Bug 14761 - unable to access passwordless windows 10 shares
Summary: unable to access passwordless windows 10 shares
Status: RESOLVED DUPLICATE of bug 14935
Alias: None
Product: Samba 4.1 and newer
Classification: Unclassified
Component: libsmbclient (show other bugs)
Version: 4.14.2
Hardware: All All
: P5 normal (vote)
Target Milestone: ---
Assignee: Samba QA Contact
QA Contact: Samba QA Contact
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2021-07-15 14:18 UTC by Harald Sitter
Modified: 2021-12-21 10:18 UTC (History)
2 users (show)

See Also:


Attachments
capture+debug 4.11, 4.13, 4.14 (12.08 KB, application/x-xz)
2021-07-15 17:03 UTC, Harald Sitter
no flags Details
smb confs (3.86 KB, application/x-xz)
2021-07-19 13:49 UTC, Harald Sitter
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Harald Sitter 2021-07-15 14:18:26 UTC
originally from https://bugs.kde.org/show_bug.cgi?id=439747

On windows 10: disable password protected sharing, give Everyone access to some share. Try to browse the server as anonymous.

This works fine with libsmbclient 4.13 (fedora 33) but no longer does with 4.14 (fedora 34, also tried manjaro for good measure same problem there). Latest KDE code on top of ubuntu 20.04's ancient libsmbclient also works as expected. So, this more than likely broke in libsmbclient 4.14.

