Alejandro Hernández
2005-Jul-07 08:13 UTC
[Samba] Migration: server with smb 2.2 -> new server, 2.2 too, weird issues
Hello all at the samba list.
The other day there was a migration of server; the old one had Samba 2.2
(.6) working normally. Every user logged in the domain without problems,
their SIDs and the domain SID were right, everything was ideal. But a
server update was needed, and a new server was installed, also with
Samba 2.2 (.12). The difference in version is not important this time as
other steps have come from far older versions.
They have chosen not to use Samba 3. Don't ask me why, they don't want
Samba 3.
We have a mechanism of transparent domain migration that implies zero
notices to the user. It consists on re-creation, on unix level, of the
same accounts existing on the old server: user & machine names, IDs,
homes, shell, etc. via a script shell that exports and imports passwd
file values. Then, at Samba level, the server is configured with the
same values it had on the older server at smb.conf, another few values
put, and finally the old server secrets.tdb and smbpasswd files are
copied and left alone. They never know we change servers. Only if they
notice more speed, and they never tell us.
But this time something went wrong. First of all, we didn't do the
migration and were not asked to intervene in the migration. Thus, they
used their own method. They overwrote the new /etc/passwd file with the
old /etc/passwd (a typical cp). The old one used shadow, the new
doesn't. It took the teams involved (we were called later in the
process) 3 hours to minimally correct the accounts so anyone could log
in without problems.
It's clear it was not correct right from this moment onwards. At this
stage, nobody could join the domain. I was not at work (my mates left at
2:00 AM) so next day I could correct it. Just by putting the two main
Samba files a lot of machines & users (from 300 machines in total),
about 100, could start working. After some hours of tuning and
correcting smb files more than 200 could finally work. The problem lays
in the rest; they are not a lot but critical.
Before I put back the couple of samba files, the message they were
getting was that of "the domain is unavailable or the machine account
does not exist" or something like that. Seen it thousands of times but
can't remember. After putting the files, the message was something
"User
or password incorrect, check caps lock key, or try to type better, etc".
You may know the message, again I can't remember.
The password and user is not for sure. I tested with one user, changing
her password. Nothing. Unconceivable. This last step is never needed.
Between this and that, restarting samba 3 or 5 times (I know 99% of the
time it's not needed and in these cases it isn't but...). I even brought
MACHINE.SID. Nothing at all. Once, I can't remember well, the user
logged in with the old password re-set (sure the MACHINE.SID and a samba
restart had to do) but couldn't use the remote profile (the typical
messages... again very seen) that gets corrected with "profile acls =
yes" and by changing the marvellous setting MS put on recent SPs of
their fabulous OS. Users could use their profiles. So I won a dozen more
or so and the defective number was decreasing but not disappearing.
It was ok for an user. For the rest of network users on the machine
(local profiles are used), no solution. None can log in the domain.
None. In other machines, no user can log in anyhow, and of course it
happens in the most important. Make it or not the trick of before. The
message I get is it of the "User or password incorrect" which is not
true. It must refer to something deeeeeep in.
It may be by the differences between PCs... but they are all "kits"
designed here so they all have the same configuration. Worth another
look into anyway.
Before going into logs and config files, has anybody suffered from
something like this? Is or has been there anybody with the same
headaches? Should I use only roaming profiles with no local storing?
I have attached some files: smb.conf, some smb.log of users (traces
varied from 1 to 3 with no explicit at all messages, like other cases
that helped me a lot) and a regmon (sysinternals.com) log file that has
given me some clues.
############ SMB.CONF
# Global parameters
[global]
workgroup = SERVER_SMB
netbios name = SERVER
encrypt passwords = Yes
null passwords = Yes
smb passwd file = /etc/samba/lib/smbpasswd
log file = /tmp/%m_%U
time server = Yes
socket options = TCP_NODELAY SO_RCVBUF=8576 SO_SNDBUF=8576
add user script = /etc/samba/bin/crea_maquina.sh %m
logon script = %G.bat
logon path = \\SERVER\perfiles\%G\%U
logon drive = C:
domain logons = Yes
os level = 64
preferred master = Yes
domain master = Yes
dns proxy = No
wins support = Yes
lock dir = /var/opt/samba/locks
include = /etc/samba/lib/LOCAL_smb.conf
.
