The Samba-Bugzilla – Attachment 6206 Details for
Bug 7641
cupsaddsmb loops endlessly and throws WERR_INVALID_PARAM
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
out.log
out.log (text/plain), 322.18 KB, created by
Domen Kožar
on 2011-01-15 11:37:32 UTC
(
hide
)
Description:
out.log
Filename:
MIME Type:
Creator:
Domen Kožar
Created:
2011-01-15 11:37:32 UTC
Size:
322.18 KB
patch
obsolete
>Running command: smbclient //localhost/print$ -N -A /tmp/4d31db0fc8a2e -c 'mkdir W32X86;put /tmp/4d31db0d3bfb7 W32X86/HP4L.ppd;put /usr/share/cups/drivers/ps5ui.dll W32X86/ps5ui.dll;put /usr/share/cups/drivers/pscript.hlp W32X86/pscript.hlp;put /usr/share/cups/drivers/pscript.ntf W32X86/pscript.ntf;put /usr/share/cups/drivers/pscript5.dll W32X86/pscript5.dll' >Domain=[MSHOME] OS=[Unix] Server=[Samba 3.5.6] >putting file /tmp/4d31db0d3bfb7 as \W32X86/HP4L.ppd (1871.4 kb/s) (average 1871.4 kb/s) >putting file /usr/share/cups/drivers/ps5ui.dll as \W32X86/ps5ui.dll (12599.9 kb/s) (average 7518.0 kb/s) >putting file /usr/share/cups/drivers/pscript.hlp as \W32X86/pscript.hlp (2825.3 kb/s) (average 6009.7 kb/s) >putting file /usr/share/cups/drivers/pscript.ntf as \W32X86/pscript.ntf (25802.1 kb/s) (average 16247.2 kb/s) >putting file /usr/share/cups/drivers/pscript5.dll as \W32X86/pscript5.dll (22224.9 kb/s) (average 17780.0 kb/s) >NT_STATUS_OBJECT_NAME_COLLISION making remote directory \W32X86 > >Running command: smbclient //localhost/print$ -N -A /tmp/4d31db0fc8a2e -c 'put /usr/share/cups/drivers/cups6.ini W32X86/cups6.ini;put /usr/share/cups/drivers/cupsps6.dll W32X86/cupsps6.dll;put /usr/share/cups/drivers/cupsui6.dll W32X86/cupsui6.dll' >Domain=[MSHOME] OS=[Unix] Server=[Samba 3.5.6] >putting file /usr/share/cups/drivers/cups6.ini as \W32X86/cups6.ini (7.8 kb/s) (average 7.8 kb/s) >putting file /usr/share/cups/drivers/cupsps6.dll as \W32X86/cupsps6.dll (1363.7 kb/s) (average 685.8 kb/s) >putting file /usr/share/cups/drivers/cupsui6.dll as \W32X86/cupsui6.dll (1483.5 kb/s) (average 951.7 kb/s) > >Running command: rpcclient localhost -N -A /tmp/4d31db0fc8a2e -c 'adddriver "Windows NT x86" "HP4L:pscript5.dll:HP4L.ppd:ps5ui.dll:pscript.hlp:NULL:RAW:pscript5.dll,HP4L.ppd,ps5ui.dll,pscript.hlp,pscript.ntf,cups6.ini,cupsps6.dll,cupsui6.dll"' >INFO: Current debug levels: > all: True/10 > tdb: False/0 > printdrivers: False/0 > lanman: False/0 > smb: False/0 > rpc_parse: False/0 > rpc_srv: False/0 > rpc_cli: False/0 > passdb: False/0 > sam: False/0 > auth: False/0 > winbind: False/0 > vfs: False/0 > idmap: False/0 > quota: False/0 > acls: False/0 > locking: False/0 > msdfs: False/0 > dmapi: False/0 > registry: False/0 >doing parameter dos charset = 850 >Attempting to register new charset UCS-2LE >Registered charset UCS-2LE >Attempting to register new charset UTF-16LE >Registered charset UTF-16LE >Attempting to register new charset UCS-2BE >Registered charset UCS-2BE >Attempting to register new charset UTF-16BE >Registered charset UTF-16BE >Attempting to register new charset UTF8 >Registered charset UTF8 >Attempting to register new charset UTF-8 >Registered charset UTF-8 >Attempting to register new charset ASCII >Registered charset ASCII >Attempting to register new charset 646 >Registered charset 646 >Attempting to register new charset ISO-8859-1 >Registered charset ISO-8859-1 >Attempting to register new charset UCS2-HEX >Registered charset UCS2-HEX >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >doing parameter unix charset = UTF-8 >doing parameter display charset = UTF-8 >doing parameter encrypt passwords = yes >doing parameter dns proxy = no >doing parameter create mask = 0777 >doing parameter directory mask = 0777 >doing parameter force user = samba >doing parameter force group = samba >pm_process() returned Yes >lp_servicenumber: couldn't find homes >set_server_role: role = ROLE_STANDALONE >Connecting to host=localhost >Opening cache file at /var/cache/samba/gencache.tdb >Opening cache file at /var/cache/samba/gencache_notrans.tdb >Cache entry with key = AD_SITENAME/DOMAIN/ couldn't be found >sitename_fetch: No stored sitename for >internal_resolve_name: looking up localhost#20 (sitename (null)) >Returning valid cache entry: key = NBT/LOCALHOST#20, value = 127.0.0.1:0, timeout = Sat Jan 15 18:47:15 2011 >name localhost#20 found. >Running timed event "tevent_req_timedout" 0xb78eac50 >Connecting to 127.0.0.1 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 50388 > SO_RCVBUF = 87616 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >Doing spnego session setup (blob length=58) >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=NONE > &negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0006 (6) > DomainNameMaxLen : 0x0006 (6) > DomainName : * > DomainName : 'MSHOME' > WorkstationLen : 0x000e (14) > WorkstationMaxLen : 0x000e (14) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' >write_socket(5,172) >write_socket(5,172) wrote 172 >got smb length of 284 >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20184 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 AD A8 47 D8 C9 A1 80 F2 00 ......`. .G...... >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20184 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 AD A8 47 D8 C9 A1 80 F2 00 ......`. .G...... >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . > &challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x001c (28) > TargetNameMaxLen : 0x001c (28) > TargetName : * > TargetName : 'LIPUS.FUBAR.SI' > NegotiateFlags : 0x608a8215 (1619690005) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : ada847d8c9a180f2 > Reserved : 0000000000000000 > TargetInfoLen : 0x0056 (86) > TargetNameInfoMaxLen : 0x0056 (86) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x000a (10) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'lipus' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >Got challenge flags: >Got NTLMSSP neg_flags=0x608a8215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP challenge set by NTLM2 >challenge is: >[0000] 59 67 7F 4C 2F AE 93 73 Yg.L/..s > &authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : 37432e885cf12c8700000000000000000000000000000000 > NtChallengeResponseLen : 0x0018 (24) > NtChallengeResponseMaxLen: 0x0018 (24) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 24) > v1: struct NTLM_RESPONSE > Response : 30a5af1cc482f3044f937771b49662e0fce97bbfa97f60d1 > DomainNameLen : 0x000c (12) > DomainNameMaxLen : 0x000c (12) > DomainName : * > DomainName : 'MSHOME' > UserNameLen : 0x000a (10) > UserNameMaxLen : 0x000a (10) > UserName : * > UserName : 'samba' > WorkstationLen : 0x001c (28) > WorkstationMaxLen : 0x001c (28) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] 0B 2A EF CA 4A E9 98 33 29 F9 AC 8C A3 9E CC 0D .*..J..3 )....... > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >write_socket(5,276) >write_socket(5,276) wrote 276 >got smb length of 100 >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20184 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20184 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >cli_init_creds: user samba domain MSHOME >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345778 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000000 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000d > 001a str: \PIPE\lsarpc. > 000027 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \lsarpc to machine localhost and bound anonymously. > lsa_OpenPolicy: struct lsa_OpenPolicy > in: struct lsa_OpenPolicy > system_name : * > system_name : 0x005c (92) > attr : * > attr: struct lsa_ObjectAttribute > len : 0x00000018 (24) > root_dir : NULL > object_name : NULL > attributes : 0x00000000 (0) > sec_desc : NULL > sec_qos : * > sec_qos: struct lsa_QosInfo > len : 0x0000000c (12) > impersonation_level : 0x0002 (2) > context_mode : 0x01 (1) > effective_only : 0x00 (0) > access_mask : 0x02000000 (33554432) > 0: LSA_POLICY_VIEW_LOCAL_INFORMATION > 0: LSA_POLICY_VIEW_AUDIT_INFORMATION > 0: LSA_POLICY_GET_PRIVATE_INFORMATION > 0: LSA_POLICY_TRUST_ADMIN > 0: LSA_POLICY_CREATE_ACCOUNT > 0: LSA_POLICY_CREATE_SECRET > 0: LSA_POLICY_CREATE_PRIVILEGE > 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS > 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS > 0: LSA_POLICY_AUDIT_LOG_ADMIN > 0: LSA_POLICY_SERVER_ADMIN > 0: LSA_POLICY_LOOKUP_NAMES > 0: LSA_POLICY_NOTIFICATION >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 0000002c > 0014 context_id: 0000 > 0016 opnum : 0006 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=68, this_data=68, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_OpenPolicy: struct lsa_OpenPolicy > out: struct lsa_OpenPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-10dbd94e0000 > result : NT_STATUS_OK > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > in: struct lsa_QueryInfoPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-10dbd94e0000 > level : LSA_POLICY_INFO_ACCOUNT_DOMAIN (5) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002e > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000016 > 0014 context_id: 0000 > 0016 opnum : 0007 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=46, this_data=46, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0074 > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 0000005c > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 116, data_len 92, ss_len 0 >rpc_api_pipe: got frag len of 116 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 184 bytes. > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > out: struct lsa_QueryInfoPolicy > info : * > info : * > info : union lsa_PolicyInformation(case 5) > account_domain: struct lsa_DomainInfo > name: struct lsa_StringLarge > length : 0x001c (28) > size : 0x001e (30) > string : * > string : 'LIPUS.FUBAR.SI' > sid : * > sid : S-1-5-21-1215170701-1004161298-3654541485 > result : NT_STATUS_OK > lsa_Close: struct lsa_Close > in: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-10dbd94e0000 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002c > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000014 > 0014 context_id: 0000 > 0016 opnum : 0000 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=44, this_data=44, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_Close: struct lsa_Close > out: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : NT_STATUS_OK >rpc_pipe_destructor: closed \lsarpc >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345678 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000001 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000e > 001a str: \PIPE\spoolss. > 000028 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \spoolss to machine localhost and bound anonymously. > spoolss_AddPrinterDriver: struct spoolss_AddPrinterDriver > in: struct spoolss_AddPrinterDriver > servername : * > servername : '\\LOCALHOST' > info_ctr : * > info_ctr: struct spoolss_AddDriverInfoCtr > level : 0x00000003 (3) > info : union spoolss_AddDriverInfo(case 3) > info3 : * > info3: struct spoolss_AddDriverInfo3 > version : SPOOLSS_DRIVER_VERSION_NT4 (2) > driver_name : * > driver_name : 'HP4L' > architecture : * > architecture : 'Windows NT x86' > driver_path : * > driver_path : 'pscript5.dll' > data_file : * > data_file : 'HP4L.ppd' > config_file : * > config_file : 'ps5ui.dll' > help_file : * > help_file : 'pscript.hlp' > monitor_name : NULL > default_datatype : * > default_datatype : 'RAW' > _ndr_size_dependent_files: 0x00000000 (0) > dependent_files : * > dependent_files: struct spoolss_StringArray > _ndr_size : 0x00000000 (0) > string: ARRAY(8) > [0] : 'pscript5.dll' > [1] : 'HP4L.ppd' > [2] : 'ps5ui.dll' > [3] : 'pscript.hlp' > [4] : 'pscript.ntf' > [5] : 'cups6.ini' > [6] : 'cupsps6.dll' > [7] : 'cupsui6.dll' >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0216 > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 000001fe > 0014 context_id: 0000 > 0016 opnum : 0009 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=534, this_data=534, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 001c > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000004 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 28, data_len 4, ss_len 0 >rpc_api_pipe: got frag len of 28 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 8 bytes. > spoolss_AddPrinterDriver: struct spoolss_AddPrinterDriver > out: struct spoolss_AddPrinterDriver > result : WERR_OK >Printer Driver HP4L successfully installed. >rpc_pipe_destructor: closed \spoolss >write_socket(5,39) >write_socket(5,39) wrote 39 >got smb length of 35 >size=35 >smb_com=0x71 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=1 >smb_pid=20184 >smb_uid=100 >smb_mid=15 >smt_wct=0 >smb_bcc=0 > >Running command: smbclient //localhost/print$ -N -A /tmp/4d31db0fc8a2e -c 'mkdir WIN40;put /tmp/4d31db0d3bfb7 WIN40/HP4L.PPD;put /usr/share/cups/drivers/ADFONTS.MFM WIN40/ADFONTS.MFM;put /usr/share/cups/drivers/ADOBEPS4.DRV WIN40/ADOBEPS4.DRV;put /usr/share/cups/drivers/ADOBEPS4.HLP WIN40/ADOBEPS4.HLP;put /usr/share/cups/drivers/ICONLIB.DLL WIN40/ICONLIB.DLL;put /usr/share/cups/drivers/PSMON.DLL WIN40/PSMON.DLL;' >Domain=[MSHOME] OS=[Unix] Server=[Samba 3.5.6] >putting file /tmp/4d31db0d3bfb7 as \WIN40/HP4L.PPD (1871.4 kb/s) (average 1871.4 kb/s) >putting file /usr/share/cups/drivers/ADFONTS.MFM as \WIN40/ADFONTS.MFM (23420.0 kb/s) (average 17543.2 kb/s) >putting file /usr/share/cups/drivers/ADOBEPS4.DRV as \WIN40/ADOBEPS4.DRV (30865.0 kb/s) (average 24924.3 kb/s) >putting file /usr/share/cups/drivers/ADOBEPS4.HLP as \WIN40/ADOBEPS4.HLP (14758.0 kb/s) (average 23405.2 kb/s) >putting file /usr/share/cups/drivers/ICONLIB.DLL as \WIN40/ICONLIB.DLL (11535.8 kb/s) (average 22181.5 kb/s) >putting file /usr/share/cups/drivers/PSMON.DLL as \WIN40/PSMON.DLL (6222.2 kb/s) (average 20826.5 kb/s) >NT_STATUS_OBJECT_NAME_COLLISION making remote directory \WIN40 > >Running command: rpcclient localhost -N -A /tmp/4d31db0fc8a2e -c 'adddriver "Windows 4.0" "HP4L:ADOBEPS4.DRV:HP4L.PPD:NULL:ADOBEPS4.HLP:PSMON.DLL:RAW:ADOBEPS4.DRV,HP4L.PPD,ADOBEPS4.HLP,PSMON.DLL,ADFONTS.MFM,ICONLIB.DLL"' >INFO: Current debug levels: > all: True/10 > tdb: False/0 > printdrivers: False/0 > lanman: False/0 > smb: False/0 > rpc_parse: False/0 > rpc_srv: False/0 > rpc_cli: False/0 > passdb: False/0 > sam: False/0 > auth: False/0 > winbind: False/0 > vfs: False/0 > idmap: False/0 > quota: False/0 > acls: False/0 > locking: False/0 > msdfs: False/0 > dmapi: False/0 > registry: False/0 >doing parameter dos charset = 850 >Attempting to register new charset UCS-2LE >Registered charset UCS-2LE >Attempting to register new charset UTF-16LE >Registered charset UTF-16LE >Attempting to register new charset UCS-2BE >Registered charset UCS-2BE >Attempting to register new charset UTF-16BE >Registered charset UTF-16BE >Attempting to register new charset UTF8 >Registered charset UTF8 >Attempting to register new charset UTF-8 >Registered charset UTF-8 >Attempting to register new charset ASCII >Registered charset ASCII >Attempting to register new charset 646 >Registered charset 646 >Attempting to register new charset ISO-8859-1 >Registered charset ISO-8859-1 >Attempting to register new charset UCS2-HEX >Registered charset UCS2-HEX >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >doing parameter unix charset = UTF-8 >doing parameter display charset = UTF-8 >doing parameter encrypt passwords = yes >doing parameter dns proxy = no >doing parameter create mask = 0777 >doing parameter directory mask = 0777 >doing parameter force user = samba >doing parameter force group = samba >pm_process() returned Yes >lp_servicenumber: couldn't find homes >set_server_role: role = ROLE_STANDALONE >Connecting to host=localhost >Opening cache file at /var/cache/samba/gencache.tdb >Opening cache file at /var/cache/samba/gencache_notrans.tdb >Cache entry with key = AD_SITENAME/DOMAIN/ couldn't be found >sitename_fetch: No stored sitename for >internal_resolve_name: looking up localhost#20 (sitename (null)) >Returning valid cache entry: key = NBT/LOCALHOST#20, value = 127.0.0.1:0, timeout = Sat Jan 15 18:47:15 2011 >name localhost#20 found. >Running timed event "tevent_req_timedout" 0xb781ac50 >Connecting to 127.0.0.1 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 50388 > SO_RCVBUF = 87616 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >Doing spnego session setup (blob length=58) >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=NONE > &negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0006 (6) > DomainNameMaxLen : 0x0006 (6) > DomainName : * > DomainName : 'MSHOME' > WorkstationLen : 0x000e (14) > WorkstationMaxLen : 0x000e (14) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' >write_socket(5,172) >write_socket(5,172) wrote 172 >got smb length of 284 >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20188 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 DA 7B BC EB BF 3C 80 35 00 ......`. {...<.5. >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20188 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 DA 7B BC EB BF 3C 80 35 00 ......`. {...<.5. >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . > &challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x001c (28) > TargetNameMaxLen : 0x001c (28) > TargetName : * > TargetName : 'LIPUS.FUBAR.SI' > NegotiateFlags : 0x608a8215 (1619690005) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : da7bbcebbf3c8035 > Reserved : 0000000000000000 > TargetInfoLen : 0x0056 (86) > TargetNameInfoMaxLen : 0x0056 (86) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x000a (10) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'lipus' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >Got challenge flags: >Got NTLMSSP neg_flags=0x608a8215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP challenge set by NTLM2 >challenge is: >[0000] BA 0F 45 A8 B1 E9 89 11 ..E..... > &authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : d8e083fb694fe68700000000000000000000000000000000 > NtChallengeResponseLen : 0x0018 (24) > NtChallengeResponseMaxLen: 0x0018 (24) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 24) > v1: struct NTLM_RESPONSE > Response : 8ede207d0b32828b1dfe78836f66a633662f600c2acf9c12 > DomainNameLen : 0x000c (12) > DomainNameMaxLen : 0x000c (12) > DomainName : * > DomainName : 'MSHOME' > UserNameLen : 0x000a (10) > UserNameMaxLen : 0x000a (10) > UserName : * > UserName : 'samba' > WorkstationLen : 0x001c (28) > WorkstationMaxLen : 0x001c (28) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] 77 7D 57 05 2A 60 93 8D 5A 74 26 66 F5 49 31 59 w}W.*`.. Zt&f.I1Y > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >write_socket(5,276) >write_socket(5,276) wrote 276 >got smb length of 100 >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20188 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20188 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >cli_init_creds: user samba domain MSHOME >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345778 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000000 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000d > 001a str: \PIPE\lsarpc. > 000027 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \lsarpc to machine localhost and bound anonymously. > lsa_OpenPolicy: struct lsa_OpenPolicy > in: struct lsa_OpenPolicy > system_name : * > system_name : 0x005c (92) > attr : * > attr: struct lsa_ObjectAttribute > len : 0x00000018 (24) > root_dir : NULL > object_name : NULL > attributes : 0x00000000 (0) > sec_desc : NULL > sec_qos : * > sec_qos: struct lsa_QosInfo > len : 0x0000000c (12) > impersonation_level : 0x0002 (2) > context_mode : 0x01 (1) > effective_only : 0x00 (0) > access_mask : 0x02000000 (33554432) > 0: LSA_POLICY_VIEW_LOCAL_INFORMATION > 0: LSA_POLICY_VIEW_AUDIT_INFORMATION > 0: LSA_POLICY_GET_PRIVATE_INFORMATION > 0: LSA_POLICY_TRUST_ADMIN > 0: LSA_POLICY_CREATE_ACCOUNT > 0: LSA_POLICY_CREATE_SECRET > 0: LSA_POLICY_CREATE_PRIVILEGE > 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS > 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS > 0: LSA_POLICY_AUDIT_LOG_ADMIN > 0: LSA_POLICY_SERVER_ADMIN > 0: LSA_POLICY_LOOKUP_NAMES > 0: LSA_POLICY_NOTIFICATION >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 0000002c > 0014 context_id: 0000 > 0016 opnum : 0006 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=68, this_data=68, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_OpenPolicy: struct lsa_OpenPolicy > out: struct lsa_OpenPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-11dbdd4e0000 > result : NT_STATUS_OK > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > in: struct lsa_QueryInfoPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-11dbdd4e0000 > level : LSA_POLICY_INFO_ACCOUNT_DOMAIN (5) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002e > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000016 > 0014 context_id: 0000 > 0016 opnum : 0007 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=46, this_data=46, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0074 > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 0000005c > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 116, data_len 92, ss_len 0 >rpc_api_pipe: got frag len of 116 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 184 bytes. > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > out: struct lsa_QueryInfoPolicy > info : * > info : * > info : union lsa_PolicyInformation(case 5) > account_domain: struct lsa_DomainInfo > name: struct lsa_StringLarge > length : 0x001c (28) > size : 0x001e (30) > string : * > string : 'LIPUS.FUBAR.SI' > sid : * > sid : S-1-5-21-1215170701-1004161298-3654541485 > result : NT_STATUS_OK > lsa_Close: struct lsa_Close > in: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-11dbdd4e0000 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002c > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000014 > 0014 context_id: 0000 > 0016 opnum : 0000 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=44, this_data=44, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_Close: struct lsa_Close > out: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : NT_STATUS_OK >rpc_pipe_destructor: closed \lsarpc >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345678 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000001 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000e > 001a str: \PIPE\spoolss. > 000028 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \spoolss to machine localhost and bound anonymously. > spoolss_AddPrinterDriver: struct spoolss_AddPrinterDriver > in: struct spoolss_AddPrinterDriver > servername : * > servername : '\\LOCALHOST' > info_ctr : * > info_ctr: struct spoolss_AddDriverInfoCtr > level : 0x00000003 (3) > info : union spoolss_AddDriverInfo(case 3) > info3 : * > info3: struct spoolss_AddDriverInfo3 > version : SPOOLSS_DRIVER_VERSION_9X (0) > driver_name : * > driver_name : 'HP4L' > architecture : * > architecture : 'Windows 4.0' > driver_path : * > driver_path : 'ADOBEPS4.DRV' > data_file : * > data_file : 'HP4L.PPD' > config_file : NULL > help_file : * > help_file : 'ADOBEPS4.HLP' > monitor_name : * > monitor_name : 'PSMON.DLL' > default_datatype : * > default_datatype : 'RAW' > _ndr_size_dependent_files: 0x00000000 (0) > dependent_files : * > dependent_files: struct spoolss_StringArray > _ndr_size : 0x00000000 (0) > string: ARRAY(6) > [0] : 'ADOBEPS4.DRV' > [1] : 'HP4L.PPD' > [2] : 'ADOBEPS4.HLP' > [3] : 'PSMON.DLL' > [4] : 'ADFONTS.MFM' > [5] : 'ICONLIB.DLL' >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 01e8 > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 000001d0 > 0014 context_id: 0000 > 0016 opnum : 0009 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=488, this_data=488, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 001c > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000004 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 28, data_len 4, ss_len 0 >rpc_api_pipe: got frag len of 28 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 8 bytes. > spoolss_AddPrinterDriver: struct spoolss_AddPrinterDriver > out: struct spoolss_AddPrinterDriver > result : WERR_OK >Printer Driver HP4L successfully installed. >rpc_pipe_destructor: closed \spoolss >write_socket(5,39) >write_socket(5,39) wrote 39 >got smb length of 35 >size=35 >smb_com=0x71 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=1 >smb_pid=20188 >smb_uid=100 >smb_mid=15 >smt_wct=0 >smb_bcc=0 > >Running command: rpcclient localhost -N -A /tmp/4d31db0fc8a2e -c 'setdriver HP4L HP4L' >INFO: Current debug levels: > all: True/10 > tdb: False/0 > printdrivers: False/0 > lanman: False/0 > smb: False/0 > rpc_parse: False/0 > rpc_srv: False/0 > rpc_cli: False/0 > passdb: False/0 > sam: False/0 > auth: False/0 > winbind: False/0 > vfs: False/0 > idmap: False/0 > quota: False/0 > acls: False/0 > locking: False/0 > msdfs: False/0 > dmapi: False/0 > registry: False/0 >doing parameter dos charset = 850 >Attempting to register new charset UCS-2LE >Registered charset UCS-2LE >Attempting to register new charset UTF-16LE >Registered charset UTF-16LE >Attempting to register new charset UCS-2BE >Registered charset UCS-2BE >Attempting to register new charset UTF-16BE >Registered charset UTF-16BE >Attempting to register new charset UTF8 >Registered charset UTF8 >Attempting to register new charset UTF-8 >Registered charset UTF-8 >Attempting to register new charset ASCII >Registered charset ASCII >Attempting to register new charset 646 >Registered charset 646 >Attempting to register new charset ISO-8859-1 >Registered charset ISO-8859-1 >Attempting to register new charset UCS2-HEX >Registered charset UCS2-HEX >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >doing parameter unix charset = UTF-8 >doing parameter display charset = UTF-8 >doing parameter encrypt passwords = yes >doing parameter dns proxy = no >doing parameter create mask = 0777 >doing parameter directory mask = 0777 >doing parameter force user = samba >doing parameter force group = samba >pm_process() returned Yes >lp_servicenumber: couldn't find homes >set_server_role: role = ROLE_STANDALONE >Connecting to host=localhost >Opening cache file at /var/cache/samba/gencache.tdb >Opening cache file at /var/cache/samba/gencache_notrans.tdb >Cache entry with key = AD_SITENAME/DOMAIN/ couldn't be found >sitename_fetch: No stored sitename for >internal_resolve_name: looking up localhost#20 (sitename (null)) >Returning valid cache entry: key = NBT/LOCALHOST#20, value = 127.0.0.1:0, timeout = Sat Jan 15 18:47:15 2011 >name localhost#20 found. >Running timed event "tevent_req_timedout" 0xb781ec50 >Connecting to 127.0.0.1 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 50388 > SO_RCVBUF = 87616 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >Doing spnego session setup (blob length=58) >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=NONE > &negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0006 (6) > DomainNameMaxLen : 0x0006 (6) > DomainName : * > DomainName : 'MSHOME' > WorkstationLen : 0x000e (14) > WorkstationMaxLen : 0x000e (14) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' >write_socket(5,172) >write_socket(5,172) wrote 172 >got smb length of 284 >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20190 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 52 DE AD B5 35 16 37 0A 00 ......`R ...5.7.. >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20190 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 52 DE AD B5 35 16 37 0A 00 ......`R ...5.7.. >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . > &challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x001c (28) > TargetNameMaxLen : 0x001c (28) > TargetName : * > TargetName : 'LIPUS.FUBAR.SI' > NegotiateFlags : 0x608a8215 (1619690005) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : 52deadb53516370a > Reserved : 0000000000000000 > TargetInfoLen : 0x0056 (86) > TargetNameInfoMaxLen : 0x0056 (86) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x000a (10) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'lipus' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >Got challenge flags: >Got NTLMSSP neg_flags=0x608a8215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP challenge set by NTLM2 >challenge is: >[0000] 98 8E 4A BF 8F 15 BB 25 ..J....