Hi, here it attached my smb.conf and Winbind debug log after reboot.
My OS is Debian Jessie and has a fixed ip.
Thank you
On 06/06/2016 22:05, Rowland penny wrote:> On 06/06/16 14:52, Alexis RIES wrote:
>> Hello,
>>
>> After each reboot, my Samba AD member server lost domain join after
>> reboot, I have to re-enter the server in the domain with the "net
ads
>> join -U administrator".
>>
>> I use version 4.4.3 of samba.
>> The domain controller is a Samba AD server.
>>
>> After reboot, when I exectute "net ads testjoin" I have:
>> kerberos_kinit_password SMB2$@AD.SAMDOM.LOCAL failed: failed
>> Preauthentication
>> kerberos_kinit_password SMB2$@AD.SAMDOM.LOCAL failed: failed
>> Preauthentication
>> Join to domain is not valid: Logon failure
>>
>> And when I execute "wbinfo -t":
>> checking the trust secret for domain SAMDOM via RPC calls failed
>> wbcCheckTrustCredentials (SAMDOM): error code Was
>> NT_STATUS_USER_SESSION_DELETED (0xc0000203)
>> failed to call wbcCheckTrustCredentials: WBC_ERR_AUTH_ERROR
>> Could not check secret
>>
>> Anyone know this problem?
>> How can I make the domain-join to persist reboots?
>>
>
> Hi, can you post your smb.conf from the domain member.
> What OS ?
> Does the domain member have a fixed ip or does it use DHCP ?
>
> Rowland
>
>
--
k
Alexis RIES
Service informatique
Tel : 04.22.32.97.26
Fax : 04.84.25.27.40
Email : alexis.ries at kinaxia.fr
http://www.kinaxia.fr
-------------- next part --------------
[global]
# Enregistrement des logs
log file=/var/log/samba/samba.log
log level=5
#Informations du domaine
netbios name = SMB2
workgroup = SAMDOM
security = ADS
realm = AD.SAMDOM.LOCAL
encrypt passwords = yes
#On utilise la keytab de kerberos pour authentifier ce serveur
dedicated keytab file = /etc/krb5.keytab
kerberos method = secrets and keytab
#Configuration de Winbind (traduction des users Windows en users UNIX)
winbind refresh tickets = yes
winbind trusted domains only = no
winbind use default domain = yes
winbind enum users = yes
winbind enum groups = yes
#Configuration du cluster
clustering = Yes
ctdbd socket = /usr/local/samba/var/run/ctdb/ctdbd.socket
fileid:mapping = fsid
vfs objects = fileid
#Configuration idmap par defaut pour BUILTIN et comptes locaux/groupes
idmap config *:backend = tdb
idmap config *:range = 2000-9999
#Configuration idmap pour le domaine SAMDOM
idmap config SAMDOM:backend = ad
idmap config SAMDOM:schema_mode = rfc2307
idmap config SAMDOM:range = 10000-99999
#On recupere le login shell et le home depuis l'annuaire
winbind nss info = rfc2307
#ACL Unix et activation des audits de securite
vfs objects = acl_xattr full_audit
map acl inherit = Yes
store dos attributes = Yes
#Configuration des audits de securite
full_audit:prefix = %u|%I|%m|%S
full_audit:success = mkdir rename unlink rmdir write
full_audit:failure = read pread mkdir opendir rmdir telldir
full_audit:facility = local7
full_audit:priority = NOTICE
#Partage personnel des utilisateurs
[home]
path = /home/shares/staff/team
valid users = "@SAMDOM\Domain Users"
admin users = "@SAMDOM\Domain Admins"
read only = no
create mask = 0770
directory mask = 0770
browseable = no
#Dossiers de partages
[apps]
comment = Partage apps
path = /home/shares/apps
valid users = "@SAMDOM\smbapps"
guest ok = no
browseable = yes
writable = yes
create mask = 0770
directory mask = 0770
-------------- next part --------------
root at smb2:/home/adminlocal# winbindd -S -d 9 -i
INFO: Current debug levels:
all: 9
tdb: 9
printdrivers: 9
lanman: 9
smb: 9
rpc_parse: 9
rpc_srv: 9
rpc_cli: 9
passdb: 9
sam: 9
auth: 9
winbind: 9
vfs: 9
idmap: 9
quota: 9
acls: 9
locking: 9
msdfs: 9
dmapi: 9
registry: 9
scavenger: 9
dns: 9
ldb: 9
tevent: 9
Maximum core file size limits now 16777216(soft) -1(hard)
winbindd version 4.4.3 started.
