The Samba-Bugzilla – Attachment 5919 Details for
Bug 7643
Unable to execute "rpcclient setdriver"
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Command output with debuglevel=10
setdriver_debug.txt (text/plain), 67.14 KB, created by
Nelson Chan
on 2010-08-23 17:13:21 UTC
(
hide
)
Description:
Command output with debuglevel=10
Filename:
MIME Type:
Creator:
Nelson Chan
Created:
2010-08-23 17:13:21 UTC
Size:
67.14 KB
patch
obsolete
>INFO: Current debug levels: > all: True/10 > tdb: False/0 > printdrivers: False/0 > lanman: False/0 > smb: False/0 > rpc_parse: False/0 > rpc_srv: False/0 > rpc_cli: False/0 > passdb: False/0 > sam: False/0 > auth: False/0 > winbind: False/0 > vfs: False/0 > idmap: False/0 > quota: False/0 > acls: False/0 > locking: False/0 > msdfs: False/0 > dmapi: False/0 > registry: False/0 >added interface br0 ip=fe80::a00:27ff:fe9b:48aa%br0 bcast=fe80::ffff:ffff:ffff:ffff%br0 netmask=ffff:ffff:ffff:ffff:: >added interface eth0 ip=fe80::a00:27ff:feee:2337%eth0 bcast=fe80::ffff:ffff:ffff:ffff%eth0 netmask=ffff:ffff:ffff:ffff:: >added interface eth0 ip=192.168.1.105 bcast=192.168.1.255 netmask=255.255.255.0 >added interface br0 ip=192.168.100.1 bcast=192.168.100.255 netmask=255.255.255.0 >Netbios name list:- >my_netbios_names[0]="SRV1TEST" >lp_load_ex: refreshing parameters >Initialising global parameters >rlimit_max: rlimit_max (1024) below minimum Windows limit (16384) >params.c:pm_process() - Processing configuration file "/etc/samba/smb.conf" >Processing section "[global]" >doing parameter workgroup = MIL >doing parameter server string = Million Industries Limited Samba Server srv1 >doing parameter interfaces = lo, br0 >doing parameter bind interfaces only = Yes >doing parameter pam password change = Yes >doing parameter passwd program = /usr/bin/passwd '%u' >doing parameter username map = /etc/samba/smbusers >doing parameter unix password sync = Yes >doing parameter log level = 1 >doing parameter syslog = 0 >doing parameter log file = /var/log/samba/%m.log >doing parameter name resolve order = wins host bcast >doing parameter time server = Yes >doing parameter printcap name = cups >doing parameter add user script = /usr/sbin/useradd -m -G users "%u" >doing parameter delete user script = /usr/sbin/userdel "%u" >doing parameter add group script = /usr/sbin/groupadd "%g" >doing parameter delete group script = /usr/sbin/groupdel "%g" >doing parameter add user to group script = /usr/sbin/usermod -G '%g' '%u' >doing parameter add machine script = /usr/sbin/useradd -n -c "Workstation (%u)" -g winmachines -M -d /nohome -s /sbin/nologin "%u" >doing parameter logon script = scripts\logon.bat >doing parameter logon path = \\%L\Profiles\%U >doing parameter logon drive = H: >doing parameter logon home = \\%L\homes\%U >doing parameter domain logons = Yes >doing parameter os level = 33 >doing parameter preferred master = Yes >doing parameter domain master = Yes >doing parameter wins support = Yes >doing parameter map acl inherit = Yes >doing parameter cups options = raw >pm_process() returned Yes >lp_servicenumber: couldn't find homes >set_server_role: role = ROLE_DOMAIN_PDC >Attempting to register new charset UCS-2LE >Registered charset UCS-2LE >Attempting to register new charset UTF-16LE >Registered charset UTF-16LE >Attempting to register new charset UCS-2BE >Registered charset UCS-2BE >Attempting to register new charset UTF-16BE >Registered charset UTF-16BE >Attempting to register new charset UTF8 >Registered charset UTF8 >Attempting to register new charset UTF-8 >Registered charset UTF-8 >Attempting to register new charset ASCII >Registered charset ASCII >Attempting to register new charset 646 >Registered charset 646 >Attempting to register new charset ISO-8859-1 >Registered charset ISO-8859-1 >Attempting to register new charset