0x5579c7e9cfa0 >gensec_update_send: spnego[0x5579c7e97bf0]: subreq: 0x5579c7e9b1c0 >gensec_update_done: ntlmssp[0x5579c7e9c920]: NT_STATUS_OK tevent_req[0x5579c7e9cfa0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9d150)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e97bf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9b1c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9b370)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e97bf0]: subreq: 0x5579c7e9b1c0 >gensec_update_done: spnego[0x5579c7e97bf0]: NT_STATUS_OK tevent_req[0x5579c7e9b1c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9b370)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x5579c7e9cab0]: subreq: 0x5579c7e9d130 >gensec_update_send: spnego[0x5579c7e96ac0]: subreq: 0x5579c7e9b720 >gensec_update_done: ntlmssp[0x5579c7e9cab0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9d130/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9d2e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x5579c7e96ac0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9b720/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9b8d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x5579c7e9cab0]: subreq: 0x5579c7e9b720 >gensec_update_send: spnego[0x5579c7e96ac0]: subreq: 0x5579c7e9df00 >gensec_update_done: ntlmssp[0x5579c7e9cab0]: NT_STATUS_OK tevent_req[0x5579c7e9b720/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c7e9b8d0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x5579c7e96ac0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c7e9df00/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9e0b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x5579c7e96ac0]: subreq: 0x5579c7e9c600 >gensec_update_done: spnego[0x5579c7e96ac0]: NT_STATUS_OK tevent_req[0x5579c7e9c600/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c7e9c7b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\My Subjects| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |My Subjects| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\DFS\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 0 > . D 0 Tue Mar 5 16:13:04 2019 > .. D 0 Tue Mar 5 16:13:04 2019 > Level 1 D 0 Sat Nov 11 20:07:34 2017 > > 10395647 blocks of size 4096. 1584260 blocks available >smb: \Information for Staff\Information for Students\My Subjects\Maths\> exit >signed SMB2 message
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 13824
:
14912
|
14916
|
14917
|
14920
| 14921 |
14922
|
14925
|
14926