The Samba-Bugzilla – Attachment 14925 Details for
Bug 13824
libsmbclient leaks when accessing files inside nested DFS namespaces
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Debug output from smbclient with patch v3
smbclient-rebuilt-v3.txt (text/plain), 501.36 KB, created by
Chris
on 2019-03-12 21:55:03 UTC
(
hide
)
Description:
Debug output from smbclient with patch v3
Filename:
MIME Type:
Creator:
Chris
Created:
2019-03-12 21:55:03 UTC
Size:
501.36 KB
patch
obsolete
>INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >lp_load_ex: refreshing parameters >Initialising global parameters >rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >pm_process() returned Yes >lp_servicenumber: couldn't find homes >messaging_dgm_ref: messaging_dgm_init returned Success >messaging_dgm_ref: unique = 9341925101334927909 >Registering messaging pointer for type 2 - private_data=(nil) >Registering messaging pointer for type 9 - private_data=(nil) >Registered MSG_REQ_POOL_USAGE >Registering messaging pointer for type 11 - private_data=(nil) >Registering messaging pointer for type 12 - private_data=(nil) >Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED >Registering messaging pointer for type 1 - private_data=(nil) >Registering messaging pointer for type 5 - private_data=(nil) >Registering messaging pointer for type 51 - private_data=(nil) >messaging_init_internal: my id: 30835 >lp_load_ex: refreshing parameters >Freeing parametrics: >Initialising global parameters >rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >pm_process() returned Yes >lp_servicenumber: couldn't find homes >added interface ens160 ip=10.1.1.74 bcast=10.1.1.255 netmask=255.255.255.0 >Netbios name list:- >my_netbios_names[0]="SMBTEST" >Client started (version 4.9.4). >cli_cm_open: Calling cli_cm_connect on: server (null) share \\domain.com\SCBG >do_connect: Making new connection to server (null) share \\domain.com\SCBG >Opening cache file at /usr/local/samba/var/cache/gencache.tdb >Opening cache file at /usr/local/samba/var/lock/gencache_notrans.tdb >Adding cache entry with key=[AD_SITENAME/DOMAIN/] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552429608 seconds in the past) >Could not get allrecord lock on gencache_notrans.tdb: Locking error >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >Adding cache entry with key=[NBT/DOMAIN.COM#20] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552429608 seconds in the past) >Could not get allrecord lock on gencache_notrans.tdb: Locking error >no entry for domain.com#20 found. >resolve_hosts: Attempting host lookup for name domain.com<0x20> >remove_duplicate_addrs2: looking for duplicate address/port pairs >namecache_store: storing 2 addresses for domain.com#20: 10.1.1.43,10.1.1.41 >Adding cache entry with key=[NBT/DOMAIN.COM#20] and timeout=[Tue Mar 12 22:37:53 2019 GMT] (660 seconds ahead) >internal_resolve_name: returning 2 addresses: 10.1.1.43:0 10.1.1.41:0 >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >Enter DOMAIN.COM\username's password: kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >GENSEC backend 'gssapi_spnego' registered >GENSEC backend 'gssapi_krb5' registered >GENSEC backend 'gssapi_krb5_sasl' registered >GENSEC backend 'spnego' registered >GENSEC backend 'schannel' registered >GENSEC backend 'naclrpc_as_system' registered >GENSEC backend 'sasl-EXTERNAL' registered >GENSEC backend 'ntlmssp' registered >GENSEC backend 'ntlmssp_resume_ccache' registered >GENSEC backend 'http_basic' registered >GENSEC backend 'http_ntlm' registered >GENSEC backend 'http_negotiate' registered >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5f9eed40]: subreq: 0x557c5f9ef330 >gensec_update_send: spnego[0x557c5f9ec1f0]: subreq: 0x557c5f9ee220 >gensec_update_done: ntlmssp[0x557c5f9eed40]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5f9ef330/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5f9ef4e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5f9ec1f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5f9ee220/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5f9ee3d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5f9eed40]: subreq: 0x557c5f9ee220 >gensec_update_send: spnego[0x557c5f9ec1f0]: subreq: 0x557c5f9eefe0 >gensec_update_done: ntlmssp[0x557c5f9eed40]: NT_STATUS_OK tevent_req[0x557c5f9ee220/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5f9ee3d0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5f9ec1f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5f9eefe0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5f9ef190)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5f9ec1f0]: subreq: 0x557c5f9eefe0 >gensec_update_done: spnego[0x557c5f9ec1f0]: NT_STATUS_OK tevent_req[0x557c5f9eefe0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5f9ef190)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\SCBG input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 53 00 43 00 42 00 47 00 ..i.t.\. S.C.B.G. >[0020] 00 00 .. >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 1E 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 ........ .."..... >[0010] 2C 01 00 00 22 00 42 00 62 00 00 00 00 00 00 00 ,...".B. b....... >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 53 00 43 00 42 00 47 00 00 00 5C 00 6D 00 69 00 S.C.B.G. ..\.m.i. >[0050] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0060] 53 00 43 00 42 00 47 00 00 00 5C 00 32 00 30 00 S.C.B.G. ..\.2.0. >[0070] 31 00 32 00 46 00 53 00 5C 00 53 00 43 00 42 00 1.2.F.S. \.S.C.B. >[0080] 47 00 00 00 G... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\SCBG| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |SCBG| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share SCBG >Adding cache entry with key=[AD_SITENAME/DOMAIN/] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552429619 seconds in the past) >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >Adding cache entry with key=[NBT/2012FS#20] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1552429619 seconds in the past) >no entry for 2012FS#20 found. >resolve_lmhosts: Attempting lmhosts lookup for name 2012FS<0x20> >startlmhosts: Can't open lmhosts file /usr/local/samba/etc/lmhosts. Error was No such file or directory >resolve_wins: WINS server resolution selected and no WINS servers listed. >resolve_hosts: Attempting host lookup for name 2012FS<0x20> >remove_duplicate_addrs2: looking for duplicate address/port pairs >namecache_store: storing 1 address for 2012FS#20: 10.1.1.237 >Adding cache entry with key=[NBT/2012FS#20] and timeout=[Tue Mar 12 22:37:59 2019 GMT] (660 seconds ahead) >internal_resolve_name: returning 1 addresses: 10.1.1.237:0 >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5f9ef560]: subreq: 0x557c5fa00ae0 >gensec_update_send: spnego[0x557c5f9eb9b0]: subreq: 0x557c5f9eeca0 >gensec_update_done: ntlmssp[0x557c5f9ef560]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa00ae0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa00c90)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5f9eb9b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5f9eeca0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5f9eee50)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5f9ef560]: subreq: 0x557c5f9ef120 >gensec_update_send: spnego[0x557c5f9eb9b0]: subreq: 0x557c5fa00790 >gensec_update_done: ntlmssp[0x557c5f9ef560]: NT_STATUS_OK tevent_req[0x557c5f9ef120/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5f9ef2d0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5f9eb9b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa00790/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa00940)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5f9eb9b0]: subreq: 0x557c5fa00790 >gensec_update_done: spnego[0x557c5f9eb9b0]: NT_STATUS_OK tevent_req[0x557c5fa00790/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa00940)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\SCBG input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 53 00 43 00 42 00 47 00 00 00 \.S.C.B. G... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 18 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 ........ .."..... >[0010] 2C 01 00 00 22 00 3C 00 56 00 00 00 00 00 00 00 ,...".<. V....... >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 53 00 43 00 42 00 1.2.F.S. \.S.C.B. >[0040] 47 00 00 00 5C 00 32 00 30 00 31 00 32 00 46 00 G...\.2. 0.1.2.F. >[0050] 53 00 5C 00 53 00 43 00 42 00 47 00 00 00 5C 00 S.\.S.C. B.G...\. >[0060] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 53 00 2.0.1.2. F.S.\.S. >[0070] 43 00 42 00 47 00 00 00 C.B.G... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\SCBG| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |SCBG| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok > >Try "help" to get a list of possible commands. >smb: \> dir >dos_clean_name [\*] >unix_clean_name [\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\SCBG\ >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\SCBG\ >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 0 > . D 0 Fri Nov 10 23:27:03 2017 > .. D 0 Fri Nov 10 23:27:03 2017 > Information for Staff D 0 Tue Sep 5 04:13:14 2017 > Information for Students D 0 Fri Nov 10 23:27:03 2017 > > 10395647 blocks of size 4096. 1584163 blocks available >smb: \> cd "Information for Staff" >dos_clean_name [\Information for Staff\] >unix_clean_name [\Information for Staff\] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\SCBG\Information for Staff >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_open: Calling cli_cm_connect on: server 2012FS share IPC$ >do_connect: Making new connection to server 2012FS share IPC$ >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa1e080]: subreq: 0x557c5fa1e670 >gensec_update_send: spnego[0x557c5f9ebaa0]: subreq: 0x557c5fa1d470 >gensec_update_done: ntlmssp[0x557c5fa1e080]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa1e670/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa1e820)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5f9ebaa0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa1d470/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa1d620)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa1e080]: subreq: 0x557c5fa1ef50 >gensec_update_send: spnego[0x557c5f9ebaa0]: subreq: 0x557c5fa1e810 >gensec_update_done: ntlmssp[0x557c5fa1e080]: NT_STATUS_OK tevent_req[0x557c5fa1ef50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa1f100)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5f9ebaa0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa1e810/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa1e9c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5f9ebaa0]: subreq: 0x557c5fa1ef50 >gensec_update_done: spnego[0x557c5f9ebaa0]: NT_STATUS_OK tevent_req[0x557c5fa1ef50/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa1f100)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message > tconx ok >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\SCBG\Information for Staff >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\SCBG\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 \.S.C.B. G.\.I.n. >[0020] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0030] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[0040] 61 00 66 00 66 00 00 00 a.f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 44 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 D....... .."..... >[0010] 08 07 00 00 22 00 68 00 AE 00 00 00 00 00 00 00 ....".h. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 53 00 43 00 42 00 1.2.F.S. \.S.C.B. >[0040] 47 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 G.\.I.n. f.o.r.m. >[0050] 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 a.t.i.o. n. .f.o. >[0060] 72 00 20 00 53 00 74 00 61 00 66 00 66 00 00 00 r. .S.t. a.f.f... >[0070] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0080] 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 66 00 S.C.B.G. \.I.n.f. >[0090] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00A0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00B0] 66 00 66 00 00 00 5C 00 6D 00 69 00 6E 00 6E 00 f.f...\. m.i.n.n. >[00C0] 6F 00 77 00 2E 00 69 00 74 00 5C 00 49 00 6E 00 o.w...i. t.\.I.n. >[00D0] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[00E0] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00F0] 61 00 66 00 66 00 00 00 a.f.f... >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa1f6c0]: subreq: 0x557c5fa20220 >gensec_update_send: spnego[0x557c5fa1ca70]: subreq: 0x557c5fa1eb30 >gensec_update_done: ntlmssp[0x557c5fa1f6c0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa20220/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa203d0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa1ca70]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa1eb30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa1ece0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa1f6c0]: subreq: 0x557c5fa1eb30 >gensec_update_send: spnego[0x557c5fa1ca70]: subreq: 0x557c5fa1fed0 >gensec_update_done: ntlmssp[0x557c5fa1f6c0]: NT_STATUS_OK tevent_req[0x557c5fa1eb30/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa1ece0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa1ca70]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa1fed0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa20080)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa1ca70]: subreq: 0x557c5fa1fed0 >gensec_update_done: spnego[0x557c5fa1ca70]: NT_STATUS_OK tevent_req[0x557c5fa1fed0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa20080)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Staff input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 f.o.r. . S.t.a.f. >[0040] 66 00 00 00 f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 6D 00 S.t.a.f. f...\.m. >[0070] 69 00 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 i.n.n.o. w...i.t. >[0080] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0090] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00A0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 .S.t.a. f.f...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 61 00 66 00 66 00 00 00 t.a.f.f. .. >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa1dfe0]: subreq: 0x557c5fa1e6d0 >gensec_update_send: spnego[0x557c5fa1ffe0]: subreq: 0x557c5fa21100 >gensec_update_done: ntlmssp[0x557c5fa1dfe0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa1e6d0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa1e880)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa1ffe0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa21100/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa212b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa1dfe0]: subreq: 0x557c5fa21100 >gensec_update_send: spnego[0x557c5fa1ffe0]: subreq: 0x557c5fa1f4a0 >gensec_update_done: ntlmssp[0x557c5fa1dfe0]: NT_STATUS_OK tevent_req[0x557c5fa21100/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa212b0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa1ffe0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa1f4a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa1f650)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa1ffe0]: subreq: 0x557c5fa20db0 >gensec_update_done: spnego[0x557c5fa1ffe0]: NT_STATUS_OK tevent_req[0x557c5fa20db0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa20f60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 3A 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 :....... .."..... >[0010] 2C 01 00 00 22 00 5E 00 9A 00 00 00 00 00 00 00 ,...".^. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 00 00 5C 00 32 00 30 00 31 00 32 00 f.f...\. 2.0.1.2. >[0070] 46 00 53 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 F.S.\.I. n.f.o.r. >[0080] 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 m.a.t.i. o.n. .f. >[0090] 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 66 00 o.r. .S. t.a.f.f. >[00A0] 00 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[00B0] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[00C0] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00D0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff] >unix_clean_name [\SCBG\Information for Staff] >signed SMB2 message >signed SMB2 message >smb: \Information for Staff\> dir >dos_clean_name [\Information for Staff\*] >unix_clean_name [\Information for Staff\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\SCBG\Information for Staff >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\SCBG\Information for Staff >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\SCBG\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 \.S.C.B. G.\.I.n. >[0020] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0030] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[0040] 61 00 66 00 66 00 00 00 a.f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 44 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 D....... .."..... >[0010] 08 07 00 00 22 00 68 00 AE 00 00 00 00 00 00 00 ....".h. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 53 00 43 00 42 00 1.2.F.S. \.S.C.B. >[0040] 47 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 G.\.I.n. f.o.r.m. >[0050] 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 a.t.i.o. n. .f.o. >[0060] 72 00 20 00 53 00 74 00 61 00 66 00 66 00 00 00 r. .S.t. a.f.f... >[0070] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0080] 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 66 00 S.C.B.G. \.I.n.f. >[0090] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00A0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00B0] 66 00 66 00 00 00 5C 00 6D 00 69 00 6E 00 6E 00 f.f...\. m.i.n.n. >[00C0] 6F 00 77 00 2E 00 69 00 74 00 5C 00 49 00 6E 00 o.w...i. t.