INFO: Current debug levels:
  all: 10
  tdb: 10
  printdrivers: 10
  lanman: 10
  smb: 10
  rpc_parse: 10
  rpc_srv: 10
  rpc_cli: 10
  passdb: 10
  sam: 10
  auth: 10
  winbind: 10
  vfs: 10
  idmap: 10
  quota: 10
  acls: 10
  locking: 10
  msdfs: 10
  dmapi: 10
  registry: 10
  scavenger: 10
  dns: 10
  ldb: 10
  tevent: 10
  auth_audit: 10
  auth_json_audit: 10
  kerberos: 10
  drs_repl: 10
  smb2: 10
  smb2_credits: 10
  dsdb_audit: 10
  dsdb_json_audit: 10
  dsdb_password_audit: 10
  dsdb_password_json_audit: 10
  dsdb_transaction_audit: 10
  dsdb_transaction_json_audit: 10
  dsdb_group_audit: 10
  dsdb_group_json_audit: 10
Using netbios name LOCALHOST-LIVE.
Using workgroup SAMBA.
parsed path: fname='smb://192.168.100.245/' server='192.168.100.245' share='' path='' options=''
SMBC_check_options(): server='192.168.100.245' share='' path='' options=''
SMBC_server: server_n=[192.168.100.245] server=[192.168.100.245]
 -> server_n=[192.168.100.245] server=[192.168.100.245]
Connecting to 192.168.100.245 at port 139
Connecting to 192.168.100.245 at port 139
Connecting to 192.168.100.245 at port 445
Socket options:
	SO_KEEPALIVE = 0
	SO_REUSEADDR = 0
	SO_BROADCAST = 0
	TCP_NODELAY = 1
	TCP_KEEPCNT = 9
	TCP_KEEPIDLE = 7200
	TCP_KEEPINTVL = 75
	IPTOS_LOWDELAY = 0
	IPTOS_THROUGHPUT = 0
	SO_REUSEPORT = 0
	SO_SNDBUF = 87040
	SO_RCVBUF = 131072
	SO_SNDLOWAT = 1
	SO_RCVLOWAT = 1
	SO_SNDTIMEO = 0
	SO_RCVTIMEO = 0
	TCP_QUICKACK = 1
	TCP_DEFER_ACCEPT = 0
	TCP_USER_TIMEOUT = 0
cli_session_setup_spnego_send: Connect to 192.168.100.245 as liveuser@SAMBA using SPNEGO
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
Starting GENSEC mechanism spnego
Starting GENSEC submechanism gse_krb5
Cannot do GSE to an IP address
Failed to start GENSEC client mech gse_krb5: NT_STATUS_INVALID_PARAMETER
Starting GENSEC submechanism ntlmssp
     negotiate: struct NEGOTIATE_MESSAGE
        Signature                : 'NTLMSSP'
        MessageType              : NtLmNegotiate (1)
        NegotiateFlags           : 0x62088215 (1644724757)
               1: NTLMSSP_NEGOTIATE_UNICODE
               0: NTLMSSP_NEGOTIATE_OEM    
               1: NTLMSSP_REQUEST_TARGET   
               1: NTLMSSP_NEGOTIATE_SIGN   
               0: NTLMSSP_NEGOTIATE_SEAL   
               0: NTLMSSP_NEGOTIATE_DATAGRAM
               0: NTLMSSP_NEGOTIATE_LM_KEY 
               0: NTLMSSP_NEGOTIATE_NETWARE
               1: NTLMSSP_NEGOTIATE_NTLM   
               0: NTLMSSP_NEGOTIATE_NT_ONLY
               0: NTLMSSP_ANONYMOUS        
               0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
               0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
               0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
               1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
               0: NTLMSSP_TARGET_TYPE_DOMAIN
               0: NTLMSSP_TARGET_TYPE_SERVER
               0: NTLMSSP_TARGET_TYPE_SHARE
               1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
               0: NTLMSSP_NEGOTIATE_IDENTIFY
               0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
               0: NTLMSSP_NEGOTIATE_TARGET_INFO
               1: NTLMSSP_NEGOTIATE_VERSION
               1: NTLMSSP_NEGOTIATE_128    
               1: NTLMSSP_NEGOTIATE_KEY_EXCH
               0: NTLMSSP_NEGOTIATE_56     
        DomainNameLen            : 0x0000 (0)
        DomainNameMaxLen         : 0x0000 (0)
        DomainName               : *
            DomainName               : ''
        WorkstationLen           : 0x0000 (0)
        WorkstationMaxLen        : 0x0000 (0)
        Workstation              : *
            Workstation              : ''
        Version: struct ntlmssp_VERSION
            ProductMajorVersion      : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
            ProductMinorVersion      : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
            ProductBuild             : 0x0000 (0)
            Reserved: ARRAY(3)
                [0]                      : 0x00 (0)
                [1]                      : 0x00 (0)
                [2]                      : 0x00 (0)
            NTLMRevisionCurrent      : NTLMSSP_REVISION_W2K3 (15)
gensec_update_send: ntlmssp[0x55de1e7be850]: subreq: 0x55de1e7a7620
gensec_update_send: spnego[0x55de1e79f550]: subreq: 0x55de1e7bc290
gensec_update_done: ntlmssp[0x55de1e7be850]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55de1e7a7620/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)]  state[struct gensec_ntlmssp_update_state (0x55de1e7a77d0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215]
gensec_update_done: spnego[0x55de1e79f550]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55de1e7bc290/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)]  state[struct gensec_spnego_update_state (0x55de1e7bc440)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
  NTLMSSP_NEGOTIATE_UNICODE
  NTLMSSP_REQUEST_TARGET
  NTLMSSP_NEGOTIATE_SIGN
  NTLMSSP_NEGOTIATE_NTLM
  NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  NTLMSSP_TARGET_TYPE_SERVER
  NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  NTLMSSP_NEGOTIATE_TARGET_INFO
  NTLMSSP_NEGOTIATE_VERSION
  NTLMSSP_NEGOTIATE_128
  NTLMSSP_NEGOTIATE_KEY_EXCH
     challenge: struct CHALLENGE_MESSAGE
        Signature                : 'NTLMSSP'
        MessageType              : NtLmChallenge (0x2)
        TargetNameLen            : 0x001e (30)
        TargetNameMaxLen         : 0x001e (30)
        TargetName               : *
            TargetName               : 'WINDEV2002EVAL1'
        NegotiateFlags           : 0x628a8215 (1653244437)
               1: NTLMSSP_NEGOTIATE_UNICODE
               0: NTLMSSP_NEGOTIATE_OEM    
               1: NTLMSSP_REQUEST_TARGET   
               1: NTLMSSP_NEGOTIATE_SIGN   
               0: NTLMSSP_NEGOTIATE_SEAL   
               0: NTLMSSP_NEGOTIATE_DATAGRAM
               0: NTLMSSP_NEGOTIATE_LM_KEY 
               0: NTLMSSP_NEGOTIATE_NETWARE
               1: NTLMSSP_NEGOTIATE_NTLM   
               0: NTLMSSP_NEGOTIATE_NT_ONLY
               0: NTLMSSP_ANONYMOUS        
               0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
               0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
               0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
               1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
               0: NTLMSSP_TARGET_TYPE_DOMAIN
               1: NTLMSSP_TARGET_TYPE_SERVER
               0: NTLMSSP_TARGET_TYPE_SHARE
               1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
               0: NTLMSSP_NEGOTIATE_IDENTIFY
               0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
               1: NTLMSSP_NEGOTIATE_TARGET_INFO
               1: NTLMSSP_NEGOTIATE_VERSION
               1: NTLMSSP_NEGOTIATE_128    
               1: NTLMSSP_NEGOTIATE_KEY_EXCH
               0: NTLMSSP_NEGOTIATE_56     
        ServerChallenge          : 539bdbd537c046e3
        Reserved                 : 0000000000000000
        TargetInfoLen            : 0x0098 (152)