Copyright Andrew Tridgell and the Samba Team 1992-2016
lp_load_ex: refreshing parameters
Initialising global parameters
INFO: Current debug levels:
all: 9
tdb: 9
printdrivers: 9
lanman: 9
smb: 9
rpc_parse: 9
rpc_srv: 9
rpc_cli: 9
passdb: 9
sam: 9
auth: 9
winbind: 9
vfs: 9
idmap: 9
quota: 9
acls: 9
locking: 9
msdfs: 9
dmapi: 9
registry: 9
scavenger: 9
dns: 9
ldb: 9
tevent: 9
Processing section "[global]"
doing parameter log file = /var/log/samba/samba.log
doing parameter log level = 5
doing parameter netbios name = SMB2
doing parameter workgroup = SAMDOM
doing parameter security = ADS
doing parameter realm = AD.SAMDOM.LOCAL
doing parameter encrypt passwords = yes
doing parameter dedicated keytab file = /etc/krb5.keytab
doing parameter kerberos method = secrets and keytab
doing parameter winbind refresh tickets = yes
doing parameter winbind trusted domains only = no
doing parameter winbind use default domain = yes
doing parameter winbind enum users = yes
doing parameter winbind enum groups = yes
doing parameter clustering = Yes
doing parameter ctdbd socket = /usr/local/samba/var/run/ctdb/ctdbd.socket
doing parameter fileid:mapping = fsid
doing parameter vfs objects = fileid
doing parameter idmap config *:backend = tdb
doing parameter idmap config *:range = 2000-9999
doing parameter idmap config SAMDOM:backend = ad
doing parameter idmap config SAMDOM:schema_mode = rfc2307
doing parameter idmap config SAMDOM:range = 10000-99999
doing parameter winbind nss info = rfc2307
doing parameter vfs objects = acl_xattr full_audit
doing parameter map acl inherit = Yes
doing parameter store dos attributes = Yes
doing parameter full_audit:prefix = %u|%I|%m|%S
doing parameter full_audit:success = mkdir rename unlink rmdir write
doing parameter full_audit:failure = read pread mkdir opendir rmdir telldir
doing parameter full_audit:facility = local7
doing parameter full_audit:priority = NOTICE
pm_process() returned Yes
lp_servicenumber: couldn't find homes
Maximum core file size limits now 16777216(soft) -1(hard)
Registering messaging pointer for type 2 - private_data=(nil)
Registering messaging pointer for type 9 - private_data=(nil)
Registered MSG_REQ_POOL_USAGE
Registering messaging pointer for type 11 - private_data=(nil)
Registering messaging pointer for type 12 - private_data=(nil)
Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED
Registering messaging pointer for type 1 - private_data=(nil)
Registering messaging pointer for type 5 - private_data=(nil)
lp_load_ex: refreshing parameters
Freeing parametrics:
Initialising global parameters
INFO: Current debug levels:
all: 9
tdb: 9
printdrivers: 9
lanman: 9
smb: 9
rpc_parse: 9
rpc_srv: 9
rpc_cli: 9
passdb: 9
sam: 9
auth: 9
winbind: 9
vfs: 9
idmap: 9
quota: 9
acls: 9
locking: 9
msdfs: 9
dmapi: 9
registry: 9
scavenger: 9
dns: 9
ldb: 9
tevent: 9
Processing section "[global]"
doing parameter log file = /var/log/samba/samba.log
doing parameter log level = 5
doing parameter netbios name = SMB2
doing parameter workgroup = SAMDOM
doing parameter security = ADS
doing parameter realm = AD.SAMDOM.LOCAL
doing parameter encrypt passwords = yes
doing parameter dedicated keytab file = /etc/krb5.keytab
doing parameter kerberos method = secrets and keytab
doing parameter winbind refresh tickets = yes
doing parameter winbind trusted domains only = no
doing parameter winbind use default domain = yes
doing parameter winbind enum users = yes
doing parameter winbind enum groups = yes
doing parameter clustering = Yes
doing parameter ctdbd socket = /usr/local/samba/var/run/ctdb/ctdbd.socket
doing parameter fileid:mapping = fsid
doing parameter vfs objects = fileid
doing parameter idmap config *:backend = tdb
doing parameter idmap config *:range = 2000-9999
doing parameter idmap config SAMDOM:backend = ad
doing parameter idmap config SAMDOM:schema_mode = rfc2307
doing parameter idmap config SAMDOM:range = 10000-99999
doing parameter winbind nss info = rfc2307