\.I.n. >[00D0] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[00E0] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00F0] 61 00 66 00 66 00 00 00 a.f.f... >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa21c80]: subreq: 0x557c5fa22300 >gensec_update_send: spnego[0x557c5fa1b740]: subreq: 0x557c5fa1f450 >gensec_update_done: ntlmssp[0x557c5fa21c80]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa22300/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa224b0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa1b740]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa1f450/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa1f600)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa21c80]: subreq: 0x557c5fa22450 >gensec_update_send: spnego[0x557c5fa1b740]: subreq: 0x557c5fa1f450 >gensec_update_done: ntlmssp[0x557c5fa21c80]: NT_STATUS_OK tevent_req[0x557c5fa22450/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa22600)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa1b740]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa1f450/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa1f600)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa1b740]: subreq: 0x557c5fa1f450 >gensec_update_done: spnego[0x557c5fa1b740]: NT_STATUS_OK tevent_req[0x557c5fa1f450/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa1f600)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Staff input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 f.o.r. . S.t.a.f. >[0040] 66 00 00 00 f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 6D 00 S.t.a.f. f...\.m. >[0070] 69 00 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 i.n.n.o. w...i.t. >[0080] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0090] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00A0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 .S.t.a. f.f...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 61 00 66 00 66 00 00 00 t.a.f.f. .. >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa22230]: subreq: 0x557c5fa22820 >gensec_update_send: spnego[0x557c5fa1e640]: subreq: 0x557c5fa218f0 >gensec_update_done: ntlmssp[0x557c5fa22230]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa22820/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa229d0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa1e640]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa218f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa21aa0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa22230]: subreq: 0x557c5fa22820 >gensec_update_send: spnego[0x557c5fa1e640]: subreq: 0x557c5fa218f0 >gensec_update_done: ntlmssp[0x557c5fa22230]: NT_STATUS_OK tevent_req[0x557c5fa22820/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa229d0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa1e640]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa218f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa21aa0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa1e640]: subreq: 0x557c5fa23100 >gensec_update_done: spnego[0x557c5fa1e640]: NT_STATUS_OK tevent_req[0x557c5fa23100/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa232b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 3A 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 :....... .."..... >[0010] 2C 01 00 00 22 00 5E 00 9A 00 00 00 00 00 00 00 ,...".^. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 00 00 5C 00 32 00 30 00 31 00 32 00 f.f...\. 2.0.1.2. >[0070] 46 00 53 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 F.S.\.I. n.f.o.r. >[0080] 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 m.a.t.i. o.n. .f. >[0090] 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 66 00 o.r. .S. t.a.f.f. >[00A0] 00 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[00B0] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[00C0] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00D0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff] >unix_clean_name [\SCBG\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\ >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\SCBG\Information for Staff >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\SCBG\Information for Staff >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\SCBG\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 \.S.C.B. G.\.I.n. >[0020] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0030] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[0040] 61 00 66 00 66 00 00 00 a.f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 44 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 D....... .."..... >[0010] 08 07 00 00 22 00 68 00 AE 00 00 00 00 00 00 00 ....".h. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 53 00 43 00 42 00 1.2.F.S. \.S.C.B. >[0040] 47 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 G.\.I.n. f.o.r.m. >[0050] 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 a.t.i.o. n. .f.o. >[0060] 72 00 20 00 53 00 74 00 61 00 66 00 66 00 00 00 r. .S.t. a.f.f... >[0070] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0080] 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 66 00 S.C.B.G. \.I.n.f. >[0090] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00A0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00B0] 66 00 66 00 00 00 5C 00 6D 00 69 00 6E 00 6E 00 f.f...\. m.i.n.n. >[00C0] 6F 00 77 00 2E 00 69 00 74 00 5C 00 49 00 6E 00 o.w...i. t.\.I.n. >[00D0] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[00E0] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00F0] 61 00 66 00 66 00 00 00 a.f.f... >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa252e0]: subreq: 0x557c5fa258d0 >gensec_update_send: spnego[0x557c5fa22c00]: subreq: 0x557c5fa24740 >gensec_update_done: ntlmssp[0x557c5fa252e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa258d0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa25a80)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa22c00]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa24740/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa248f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa252e0]: subreq: 0x557c5fa258d0 >gensec_update_send: spnego[0x557c5fa22c00]: subreq: 0x557c5fa24740 >gensec_update_done: ntlmssp[0x557c5fa252e0]: NT_STATUS_OK tevent_req[0x557c5fa258d0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa25a80)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa22c00]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa24740/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa248f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa22c00]: subreq: 0x557c5fa25580 >gensec_update_done: spnego[0x557c5fa22c00]: NT_STATUS_OK tevent_req[0x557c5fa25580/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa25730)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Staff input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 f.o.r. . S.t.a.f. >[0040] 66 00 00 00 f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 6D 00 S.t.a.f. f...\.m. >[0070] 69 00 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 i.n.n.o. w...i.t. >[0080] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0090] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00A0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 .S.t.a. f.f...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 61 00 66 00 66 00 00 00 t.a.f.f. .. >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa24830]: subreq: 0x557c5fa26020 >gensec_update_send: spnego[0x557c5fa22900]: subreq: 0x557c5fa23ca0 >gensec_update_done: ntlmssp[0x557c5fa24830]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa26020/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa261d0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa22900]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa23ca0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa23e50)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa24830]: subreq: 0x557c5fa26150 >gensec_update_send: spnego[0x557c5fa22900]: subreq: 0x557c5fa23950 >gensec_update_done: ntlmssp[0x557c5fa24830]: NT_STATUS_OK tevent_req[0x557c5fa26150/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa26300)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa22900]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa23950/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa23b00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa22900]: subreq: 0x557c5fa26750 >gensec_update_done: spnego[0x557c5fa22900]: NT_STATUS_OK tevent_req[0x557c5fa26750/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa26900)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 3A 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 :....... .."..... >[0010] 2C 01 00 00 22 00 5E 00 9A 00 00 00 00 00 00 00 ,...".^. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 00 00 5C 00 32 00 30 00 31 00 32 00 f.f...\. 2.0.1.2. >[0070] 46 00 53 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 F.S.\.I. n.f.o.r. >[0080] 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 m.a.t.i. o.n. .f. >[0090] 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 66 00 o.r. .S. t.a.f.f. >[00A0] 00 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[00B0] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[00C0] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00D0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff] >unix_clean_name [\SCBG\Information for Staff] >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 0 > . D 0 Mon Mar 4 11:34:13 2019 > .. D 0 Mon Mar 4 11:34:13 2019 > Information for Students D 0 Tue Sep 5 04:22:20 2017 > > 10395647 blocks of size 4096. 1584163 blocks available >smb: \Information for Staff\> cd "Information for Students" >dos_clean_name [\Information for Staff\Information for Students\] >unix_clean_name [\Information for Staff\Information for Students\] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\SCBG\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\SCBG\Information for Staff\Information for Students >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\SCBG\Information for Staff\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 \.S.C.B. G.\.I.n. >[0020] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0030] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[0040] 61 00 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 a.f.f.\. I.n.f.o. >[0050] 72 00 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 r.a.m.a. t.i.o.n. >[0060] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0070] 64 00 65 00 6E 00 74 00 73 00 00 00 d.e.n.t. s... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 44 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 D....... .."..... >[0010] 08 07 00 00 22 00 68 00 AE 00 00 00 00 00 00 00 ....".h. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 53 00 43 00 42 00 1.2.F.S. \.S.C.B. >[0040] 47 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 G.\.I.n. f.o.r.m. >[0050] 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 a.t.i.o. n. .f.o. >[0060] 72 00 20 00 53 00 74 00 61 00 66 00 66 00 00 00 r. .S.t. a.f.f... >[0070] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0080] 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 66 00 S.C.B.G. \.I.n.f. >[0090] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00A0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00B0] 66 00 66 00 00 00 5C 00 6D 00 69 00 6E 00 6E 00 f.f...\. m.i.n.n. >[00C0] 6F 00 77 00 2E 00 69 00 74 00 5C 00 49 00 6E 00 o.w...i. t.\.I.n. >[00D0] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[00E0] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00F0] 61 00 66 00 66 00 00 00 a.f.f... >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa26740]: subreq: 0x557c5fa26e30 >gensec_update_send: spnego[0x557c5fa1f9a0]: subreq: 0x557c5fa26110 >gensec_update_done: ntlmssp[0x557c5fa26740]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa26e30/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa26fe0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa1f9a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa26110/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa262c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa26740]: subreq: 0x557c5fa27fc0 >gensec_update_send: spnego[0x557c5fa1f9a0]: subreq: 0x557c5fa26ae0 >gensec_update_done: ntlmssp[0x557c5fa26740]: NT_STATUS_OK tevent_req[0x557c5fa27fc0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa28170)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa1f9a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa26ae0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa26c90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa1f9a0]: subreq: 0x557c5fa26ae0 >gensec_update_done: spnego[0x557c5fa1f9a0]: NT_STATUS_OK tevent_req[0x557c5fa26ae0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa26c90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Staff input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 f.o.r. . S.t.a.f. >[0040] 66 00 00 00 f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 6D 00 S.t.a.f. f...\.m. >[0070] 69 00 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 i.n.n.o. w...i.t. >[0080] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0090] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00A0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 .S.t.a. f.f...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 61 00 66 00 66 00 00 00 t.a.f.f. .. >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa26ba0]: subreq: 0x557c5fa27990 >gensec_update_send: spnego[0x557c5fa1f9a0]: subreq: 0x557c5fa26110 >gensec_update_done: ntlmssp[0x557c5fa26ba0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa27990/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa27b40)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa1f9a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa26110/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa262c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa26ba0]: subreq: 0x557c5fa27b30 >gensec_update_send: spnego[0x557c5fa1f9a0]: subreq: 0x557c5fa26110 >gensec_update_done: ntlmssp[0x557c5fa26ba0]: NT_STATUS_OK tevent_req[0x557c5fa27b30/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa27ce0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa1f9a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa26110/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa262c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa1f9a0]: subreq: 0x557c5fa26110 >gensec_update_done: spnego[0x557c5fa1f9a0]: NT_STATUS_OK tevent_req[0x557c5fa26110/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa262c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 3A 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 :....... .."..... >[0010] 2C 01 00 00 22 00 5E 00 9A 00 00 00 00 00 00 00 ,...".^. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 00 00 5C 00 32 00 30 00 31 00 32 00 f.f...\. 2.0.1.2. >[0070] 46 00 53 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 F.S.\.I. n.f.o.r. >[0080] 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 m.a.t.i. o.n. .f. >[0090] 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 66 00 o.r. .S. t.a.f.f. >[00A0] 00 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[00B0] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[00C0] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00D0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff] >unix_clean_name [\SCBG\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 5C 00 49 00 .S.t.a. f.f.\.I. >[0040] 6E 00 66 00 6F 00 72 00 61 00 6D 00 61 00 74 00 n.f.o.r. a.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 00 00 .. >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 6E 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 n....... .."..... >[0010] 08 07 00 00 22 00 92 00 02 01 00 00 00 00 00 00 ...."... ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[0070] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[0080] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0090] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00A0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00B0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00C0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00D0] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[00E0] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[00F0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0100] 65 00 6E 00 74 00 73 00 00 00 5C 00 6D 00 69 00 e.n.t.s. ..\.m.i. >[0110] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0120] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0130] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0140] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0150] 00 00 .. >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa29060]: subreq: 0x557c5fa298a0 >gensec_update_send: spnego[0x557c5fa1f2e0]: subreq: 0x557c5fa284d0 >gensec_update_done: ntlmssp[0x557c5fa29060]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa298a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa29a50)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa1f2e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa284d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa28680)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa29060]: subreq: 0x557c5fa29a50 >gensec_update_send: spnego[0x557c5fa1f2e0]: subreq: 0x557c5fa284d0 >gensec_update_done: ntlmssp[0x557c5fa29060]: NT_STATUS_OK tevent_req[0x557c5fa29a50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa29c00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa1f2e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa284d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa28680)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa1f2e0]: subreq: 0x557c5fa284d0 >gensec_update_done: spnego[0x557c5fa1f2e0]: NT_STATUS_OK tevent_req[0x557c5fa284d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa28680)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Students input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0040] 65 00 6E 00 74 00 73 00 00 00 e.n.t.s. .. >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 46 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 F....... .."