        TargetInfoMaxLen         : 0x0098 (152)
        TargetInfo               : *
            TargetInfo: struct AV_PAIR_LIST
                count                    : 0x00000006 (6)
                pair: ARRAY(6)
                    pair: struct AV_PAIR
                        AvId                     : MsvAvNbDomainName (0x2)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x2)
                        AvNbDomainName           : 'WINDEV2002EVAL1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvNbComputerName (0x1)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x1)
                        AvNbComputerName         : 'WINDEV2002EVAL1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvDnsDomainName (0x4)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x4)
                        AvDnsDomainName          : 'WinDev2002Eval1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvDnsComputerName (0x3)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x3)
                        AvDnsComputerName        : 'WinDev2002Eval1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvTimestamp (0x7)
                        AvLen                    : 0x0008 (8)
                        Value                    : union ntlmssp_AvValue(case 0x7)
                        AvTimestamp              : Thu Jul 15 03:40:59 PM 2021 EDT
                    pair: struct AV_PAIR
                        AvId                     : MsvAvEOL (0x0)
                        AvLen                    : 0x0000 (0)
                        Value                    : union ntlmssp_AvValue(case 0x0)
        Version: struct ntlmssp_VERSION
            ProductMajorVersion      : NTLMSSP_WINDOWS_MAJOR_VERSION_10 (0xA)
            ProductMinorVersion      : NTLMSSP_WINDOWS_MINOR_VERSION_0 (0x0)
            ProductBuild             : 0x47ba (18362)
            Reserved                 : 000000
            NTLMRevisionCurrent      : NTLMSSP_REVISION_W2K3 (0xF)
gensec_update_send: ntlmssp[0x55de1e7be850]: subreq: 0x55de1e7a7960
gensec_update_send: spnego[0x55de1e79f550]: subreq: 0x55de1e7d0bf0
gensec_update_done: ntlmssp[0x55de1e7be850]: NT_STATUS_WRONG_CREDENTIAL_HANDLE tevent_req[0x55de1e7a7960/../../auth/ntlmssp/ntlmssp.c:180]: state[3] error[-7963671676338568462 (0x917B5ACDC00002F2)]  state[struct gensec_ntlmssp_update_state (0x55de1e7a7b10)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:218]
gensec_spnego_client_negTokenTarg_step: SPNEGO(ntlmssp) login failed: NT_STATUS_WRONG_CREDENTIAL_HANDLE
gensec_update_done: spnego[0x55de1e79f550]: NT_STATUS_WRONG_CREDENTIAL_HANDLE tevent_req[0x55de1e7d0bf0/../../auth/gensec/spnego.c:1631]: state[3] error[-7963671676338568462 (0x917B5ACDC00002F2)]  state[struct gensec_spnego_update_state (0x55de1e7d0da0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2039]
SPNEGO login failed: The supplied credential handle does not match the credential that is associated with the security context.
cli_session_setup_spnego_send: Connect to 192.168.100.245 as (null) using SPNEGO
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
     negotiate: struct NEGOTIATE_MESSAGE
        Signature                : 'NTLMSSP'
        MessageType              : NtLmNegotiate (1)
        NegotiateFlags           : 0x62088215 (1644724757)
               1: NTLMSSP_NEGOTIATE_UNICODE
               0: NTLMSSP_NEGOTIATE_OEM    
               1: NTLMSSP_REQUEST_TARGET   
               1: NTLMSSP_NEGOTIATE_SIGN   
               0: NTLMSSP_NEGOTIATE_SEAL   
               0: NTLMSSP_NEGOTIATE_DATAGRAM
               0: NTLMSSP_NEGOTIATE_LM_KEY 
               0: NTLMSSP_NEGOTIATE_NETWARE
               1: NTLMSSP_NEGOTIATE_NTLM   
               0: NTLMSSP_NEGOTIATE_NT_ONLY
               0: NTLMSSP_ANONYMOUS        
               0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
               0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
               0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
               1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
               0: NTLMSSP_TARGET_TYPE_DOMAIN
               0: NTLMSSP_TARGET_TYPE_SERVER
               0: NTLMSSP_TARGET_TYPE_SHARE
               1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
               0: NTLMSSP_NEGOTIATE_IDENTIFY
               0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
               0: NTLMSSP_NEGOTIATE_TARGET_INFO
               1: NTLMSSP_NEGOTIATE_VERSION
               1: NTLMSSP_NEGOTIATE_128    
               1: NTLMSSP_NEGOTIATE_KEY_EXCH
               0: NTLMSSP_NEGOTIATE_56     
        DomainNameLen            : 0x0000 (0)
        DomainNameMaxLen         : 0x0000 (0)
        DomainName               : *
            DomainName               : ''
        WorkstationLen           : 0x0000 (0)
        WorkstationMaxLen        : 0x0000 (0)
        Workstation              : *
            Workstation              : ''
        Version: struct ntlmssp_VERSION
            ProductMajorVersion      : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
            ProductMinorVersion      : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
            ProductBuild             : 0x0000 (0)
            Reserved: ARRAY(3)
                [0]                      : 0x00 (0)
                [1]                      : 0x00 (0)
                [2]                      : 0x00 (0)
            NTLMRevisionCurrent      : NTLMSSP_REVISION_W2K3 (15)
gensec_update_send: ntlmssp[0x55de1e7be850]: subreq: 0x55de1e7a7960
gensec_update_send: spnego[0x55de1e79f550]: subreq: 0x55de1e7d0b70
gensec_update_done: ntlmssp[0x55de1e7be850]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55de1e7a7960/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)]  state[struct gensec_ntlmssp_update_state (0x55de1e7a7b10)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215]
gensec_update_done: spnego[0x55de1e79f550]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55de1e7d0b70/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)]  state[struct gensec_spnego_update_state (0x55de1e7d0d20)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
  NTLMSSP_NEGOTIATE_UNICODE
  NTLMSSP_REQUEST_TARGET
  NTLMSSP_NEGOTIATE_SIGN
  NTLMSSP_NEGOTIATE_NTLM
  NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  NTLMSSP_TARGET_TYPE_SERVER
  NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  NTLMSSP_NEGOTIATE_TARGET_INFO
  NTLMSSP_NEGOTIATE_VERSION
  NTLMSSP_NEGOTIATE_128
  NTLMSSP_NEGOTIATE_KEY_EXCH
     challenge: struct CHALLENGE_MESSAGE
        Signature                : 'NTLMSSP'
        MessageType              : NtLmChallenge (0x2)
        TargetNameLen            : 0x001e (30)
        TargetNameMaxLen         : 0x001e (30)
        TargetName               : *
            TargetName               : 'WINDEV2002EVAL1'
        NegotiateFlags           : 0x628a8215 (1653244437)
               1: NTLMSSP_NEGOTIATE_UNICODE
               0: NTLMSSP_NEGOTIATE_OEM    
               1: NTLMSSP_REQUEST_TARGET   
               1: NTLMSSP_NEGOTIATE_SIGN   
               0: NTLMSSP_NEGOTIATE_SEAL   
               0: NTLMSSP_NEGOTIATE_DATAGRAM