.
.
[perfiles]
path = /path/perfiles
read only = No
create mask = 0777
directory mask = 0777
browseable = No
profile acls = yes
##################### USER LOG FILE
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7267 of length 152
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBsesssetupX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/reply.c:(893)
Domain=[] NativeOS=[Windows 2002 2600 Service Pack 1]
NativeLanMan=[Windows 2002 5.1]
[2005/07/05 15:35:23, 3] smbd/reply.c:(904)
sesssetupX:name=[]
[2005/07/05 15:35:23, 3] param/loadparm.c:(1307)
Initialising global parameters
[2005/07/05 15:35:23, 3] param/params.c:(626)
params.c:pm_process() - Processing configuration file
"/etc/opt/samba/smb.conf"
[2005/07/05 15:35:23, 3] param/loadparm.c:(3102)
Processing section "[global]"
[2005/07/05 15:35:23, 3] param/params.c:(626)
params.c:pm_process() - Processing configuration file
"/etc/samba/lib/DECAPM0_smb.conf"
[2005/07/05 15:35:23, 3] param/loadparm.c:(3102)
Processing section "[global]"
[2005/07/05 15:35:23, 1] lib/debug.c:(256)
INFO: Debug class all level = 3 (pid 26434 from pid 26434)
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[perfiles]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[netlogon]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[perfiles]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[HOMES]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[grupo]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[comun]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[logon]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[W]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[das]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[etc]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[mindocu]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[minforms]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[docu]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[forms]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[we]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[printers]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[jetadmin]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[inventario]"
[2005/07/05 15:35:23, 2] param/loadparm.c:(3120)
Processing section "[logs]"
[2005/07/05 15:35:23, 3] param/loadparm.c:(2075)
adding IPC service IPC$
[2005/07/05 15:35:23, 3] param/loadparm.c:(2075)
adding IPC service ADMIN$
[2005/07/05 15:35:23, 3] param/loadparm.c:(2109)
adding printer service guardia2
[2005/07/05 15:35:23, 3] param/loadparm.c:(2109)
adding printer service guardia1
[2005/07/05 15:35:23, 3] param/loadparm.c:(2109)
adding printer service jddva1
[2005/07/05 15:35:23, 2] lib/interface.c:(81)
added interface ip=10.44.36.13 bcast=10.44.37.255 nmask=255.255.254.0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(296)
push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1
[2005/07/05 15:35:23, 3] smbd/uid.c:(285)
push_conn_ctx(0) : conn_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(172)
get_current_groups: user is in 2 groups: 50, 6
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(435)
pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(172)
get_current_groups: user is in 2 groups: 50, 6
[2005/07/05 15:35:23, 3] smbd/uid.c:(590)
fetch sid from uid cache 512 ->
S-1-5-21-1517441303-804621452-1457755469-2024
[2005/07/05 15:35:23, 3] smbd/uid.c:(666)
fetch sid from gid cache 50 ->
S-1-5-21-1517441303-804621452-1457755469-1101
[2005/07/05 15:35:23, 3] smbd/uid.c:(666)
fetch sid from gid cache 6 ->
S-1-5-21-1517441303-804621452-1457755469-1013
[2005/07/05 15:35:23, 3] smbd/password.c:(336)
uid 512 registered to name gerencia
[2005/07/05 15:35:23, 3] smbd/password.c:(338)
Clearing default real name
[2005/07/05 15:35:23, 3] smbd/password.c:(340)
User name: gerencia Real name: Usuario LIBRA
[2005/07/05 15:35:23, 3] smbd/process.c:(1003)
Chained message
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBtconX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/password.c:(576)
Account for user 'gerencia' has no password and null passwords are
allowed.