..... >[0010] 2C 01 00 00 22 00 6A 00 B2 00 00 00 00 00 00 00 ,...".j. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 00 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0080] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0090] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[00A0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[00B0] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00C0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00D0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00E0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[00F0] 64 00 65 00 6E 00 74 00 73 00 00 00 d.e.n.t. s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa29420]: subreq: 0x557c5fa29bf0 >gensec_update_send: spnego[0x557c5fa27db0]: subreq: 0x557c5fa28a10 >gensec_update_done: ntlmssp[0x557c5fa29420]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa29bf0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa29da0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa27db0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa28a10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa28bc0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa29420]: subreq: 0x557c5fa298a0 >gensec_update_send: spnego[0x557c5fa27db0]: subreq: 0x557c5fa286c0 >gensec_update_done: ntlmssp[0x557c5fa29420]: NT_STATUS_OK tevent_req[0x557c5fa298a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa29a50)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa27db0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa286c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa28870)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa27db0]: subreq: 0x557c5fa298a0 >gensec_update_done: spnego[0x557c5fa27db0]: NT_STATUS_OK tevent_req[0x557c5fa298a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa29a50)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 00 00 s... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 d.e.n.t. s...\.2. >[0070] 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 0.1.2.F. S.\.I.n. >[0080] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0090] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00A0] 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 u.d.e.n. t.s...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 t.u.d.e. n.t.s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >signed SMB2 message >signed SMB2 message >smb: \Information for Staff\Information for Students\> dir >dos_clean_name [\Information for Staff\Information for Students\*] >unix_clean_name [\Information for Staff\Information for Students\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\SCBG\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\SCBG\Information for Staff\Information for Students >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\SCBG\Information for Staff\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 \.S.C.B. G.\.I.n. >[0020] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0030] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[0040] 61 00 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 a.f.f.\. I.n.f.o. >[0050] 72 00 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 r.a.m.a. t.i.o.n. >[0060] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0070] 64 00 65 00 6E 00 74 00 73 00 00 00 d.e.n.t. s... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 44 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 D....... .."..... >[0010] 08 07 00 00 22 00 68 00 AE 00 00 00 00 00 00 00 ....".h. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 53 00 43 00 42 00 1.2.F.S. \.S.C.B. >[0040] 47 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 G.\.I.n. f.o.r.m. >[0050] 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 a.t.i.o. n. .f.o. >[0060] 72 00 20 00 53 00 74 00 61 00 66 00 66 00 00 00 r. .S.t. a.f.f... >[0070] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0080] 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 66 00 S.C.B.G. \.I.n.f. >[0090] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00A0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00B0] 66 00 66 00 00 00 5C 00 6D 00 69 00 6E 00 6E 00 f.f...\. m.i.n.n. >[00C0] 6F 00 77 00 2E 00 69 00 74 00 5C 00 49 00 6E 00 o.w...i. t.\.I.n. >[00D0] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[00E0] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00F0] 61 00 66 00 66 00 00 00 a.f.f... >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa28ad0]: subreq: 0x557c5fa290c0 >gensec_update_send: spnego[0x557c5fa226f0]: subreq: 0x557c5fa2a840 >gensec_update_done: ntlmssp[0x557c5fa28ad0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa290c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa29270)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa226f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2a840/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2a9f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa28ad0]: subreq: 0x557c5fa2a990 >gensec_update_send: spnego[0x557c5fa226f0]: subreq: 0x557c5fa286c0 >gensec_update_done: ntlmssp[0x557c5fa28ad0]: NT_STATUS_OK tevent_req[0x557c5fa2a990/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa2ab40)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa226f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa286c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa28870)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa226f0]: subreq: 0x557c5fa286c0 >gensec_update_done: spnego[0x557c5fa226f0]: NT_STATUS_OK tevent_req[0x557c5fa286c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa28870)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Staff input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 f.o.r. . S.t.a.f. >[0040] 66 00 00 00 f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 6D 00 S.t.a.f. f...\.m. >[0070] 69 00 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 i.n.n.o. w...i.t. >[0080] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0090] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00A0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 .S.t.a. f.f...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 61 00 66 00 66 00 00 00 t.a.f.f. .. >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa28bd0]: subreq: 0x557c5fa291c0 >gensec_update_send: spnego[0x557c5fa23070]: subreq: 0x557c5fa286c0 >gensec_update_done: ntlmssp[0x557c5fa28bd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa291c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa29370)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa23070]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa286c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa28870)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa28bd0]: subreq: 0x557c5fa291c0 >gensec_update_send: spnego[0x557c5fa23070]: subreq: 0x557c5fa2b550 >gensec_update_done: ntlmssp[0x557c5fa28bd0]: NT_STATUS_OK tevent_req[0x557c5fa291c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa29370)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa23070]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2b550/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2b700)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa23070]: subreq: 0x557c5fa28e70 >gensec_update_done: spnego[0x557c5fa23070]: NT_STATUS_OK tevent_req[0x557c5fa28e70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa29020)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 3A 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 :....... .."..... >[0010] 2C 01 00 00 22 00 5E 00 9A 00 00 00 00 00 00 00 ,...".^. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 00 00 5C 00 32 00 30 00 31 00 32 00 f.f...\. 2.0.1.2. >[0070] 46 00 53 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 F.S.\.I. n.f.o.r. >[0080] 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 m.a.t.i. o.n. .f. >[0090] 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 66 00 o.r. .S. t.a.f.f. >[00A0] 00 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[00B0] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[00C0] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00D0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff] >unix_clean_name [\SCBG\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 5C 00 49 00 .S.t.a. f.f.\.I. >[0040] 6E 00 66 00 6F 00 72 00 61 00 6D 00 61 00 74 00 n.f.o.r. a.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 00 00 .. >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 6E 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 n....... .."..... >[0010] 08 07 00 00 22 00 92 00 02 01 00 00 00 00 00 00 ...."... ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[0070] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[0080] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0090] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00A0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00B0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00C0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00D0] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[00E0] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[00F0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0100] 65 00 6E 00 74 00 73 00 00 00 5C 00 6D 00 69 00 e.n.t.s. ..\.m.i. >[0110] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0120] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0130] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0140] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0150] 00 00 .. >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa2c9b0]: subreq: 0x557c5fa2d030 >gensec_update_send: spnego[0x557c5fa2a1a0]: subreq: 0x557c5fa2bd50 >gensec_update_done: ntlmssp[0x557c5fa2c9b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2d030/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa2d1e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa2a1a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2bd50/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2bf00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa2c9b0]: subreq: 0x557c5fa2d030 >gensec_update_send: spnego[0x557c5fa2a1a0]: subreq: 0x557c5fa2ba00 >gensec_update_done: ntlmssp[0x557c5fa2c9b0]: NT_STATUS_OK tevent_req[0x557c5fa2d030/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa2d1e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa2a1a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2ba00/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2bbb0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa2a1a0]: subreq: 0x557c5fa2ba00 >gensec_update_done: spnego[0x557c5fa2a1a0]: NT_STATUS_OK tevent_req[0x557c5fa2ba00/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2bbb0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Students input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0040] 65 00 6E 00 74 00 73 00 00 00 e.n.t.s. .. >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 46 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 F....... .."..... >[0010] 2C 01 00 00 22 00 6A 00 B2 00 00 00 00 00 00 00 ,...".j. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 00 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0080] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0090] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[00A0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[00B0] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00C0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00D0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00E0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[00F0] 64 00 65 00 6E 00 74 00 73 00 00 00 d.e.n.t. s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa2cd50]: subreq: 0x557c5fa2d340 >gensec_update_send: spnego[0x557c5fa2b590]: subreq: 0x557c5fa2c410 >gensec_update_done: ntlmssp[0x557c5fa2cd50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2d340/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa2d4f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa2b590]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2c410/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2c5c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa2cd50]: subreq: 0x557c5fa2d340 >gensec_update_send: spnego[0x557c5fa2b590]: subreq: 0x557c5fa2c410 >gensec_update_done: ntlmssp[0x557c5fa2cd50]: NT_STATUS_OK tevent_req[0x557c5fa2d340/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa2d4f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa2b590]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2c410/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2c5c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa2b590]: subreq: 0x557c5fa2c410 >gensec_update_done: spnego[0x557c5fa2b590]: NT_STATUS_OK tevent_req[0x557c5fa2c410/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2c5c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 00 00 s... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 d.e.n.t. s...\.2. >[0070] 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 0.1.2.F. S.\.I.n. >[0080] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0090] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00A0] 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 u.d.e.n. t.s...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 t.u.d.e. n.t.s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\ >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\SCBG\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\SCBG\Information for Staff\Information for Students >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\SCBG\Information for Staff\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 \.S.C.B. G.\.I.n. >[0020] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0030] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[0040] 61 00 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 a.f.f.\. I.n.f.o. >[0050] 72 00 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 r.a.m.a. t.i.o.n. >[0060] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0070] 64 00 65 00 6E 00 74 00 73 00 00 00 d.e.n.t. s... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 44 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 D....... .."..... >[0010] 08 07 00 00 22 00 68 00 AE 00 00 00 00 00 00 00 ....".h. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 53 00 43 00 42 00 1.2.F.S. \.S.C.B. >[0040] 47 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 G.\.I.n. f.o.r.m. >[0050] 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 a.t.i.o. n. .f.o. >[0060] 72 00 20 00 53 00 74 00 61 00 66 00 66 00 00 00 r. .S.t. a.f.f... >[0070] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0080] 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 66 00 S.C.B.G. \.I.n.f. >[0090] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00A0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00B0] 66 00 66 00 00 00 5C 00 6D 00 69 00 6E 00 6E 00 f.f...\. m.i.n.n. >[00C0] 6F 00 77 00 2E 00 69 00 74 00 5C 00 49 00 6E 00 o.w...i. t.\.I.n. >[00D0] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[00E0] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00F0] 61 00 66 00 66 00 00 00 a.f.f... >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa2fcf0]: subreq: 0x557c5fa30370 >gensec_update_send: spnego[0x557c5fa287d0]: subreq: 0x557c5fa2f0d0 >gensec_update_done: ntlmssp[0x557c5fa2fcf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa30370/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa30520)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa287d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2f0d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2f280)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa2fcf0]: subreq: 0x557c5fa30b60 >gensec_update_send: spnego[0x557c5fa287d0]: subreq: 0x557c5fa30520 >gensec_update_done: ntlmssp[0x557c5fa2fcf0]: NT_STATUS_OK tevent_req[0x557c5fa30b60/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa30d10)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa287d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa30520/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa306d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa287d0]: subreq: 0x557c5fa2ef80 >gensec_update_done: spnego[0x557c5fa287d0]: NT_STATUS_OK tevent_req[0x557c5fa2ef80/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2f130)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Staff input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 f.o.r. . S.t.a.f. >[0040] 66 00 00 00 f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 6D 00 S.t.a.f. f...\.m. >[0070] 69 00 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 i.n.n.o. w...i.t. >[0080] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0090] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00A0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 .S.t.a. f.f...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 61 00 66 00 66 00 00 00 t.a.f.f. .. >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa2f780]: subreq: 0x557c5fa2fe00 >gensec_update_send: spnego[0x557c5fa2d8f0]: subreq: 0x557c5fa2ec50 >gensec_update_done: ntlmssp[0x557c5fa2f780]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2fe00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa2ffb0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa2d8f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2ec50/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2ee00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa2f780]: subreq: 0x557c5fa30660 >gensec_update_send: spnego[0x557c5fa2d8f0]: subreq: 0x557c5fa2fab0 >gensec_update_done: ntlmssp[0x557c5fa2f780]: NT_STATUS_OK tevent_req[0x557c5fa30660/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa30810)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa2d8f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2fab0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2fc60)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa2d8f0]: subreq: 0x557c5fa2ed70 >gensec_update_done: spnego[0x557c5fa2d8f0]: NT_STATUS_OK tevent_req[0x557c5fa2ed70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2ef20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 3A 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 :....... .."