% > &authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : f3e89a80e0171a1600000000000000000000000000000000 > NtChallengeResponseLen : 0x0018 (24) > NtChallengeResponseMaxLen: 0x0018 (24) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 24) > v1: struct NTLM_RESPONSE > Response : 4b799b4eb6381fe45f1e837f82de2e0922e39009deae1f63 > DomainNameLen : 0x000c (12) > DomainNameMaxLen : 0x000c (12) > DomainName : * > DomainName : 'MSHOME' > UserNameLen : 0x000a (10) > UserNameMaxLen : 0x000a (10) > UserName : * > UserName : 'samba' > WorkstationLen : 0x001c (28) > WorkstationMaxLen : 0x001c (28) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] FB AF 0A D5 52 AE 9A 0E A3 0A 0B B2 4B F8 A5 C2 ....R... ....K... > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >write_socket(5,276) >write_socket(5,276) wrote 276 >got smb length of 100 >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20190 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20190 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >cli_init_creds: user samba domain MSHOME >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345778 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000000 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000d > 001a str: \PIPE\lsarpc. > 000027 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \lsarpc to machine localhost and bound anonymously. > lsa_OpenPolicy: struct lsa_OpenPolicy > in: struct lsa_OpenPolicy > system_name : * > system_name : 0x005c (92) > attr : * > attr: struct lsa_ObjectAttribute > len : 0x00000018 (24) > root_dir : NULL > object_name : NULL > attributes : 0x00000000 (0) > sec_desc : NULL > sec_qos : * > sec_qos: struct lsa_QosInfo > len : 0x0000000c (12) > impersonation_level : 0x0002 (2) > context_mode : 0x01 (1) > effective_only : 0x00 (0) > access_mask : 0x02000000 (33554432) > 0: LSA_POLICY_VIEW_LOCAL_INFORMATION > 0: LSA_POLICY_VIEW_AUDIT_INFORMATION > 0: LSA_POLICY_GET_PRIVATE_INFORMATION > 0: LSA_POLICY_TRUST_ADMIN > 0: LSA_POLICY_CREATE_ACCOUNT > 0: LSA_POLICY_CREATE_SECRET > 0: LSA_POLICY_CREATE_PRIVILEGE > 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS > 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS > 0: LSA_POLICY_AUDIT_LOG_ADMIN > 0: LSA_POLICY_SERVER_ADMIN > 0: LSA_POLICY_LOOKUP_NAMES > 0: LSA_POLICY_NOTIFICATION >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 0000002c > 0014 context_id: 0000 > 0016 opnum : 0006 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=68, this_data=68, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_OpenPolicy: struct lsa_OpenPolicy > out: struct lsa_OpenPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-11dbdf4e0000 > result : NT_STATUS_OK > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > in: struct lsa_QueryInfoPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-11dbdf4e0000 > level : LSA_POLICY_INFO_ACCOUNT_DOMAIN (5) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002e > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000016 > 0014 context_id: 0000 > 0016 opnum : 0007 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=46, this_data=46, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0074 > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 0000005c > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 116, data_len 92, ss_len 0 >rpc_api_pipe: got frag len of 116 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 184 bytes. > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > out: struct lsa_QueryInfoPolicy > info : * > info : * > info : union lsa_PolicyInformation(case 5) > account_domain: struct lsa_DomainInfo > name: struct lsa_StringLarge > length : 0x001c (28) > size : 0x001e (30) > string : * > string : 'LIPUS.FUBAR.SI' > sid : * > sid : S-1-5-21-1215170701-1004161298-3654541485 > result : NT_STATUS_OK > lsa_Close: struct lsa_Close > in: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-11dbdf4e0000 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002c > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000014 > 0014 context_id: 0000 > 0016 opnum : 0000 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=44, this_data=44, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_Close: struct lsa_Close > out: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : NT_STATUS_OK >rpc_pipe_destructor: closed \lsarpc >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345678 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000001 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000e > 001a str: \PIPE\spoolss. > 000028 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \spoolss to machine localhost and bound anonymously. > spoolss_OpenPrinterEx: struct spoolss_OpenPrinterEx > in: struct spoolss_OpenPrinterEx > printername : * > printername : '\\LOCALHOST\HP4L' > datatype : NULL > devmode_ctr: struct spoolss_DevmodeContainer > _ndr_size : 0x00000000 (0) > devmode : NULL > access_mask : 0x000f000c (983052) > 0: SERVER_ACCESS_ADMINISTER > 0: SERVER_ACCESS_ENUMERATE > 1: PRINTER_ACCESS_ADMINISTER > 1: PRINTER_ACCESS_USE > 0: JOB_ACCESS_ADMINISTER > 0: JOB_ACCESS_READ > level : 0x00000001 (1) > userlevel : union spoolss_UserLevel(case 1) > level1 : * > level1: struct spoolss_UserLevel1 > size : 0x0000001c (28) > client : * > client : '\\LIPUS.FUBAR.SI' > user : * > user : 'samba' > build : 0x00000565 (1381) > major : UNKNOWN_ENUM_VALUE (2) > minor : SPOOLSS_MINOR_VERSION_0 (0) > processor : PROCESSOR_ARCHITECTURE_INTEL (0) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 00cc > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 000000b4 > 0014 context_id: 0000 > 0016 opnum : 0045 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=204, this_data=204, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > spoolss_OpenPrinterEx: struct spoolss_OpenPrinterEx > out: struct spoolss_OpenPrinterEx > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_INVALID_PARAM >result was WERR_INVALID_PARAM >rpc_pipe_destructor: closed \spoolss >write_socket(5,39) >write_socket(5,39) wrote 39 >got smb length of 35 >size=35 >smb_com=0x71 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=1 >smb_pid=20190 >smb_uid=100 >smb_mid=15 >smt_wct=0 >smb_bcc=0 > >Unable to set Windows printer driver (1)! >Running command: smbclient //localhost/print$ -N -A /tmp/4d31db11711fb -c 'mkdir W32X86;put /tmp/4d31db0d3bfb7 W32X86/HP4L.ppd;put /usr/share/cups/drivers/ps5ui.dll W32X86/ps5ui.dll;put /usr/share/cups/drivers/pscript.hlp W32X86/pscript.hlp;put /usr/share/cups/drivers/pscript.ntf W32X86/pscript.ntf;put /usr/share/cups/drivers/pscript5.dll W32X86/pscript5.dll' >Domain=[MSHOME] OS=[Unix] Server=[Samba 3.5.6] >putting file /tmp/4d31db0d3bfb7 as \W32X86/HP4L.ppd (1871.4 kb/s) (average 1871.4 kb/s) >putting file /usr/share/cups/drivers/ps5ui.dll as \W32X86/ps5ui.dll (12599.9 kb/s) (average 7518.0 kb/s) >putting file /usr/share/cups/drivers/pscript.hlp as \W32X86/pscript.hlp (2825.3 kb/s) (average 6009.7 kb/s) >putting file /usr/share/cups/drivers/pscript.ntf as \W32X86/pscript.ntf (25802.1 kb/s) (average 16247.2 kb/s) >putting file /usr/share/cups/drivers/pscript5.dll as \W32X86/pscript5.dll (22224.9 kb/s) (average 17780.0 kb/s) >NT_STATUS_OBJECT_NAME_COLLISION making remote directory \W32X86 > >Running command: smbclient //localhost/print$ -N -A /tmp/4d31db11711fb -c 'put /usr/share/cups/drivers/cups6.ini W32X86/cups6.ini;put /usr/share/cups/drivers/cupsps6.dll W32X86/cupsps6.dll;put /usr/share/cups/drivers/cupsui6.dll W32X86/cupsui6.dll' >Domain=[MSHOME] OS=[Unix] Server=[Samba 3.5.6] >putting file /usr/share/cups/drivers/cups6.ini as \W32X86/cups6.ini (7.8 kb/s) (average 7.8 kb/s) >putting file /usr/share/cups/drivers/cupsps6.dll as \W32X86/cupsps6.dll (1363.7 kb/s) (average 685.8 kb/s) >putting file /usr/share/cups/drivers/cupsui6.dll as \W32X86/cupsui6.dll (1483.5 kb/s) (average 951.7 kb/s) > >Running command: rpcclient localhost -N -A /tmp/4d31db11711fb -c 'adddriver "Windows NT x86" "HP4L:pscript5.dll:HP4L.ppd:ps5ui.dll:pscript.hlp:NULL:RAW:pscript5.dll,HP4L.ppd,ps5ui.dll,pscript.hlp,pscript.ntf,cups6.ini,cupsps6.dll,cupsui6.dll"' >INFO: Current debug levels: > all: True/10 > tdb: False/0 > printdrivers: False/0 > lanman: False/0 > smb: False/0 > rpc_parse: False/0 > rpc_srv: False/0 > rpc_cli: False/0 > passdb: False/0 > sam: False/0 > auth: False/0 > winbind: False/0 > vfs: False/0 > idmap: False/0 > quota: False/0 > acls: False/0 > locking: False/0 > msdfs: False/0 > dmapi: False/0 > registry: False/0 >doing parameter dos charset = 850 >Attempting to register new charset UCS-2LE >Registered charset UCS-2LE >Attempting to register new charset UTF-16LE >Registered charset UTF-16LE >Attempting to register new charset UCS-2BE >Registered charset UCS-2BE >Attempting to register new charset UTF-16BE >Registered charset UTF-16BE >Attempting to register new charset UTF8 >Registered charset UTF8 >Attempting to register new charset UTF-8 >Registered charset UTF-8 >Attempting to register new charset ASCII >Registered charset ASCII >Attempting to register new charset 646 >Registered charset 646 >Attempting to register new charset ISO-8859-1 >Registered charset ISO-8859-1 >Attempting to register new charset UCS2-HEX >Registered charset UCS2-HEX >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >doing parameter unix charset = UTF-8 >doing parameter display charset = UTF-8 >doing parameter encrypt passwords = yes >doing parameter dns proxy = no >doing parameter create mask = 0777 >doing parameter directory mask = 0777 >doing parameter force user = samba >doing parameter force group = samba >pm_process() returned Yes >lp_servicenumber: couldn't find homes >set_server_role: role = ROLE_STANDALONE >Connecting to host=localhost >Opening cache file at /var/cache/samba/gencache.tdb >Opening cache file at /var/cache/samba/gencache_notrans.tdb >Cache entry with key = AD_SITENAME/DOMAIN/ couldn't be found >sitename_fetch: No stored sitename for >internal_resolve_name: looking up localhost#20 (sitename (null)) >Returning valid cache entry: key = NBT/LOCALHOST#20, value = 127.0.0.1:0, timeout = Sat Jan 15 18:47:15 2011 >name localhost#20 found. >Running timed event "tevent_req_timedout" 0xb77ddc50 >Connecting to 127.0.0.1 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 50388 > SO_RCVBUF = 87616 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >Doing spnego session setup (blob length=58) >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=NONE > &negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0006 (6) > DomainNameMaxLen : 0x0006 (6) > DomainName : * > DomainName : 'MSHOME' > WorkstationLen : 0x000e (14) > WorkstationMaxLen : 0x000e (14) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' >write_socket(5,172) >write_socket(5,172) wrote 172 >got smb length of 284 >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20196 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 7C AC 26 83 EE FA 6D D1 00 ......`| .&...m.. >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20196 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 7C AC 26 83 EE FA 6D D1 00 ......`| .&...m.. >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . > &challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x001c (28) > TargetNameMaxLen : 0x001c (28) > TargetName : * > TargetName : 'LIPUS.FUBAR.SI' > NegotiateFlags : 0x608a8215 (1619690005) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : 7cac2683eefa6dd1 > Reserved : 0000000000000000 > TargetInfoLen : 0x0056 (86) > TargetNameInfoMaxLen : 0x0056 (86) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x000a (10) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'lipus' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >Got challenge flags: >Got NTLMSSP neg_flags=0x608a8215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP challenge set by NTLM2 >challenge is: >[0000] 7A E8 C7 FC 59 A8 9C A9 z...Y... > &authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : 8ec42a5f6d0891db00000000000000000000000000000000 > NtChallengeResponseLen : 0x0018 (24) > NtChallengeResponseMaxLen: 0x0018 (24) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 24) > v1: struct NTLM_RESPONSE > Response : 7ce1485beb7902f1465dcbfa46b2419c1f8ae4cbf6712835 > DomainNameLen : 0x000c (12) > DomainNameMaxLen : 0x000c (12) > DomainName : * > DomainName : 'MSHOME' > UserNameLen : 0x000a (10) > UserNameMaxLen : 0x000a (10) > UserName : * > UserName : 'samba' > WorkstationLen : 0x001c (28) > WorkstationMaxLen : 0x001c (28) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] 82 54 BD 1A CC 3D 21 49 D8 D1 A2 F3 FF 8F E0 40 .T...=!I .......@ > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >write_socket(5,276) >write_socket(5,276) wrote 276 >got smb length of 100 >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20196 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20196 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >cli_init_creds: user samba domain MSHOME >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345778 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000000 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000d > 001a str: \PIPE\lsarpc. > 000027 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \lsarpc to machine localhost and bound anonymously. > lsa_OpenPolicy: struct lsa_OpenPolicy > in: struct lsa_OpenPolicy > system_name : * > system_name : 0x005c (92) > attr : * > attr: struct lsa_ObjectAttribute > len : 0x00000018 (24) > root_dir : NULL > object_name : NULL > attributes : 0x00000000 (0) > sec_desc : NULL > sec_qos : * > sec_qos: struct lsa_QosInfo > len : 0x0000000c (12) > impersonation_level : 0x0002 (2) > context_mode : 0x01 (1) > effective_only : 0x00 (0) > access_mask : 0x02000000 (33554432) > 0: LSA_POLICY_VIEW_LOCAL_INFORMATION > 0: LSA_POLICY_VIEW_AUDIT_INFORMATION > 0: LSA_POLICY_GET_PRIVATE_INFORMATION > 0: LSA_POLICY_TRUST_ADMIN > 0: LSA_POLICY_CREATE_ACCOUNT > 0: LSA_POLICY_CREATE_SECRET > 0: LSA_POLICY_CREATE_PRIVILEGE > 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS > 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS > 0: LSA_POLICY_AUDIT_LOG_ADMIN > 0: LSA_POLICY_SERVER_ADMIN > 0: LSA_POLICY_LOOKUP_NAMES > 0: LSA_POLICY_NOTIFICATION >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 0000002c > 0014 context_id: 0000 > 0016 opnum : 0006 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=68, this_data=68, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_OpenPolicy: struct lsa_OpenPolicy > out: struct lsa_OpenPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-11dbe54e0000 > result : NT_STATUS_OK > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > in: struct lsa_QueryInfoPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-11dbe54e0000 > level : LSA_POLICY_INFO_ACCOUNT_DOMAIN (5) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002e > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000016 > 0014 context_id: 0000 > 0016 opnum : 0007 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=46, this_data=46, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0074 > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 0000005c > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 116, data_len 92, ss_len 0 >rpc_api_pipe: got frag len of 116 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 184 bytes. > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > out: struct lsa_QueryInfoPolicy > info : * > info : * > info : union lsa_PolicyInformation(case 5) > account_domain: struct lsa_DomainInfo > name: struct lsa_StringLarge > length : 0x001c (28) > size : 0x001e (30) > string : * > string : 'LIPUS.FUBAR.SI' > sid : * > sid : S-1-5-21-1215170701-1004161298-3654541485 > result : NT_STATUS_OK > lsa_Close: struct lsa_Close > in: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-11dbe54e0000 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002c > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000014 > 0014 context_id: 0000 > 0016 opnum : 0000 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=44, this_data=44, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_Close: struct lsa_Close > out: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : NT_STATUS_OK >rpc_pipe_destructor: closed \lsarpc >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345678 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000001 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000e > 001a str: \PIPE\spoolss. > 000028 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \spoolss to machine localhost and bound anonymously. > spoolss_AddPrinterDriver: struct spoolss_AddPrinterDriver > in: struct spoolss_AddPrinterDriver > servername : * > servername : '\\LOCALHOST' > info_ctr : * > info_ctr: struct spoolss_AddDriverInfoCtr > level : 0x00000003 (3) > info : union spoolss_AddDriverInfo(case 3) > info3 : * > info3: struct spoolss_AddDriverInfo3 > version : SPOOLSS_DRIVER_VERSION_NT4 (2) > driver_name : * > driver_name : 'HP4L' > architecture : * > architecture : 'Windows NT x86' > driver_path : * > driver_path : 'pscript5.dll' > data_file : * > data_file : 'HP4L.ppd' > config_file : * > config_file : 'ps5ui.dll' > help_file : * > help_file : 'pscript.hlp' > monitor_name : NULL > default_datatype : * > default_datatype : 'RAW' > _ndr_size_dependent_files: 0x00000000 (0) > dependent_files : * > dependent_files: struct spoolss_StringArray > _ndr_size : 0x00000000 (0) > string: ARRAY(8) > [0] : 'pscript5.dll' > [1] : 'HP4L.ppd' > [2] : 'ps5ui.dll' > [3] : 'pscript.hlp' > [4] : 'pscript.ntf' > [5] : 'cups6.ini' > [6] : 'cupsps6.dll' > [7] : 'cupsui6.dll' >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0216 > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 000001fe > 0014 context_id: 0000 > 0016 opnum : 0009 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=534, this_data=534, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 001c > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000004 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 28, data_len 4, ss_len 0 >rpc_api_pipe: got frag len of 28 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 8 bytes. > spoolss_AddPrinterDriver: struct spoolss_AddPrinterDriver > out: struct spoolss_AddPrinterDriver > result : WERR_OK >Printer Driver HP4L successfully installed. >rpc_pipe_destructor: closed \spoolss >write_socket(5,39) >write_socket(5,39) wrote 39 >got smb length of 35 >size=35 >smb_com=0x71 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=1 >smb_pid=20196 >smb_uid=100 >smb_mid=15 >smt_wct=0 >smb_bcc=0 > >Running command: smbclient //localhost/print$ -N -A /tmp/4d31db11711fb -c 'mkdir WIN40;put /tmp/4d31db0d3bfb7 WIN40/HP4L.PPD;put /usr/share/cups/drivers/ADFONTS.MFM WIN40/ADFONTS.MFM;put /usr/share/cups/drivers/ADOBEPS4.DRV WIN40/ADOBEPS4.DRV;put /usr/share/cups/drivers/ADOBEPS4.HLP WIN40/ADOBEPS4.HLP;put /usr/share/cups/drivers/ICONLIB.DLL WIN40/ICONLIB.DLL;put /usr/share/cups/drivers/PSMON.DLL WIN40/PSMON.DLL;' >Domain=[MSHOME] OS=[Unix] Server=[Samba 3.5.6] >putting file /tmp/4d31db0d3bfb7 as \WIN40/HP4L.PPD (1871.4 kb/s) (average 1871.4 kb/s) >putting file /usr/share/cups/drivers/ADFONTS.MFM as \WIN40/ADFONTS.MFM (23420.0 kb/s) (average 17543.2 kb/s) >putting file /usr/share/cups/drivers/ADOBEPS4.DRV as \WIN40/ADOBEPS4.DRV (30865.0 kb/s) (average 24924.3 kb/s) >putting file /usr/share/cups/drivers/ADOBEPS4.HLP as \WIN40/ADOBEPS4.HLP (14758.0 kb/s) (average 23405.2 kb/s) >putting file /usr/share/cups/drivers/ICONLIB.DLL as \WIN40/ICONLIB.DLL (11535.8 kb/s) (average 22181.5 kb/s) >putting file /usr/share/cups/drivers/PSMON.DLL as \WIN40/PSMON.DLL (6222.2 kb/s) (average 20826.5 kb/s) >NT_STATUS_OBJECT_NAME_COLLISION making remote directory \WIN40 > >Running command: rpcclient localhost -N -A /tmp/4d31db11711fb -c 'adddriver "Windows 4.0" "HP4L:ADOBEPS4.DRV:HP4L.PPD:NULL:ADOBEPS4.HLP:PSMON.DLL:RAW:ADOBEPS4.DRV,HP4L.PPD,ADOBEPS4.HLP,PSMON.DLL,ADFONTS.MFM,ICONLIB.DLL"' >INFO: Current debug levels: > all: True/10 > tdb: False/0 > printdrivers: False/0 > lanman: False/0 > smb: False/0 > rpc_parse: False/0 > rpc_srv: False/0 > rpc_cli: False/0 > passdb: False/0 > sam: False/0 > auth: False/0 > winbind: False/0 > vfs: False/0 > idmap: False/0 > quota: False/0 > acls: False/0 > locking: False/0 > msdfs: False/0 > dmapi: False/0 > registry: False/0 >doing parameter dos charset = 850 >Attempting to register new charset UCS-2LE >Registered charset UCS-2LE >Attempting to register new charset UTF-16LE >Registered charset UTF-16LE >Attempting to register new charset UCS-2BE >Registered charset UCS-2BE >Attempting to register new charset UTF-16BE >Registered charset UTF-16BE >Attempting to register new charset UTF8 >Registered charset UTF8 >Attempting to register new charset UTF-8 >Registered charset UTF-8 >Attempting to register new charset ASCII >Registered charset ASCII >Attempting to register new charset 646 >Registered charset 646 >Attempting to register new charset ISO-8859-1 >Registered charset ISO-8859-1 >Attempting to register new charset UCS2-HEX >Registered charset UCS2-HEX >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >doing parameter unix charset = UTF-8 >doing parameter display charset = UTF-8 >doing parameter encrypt passwords = yes >doing parameter dns proxy = no >doing parameter create mask = 0777 >doing parameter directory mask = 0777 >doing parameter force user = samba >doing parameter force group = samba >pm_process() returned Yes >lp_servicenumber: couldn't find homes >set_server_role: role = ROLE_STANDALONE >Connecting to host=localhost >Opening cache file at /var/cache/samba/gencache.tdb >Opening cache file at /var/cache/samba/gencache_notrans.tdb >Cache entry with key = AD_SITENAME/DOMAIN/ couldn't be found >sitename_fetch: No stored sitename for >internal_resolve_name: looking up localhost#20 (sitename (null)) >Returning valid cache entry: key = NBT/LOCALHOST#20, value = 127.0.0.1:0, timeout = Sat Jan 15 18:47:15 2011 >name localhost#20 found. >Running timed event "tevent_req_timedout" 0xb7796c50 >Connecting to 127.0.0.1 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 50388 > SO_RCVBUF = 87616 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >Doing spnego session setup (blob length=58) >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=NONE > &negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0006 (6) > DomainNameMaxLen : 0x0006 (6) > DomainName : * > DomainName : 'MSHOME' > WorkstationLen : 0x000e (14) > WorkstationMaxLen : 0x000e (14) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' >write_socket(5,172) >write_socket(5,172) wrote 172 >got smb length of 284 >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20200 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 66 EB 7A 00 50 08 B2 B4 00 ......`f .z.P.... >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20200 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 66 EB 7A 00 50 08 B2 B4 00 ......`f .z.P.... >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . > &challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x001c (28) > TargetNameMaxLen : 0x001c (28) > TargetName : * > TargetName : 'LIPUS.FUBAR.SI' > NegotiateFlags : 0x608a8215 (1619690005) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : 66eb7a005008b2b4 > Reserved : 0000000000000000 > TargetInfoLen : 0x0056 (86) > TargetNameInfoMaxLen : 0x0056 (86) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x000a (10) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'lipus' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >Got challenge flags: >Got NTLMSSP neg_flags=0x608a8215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP challenge set by NTLM2 >challenge is: >[0000] F2 2D 76 2A 26 E7 81 A1 .-v*&... > &authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : f2c76fdd5344135d00000000000000000000000000000000 > NtChallengeResponseLen : 0x0018 (24) > NtChallengeResponseMaxLen: 0x0018 (24) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 24) > v1: struct NTLM_RESPONSE > Response : 21435b69940d36d3e780e95c509a289c7fafc71632bfb63d > DomainNameLen : 0x000c (12) > DomainNameMaxLen : 0x000c (12) > DomainName : * > DomainName : 'MSHOME' > UserNameLen : 0x000a (10) > UserNameMaxLen : 0x000a (10) > UserName : * > UserName : 'samba' > WorkstationLen : 0x001c (28) > WorkstationMaxLen : 0x001c (28) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] D4 D8 4C 68 74 90 76 5E A8 12 93 B9 DD 44 F4 05 ..Lht.v^ .....D.. > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >write_socket(5,276) >write_socket(5,276) wrote 276 >got smb length of 100 >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20200 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20200 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >cli_init_creds: user samba domain MSHOME >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345778 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000000 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000d > 001a str: \PIPE\lsarpc. > 000027 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \lsarpc to machine localhost and bound anonymously. > lsa_OpenPolicy: struct lsa_OpenPolicy > in: struct lsa_OpenPolicy > system_name : * > system_name : 0x005c (92) > attr : * > attr: struct lsa_ObjectAttribute > len : 0x00000018 (24) > root_dir : NULL > object_name : NULL > attributes : 0x00000000 (0) > sec_desc : NULL > sec_qos : * > sec_qos: struct lsa_QosInfo > len : 0x0000000c (12) > impersonation_level : 0x0002 (2) > context_mode : 0x01 (1) > effective_only : 0x00 (0) > access_mask : 0x02000000 (33554432) > 0: LSA_POLICY_VIEW_LOCAL_INFORMATION > 0: LSA_POLICY_VIEW_AUDIT_INFORMATION > 0: LSA_POLICY_GET_PRIVATE_INFORMATION > 0: LSA_POLICY_TRUST_ADMIN > 0: LSA_POLICY_CREATE_ACCOUNT > 0: LSA_POLICY_CREATE_SECRET > 0: LSA_POLICY_CREATE_PRIVILEGE > 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS > 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS > 0: LSA_POLICY_AUDIT_LOG_ADMIN > 0: LSA_POLICY_SERVER_ADMIN > 0: LSA_POLICY_LOOKUP_NAMES > 0: LSA_POLICY_NOTIFICATION >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 0000002c > 0014 context_id: 0000 > 0016 opnum : 0006 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=68, this_data=68, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_OpenPolicy: struct lsa_OpenPolicy > out: struct lsa_OpenPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-12dbe94e0000 > result : NT_STATUS_OK > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > in: struct lsa_QueryInfoPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-12dbe94e0000 > level : LSA_POLICY_INFO_ACCOUNT_DOMAIN (5) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002e > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000016 > 0014 context_id: 0000 > 0016 opnum : 0007 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=46, this_data=46, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0074 > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 0000005c > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 116, data_len 92, ss_len 0 >rpc_api_pipe: got frag len of 116 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 184 bytes. > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > out: struct lsa_QueryInfoPolicy > info : * > info : * > info : union lsa_PolicyInformation(case 5) > account_domain: struct lsa_DomainInfo > name: struct lsa_StringLarge > length : 0x001c (28) > size : 0x001e (30) > string : * > string : 'LIPUS.FUBAR.SI' > sid : * > sid : S-1-5-21-1215170701-1004161298-3654541485 > result : NT_STATUS_OK > lsa_Close: struct lsa_Close > in: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-12dbe94e0000 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002c > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000014 > 0014 context_id: 0000 > 0016 opnum : 0000 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=44, this_data=44, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_Close: struct lsa_Close > out: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : NT_STATUS_OK >rpc_pipe_destructor: closed \lsarpc >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345678 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000001 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000e > 001a str: \PIPE\spoolss. > 000028 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \spoolss to machine localhost and bound anonymously. > spoolss_AddPrinterDriver: struct spoolss_AddPrinterDriver > in: struct spoolss_AddPrinterDriver > servername : * > servername : '\\LOCALHOST' > info_ctr : * > info_ctr: struct spoolss_AddDriverInfoCtr > level : 0x00000003 (3) > info : union spoolss_AddDriverInfo(case 3) > info3 : * > info3: struct spoolss_AddDriverInfo3 > version : SPOOLSS_DRIVER_VERSION_9X (0) > driver_name : * > driver_name : 'HP4L' > architecture : * > architecture : 'Windows 4.0' > driver_path : * > driver_path : 'ADOBEPS4.DRV' > data_file : * > data_file : 'HP4L.PPD' > config_file : NULL > help_file : * > help_file : 'ADOBEPS4.HLP' > monitor_name : * > monitor_name : 'PSMON.DLL' > default_datatype : * > default_datatype : 'RAW' > _ndr_size_dependent_files: 0x00000000 (0) > dependent_files : * > dependent_files: struct spoolss_StringArray > _ndr_size : 0x00000000 (0) > string: ARRAY(6) > [0] : 'ADOBEPS4.DRV' > [1] : 'HP4L.PPD' > [2] : 'ADOBEPS4.HLP' > [3] : 'PSMON.DLL' > [4] : 'ADFONTS.MFM' > [5] : 'ICONLIB.DLL' >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 01e8 > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 000001d0 > 0014 context_id: 0000 > 0016 opnum : 0009 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=488, this_data=488, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 001c > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000004 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 28, data_len 4, ss_len 0 >rpc_api_pipe: got frag len of 28 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 8 bytes. > spoolss_AddPrinterDriver: struct spoolss_AddPrinterDriver > out: struct spoolss_AddPrinterDriver > result : WERR_OK >Printer Driver HP4L successfully installed. >rpc_pipe_destructor: closed \spoolss >write_socket(5,39) >write_socket(5,39) wrote 39 >got smb length of 35 >size=35 >smb_com=0x71 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=1 >smb_pid=20200 >smb_uid=100 >smb_mid=15 >smt_wct=0 >smb_bcc=0 > >Running command: rpcclient localhost -N -A /tmp/4d31db11711fb -c 'setdriver HP4L HP4L' >INFO: Current debug levels: > all: True/10 > tdb: False/0 > printdrivers: False/0 > lanman: False/0 > smb: False/0 > rpc_parse: False/0 > rpc_srv: False/0 > rpc_cli: False/0 > passdb: False/0 > sam: False/0 > auth: False/0 > winbind: False/0 > vfs: False/0 > idmap: False/0 > quota: False/0 > acls: False/0 > locking: False/0 > msdfs: False/0 > dmapi: False/0 > registry: False/0 >doing parameter dos charset = 850 >Attempting to register new charset UCS-2LE >Registered charset UCS-2LE >Attempting to register new charset UTF-16LE >Registered charset UTF-16LE >Attempting to register new charset UCS-2BE >Registered charset UCS-2BE >Attempting to register new charset UTF-16BE >Registered charset UTF-16BE >Attempting to register new charset UTF8 >Registered charset UTF8 >Attempting to register new charset UTF-8 >Registered charset UTF-8 >Attempting to register new charset ASCII >Registered charset ASCII >Attempting to register new charset 646 >Registered charset 646 >Attempting to register new charset ISO-8859-1 >Registered charset ISO-8859-1 >Attempting to register new charset UCS2-HEX >Registered charset UCS2-HEX >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >doing parameter unix charset = UTF-8 >doing parameter display charset = UTF-8 >doing parameter encrypt passwords = yes >doing parameter dns proxy = no >doing parameter create mask = 0777 >doing parameter directory mask = 0777 >doing parameter force user = samba >doing parameter force group = samba >pm_process() returned Yes >lp_servicenumber: couldn't find homes >set_server_role: role = ROLE_STANDALONE >Connecting to host=localhost >Opening cache file at /var/cache/samba/gencache.tdb >Opening cache file at /var/cache/samba/gencache_notrans.tdb >Cache entry with key = AD_SITENAME/DOMAIN/ couldn't be found >sitename_fetch: No stored sitename for >internal_resolve_name: looking up localhost#20 (sitename (null)) >Returning valid cache entry: key = NBT/LOCALHOST#20, value = 127.0.0.1:0, timeout = Sat Jan 15 18:47:15 2011 >name localhost#20 found. >Running timed event "tevent_req_timedout" 0xb791ac50 >Connecting to 127.0.0.1 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 50388 > SO_RCVBUF = 87616 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >Doing spnego session setup (blob length=58) >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=NONE > &negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0006 (6) > DomainNameMaxLen : 0x0006 (6) > DomainName : * > DomainName : 'MSHOME' > WorkstationLen : 0x000e (14) > WorkstationMaxLen : 0x000e (14) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' >write_socket(5,172) >write_socket(5,172) wrote 172 >got smb length of 284 >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20202 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 FB 17 91 5B A2 4A 36 82 00 ......`. ..[.J6.. >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20202 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 FB 17 91 5B A2 4A 36 82 00 ......`. ..[.J6.. >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . > &challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x001c (28) > TargetNameMaxLen : 0x001c (28) > TargetName : * > TargetName : 'LIPUS.FUBAR.SI' > NegotiateFlags : 0x608a8215 (1619690005) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : fb17915ba24a3682 > Reserved : 0000000000000000 > TargetInfoLen : 0x0056 (86) > TargetNameInfoMaxLen : 0x0056 (86) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x000a (10) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'lipus' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >Got challenge flags: >Got NTLMSSP neg_flags=0x608a8215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP challenge set by NTLM2 >challenge is: >[0000] 33 A2 BB BE 02 C5 B9 68 3......h > &authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : b4defb0c479235b300000000000000000000000000000000 > NtChallengeResponseLen : 0x0018 (24) > NtChallengeResponseMaxLen: 0x0018 (24) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 24) > v1: struct NTLM_RESPONSE > Response : 86ade5b41fd783ec0b91588ec9dd2d4554bdfee7a8640a7f > DomainNameLen : 0x000c (12) > DomainNameMaxLen : 0x000c (12) > DomainName : * > DomainName : 'MSHOME' > UserNameLen : 0x000a (10) > UserNameMaxLen : 0x000a (10) > UserName : * > UserName : 'samba' > WorkstationLen : 0x001c (28) > WorkstationMaxLen : 0x001c (28) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] B4 C5 C3 19 D4 CB 55 A7 FF 38 D2 21 2D 2C 17 AA ......U. .8.!-,.. > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >write_socket(5,276) >write_socket(5,276) wrote 276 >got smb length of 100 >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20202 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20202 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >cli_init_creds: user samba domain MSHOME >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345778 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000000 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000d > 001a str: \PIPE\lsarpc. > 000027 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \lsarpc to machine localhost and bound anonymously. > lsa_OpenPolicy: struct lsa_OpenPolicy > in: struct lsa_OpenPolicy > system_name : * > system_name : 0x005c (92) > attr : * > attr: struct lsa_ObjectAttribute > len : 0x00000018 (24) > root_dir : NULL > object_name : NULL > attributes : 0x00000000 (0) > sec_desc : NULL > sec_qos : * > sec_qos: struct lsa_QosInfo > len : 0x0000000c (12) > impersonation_level : 0x0002 (2) > context_mode : 0x01 (1) > effective_only : 0x00 (0) > access_mask : 0x02000000 (33554432) > 0: LSA_POLICY_VIEW_LOCAL_INFORMATION > 0: LSA_POLICY_VIEW_AUDIT_INFORMATION > 0: LSA_POLICY_GET_PRIVATE_INFORMATION > 0: LSA_POLICY_TRUST_ADMIN > 0: LSA_POLICY_CREATE_ACCOUNT > 0: LSA_POLICY_CREATE_SECRET > 0: LSA_POLICY_CREATE_PRIVILEGE > 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS > 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS > 0: LSA_POLICY_AUDIT_LOG_ADMIN > 0: LSA_POLICY_SERVER_ADMIN > 0: LSA_POLICY_LOOKUP_NAMES > 0: LSA_POLICY_NOTIFICATION >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 0000002c > 0014 context_id: 0000 > 0016 opnum : 0006 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=68, this_data=68, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_OpenPolicy: struct lsa_OpenPolicy > out: struct lsa_OpenPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-12dbeb4e0000 > result : NT_STATUS_OK > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > in: struct lsa_QueryInfoPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-12dbeb4e0000 > level : LSA_POLICY_INFO_ACCOUNT_DOMAIN (5) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002e > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000016 > 0014 context_id: 0000 > 0016 opnum : 0007 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=46, this_data=46, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0074 > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 0000005c > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 116, data_len 92, ss_len 0 >rpc_api_pipe: got frag len of 116 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 184 bytes. > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > out: struct lsa_QueryInfoPolicy > info : * > info : * > info : union lsa_PolicyInformation(case 5) > account_domain: struct lsa_DomainInfo > name: struct lsa_StringLarge > length : 0x001c (28) > size : 0x001e (30) > string : * > string : 'LIPUS.FUBAR.SI' > sid : * > sid : S-1-5-21-1215170701-1004161298-3654541485 > result : NT_STATUS_OK > lsa_Close: struct lsa_Close > in: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-12dbeb4e0000 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002c > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000014 > 0014 context_id: 0000 > 0016 opnum : 0000 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=44, this_data=44, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_Close: struct lsa_Close > out: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : NT_STATUS_OK >rpc_pipe_destructor: closed \lsarpc >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345678 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000001 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000e > 001a str: \PIPE\spoolss. > 000028 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \spoolss to machine localhost and bound anonymously. > spoolss_OpenPrinterEx: struct spoolss_OpenPrinterEx > in: struct spoolss_OpenPrinterEx > printername : * > printername : '\\LOCALHOST\HP4L' > datatype : NULL > devmode_ctr: struct spoolss_DevmodeContainer > _ndr_size : 0x00000000 (0) > devmode : NULL > access_mask : 0x000f000c (983052) > 0: SERVER_ACCESS_ADMINISTER > 0: SERVER_ACCESS_ENUMERATE > 1: PRINTER_ACCESS_ADMINISTER > 1: PRINTER_ACCESS_USE > 0: JOB_ACCESS_ADMINISTER > 0: JOB_ACCESS_READ > level : 0x00000001 (1) > userlevel : union spoolss_UserLevel(case 1) > level1 : * > level1: struct spoolss_UserLevel1 > size : 0x0000001c (28) > client : * > client : '\\LIPUS.FUBAR.SI' > user : * > user : 'samba' > build : 0x00000565 (1381) > major : UNKNOWN_ENUM_VALUE (2) > minor : SPOOLSS_MINOR_VERSION_0 (0) > processor : PROCESSOR_ARCHITECTURE_INTEL (0) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 00cc > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 000000b4 > 0014 context_id: 0000 > 0016 opnum : 0045 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=204, this_data=204, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > spoolss_OpenPrinterEx: struct spoolss_OpenPrinterEx > out: struct spoolss_OpenPrinterEx > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_INVALID_PARAM >result was WERR_INVALID_PARAM >rpc_pipe_destructor: closed \spoolss >write_socket(5,39) >write_socket(5,39) wrote 39 >got smb length of 35 >size=35 >smb_com=0x71 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=1 >smb_pid=20202 >smb_uid=100 >smb_mid=15 >smt_wct=0 >smb_bcc=0 > >Unable to set Windows printer driver (1)! >Running command: smbclient //localhost/print$ -N -A /tmp/4d31db127e8f3 -c 'mkdir W32X86;put /tmp/4d31db0d3bfb7 W32X86/HP4L.ppd;put /usr/share/cups/drivers/ps5ui.dll W32X86/ps5ui.dll;put /usr/share/cups/drivers/pscript.hlp W32X86/pscript.hlp;put /usr/share/cups/drivers/pscript.ntf W32X86/pscript.ntf;put /usr/share/cups/drivers/pscript5.dll W32X86/pscript5.dll' >Domain=[MSHOME] OS=[Unix] Server=[Samba 3.5.6] >putting file /tmp/4d31db0d3bfb7 as \W32X86/HP4L.ppd (1684.3 kb/s) (average 1684.3 kb/s) >putting file /usr/share/cups/drivers/ps5ui.dll as \W32X86/ps5ui.dll (12599.9 kb/s) (average 7142.1 kb/s) >putting file /usr/share/cups/drivers/pscript.hlp as \W32X86/pscript.hlp (2825.3 kb/s) (average 5802.4 kb/s) >putting file /usr/share/cups/drivers/pscript.ntf as \W32X86/pscript.ntf (25802.1 kb/s) (average 15971.8 kb/s) >putting file /usr/share/cups/drivers/pscript5.dll as \W32X86/pscript5.dll (22224.9 kb/s) (average 17554.9 kb/s) >NT_STATUS_OBJECT_NAME_COLLISION making remote directory \W32X86 > >Running command: smbclient //localhost/print$ -N -A /tmp/4d31db127e8f3 -c 'put /usr/share/cups/drivers/cups6.ini W32X86/cups6.ini;put /usr/share/cups/drivers/cupsps6.dll W32X86/cupsps6.dll;put /usr/share/cups/drivers/cupsui6.dll W32X86/cupsui6.dll' >Domain=[MSHOME] OS=[Unix] Server=[Samba 3.5.6] >putting file /usr/share/cups/drivers/cups6.ini as \W32X86/cups6.ini (7.8 kb/s) (average 7.8 kb/s) >putting file /usr/share/cups/drivers/cupsps6.dll as \W32X86/cupsps6.dll (1363.7 kb/s) (average 685.8 kb/s) >putting file /usr/share/cups/drivers/cupsui6.dll as \W32X86/cupsui6.dll (1483.5 kb/s) (average 951.7 kb/s) > >Running command: rpcclient localhost -N -A /tmp/4d31db127e8f3 -c 'adddriver "Windows NT x86" "HP4L:pscript5.dll:HP4L.ppd:ps5ui.dll:pscript.hlp:NULL:RAW:pscript5.dll,HP4L.ppd,ps5ui.dll,pscript.hlp,pscript.ntf,cups6.ini,cupsps6.dll,cupsui6.dll"' >INFO: Current debug levels: > all: True/10 > tdb: False/0 > printdrivers: False/0 > lanman: False/0 > smb: False/0 > rpc_parse: False/0 > rpc_srv: False/0 > rpc_cli: False/0 > passdb: False/0 > sam: False/0 > auth: False/0 > winbind: False/0 > vfs: False/0 > idmap: False/0 > quota: False/0 > acls: False/0 > locking: False/0 > msdfs: False/0 > dmapi: False/0 > registry: False/0 >doing parameter dos charset = 850 >Attempting to register new charset UCS-2LE >Registered charset UCS-2LE >Attempting to