[2005/07/05 15:35:23, 3] smbd/password.c:(774)
authorise_login: ACCEPTED: given username (gerencia) password ok
[2005/07/05 15:35:23, 3] smbd/service.c:(487)
Connect path is /tmp
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(296)
push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1
[2005/07/05 15:35:23, 3] smbd/uid.c:(285)
push_conn_ctx(0) : conn_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(172)
get_current_groups: user is in 2 groups: 50, 6
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(435)
pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(172)
get_current_groups: user is in 2 groups: 50, 6
[2005/07/05 15:35:23, 3] smbd/uid.c:(590)
fetch sid from uid cache 512 ->
S-1-5-21-1517441303-804621452-1457755469-2024
[2005/07/05 15:35:23, 3] smbd/uid.c:(666)
fetch sid from gid cache 50 ->
S-1-5-21-1517441303-804621452-1457755469-1101
[2005/07/05 15:35:23, 3] smbd/uid.c:(666)
fetch sid from gid cache 6 ->
S-1-5-21-1517441303-804621452-1457755469-1013
[2005/07/05 15:35:23, 3] lib/util_seaccess.c:(273)
se_access_check: user sid is
S-1-5-21-1517441303-804621452-1457755469-2024
[2005/07/05 15:35:23, 3] lib/util_seaccess.c:(276)
se_access_check: also S-1-5-21-1517441303-804621452-1457755469-1101
[2005/07/05 15:35:23, 3] lib/util_seaccess.c:(276)
se_access_check: also S-1-5-21-1517441303-804621452-1457755469-1013
[2005/07/05 15:35:23, 3] lib/util_seaccess.c:(276)
se_access_check: also S-1-1-0
[2005/07/05 15:35:23, 3] lib/util_seaccess.c:(276)
se_access_check: also S-1-5-2
[2005/07/05 15:35:23, 3] lib/util_seaccess.c:(276)
se_access_check: also S-1-5-32-546
[2005/07/05 15:35:23, 3] smbd/vfs.c:(123)
Initialising default vfs hooks
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (512, 50) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(334)
2 user groups:
50 6
[2005/07/05 15:35:23, 3] smbd/vfs.c:(600)
vfs_ChDir to /tmp
[2005/07/05 15:35:23, 3] smbd/service.c:(636)
xba0687 (10.44.37.199) connect to service IPC$ as user gerencia
(uid=512, gid=50) (pid 26434)
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/reply.c:(396)
tconX service=ipc$ user=gerencia
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7268 of length 97
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBntcreateX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (512, 50) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(334)
2 user groups:
50 6
[2005/07/05 15:35:23, 3] smbd/nttrans.c:(559)
nt_open_pipe: Known pipe NETLOGON opening.
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7269 of length 140
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBwriteX (pid 26434)
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(796)
api_pipe_bind_req: \PIPE\NETLOGON -> \PIPE\lsass
[2005/07/05 15:35:23, 3] smbd/pipes.c:(197)
writeX-IPC pnum=74a9 nwritten=72
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7270 of length 63
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBreadX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/pipes.c:(238)
readX-IPC pnum=74a9 min=1024 max=1024 nread=68
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7271 of length 364
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBwriteX (pid 26434)
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 0
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1195)
Doing \PIPE\NETLOGON
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1227)
api_rpcTNP: pipe 29865 rpc command: NET_SAMLOGON
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 668
[2005/07/05 15:35:23, 3] smbd/pipes.c:(197)
writeX-IPC pnum=74a9 nwritten=296
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7272 of length 63
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBreadX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/pipes.c:(238)
readX-IPC pnum=74a9 min=1024 max=1024 nread=56
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7273 of length 45
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBclose (pid 26434)
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7274 of length 97
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBntcreateX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/nttrans.c:(559)
nt_open_pipe: Known pipe NETLOGON opening.