..... >[0010] 2C 01 00 00 22 00 5E 00 9A 00 00 00 00 00 00 00 ,...".^. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 00 00 5C 00 32 00 30 00 31 00 32 00 f.f...\. 2.0.1.2. >[0070] 46 00 53 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 F.S.\.I. n.f.o.r. >[0080] 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 m.a.t.i. o.n. .f. >[0090] 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 66 00 o.r. .S. t.a.f.f. >[00A0] 00 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[00B0] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[00C0] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00D0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff] >unix_clean_name [\SCBG\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 5C 00 49 00 .S.t.a. f.f.\.I. >[0040] 6E 00 66 00 6F 00 72 00 61 00 6D 00 61 00 74 00 n.f.o.r. a.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 00 00 .. >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 6E 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 n....... .."..... >[0010] 08 07 00 00 22 00 92 00 02 01 00 00 00 00 00 00 ...."... ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[0070] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[0080] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0090] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00A0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00B0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00C0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00D0] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[00E0] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[00F0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0100] 65 00 6E 00 74 00 73 00 00 00 5C 00 6D 00 69 00 e.n.t.s. ..\.m.i. >[0110] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0120] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0130] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0140] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0150] 00 00 .. >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa30370]: subreq: 0x557c5fa32ad0 >gensec_update_send: spnego[0x557c5fa2a4d0]: subreq: 0x557c5fa2f860 >gensec_update_done: ntlmssp[0x557c5fa30370]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa32ad0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa32c80)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa2a4d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2f860/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2fa10)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa30370]: subreq: 0x557c5fa33440 >gensec_update_send: spnego[0x557c5fa2a4d0]: subreq: 0x557c5fa2fd20 >gensec_update_done: ntlmssp[0x557c5fa30370]: NT_STATUS_OK tevent_req[0x557c5fa33440/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa335f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa2a4d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2fd20/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2fed0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa2a4d0]: subreq: 0x557c5fa2f510 >gensec_update_done: spnego[0x557c5fa2a4d0]: NT_STATUS_OK tevent_req[0x557c5fa2f510/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2f6c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Students input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0040] 65 00 6E 00 74 00 73 00 00 00 e.n.t.s. .. >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 46 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 F....... .."..... >[0010] 2C 01 00 00 22 00 6A 00 B2 00 00 00 00 00 00 00 ,...".j. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 00 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0080] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0090] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[00A0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[00B0] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00C0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00D0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00E0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[00F0] 64 00 65 00 6E 00 74 00 73 00 00 00 d.e.n.t. s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa2f610]: subreq: 0x557c5fa2fc00 >gensec_update_send: spnego[0x557c5fa2d620]: subreq: 0x557c5fa2ec50 >gensec_update_done: ntlmssp[0x557c5fa2f610]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2fc00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa2fdb0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa2d620]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2ec50/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2ee00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa2f610]: subreq: 0x557c5fa2fe70 >gensec_update_send: spnego[0x557c5fa2d620]: subreq: 0x557c5fa2e900 >gensec_update_done: ntlmssp[0x557c5fa2f610]: NT_STATUS_OK tevent_req[0x557c5fa2fe70/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa30020)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa2d620]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2e900/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2eab0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa2d620]: subreq: 0x557c5fa304e0 >gensec_update_done: spnego[0x557c5fa2d620]: NT_STATUS_OK tevent_req[0x557c5fa304e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa30690)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 00 00 s... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 d.e.n.t. s...\.2. >[0070] 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 0.1.2.F. S.\.I.n. >[0080] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0090] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00A0] 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 u.d.e.n. t.s...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 t.u.d.e. n.t.s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 0 > . D 0 Mon Mar 4 11:23:14 2019 > .. D 0 Mon Mar 4 11:23:14 2019 > All Shared D 0 Mon Mar 4 11:23:14 2019 > My Subjects D 0 Fri Nov 10 14:59:41 2017 > > 10395647 blocks of size 4096. 1584163 blocks available >smb: \Information for Staff\Information for Students\> cd "My Subjects" >dos_clean_name [\Information for Staff\Information for Students\My Subjects\] >unix_clean_name [\Information for Staff\Information for Students\My Subjects\] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\SCBG\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\SCBG\Information for Staff\Information for Students\My Subjects >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\SCBG\Information for Staff\Information for Students\My Subjects input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 \.S.C.B. G.\.I.n. >[0020] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0030] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[0040] 61 00 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 a.f.f.\. I.n.f.o. >[0050] 72 00 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 r.a.m.a. t.i.o.n. >[0060] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0070] 64 00 65 00 6E 00 74 00 73 00 5C 00 4D 00 79 00 d.e.n.t. s.\.M.y. >[0080] 20 00 53 00 68 00 61 00 6C 00 6F 00 6D 00 00 00 .S.h.a. l.o.m... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 44 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 D....... .."..... >[0010] 08 07 00 00 22 00 68 00 AE 00 00 00 00 00 00 00 ....".h. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 53 00 43 00 42 00 1.2.F.S. \.S.C.B. >[0040] 47 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 G.\.I.n. f.o.r.m. >[0050] 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 a.t.i.o. n. .f.o. >[0060] 72 00 20 00 53 00 74 00 61 00 66 00 66 00 00 00 r. .S.t. a.f.f... >[0070] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0080] 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 66 00 S.C.B.G. \.I.n.f. >[0090] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00A0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00B0] 66 00 66 00 00 00 5C 00 6D 00 69 00 6E 00 6E 00 f.f...\. m.i.n.n. >[00C0] 6F 00 77 00 2E 00 69 00 74 00 5C 00 49 00 6E 00 o.w...i. t.\.I.n. >[00D0] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[00E0] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00F0] 61 00 66 00 66 00 00 00 a.f.f... >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa29390]: subreq: 0x557c5fa2f070 >gensec_update_send: spnego[0x557c5fa25b50]: subreq: 0x557c5fa2e900 >gensec_update_done: ntlmssp[0x557c5fa29390]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2f070/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa2f220)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa25b50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2e900/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2eab0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa29390]: subreq: 0x557c5fa2a070 >gensec_update_send: spnego[0x557c5fa25b50]: subreq: 0x557c5fa2ec50 >gensec_update_done: ntlmssp[0x557c5fa29390]: NT_STATUS_OK tevent_req[0x557c5fa2a070/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa2a220)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa25b50]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2ec50/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2ee00)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa25b50]: subreq: 0x557c5fa2e900 >gensec_update_done: spnego[0x557c5fa25b50]: NT_STATUS_OK tevent_req[0x557c5fa2e900/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2eab0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Staff input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 f.o.r. . S.t.a.f. >[0040] 66 00 00 00 f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 6D 00 S.t.a.f. f...\.m. >[0070] 69 00 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 i.n.n.o. w...i.t. >[0080] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0090] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00A0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 .S.t.a. f.f...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 61 00 66 00 66 00 00 00 t.a.f.f. .. >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa31350]: subreq: 0x557c5fa2f090 >gensec_update_send: spnego[0x557c5fa33f60]: subreq: 0x557c5fa2a070 >gensec_update_done: ntlmssp[0x557c5fa31350]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2f090/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa2f240)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa33f60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2a070/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2a220)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa31350]: subreq: 0x557c5fa2ed40 >gensec_update_send: spnego[0x557c5fa33f60]: subreq: 0x557c5fa2a070 >gensec_update_done: ntlmssp[0x557c5fa31350]: NT_STATUS_OK tevent_req[0x557c5fa2ed40/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa2eef0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa33f60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2a070/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2a220)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa33f60]: subreq: 0x557c5fa2a070 >gensec_update_done: spnego[0x557c5fa33f60]: NT_STATUS_OK tevent_req[0x557c5fa2a070/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2a220)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 3A 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 :....... .."..... >[0010] 2C 01 00 00 22 00 5E 00 9A 00 00 00 00 00 00 00 ,...".^. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 00 00 5C 00 32 00 30 00 31 00 32 00 f.f...\. 2.0.1.2. >[0070] 46 00 53 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 F.S.\.I. n.f.o.r. >[0080] 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 m.a.t.i. o.n. .f. >[0090] 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 66 00 o.r. .S. t.a.f.f. >[00A0] 00 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[00B0] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[00C0] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00D0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff] >unix_clean_name [\SCBG\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff\Information for Students\My Subjects input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 5C 00 49 00 .S.t.a. f.f.\.I. >[0040] 6E 00 66 00 6F 00 72 00 61 00 6D 00 61 00 74 00 n.f.o.r. a.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 6C 00 \.M.y. . S.h.a.l. >[0080] 6F 00 6D 00 00 00 o.m... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 6E 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 n....... .."..... >[0010] 08 07 00 00 22 00 92 00 02 01 00 00 00 00 00 00 ...."... ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[0070] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[0080] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0090] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00A0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00B0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00C0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00D0] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[00E0] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[00F0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0100] 65 00 6E 00 74 00 73 00 00 00 5C 00 6D 00 69 00 e.n.t.s. ..\.m.i. >[0110] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0120] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0130] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0140] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0150] 00 00 .. >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa300f0]: subreq: 0x557c5fa34740 >gensec_update_send: spnego[0x557c5fa31070]: subreq: 0x557c5fa2f830 >gensec_update_done: ntlmssp[0x557c5fa300f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa34740/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa348f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa31070]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2f830/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2f9e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa300f0]: subreq: 0x557c5fa34890 >gensec_update_send: spnego[0x557c5fa31070]: subreq: 0x557c5fa2f830 >gensec_update_done: ntlmssp[0x557c5fa300f0]: NT_STATUS_OK tevent_req[0x557c5fa34890/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa34a40)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa31070]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2f830/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2f9e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa31070]: subreq: 0x557c5fa2f4e0 >gensec_update_done: spnego[0x557c5fa31070]: NT_STATUS_OK tevent_req[0x557c5fa2f4e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2f690)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Students input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0040] 65 00 6E 00 74 00 73 00 00 00 e.n.t.s. .. >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 46 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 F....... .."..... >[0010] 2C 01 00 00 22 00 6A 00 B2 00 00 00 00 00 00 00 ,...".j. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 00 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0080] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0090] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[00A0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[00B0] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00C0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00D0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00E0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[00F0] 64 00 65 00 6E 00 74 00 73 00 00 00 d.e.n.t. s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa34450]: subreq: 0x557c5fa34b40 >gensec_update_send: spnego[0x557c5fa326e0]: subreq: 0x557c5fa2f4e0 >gensec_update_done: ntlmssp[0x557c5fa34450]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa34b40/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa34cf0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa326e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa2f4e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa2f690)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa34450]: subreq: 0x557c5fa34f60 >gensec_update_send: spnego[0x557c5fa326e0]: subreq: 0x557c5fa347f0 >gensec_update_done: ntlmssp[0x557c5fa34450]: NT_STATUS_OK tevent_req[0x557c5fa34f60/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa35110)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa326e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa347f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa349a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa326e0]: subreq: 0x557c5fa347f0 >gensec_update_done: spnego[0x557c5fa326e0]: NT_STATUS_OK tevent_req[0x557c5fa347f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa349a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 00 00 s... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 d.e.n.t. s...\.2. >[0070] 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 0.1.2.F. S.\.I.n. >[0080] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0090] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00A0] 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 u.d.e.n. t.s...