The Samba-Bugzilla – Attachment 17239 Details for
Bug 15032
Unable to authenticate Android Solid Explorer after upgrading to 4.15.6
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Logs (level 10) when Solid Explorer tried to connect
smb.fail.log (text/x-log), 59.32 KB, created by
Frederick Zhang
on 2022-03-24 07:11:03 UTC
(
hide
)
Description:
Logs (level 10) when Solid Explorer tried to connect
Filename:
MIME Type:
Creator:
Frederick Zhang
Created:
2022-03-24 07:11:03 UTC
Size:
59.32 KB
patch
obsolete
>==> log.<client-ip> <== >[2022/03/23 20:40:32.690295, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:800(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2022/03/23 20:40:32.691580, 6, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2380(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Wed Mar 23 20:37:18 2022 > >[2022/03/23 20:40:32.691669, 3, pid=1037527, effective(0, 0), real(0, 0), class=locking] ../../source3/smbd/oplock.c:1427(init_oplocks) > init_oplocks: initializing messages. >[2022/03/23 20:40:32.691707, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:716(messaging_register) > Registering messaging pointer for type 774 - private_data=0x56377a147630 >[2022/03/23 20:40:32.691742, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:716(messaging_register) > Registering messaging pointer for type 778 - private_data=0x56377a147630 >[2022/03/23 20:40:32.691775, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:716(messaging_register) > Registering messaging pointer for type 770 - private_data=0x56377a147630 >[2022/03/23 20:40:32.691809, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:716(messaging_register) > Registering messaging pointer for type 801 - private_data=0x56377a147630 >[2022/03/23 20:40:32.691842, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:716(messaging_register) > Registering messaging pointer for type 787 - private_data=0x56377a147630 >[2022/03/23 20:40:32.691875, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:716(messaging_register) > Registering messaging pointer for type 779 - private_data=0x56377a147630 >[2022/03/23 20:40:32.691909, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:716(messaging_register) > Registering messaging pointer for type 15 - private_data=(nil) >[2022/03/23 20:40:32.691950, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:732(messaging_register) > Overriding messaging pointer for type 15 - private_data=(nil) >[2022/03/23 20:40:32.691983, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:764(messaging_deregister) > Deregistering messaging pointer for type 16 - private_data=(nil) >[2022/03/23 20:40:32.692017, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:716(messaging_register) > Registering messaging pointer for type 16 - private_data=0x56377a147630 >[2022/03/23 20:40:32.692050, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:764(messaging_deregister) > Deregistering messaging pointer for type 33 - private_data=0x56377a109800 >[2022/03/23 20:40:32.692090, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:716(messaging_register) > Registering messaging pointer for type 33 - private_data=0x56377a147630 >[2022/03/23 20:40:32.692124, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:764(messaging_deregister) > Deregistering messaging pointer for type 790 - private_data=(nil) >[2022/03/23 20:40:32.692157, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:716(messaging_register) > Registering messaging pointer for type 790 - private_data=0x56377a147630 >[2022/03/23 20:40:32.692190, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:764(messaging_deregister) > Deregistering messaging pointer for type 791 - private_data=(nil) >[2022/03/23 20:40:32.692223, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:764(messaging_deregister) > Deregistering messaging pointer for type 1 - private_data=(nil) >[2022/03/23 20:40:32.692257, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:716(messaging_register) > Registering messaging pointer for type 1 - private_data=(nil) >[2022/03/23 20:40:32.692294, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/util_event.c:100(event_add_idle) > event_add_idle: idle_evt(keepalive) 0x56377a104760 >[2022/03/23 20:40:32.692330, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/util_event.c:100(event_add_idle) > event_add_idle: idle_evt(deadtime) 0x56377a139de0 >[2022/03/23 20:40:32.692372, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/util_event.c:100(event_add_idle) > event_add_idle: idle_evt(housekeeping) 0x56377a13ccf0 >[2022/03/23 20:40:32.692486, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:179(read_smb_length_return_keepalive) > got smb length of 106 >[2022/03/23 20:40:32.692554, 6, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/process.c:1955(process_smb) > got message type 0x0 of len 0x6a >[2022/03/23 20:40:32.692588, 3, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/process.c:1957(process_smb) > Transaction 0 of length 110 (0 toread) >[2022/03/23 20:40:32.692627, 10, pid=1037527, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4530(smbd_smb2_process_negprot) > smbd_smb2_first_negprot: packet length 106 >[2022/03/23 20:40:32.692676, 10, pid=1037527, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:711(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 0 (position 0) from bitmap >[2022/03/23 20:40:32.692717, 