               0: NTLMSSP_NEGOTIATE_LM_KEY 
               0: NTLMSSP_NEGOTIATE_NETWARE
               1: NTLMSSP_NEGOTIATE_NTLM   
               0: NTLMSSP_NEGOTIATE_NT_ONLY
               0: NTLMSSP_ANONYMOUS        
               0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
               0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
               0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
               1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
               0: NTLMSSP_TARGET_TYPE_DOMAIN
               1: NTLMSSP_TARGET_TYPE_SERVER
               0: NTLMSSP_TARGET_TYPE_SHARE
               1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
               0: NTLMSSP_NEGOTIATE_IDENTIFY
               0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
               1: NTLMSSP_NEGOTIATE_TARGET_INFO
               1: NTLMSSP_NEGOTIATE_VERSION
               1: NTLMSSP_NEGOTIATE_128    
               1: NTLMSSP_NEGOTIATE_KEY_EXCH
               0: NTLMSSP_NEGOTIATE_56     
        ServerChallenge          : 732ef1eef929d060
        Reserved                 : 0000000000000000
        TargetInfoLen            : 0x0098 (152)
        TargetInfoMaxLen         : 0x0098 (152)
        TargetInfo               : *
            TargetInfo: struct AV_PAIR_LIST
                count                    : 0x00000006 (6)
                pair: ARRAY(6)
                    pair: struct AV_PAIR
                        AvId                     : MsvAvNbDomainName (0x2)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x2)
                        AvNbDomainName           : 'WINDEV2002EVAL1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvNbComputerName (0x1)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x1)
                        AvNbComputerName         : 'WINDEV2002EVAL1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvDnsDomainName (0x4)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x4)
                        AvDnsDomainName          : 'WinDev2002Eval1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvDnsComputerName (0x3)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x3)
                        AvDnsComputerName        : 'WinDev2002Eval1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvTimestamp (0x7)
                        AvLen                    : 0x0008 (8)
                        Value                    : union ntlmssp_AvValue(case 0x7)
                        AvTimestamp              : Thu Jul 15 03:40:59 PM 2021 EDT
                    pair: struct AV_PAIR
                        AvId                     : MsvAvEOL (0x0)
                        AvLen                    : 0x0000 (0)
                        Value                    : union ntlmssp_AvValue(case 0x0)
        Version: struct ntlmssp_VERSION
            ProductMajorVersion      : NTLMSSP_WINDOWS_MAJOR_VERSION_10 (0xA)
            ProductMinorVersion      : NTLMSSP_WINDOWS_MINOR_VERSION_0 (0x0)
            ProductBuild             : 0x47ba (18362)
            Reserved                 : 000000
            NTLMRevisionCurrent      : NTLMSSP_REVISION_W2K3 (0xF)
     authenticate: struct AUTHENTICATE_MESSAGE
        Signature                : 'NTLMSSP'
        MessageType              : NtLmAuthenticate (3)
        LmChallengeResponseLen   : 0x0000 (0)
        LmChallengeResponseMaxLen: 0x0000 (0)
        LmChallengeResponse      : *
            LmChallengeResponse      : union ntlmssp_LM_RESPONSE_with_len(case 0)
        NtChallengeResponseLen   : 0x0000 (0)
        NtChallengeResponseMaxLen: 0x0000 (0)
        NtChallengeResponse      : *
            NtChallengeResponse      : union ntlmssp_NTLM_RESPONSE_with_len(case 0)
        DomainNameLen            : 0x0000 (0)
        DomainNameMaxLen         : 0x0000 (0)
        DomainName               : *
            DomainName               : ''
        UserNameLen              : 0x0000 (0)
        UserNameMaxLen           : 0x0000 (0)
        UserName                 : *
            UserName                 : ''
        WorkstationLen           : 0x0000 (0)
        WorkstationMaxLen        : 0x0000 (0)
        Workstation              : *
            Workstation              : ''
        EncryptedRandomSessionKeyLen: 0x0010 (16)
        EncryptedRandomSessionKeyMaxLen: 0x0010 (16)
        EncryptedRandomSessionKey: *
            EncryptedRandomSessionKey: DATA_BLOB length=16
[0000] E7 47 01 AB 83 00 C7 8C   76 06 71 67 04 C1 60 94   .G...... v.qg..`.
        NegotiateFlags           : 0x62008a15 (1644202517)
               1: NTLMSSP_NEGOTIATE_UNICODE
               0: NTLMSSP_NEGOTIATE_OEM    
               1: NTLMSSP_REQUEST_TARGET   
               1: NTLMSSP_NEGOTIATE_SIGN   
               0: NTLMSSP_NEGOTIATE_SEAL   
               0: NTLMSSP_NEGOTIATE_DATAGRAM
               0: NTLMSSP_NEGOTIATE_LM_KEY 
               0: NTLMSSP_NEGOTIATE_NETWARE
               1: NTLMSSP_NEGOTIATE_NTLM   
               0: NTLMSSP_NEGOTIATE_NT_ONLY
               1: NTLMSSP_ANONYMOUS        
               0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
               0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
               0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
               1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
               0: NTLMSSP_TARGET_TYPE_DOMAIN
               0: NTLMSSP_TARGET_TYPE_SERVER
               0: NTLMSSP_TARGET_TYPE_SHARE
               0: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
               0: NTLMSSP_NEGOTIATE_IDENTIFY
               0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
               0: NTLMSSP_NEGOTIATE_TARGET_INFO
               1: NTLMSSP_NEGOTIATE_VERSION
               1: NTLMSSP_NEGOTIATE_128    
               1: NTLMSSP_NEGOTIATE_KEY_EXCH
               0: NTLMSSP_NEGOTIATE_56     
        Version: struct ntlmssp_VERSION
            ProductMajorVersion      : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
            ProductMinorVersion      : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
            ProductBuild             : 0x0000 (0)
            Reserved: ARRAY(3)
                [0]                      : 0x00 (0)
                [1]                      : 0x00 (0)
                [2]                      : 0x00 (0)
            NTLMRevisionCurrent      : NTLMSSP_REVISION_W2K3 (15)
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62008a15
  NTLMSSP_NEGOTIATE_UNICODE
  NTLMSSP_REQUEST_TARGET
  NTLMSSP_NEGOTIATE_SIGN
  NTLMSSP_NEGOTIATE_NTLM
  NTLMSSP_ANONYMOUS
  NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  NTLMSSP_NEGOTIATE_VERSION
  NTLMSSP_NEGOTIATE_128
  NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62008a15
  NTLMSSP_NEGOTIATE_UNICODE
  NTLMSSP_REQUEST_TARGET
  NTLMSSP_NEGOTIATE_SIGN
  NTLMSSP_NEGOTIATE_NTLM
  NTLMSSP_ANONYMOUS
  NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  NTLMSSP_NEGOTIATE_VERSION
  NTLMSSP_NEGOTIATE_128
  NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - using NTLM1
dump_arc4_state: NTLMv1 arc4 state:

gensec_update_send: ntlmssp[0x55de1e7be850]: subreq: 0x55de1e7a7620
gensec_update_send: spnego[0x55de1e79f550]: subreq: 0x55de1e7d0b70
gensec_update_done: ntlmssp[0x55de1e7be850]: NT_STATUS_OK tevent_req[0x55de1e7a7620/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)]  state[struct gensec_ntlmssp_update_state (0x55de1e7a77d0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:222]
gensec_update_done: spnego[0x55de1e79f550]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55de1e7d0b70/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)]  state[struct gensec_spnego_update_state (0x55de1e7d0d20)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
SPNEGO login failed: {Access Denied} A process has requested access to an object but has not been granted those access rights.
parsed path: fname='smb://anonymous@192.168.100.245/' server='192.168.100.245' share='' path='' options=''
SMBC_check_options(): server='192.168.100.245' share='' path='' options=''
SMBC_server: server_n=[192.168.100.245] server=[192.168.100.245]
 -> server_n=[192.168.100.245] server=[192.168.100.245]
Connecting to 192.168.100.245 at port 139
Connecting to 192.168.100.245 at port 139
Connecting to 192.168.100.245 at port 445
Socket options:
	SO_KEEPALIVE = 0
	SO_REUSEADDR = 0
	SO_BROADCAST = 0
	TCP_NODELAY = 1
	TCP_KEEPCNT = 9
	TCP_KEEPIDLE = 7200
	TCP_KEEPINTVL = 75
	IPTOS_LOWDELAY = 0
	IPTOS_THROUGHPUT = 0
	SO_REUSEPORT = 0
	SO_SNDBUF = 87040
	SO_RCVBUF = 131072
	SO_SNDLOWAT = 1
	SO_RCVLOWAT = 1
	SO_SNDTIMEO = 0
	SO_RCVTIMEO = 0
	TCP_QUICKACK = 1
	TCP_DEFER_ACCEPT = 0
	TCP_USER_TIMEOUT = 0
cli_session_setup_spnego_send: Connect to 192.168.100.245 as anonymous@SAMBA using SPNEGO
Starting GENSEC mechanism spnego
Starting GENSEC submechanism gse_krb5
Cannot do GSE to an IP address
Failed to start GENSEC client mech gse_krb5: NT_STATUS_INVALID_PARAMETER
Starting GENSEC submechanism ntlmssp
     negotiate: struct NEGOTIATE_MESSAGE
        Signature                : 'NTLMSSP'
        MessageType              : NtLmNegotiate (1)
        NegotiateFlags           : 0x62088215 (1644724757)
               1: NTLMSSP_NEGOTIATE_UNICODE
               0: NTLMSSP_NEGOTIATE_OEM    
               1: NTLMSSP_REQUEST_TARGET   
               1: NTLMSSP_NEGOTIATE_SIGN   
               0: NTLMSSP_NEGOTIATE_SEAL   
               0: NTLMSSP_NEGOTIATE_DATAGRAM
               0: NTLMSSP_NEGOTIATE_LM_KEY 
               0: NTLMSSP_NEGOTIATE_NETWARE
               1: NTLMSSP_NEGOTIATE_NTLM   
               0: NTLMSSP_NEGOTIATE_NT_ONLY
               0: NTLMSSP_ANONYMOUS        
               0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
               0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
               0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
               1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
               0: NTLMSSP_TARGET_TYPE_DOMAIN
               0: NTLMSSP_TARGET_TYPE_SERVER
               0: NTLMSSP_TARGET_TYPE_SHARE
               1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
               0: NTLMSSP_NEGOTIATE_IDENTIFY
               0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
               0: NTLMSSP_NEGOTIATE_TARGET_INFO
               1: NTLMSSP_NEGOTIATE_VERSION
               1: NTLMSSP_NEGOTIATE_128    
               1: NTLMSSP_NEGOTIATE_KEY_EXCH
               0: NTLMSSP_NEGOTIATE_56     
        DomainNameLen            : 0x0000 (0)
        DomainNameMaxLen         : 0x0000 (0)
        DomainName               : *
            DomainName               : ''
        WorkstationLen           : 0x0000 (0)
        WorkstationMaxLen        : 0x0000 (0)
        Workstation              : *
            Workstation              : ''
        Version: struct ntlmssp_VERSION
            ProductMajorVersion      : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
            ProductMinorVersion      : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
            ProductBuild             : 0x0000 (0)
            Reserved: ARRAY(3)
                [0]                      : 0x00 (0)
                [1]                      : 0x00 (0)
                [2]                      : 0x00 (0)
            NTLMRevisionCurrent      : NTLMSSP_REVISION_W2K3 (15)
gensec_update_send: ntlmssp[0x55de1e7be850]: subreq: 0x55de1e7e8d20
gensec_update_send: spnego[0x55de1e79f550]: subreq: 0x55de1e7ecd90
gensec_update_done: ntlmssp[0x55de1e7be850]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55de1e7e8d20/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)]  state[struct gensec_ntlmssp_update_state (0x55de1e7e8ed0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215]
gensec_update_done: spnego[0x55de1e79f550]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55de1e7ecd90/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)]  state[struct gensec_spnego_update_state (0x55de1e7ecf40)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
  NTLMSSP_NEGOTIATE_UNICODE
  NTLMSSP_REQUEST_TARGET
  NTLMSSP_NEGOTIATE_SIGN
  NTLMSSP_NEGOTIATE_NTLM
  NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  NTLMSSP_TARGET_TYPE_SERVER
  NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  NTLMSSP_NEGOTIATE_TARGET_INFO
  NTLMSSP_NEGOTIATE_VERSION
  NTLMSSP_NEGOTIATE_128
  NTLMSSP_NEGOTIATE_KEY_EXCH
     challenge: struct CHALLENGE_MESSAGE
        Signature                : 'NTLMSSP'
        MessageType              : NtLmChallenge (0x2)
        TargetNameLen            : 0x001e (30)
        TargetNameMaxLen         : 0x001e (30)
        TargetName               : *
            TargetName               : 'WINDEV2002EVAL1'
        NegotiateFlags           : 0x628a8215 (1653244437)
               1: NTLMSSP_NEGOTIATE_UNICODE
               0: NTLMSSP_NEGOTIATE_OEM    
               1: NTLMSSP_REQUEST_TARGET   
               1: NTLMSSP_NEGOTIATE_SIGN   
               0: NTLMSSP_NEGOTIATE_SEAL   
               0: NTLMSSP_NEGOTIATE_DATAGRAM
               0: NTLMSSP_NEGOTIATE_LM_KEY 
               0: NTLMSSP_NEGOTIATE_NETWARE
               1: NTLMSSP_NEGOTIATE_NTLM   
               0: NTLMSSP_NEGOTIATE_NT_ONLY
               0: NTLMSSP_ANONYMOUS        
               0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
               0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
               0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
               1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
               0: NTLMSSP_TARGET_TYPE_DOMAIN
               1: NTLMSSP_TARGET_TYPE_SERVER
               0: NTLMSSP_TARGET_TYPE_SHARE
               1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
               0: NTLMSSP_NEGOTIATE_IDENTIFY
               0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
               1: NTLMSSP_NEGOTIATE_TARGET_INFO
               1: NTLMSSP_NEGOTIATE_VERSION
               1: NTLMSSP_NEGOTIATE_128    
               1: NTLMSSP_NEGOTIATE_KEY_EXCH
               0: NTLMSSP_NEGOTIATE_56     
        ServerChallenge          : 8b813937bce94448
        Reserved                 : 0000000000000000
        TargetInfoLen            : 0x0098 (152)
        TargetInfoMaxLen         : 0x0098 (152)
        TargetInfo               : *
            TargetInfo: struct AV_PAIR_LIST
                count                    : 0x00000006 (6)
                pair: ARRAY(6)
                    pair: struct AV_PAIR
                        AvId                     : MsvAvNbDomainName (0x2)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x2)
                        AvNbDomainName           : 'WINDEV2002EVAL1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvNbComputerName (0x1)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x1)
                        AvNbComputerName         : 'WINDEV2002EVAL1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvDnsDomainName (0x4)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x4)
                        AvDnsDomainName          : 'WinDev2002Eval1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvDnsComputerName (0x3)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x3)
                        AvDnsComputerName        : 'WinDev2002Eval1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvTimestamp (0x7)
                        AvLen                    : 0x0008 (8)
                        Value                    : union ntlmssp_AvValue(case 0x7)
                        AvTimestamp              : Thu Jul 15 03:41:03 PM 2021 EDT
                    pair: struct AV_PAIR
                        AvId                     : MsvAvEOL (0x0)
                        AvLen                    : 0x0000 (0)
                        Value                    : union ntlmssp_AvValue(case 0x0)
        Version: struct ntlmssp_VERSION
            ProductMajorVersion      : NTLMSSP_WINDOWS_MAJOR_VERSION_10 (0xA)
            ProductMinorVersion      : NTLMSSP_WINDOWS_MINOR_VERSION_0 (0x0)
            ProductBuild             : 0x47ba (18362)
            Reserved                 : 000000
            NTLMRevisionCurrent      : NTLMSSP_REVISION_W2K3 (0xF)
     authenticate: struct AUTHENTICATE_MESSAGE
        Signature                : 'NTLMSSP'