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 t.u.d.e. n.t.s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students\My Subjects input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 s.\.M.y. .S.h.a. >[0050] 6C 00 6F 00 6D 00 00 00 l.o.m... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 54 00 01 00 02 00 00 00 03 00 22 00 00 00 00 00 T....... .."..... >[0010] 08 07 00 00 22 00 78 00 CE 00 00 00 00 00 00 00 ....".x. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 5C 00 4D 00 79 00 d.e.n.t. s.\.M.y. >[0070] 20 00 53 00 68 00 61 00 6C 00 6F 00 6D 00 00 00 .S.h.a. l.o.m... >[0080] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0090] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[00A0] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[00B0] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[00C0] 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 6C 00 \.M.y. . S.h.a.l. >[00D0] 6F 00 6D 00 00 00 5C 00 32 00 30 00 31 00 32 00 o.m...\. 2.0.1.2. >[00E0] 46 00 53 00 5C 00 4D 00 79 00 20 00 53 00 68 00 F.S.\.M. y. .S.h. >[00F0] 61 00 6C 00 6F 00 6D 00 00 00 a.l.o.m. .. >split_dfs_path: split_dfs_path: |\2012FS\My Subjects| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |My Subjects| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share SCBG >cli_resolve_path: Calling cli_cm_connect on: server 2012FS share My Subjects >do_connect: Making new connection to server 2012FS share My Subjects >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa362d0]: subreq: 0x557c5fa368c0 >gensec_update_send: spnego[0x557c5fa30be0]: subreq: 0x557c5fa351f0 >gensec_update_done: ntlmssp[0x557c5fa362d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa368c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa36a70)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa30be0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa351f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa353a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa362d0]: subreq: 0x557c5fa369f0 >gensec_update_send: spnego[0x557c5fa30be0]: subreq: 0x557c5fa351f0 >gensec_update_done: ntlmssp[0x557c5fa362d0]: NT_STATUS_OK tevent_req[0x557c5fa369f0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa36ba0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa30be0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa351f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa353a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa30be0]: subreq: 0x557c5fa36570 >gensec_update_done: spnego[0x557c5fa30be0]: NT_STATUS_OK tevent_req[0x557c5fa36570/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa36720)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\My Subjects input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 6C 00 \.M.y. . S.h.a.l. >[0020] 6F 00 6D 00 00 00 o.m... >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >smb: \Information for Staff\Information for Students\My Subjects\> dir >dos_clean_name [\Information for Staff\Information for Students\My Subjects\*] >unix_clean_name [\Information for Staff\Information for Students\My Subjects\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\SCBG\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\SCBG\Information for Staff\Information for Students\My Subjects >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\SCBG\Information for Staff\Information for Students\My Subjects input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 \.S.C.B. G.\.I.n. >[0020] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0030] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[0040] 61 00 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 a.f.f.\. I.n.f.o. >[0050] 72 00 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 r.a.m.a. t.i.o.n. >[0060] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0070] 64 00 65 00 6E 00 74 00 73 00 5C 00 4D 00 79 00 d.e.n.t. s.\.M.y. >[0080] 20 00 53 00 68 00 61 00 6C 00 6F 00 6D 00 00 00 .S.h.a. l.o.m... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 44 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 D....... .."..... >[0010] 08 07 00 00 22 00 68 00 AE 00 00 00 00 00 00 00 ....".h. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 53 00 43 00 42 00 1.2.F.S. \.S.C.B. >[0040] 47 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 G.\.I.n. f.o.r.m. >[0050] 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 a.t.i.o. n. .f.o. >[0060] 72 00 20 00 53 00 74 00 61 00 66 00 66 00 00 00 r. .S.t. a.f.f... >[0070] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0080] 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 66 00 S.C.B.G. \.I.n.f. >[0090] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00A0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00B0] 66 00 66 00 00 00 5C 00 6D 00 69 00 6E 00 6E 00 f.f...\. m.i.n.n. >[00C0] 6F 00 77 00 2E 00 69 00 74 00 5C 00 49 00 6E 00 o.w...i. t.\.I.n. >[00D0] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[00E0] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00F0] 61 00 66 00 66 00 00 00 a.f.f... >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa30990]: subreq: 0x557c5fa35d30 >gensec_update_send: spnego[0x557c5fa2ebf0]: subreq: 0x557c5fa351f0 >gensec_update_done: ntlmssp[0x557c5fa30990]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa35d30/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa35ee0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa2ebf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa351f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa353a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa30990]: subreq: 0x557c5fa364a0 >gensec_update_send: spnego[0x557c5fa2ebf0]: subreq: 0x557c5fa35d30 >gensec_update_done: ntlmssp[0x557c5fa30990]: NT_STATUS_OK tevent_req[0x557c5fa364a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa36650)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa2ebf0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa35d30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa35ee0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa2ebf0]: subreq: 0x557c5fa35d30 >gensec_update_done: spnego[0x557c5fa2ebf0]: NT_STATUS_OK tevent_req[0x557c5fa35d30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa35ee0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Staff input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 f.o.r. . S.t.a.f. >[0040] 66 00 00 00 f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 6D 00 S.t.a.f. f...\.m. >[0070] 69 00 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 i.n.n.o. w...i.t. >[0080] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0090] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00A0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 .S.t.a. f.f...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 61 00 66 00 66 00 00 00 t.a.f.f. .. >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa34ac0]: subreq: 0x557c5fa34ea0 >gensec_update_send: spnego[0x557c5fa29b90]: subreq: 0x557c5fa37110 >gensec_update_done: ntlmssp[0x557c5fa34ac0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa34ea0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa35050)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa29b90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa37110/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa372c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa34ac0]: subreq: 0x557c5fa36610 >gensec_update_send: spnego[0x557c5fa29b90]: subreq: 0x557c5fa34ea0 >gensec_update_done: ntlmssp[0x557c5fa34ac0]: NT_STATUS_OK tevent_req[0x557c5fa36610/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa367c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa29b90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa34ea0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa35050)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa29b90]: subreq: 0x557c5fa34ea0 >gensec_update_done: spnego[0x557c5fa29b90]: NT_STATUS_OK tevent_req[0x557c5fa34ea0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa35050)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 3A 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 :....... .."..... >[0010] 2C 01 00 00 22 00 5E 00 9A 00 00 00 00 00 00 00 ,...".^. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 00 00 5C 00 32 00 30 00 31 00 32 00 f.f...\. 2.0.1.2. >[0070] 46 00 53 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 F.S.\.I. n.f.o.r. >[0080] 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 m.a.t.i. o.n. .f. >[0090] 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 66 00 o.r. .S. t.a.f.f. >[00A0] 00 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[00B0] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[00C0] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00D0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff] >unix_clean_name [\SCBG\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff\Information for Students\My Subjects input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 5C 00 49 00 .S.t.a. f.f.\.I. >[0040] 6E 00 66 00 6F 00 72 00 61 00 6D 00 61 00 74 00 n.f.o.r. a.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 6C 00 \.M.y. . S.h.a.l. >[0080] 6F 00 6D 00 00 00 o.m... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 6E 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 n....... .."..... >[0010] 08 07 00 00 22 00 92 00 02 01 00 00 00 00 00 00 ...."... ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[0070] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[0080] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0090] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00A0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00B0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00C0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00D0] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[00E0] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[00F0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0100] 65 00 6E 00 74 00 73 00 00 00 5C 00 6D 00 69 00 e.n.t.s. ..\.m.i. >[0110] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0120] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0130] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0140] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0150] 00 00 .. >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa363f0]: subreq: 0x557c5fa36a50 >gensec_update_send: spnego[0x557c5fa326e0]: subreq: 0x557c5fa35d30 >gensec_update_done: ntlmssp[0x557c5fa363f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa36a50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa36c00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa326e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa35d30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa35ee0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa363f0]: subreq: 0x557c5fa36a50 >gensec_update_send: spnego[0x557c5fa326e0]: subreq: 0x557c5fa35d30 >gensec_update_done: ntlmssp[0x557c5fa363f0]: NT_STATUS_OK tevent_req[0x557c5fa36a50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa36c00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa326e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa35d30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa35ee0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa326e0]: subreq: 0x557c5fa35d30 >gensec_update_done: spnego[0x557c5fa326e0]: NT_STATUS_OK tevent_req[0x557c5fa35d30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa35ee0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Students input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0040] 65 00 6E 00 74 00 73 00 00 00 e.n.t.s. .. >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 46 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 F....... .."..... >[0010] 2C 01 00 00 22 00 6A 00 B2 00 00 00 00 00 00 00 ,...".j. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 00 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0080] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0090] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[00A0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[00B0] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00C0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00D0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00E0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[00F0] 64 00 65 00 6E 00 74 00 73 00 00 00 d.e.n.t. s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa30ce0]: subreq: 0x557c5fa380d0 >gensec_update_send: spnego[0x557c5fa374b0]: subreq: 0x557c5fa364b0 >gensec_update_done: ntlmssp[0x557c5fa30ce0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa380d0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa38280)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa374b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa364b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa36660)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa30ce0]: subreq: 0x557c5fa38420 >gensec_update_send: spnego[0x557c5fa374b0]: subreq: 0x557c5fa364b0 >gensec_update_done: ntlmssp[0x557c5fa30ce0]: NT_STATUS_OK tevent_req[0x557c5fa38420/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa385d0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa374b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa364b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa36660)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa374b0]: subreq: 0x557c5fa364b0 >gensec_update_done: spnego[0x557c5fa374b0]: NT_STATUS_OK tevent_req[0x557c5fa364b0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa36660)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 00 00 s... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 d.e.n.t. s...\.2. >[0070] 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 0.1.2.F. S.\.I.n. >[0080] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0090] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00A0] 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 u.d.e.n. t.s...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 t.u.d.e. n.t.s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students\My Subjects input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 s.\.M.y. .S.h.a. >[0050] 6C 00 6F 00 6D 00 00 00 l.o.m... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 54 00 01 00 02 00 00 00 03 00 22 00 00 00 00 00 T....... .."..... >[0010] 08 07 00 00 22 00 78 00 CE 00 00 00 00 00 00 00 ....".x. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 5C 00 4D 00 79 00 d.e.n.t. s.\.M.y. >[0070] 20 00 53 00 68 00 61 00 6C 00 6F 00 6D 00 00 00 .S.h.a. l.o.m... >[0080] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0090] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[00A0] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[00B0] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[00C0] 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 6C 00 \.M.y. . S.h.a.l. >[00D0] 6F 00 6D 00 00 00 5C 00 32 00 30 00 31 00 32 00 o.m...\. 2.0.1.2. >[00E0] 46 00 53 00 5C 00 4D 00 79 00 20 00 53 00 68 00 F.S.\.M. y. .S.h. >[00F0] 61 00 6C 00 6F 00 6D 00 00 00 a.l.o.m. .. >split_dfs_path: split_dfs_path: |\2012FS\My Subjects| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |My Subjects| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\SCBG\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\SCBG\Information for Staff\Information for Students\My Subjects >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\SCBG\Information for Staff\Information for Students\My Subjects input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 \.S.C.B. G.\.I.n. >[0020] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0030] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[0040] 61 00 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 a.f.f.\. I.n.f.o. >[0050] 72 00 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 r.a.m.a. t.i.o.n. >[0060] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0070] 64 00 65 00 6E 00 74 00 73 00 5C 00 4D 00 79 00 d.e.n.t. s.\.M.y. >[0080] 20 00 53 00 68 00 61 00 6C 00 6F 00 6D 00 00 00 .S.h.a. l.o.m... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 44 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 D....... .."..... >[0010] 08 07 00 00 22 00 68 00 AE 00 00 00 00 00 00 00 ....".h. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 53 00 43 00 42 00 1.2.F.S. \.S.C.B. >[0040] 47 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 G.\.I.n. f.o.r.m. >[0050] 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 a.t.i.o. n. .f.o. >[0060] 72 00 20 00 53 00 74 00 61 00 66 00 66 00 00 00 r. .S.t. a.f.f... >[0070] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0080] 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 66 00 S.C.B.G. \.I.n.f. >[0090] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00A0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00B0] 66 00 66 00 00 00 5C 00 6D 00 69 00 6E 00 6E 00 f.f...\. m.i.n.n. >[00C0] 6F 00 77 00 2E 00 69 00 74 00 5C 00 49 00 6E 00 o.w...i. t.