doing parameter vfs objects = acl_xattr full_audit
doing parameter map acl inherit = Yes
doing parameter store dos attributes = Yes
doing parameter full_audit:prefix = %u|%I|%m|%S
doing parameter full_audit:success = mkdir rename unlink rmdir write
doing parameter full_audit:failure = read pread mkdir opendir rmdir telldir
doing parameter full_audit:facility = local7
doing parameter full_audit:priority = NOTICE
pm_process() returned Yes
lp_servicenumber: couldn't find homes
added interface eth1 ip=10.10.10.2 bcast=10.10.255.255 netmask=255.255.0.0
added interface eth0 ip=192.168.254.4 bcast=192.168.254.255
netmask=255.255.255.0
Netbios name list:-
my_netbios_names[0]="SMB2"
added interface eth1 ip=10.10.10.2 bcast=10.10.255.255 netmask=255.255.0.0
added interface eth0 ip=192.168.254.4 bcast=192.168.254.255
netmask=255.255.255.0
db_open_ctdb: opened database 'g_lock.tdb' with dbid 0x4d2a432b
db_open_ctdb: opened database 'secrets.tdb' with dbid 0x7132c184
db_open_ctdb: opened database 'netlogon_creds_cli.tdb' with dbid
0x2d608c16
fcntl_lock 13 6 0 1 1
fcntl_lock: Lock call successful
TimeInit: Serverzone is -7200
initialize_winbindd_cache: clearing cache and re-creating with version number 2
db_open_ctdb: opened database 'serverid.tdb' with dbid 0x9ec2a880
check lock order 2 for serverid.tdb
release lock order 2 for serverid.tdb
Registering messaging pointer for type 33 - private_data=(nil)
Registering messaging pointer for type 13 - private_data=(nil)
Registering messaging pointer for type 1028 - private_data=(nil)
Registering messaging pointer for type 1027 - private_data=(nil)
Registering messaging pointer for type 1029 - private_data=(nil)
Registering messaging pointer for type 1036 - private_data=(nil)
Registering messaging pointer for type 1035 - private_data=(nil)
Registering messaging pointer for type 1280 - private_data=(nil)
Registering messaging pointer for type 1032 - private_data=(nil)
Registering messaging pointer for type 1033 - private_data=(nil)
Registering messaging pointer for type 1034 - private_data=(nil)
Registering messaging pointer for type 1 - private_data=(nil)
Overriding messaging pointer for type 1 - private_data=(nil)
check lock order 2 for g_lock.tdb
db_open_ctdb: opened database 'dbwrap_watchers.tdb' with dbid 0x6afb8c09
dbwrap_watch_record_stored: dbwrap_parse_record failed:
NT_STATUS_OBJECT_NAME_NOT_FOUND
release lock order 2 for g_lock.tdb
../source3/lib/dbwrap/dbwrap_ctdb.c:346 transaction started on db 0x7132c184
check lock order 2 for g_lock.tdb
release lock order 2 for g_lock.tdb
Added domain BUILTIN (null) S-1-5-32
Added domain SMB2 (null) S-1-5-21-3615789182-3690751189-1119034414
Added domain SAMDOM AD.SAMDOM.LOCAL S-1-5-21-1301114508-1723401605-1384196533
Registering messaging pointer for type 2 - private_data=(nil)
Registering messaging pointer for type 9 - private_data=(nil)
Registered MSG_REQ_POOL_USAGE
Registering messaging pointer for type 11 - private_data=(nil)
Registering messaging pointer for type 12 - private_data=(nil)
Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED
Registering messaging pointer for type 1 - private_data=(nil)
Registering messaging pointer for type 5 - private_data=(nil)
Deregistering messaging pointer for type 33 - private_data=(nil)
Deregistering messaging pointer for type 13 - private_data=(nil)
Deregistering messaging pointer for type 1028 - private_data=(nil)
Deregistering messaging pointer for type 1027 - private_data=(nil)
Deregistering messaging pointer for type 1029 - private_data=(nil)
Deregistering messaging pointer for type 1280 - private_data=(nil)
Deregistering messaging pointer for type 1033 - private_data=(nil)
Deregistering messaging pointer for type 1 - private_data=(nil)
Deregistering messaging pointer for type 1036 - private_data=(nil)
Deregistering messaging pointer for type 1035 - private_data=(nil)
Registering messaging pointer for type 1028 - private_data=(nil)