        MessageType              : NtLmAuthenticate (3)
        LmChallengeResponseLen   : 0x0018 (24)
        LmChallengeResponseMaxLen: 0x0018 (24)
        LmChallengeResponse      : *
            LmChallengeResponse      : union ntlmssp_LM_RESPONSE_with_len(case 24)
            v1: struct LM_RESPONSE
                Response                 : 000000000000000000000000000000000000000000000000
        NtChallengeResponseLen   : 0x0140 (320)
        NtChallengeResponseMaxLen: 0x0140 (320)
        NtChallengeResponse      : *
            NtChallengeResponse      : union ntlmssp_NTLM_RESPONSE_with_len(case 320)
            v2: struct NTLMv2_RESPONSE
                Response                 : e7c46d46fb41fcb3e0c5532e479230c8
                Challenge: struct NTLMv2_CLIENT_CHALLENGE
                    RespType                 : 0x01 (1)
                    HiRespType               : 0x01 (1)
                    Reserved1                : 0x0000 (0)
                    Reserved2                : 0x00000000 (0)
                    TimeStamp                : Thu Jul 15 03:41:03 PM 2021 EDT
                    ChallengeFromClient      : 0349a5d9dbb75f90
                    Reserved3                : 0x00000000 (0)
                    AvPairs: struct AV_PAIR_LIST
                        count                    : 0x0000000a (10)
                        pair: ARRAY(10)
                            pair: struct AV_PAIR
                                AvId                     : MsvAvNbDomainName (0x2)
                                AvLen                    : 0x001e (30)
                                Value                    : union ntlmssp_AvValue(case 0x2)
                                AvNbDomainName           : 'WINDEV2002EVAL1'
                            pair: struct AV_PAIR
                                AvId                     : MsvAvNbComputerName (0x1)
                                AvLen                    : 0x001e (30)
                                Value                    : union ntlmssp_AvValue(case 0x1)
                                AvNbComputerName         : 'WINDEV2002EVAL1'
                            pair: struct AV_PAIR
                                AvId                     : MsvAvDnsDomainName (0x4)
                                AvLen                    : 0x001e (30)
                                Value                    : union ntlmssp_AvValue(case 0x4)
                                AvDnsDomainName          : 'WinDev2002Eval1'
                            pair: struct AV_PAIR
                                AvId                     : MsvAvDnsComputerName (0x3)
                                AvLen                    : 0x001e (30)
                                Value                    : union ntlmssp_AvValue(case 0x3)
                                AvDnsComputerName        : 'WinDev2002Eval1'
                            pair: struct AV_PAIR
                                AvId                     : MsvAvTimestamp (0x7)
                                AvLen                    : 0x0008 (8)
                                Value                    : union ntlmssp_AvValue(case 0x7)
                                AvTimestamp              : Thu Jul 15 03:41:03 PM 2021 EDT
                            pair: struct AV_PAIR
                                AvId                     : MsvAvFlags (0x6)
                                AvLen                    : 0x0004 (4)
                                Value                    : union ntlmssp_AvValue(case 0x6)
                                AvFlags                  : 0x00000002 (2)
                                       0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT
                                       1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE
                                       0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE
                            pair: struct AV_PAIR
                                AvId                     : MsvAvSingleHost (0x8)
                                AvLen                    : 0x0030 (48)
                                Value                    : union ntlmssp_AvValue(case 0x8)
                                AvSingleHost: struct ntlmssp_SingleHostData
                                    Size                     : 0x00000030 (48)
                                    Z4                       : 0x00000000 (0)
                                    token_info: struct LSAP_TOKEN_INFO_INTEGRITY
                                        Flags                    : 0x00000000 (0)
                                        TokenIL                  : 0x00000000 (0)
                                        MachineId                : 16f8454d61f9d8a26c682cd480c6bf0335ed87c0903d7311e549852ee11f60e1
                                    remaining                : DATA_BLOB length=0
                            pair: struct AV_PAIR
                                AvId                     : MsvChannelBindings (0xA)
                                AvLen                    : 0x0010 (16)
                                Value                    : union ntlmssp_AvValue(case 0xA)
                                ChannelBindings          : 00000000000000000000000000000000
                            pair: struct AV_PAIR
                                AvId                     : MsvAvTargetName (0x9)
                                AvLen                    : 0x0028 (40)
                                Value                    : union ntlmssp_AvValue(case 0x9)
                                AvTargetName             : 'cifs/192.168.100.245'
                            pair: struct AV_PAIR
                                AvId                     : MsvAvEOL (0x0)
                                AvLen                    : 0x0000 (0)
                                Value                    : union ntlmssp_AvValue(case 0x0)
        DomainNameLen            : 0x000a (10)
        DomainNameMaxLen         : 0x000a (10)
        DomainName               : *
            DomainName               : 'SAMBA'
        UserNameLen              : 0x0012 (18)
        UserNameMaxLen           : 0x0012 (18)
        UserName                 : *
            UserName                 : 'anonymous'
        WorkstationLen           : 0x001c (28)
        WorkstationMaxLen        : 0x001c (28)
        Workstation              : *
            Workstation              : 'LOCALHOST-LIVE'
        EncryptedRandomSessionKeyLen: 0x0010 (16)
        EncryptedRandomSessionKeyMaxLen: 0x0010 (16)
        EncryptedRandomSessionKey: *
            EncryptedRandomSessionKey: DATA_BLOB length=16
[0000] 7C CD F8 6C 91 D6 56 79   93 A6 6B 25 41 86 2F CC   |..l..Vy ..k%A./.
        NegotiateFlags           : 0x62088215 (1644724757)
               1: NTLMSSP_NEGOTIATE_UNICODE
               0: NTLMSSP_NEGOTIATE_OEM    
               1: NTLMSSP_REQUEST_TARGET   
               1: NTLMSSP_NEGOTIATE_SIGN   
               0: NTLMSSP_NEGOTIATE_SEAL   
               0: NTLMSSP_NEGOTIATE_DATAGRAM
               0: NTLMSSP_NEGOTIATE_LM_KEY 
               0: NTLMSSP_NEGOTIATE_NETWARE
               1: NTLMSSP_NEGOTIATE_NTLM   
               0: NTLMSSP_NEGOTIATE_NT_ONLY
               0: NTLMSSP_ANONYMOUS        
               0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
               0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
               0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
               1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
               0: NTLMSSP_TARGET_TYPE_DOMAIN
               0: NTLMSSP_TARGET_TYPE_SERVER
               0: NTLMSSP_TARGET_TYPE_SHARE
               1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
               0: NTLMSSP_NEGOTIATE_IDENTIFY
               0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
               0: NTLMSSP_NEGOTIATE_TARGET_INFO
               1: NTLMSSP_NEGOTIATE_VERSION
               1: NTLMSSP_NEGOTIATE_128    
               1: NTLMSSP_NEGOTIATE_KEY_EXCH
               0: NTLMSSP_NEGOTIATE_56     
        Version: struct ntlmssp_VERSION
            ProductMajorVersion      : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
            ProductMinorVersion      : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
            ProductBuild             : 0x0000 (0)
            Reserved: ARRAY(3)
                [0]                      : 0x00 (0)
                [1]                      : 0x00 (0)
                [2]                      : 0x00 (0)
            NTLMRevisionCurrent      : NTLMSSP_REVISION_W2K3 (15)
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
  NTLMSSP_NEGOTIATE_UNICODE
  NTLMSSP_REQUEST_TARGET
  NTLMSSP_NEGOTIATE_SIGN
  NTLMSSP_NEGOTIATE_NTLM
  NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  NTLMSSP_NEGOTIATE_VERSION
  NTLMSSP_NEGOTIATE_128
  NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
  NTLMSSP_NEGOTIATE_UNICODE
  NTLMSSP_REQUEST_TARGET
  NTLMSSP_NEGOTIATE_SIGN
  NTLMSSP_NEGOTIATE_NTLM
  NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  NTLMSSP_NEGOTIATE_VERSION
  NTLMSSP_NEGOTIATE_128
  NTLMSSP_NEGOTIATE_KEY_EXCH
dump_arc4_state: NTLMSSP send seal arc4 state:

dump_arc4_state: NTLMSSP recv seal arc4 state:

gensec_update_send: ntlmssp[0x55de1e7be850]: subreq: 0x55de1e7a7960
gensec_update_send: spnego[0x55de1e79f550]: subreq: 0x55de1e7ecd90
gensec_update_done: ntlmssp[0x55de1e7be850]: NT_STATUS_OK tevent_req[0x55de1e7a7960/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)]  state[struct gensec_ntlmssp_update_state (0x55de1e7a7b10)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:222]
gensec_update_done: spnego[0x55de1e79f550]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55de1e7ecd90/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)]  state[struct gensec_spnego_update_state (0x55de1e7ecf40)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
  NTLMSSP_NEGOTIATE_UNICODE
  NTLMSSP_REQUEST_TARGET
  NTLMSSP_NEGOTIATE_SIGN
  NTLMSSP_NEGOTIATE_NTLM
  NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  NTLMSSP_NEGOTIATE_VERSION
  NTLMSSP_NEGOTIATE_128
  NTLMSSP_NEGOTIATE_KEY_EXCH
dump_arc4_state: NTLMSSP send seal arc4 state:

dump_arc4_state: NTLMSSP recv seal arc4 state:

gensec_update_send: spnego[0x55de1e79f550]: subreq: 0x55de1e7ecd90
gensec_update_done: spnego[0x55de1e79f550]: NT_STATUS_OK tevent_req[0x55de1e7ecd90/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)]  state[struct gensec_spnego_update_state (0x55de1e7ecf40)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
Bad SMB2 signature for message
[0000] 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00   ........ ........
[0000] 0D D2 05 40 E6 12 A8 14   CA 13 66 82 F3 F1 CC B3   ...@.... ..f.....
SPNEGO login failed: {Access Denied} A process has requested access to an object but has not been granted those access rights.
cli_session_setup_spnego_send: Connect to 192.168.100.245 as (null) using SPNEGO
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
     negotiate: struct NEGOTIATE_MESSAGE
        Signature                : 'NTLMSSP'
        MessageType              : NtLmNegotiate (1)
        NegotiateFlags           : 0x62088215 (1644724757)
               1: NTLMSSP_NEGOTIATE_UNICODE
               0: NTLMSSP_NEGOTIATE_OEM    
               1: NTLMSSP_REQUEST_TARGET   
               1: NTLMSSP_NEGOTIATE_SIGN   
               0: NTLMSSP_NEGOTIATE_SEAL   
               0: NTLMSSP_NEGOTIATE_DATAGRAM
               0: NTLMSSP_NEGOTIATE_LM_KEY 
               0: NTLMSSP_NEGOTIATE_NETWARE
               1: NTLMSSP_NEGOTIATE_NTLM   
               0: NTLMSSP_NEGOTIATE_NT_ONLY
               0: NTLMSSP_ANONYMOUS        
               0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
               0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
               0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
               1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
               0: NTLMSSP_TARGET_TYPE_DOMAIN
               0: NTLMSSP_TARGET_TYPE_SERVER
               0: NTLMSSP_TARGET_TYPE_SHARE
               1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
               0: NTLMSSP_NEGOTIATE_IDENTIFY
               0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
               0: NTLMSSP_NEGOTIATE_TARGET_INFO
               1: NTLMSSP_NEGOTIATE_VERSION
               1: NTLMSSP_NEGOTIATE_128    
               1: NTLMSSP_NEGOTIATE_KEY_EXCH
               0: NTLMSSP_NEGOTIATE_56     
        DomainNameLen            : 0x0000 (0)
        DomainNameMaxLen         : 0x0000 (0)
        DomainName               : *
            DomainName               : ''
        WorkstationLen           : 0x0000 (0)
        WorkstationMaxLen        : 0x0000 (0)
        Workstation              : *
            Workstation              : ''
        Version: struct ntlmssp_VERSION
            ProductMajorVersion      : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
            ProductMinorVersion      : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
            ProductBuild             : 0x0000 (0)
            Reserved: ARRAY(3)
                [0]                      : 0x00 (0)
                [1]                      : 0x00 (0)
                [2]                      : 0x00 (0)
            NTLMRevisionCurrent      : NTLMSSP_REVISION_W2K3 (15)
gensec_update_send: ntlmssp[0x55de1e7be850]: subreq: 0x55de1e7e8d20
gensec_update_send: spnego[0x55de1e79f550]: subreq: 0x55de1e7ecd90
gensec_update_done: ntlmssp[0x55de1e7be850]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55de1e7e8d20/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)]  state[struct gensec_ntlmssp_update_state (0x55de1e7e8ed0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215]
gensec_update_done: spnego[0x55de1e79f550]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55de1e7ecd90/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)]  state[struct gensec_spnego_update_state (0x55de1e7ecf40)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
  NTLMSSP_NEGOTIATE_UNICODE
  NTLMSSP_REQUEST_TARGET
  NTLMSSP_NEGOTIATE_SIGN
  NTLMSSP_NEGOTIATE_NTLM
  NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  NTLMSSP_TARGET_TYPE_SERVER
  NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  NTLMSSP_NEGOTIATE_TARGET_INFO
  NTLMSSP_NEGOTIATE_VERSION
  NTLMSSP_NEGOTIATE_128
  NTLMSSP_NEGOTIATE_KEY_EXCH
     challenge: struct CHALLENGE_MESSAGE
        Signature                : 'NTLMSSP'
        MessageType              : NtLmChallenge (0x2)
        TargetNameLen            : 0x001e (30)
        TargetNameMaxLen         : 0x001e (30)
        TargetName               : *
            TargetName               : 'WINDEV2002EVAL1'
        NegotiateFlags           : 0x628a8215 (1653244437)
               1: NTLMSSP_NEGOTIATE_UNICODE
               0: NTLMSSP_NEGOTIATE_OEM    
               1: NTLMSSP_REQUEST_TARGET   
               1: NTLMSSP_NEGOTIATE_SIGN   
               0: NTLMSSP_NEGOTIATE_SEAL   
               0: NTLMSSP_NEGOTIATE_DATAGRAM
               0: NTLMSSP_NEGOTIATE_LM_KEY 
               0: NTLMSSP_NEGOTIATE_NETWARE
               1: NTLMSSP_NEGOTIATE_NTLM   
               0: NTLMSSP_NEGOTIATE_NT_ONLY
               0: NTLMSSP_ANONYMOUS        
               0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
               0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
               0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
               1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
               0: NTLMSSP_TARGET_TYPE_DOMAIN
               1: NTLMSSP_TARGET_TYPE_SERVER
               0: NTLMSSP_TARGET_TYPE_SHARE
               1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
               0: NTLMSSP_NEGOTIATE_IDENTIFY
               0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
               1: NTLMSSP_NEGOTIATE_TARGET_INFO
               1: NTLMSSP_NEGOTIATE_VERSION
               1: NTLMSSP_NEGOTIATE_128    
               1: NTLMSSP_NEGOTIATE_KEY_EXCH
               0: NTLMSSP_NEGOTIATE_56     
        ServerChallenge          : a5e835178a99bea9
        Reserved                 : 0000000000000000
        TargetInfoLen            : 0x0098 (152)
        TargetInfoMaxLen         : 0x0098 (152)
        TargetInfo               : *
            TargetInfo: struct AV_PAIR_LIST
                count                    : 0x00000006 (6)
                pair: ARRAY(6)
                    pair: struct AV_PAIR
                        AvId                     : MsvAvNbDomainName (0x2)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x2)
                        AvNbDomainName           : 'WINDEV2002EVAL1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvNbComputerName (0x1)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x1)
                        AvNbComputerName         : 'WINDEV2002EVAL1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvDnsDomainName (0x4)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x4)
                        AvDnsDomainName          : 'WinDev2002Eval1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvDnsComputerName (0x3)
                        AvLen                    : 0x001e (30)
                        Value                    : union ntlmssp_AvValue(case 0x3)
                        AvDnsComputerName        : 'WinDev2002Eval1'
                    pair: struct AV_PAIR
                        AvId                     : MsvAvTimestamp (0x7)
                        AvLen                    : 0x0008 (8)
                        Value                    : union ntlmssp_AvValue(case 0x7)
                        AvTimestamp              : Thu Jul 15 03:41:03 PM 2021 EDT
                    pair: struct AV_PAIR
                        AvId                     : MsvAvEOL (0x0)
                        AvLen                    : 0x0000 (0)
                        Value                    : union ntlmssp_AvValue(case 0x0)
        Version: struct ntlmssp_VERSION
            ProductMajorVersion      : NTLMSSP_WINDOWS_MAJOR_VERSION_10 (0xA)
            ProductMinorVersion      : NTLMSSP_WINDOWS_MINOR_VERSION_0 (0x0)
            ProductBuild             : 0x47ba (18362)
            Reserved                 : 000000
            NTLMRevisionCurrent      : NTLMSSP_REVISION_W2K3 (0xF)
     authenticate: struct AUTHENTICATE_MESSAGE
        Signature                : 'NTLMSSP'
        MessageType              : NtLmAuthenticate (3)
        LmChallengeResponseLen   : 0x0000 (0)
        LmChallengeResponseMaxLen: 0x0000 (0)
        LmChallengeResponse      : *
            LmChallengeResponse      : union ntlmssp_LM_RESPONSE_with_len(case 0)
        NtChallengeResponseLen   : 0x0000 (0)
        NtChallengeResponseMaxLen: 0x0000 (0)
        NtChallengeResponse      : *
            NtChallengeResponse      : union ntlmssp_NTLM_RESPONSE_with_len(case 0)
        DomainNameLen            : 0x0000 (0)
        DomainNameMaxLen         : 0x0000 (0)
        DomainName               : *
            DomainName               : ''
        UserNameLen              : 0x0000 (0)
        UserNameMaxLen           : 0x0000 (0)
        UserName                 : *
            UserName                 : ''
        WorkstationLen           : 0x0000 (0)
        WorkstationMaxLen        : 0x0000 (0)
        Workstation              : *
            Workstation              : ''
        EncryptedRandomSessionKeyLen: 0x0010 (16)
        EncryptedRandomSessionKeyMaxLen: 0x0010 (16)
        EncryptedRandomSessionKey: *
            EncryptedRandomSessionKey: DATA_BLOB length=16
[0000] 2B 2C CD 47 5D 94 A5 F3   86 CE 9E 87 32 4C 2D 6D   +,.G]... ....2L-m
        NegotiateFlags           : 0x62008a15 (1644202517)
               1: NTLMSSP_NEGOTIATE_UNICODE
               0: NTLMSSP_NEGOTIATE_OEM    
               1: NTLMSSP_REQUEST_TARGET   
               1: NTLMSSP_NEGOTIATE_SIGN   
               0: NTLMSSP_NEGOTIATE_SEAL   
               0: NTLMSSP_NEGOTIATE_DATAGRAM
               0: NTLMSSP_NEGOTIATE_LM_KEY 
               0: NTLMSSP_NEGOTIATE_NETWARE
               1: NTLMSSP_NEGOTIATE_NTLM   
               0: NTLMSSP_NEGOTIATE_NT_ONLY
               1: NTLMSSP_ANONYMOUS        
               0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
               0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
               0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
               1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
               0: NTLMSSP_TARGET_TYPE_DOMAIN
               0: NTLMSSP_TARGET_TYPE_SERVER
               0: NTLMSSP_TARGET_TYPE_SHARE
               0: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
               0: NTLMSSP_NEGOTIATE_IDENTIFY
               0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
               0: NTLMSSP_NEGOTIATE_TARGET_INFO
               1: NTLMSSP_NEGOTIATE_VERSION
               1: NTLMSSP_NEGOTIATE_128    
               1: NTLMSSP_NEGOTIATE_KEY_EXCH
               0: NTLMSSP_NEGOTIATE_56     
        Version: struct ntlmssp_VERSION
            ProductMajorVersion      : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
            ProductMinorVersion      : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
            ProductBuild             : 0x0000 (0)
            Reserved: ARRAY(3)
                [0]                      : 0x00 (0)
                [1]                      : 0x00 (0)
                [2]                      : 0x00 (0)
            NTLMRevisionCurrent      : NTLMSSP_REVISION_W2K3 (15)
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62008a15
  NTLMSSP_NEGOTIATE_UNICODE
  NTLMSSP_REQUEST_TARGET
  NTLMSSP_NEGOTIATE_SIGN
  NTLMSSP_NEGOTIATE_NTLM
  NTLMSSP_ANONYMOUS
  NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  NTLMSSP_NEGOTIATE_VERSION
  NTLMSSP_NEGOTIATE_128
  NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62008a15
  NTLMSSP_NEGOTIATE_UNICODE
  NTLMSSP_REQUEST_TARGET
  NTLMSSP_NEGOTIATE_SIGN
  NTLMSSP_NEGOTIATE_NTLM
  NTLMSSP_ANONYMOUS
  NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  NTLMSSP_NEGOTIATE_VERSION
  NTLMSSP_NEGOTIATE_128
  NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - using NTLM1
dump_arc4_state: NTLMv1 arc4 state:

gensec_update_send: ntlmssp[0x55de1e7be850]: subreq: 0x55de1e7a7620
gensec_update_send: spnego[0x55de1e79f550]: subreq: 0x55de1e7ecd90
gensec_update_done: ntlmssp[0x55de1e7be850]: NT_STATUS_OK tevent_req[0x55de1e7a7620/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)]  state[struct gensec_ntlmssp_update_state (0x55de1e7a77d0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:222]
gensec_update_done: spnego[0x55de1e79f550]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55de1e7ecd90/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)]  state[struct gensec_spnego_update_state (0x55de1e7ecf40)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
SPNEGO login failed: {Access Denied} A process has requested access to an object but has not been granted those access rights.
Performing aggressive shutdown.
Context 0x55de1e790850 successfully freed
Freeing parametrics:
Comment 1 Stefan Metzmacher 2021-07-15 14:48:06 UTC
Can you please upload network captures for all cases, see
https://wiki.samba.org/index.php/Capture_Packets for some hints.

Please create a separate capture for each case and also
create the file with the level 10 log output with a matching name.

Thanks!
Comment 2 Harald Sitter 2021-07-15 17:03:27 UTC
Created attachment 16682 [details]
capture+debug 4.11, 4.13, 4.14
Comment 3 Stefan Metzmacher 2021-07-17 09:46:12 UTC
(In reply to Harald Sitter from comment #2)

Thanks! The effective difference is that the client sends SMB2_SIGNING_REQUIRED
in the negprot request as well in the session setup request, which means
we don't allow "guest" authentication (your usage of of an invalid username/password "anonymous"/"anonymous", is guest authentication,
real anonymous authentication uses "" as username).

Can you post the 3 smb.conf files used for the tests?
It seems that "client signing = required" is used for 4.14.
Comment 4 Harald Sitter 2021-07-19 13:49:13 UTC
Created attachment 16689 [details]
smb confs

Curiously the config for the 4.13 and 4.14 scenario are the same. So I've also ran the query through testparm and that seems to agree that the setting is on default:


testparm -d 0 -s --parameter-name 'client signing'
Load smb config files from /etc/samba/smb.conf
Loaded services file OK.
Weak crypto is allowed

default
Comment 5 Alex 2021-11-21 08:45:35 UTC
gvfs and kio-smb which use libsmbclient are not able to show shares (or just connect) to windows computer which has a guest access. Samba 4.15. If smbclient lib version <= 5.13 then it asks for user/pw and if they are given (I use my domain user/pw) then it connects. But for samba > 5.13 it is impossible to connect at all, it just asks the user/pw again and again. You changed nothing in your libsmbclient API but something is broken. KDE folks tells that it is your problem because nothing changed in libsmbclient and I agree with them. Also I'd like to note that your utility smbclient, which I suppose does not use libsmbclient, works well.
Comment 6 Alex 2021-11-21 08:46:34 UTC
gvfs and kio-smb which use libsmbclient are not able to show shares (or just connect) to windows computer which has a guest access. Samba 4.15. If smbclient lib version <= 4.13 then it asks for user/pw and if they are given (I use my domain user/pw) then it connects. But for samba > 4.13 it is impossible to connect at all, it just asks the user/pw again and again. You changed nothing in your libsmbclient API but something is broken. KDE folks tells that it is your problem because nothing changed in libsmbclient and I agree with them. Also I'd like to note that your utility smbclient, which I suppose does not use libsmbclient, works well.
Comment 7 Stefan Metzmacher 2021-12-21 10:18:02 UTC
This is the same as #14935

The related commit went into 4.14.0, see
https://bugzilla.samba.org/show_bug.cgi?id=14935#c3

*** This bug has been marked as a duplicate of bug 14935 ***