register new charset UTF-16LE >Registered charset UTF-16LE >Attempting to register new charset UCS-2BE >Registered charset UCS-2BE >Attempting to register new charset UTF-16BE >Registered charset UTF-16BE >Attempting to register new charset UTF8 >Registered charset UTF8 >Attempting to register new charset UTF-8 >Registered charset UTF-8 >Attempting to register new charset ASCII >Registered charset ASCII >Attempting to register new charset 646 >Registered charset 646 >Attempting to register new charset ISO-8859-1 >Registered charset ISO-8859-1 >Attempting to register new charset UCS2-HEX >Registered charset UCS2-HEX >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >doing parameter unix charset = UTF-8 >doing parameter display charset = UTF-8 >doing parameter encrypt passwords = yes >doing parameter dns proxy = no >doing parameter create mask = 0777 >doing parameter directory mask = 0777 >doing parameter force user = samba >doing parameter force group = samba >pm_process() returned Yes >lp_servicenumber: couldn't find homes >set_server_role: role = ROLE_STANDALONE >Connecting to host=localhost >Opening cache file at /var/cache/samba/gencache.tdb >Opening cache file at /var/cache/samba/gencache_notrans.tdb >Cache entry with key = AD_SITENAME/DOMAIN/ couldn't be found >sitename_fetch: No stored sitename for >internal_resolve_name: looking up localhost#20 (sitename (null)) >Returning valid cache entry: key = NBT/LOCALHOST#20, value = 127.0.0.1:0, timeout = Sat Jan 15 18:47:15 2011 >name localhost#20 found. >Running timed event "tevent_req_timedout" 0xb77c9c50 >Connecting to 127.0.0.1 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 50388 > SO_RCVBUF = 87616 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >Doing spnego session setup (blob length=58) >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=NONE > &negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0006 (6) > DomainNameMaxLen : 0x0006 (6) > DomainName : * > DomainName : 'MSHOME' > WorkstationLen : 0x000e (14) > WorkstationMaxLen : 0x000e (14) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' >write_socket(5,172) >write_socket(5,172) wrote 172 >got smb length of 284 >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20208 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 DF BD 6B F4 AC 10 60 0D 00 ......`. .k...`.. >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20208 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 DF BD 6B F4 AC 10 60 0D 00 ......`. .k...`.. >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . > &challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x001c (28) > TargetNameMaxLen : 0x001c (28) > TargetName : * > TargetName : 'LIPUS.FUBAR.SI' > NegotiateFlags : 0x608a8215 (1619690005) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : dfbd6bf4ac10600d > Reserved : 0000000000000000 > TargetInfoLen : 0x0056 (86) > TargetNameInfoMaxLen : 0x0056 (86) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x000a (10) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'lipus' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >Got challenge flags: >Got NTLMSSP neg_flags=0x608a8215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP challenge set by NTLM2 >challenge is: >[0000] 2B E0 FE C5 28 33 AC 8C +...(3.. > &authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : c1f058e6a9ed518c00000000000000000000000000000000 > NtChallengeResponseLen : 0x0018 (24) > NtChallengeResponseMaxLen: 0x0018 (24) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 24) > v1: struct NTLM_RESPONSE > Response : f99434bb0e8de997baa7033ee705b9cd649999cc398a3c64 > DomainNameLen : 0x000c (12) > DomainNameMaxLen : 0x000c (12) > DomainName : * > DomainName : 'MSHOME' > UserNameLen : 0x000a (10) > UserNameMaxLen : 0x000a (10) > UserName : * > UserName : 'samba' > WorkstationLen : 0x001c (28) > WorkstationMaxLen : 0x001c (28) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] 88 F6 DD 23 65 B2 D0 2A 8F AE A9 D2 48 39 FC 3C ...#e..* ....H9.< > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >write_socket(5,276) >write_socket(5,276) wrote 276 >got smb length of 100 >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20208 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20208 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >cli_init_creds: user samba domain MSHOME >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345778 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000000 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000d > 001a str: \PIPE\lsarpc. > 000027 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \lsarpc to machine localhost and bound anonymously. > lsa_OpenPolicy: struct lsa_OpenPolicy > in: struct lsa_OpenPolicy > system_name : * > system_name : 0x005c (92) > attr : * > attr: struct lsa_ObjectAttribute > len : 0x00000018 (24) > root_dir : NULL > object_name : NULL > attributes : 0x00000000 (0) > sec_desc : NULL > sec_qos : * > sec_qos: struct lsa_QosInfo > len : 0x0000000c (12) > impersonation_level : 0x0002 (2) > context_mode : 0x01 (1) > effective_only : 0x00 (0) > access_mask : 0x02000000 (33554432) > 0: LSA_POLICY_VIEW_LOCAL_INFORMATION > 0: LSA_POLICY_VIEW_AUDIT_INFORMATION > 0: LSA_POLICY_GET_PRIVATE_INFORMATION > 0: LSA_POLICY_TRUST_ADMIN > 0: LSA_POLICY_CREATE_ACCOUNT > 0: LSA_POLICY_CREATE_SECRET > 0: LSA_POLICY_CREATE_PRIVILEGE > 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS > 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS > 0: LSA_POLICY_AUDIT_LOG_ADMIN > 0: LSA_POLICY_SERVER_ADMIN > 0: LSA_POLICY_LOOKUP_NAMES > 0: LSA_POLICY_NOTIFICATION >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 0000002c > 0014 context_id: 0000 > 0016 opnum : 0006 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=68, this_data=68, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_OpenPolicy: struct lsa_OpenPolicy > out: struct lsa_OpenPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-12dbf14e0000 > result : NT_STATUS_OK > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > in: struct lsa_QueryInfoPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-12dbf14e0000 > level : LSA_POLICY_INFO_ACCOUNT_DOMAIN (5) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002e > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000016 > 0014 context_id: 0000 > 0016 opnum : 0007 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=46, this_data=46, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0074 > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 0000005c > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 116, data_len 92, ss_len 0 >rpc_api_pipe: got frag len of 116 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 184 bytes. > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > out: struct lsa_QueryInfoPolicy > info : * > info : * > info : union lsa_PolicyInformation(case 5) > account_domain: struct lsa_DomainInfo > name: struct lsa_StringLarge > length : 0x001c (28) > size : 0x001e (30) > string : * > string : 'LIPUS.FUBAR.SI' > sid : * > sid : S-1-5-21-1215170701-1004161298-3654541485 > result : NT_STATUS_OK > lsa_Close: struct lsa_Close > in: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-12dbf14e0000 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002c > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000014 > 0014 context_id: 0000 > 0016 opnum : 0000 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=44, this_data=44, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_Close: struct lsa_Close > out: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : NT_STATUS_OK >rpc_pipe_destructor: closed \lsarpc >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345678 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000001 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000e > 001a str: \PIPE\spoolss. > 000028 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \spoolss to machine localhost and bound anonymously. > spoolss_AddPrinterDriver: struct spoolss_AddPrinterDriver > in: struct spoolss_AddPrinterDriver > servername : * > servername : '\\LOCALHOST' > info_ctr : * > info_ctr: struct spoolss_AddDriverInfoCtr > level : 0x00000003 (3) > info : union spoolss_AddDriverInfo(case 3) > info3 : * > info3: struct spoolss_AddDriverInfo3 > version : SPOOLSS_DRIVER_VERSION_NT4 (2) > driver_name : * > driver_name : 'HP4L' > architecture : * > architecture : 'Windows NT x86' > driver_path : * > driver_path : 'pscript5.dll' > data_file : * > data_file : 'HP4L.ppd' > config_file : * > config_file : 'ps5ui.dll' > help_file : * > help_file : 'pscript.hlp' > monitor_name : NULL > default_datatype : * > default_datatype : 'RAW' > _ndr_size_dependent_files: 0x00000000 (0) > dependent_files : * > dependent_files: struct spoolss_StringArray > _ndr_size : 0x00000000 (0) > string: ARRAY(8) > [0] : 'pscript5.dll' > [1] : 'HP4L.ppd' > [2] : 'ps5ui.dll' > [3] : 'pscript.hlp' > [4] : 'pscript.ntf' > [5] : 'cups6.ini' > [6] : 'cupsps6.dll' > [7] : 'cupsui6.dll' >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0216 > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 000001fe > 0014 context_id: 0000 > 0016 opnum : 0009 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=534, this_data=534, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 001c > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000004 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 28, data_len 4, ss_len 0 >rpc_api_pipe: got frag len of 28 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 8 bytes. > spoolss_AddPrinterDriver: struct spoolss_AddPrinterDriver > out: struct spoolss_AddPrinterDriver > result : WERR_OK >Printer Driver HP4L successfully installed. >rpc_pipe_destructor: closed \spoolss >write_socket(5,39) >write_socket(5,39) wrote 39 >got smb length of 35 >size=35 >smb_com=0x71 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=1 >smb_pid=20208 >smb_uid=100 >smb_mid=15 >smt_wct=0 >smb_bcc=0 > >Running command: smbclient //localhost/print$ -N -A /tmp/4d31db127e8f3 -c 'mkdir WIN40;put /tmp/4d31db0d3bfb7 WIN40/HP4L.PPD;put /usr/share/cups/drivers/ADFONTS.MFM WIN40/ADFONTS.MFM;put /usr/share/cups/drivers/ADOBEPS4.DRV WIN40/ADOBEPS4.DRV;put /usr/share/cups/drivers/ADOBEPS4.HLP WIN40/ADOBEPS4.HLP;put /usr/share/cups/drivers/ICONLIB.DLL WIN40/ICONLIB.DLL;put /usr/share/cups/drivers/PSMON.DLL WIN40/PSMON.DLL;' >Domain=[MSHOME] OS=[Unix] Server=[Samba 3.5.6] >putting file /tmp/4d31db0d3bfb7 as \WIN40/HP4L.PPD (1871.4 kb/s) (average 1871.4 kb/s) >putting file /usr/share/cups/drivers/ADFONTS.MFM as \WIN40/ADFONTS.MFM (23420.0 kb/s) (average 17543.2 kb/s) >putting file /usr/share/cups/drivers/ADOBEPS4.DRV as \WIN40/ADOBEPS4.DRV (30865.0 kb/s) (average 24924.3 kb/s) >putting file /usr/share/cups/drivers/ADOBEPS4.HLP as \WIN40/ADOBEPS4.HLP (14758.0 kb/s) (average 23405.2 kb/s) >putting file /usr/share/cups/drivers/ICONLIB.DLL as \WIN40/ICONLIB.DLL (11535.8 kb/s) (average 22181.5 kb/s) >putting file /usr/share/cups/drivers/PSMON.DLL as \WIN40/PSMON.DLL (6222.2 kb/s) (average 20826.5 kb/s) >NT_STATUS_OBJECT_NAME_COLLISION making remote directory \WIN40 > >Running command: rpcclient localhost -N -A /tmp/4d31db127e8f3 -c 'adddriver "Windows 4.0" "HP4L:ADOBEPS4.DRV:HP4L.PPD:NULL:ADOBEPS4.HLP:PSMON.DLL:RAW:ADOBEPS4.DRV,HP4L.PPD,ADOBEPS4.HLP,PSMON.DLL,ADFONTS.MFM,ICONLIB.DLL"' >INFO: Current debug levels: > all: True/10 > tdb: False/0 > printdrivers: False/0 > lanman: False/0 > smb: False/0 > rpc_parse: False/0 > rpc_srv: False/0 > rpc_cli: False/0 > passdb: False/0 > sam: False/0 > auth: False/0 > winbind: False/0 > vfs: False/0 > idmap: False/0 > quota: False/0 > acls: False/0 > locking: False/0 > msdfs: False/0 > dmapi: False/0 > registry: False/0 >doing parameter dos charset = 850 >Attempting to register new charset UCS-2LE >Registered charset UCS-2LE >Attempting to register new charset UTF-16LE >Registered charset UTF-16LE >Attempting to register new charset UCS-2BE >Registered charset UCS-2BE >Attempting to register new charset UTF-16BE >Registered charset UTF-16BE >Attempting to register new charset UTF8 >Registered charset UTF8 >Attempting to register new charset UTF-8 >Registered charset UTF-8 >Attempting to register new charset ASCII >Registered charset ASCII >Attempting to register new charset 646 >Registered charset 646 >Attempting to register new charset ISO-8859-1 >Registered charset ISO-8859-1 >Attempting to register new charset UCS2-HEX >Registered charset UCS2-HEX >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >doing parameter unix charset = UTF-8 >doing parameter display charset = UTF-8 >doing parameter encrypt passwords = yes >doing parameter dns proxy = no >doing parameter create mask = 0777 >doing parameter directory mask = 0777 >doing parameter force user = samba >doing parameter force group = samba >pm_process() returned Yes >lp_servicenumber: couldn't find homes >set_server_role: role = ROLE_STANDALONE >Connecting to host=localhost >Opening cache file at /var/cache/samba/gencache.tdb >Opening cache file at /var/cache/samba/gencache_notrans.tdb >Cache entry with key = AD_SITENAME/DOMAIN/ couldn't be found >sitename_fetch: No stored sitename for >internal_resolve_name: looking up localhost#20 (sitename (null)) >Returning valid cache entry: key = NBT/LOCALHOST#20, value = 127.0.0.1:0, timeout = Sat Jan 15 18:47:15 2011 >name localhost#20 found. >Running timed event "tevent_req_timedout" 0xb77b9c50 >Connecting to 127.0.0.1 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 50388 > SO_RCVBUF = 87616 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >Doing spnego session setup (blob length=58) >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=NONE > &negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0006 (6) > DomainNameMaxLen : 0x0006 (6) > DomainName : * > DomainName : 'MSHOME' > WorkstationLen : 0x000e (14) > WorkstationMaxLen : 0x000e (14) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' >write_socket(5,172) >write_socket(5,172) wrote 172 >got smb length of 284 >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20212 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 9E 9B 97 CB A1 F6 B8 B2 00 ......`. ........ >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20212 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 9E 9B 97 CB A1 F6 B8 B2 00 ......