Registering messaging pointer for type 1027 - private_data=(nil)
Registering messaging pointer for type 1280 - private_data=(nil)
Registering messaging pointer for type 1 - private_data=(nil)
Registering messaging pointer for type 1034 - private_data=(nil)
Overriding messaging pointer for type 1034 - private_data=(nil)
child daemon request 51
connection_ok: Connection to (null) for domain SAMDOM is not connected
Opening cache file at /usr/local/samba/var/cache/gencache.tdb
Opening cache file at /usr/local/samba/var/lock/gencache_notrans.tdb
saf_fetch: Returning "dc2.ad.SAMDOM.local" for "SAMDOM"
domain
check_negative_conn_cache returning result 0 for domain SAMDOM server
dc2.ad.SAMDOM.local
check_negative_conn_cache returning result 0 for domain SAMDOM server
dc2.ad.SAMDOM.local
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
Connecting to 192.168.254.2 at port 445
Module 'tombstone_reanimate' is disabled. Skip registration.ldb_wrap
open of secrets.ldb
connecting to dc2.ad.SAMDOM.local from SMB2 with kerberos principal
[SMB2$@AD.SAMDOM.LOCAL] and realm [AD.SAMDOM.LOCAL]
Doing spnego session setup (blob length=96)
got OID=1.2.840.48018.1.2.2
got OID=1.2.840.113554.1.2.2
got OID=1.3.6.1.4.1.311.2.2.10
got principal=not_defined_in_RFC4178 at please_ignore
cli_session_setup_spnego: using target hostname not SPNEGO principal
cli_session_setup_spnego: guessed server principal=cifs/dc2.ad.SAMDOM.local at
AD.SAMDOM.LOCAL
Kinit for SMB2$@AD.SAMDOM.LOCAL to access cifs/dc2.ad.SAMDOM.local at
AD.SAMDOM.LOCAL failed: Preauthentication failed
SPNEGO login failed: Preauthentication failed
failed kerberos session setup with NT_STATUS_LOGON_FAILURE
connecting to dc2.ad.SAMDOM.local from SMB2 using NTLMSSP with username
[SAMDOM]\[SMB2$]
Doing spnego session setup (blob length=96)
got OID=1.2.840.48018.1.2.2
got OID=1.2.840.113554.1.2.2
got OID=1.3.6.1.4.1.311.2.2.10
got principal=not_defined_in_RFC4178 at please_ignore
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
Got challenge flags:
Got NTLMSSP neg_flags=0x62898215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_DOMAIN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
SPNEGO login failed: Logon failure
cm_get_ipc_userpass: No auth-user defined
cm_get_ipc_userpass: No auth-user defined
check_negative_conn_cache returning result 0 for domain SAMDOM server
dc2.ad.SAMDOM.local
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
Connecting to 192.168.254.2 at port 445
ldb_wrap open of secrets.ldb
connecting to dc2.ad.SAMDOM.local from SMB2 with kerberos principal
[SMB2$@AD.SAMDOM.LOCAL] and realm [AD.SAMDOM.LOCAL]
Doing spnego session setup (blob length=96)
got OID=1.2.840.48018.1.2.2
got OID=1.2.840.113554.1.2.2
got OID=1.3.6.1.4.1.311.2.2.10
got principal=not_defined_in_RFC4178 at please_ignore
cli_session_setup_spnego: using target hostname not SPNEGO principal
cli_session_setup_spnego: guessed server principal=cifs/dc2.ad.SAMDOM.local at
AD.SAMDOM.LOCAL
Kinit for SMB2$@AD.SAMDOM.LOCAL to access cifs/dc2.ad.SAMDOM.local at
AD.SAMDOM.LOCAL failed: Preauthentication failed
SPNEGO login failed: Preauthentication failed
failed kerberos session setup with NT_STATUS_LOGON_FAILURE
connecting to dc2.ad.SAMDOM.local from SMB2 using NTLMSSP with username
[SAMDOM]\[SMB2$]
Doing spnego session setup (blob length=96)
got OID=1.2.840.48018.1.2.2
got OID=1.2.840.113554.1.2.2
got OID=1.3.6.1.4.1.311.2.2.10
got principal=not_defined_in_RFC4178 at please_ignore
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
Got challenge flags:
Got NTLMSSP neg_flags=0x62898215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_DOMAIN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
SPNEGO login failed: Logon failure
cm_get_ipc_userpass: No auth-user defined
cm_get_ipc_userpass: No auth-user defined
check_negative_conn_cache returning result 0 for domain SAMDOM server
dc2.ad.SAMDOM.local
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
Connecting to 192.168.254.2 at port 445