\.I.n. >[00D0] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[00E0] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00F0] 61 00 66 00 66 00 00 00 a.f.f... >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa3aca0]: subreq: 0x557c5fa3b290 >gensec_update_send: spnego[0x557c5fa380b0]: subreq: 0x557c5fa3a110 >gensec_update_done: ntlmssp[0x557c5fa3aca0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3b290/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3b440)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa380b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3a110/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3a2c0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa3aca0]: subreq: 0x557c5fa3bb70 >gensec_update_send: spnego[0x557c5fa380b0]: subreq: 0x557c5fa3b440 >gensec_update_done: ntlmssp[0x557c5fa3aca0]: NT_STATUS_OK tevent_req[0x557c5fa3bb70/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3bd20)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa380b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3b440/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3b5f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa380b0]: subreq: 0x557c5fa3bb70 >gensec_update_done: spnego[0x557c5fa380b0]: NT_STATUS_OK tevent_req[0x557c5fa3bb70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3bd20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Staff input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 f.o.r. . S.t.a.f. >[0040] 66 00 00 00 f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 6D 00 S.t.a.f. f...\.m. >[0070] 69 00 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 i.n.n.o. w...i.t. >[0080] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0090] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00A0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 .S.t.a. f.f...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 61 00 66 00 66 00 00 00 t.a.f.f. .. >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa3b010]: subreq: 0x557c5fa3b690 >gensec_update_send: spnego[0x557c5fa383e0]: subreq: 0x557c5fa3a460 >gensec_update_done: ntlmssp[0x557c5fa3b010]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3b690/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3b840)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa383e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3a460/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3a610)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa3b010]: subreq: 0x557c5fa3bef0 >gensec_update_send: spnego[0x557c5fa383e0]: subreq: 0x557c5fa3b830 >gensec_update_done: ntlmssp[0x557c5fa3b010]: NT_STATUS_OK tevent_req[0x557c5fa3bef0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3c0a0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa383e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3b830/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3b9e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa383e0]: subreq: 0x557c5fa3a900 >gensec_update_done: spnego[0x557c5fa383e0]: NT_STATUS_OK tevent_req[0x557c5fa3a900/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3aab0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 3A 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 :....... .."..... >[0010] 2C 01 00 00 22 00 5E 00 9A 00 00 00 00 00 00 00 ,...".^. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 00 00 5C 00 32 00 30 00 31 00 32 00 f.f...\. 2.0.1.2. >[0070] 46 00 53 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 F.S.\.I. n.f.o.r. >[0080] 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 m.a.t.i. o.n. .f. >[0090] 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 66 00 o.r. .S. t.a.f.f. >[00A0] 00 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[00B0] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[00C0] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00D0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff] >unix_clean_name [\SCBG\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff\Information for Students\My Subjects input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 5C 00 49 00 .S.t.a. f.f.\.I. >[0040] 6E 00 66 00 6F 00 72 00 61 00 6D 00 61 00 74 00 n.f.o.r. a.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 6C 00 \.M.y. . S.h.a.l. >[0080] 6F 00 6D 00 00 00 o.m... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 6E 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 n....... .."..... >[0010] 08 07 00 00 22 00 92 00 02 01 00 00 00 00 00 00 ...."... ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[0070] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[0080] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0090] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00A0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00B0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00C0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00D0] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[00E0] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[00F0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0100] 65 00 6E 00 74 00 73 00 00 00 5C 00 6D 00 69 00 e.n.t.s. ..\.m.i. >[0110] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0120] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0130] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0140] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0150] 00 00 .. >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa3bb40]: subreq: 0x557c5fa3d710 >gensec_update_send: spnego[0x557c5fa2f950]: subreq: 0x557c5fa3b180 >gensec_update_done: ntlmssp[0x557c5fa3bb40]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3d710/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3d8c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa2f950]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3b180/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3b330)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa3bb40]: subreq: 0x557c5fa3b2d0 >gensec_update_send: spnego[0x557c5fa2f950]: subreq: 0x557c5fa3d3c0 >gensec_update_done: ntlmssp[0x557c5fa3bb40]: NT_STATUS_OK tevent_req[0x557c5fa3b2d0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3b480)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa2f950]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3d3c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3d570)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa2f950]: subreq: 0x557c5fa3d3c0 >gensec_update_done: spnego[0x557c5fa2f950]: NT_STATUS_OK tevent_req[0x557c5fa3d3c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3d570)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Students input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0040] 65 00 6E 00 74 00 73 00 00 00 e.n.t.s. .. >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 46 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 F....... .."..... >[0010] 2C 01 00 00 22 00 6A 00 B2 00 00 00 00 00 00 00 ,...".j. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 00 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0080] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0090] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[00A0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[00B0] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00C0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00D0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00E0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[00F0] 64 00 65 00 6E 00 74 00 73 00 00 00 d.e.n.t. s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa3d560]: subreq: 0x557c5fa3db50 >gensec_update_send: spnego[0x557c5fa38f60]: subreq: 0x557c5fa3bee0 >gensec_update_done: ntlmssp[0x557c5fa3d560]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3db50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3dd00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa38f60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3bee0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3c090)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa3d560]: subreq: 0x557c5fa3dc80 >gensec_update_send: spnego[0x557c5fa38f60]: subreq: 0x557c5fa3bb90 >gensec_update_done: ntlmssp[0x557c5fa3d560]: NT_STATUS_OK tevent_req[0x557c5fa3dc80/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3de30)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa38f60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3bb90/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3bd40)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa38f60]: subreq: 0x557c5fa3bb90 >gensec_update_done: spnego[0x557c5fa38f60]: NT_STATUS_OK tevent_req[0x557c5fa3bb90/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3bd40)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 00 00 s... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 d.e.n.t. s...\.2. >[0070] 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 0.1.2.F. S.\.I.n. >[0080] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0090] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00A0] 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 u.d.e.n. t.s...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 t.u.d.e. n.t.s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students\My Subjects input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 s.\.M.y. .S.h.a. >[0050] 6C 00 6F 00 6D 00 00 00 l.o.m... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 54 00 01 00 02 00 00 00 03 00 22 00 00 00 00 00 T....... .."..... >[0010] 08 07 00 00 22 00 78 00 CE 00 00 00 00 00 00 00 ....".x. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 5C 00 4D 00 79 00 d.e.n.t. s.\.M.y. >[0070] 20 00 53 00 68 00 61 00 6C 00 6F 00 6D 00 00 00 .S.h.a. l.o.m... >[0080] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0090] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[00A0] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[00B0] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[00C0] 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 6C 00 \.M.y. . S.h.a.l. >[00D0] 6F 00 6D 00 00 00 5C 00 32 00 30 00 31 00 32 00 o.m...\. 2.0.1.2. >[00E0] 46 00 53 00 5C 00 4D 00 79 00 20 00 53 00 68 00 F.S.\.M. y. .S.h. >[00F0] 61 00 6C 00 6F 00 6D 00 00 00 a.l.o.m. .. >split_dfs_path: split_dfs_path: |\2012FS\My Subjects| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |My Subjects| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 437495 > . D 0 Wed Feb 6 20:08:28 2019 > .. D 0 Wed Feb 6 20:08:28 2019 > test.docx A 7277 Thu Feb 1 19:48:41 2018 > test.png A 430218 Mon Sep 10 09:21:23 2018 > Maths D 0 Tue Mar 5 16:13:04 2019 > > 10395647 blocks of size 4096. 1584163 blocks available >smb: \Information for Staff\Information for Students\My Subjects\> cd "Maths" >dos_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\] >unix_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\SCBG\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\SCBG\Information for Staff\Information for Students\My Subjects\Maths >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\SCBG\Information for Staff\Information for Students\My Subjects\Maths input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 \.S.C.B. G.\.I.n. >[0020] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0030] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[0040] 61 00 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 a.f.f.\. I.n.f.o. >[0050] 72 00 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 r.a.m.a. t.i.o.n. >[0060] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0070] 64 00 65 00 6E 00 74 00 73 00 5C 00 4D 00 79 00 d.e.n.t. s.\.M.y. >[0080] 20 00 53 00 68 00 61 00 6C 00 6F 00 6D 00 5C 00 .S.h.a. l.o.m.\. >[0090] 59 00 52 00 33 00 00 00 Y.R.3... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 44 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 D....... .."..... >[0010] 08 07 00 00 22 00 68 00 AE 00 00 00 00 00 00 00 ....".h. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 53 00 43 00 42 00 1.2.F.S. \.S.C.B. >[0040] 47 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 G.\.I.n. f.o.r.m. >[0050] 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 a.t.i.o. n. .f.o. >[0060] 72 00 20 00 53 00 74 00 61 00 66 00 66 00 00 00 r. .S.t. a.f.f... >[0070] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0080] 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 66 00 S.C.B.G. \.I.n.f. >[0090] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00A0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00B0] 66 00 66 00 00 00 5C 00 6D 00 69 00 6E 00 6E 00 f.f...\. m.i.n.n. >[00C0] 6F 00 77 00 2E 00 69 00 74 00 5C 00 49 00 6E 00 o.w...i. t.\.I.n. >[00D0] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[00E0] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00F0] 61 00 66 00 66 00 00 00 a.f.f... >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa39de0]: subreq: 0x557c5fa3b180 >gensec_update_send: spnego[0x557c5fa34b60]: subreq: 0x557c5fa38420 >gensec_update_done: ntlmssp[0x557c5fa39de0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3b180/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3b330)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa34b60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa38420/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa385d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa39de0]: subreq: 0x557c5fa3ec00 >gensec_update_send: spnego[0x557c5fa34b60]: subreq: 0x557c5fa38420 >gensec_update_done: ntlmssp[0x557c5fa39de0]: NT_STATUS_OK tevent_req[0x557c5fa3ec00/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3edb0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa34b60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa38420/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa385d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa34b60]: subreq: 0x557c5fa380d0 >gensec_update_done: spnego[0x557c5fa34b60]: NT_STATUS_OK tevent_req[0x557c5fa380d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa38280)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Staff input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 f.o.r. . S.t.a.f. >[0040] 66 00 00 00 f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 6D 00 S.t.a.f. f...\.m. >[0070] 69 00 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 i.n.n.o. w...i.t. >[0080] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0090] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00A0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 .S.t.a. f.f...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 61 00 66 00 66 00 00 00 t.a.f.f. .. >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa39110]: subreq: 0x557c5fa38420 >gensec_update_send: spnego[0x557c5fa3bfd0]: subreq: 0x557c5fa3e8e0 >gensec_update_done: ntlmssp[0x557c5fa39110]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa38420/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa385d0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa3bfd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3e8e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3ea90)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa39110]: subreq: 0x557c5fa3ae30 >gensec_update_send: spnego[0x557c5fa3bfd0]: subreq: 0x557c5fa380d0 >gensec_update_done: ntlmssp[0x557c5fa39110]: NT_STATUS_OK tevent_req[0x557c5fa3ae30/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3afe0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa3bfd0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa380d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa38280)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa3bfd0]: subreq: 0x557c5fa3de60 >gensec_update_done: spnego[0x557c5fa3bfd0]: NT_STATUS_OK tevent_req[0x557c5fa3de60/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3e010)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 3A 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 :....... .."..... >[0010] 2C 01 00 00 22 00 5E 00 9A 00 00 00 00 00 00 00 ,...".^. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 00 00 5C 00 32 00 30 00 31 00 32 00 f.f...\. 2.0.1.2. >[0070] 46 00 53 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 F.S.\.I. n.f.o.r. >[0080] 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 m.a.t.i. o.n. .f. >[0090] 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 66 00 o.r. .S. t.a.f.f. >[00A0] 00 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[00B0] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[00C0] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00D0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff] >unix_clean_name [\SCBG\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff\Information for Students\My Subjects\Maths input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 5C 00 49 00 .S.t.a. f.f.\.I. >[0040] 6E 00 66 00 6F 00 72 00 61 00 6D 00 61 00 74 00 n.f.o.r. a.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 6C 00 \.M.y. . S.h.a.l. >[0080] 6F 00 6D 00 5C 00 59 00 52 00 33 00 00 00 o.m.\.Y. R.3... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 6E 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 n....... .."..... >[0010] 08 07 00 00 22 00 92 00 02 01 00 00 00 00 00 00 ...."... ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[0070] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[0080] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0090] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00A0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00B0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00C0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00D0] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[00E0] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[00F0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0100] 65 00 6E 00 74 00 73 00 00 00 5C 00 6D 00 69 00 e.n.t.s. ..