`. ........ >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . > &challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x001c (28) > TargetNameMaxLen : 0x001c (28) > TargetName : * > TargetName : 'LIPUS.FUBAR.SI' > NegotiateFlags : 0x608a8215 (1619690005) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : 9e9b97cba1f6b8b2 > Reserved : 0000000000000000 > TargetInfoLen : 0x0056 (86) > TargetNameInfoMaxLen : 0x0056 (86) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x000a (10) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'lipus' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >Got challenge flags: >Got NTLMSSP neg_flags=0x608a8215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP challenge set by NTLM2 >challenge is: >[0000] 51 E7 9F B2 C7 17 EE B7 Q....... > &authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : 584797aadcd7399000000000000000000000000000000000 > NtChallengeResponseLen : 0x0018 (24) > NtChallengeResponseMaxLen: 0x0018 (24) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 24) > v1: struct NTLM_RESPONSE > Response : 74161feec421d569e7361ea08640aa8f9767d57e20bedc12 > DomainNameLen : 0x000c (12) > DomainNameMaxLen : 0x000c (12) > DomainName : * > DomainName : 'MSHOME' > UserNameLen : 0x000a (10) > UserNameMaxLen : 0x000a (10) > UserName : * > UserName : 'samba' > WorkstationLen : 0x001c (28) > WorkstationMaxLen : 0x001c (28) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] 62 25 21 CA 8B DE 99 F9 39 B6 18 D4 5D EF CE 8E b%!..... 9...]... > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >write_socket(5,276) >write_socket(5,276) wrote 276 >got smb length of 100 >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20212 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20212 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >cli_init_creds: user samba domain MSHOME >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345778 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000000 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000d > 001a str: \PIPE\lsarpc. > 000027 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \lsarpc to machine localhost and bound anonymously. > lsa_OpenPolicy: struct lsa_OpenPolicy > in: struct lsa_OpenPolicy > system_name : * > system_name : 0x005c (92) > attr : * > attr: struct lsa_ObjectAttribute > len : 0x00000018 (24) > root_dir : NULL > object_name : NULL > attributes : 0x00000000 (0) > sec_desc : NULL > sec_qos : * > sec_qos: struct lsa_QosInfo > len : 0x0000000c (12) > impersonation_level : 0x0002 (2) > context_mode : 0x01 (1) > effective_only : 0x00 (0) > access_mask : 0x02000000 (33554432) > 0: LSA_POLICY_VIEW_LOCAL_INFORMATION > 0: LSA_POLICY_VIEW_AUDIT_INFORMATION > 0: LSA_POLICY_GET_PRIVATE_INFORMATION > 0: LSA_POLICY_TRUST_ADMIN > 0: LSA_POLICY_CREATE_ACCOUNT > 0: LSA_POLICY_CREATE_SECRET > 0: LSA_POLICY_CREATE_PRIVILEGE > 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS > 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS > 0: LSA_POLICY_AUDIT_LOG_ADMIN > 0: LSA_POLICY_SERVER_ADMIN > 0: LSA_POLICY_LOOKUP_NAMES > 0: LSA_POLICY_NOTIFICATION >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 0000002c > 0014 context_id: 0000 > 0016 opnum : 0006 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=68, this_data=68, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_OpenPolicy: struct lsa_OpenPolicy > out: struct lsa_OpenPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-13dbf54e0000 > result : NT_STATUS_OK > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > in: struct lsa_QueryInfoPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-13dbf54e0000 > level : LSA_POLICY_INFO_ACCOUNT_DOMAIN (5) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002e > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000016 > 0014 context_id: 0000 > 0016 opnum : 0007 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=46, this_data=46, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0074 > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 0000005c > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 116, data_len 92, ss_len 0 >rpc_api_pipe: got frag len of 116 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 184 bytes. > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > out: struct lsa_QueryInfoPolicy > info : * > info : * > info : union lsa_PolicyInformation(case 5) > account_domain: struct lsa_DomainInfo > name: struct lsa_StringLarge > length : 0x001c (28) > size : 0x001e (30) > string : * > string : 'LIPUS.FUBAR.SI' > sid : * > sid : S-1-5-21-1215170701-1004161298-3654541485 > result : NT_STATUS_OK > lsa_Close: struct lsa_Close > in: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-13dbf54e0000 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002c > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000014 > 0014 context_id: 0000 > 0016 opnum : 0000 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=44, this_data=44, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_Close: struct lsa_Close > out: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : NT_STATUS_OK >rpc_pipe_destructor: closed \lsarpc >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345678 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000001 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000e > 001a str: \PIPE\spoolss. > 000028 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \spoolss to machine localhost and bound anonymously. > spoolss_AddPrinterDriver: struct spoolss_AddPrinterDriver > in: struct spoolss_AddPrinterDriver > servername : * > servername : '\\LOCALHOST' > info_ctr : * > info_ctr: struct spoolss_AddDriverInfoCtr > level : 0x00000003 (3) > info : union spoolss_AddDriverInfo(case 3) > info3 : * > info3: struct spoolss_AddDriverInfo3 > version : SPOOLSS_DRIVER_VERSION_9X (0) > driver_name : * > driver_name : 'HP4L' > architecture : * > architecture : 'Windows 4.0' > driver_path : * > driver_path : 'ADOBEPS4.DRV' > data_file : * > data_file : 'HP4L.PPD' > config_file : NULL > help_file : * > help_file : 'ADOBEPS4.HLP' > monitor_name : * > monitor_name : 'PSMON.DLL' > default_datatype : * > default_datatype : 'RAW' > _ndr_size_dependent_files: 0x00000000 (0) > dependent_files : * > dependent_files: struct spoolss_StringArray > _ndr_size : 0x00000000 (0) > string: ARRAY(6) > [0] : 'ADOBEPS4.DRV' > [1] : 'HP4L.PPD' > [2] : 'ADOBEPS4.HLP' > [3] : 'PSMON.DLL' > [4] : 'ADFONTS.MFM' > [5] : 'ICONLIB.DLL' >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 01e8 > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 000001d0 > 0014 context_id: 0000 > 0016 opnum : 0009 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=488, this_data=488, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 001c > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000004 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 28, data_len 4, ss_len 0 >rpc_api_pipe: got frag len of 28 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 8 bytes. > spoolss_AddPrinterDriver: struct spoolss_AddPrinterDriver > out: struct spoolss_AddPrinterDriver > result : WERR_OK >Printer Driver HP4L successfully installed. >rpc_pipe_destructor: closed \spoolss >write_socket(5,39) >write_socket(5,39) wrote 39 >got smb length of 35 >size=35 >smb_com=0x71 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=1 >smb_pid=20212 >smb_uid=100 >smb_mid=15 >smt_wct=0 >smb_bcc=0 > >Running command: rpcclient localhost -N -A /tmp/4d31db127e8f3 -c 'setdriver HP4L HP4L' >INFO: Current debug levels: > all: True/10 > tdb: False/0 > printdrivers: False/0 > lanman: False/0 > smb: False/0 > rpc_parse: False/0 > rpc_srv: False/0 > rpc_cli: False/0 > passdb: False/0 > sam: False/0 > auth: False/0 > winbind: False/0 > vfs: False/0 > idmap: False/0 > quota: False/0 > acls: False/0 > locking: False/0 > msdfs: False/0 > dmapi: False/0 > registry: False/0 >doing parameter dos charset = 850 >Attempting to register new charset UCS-2LE >Registered charset UCS-2LE >Attempting to register new charset UTF-16LE >Registered charset UTF-16LE >Attempting to register new charset UCS-2BE >Registered charset UCS-2BE >Attempting to register new charset UTF-16BE >Registered charset UTF-16BE >Attempting to register new charset UTF8 >Registered charset UTF8 >Attempting to register new charset UTF-8 >Registered charset UTF-8 >Attempting to register new charset ASCII >Registered charset ASCII >Attempting to register new charset 646 >Registered charset 646 >Attempting to register new charset ISO-8859-1 >Registered charset ISO-8859-1 >Attempting to register new charset UCS2-HEX >Registered charset UCS2-HEX >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >doing parameter unix charset = UTF-8 >doing parameter display charset = UTF-8 >doing parameter encrypt passwords = yes >doing parameter dns proxy = no >doing parameter create mask = 0777 >doing parameter directory mask = 0777 >doing parameter force user = samba >doing parameter force group = samba >pm_process() returned Yes >lp_servicenumber: couldn't find homes >set_server_role: role = ROLE_STANDALONE >Connecting to host=localhost >Opening cache file at /var/cache/samba/gencache.tdb >Opening cache file at /var/cache/samba/gencache_notrans.tdb >Cache entry with key = AD_SITENAME/DOMAIN/ couldn't be found >sitename_fetch: No stored sitename for >internal_resolve_name: looking up localhost#20 (sitename (null)) >Returning valid cache entry: key = NBT/LOCALHOST#20, value = 127.0.0.1:0, timeout = Sat Jan 15 18:47:15 2011 >name localhost#20 found. >Running timed event "tevent_req_timedout" 0xb78fcc50 >Connecting to 127.0.0.1 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 50388 > SO_RCVBUF = 87616 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >Doing spnego session setup (blob length=58) >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=NONE > &negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0006 (6) > DomainNameMaxLen : 0x0006 (6) > DomainName : * > DomainName : 'MSHOME' > WorkstationLen : 0x000e (14) > WorkstationMaxLen : 0x000e (14) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' >write_socket(5,172) >write_socket(5,172) wrote 172 >got smb length of 284 >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20214 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 E7 5B 24 68 CC FE 7A 28 00 ......`. [$h..z(. >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20214 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 E7 5B 24 68 CC FE 7A 28 00 ......`. [$h..z(. >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . > &challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x001c (28) > TargetNameMaxLen : 0x001c (28) > TargetName : * > TargetName : 'LIPUS.FUBAR.SI' > NegotiateFlags : 0x608a8215 (1619690005) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : e75b2468ccfe7a28 > Reserved : 0000000000000000 > TargetInfoLen : 0x0056 (86) > TargetNameInfoMaxLen : 0x0056 (86) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x000a (10) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'lipus' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >Got challenge flags: >Got NTLMSSP neg_flags=0x608a8215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP challenge set by NTLM2 >challenge is: >[0000] 12 6A DC 45 F7 B2 DD 98 .j.E.... > &authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : 6176fb23e65314ab00000000000000000000000000000000 > NtChallengeResponseLen : 0x0018 (24) > NtChallengeResponseMaxLen: 0x0018 (24) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 24) > v1: struct NTLM_RESPONSE > Response : 05fb7953d1f1b8eb52215f3323cb1fe7ea8d9756e64a9aae > DomainNameLen : 0x000c (12) > DomainNameMaxLen : 0x000c (12) > DomainName : * > DomainName : 'MSHOME' > UserNameLen : 0x000a (10) > UserNameMaxLen : 0x000a (10) > UserName : * > UserName : 'samba' > WorkstationLen : 0x001c (28) > WorkstationMaxLen : 0x001c (28) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] D3 EC F5 3C 00 F3 CA B0 D6 10 F2 1B 5A 43 84 26 ...<.... ....ZC.& > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >write_socket(5,276) >write_socket(5,276) wrote 276 >got smb length of 100 >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20214 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20214 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >cli_init_creds: user samba domain MSHOME >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345778 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000000 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000001 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000d > 001a str: \PIPE\lsarpc. > 000027 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \lsarpc to machine localhost and bound anonymously. > lsa_OpenPolicy: struct lsa_OpenPolicy > in: struct lsa_OpenPolicy > system_name : * > system_name : 0x005c (92) > attr : * > attr: struct lsa_ObjectAttribute > len : 0x00000018 (24) > root_dir : NULL > object_name : NULL > attributes : 0x00000000 (0) > sec_desc : NULL > sec_qos : * > sec_qos: struct lsa_QosInfo > len : 0x0000000c (12) > impersonation_level : 0x0002 (2) > context_mode : 0x01 (1) > effective_only : 0x00 (0) > access_mask : 0x02000000 (33554432) > 0: LSA_POLICY_VIEW_LOCAL_INFORMATION > 0: LSA_POLICY_VIEW_AUDIT_INFORMATION > 0: LSA_POLICY_GET_PRIVATE_INFORMATION > 0: LSA_POLICY_TRUST_ADMIN > 0: LSA_POLICY_CREATE_ACCOUNT > 0: LSA_POLICY_CREATE_SECRET > 0: LSA_POLICY_CREATE_PRIVILEGE > 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS > 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS > 0: LSA_POLICY_AUDIT_LOG_ADMIN > 0: LSA_POLICY_SERVER_ADMIN > 0: LSA_POLICY_LOOKUP_NAMES > 0: LSA_POLICY_NOTIFICATION >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 0000002c > 0014 context_id: 0000 > 0016 opnum : 0006 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=68, this_data=68, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000002 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_OpenPolicy: struct lsa_OpenPolicy > out: struct lsa_OpenPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-13dbf74e0000 > result : NT_STATUS_OK > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > in: struct