ldb_wrap open of secrets.ldb
connecting to dc2.ad.SAMDOM.local from SMB2 with kerberos principal
[SMB2$@AD.SAMDOM.LOCAL] and realm [AD.SAMDOM.LOCAL]
Doing spnego session setup (blob length=96)
got OID=1.2.840.48018.1.2.2
got OID=1.2.840.113554.1.2.2
got OID=1.3.6.1.4.1.311.2.2.10
got principal=not_defined_in_RFC4178 at please_ignore
cli_session_setup_spnego: using target hostname not SPNEGO principal
cli_session_setup_spnego: guessed server principal=cifs/dc2.ad.SAMDOM.local at
AD.SAMDOM.LOCAL
Kinit for SMB2$@AD.SAMDOM.LOCAL to access cifs/dc2.ad.SAMDOM.local at
AD.SAMDOM.LOCAL failed: Preauthentication failed
SPNEGO login failed: Preauthentication failed
failed kerberos session setup with NT_STATUS_LOGON_FAILURE
connecting to dc2.ad.SAMDOM.local from SMB2 using NTLMSSP with username
[SAMDOM]\[SMB2$]
Doing spnego session setup (blob length=96)
got OID=1.2.840.48018.1.2.2
got OID=1.2.840.113554.1.2.2
got OID=1.3.6.1.4.1.311.2.2.10
got principal=not_defined_in_RFC4178 at please_ignore
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
Got challenge flags:
Got NTLMSSP neg_flags=0x62898215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_DOMAIN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
SPNEGO login failed: Logon failure
cm_get_ipc_userpass: No auth-user defined
cm_get_ipc_userpass: No auth-user defined
set_dc_type_and_flags_connect: domain SAMDOM
set_dc_type_and_flags_connect: Could not bind to PI_DSSETUP on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
set_dc_type_and_flags_connect: Could not bind to PI_LSARPC on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
winbindd_dual_init_connection: SAMDOM returning without initialization online =
1
Finished processing child request 51
child daemon request 20
[ 7503]: list trusted domains
set_dc_type_and_flags_connect: domain SAMDOM
set_dc_type_and_flags_connect: Could not bind to PI_DSSETUP on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
set_dc_type_and_flags_connect: Could not bind to PI_LSARPC on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
get_cache: Setting ADS methods for domain SAMDOM
ads: trusted_domains
set_dc_type_and_flags_connect: domain SAMDOM
set_dc_type_and_flags_connect: Could not bind to PI_DSSETUP on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
set_dc_type_and_flags_connect: Could not bind to PI_LSARPC on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
set_dc_type_and_flags_connect: domain SAMDOM
set_dc_type_and_flags_connect: Could not bind to PI_DSSETUP on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
set_dc_type_and_flags_connect: Could not bind to PI_LSARPC on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
ldb_wrap open of secrets.ldb
db_open_ctdb: opened database 'g_lock.tdb' with dbid 0x4d2a432b
rpccli_setup_netlogon_creds: failed to open noauth netlogon connection to
dc2.ad.SAMDOM.local - NT_STATUS_USER_SESSION_DELETED
rpccli_setup_netlogon_creds failed for SAMDOM, unable to setup NETLOGON
credentials: NT_STATUS_USER_SESSION_DELETED
trusted_domains: Could not open a connection to SAMDOM for PIPE_NETLOGON
(NT_STATUS_USER_SESSION_DELETED)
ads: trusted_domains
set_dc_type_and_flags_connect: domain SAMDOM
set_dc_type_and_flags_connect: Could not bind to PI_DSSETUP on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
set_dc_type_and_flags_connect: Could not bind to PI_LSARPC on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
set_dc_type_and_flags_connect: domain SAMDOM
set_dc_type_and_flags_connect: Could not bind to PI_DSSETUP on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
set_dc_type_and_flags_connect: Could not bind to PI_LSARPC on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
ldb_wrap open of secrets.ldb
db_open_ctdb: opened database 'g_lock.tdb' with dbid 0x4d2a432b
ndr_pull_error(11): Pull bytes 4 (../librpc/ndr/ndr_basic.c:152)
rpccli_setup_netlogon_creds: failed to open noauth netlogon connection to