UCS2-HEX >Registered charset UCS2-HEX >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Connecting to host=srv1test >Opening cache file at /var/lib/samba/gencache.tdb >Opening cache file at /var/lib/samba/gencache_notrans.tdb >Cache entry with key = AD_SITENAME/DOMAIN/ couldn't be found >sitename_fetch: No stored sitename for >internal_resolve_name: looking up srv1test#20 (sitename (null)) >Returning valid cache entry: key = NBT/SRV1TEST#20, value = 192.168.100.1:0, timeout = Mon Aug 23 18:21:05 2010 >name srv1test#20 found. >Running timed event "tevent_req_timedout" 0x2ad9f156b620 >Connecting to 192.168.100.1 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 50652 > SO_RCVBUF = 87456 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Doing spnego session setup (blob length=58) >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=NONE > &negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0003 (3) > DomainNameMaxLen : 0x0003 (3) > DomainName : * > DomainName : 'MIL' > WorkstationLen : 0x0008 (8) > WorkstationMaxLen : 0x0008 (8) > Workstation : * > Workstation : 'SRV1TEST' >write_socket(5,162) >write_socket(5,162) wrote 162 >got smb length of 266 >size=266 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=3100 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 181 (0xB5) >smb_bcc=223 >[0000] A1 81 B2 30 81 AF A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 99 04 81 96 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 06 00 06 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 89 60 92 77 76 92 26 BD 04 C3 00 ......`. wv.&.... >[0040] 00 00 00 00 00 00 00 60 00 60 00 36 00 00 00 4D .......` .`.6...M >[0050] 00 49 00 4C 00 02 00 06 00 4D 00 49 00 4C 00 01 .I.L.... .M.I.L.. >[0060] 00 10 00 53 00 52 00 56 00 31 00 54 00 45 00 53 ...S.R.V .1.T.E.S >[0070] 00 54 00 04 00 12 00 6D 00 69 00 6C 00 2E 00 6C .T.....m .i.l...l >[0080] 00 6F 00 63 00 61 00 6C 00 03 00 24 00 73 00 72 .o.c.a.l ...$.s.r >[0090] 00 76 00 31 00 74 00 65 00 73 00 74 00 2E 00 6D .v.1.t.e .s.t...m >[00A0] 00 69 00 6C 00 2E 00 6C 00 6F 00 63 00 61 00 6C .i.l...l .o.c.a.l >[00B0] 00 00 00 00 00 55 00 6E 00 69 00 78 00 00 00 53 .....U.n .i.x...S >[00C0] 00 61 00 6D 00 62 00 61 00 20 00 33 00 2E 00 35 .a.m.b.a . .3...5 >[00D0] 00 2E 00 32 00 00 00 4D 00 49 00 4C 00 00 00 ...2...M .I.L... >size=266 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=3100 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 181 (0xB5) >smb_bcc=223 >[0000] A1 81 B2 30 81 AF A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 99 04 81 96 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 06 00 06 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 89 60 92 77 76 92 26 BD 04 C3 00 ......`. wv.&.... >[0040] 00 00 00 00 00 00 00 60 00 60 00 36 00 00 00 4D .......` .`.6...M >[0050] 00 49 00 4C 00 02 00 06 00 4D 00 49 00 4C 00 01 .I.L.... .M.I.L.. >[0060] 00 10 00 53 00 52 00 56 00 31 00 54 00 45 00 53 ...S.R.V .1.T.E.S >[0070] 00 54 00 04 00 12 00 6D 00 69 00 6C 00 2E 00 6C .T.....m .i.l...l >[0080] 00 6F 00 63 00 61 00 6C 00 03 00 24 00 73 00 72 .o.c.a.l ...$.s.r >[0090] 00 76 00 31 00 74 00 65 00 73 00 74 00 2E 00 6D .v.1.t.e .s.t...m >[00A0] 00 69 00 6C 00 2E 00 6C 00 6F 00 63 00 61 00 6C .i.l...l .o.c.a.l >[00B0] 00 00 00 00 00 55 00 6E 00 69 00 78 00 00 00 53 .....U.n .i.x...S >[00C0] 00 61 00 6D 00 62 00 61 00 20 00 33 00 2E 00 35 .a.m.b.a . .3...5 >[00D0] 00 2E 00 32 00 00 00 4D 00 49 00 4C 00 00 00 ...2...M .I.L... > &challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x0006 (6) > TargetNameMaxLen : 0x0006 (6) > TargetName : * > TargetName : 'MIL' > NegotiateFlags : 0x60898215 (1619624469) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 1: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : 9277769226bd04c3 > Reserved : 0000000000000000 > TargetInfoLen : 0x0060 (96) > TargetNameInfoMaxLen : 0x0060 (96) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0006 (6) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'MIL' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'SRV1TEST' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0012 (18) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : 'mil.local' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x0024 (36) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'srv1test.mil.local' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >Got challenge flags: >Got NTLMSSP neg_flags=0x60898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP challenge set by NTLM2 >challenge is: >[0000] 6E C2 6F C4 C9 48 C2 4F n.o..H.O > &authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : b74fe2585cbfa26100000000000000000000000000000000 > NtChallengeResponseLen : 0x0018 (24) > NtChallengeResponseMaxLen: 0x0018 (24) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 24) > v1: struct NTLM_RESPONSE > Response : 3fa13959663dff608f86a5e91a2ec301afb6270822060535 > DomainNameLen : 0x0006 (6) > DomainNameMaxLen : 0x0006 (6) > DomainName : * > DomainName : 'MIL' > UserNameLen : 0x0008 (8) > UserNameMaxLen : 0x0008 (8) > UserName : * > UserName : 'root' > WorkstationLen : 0x0010 (16) > WorkstationMaxLen : 0x0010 (16) > Workstation : * > Workstation : 'SRV1TEST' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] 5C DE E8 4B 03 1B 7F FA AD B0 97 F9 29 A6 5C CA \..K.... ....).\. > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >write_socket(5,256) >write_socket(5,256) wrote 256 >got smb length of 94 >size=94 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=3100 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=51 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 32 00 00 00 4D 00 49 00 4C ...5...2 ...M.I.L >[0030] 00 00 00 ... >size=94 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=3100 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=51 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 32 00 00 00 4D 00 49 00 4C ...5...2 ...M.I.L >[0030] 00 00 00 ... >cli_init_creds: user root domain MIL >Bind RPC Pipe: host srv1test auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345778 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000000 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host srv1test >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host srv1test returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000d > 001a str: \PIPE\lsarpc. > 000027 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \lsarpc to machine srv1test and bound anonymously. > lsa_OpenPolicy: struct lsa_OpenPolicy > in: struct lsa_OpenPolicy > system_name : * > system_name : 0x005c (92) > attr : * > attr: struct lsa_ObjectAttribute > len : 0x00000018 (24) > root_dir : NULL > object_name : NULL > attributes : 0x00000000 (0) > sec_desc : NULL > sec_qos : * > sec_qos: struct lsa_QosInfo > len : 0x0000000c (12) > impersonation_level : 0x0002 (2) > context_mode : 0x01 (1) > effective_only : 0x00 (0) > access_mask : 0x02000000 (33554432) > 0: LSA_POLICY_VIEW_LOCAL_INFORMATION > 0: LSA_POLICY_VIEW_AUDIT_INFORMATION > 0: LSA_POLICY_GET_PRIVATE_INFORMATION > 0: LSA_POLICY_TRUST_ADMIN > 0: LSA_POLICY_CREATE_ACCOUNT > 0: LSA_POLICY_CREATE_SECRET > 0: LSA_POLICY_CREATE_PRIVILEGE > 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS > 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS > 0: LSA_POLICY_AUDIT_LOG_ADMIN > 0: LSA_POLICY_SERVER_ADMIN > 0: LSA_POLICY_LOOKUP_NAMES > 0: LSA_POLICY_NOTIFICATION >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 0000002c > 0014 context_id: 0000 > 0016 opnum : 0006 >rpc_api_pipe: host srv1test >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=68, this_data=68, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host