\.m.i. >[0110] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0120] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0130] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0140] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0150] 00 00 .. >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa3d730]: subreq: 0x557c5fa3dd20 >gensec_update_send: spnego[0x557c5fa2f150]: subreq: 0x557c5fa3b3c0 >gensec_update_done: ntlmssp[0x557c5fa3d730]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3dd20/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3ded0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa2f150]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3b3c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3b570)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa3d730]: subreq: 0x557c5fa3e5a0 >gensec_update_send: spnego[0x557c5fa2f150]: subreq: 0x557c5fa3b3c0 >gensec_update_done: ntlmssp[0x557c5fa3d730]: NT_STATUS_OK tevent_req[0x557c5fa3e5a0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3e750)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa2f150]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3b3c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3b570)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa2f150]: subreq: 0x557c5fa3b3c0 >gensec_update_done: spnego[0x557c5fa2f150]: NT_STATUS_OK tevent_req[0x557c5fa3b3c0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3b570)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Students input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0040] 65 00 6E 00 74 00 73 00 00 00 e.n.t.s. .. >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 46 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 F....... .."..... >[0010] 2C 01 00 00 22 00 6A 00 B2 00 00 00 00 00 00 00 ,...".j. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 00 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0080] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0090] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[00A0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[00B0] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00C0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00D0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00E0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[00F0] 64 00 65 00 6E 00 74 00 73 00 00 00 d.e.n.t. s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa3b770]: subreq: 0x557c5fa3e910 >gensec_update_send: spnego[0x557c5fa38e20]: subreq: 0x557c5fa3ae30 >gensec_update_done: ntlmssp[0x557c5fa3b770]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3e910/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3eac0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa38e20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3ae30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3afe0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa3b770]: subreq: 0x557c5fa3e5c0 >gensec_update_send: spnego[0x557c5fa38e20]: subreq: 0x557c5fa3c280 >gensec_update_done: ntlmssp[0x557c5fa3b770]: NT_STATUS_OK tevent_req[0x557c5fa3e5c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3e770)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa38e20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3c280/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3c430)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa38e20]: subreq: 0x557c5fa3c280 >gensec_update_done: spnego[0x557c5fa38e20]: NT_STATUS_OK tevent_req[0x557c5fa3c280/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3c430)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 00 00 s... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 d.e.n.t. s...\.2. >[0070] 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 0.1.2.F. S.\.I.n. >[0080] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0090] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00A0] 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 u.d.e.n. t.s...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 t.u.d.e. n.t.s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students\My Subjects\Maths input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 s.\.M.y. .S.h.a. >[0050] 6C 00 6F 00 6D 00 5C 00 59 00 52 00 33 00 00 00 l.o.m.\. Y.R.3... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 54 00 01 00 02 00 00 00 03 00 22 00 00 00 00 00 T....... .."..... >[0010] 08 07 00 00 22 00 78 00 CE 00 00 00 00 00 00 00 ....".x. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 5C 00 4D 00 79 00 d.e.n.t. s.\.M.y. >[0070] 20 00 53 00 68 00 61 00 6C 00 6F 00 6D 00 00 00 .S.h.a. l.o.m... >[0080] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0090] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[00A0] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[00B0] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[00C0] 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 6C 00 \.M.y. . S.h.a.l. >[00D0] 6F 00 6D 00 00 00 5C 00 32 00 30 00 31 00 32 00 o.m...\. 2.0.1.2. >[00E0] 46 00 53 00 5C 00 4D 00 79 00 20 00 53 00 68 00 F.S.\.M. y. .S.h. >[00F0] 61 00 6C 00 6F 00 6D 00 00 00 a.l.o.m. .. >split_dfs_path: split_dfs_path: |\2012FS\My Subjects| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |My Subjects| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >smb: \Information for Staff\Information for Students\My Subjects\Maths\> dir >dos_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\*] >unix_clean_name [\Information for Staff\Information for Students\My Subjects\Maths\*] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\SCBG\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\SCBG\Information for Staff\Information for Students\My Subjects\Maths >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\SCBG\Information for Staff\Information for Students\My Subjects\Maths input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 \.S.C.B. G.\.I.n. >[0020] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0030] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[0040] 61 00 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 a.f.f.\. I.n.f.o. >[0050] 72 00 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 r.a.m.a. t.i.o.n. >[0060] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0070] 64 00 65 00 6E 00 74 00 73 00 5C 00 4D 00 79 00 d.e.n.t. s.\.M.y. >[0080] 20 00 53 00 68 00 61 00 6C 00 6F 00 6D 00 5C 00 .S.h.a. l.o.m.\. >[0090] 59 00 52 00 33 00 00 00 Y.R.3... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 44 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 D....... .."..... >[0010] 08 07 00 00 22 00 68 00 AE 00 00 00 00 00 00 00 ....".h. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 53 00 43 00 42 00 1.2.F.S. \.S.C.B. >[0040] 47 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 G.\.I.n. f.o.r.m. >[0050] 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 a.t.i.o. n. .f.o. >[0060] 72 00 20 00 53 00 74 00 61 00 66 00 66 00 00 00 r. .S.t. a.f.f... >[0070] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0080] 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 66 00 S.C.B.G. \.I.n.f. >[0090] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00A0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00B0] 66 00 66 00 00 00 5C 00 6D 00 69 00 6E 00 6E 00 f.f...\. m.i.n.n. >[00C0] 6F 00 77 00 2E 00 69 00 74 00 5C 00 49 00 6E 00 o.w...i. t.\.I.n. >[00D0] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[00E0] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00F0] 61 00 66 00 66 00 00 00 a.f.f... >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa3c5b0]: subreq: 0x557c5fa3ae30 >gensec_update_send: spnego[0x557c5fa30d60]: subreq: 0x557c5fa3e430 >gensec_update_done: ntlmssp[0x557c5fa3c5b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3ae30/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3afe0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa30d60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3e430/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3e5e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa3c5b0]: subreq: 0x557c5fa3b490 >gensec_update_send: spnego[0x557c5fa30d60]: subreq: 0x557c5fa3e430 >gensec_update_done: ntlmssp[0x557c5fa3c5b0]: NT_STATUS_OK tevent_req[0x557c5fa3b490/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3b640)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa30d60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3e430/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3e5e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa30d60]: subreq: 0x557c5fa3e430 >gensec_update_done: spnego[0x557c5fa30d60]: NT_STATUS_OK tevent_req[0x557c5fa3e430/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3e5e0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Staff input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 f.o.r. . S.t.a.f. >[0040] 66 00 00 00 f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 6D 00 S.t.a.f. f...\.m. >[0070] 69 00 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 i.n.n.o. w...i.t. >[0080] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0090] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00A0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 .S.t.a. f.f...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 61 00 66 00 66 00 00 00 t.a.f.f. .. >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa3de80]: subreq: 0x557c5fa3e780 >gensec_update_send: spnego[0x557c5fa29d20]: subreq: 0x557c5f9ed740 >gensec_update_done: ntlmssp[0x557c5fa3de80]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3e780/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3e930)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa29d20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5f9ed740/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5f9ed8f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa3de80]: subreq: 0x557c5fa3e780 >gensec_update_send: spnego[0x557c5fa29d20]: subreq: 0x557c5f9ed740 >gensec_update_done: ntlmssp[0x557c5fa3de80]: NT_STATUS_OK tevent_req[0x557c5fa3e780/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa3e930)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa29d20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5f9ed740/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5f9ed8f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa29d20]: subreq: 0x557c5f9ed740 >gensec_update_done: spnego[0x557c5fa29d20]: NT_STATUS_OK tevent_req[0x557c5f9ed740/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5f9ed8f0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 3A 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 :....... .."..... >[0010] 2C 01 00 00 22 00 5E 00 9A 00 00 00 00 00 00 00 ,...".^. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 00 00 5C 00 32 00 30 00 31 00 32 00 f.f...\. 2.0.1.2. >[0070] 46 00 53 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 F.S.\.I. n.f.o.r. >[0080] 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 m.a.t.i. o.n. .f. >[0090] 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 66 00 o.r. .S. t.a.f.f. >[00A0] 00 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[00B0] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[00C0] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00D0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff] >unix_clean_name [\SCBG\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff\Information for Students\My Subjects\Maths input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 5C 00 49 00 .S.t.a. f.f.\.I. >[0040] 6E 00 66 00 6F 00 72 00 61 00 6D 00 61 00 74 00 n.f.o.r. a.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 6C 00 \.M.y. . S.h.a.l. >[0080] 6F 00 6D 00 5C 00 59 00 52 00 33 00 00 00 o.m.\.Y. R.3... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 6E 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 n....... .."..... >[0010] 08 07 00 00 22 00 92 00 02 01 00 00 00 00 00 00 ...."... ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[0070] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[0080] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0090] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00A0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00B0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00C0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00D0] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[00E0] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[00F0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0100] 65 00 6E 00 74 00 73 00 00 00 5C 00 6D 00 69 00 e.n.t.s. ..\.m.i. >[0110] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0120] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0130] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0140] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0150] 00 00 .. >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa3fcb0]: subreq: 0x557c5fa40330 >gensec_update_send: spnego[0x557c5fa3cdb0]: subreq: 0x557c5fa3ae30 >gensec_update_done: ntlmssp[0x557c5fa3fcb0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa40330/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa404e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa3cdb0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3ae30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3afe0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa3fcb0]: subreq: 0x557c5fa40480 >gensec_update_send: spnego[0x557c5fa3cdb0]: subreq: 0x557c5fa3ae30 >gensec_update_done: ntlmssp[0x557c5fa3fcb0]: NT_STATUS_OK tevent_req[0x557c5fa40480/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa40630)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa3cdb0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3ae30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3afe0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa3cdb0]: subreq: 0x557c5fa3ae30 >gensec_update_done: spnego[0x557c5fa3cdb0]: NT_STATUS_OK tevent_req[0x557c5fa3ae30/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3afe0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Students input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0040] 65 00 6E 00 74 00 73 00 00 00 e.n.t.s. .. >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 46 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 F....... .."..... >[0010] 2C 01 00 00 22 00 6A 00 B2 00 00 00 00 00 00 00 ,...".j. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 00 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0080] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0090] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[00A0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[00B0] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00C0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00D0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00E0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[00F0] 64 00 65 00 6E 00 74 00 73 00 00 00 d.e.n.t. s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa40070]: subreq: 0x557c5fa40760 >gensec_update_send: spnego[0x557c5fa3eae0]: subreq: 0x557c5fa3dd70 >gensec_update_done: ntlmssp[0x557c5fa40070]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa40760/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa40910)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa3eae0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3dd70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3df20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa40070]: subreq: 0x557c5fa40410 >gensec_update_send: spnego[0x557c5fa3eae0]: subreq: 0x557c5fa3da20 >gensec_update_done: ntlmssp[0x557c5fa40070]: NT_STATUS_OK tevent_req[0x557c5fa40410/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa405c0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa3eae0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3da20/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3dbd0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa3eae0]: subreq: 0x557c5fa3dd70 >gensec_update_done: spnego[0x557c5fa3eae0]: NT_STATUS_OK tevent_req[0x557c5fa3dd70/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3df20)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 00 00 s... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 d.e.n.t. s...\.2. >[0070] 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 0.1.2.F. S.\.I.n. >[0080] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0090] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00A0] 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 u.d.e.n. t.s...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 t.u.d.e. n.t.s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students\My Subjects\Maths input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 s.\.M.y. .S.h.a. >[0050] 6C 00 6F 00 6D 00 5C 00 59 00 52 00 33 00 00 00 l.o.m.\. Y.R.3... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 54 00 01 00 02 00 00 00 03 00 22 00 00 00 00 00 T....... .."..... >[0010] 08 07 00 00 22 00 78 00 CE 00 00 00 00 00 00 00 ....".x. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 5C 00 4D 00 79 00 d.e.n.t. s.\.M.y. >[0070] 20 00 53 00 68 00 61 00 6C 00 6F 00 6D 00 00 00 .S.h.a. l.o.m... >[0080] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0090] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[00A0] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[00B0] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[00C0] 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 6C 00 \.M.y. . S.h.a.l. >[00D0] 6F 00 6D 00 00 00 5C 00 32 00 30 00 31 00 32 00 o.m...\. 2.0.1.2. >[00E0] 46 00 53 00 5C 00 4D 00 79 00 20 00 53 00 68 00 F.S.\.M. y. .S.h. >[00F0] 61 00 6C 00 6F 00 6D 00 00 00 a.l.o.m. .. >split_dfs_path: split_dfs_path: |\2012FS\My Subjects| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |My Subjects| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >signed SMB2 message >signed SMB2 message >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\SCBG\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\SCBG\Information for Staff\Information for Students\My Subjects\Maths >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\SCBG\Information for Staff\Information for Students\My Subjects\Maths input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 \.S.C.B. G.\.I.n. >[0020] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0030] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[0040] 61 00 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 a.f.f.\. I.n.f.o. >[0050] 72 00 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 r.a.m.a. t.i.o.n. >[0060] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0070] 64 00 65 00 6E 00 74 00 73 00 5C 00 4D 00 79 00 d.e.n.t. s.