dc2.ad.SAMDOM.local - NT_STATUS_USER_SESSION_DELETED
rpccli_setup_netlogon_creds failed for SAMDOM, unable to setup NETLOGON
credentials: NT_STATUS_USER_SESSION_DELETED
trusted_domains: Could not open a connection to SAMDOM for PIPE_NETLOGON
(NT_STATUS_USER_SESSION_DELETED)
winbindd_dual_list_trusted_domains: trusted_domains returned
NT_STATUS_UNSUCCESSFUL
Finished processing child request 20
trustdom_list_done: Could not receive trustdoms
accepted socket 26
[ 7575]: request interface version (version = 27)
[ 7575]: request location of privileged pipe
accepted socket 28
closing socket 26, client exited
closing socket 28, client exited
Registering messaging pointer for type 1030 - private_data=(nil)
Registering messaging pointer for type 1031 - private_data=(nil)
Deregistering messaging pointer for type 33 - private_data=(nil)
Deregistering messaging pointer for type 13 - private_data=(nil)
Deregistering messaging pointer for type 1028 - private_data=(nil)
Deregistering messaging pointer for type 1027 - private_data=(nil)
Deregistering messaging pointer for type 1029 - private_data=(nil)
Deregistering messaging pointer for type 1280 - private_data=(nil)
Deregistering messaging pointer for type 1033 - private_data=(nil)
Deregistering messaging pointer for type 1 - private_data=(nil)
Deregistering messaging pointer for type 1036 - private_data=(nil)
Deregistering messaging pointer for type 1035 - private_data=(nil)
Opening cache file at /usr/local/samba/var/cache/gencache.tdb
Opening cache file at /usr/local/samba/var/lock/gencache_notrans.tdb
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
ads_dc_name: domain=SAMDOM
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
resolve_and_ping_dns: (cldap) looking for realm 'AD.SAMDOM.LOCAL'
get_sorted_dc_list: attempting lookup for name AD.SAMDOM.LOCAL (sitename
Default-First-Site-Name)
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
name AD.SAMDOM.LOCAL#1C found.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:389 192.168.254.1:389
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
ads_try_connect: sending CLDAP request to 192.168.254.2 (realm: AD.SAMDOM.LOCAL)
Successfully contacted LDAP server 192.168.254.2
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
resolve_ads: Attempting to resolve KDCs for AD.SAMDOM.LOCAL using DNS
ads_dns_lookup_srv: 2 records returned in the answer section.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:88 192.168.254.1:88
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
resolve_ads: Attempting to resolve KDCs for AD.SAMDOM.LOCAL using DNS
ads_dns_lookup_srv: 2 records returned in the answer section.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:88 192.168.254.1:88
create_local_private_krb5_conf_for_domain: wrote file
/usr/local/samba/var/lock/smb_krb5/krb5.conf.SAMDOM with realm AD.SAMDOM.LOCAL
KDC list = kdc = 192.168.254.2
kdc = 192.168.254.1
ads_dc_name: using server='DC2.AD.SAMDOM.LOCAL' IP=192.168.254.2
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
get_sorted_dc_list: attempting lookup for name AD.SAMDOM.LOCAL (sitename
Default-First-Site-Name)
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
name AD.SAMDOM.LOCAL#1C found.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:389 192.168.254.1:389
check_negative_conn_cache returning result 0 for domain SAMDOM server
192.168.254.2
check_negative_conn_cache returning result 0 for domain SAMDOM server
192.168.254.1
get_sorted_dc_list: attempting lookup for name AD.SAMDOM.LOCAL (sitename NULL)
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
name AD.SAMDOM.LOCAL#1C found.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:389 192.168.254.1:389
check_negative_conn_cache returning result 0 for domain SAMDOM server
192.168.254.2
check_negative_conn_cache returning result 0 for domain SAMDOM server
192.168.254.1
msg_try_to_go_online: received for domain SAMDOM.
msg_try_to_go_online: domain SAMDOM already online.