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7275 of length 140
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBwriteX (pid 26434)
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(796)
api_pipe_bind_req: \PIPE\NETLOGON -> \PIPE\lsass
[2005/07/05 15:35:23, 3] smbd/pipes.c:(197)
writeX-IPC pnum=74aa nwritten=72
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7276 of length 63
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBreadX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/pipes.c:(238)
readX-IPC pnum=74aa min=1024 max=1024 nread=68
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7277 of length 164
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBwriteX (pid 26434)
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 0
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1195)
Doing \PIPE\NETLOGON
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1227)
api_rpcTNP: pipe 29866 rpc command: NET_REQCHAL
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(296)
push_sec_ctx(512, 50) : sec_ctx_stack_ndx = 1
[2005/07/05 15:35:23, 3] smbd/uid.c:(285)
push_conn_ctx(117) : conn_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(435)
pop_sec_ctx (512, 50) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 36
[2005/07/05 15:35:23, 3] smbd/pipes.c:(197)
writeX-IPC pnum=74aa nwritten=96
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7278 of length 63
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBreadX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/pipes.c:(238)
readX-IPC pnum=74aa min=1024 max=1024 nread=36
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7279 of length 200
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBwriteX (pid 26434)
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 0
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1195)
Doing \PIPE\NETLOGON
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 0
[2005/07/05 15:35:23, 3] smbd/pipes.c:(197)
writeX-IPC pnum=74aa nwritten=132
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7280 of length 63
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBreadX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/pipes.c:(238)
readX-IPC pnum=74aa min=1024 max=1024 nread=32
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7281 of length 200
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBwriteX (pid 26434)
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 0
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1195)
Doing \PIPE\NETLOGON
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1227)
api_rpcTNP: pipe 29866 rpc command: NET_AUTH2
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 54
[2005/07/05 15:35:23, 3] smbd/pipes.c:(197)
writeX-IPC pnum=74aa nwritten=132
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7282 of length 63
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBreadX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/pipes.c:(238)
readX-IPC pnum=74aa min=1024 max=1024 nread=40
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7283 of length 152
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBsesssetupX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/reply.c:(893)
Domain=[] NativeOS=[Windows 2002 2600 Service Pack 1]
NativeLanMan=[Windows 2002 5.1]
[2005/07/05 15:35:23, 3] smbd/reply.c:(904)
sesssetupX:name=[]
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(296)
push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1
[2005/07/05 15:35:23, 3] smbd/uid.c:(285)
push_conn_ctx(0) : conn_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(172)
get_current_groups: user is in 2 groups: 50, 6
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(435)
pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(172)
get_current_groups: user is in 2 groups: 50, 6
[2005/07/05 15:35:23, 3] smbd/uid.c:(590)
fetch sid from uid cache 512 ->
S-1-5-21-1517441303-804621452-1457755469-2024
[2005/07/05 15:35:23, 3] smbd/uid.c:(666)
fetch sid from gid cache 50 ->
S-1-5-21-1517441303-804621452-1457755469-1101
[2005/07/05 15:35:23, 3] smbd/uid.c:(666)
fetch sid from gid cache 6 ->
S-1-5-21-1517441303-804621452-1457755469-1013
[2005/07/05 15:35:23, 3] smbd/password.c:(336)
uid 512 registered to name gerencia
[2005/07/05 15:35:23, 3] smbd/password.c:(338)
Clearing default real name
[2005/07/05 15:35:23, 3] smbd/password.c:(340)
User name: gerencia Real name: Usuario LIBRA
[2005/07/05 15:35:23, 3] smbd/process.c:(1003)
Chained message
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBtconX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/password.c:(576)
Account for user 'gerencia' has no password and null passwords are
allowed.