srv1test returned 48 bytes. > lsa_OpenPolicy: struct lsa_OpenPolicy > out: struct lsa_OpenPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-724c-fcf11d0c0000 > result : NT_STATUS_OK > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > in: struct lsa_QueryInfoPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-724c-fcf11d0c0000 > level : LSA_POLICY_INFO_ACCOUNT_DOMAIN (5) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002e > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000016 > 0014 context_id: 0000 > 0016 opnum : 0007 >rpc_api_pipe: host srv1test >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=46, this_data=46, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0060 > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000048 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 96, data_len 72, ss_len 0 >rpc_api_pipe: got frag len of 96 at offset 0: NT_STATUS_OK >rpc_api_pipe: host srv1test returned 144 bytes. > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > out: struct lsa_QueryInfoPolicy > info : * > info : * > info : union lsa_PolicyInformation(case 5) > account_domain: struct lsa_DomainInfo > name: struct lsa_StringLarge > length : 0x0006 (6) > size : 0x0008 (8) > string : * > string : 'MIL' > sid : * > sid : S-1-5-21-2482416895-3119323632-2984409325 > result : NT_STATUS_OK > lsa_Close: struct lsa_Close > in: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-724c-fcf11d0c0000 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002c > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000014 > 0014 context_id: 0000 > 0016 opnum : 0000 >rpc_api_pipe: host srv1test >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=44, this_data=44, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host srv1test returned 48 bytes. > lsa_Close: struct lsa_Close > out: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : NT_STATUS_OK >rpc_pipe_destructor: closed \lsarpc >Bind RPC Pipe: host srv1test auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345678 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000001 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host srv1test >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host srv1test returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000e > 001a str: \PIPE\spoolss. > 000028 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \spoolss to machine srv1test and bound anonymously. > spoolss_OpenPrinterEx: struct spoolss_OpenPrinterEx > in: struct spoolss_OpenPrinterEx > printername : * > printername : '\\SRV1TEST\CUPS-PDF' > datatype : NULL > devmode_ctr: struct spoolss_DevmodeContainer > _ndr_size : 0x00000000 (0) > devmode : NULL > access_mask : 0x000f000c (983052) > 0: SERVER_ACCESS_ADMINISTER > 0: SERVER_ACCESS_ENUMERATE > 1: PRINTER_ACCESS_ADMINISTER > 1: PRINTER_ACCESS_USE > 0: JOB_ACCESS_ADMINISTER > 0: JOB_ACCESS_READ > level : 0x00000001 (1) > userlevel : union spoolss_UserLevel(case 1) > level1 : * > level1: struct spoolss_UserLevel1 > size : 0x0000001c (28) > client : * > client : '\\SRV1TEST' > user : * > user : 'root' > build : 0x00000565 (1381) > major : UNKNOWN_ENUM_VALUE (2) > minor : SPOOLSS_MINOR_VERSION_0 (0) > processor : PROCESSOR_ARCHITECTURE_INTEL (0) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 00c2 > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 000000aa > 0014 context_id: 0000 > 0016 opnum : 0045 >rpc_api_pipe: host srv1test >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=194, this_data=194, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host srv1test returned 48 bytes. > spoolss_OpenPrinterEx: struct spoolss_OpenPrinterEx > out: struct spoolss_OpenPrinterEx > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-724c-fcf11d0c0000 > result : WERR_OK > spoolss_GetPrinter: struct spoolss_GetPrinter > in: struct spoolss_GetPrinter > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-724c-fcf11d0c0000 > level : 0x00000002 (2) > buffer : NULL > offered : 0x00000000 (0) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0038 > 000a auth_len : 0000 > 000c call_id : 00000007 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000020 > 0014 context_id: 0000 > 0016 opnum : 0008 >rpc_api_pipe: host srv1test >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=56, this_data=56, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0024 > 000a auth_len : 0000 > 000c call_id : 00000007 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 0000000c > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 36, data_len 12, ss_len 0 >rpc_api_pipe: got frag len of 36 at offset 0: NT_STATUS_OK >rpc_api_pipe: host srv1test returned 24 bytes. > spoolss_GetPrinter: struct spoolss_GetPrinter > out: struct spoolss_GetPrinter > info : NULL > needed : * > needed : 0x000002d8 (728) > result : WERR_INSUFFICIENT_BUFFER > spoolss_GetPrinter: struct spoolss_GetPrinter > in: struct spoolss_GetPrinter > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-724c-fcf11d0c0000 > level : 0x00000002 (2) > buffer : * > buffer : DATA_BLOB length=728 >[0000] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0010] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0020] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0030] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0040] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0050] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0060] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0070] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0080] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0090] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[00A0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[00B0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[00C0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[00D0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[00E0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[00F0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0100] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0110] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0120] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0130] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0140] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0150] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0160] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0170] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0180] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0190] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[01A0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[01B0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[01C0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[01D0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[01E0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[01F0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0200] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0210] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0220] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0230] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0240] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0250] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0260] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0270] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0280] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[0290] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[02A0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[02B0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[02C0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[02D0] 00 00 00 00 00 00 00 00 ........ > offered : 0x000002d8 (728) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0314 > 000a auth_len : 0000 > 000c call_id : 00000008 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 000002fc > 0014 context_id: 0000 > 0016 opnum : 0008 >rpc_api_pipe: host srv1test >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=788, this_data=788, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0300 > 000a auth_len : 0000 > 000c call_id : 00000008 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 000002e8 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 768, data_len 744, ss_len 0 >rpc_api_pipe: got frag len of 768 at offset 0: NT_STATUS_OK >rpc_api_pipe: host srv1test returned 1488 bytes. > spoolss_GetPrinter: struct spoolss_GetPrinter > out: struct spoolss_GetPrinter > info : * > info : union spoolss_PrinterInfo(case 2) > info2: struct spoolss_PrinterInfo2 > servername : * > servername : '\\SRV1TEST' > printername : * > printername : '\\SRV1TEST\Cups-PDF' > sharename : * > sharename : 'Cups-PDF' > portname : * > portname : 'Samba Printer Port' > drivername : * > drivername : '' > comment : * > comment : 'Cups-PDF' > location : * > location : '' > devmode : * > devmode: struct spoolss_DeviceMode > devicename : '\\srv1test\Cups-PDF' > specversion : DMSPEC_NT4_AND_ABOVE (1025) > driverversion : 0x0400 (1024) > size : 0x00dc (220) > __driverextra_length : 0x0000 (0) > fields : 0x00014713 (83731) > 1: DEVMODE_ORIENTATION > 1: DEVMODE_PAPERSIZE > 0: DEVMODE_PAPERLENGTH > 0: DEVMODE_PAPERWIDTH > 1: DEVMODE_SCALE > 0: DEVMODE_POSITION > 0: DEVMODE_NUP > 1: DEVMODE_COPIES > 1: DEVMODE_DEFAULTSOURCE > 1: DEVMODE_PRINTQUALITY > 0: DEVMODE_COLOR > 0: DEVMODE_DUPLEX > 0: DEVMODE_YRESOLUTION > 1: DEVMODE_TTOPTION > 0: DEVMODE_COLLATE > 1: DEVMODE_FORMNAME > 0: DEVMODE_LOGPIXELS > 0: DEVMODE_BITSPERPEL > 0: DEVMODE_PELSWIDTH > 0: DEVMODE_PELSHEIGHT > 0: DEVMODE_DISPLAYFLAGS > 0: DEVMODE_DISPLAYFREQUENCY > 0: DEVMODE_ICMMETHOD > 0: DEVMODE_ICMINTENT > 0: DEVMODE_MEDIATYPE > 0: DEVMODE_DITHERTYPE > 0: DEVMODE_PANNINGWIDTH > 0: DEVMODE_PANNINGHEIGHT > orientation : DMORIENT_PORTRAIT (1) > papersize : DMPAPER_LETTER (1) > paperlength : 0x0000 (0) > paperwidth : 0x0000 (0) > scale : 0x0064 (100) > copies : 0x0001 (1) > defaultsource : DMBIN_FORMSOURCE (15) > printquality : DMRES_HIGH (65532) > color : DMRES_MONOCHROME (1) > duplex : DMDUP_SIMPLEX (1) > yresolution : 0x0000 (0) > ttoption : DMTT_SUBDEV (3) > collate : DMCOLLATE_FALSE (0) > formname : 'Letter' > logpixels : 0x0000 (0) > bitsperpel : 0x00000000 (0) > pelswidth : 0x00000000 (0) > pelsheight : 0x00000000 (0) > displayflags : UNKNOWN_ENUM_VALUE (0) > displayfrequency : 0x00000000 (0) > icmmethod : UNKNOWN_ENUM_VALUE (0) > icmintent : UNKNOWN_ENUM_VALUE (0) > mediatype : UNKNOWN_ENUM_VALUE (0) > dithertype : UNKNOWN_ENUM_VALUE (0) > reserved1 : 0x00000000 (0) > reserved2 : 0x00000000 (0) > panningwidth : 0x00000000 (0) > panningheight : 0x00000000 (0) > driverextra_data : DATA_BLOB length=0 > sepfile : * > sepfile : '' > printprocessor : * > printprocessor : 'winprint' > datatype : * > datatype : 'RAW' > parameters : * > parameters : '' > secdesc : * > secdesc: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x8004 (32772) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 0: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-32-544 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0094 (148) > num_aces : 0x00000005 (5) > aces: ARRAY(5) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x02 (2) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x02: SEC_ACE_FLAG_VALID_INHERIT (2) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x20020008 (537001992) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x09 (9) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x09: SEC_ACE_FLAG_VALID_INHERIT (9) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x100f000c (269418508) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-2482416895-3119323632-2984409325-512 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x02 (2) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x02: SEC_ACE_FLAG_VALID_INHERIT (2) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x100f000c (269418508) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-2482416895-3119323632-2984409325-512 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x09 (9) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x09: SEC_ACE_FLAG_VALID_INHERIT (9) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x100f000c (269418508) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x02 (2) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x02: SEC_ACE_FLAG_VALID_INHERIT (2) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x100f000c (269418508) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > attributes : 0x00001048 (4168) > 0: PRINTER_ATTRIBUTE_QUEUED > 0: PRINTER_ATTRIBUTE_DIRECT > 0: PRINTER_ATTRIBUTE_DEFAULT > 1: PRINTER_ATTRIBUTE_SHARED > 0: PRINTER_ATTRIBUTE_NETWORK > 0: PRINTER_ATTRIBUTE_HIDDEN > 1: PRINTER_ATTRIBUTE_LOCAL > 0: PRINTER_ATTRIBUTE_ENABLE_DEVQ > 0: PRINTER_ATTRIBUTE_KEEPPRINTEDJOBS > 0: PRINTER_ATTRIBUTE_DO_COMPLETE_FIRST > 0: PRINTER_ATTRIBUTE_WORK_OFFLINE > 0: PRINTER_ATTRIBUTE_ENABLE_BIDI > 1: PRINTER_ATTRIBUTE_RAW_ONLY > 0: PRINTER_ATTRIBUTE_PUBLISHED > 0: PRINTER_ATTRIBUTE_FAX > 0: PRINTER_ATTRIBUTE_TS > priority : 0x00000001 (1) > defaultpriority : 0x00000001 (1) > starttime : 0x00000000 (0) > untiltime : 0x00000000 (0) > status : 0x00000000 (0) > 0: PRINTER_STATUS_PAUSED > 0: PRINTER_STATUS_ERROR > 0: PRINTER_STATUS_PENDING_DELETION > 0: PRINTER_STATUS_PAPER_JAM > 0: PRINTER_STATUS_PAPER_OUT > 0: PRINTER_STATUS_MANUAL_FEED > 0: PRINTER_STATUS_PAPER_PROBLEM > 0: PRINTER_STATUS_OFFLINE > 0: PRINTER_STATUS_IO_ACTIVE > 0: PRINTER_STATUS_BUSY > 0: PRINTER_STATUS_PRINTING > 0: PRINTER_STATUS_OUTPUT_BIN_FULL > 0: PRINTER_STATUS_NOT_AVAILABLE > 0: PRINTER_STATUS_WAITING > 0: PRINTER_STATUS_PROCESSING > 0: PRINTER_STATUS_INITIALIZING > 0: PRINTER_STATUS_WARMING_UP > 0: PRINTER_STATUS_TONER_LOW > 0: PRINTER_STATUS_NO_TONER > 0: PRINTER_STATUS_PAGE_PUNT > 0: PRINTER_STATUS_USER_INTERVENTION > 0: PRINTER_STATUS_OUT_OF_MEMORY > 0: PRINTER_STATUS_DOOR_OPEN > 0: PRINTER_STATUS_SERVER_UNKNOWN > 0: PRINTER_STATUS_POWER_SAVE > cjobs : 0x00000000 (0) > averageppm : 0x00000000 (0) > needed : * > needed : 0x000002d8 (728) > result : WERR_OK > spoolss_SetPrinter: struct spoolss_SetPrinter > in: struct spoolss_SetPrinter > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-724c-fcf11d0c0000 > info_ctr : * > info_ctr: struct spoolss_SetPrinterInfoCtr > level : 0x00000002 (2) > info : union spoolss_SetPrinterInfo(case 2) > info2 : * > info2: struct spoolss_SetPrinterInfo2 > servername : * > servername : '\\SRV1TEST' > printername : * > printername : '\\SRV1TEST\Cups-PDF' > sharename : * > sharename : 'Cups-PDF' > portname : * > portname : 'Samba Printer Port' > drivername : * > drivername : 'mspubprtc' > comment : * > comment : 'Cups-PDF' > location : * > location : '' > devmode_ptr : 0x00000000 (0) > sepfile : * > sepfile : '' > printprocessor : * > printprocessor : 'winprint' > datatype : * > datatype : 'RAW' > parameters : * > parameters : '' > secdesc_ptr : 0x00000000 (0) > attributes : 0x00000000 (0) > 0: PRINTER_ATTRIBUTE_QUEUED > 0: PRINTER_ATTRIBUTE_DIRECT > 0: PRINTER_ATTRIBUTE_DEFAULT > 0: PRINTER_ATTRIBUTE_SHARED > 0: PRINTER_ATTRIBUTE_NETWORK > 0: PRINTER_ATTRIBUTE_HIDDEN > 0: PRINTER_ATTRIBUTE_LOCAL > 0: PRINTER_ATTRIBUTE_ENABLE_DEVQ > 0: PRINTER_ATTRIBUTE_KEEPPRINTEDJOBS > 0: PRINTER_ATTRIBUTE_DO_COMPLETE_FIRST > 0: PRINTER_ATTRIBUTE_WORK_OFFLINE > 0: PRINTER_ATTRIBUTE_ENABLE_BIDI > 0: PRINTER_ATTRIBUTE_RAW_ONLY > 0: PRINTER_ATTRIBUTE_PUBLISHED > 0: PRINTER_ATTRIBUTE_FAX > 0: PRINTER_ATTRIBUTE_TS > priority : 0x00001048 (4168) > defaultpriority : 0x00000001 (1) > starttime : 0x00000001 (1) > untiltime : 0x00000000 (0) > status : 0x00000000 (0) > 0: PRINTER_STATUS_PAUSED > 0: PRINTER_STATUS_ERROR > 0: PRINTER_STATUS_PENDING_DELETION > 0: PRINTER_STATUS_PAPER_JAM > 0: PRINTER_STATUS_PAPER_OUT > 0: PRINTER_STATUS_MANUAL_FEED > 0: PRINTER_STATUS_PAPER_PROBLEM > 0: PRINTER_STATUS_OFFLINE > 0: PRINTER_STATUS_IO_ACTIVE > 0: PRINTER_STATUS_BUSY > 0: PRINTER_STATUS_PRINTING > 0: PRINTER_STATUS_OUTPUT_BIN_FULL > 0: PRINTER_STATUS_NOT_AVAILABLE > 0: PRINTER_STATUS_WAITING > 0: PRINTER_STATUS_PROCESSING > 0: PRINTER_STATUS_INITIALIZING > 0: PRINTER_STATUS_WARMING_UP > 0: PRINTER_STATUS_TONER_LOW > 0: PRINTER_STATUS_NO_TONER > 0: PRINTER_STATUS_PAGE_PUNT > 0: PRINTER_STATUS_USER_INTERVENTION > 0: PRINTER_STATUS_OUT_OF_MEMORY > 0: PRINTER_STATUS_DOOR_OPEN > 0: PRINTER_STATUS_SERVER_UNKNOWN > 0: PRINTER_STATUS_POWER_SAVE > cjobs : 0x00000000 (0) > averageppm : 0x00000000 (0) > devmode_ctr : * > devmode_ctr: struct spoolss_DevmodeContainer > _ndr_size : 0x00000000 (0) > devmode : NULL > secdesc_ctr : * > secdesc_ctr: struct sec_desc_buf > sd_size : 0x00000000 (0) > sd : NULL > command : SPOOLSS_PRINTER_CONTROL_UNPAUSE (0) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 01f0 > 000a auth_len : 0000 > 000c call_id : 00000009 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 000001d8 > 0014 context_id: 0000 > 0016 opnum : 0007 >rpc_api_pipe: host srv1test >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=496, this_data=496, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 03 > 0003 flags : 23 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0020 > 000a auth_len : 0000 > 000c call_id : 00000009 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000000 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >000018 smb_io_rpc_hdr_fault fault > 0018 status : DCERPC_FAULT_OP_RNG_ERROR > 001c reserved: 00000000 >cli_pipe_validate_current_pdu: RPC fault code DCERPC_FAULT_OP_RNG_ERROR received from host srv1test! >rpc_api_pipe: got frag len of 32 at offset 0: NT code 0x1c010002 >Successfully set Cups-PDF to driver mspubprtc. > spoolss_ClosePrinter: struct spoolss_ClosePrinter > in: struct spoolss_ClosePrinter > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-724c-fcf11d0c0000 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002c > 000a auth_len : 0000 > 000c call_id : 0000000a >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000014 > 0014 context_id: 0000 > 0016 opnum : 001d >rpc_api_pipe: host srv1test >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=44, this_data=44, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 03 > 0003 flags : 23 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0020 > 000a auth_len : 0000 > 000c call_id : 0000000a >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000000 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >000018 smb_io_rpc_hdr_fault fault > 0018 status : DCERPC_FAULT_OP_RNG_ERROR > 001c reserved: 00000000 >cli_pipe_validate_current_pdu: RPC fault code DCERPC_FAULT_OP_RNG_ERROR received from host srv1test! >rpc_api_pipe: got frag len of 32 at offset 0: NT code 0x1c010002 >rpc_pipe_destructor: closed \spoolss >write_socket(5,39) >write_socket(5,39) wrote 39 >got smb length of 35 >size=35 >smb_com=0x71 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=1 >smb_pid=3100 >smb_uid=100 >smb_mid=19 >smt_wct=0 >smb_bcc=0
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 7643
: 5919