Already reaped child 7696 died
accepted socket 26
[ 7698]: request interface version (version = 27)
[ 7698]: request location of privileged pipe
accepted socket 28
closing socket 26, client exited
getgroups tunnelssh
child daemon request 59
set_dc_type_and_flags_connect: domain SAMDOM
set_dc_type_and_flags_connect: Could not bind to PI_DSSETUP on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
set_dc_type_and_flags_connect: Could not bind to PI_LSARPC on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
set_dc_type_and_flags_connect: domain SAMDOM
set_dc_type_and_flags_connect: Could not bind to PI_DSSETUP on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
set_dc_type_and_flags_connect: Could not bind to PI_LSARPC on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
ads: fetch sequence_number for SAMDOM
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
ads_dc_name: domain=SAMDOM
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
resolve_and_ping_dns: (cldap) looking for realm 'AD.SAMDOM.LOCAL'
get_sorted_dc_list: attempting lookup for name AD.SAMDOM.LOCAL (sitename
Default-First-Site-Name)
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
name AD.SAMDOM.LOCAL#1C found.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:389 192.168.254.1:389
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
ads_try_connect: sending CLDAP request to 192.168.254.2 (realm: AD.SAMDOM.LOCAL)
Successfully contacted LDAP server 192.168.254.2
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
resolve_ads: Attempting to resolve KDCs for AD.SAMDOM.LOCAL using DNS
ads_dns_lookup_srv: 2 records returned in the answer section.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:88 192.168.254.1:88
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
resolve_ads: Attempting to resolve KDCs for AD.SAMDOM.LOCAL using DNS
ads_dns_lookup_srv: 2 records returned in the answer section.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:88 192.168.254.1:88
create_local_private_krb5_conf_for_domain: wrote file
/usr/local/samba/var/lock/smb_krb5/krb5.conf.SAMDOM with realm AD.SAMDOM.LOCAL
KDC list = kdc = 192.168.254.2
kdc = 192.168.254.1
ads_dc_name: using server='DC2.AD.SAMDOM.LOCAL' IP=192.168.254.2
ads_find_dc: (ldap) looking for realm 'AD.SAMDOM.LOCAL' and falling back
to domain 'SAMDOM'
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
ads_dc_name: domain=SAMDOM
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
resolve_and_ping_dns: (cldap) looking for realm 'AD.SAMDOM.LOCAL'
get_sorted_dc_list: attempting lookup for name AD.SAMDOM.LOCAL (sitename
Default-First-Site-Name)
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
name AD.SAMDOM.LOCAL#1C found.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:389 192.168.254.1:389
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
ads_try_connect: sending CLDAP request to 192.168.254.2 (realm: AD.SAMDOM.LOCAL)
Successfully contacted LDAP server 192.168.254.2
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
resolve_ads: Attempting to resolve KDCs for AD.SAMDOM.LOCAL using DNS
ads_dns_lookup_srv: 2 records returned in the answer section.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:88 192.168.254.1:88
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
resolve_ads: Attempting to resolve KDCs for AD.SAMDOM.LOCAL using DNS
ads_dns_lookup_srv: 2 records returned in the answer section.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:88 192.168.254.1:88
create_local_private_krb5_conf_for_domain: wrote file
/usr/local/samba/var/lock/smb_krb5/krb5.conf.SAMDOM with realm AD.SAMDOM.LOCAL
KDC list = kdc = 192.168.254.2
kdc = 192.168.254.1
ads_dc_name: using server='DC2.AD.SAMDOM.LOCAL' IP=192.168.254.2
ads_try_connect: sending CLDAP request to 192.168.254.2 (realm: AD.SAMDOM.LOCAL)
Successfully contacted LDAP server 192.168.254.2
Connected to LDAP server dc2.ad.SAMDOM.local
KDC time offset is 0 seconds
Found SASL mechanism GSS-SPNEGO
ads_sasl_spnego_bind: got OID=1.2.840.48018.1.2.2
ads_sasl_spnego_bind: got OID=1.2.840.113554.1.2.2
ads_sasl_spnego_bind: got OID=1.3.6.1.4.1.311.2.2.10
Starting GENSEC mechanism spnego
Starting GENSEC submechanism gse_krb5
gss_acquire_creds failed for GSS_C_NO_NAME with [ No credentials were supplied,
or the credentials were unavailable or inaccessible.: unknown mech-code 0 for
mech 1 2 840 113554 1 2 2] -the caller may retry after a kinit.