10, pid=1037527, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2978(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_NEGPROT] mid = 0 >[2022/03/23 20:40:32.692763, 4, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/03/23 20:40:32.692802, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/03/23 20:40:32.692844, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/03/23 20:40:32.692923, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/03/23 20:40:32.692987, 4, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2022/03/23 20:40:32.693029, 4, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2022/03/23 20:40:32.693063, 4, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/03/23 20:40:32.693095, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/03/23 20:40:32.693127, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/03/23 20:40:32.693237, 4, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/03/23 20:40:32.693273, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/util.c:1079(set_remote_arch) > set_remote_arch: Client arch is 'Vista' >[2022/03/23 20:40:32.693336, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:800(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2022/03/23 20:40:32.693806, 6, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2380(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Wed Mar 23 20:37:18 2022 > >[2022/03/23 20:40:32.693874, 3, pid=1037527, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_negprot.c:301(smbd_smb2_request_process_negprot) > Selected protocol SMB2_10 >[2022/03/23 20:40:32.693915, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:565(make_auth3_context_for_ntlm) > make_auth3_context_for_ntlm: Making default auth method list for server role = 'standalone server', encrypt passwords = yes >[2022/03/23 20:40:32.693959, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:52(smb_register_auth) > Attempting to register auth backend anonymous >[2022/03/23 20:40:32.694000, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:64(smb_register_auth) > Successfully added auth method 'anonymous' >[2022/03/23 20:40:32.694032, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:52(smb_register_auth) > Attempting to register auth backend sam >[2022/03/23 20:40:32.694065, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:64(smb_register_auth) > Successfully added auth method 'sam' >[2022/03/23 20:40:32.694097, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:52(smb_register_auth) > Attempting to register auth backend sam_ignoredomain >[2022/03/23 20:40:32.694129, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:64(smb_register_auth) > Successfully added auth method 'sam_ignoredomain' >[2022/03/23 20:40:32.694169, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:52(smb_register_auth) > Attempting to register auth backend sam_netlogon3 >[2022/03/23 20:40:32.694202, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:64(smb_register_auth) > Successfully added auth method 'sam_netlogon3' >[2022/03/23 20:40:32.694235, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:52(smb_register_auth) > Attempting to register auth backend winbind >[2022/03/23 20:40:32.694267, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:64(smb_register_auth) > Successfully added auth method 'winbind' >[2022/03/23 20:40:32.694299, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:426(load_auth_module) > load_auth_module: Attempting to find an auth method to match anonymous >[2022/03/23 20:40:32.694332, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:451(load_auth_module) > load_auth_module: auth method anonymous has a valid init >[2022/03/23 20:40:32.694365, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:426(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam_ignoredomain >[2022/03/23 20:40:32.694398, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:451(load_auth_module) > load_auth_module: auth method sam_ignoredomain has a valid init >[2022/03/23 20:40:32.698879, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1082(gensec_register) > GENSEC backend 'gssapi_spnego' registered >[2022/03/23 20:40:32.698935, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1082(gensec_register) > GENSEC backend 'gssapi_krb5' registered >[2022/03/23 20:40:32.698970, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1082(gensec_register) > GENSEC backend 'gssapi_krb5_sasl' registered >[2022/03/23 20:40:32.699005, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1082(gensec_register) > GENSEC backend 'spnego' registered >[2022/03/23 20:40:32.699040, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1082(gensec_register) > GENSEC backend 'schannel' registered >[2022/03/23 20:40:32.699074, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1082(gensec_register) > GENSEC backend 'naclrpc_as_system' registered >[2022/03/23 20:40:32.699107, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1082(gensec_register) > GENSEC backend 'sasl-EXTERNAL' registered >[2022/03/23 20:40:32.699142, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1082(gensec_register) > GENSEC backend 'ntlmssp' registered >[2022/03/23 20:40:32.699176, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1082(gensec_register) > GENSEC backend 'ntlmssp_resume_ccache' registered >[2022/03/23 20:40:32.699210, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1082(gensec_register) > GENSEC backend 'http_basic' registered >[2022/03/23 