\.M.y. >[0080] 20 00 53 00 68 00 61 00 6C 00 6F 00 6D 00 5C 00 .S.h.a. l.o.m.\. >[0090] 59 00 52 00 33 00 00 00 Y.R.3... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 44 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 D....... .."..... >[0010] 08 07 00 00 22 00 68 00 AE 00 00 00 00 00 00 00 ....".h. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 53 00 43 00 42 00 1.2.F.S. \.S.C.B. >[0040] 47 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 G.\.I.n. f.o.r.m. >[0050] 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 a.t.i.o. n. .f.o. >[0060] 72 00 20 00 53 00 74 00 61 00 66 00 66 00 00 00 r. .S.t. a.f.f... >[0070] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0080] 53 00 43 00 42 00 47 00 5C 00 49 00 6E 00 66 00 S.C.B.G. \.I.n.f. >[0090] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00A0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00B0] 66 00 66 00 00 00 5C 00 6D 00 69 00 6E 00 6E 00 f.f...\. m.i.n.n. >[00C0] 6F 00 77 00 2E 00 69 00 74 00 5C 00 49 00 6E 00 o.w...i. t.\.I.n. >[00D0] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[00E0] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00F0] 61 00 66 00 66 00 00 00 a.f.f... >split_dfs_path: split_dfs_path: |\domain.com\Information for Staff| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Staff >cli_cm_find: Looking for connection to server domain.com share Information for Staff >cli_cm_find: List entry server 2012FS share SCBG >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Staff >do_connect: Making new connection to server domain.com share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa41f80]: subreq: 0x557c5fa42640 >gensec_update_send: spnego[0x557c5fa3dd30]: subreq: 0x557c5fa413f0 >gensec_update_done: ntlmssp[0x557c5fa41f80]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa42640/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa427f0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa3dd30]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa413f0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa415a0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa41f80]: subreq: 0x557c5fa42790 >gensec_update_send: spnego[0x557c5fa3dd30]: subreq: 0x557c5fa410a0 >gensec_update_done: ntlmssp[0x557c5fa41f80]: NT_STATUS_OK tevent_req[0x557c5fa42790/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa42940)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa3dd30]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa410a0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa41250)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa3dd30]: subreq: 0x557c5fa42f20 >gensec_update_done: spnego[0x557c5fa3dd30]: NT_STATUS_OK tevent_req[0x557c5fa42f20/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa430d0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Staff input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 f.o.r. . S.t.a.f. >[0040] 66 00 00 00 f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 6D 00 S.t.a.f. f...\.m. >[0070] 69 00 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 i.n.n.o. w...i.t. >[0080] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0090] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00A0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 5C 00 .S.t.a. f.f...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 61 00 66 00 66 00 00 00 t.a.f.f. .. >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Staff >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa40ed0]: subreq: 0x557c5fa414c0 >gensec_update_send: spnego[0x557c5fa3b020]: subreq: 0x557c5fa42fb0 >gensec_update_done: ntlmssp[0x557c5fa40ed0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa414c0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa41670)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa3b020]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa42fb0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa43160)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa40ed0]: subreq: 0x557c5fa42fb0 >gensec_update_send: spnego[0x557c5fa3b020]: subreq: 0x557c5fa41170 >gensec_update_done: ntlmssp[0x557c5fa40ed0]: NT_STATUS_OK tevent_req[0x557c5fa42fb0/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa43160)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa3b020]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa41170/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa41320)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa3b020]: subreq: 0x557c5fa40980 >gensec_update_done: spnego[0x557c5fa3b020]: NT_STATUS_OK tevent_req[0x557c5fa40980/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa40b30)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 3A 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 :....... .."..... >[0010] 2C 01 00 00 22 00 5E 00 9A 00 00 00 00 00 00 00 ,...".^. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 00 00 5C 00 32 00 30 00 31 00 32 00 f.f...\. 2.0.1.2. >[0070] 46 00 53 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 F.S.\.I. n.f.o.r. >[0080] 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 66 00 m.a.t.i. o.n. .f. >[0090] 6F 00 72 00 20 00 53 00 74 00 61 00 66 00 66 00 o.r. .S. t.a.f.f. >[00A0] 00 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[00B0] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[00C0] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[00D0] 20 00 53 00 74 00 61 00 66 00 66 00 00 00 .S.t.a. f.f... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Staff| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Staff| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff] >unix_clean_name [\SCBG\Information for Staff] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Staff\Information for Students\My Subjects\Maths >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Staff\Information for Students\My Subjects\Maths input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 61 00 66 00 66 00 5C 00 49 00 .S.t.a. f.f.\.I. >[0040] 6E 00 66 00 6F 00 72 00 61 00 6D 00 61 00 74 00 n.f.o.r. a.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 6C 00 \.M.y. . S.h.a.l. >[0080] 6F 00 6D 00 5C 00 59 00 52 00 33 00 00 00 o.m.\.Y. R.3... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 6E 00 01 00 01 00 00 00 03 00 22 00 00 00 00 00 n....... .."..... >[0010] 08 07 00 00 22 00 92 00 02 01 00 00 00 00 00 00 ...."... ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[0060] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[0070] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[0080] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0090] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00A0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00B0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00C0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 61 00 .f.o.r. .S.t.a. >[00D0] 66 00 66 00 5C 00 49 00 6E 00 66 00 6F 00 72 00 f.f.\.I. n.f.o.r. >[00E0] 61 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 a.m.a.t. i.o.n. . >[00F0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0100] 65 00 6E 00 74 00 73 00 00 00 5C 00 6D 00 69 00 e.n.t.s. ..\.m.i. >[0110] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0120] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0130] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0140] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0150] 00 00 .. >split_dfs_path: split_dfs_path: |\domain.com\Information for Students| >split_dfs_path: server: |domain.com| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server domain.com share Information for Students >cli_cm_find: Looking for connection to server domain.com share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share SCBG >cli_resolve_path: Calling cli_cm_connect on: server domain.com share Information for Students >do_connect: Making new connection to server domain.com share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up domain.com#20 (sitename (null)) >name domain.com#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.43 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB2_10] against server[domain.com] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa44240]: subreq: 0x557c5fa44830 >gensec_update_send: spnego[0x557c5fa432f0]: subreq: 0x557c5fa3fe10 >gensec_update_done: ntlmssp[0x557c5fa44240]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa44830/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa449e0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa432f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3fe10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3ffc0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa44240]: subreq: 0x557c5fa44980 >gensec_update_send: spnego[0x557c5fa432f0]: subreq: 0x557c5fa3fe10 >gensec_update_done: ntlmssp[0x557c5fa44240]: NT_STATUS_OK tevent_req[0x557c5fa44980/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa44b30)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa432f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa3fe10/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa3ffc0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa432f0]: subreq: 0x557c5fa444e0 >gensec_update_done: spnego[0x557c5fa432f0]: NT_STATUS_OK tevent_req[0x557c5fa444e0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa44690)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \domain.com\Information for Students input buffer > >[0000] 03 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0010] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0020] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[0030] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[0040] 65 00 6E 00 74 00 73 00 00 00 e.n.t.s. .. >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 46 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 F....... .."..... >[0010] 2C 01 00 00 22 00 6A 00 B2 00 00 00 00 00 00 00 ,...".j. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 6D 00 69 00 ........ ..\.m.i. >[0030] 6E 00 6E 00 6F 00 77 00 2E 00 69 00 74 00 5C 00 n.n.o.w. ..i.t.\. >[0040] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[0050] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[0060] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[0070] 00 00 5C 00 6D 00 69 00 6E 00 6E 00 6F 00 77 00 ..\.m.i. n.n.o.w. >[0080] 2E 00 69 00 74 00 5C 00 49 00 6E 00 66 00 6F 00 ..i.t.\. I.n.f.o. >[0090] 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 20 00 r.m.a.t. i.o.n. . >[00A0] 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 64 00 f.o.r. . S.t.u.d. >[00B0] 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 30 00 e.n.t.s. ..\.2.0. >[00C0] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[00D0] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[00E0] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[00F0] 64 00 65 00 6E 00 74 00 73 00 00 00 d.e.n.t. s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >do_connect: Making new connection to server 2012FS share Information for Students >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up 2012FS#20 (sitename (null)) >name 2012FS#20 found. >remove_duplicate_addrs2: looking for duplicate address/port pairs >Connecting to 10.1.1.237 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 > session request ok > negotiated dialect[SMB3_02] against server[2012FS] >got OID=1.3.6.1.4.1.311.2.2.30 >got OID=1.2.840.48018.1.2.2 >kerberos_kinit_password: as username@DOMAIN.COM using [MEMORY:cliconnect] as ccache and config [(null)] >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x557c5fa44660]: subreq: 0x557c5fa45000 >gensec_update_send: spnego[0x557c5fa41a30]: subreq: 0x557c5fa41200 >gensec_update_done: ntlmssp[0x557c5fa44660]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa45000/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa451b0)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x557c5fa41a30]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa41200/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa413b0)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x557c5fa44660]: subreq: 0x557c5fa45a50 >gensec_update_send: spnego[0x557c5fa41a30]: subreq: 0x557c5fa441d0 >gensec_update_done: ntlmssp[0x557c5fa44660]: NT_STATUS_OK tevent_req[0x557c5fa45a50/../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x557c5fa45c00)] timer[(nil)] finish[../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x557c5fa41a30]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x557c5fa441d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa44380)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x557c5fa41a30]: subreq: 0x557c5fa441d0 >gensec_update_done: spnego[0x557c5fa41a30]: NT_STATUS_OK tevent_req[0x557c5fa441d0/../auth/gensec/spnego.c:1601]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x557c5fa44380)] timer[(nil)] finish[../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 00 00 s... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 40 00 01 00 03 00 00 00 03 00 22 00 01 00 00 00 @....... .."..... >[0010] 2C 01 00 00 22 00 64 00 A6 00 00 00 00 00 00 00 ,...".d. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 32 00 d.e.n.t. s...\.2. >[0070] 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 0.1.2.F. S.\.I.n. >[0080] 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 f.o.r.m. a.t.i.o. >[0090] 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 n. .f.o. r. .S.t. >[00A0] 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 5C 00 u.d.e.n. t.s...\. >[00B0] 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 49 00 2.0.1.2. F.S.\.I. >[00C0] 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 69 00 n.f.o.r. m.a.t.i. >[00D0] 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 53 00 o.n. .f. o.r. .S. >[00E0] 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 00 00 t.u.d.e. n.t.s... >signed SMB2 message >split_dfs_path: split_dfs_path: |\2012FS\Information for Students| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |Information for Students| >split_dfs_path: extrapath: || >signed SMB2 message >signed SMB2 message > tconx ok >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students] >cli_resolve_path: Calling cli_qpathinfo_basic on: dfs_path \2012FS\Information for Students\My Subjects\Maths >signed SMB2 message >cli_cm_find: Looking for connection to server 2012FS share IPC$ >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share IPC$ >cli_cm_find: Found match server 2012FS share IPC$ >cli_resolve_path: Calling cli_dfs_get_referral on dfs_path \2012FS\Information for Students\My Subjects\Maths >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: \2012FS\Information for Students\My Subjects\Maths input buffer > >[0000] 03 00 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 ..\.2.0. 1.2.F.S. >[0010] 5C 00 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 \.I.n.f. o.r.m.a. >[0020] 74 00 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 t.i.o.n. .f.o.r. >[0030] 20 00 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 .S.t.u. d.e.n.t. >[0040] 73 00 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 s.\.M.y. .S.h.a. >[0050] 6C 00 6F 00 6D 00 5C 00 59 00 52 00 33 00 00 00 l.o.m.\. Y.R.3... >signed SMB2 message >cli_dfs_get_referral_ex: cli_dfs_get_referral_ex: output buffer > >[0000] 54 00 01 00 02 00 00 00 03 00 22 00 00 00 00 00 T....... .."..... >[0010] 08 07 00 00 22 00 78 00 CE 00 00 00 00 00 00 00 ....".x. ........ >[0020] 00 00 00 00 00 00 00 00 00 00 5C 00 32 00 30 00 ........ ..\.2.0. >[0030] 31 00 32 00 46 00 53 00 5C 00 49 00 6E 00 66 00 1.2.F.S. \.I.n.f. >[0040] 6F 00 72 00 6D 00 61 00 74 00 69 00 6F 00 6E 00 o.r.m.a. t.i.o.n. >[0050] 20 00 66 00 6F 00 72 00 20 00 53 00 74 00 75 00 .f.o.r. .S.t.u. >[0060] 64 00 65 00 6E 00 74 00 73 00 5C 00 4D 00 79 00 d.e.n.t. s.\.M.y. >[0070] 20 00 53 00 68 00 61 00 6C 00 6F 00 6D 00 00 00 .S.h.a. l.o.m... >[0080] 5C 00 32 00 30 00 31 00 32 00 46 00 53 00 5C 00 \.2.0.1. 2.F.S.\. >[0090] 49 00 6E 00 66 00 6F 00 72 00 6D 00 61 00 74 00 I.n.f.o. r.m.a.t. >[00A0] 69 00 6F 00 6E 00 20 00 66 00 6F 00 72 00 20 00 i.o.n. . f.o.r. . >[00B0] 53 00 74 00 75 00 64 00 65 00 6E 00 74 00 73 00 S.t.u.d. e.n.t.s. >[00C0] 5C 00 4D 00 79 00 20 00 53 00 68 00 61 00 6C 00 \.M.y. . S.h.a.l. >[00D0] 6F 00 6D 00 00 00 5C 00 32 00 30 00 31 00 32 00 o.m...\. 2.0.1.2. >[00E0] 46 00 53 00 5C 00 4D 00 79 00 20 00 53 00 68 00 F.S.\.M. y. .S.h. >[00F0] 61 00 6C 00 6F 00 6D 00 00 00 a.l.o.m. .. >split_dfs_path: split_dfs_path: |\2012FS\My Subjects| >split_dfs_path: server: |2012FS| >split_dfs_path: share: |My Subjects| >split_dfs_path: extrapath: || >cli_resolve_path: Calling cli_cm_find on server 2012FS share My Subjects >cli_cm_find: Looking for connection to server 2012FS share My Subjects >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share Information for Staff >cli_cm_find: List entry server 2012FS share Information for Students >cli_cm_find: List entry server 2012FS share My Subjects >cli_cm_find: Found match server 2012FS share My Subjects >dos_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >unix_clean_name [\SCBG\Information for Staff\Information for Staff\Information for Students\Information for Students\My Subjects] >signed SMB2 message >signed SMB2 message >signed SMB2 message >Total bytes listed: 0 > . D 0 Tue Mar 5 16:13:04 2019 > .. D 0 Tue Mar 5 16:13:04 2019 > Level 1 D 0 Sat Nov 11 20:07:34 2017 > > 10395647 blocks of size 4096. 1584163 blocks available >smb: \Information for Staff\Information for Students\My Subjects\Maths\> exirt >exirt: command not found >smb: \Information for Staff\Information for Students\My Subjects\Maths\> exit >signed SMB2 message
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 13824
:
14912
|
14916
|
14917
|
14920
|
14921
|
14922
|
14925
|
14926