Failed to start GENSEC client mech gse_krb5: NT_STATUS_INTERNAL_ERROR
kerberos_kinit_password SMB2$@AD.SAMDOM.LOCAL failed: Preauthentication failed
ads_connect for domain SAMDOM failed: Preauthentication failed
ads: fetch sequence_number for SAMDOM
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
ads_dc_name: domain=SAMDOM
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
resolve_and_ping_dns: (cldap) looking for realm 'AD.SAMDOM.LOCAL'
get_sorted_dc_list: attempting lookup for name AD.SAMDOM.LOCAL (sitename
Default-First-Site-Name)
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
name AD.SAMDOM.LOCAL#1C found.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:389 192.168.254.1:389
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
ads_try_connect: sending CLDAP request to 192.168.254.2 (realm: AD.SAMDOM.LOCAL)
Successfully contacted LDAP server 192.168.254.2
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
resolve_ads: Attempting to resolve KDCs for AD.SAMDOM.LOCAL using DNS
ads_dns_lookup_srv: 2 records returned in the answer section.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:88 192.168.254.1:88
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
resolve_ads: Attempting to resolve KDCs for AD.SAMDOM.LOCAL using DNS
ads_dns_lookup_srv: 2 records returned in the answer section.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:88 192.168.254.1:88
create_local_private_krb5_conf_for_domain: wrote file
/usr/local/samba/var/lock/smb_krb5/krb5.conf.SAMDOM with realm AD.SAMDOM.LOCAL
KDC list = kdc = 192.168.254.2
kdc = 192.168.254.1
ads_dc_name: using server='DC2.AD.SAMDOM.LOCAL' IP=192.168.254.2
ads_find_dc: (ldap) looking for realm 'AD.SAMDOM.LOCAL' and falling back
to domain 'SAMDOM'
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
ads_dc_name: domain=SAMDOM
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
resolve_and_ping_dns: (cldap) looking for realm 'AD.SAMDOM.LOCAL'
get_sorted_dc_list: attempting lookup for name AD.SAMDOM.LOCAL (sitename
Default-First-Site-Name)
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
name AD.SAMDOM.LOCAL#1C found.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:389 192.168.254.1:389
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
ads_try_connect: sending CLDAP request to 192.168.254.2 (realm: AD.SAMDOM.LOCAL)
Successfully contacted LDAP server 192.168.254.2
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
resolve_ads: Attempting to resolve KDCs for AD.SAMDOM.LOCAL using DNS
ads_dns_lookup_srv: 2 records returned in the answer section.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:88 192.168.254.1:88
saf_fetch[join]: Returning "dc2.ad.SAMDOM.local" for
"AD.SAMDOM.LOCAL" domain
get_dc_list: preferred server list: "dc2.ad.SAMDOM.local, *"
resolve_ads: Attempting to resolve KDCs for AD.SAMDOM.LOCAL using DNS
ads_dns_lookup_srv: 2 records returned in the answer section.
Adding 2 DC's from auto lookup
sitename_fetch: Returning sitename for AD.SAMDOM.LOCAL:
"Default-First-Site-Name"
name dc2.ad.SAMDOM.local#20 found.
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.1
check_negative_conn_cache returning result 0 for domain AD.SAMDOM.LOCAL server
192.168.254.2
get_dc_list: returning 2 ip addresses in an ordered list
get_dc_list: 192.168.254.2:88 192.168.254.1:88
create_local_private_krb5_conf_for_domain: wrote file
/usr/local/samba/var/lock/smb_krb5/krb5.conf.SAMDOM with realm AD.SAMDOM.LOCAL
KDC list = kdc = 192.168.254.2
kdc = 192.168.254.1
ads_dc_name: using server='DC2.AD.SAMDOM.LOCAL' IP=192.168.254.2
ads_try_connect: sending CLDAP request to 192.168.254.2 (realm: AD.SAMDOM.LOCAL)
Successfully contacted LDAP server 192.168.254.2
Connected to LDAP server dc2.ad.SAMDOM.local
KDC time offset is 0 seconds
Found SASL mechanism GSS-SPNEGO
ads_sasl_spnego_bind: got OID=1.2.840.48018.1.2.2
ads_sasl_spnego_bind: got OID=1.2.840.113554.1.2.2
ads_sasl_spnego_bind: got OID=1.3.6.1.4.1.311.2.2.10
Starting GENSEC mechanism spnego
Starting GENSEC submechanism gse_krb5
gss_acquire_creds failed for GSS_C_NO_NAME with [ No credentials were supplied,
or the credentials were unavailable or inaccessible.: unknown mech-code 0 for
mech 1 2 840 113554 1 2 2] -the caller may retry after a kinit.
Failed to start GENSEC client mech gse_krb5: NT_STATUS_INTERNAL_ERROR
kerberos_kinit_password SMB2$@AD.SAMDOM.LOCAL failed: Preauthentication failed
ads_connect for domain SAMDOM failed: Preauthentication failed
set_dc_type_and_flags_connect: domain SAMDOM
set_dc_type_and_flags_connect: Could not bind to PI_DSSETUP on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
set_dc_type_and_flags_connect: Could not bind to PI_LSARPC on domain SAMDOM:
(NT_STATUS_USER_SESSION_DELETED)
Finished processing child request 59
Could not convert sid S-0-0: NT_STATUS_UNSUCCESSFUL
accepted socket 26
[ 7700]: request interface version (version = 27)
[ 7700]: request location of privileged pipe
accepted socket 29
closing socket 26, client exited
getgroups tunnelssh
Could not convert sid S-0-0: NT_STATUS_UNSUCCESSFUL
closing socket 29, client exited
closing socket 28, client exited
accepted socket 26
[ 7769]: request interface version (version = 27)
[ 7769]: request location of privileged pipe
accepted socket 28
closing socket 26, client exited
closing socket 28, client exited