20:40:32.699244, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1082(gensec_register) > GENSEC backend 'http_ntlm' registered >[2022/03/23 20:40:32.699278, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1082(gensec_register) > GENSEC backend 'http_negotiate' registered >[2022/03/23 20:40:32.699317, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1082(gensec_register) > GENSEC backend 'krb5' registered >[2022/03/23 20:40:32.699351, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1082(gensec_register) > GENSEC backend 'fake_gssapi_krb5' registered >[2022/03/23 20:40:32.699494, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:843(gensec_start_mech) > Starting GENSEC mechanism spnego >[2022/03/23 20:40:32.699589, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:843(gensec_start_mech) > Starting GENSEC submechanism ntlmssp >[2022/03/23 20:40:32.699659, 10, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:455(gensec_update_send) > gensec_update_send: spnego[0x56377a14d590]: subreq: 0x56377a14f6d0 >[2022/03/23 20:40:32.699701, 10, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:547(gensec_update_done) > gensec_update_done: spnego[0x56377a14d590]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x56377a14f6d0/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x56377a14f890)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116] >[2022/03/23 20:40:32.699811, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_client_global.tdb >[2022/03/23 20:40:32.699857, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_client_global.tdb 2:<none> 3:<none> 4:<none> >[2022/03/23 20:40:32.699897, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 6257F9CF1B9BBA40A015 >[2022/03/23 20:40:32.699962, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x56377a13f8e0 >[2022/03/23 20:40:32.700028, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/03/23 20:40:32.700107, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:402(smbXsrv_client_global_store) >[2022/03/23 20:40:32.700131, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:403(smbXsrv_client_global_store) > smbXsrv_client_global_store: key '6257F9CF1B9BBA40A015B9388A0D396A' stored >[2022/03/23 20:40:32.700169, 1, pid=1037527, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &global_blob: struct smbXsrv_client_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_client_globalU(case 0) > info0 : * > info0: struct smbXsrv_client_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000fd4d7 (1037527) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x84a21ed4ce79f9bd (-8889508815129937475) > local_address : 'ipv4:<server-ip>:445' > remote_address : 'ipv4:<client-ip>:42916' > remote_name : '<client-ip>' > initial_connect_time : Wed Mar 23 08:40:33 PM 2022 AEDT > client_guid : cff95762-9b1b-40ba-a015-b9388a0d396a > stored : 0x01 (1) >[2022/03/23 20:40:32.700416, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_client_global.tdb >[2022/03/23 20:40:32.700452, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 6257F9CF1B9BBA40A015 >[2022/03/23 20:40:32.700495, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:509(smb2srv_client_mc_negprot_next) >[2022/03/23 20:40:32.700518, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:516(smb2srv_client_mc_negprot_next) > smb2srv_client_mc_negprot_next: client_guid[cff95762-9b1b-40ba-a015-b9388a0d396a] stored >[2022/03/23 20:40:32.700553, 1, pid=1037527, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &client_blob: struct smbXsrv_clientB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_clientU(case 0) > info0 : * > info0: struct smbXsrv_client > table : * > raw_ev_ctx : * > msg_ctx : * > global : * > global: struct smbXsrv_client_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000fd4d7 (1037527) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x84a21ed4ce79f9bd (-8889508815129937475) > local_address : 'ipv4:<server-ip>:445' > remote_address : 'ipv4:<client-ip>:42916' > remote_name : '<client-ip>' > initial_connect_time : Wed Mar 23 08:40:33 PM 2022 AEDT > client_guid : cff95762-9b1b-40ba-a015-b9388a0d396a > stored : 0x01 (1) > sconn : * > session_table : * > tcon_table : NULL > open_table : * > connections : * > server_multi_channel_enabled: 0x01 (1) > next_channel_id : 0x0000000000000002 (2) > connection_pass_subreq : * > pending_breaks : NULL >[2022/03/23 20:40:32.700946, 10, pid=1037527, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3839(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [0] idx[1] status[NT_STATUS_OK] body[64] dyn[yes:74] at ../../source3/smbd/smb2_negprot.c:856 >[2022/03/23 20:40:32.700994, 10, pid=1037527, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:968(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 511, charge 1, granted 1, current possible/max 8192/8192, total granted/max/low/range 1/8192/1/1 >[2022/03/23 20:40:32.707382, 10, pid=1037527, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4993(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2022/03/23 20:40:32.707426, 10, pid=1037527, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:711(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 1 (position 1) from bitmap >[2022/03/23 20:40:32.707462, 10, pid=1037527, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2978(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_SESSSETUP] mid = 1 >[2022/03/23 20:40:32.707500, 4, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/03/23 20:40:32.707534, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/03/23 20:40:32.707578, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/03/23 20:40:32.707642, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/03/23 20:40:32.707697, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2022/03/23 20:40:32.707731, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2022/03/23 20:40:32.707767, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key BD85B6E8 >[2022/03/23 20:40:32.707821, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x56377a13f8e0 >[2022/03/23 20:40:32.707879, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/03/23 20:40:32.708007, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:966(smbXsrv_session_global_store) >[2022/03/23 20:40:32.708032, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:967(smbXsrv_session_global_store) > smbXsrv_session_global_store: key 'BD85B6E8' stored >[2022/03/23 20:40:32.708065, 1, pid=1037527, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0xbd85b6e8 (3179656936) > session_wire_id : 0x00000000bd85b6e8 (3179656936) > creation_time : Wed Mar 23 08:40:33 PM 2022 AEDT > expiration_time : Thu Sep 14 12:48:05 PM 30828 AEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0210 (528) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0000 (0) > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0000 (0) > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > application_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000fd4d7 (1037527) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x84a21ed4ce79f9bd (-8889508815129937475) > channel_id : 0x0000000000000001 (1) > creation_time : Wed Mar 23 08:40:33 PM 2022 AEDT > local_address : 'ipv4:<server-ip>:445' > remote_address : 'ipv4:<client-ip>:42916' > remote_name : '<client-ip>' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > signing_algo : 0x0000 (0) > encryption_cipher : 0x0000 (0) >[2022/03/23 20:40:32.708657, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2022/03/23 20:40:32.708693, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key BD85B6E8 >[2022/03/23 20:40:32.708727, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1349(smbXsrv_session_create) >[2022/03/23 20:40:32.708751, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1355(smbXsrv_session_create) > smbXsrv_session_create: global_id (0xbd85b6e8) stored >[2022/03/23 20:40:32.708783, 1, pid=1037527, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0xbd85b6e8 (3179656936) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0xbd85b6e8 (3179656936) > session_wire_id : 0x00000000bd85b6e8 (3179656936) > creation_time : Wed Mar 23 08:40:33 PM 2022 AEDT > expiration_time : Thu Sep 14 12:48:05 PM 30828 AEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0210 (528) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0000 (0) > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0000 (0) > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > application_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000fd4d7 (1037527) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x84a21ed4ce79f9bd (-8889508815129937475) > channel_id : 0x0000000000000001 (1) > creation_time : Wed Mar 23 08:40:33 PM 2022 AEDT > local_address : 'ipv4:<server-ip>:445' > remote_address : 'ipv4:<client-ip>:42916' > remote_name : '<client-ip>' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > signing_algo : 0x0000 (0) > encryption_cipher : 0x0000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Wed Mar 23 08:40:33 PM 2022 AEDT > nonce_high_random : 0x0000000000000000 (0) > nonce_high_max : 0x0000000000000000 (0) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : NULL >[2022/03/23 20:40:32.709545, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:565(make_auth3_context_for_ntlm) > make_auth3_context_for_ntlm: Making default auth method list for server role = 'standalone server', encrypt passwords = yes >[2022/03/23 20:40:32.709585, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:426(load_auth_module) > load_auth_module: Attempting to find an auth method to match anonymous >[2022/03/23 20:40:32.709621, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:451(load_auth_module) > load_auth_module: auth method anonymous has a valid init >[2022/03/23 20:40:32.709659, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:426(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam_ignoredomain >[2022/03/23 20:40:32.709693, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:451(load_auth_module) > load_auth_module: auth method sam_ignoredomain has a valid init >[2022/03/23 20:40:32.709794, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:843(gensec_start_mech) > Starting GENSEC mechanism spnego >[2022/03/23 20:40:32.709830, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2022/03/23 20:40:32.709864, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2022/03/23 20:40:32.709901, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key BD85B6E8 >[2022/03/23 20:40:32.709935, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x56377a104330 >[2022/03/23 20:40:32.709980, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/03/23 20:40:32.710022, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:966(smbXsrv_session_global_store) >[2022/03/23 20:40:32.710045, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:967(smbXsrv_session_global_store) > smbXsrv_session_global_store: key 'BD85B6E8' stored >[2022/03/23 20:40:32.710079, 1, pid=1037527, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0xbd85b6e8 (3179656936) > session_wire_id : 0x00000000bd85b6e8 (3179656936) > creation_time : Wed Mar 23 08:40:33 PM 2022 AEDT > expiration_time : Thu Sep 14 12:48:05 PM 30828 AEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0210 (528) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0000 (0) > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0000 (0) > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > application_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000fd4d7 (1037527) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x84a21ed4ce79f9bd (-8889508815129937475) > channel_id : 0x0000000000000001 (1) > creation_time : Wed Mar 23 08:40:33 PM 2022 AEDT > local_address : 'ipv4:<server-ip>:445' > remote_address : 'ipv4:<client-ip>:42916' > remote_name : '<client-ip>' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > signing_algo : 0x0000 (0) > encryption_cipher : 0x0000 (0) >[2022/03/23 20:40:32.710643, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2022/03/23 20:40:32.710679, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key BD85B6E8 >[2022/03/23 20:40:32.710712, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1453(smbXsrv_session_update) >[2022/03/23 20:40:32.710736, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1459(smbXsrv_session_update) > smbXsrv_session_update: global_id (0xbd85b6e8) stored >[2022/03/23 20:40:32.710776, 1, pid=1037527, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0xbd85b6e8 (3179656936) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0xbd85b6e8 (3179656936) > session_wire_id : 0x00000000bd85b6e8 (3179656936) > creation_time : Wed Mar 23 08:40:33 PM 2022 AEDT > expiration_time : Thu Sep 14 12:48:05 PM 30828 AEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0210 (528) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0000 (0) > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0000 (0) > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > application_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000fd4d7 (1037527) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x84a21ed4ce79f9bd (-8889508815129937475) > channel_id : 0x0000000000000001 (1) > creation_time : Wed Mar 23 08:40:33 PM 2022 AEDT > local_address : 'ipv4:<server-ip>:445' > remote_address : 'ipv4:<client-ip>:42916' > remote_name : '<client-ip>' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > signing_algo : 0x0000 (0) > encryption_cipher : 0x0000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Wed Mar 23 08:40:33 PM 2022 AEDT > nonce_high_random : 0x0000000000000000 (0) > nonce_high_max : 0x0000000000000000 (0) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : * > pending_auth: struct smbXsrv_session_auth0 > prev : * > next : NULL > session : * > connection : * > gensec : * > preauth : NULL > in_flags : 0x00 (0) > in_security_mode : 0x01 (1) > creation_time : Wed Mar 23 08:40:33 PM 2022 AEDT > idle_time : Wed Mar 23 08:40:33 PM 2022 AEDT > channel_id : 0x0000000000000001 (1) >[2022/03/23 20:40:32.711714, 4, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2022/03/23 20:40:32.711750, 4, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2022/03/23 20:40:32.711783, 4, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/03/23 20:40:32.711817, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/03/23 20:40:32.711848, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/03/23 20:40:32.711956, 5, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:843(gensec_start_mech) > Starting GENSEC submechanism ntlmssp >[2022/03/23 20:40:32.712005, 3, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_util.c:72(debug_ntlmssp_flags) > Got NTLMSSP neg_flags=0xe0888215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH > NTLMSSP_NEGOTIATE_56 >[2022/03/23 20:40:32.715164, 1, pid=1037527, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0xe0888215 (3767042581) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 1: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : NULL > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : NULL >[2022/03/23 20:40:32.715648, 1, pid=1037527, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x0004 (4) > TargetNameMaxLen : 0x0004 (4) > TargetName : * > TargetName : '<server-host>' > NegotiateFlags : 0xe28a8215 (3800728085) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 1: NTLMSSP_NEGOTIATE_56 > ServerChallenge : 9126b5261814d51a > Reserved : 0000000000000000 > TargetInfoLen : 0x002c (44) > TargetInfoMaxLen : 0x002c (44) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000006 (6) > pair: ARRAY(6) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : '<server-host>' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : '<server-host>' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : '<server-host-dns>' > pair: struct AV_PAIR > AvId : MsvAvTimestamp (0x7) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x7) > AvTimestamp : Wed Mar 23 08:40:33 PM 2022 AEDT > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1) > ProductBuild : 0x0000 (0) > Reserved : 000000 > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF) >[2022/03/23 20:40:32.716512, 10, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:455(gensec_update_send) > gensec_update_send: ntlmssp[0x56377a1522d0]: subreq: 0x56377a148fc0 >[2022/03/23 20:40:32.716547, 10, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:455(gensec_update_send) > gensec_update_send: spnego[0x56377a1410b0]: subreq: 0x56377a150090 >[2022/03/23 20:40:32.716595, 4, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/03/23 20:40:32.716651, 10, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:547(gensec_update_done) > gensec_update_done: ntlmssp[0x56377a1522d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x56377a148fc0/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x56377a149180)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215] >[2022/03/23 20:40:32.716709, 10, pid=1037527, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:547(gensec_update_done) > gensec_update_done: spnego[0x56377a1410b0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x56377a150090/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x56377a150250)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116] >[2022/03/23 20:40:32.716750, 4, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2022/03/23 20:40:32.716785, 4, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2022/03/23 20:40:32.716819, 4, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/03/23 20:40:32.716852, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/03/23 20:40:32.716885, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/03/23 20:40:32.716952, 4, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/03/23 20:40:32.716991, 10, pid=1037527, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3839(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [1] idx[1] status[NT_STATUS_MORE_PROCESSING_REQUIRED] body[8] dyn[yes:132] at ../../source3/smbd/smb2_sesssetup.c:184 >[2022/03/23 20:40:32.717030, 10, pid=1037527, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:968(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 511, charge 1, granted 1, current possible/max 8192/8192, total granted/max/low/range 1/8192/2/1 > >==> log.smbd <== >[2022/03/23 20:40:32.688474, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/messaging/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=(nil) >[2022/03/23 20:40:32.688881, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/messaging/messages_dgm_ref.c:80(messaging_dgm_ref) > messaging_dgm_ref: messaging_dgm_init returned Success >[2022/03/23 20:40:32.688942, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/messaging/messages_dgm_ref.c:109(messaging_dgm_ref) > messaging_dgm_ref: unique = 9557235258579614141 >[2022/03/23 20:40:32.688989, 2, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/lib/tallocmsg.c:84(register_msg_pool_usage) > Registered MSG_REQ_POOL_USAGE >[2022/03/23 20:40:32.689035, 5, pid=1037527, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:157(make_pdb_method_name) > Attempting to find a passdb backend to match tdbsam (tdbsam) >[2022/03/23 20:40:32.689074, 5, pid=1037527, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:178(make_pdb_method_name) > Found pdb backend tdbsam >[2022/03/23 20:40:32.689153, 5, pid=1037527, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:189(make_pdb_method_name) > pdb backend tdbsam has a valid init >[2022/03/23 20:40:32.689209, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:801(smbXsrv_client_create) >[2022/03/23 20:40:32.689240, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:808(smbXsrv_client_create) > smbXsrv_client_create: client_guid[00000000-0000-0000-0000-000000000000] created >[2022/03/23 20:40:32.689291, 1, pid=1037527, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &client_blob: struct smbXsrv_clientB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_clientU(case 0) > info0 : * > info0: struct smbXsrv_client > table : * > raw_ev_ctx : * > msg_ctx : * > global : * > global: struct smbXsrv_client_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000fd4d7 (1037527) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x84a21ed4ce79f9bd (-8889508815129937475) > local_address : NULL > remote_address : NULL > remote_name : NULL > initial_connect_time : Wed Mar 23 08:40:33 PM 2022 AEDT > client_guid : 00000000-0000-0000-0000-000000000000 > stored : 0x00 (0) > sconn : NULL > session_table : NULL > tcon_table : NULL > open_table : NULL > connections : NULL > server_multi_channel_enabled: 0x01 (1) > next_channel_id : 0x0000000000000001 (1) > connection_pass_subreq : NULL > pending_breaks : NULL >[2022/03/23 20:40:32.689892, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1021(print_socket_options) > socket options: SO_KEEPALIVE=1, SO_REUSEADDR=1, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=1, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0 >[2022/03/23 20:40:32.690027, 5, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1021(print_socket_options) > socket options: SO_KEEPALIVE=1, SO_REUSEADDR=1, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=1, SO_SNDBUF=130560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0 >[2022/03/23 20:40:32.690146, 3, pid=1037527, effective(0, 0), real(0, 0)] ../../lib/util/access.c:316(allow_access) > Allowed connection from <client-ip> (<client-ip>) >[2022/03/23 20:40:32.690179, 10, pid=1037527, effective(0, 0), real(0, 0)] ../../source3/smbd/process.c:3932(smbd_add_connection) > Connection allowed from ipv4:<client-ip>:42916 to ipv4:<server-ip>:445 >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 15032
: 17239