lsa_QueryInfoPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-13dbf74e0000 > level : LSA_POLICY_INFO_ACCOUNT_DOMAIN (5) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002e > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000016 > 0014 context_id: 0000 > 0016 opnum : 0007 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=46, this_data=46, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0074 > 000a auth_len : 0000 > 000c call_id : 00000003 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 0000005c > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 116, data_len 92, ss_len 0 >rpc_api_pipe: got frag len of 116 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 184 bytes. > lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy > out: struct lsa_QueryInfoPolicy > info : * > info : * > info : union lsa_PolicyInformation(case 5) > account_domain: struct lsa_DomainInfo > name: struct lsa_StringLarge > length : 0x001c (28) > size : 0x001e (30) > string : * > string : 'LIPUS.FUBAR.SI' > sid : * > sid : S-1-5-21-1215170701-1004161298-3654541485 > result : NT_STATUS_OK > lsa_Close: struct lsa_Close > in: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-314d-13dbf74e0000 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 002c > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 00000014 > 0014 context_id: 0000 > 0016 opnum : 0000 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=44, this_data=44, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000004 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > lsa_Close: struct lsa_Close > out: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : NT_STATUS_OK >rpc_pipe_destructor: closed \lsarpc >Bind RPC Pipe: host localhost auth_type 0, auth_level 1 >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0b > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0048 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_rb > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 00000000 > 0018 num_contexts: 01 > 001c context_id : 0000 > 001e num_transfer_syntaxes: 01 > 00001f smb_io_rpc_iface > 000020 smb_io_uuid uuid > 0020 data : 12345678 > 0024 data : 1234 > 0026 data : abcd > 0028 data : ef 00 > 002a data : 01 23 45 67 89 ab > 0030 version: 00000001 > 000034 smb_io_rpc_iface > 000034 smb_io_uuid uuid > 0034 data : 8a885d04 > 0038 data : 1ceb > 003a data : 11c9 > 003c data : 9f e8 > 003e data : 08 00 2b 10 48 60 > 0044 version: 00000002 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 68 bytes. >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 0c > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0044 > 000a auth_len : 0000 > 000c call_id : 00000005 >000010 smb_io_rpc_hdr_ba > 000010 smb_io_rpc_hdr_bba > 0010 max_tsize: 10b8 > 0012 max_rsize: 10b8 > 0014 assoc_gid: 000053f0 > 000018 smb_io_rpc_addr_str > 0018 len: 000e > 001a str: \PIPE\spoolss. > 000028 smb_io_rpc_results > 0028 num_results: 01 > 002c result : 0000 > 002e reason : 0000 > 000030 smb_io_rpc_iface > 000030 smb_io_uuid uuid > 0030 data : 8a885d04 > 0034 data : 1ceb > 0036 data : 11c9 > 0038 data : 9f e8 > 003a data : 08 00 2b 10 48 60 > 0040 version: 00000002 >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \spoolss to machine localhost and bound anonymously. > spoolss_OpenPrinterEx: struct spoolss_OpenPrinterEx > in: struct spoolss_OpenPrinterEx > printername : * > printername : '\\LOCALHOST\HP4L' > datatype : NULL > devmode_ctr: struct spoolss_DevmodeContainer > _ndr_size : 0x00000000 (0) > devmode : NULL > access_mask : 0x000f000c (983052) > 0: SERVER_ACCESS_ADMINISTER > 0: SERVER_ACCESS_ENUMERATE > 1: PRINTER_ACCESS_ADMINISTER > 1: PRINTER_ACCESS_USE > 0: JOB_ACCESS_ADMINISTER > 0: JOB_ACCESS_READ > level : 0x00000001 (1) > userlevel : union spoolss_UserLevel(case 1) > level1 : * > level1: struct spoolss_UserLevel1 > size : 0x0000001c (28) > client : * > client : '\\LIPUS.FUBAR.SI' > user : * > user : 'samba' > build : 0x00000565 (1381) > major : UNKNOWN_ENUM_VALUE (2) > minor : SPOOLSS_MINOR_VERSION_0 (0) > processor : PROCESSOR_ARCHITECTURE_INTEL (0) >000000 smb_io_rpc_hdr hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 00 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 00cc > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_req hdr_req > 0010 alloc_hint: 000000b4 > 0014 context_id: 0000 > 0016 opnum : 0045 >rpc_api_pipe: host localhost >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=204, this_data=204, max_data=4280, param_offset=82, param_disp=0, data_disp=0 >000000 smb_io_rpc_hdr rpc_hdr > 0000 major : 05 > 0001 minor : 00 > 0002 pkt_type : 02 > 0003 flags : 03 > 0004 pack_type0: 10 > 0005 pack_type1: 00 > 0006 pack_type2: 00 > 0007 pack_type3: 00 > 0008 frag_len : 0030 > 000a auth_len : 0000 > 000c call_id : 00000006 >000010 smb_io_rpc_hdr_resp rpc_hdr_resp > 0010 alloc_hint: 00000018 > 0014 context_id: 0000 > 0016 cancel_ct : 00 > 0017 reserved : 00 >cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0 >rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK >rpc_api_pipe: host localhost returned 48 bytes. > spoolss_OpenPrinterEx: struct spoolss_OpenPrinterEx > out: struct spoolss_OpenPrinterEx > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_INVALID_PARAM >result was WERR_INVALID_PARAM >rpc_pipe_destructor: closed \spoolss >write_socket(5,39) >write_socket(5,39) wrote 39 >got smb length of 35 >size=35 >smb_com=0x71 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=1 >smb_pid=20214 >smb_uid=100 >smb_mid=15 >smt_wct=0 >smb_bcc=0 > >Unable to set Windows printer driver (1)! >Running command: smbclient //localhost/print$ -N -A /tmp/4d31db1365aa8 -c 'mkdir W32X86;put /tmp/4d31db0d3bfb7 W32X86/HP4L.ppd;put /usr/share/cups/drivers/ps5ui.dll W32X86/ps5ui.dll;put /usr/share/cups/drivers/pscript.hlp W32X86/pscript.hlp;put /usr/share/cups/drivers/pscript.ntf W32X86/pscript.ntf;put /usr/share/cups/drivers/pscript5.dll W32X86/pscript5.dll' >Domain=[MSHOME] OS=[Unix] Server=[Samba 3.5.6] >putting file /tmp/4d31db0d3bfb7 as \W32X86/HP4L.ppd (1871.4 kb/s) (average 1871.4 kb/s) >putting file /usr/share/cups/drivers/ps5ui.dll as \W32X86/ps5ui.dll (12599.9 kb/s) (average 7518.0 kb/s) >putting file /usr/share/cups/drivers/pscript.hlp as \W32X86/pscript.hlp (2825.3 kb/s) (average 6009.7 kb/s) >putting file /usr/share/cups/drivers/pscript.ntf as \W32X86/pscript.ntf (25802.1 kb/s) (average 16247.2 kb/s) >putting file /usr/share/cups/drivers/pscript5.dll as \W32X86/pscript5.dll (22224.9 kb/s) (average 17780.0 kb/s) >NT_STATUS_OBJECT_NAME_COLLISION making remote directory \W32X86 > >Running command: smbclient //localhost/print$ -N -A /tmp/4d31db1365aa8 -c 'put /usr/share/cups/drivers/cups6.ini W32X86/cups6.ini;put /usr/share/cups/drivers/cupsps6.dll W32X86/cupsps6.dll;put /usr/share/cups/drivers/cupsui6.dll W32X86/cupsui6.dll' >Domain=[MSHOME] OS=[Unix] Server=[Samba 3.5.6] >putting file /usr/share/cups/drivers/cups6.ini as \W32X86/cups6.ini (7.8 kb/s) (average 7.8 kb/s) >putting file /usr/share/cups/drivers/cupsps6.dll as \W32X86/cupsps6.dll (1363.7 kb/s) (average 685.8 kb/s) >putting file /usr/share/cups/drivers/cupsui6.dll as \W32X86/cupsui6.dll (1483.5 kb/s) (average 951.7 kb/s) > >Running command: rpcclient localhost -N -A /tmp/4d31db1365aa8 -c 'adddriver "Windows NT x86" "HP4L:pscript5.dll:HP4L.ppd:ps5ui.dll:pscript.hlp:NULL:RAW:pscript5.dll,HP4L.ppd,ps5ui.dll,pscript.hlp,pscript.ntf,cups6.ini,cupsps6.dll,cupsui6.dll"' >INFO: Current debug levels: > all: True/10 > tdb: False/0 > printdrivers: False/0 > lanman: False/0 > smb: False/0 > rpc_parse: False/0 > rpc_srv: False/0 > rpc_cli: False/0 > passdb: False/0 > sam: False/0 > auth: False/0 > winbind: False/0 > vfs: False/0 > idmap: False/0 > quota: False/0 > acls: False/0 > locking: False/0 > msdfs: False/0 > dmapi: False/0 > registry: False/0 >doing parameter dos charset = 850 >Attempting to register new charset UCS-2LE >Registered charset UCS-2LE >Attempting to register new charset UTF-16LE >Registered charset UTF-16LE >Attempting to register new charset UCS-2BE >Registered charset UCS-2BE >Attempting to register new charset UTF-16BE >Registered charset UTF-16BE >Attempting to register new charset UTF8 >Registered charset UTF8 >Attempting to register new charset UTF-8 >Registered charset UTF-8 >Attempting to register new charset ASCII >Registered charset ASCII >Attempting to register new charset 646 >Registered charset 646 >Attempting to register new charset ISO-8859-1 >Registered charset ISO-8859-1 >Attempting to register new charset UCS2-HEX >Registered charset UCS2-HEX >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >Substituting charset 'UTF-8' for LOCALE >doing parameter unix charset = UTF-8 >doing parameter display charset = UTF-8 >doing parameter encrypt passwords = yes >doing parameter dns proxy = no >doing parameter create mask = 0777 >doing parameter directory mask = 0777 >doing parameter force user = samba >doing parameter force group = samba >pm_process() returned Yes >lp_servicenumber: couldn't find homes >set_server_role: role = ROLE_STANDALONE >Connecting to host=localhost >Opening cache file at /var/cache/samba/gencache.tdb >Opening cache file at /var/cache/samba/gencache_notrans.tdb >Cache entry with key = AD_SITENAME/DOMAIN/ couldn't be found >sitename_fetch: No stored sitename for >internal_resolve_name: looking up localhost#20 (sitename (null)) >Returning valid cache entry: key = NBT/LOCALHOST#20, value = 127.0.0.1:0, timeout = Sat Jan 15 18:47:15 2011 >name localhost#20 found. >Running timed event "tevent_req_timedout" 0xb7722c50 >Connecting to 127.0.0.1 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 50388 > SO_RCVBUF = 87616 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >Doing spnego session setup (blob length=58) >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=NONE > &negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0006 (6) > DomainNameMaxLen : 0x0006 (6) > DomainName : * > DomainName : 'MSHOME' > WorkstationLen : 0x000e (14) > WorkstationMaxLen : 0x000e (14) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' >write_socket(5,172) >write_socket(5,172) wrote 172 >got smb length of 284 >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20220 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 C6 51 A4 E6 A7 3C 7A 6C 00 ......`. Q...<zl. >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . >size=284 >smb_com=0x73 >smb_rcls=22 >smb_reh=0 >smb_err=49152 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20220 >smb_uid=100 >smb_mid=2 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 193 (0xC1) >smb_bcc=241 >[0000] A1 81 BE 30 81 BB A0 03 0A 01 01 A1 0C 06 0A 2B ...0.... .......+ >[0010] 06 01 04 01 82 37 02 02 0A A2 81 A5 04 81 A2 4E .....7.. .......N >[0020] 54 4C 4D 53 53 50 00 02 00 00 00 1C 00 1C 00 30 TLMSSP.. .......0 >[0030] 00 00 00 15 82 8A 60 C6 51 A4 E6 A7 3C 7A 6C 00 ......`. Q...<zl. >[0040] 00 00 00 00 00 00 00 56 00 56 00 4C 00 00 00 4C .......V .V.L...L >[0050] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0060] 00 41 00 52 00 2E 00 53 00 49 00 02 00 1C 00 4C .A.R...S .I.....L >[0070] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[0080] 00 41 00 52 00 2E 00 53 00 49 00 01 00 1C 00 4C .A.R...S .I.....L >[0090] 00 49 00 50 00 55 00 53 00 2E 00 46 00 55 00 42 .I.P.U.S ...F.U.B >[00A0] 00 41 00 52 00 2E 00 53 00 49 00 04 00 00 00 03 .A.R...S .I...... >[00B0] 00 0A 00 6C 00 69 00 70 00 75 00 73 00 00 00 00 ...l.i.p .u.s.... >[00C0] 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 00 6D .U.n.i.x ...S.a.m >[00D0] 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E 00 36 .b.a. .3 ...5...6 >[00E0] 00 00 00 4D 00 53 00 48 00 4F 00 4D 00 45 00 00 ...M.S.H .O.M.E.. >[00F0] 00 . > &challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x001c (28) > TargetNameMaxLen : 0x001c (28) > TargetName : * > TargetName : 'LIPUS.FUBAR.SI' > NegotiateFlags : 0x608a8215 (1619690005) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : c651a4e6a73c7a6c > Reserved : 0000000000000000 > TargetInfoLen : 0x0056 (86) > TargetNameInfoMaxLen : 0x0056 (86) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x001c (28) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'LIPUS.FUBAR.SI' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x000a (10) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'lipus' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >Got challenge flags: >Got NTLMSSP neg_flags=0x608a8215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP challenge set by NTLM2 >challenge is: >[0000] D0 6F 3D 59 F0 6F EC 3D .o=Y.o.= > &authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : 9ba44b6e563d2ece00000000000000000000000000000000 > NtChallengeResponseLen : 0x0018 (24) > NtChallengeResponseMaxLen: 0x0018 (24) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 24) > v1: struct NTLM_RESPONSE > Response : fbc641e19ae932bc6b1804d7df93c7025c131ef1e6ebb0a7 > DomainNameLen : 0x000c (12) > DomainNameMaxLen : 0x000c (12) > DomainName : * > DomainName : 'MSHOME' > UserNameLen : 0x000a (10) > UserNameMaxLen : 0x000a (10) > UserName : * > UserName : 'samba' > WorkstationLen : 0x001c (28) > WorkstationMaxLen : 0x001c (28) > Workstation : * > Workstation : 'LIPUS.FUBAR.SI' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] 7C 71 93 4F 39 A9 1C 73 1F 30 BD C1 24 32 D1 CF |q.O9..s .0..$2.. > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >write_socket(5,276) >write_socket(5,276) wrote 276 >got smb length of 100 >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20220 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. . >size=100 >smb_com=0x73 >smb_rcls=0 >smb_reh=0 >smb_err=0 >smb_flg=136 >smb_flg2=51203 >smb_tid=0 >smb_pid=20220 >smb_uid=100 >smb_mid=3 >smt_wct=4 >smb_vwv[ 0]= 255 (0xFF) >smb_vwv[ 1]= 0 (0x0) >smb_vwv[ 2]= 0 (0x0) >smb_vwv[ 3]= 9 (0x9) >smb_bcc=57 >[0000] A1 07 30 05 A0 03 0A 01 00 55 00 6E 00 69 00 78 ..0..... .U.n.i.x >[0010] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m .b.a. .3 >[0020] 00 2E 00 35 00 2E 00 36 00 00 00 4D 00 53 00 48 ...5...6 ...M.S.H >[0030] 00 4F 00 4D 00 45 00 00 00 .O.M.E.. .
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 7641
:
5915
|
5924
|
5932
|
5933
|
5934
|
6094
|
6097
|
6181
| 6206 |
6438