[2005/07/05 15:35:23, 3] smbd/password.c:(774)
authorise_login: ACCEPTED: given username (gerencia) password ok
[2005/07/05 15:35:23, 3] smbd/service.c:(487)
Connect path is /tmp
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(296)
push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1
[2005/07/05 15:35:23, 3] smbd/uid.c:(285)
push_conn_ctx(0) : conn_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(172)
get_current_groups: user is in 2 groups: 50, 6
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(435)
pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(172)
get_current_groups: user is in 2 groups: 50, 6
[2005/07/05 15:35:23, 3] smbd/uid.c:(590)
fetch sid from uid cache 512 ->
S-1-5-21-1517441303-804621452-1457755469-2024
[2005/07/05 15:35:23, 3] smbd/uid.c:(666)
fetch sid from gid cache 50 ->
S-1-5-21-1517441303-804621452-1457755469-1101
[2005/07/05 15:35:23, 3] smbd/uid.c:(666)
fetch sid from gid cache 6 ->
S-1-5-21-1517441303-804621452-1457755469-1013
[2005/07/05 15:35:23, 3] lib/util_seaccess.c:(273)
se_access_check: user sid is
S-1-5-21-1517441303-804621452-1457755469-2024
[2005/07/05 15:35:23, 3] lib/util_seaccess.c:(276)
se_access_check: also S-1-5-21-1517441303-804621452-1457755469-1101
[2005/07/05 15:35:23, 3] lib/util_seaccess.c:(276)
se_access_check: also S-1-5-21-1517441303-804621452-1457755469-1013
[2005/07/05 15:35:23, 3] lib/util_seaccess.c:(276)
se_access_check: also S-1-1-0
[2005/07/05 15:35:23, 3] lib/util_seaccess.c:(276)
se_access_check: also S-1-5-2
[2005/07/05 15:35:23, 3] lib/util_seaccess.c:(276)
se_access_check: also S-1-5-32-546
[2005/07/05 15:35:23, 3] smbd/vfs.c:(123)
Initialising default vfs hooks
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (512, 50) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(334)
2 user groups:
50 6
[2005/07/05 15:35:23, 3] smbd/service.c:(636)
xba0687 (10.44.37.199) connect to service IPC$ as user gerencia
(uid=512, gid=50) (pid 26434)
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/reply.c:(396)
tconX service=ipc$ user=gerencia
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7284 of length 95
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBntcreateX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (512, 50) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(334)
2 user groups:
50 6
[2005/07/05 15:35:23, 3] smbd/nttrans.c:(559)
nt_open_pipe: Known pipe lsarpc opening.
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7285 of length 140
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBwriteX (pid 26434)
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(796)
api_pipe_bind_req: \PIPE\lsarpc -> \PIPE\lsass
[2005/07/05 15:35:23, 3] smbd/pipes.c:(197)
writeX-IPC pnum=74ab nwritten=72
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7286 of length 63
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBreadX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/pipes.c:(238)
readX-IPC pnum=74ab min=1024 max=1024 nread=68
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7287 of length 156
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBwriteX (pid 26434)
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 0
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1195)
Doing \PIPE\lsarpc
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1227)
api_rpcTNP: pipe 29867 rpc command: LSA_OPENPOLICY2
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 20
[2005/07/05 15:35:23, 3] smbd/pipes.c:(197)
writeX-IPC pnum=74ab nwritten=88
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7288 of length 63
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBreadX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/pipes.c:(238)
readX-IPC pnum=74ab min=1024 max=1024 nread=48
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7289 of length 120
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBwriteX (pid 26434)
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 0
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1195)
Doing \PIPE\lsarpc
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1227)
api_rpcTNP: pipe 29867 rpc command: LSA_ENUMTRUSTDOM
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 0
[2005/07/05 15:35:23, 3] smbd/pipes.c:(197)
writeX-IPC pnum=74ab nwritten=52
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7290 of length 63
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBreadX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/pipes.c:(238)
readX-IPC pnum=74ab min=1024 max=1024 nread=40
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7291 of length 112
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBwriteX (pid 26434)
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 0
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1195)
Doing \PIPE\lsarpc
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1227)
api_rpcTNP: pipe 29867 rpc command: LSA_CLOSE
[2005/07/05 15:35:23, 3] rpc_server/srv_lsa_hnd.c:(197)
Closed policy
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 0
[2005/07/05 15:35:23, 3] smbd/pipes.c:(197)
writeX-IPC pnum=74ab nwritten=44
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7292 of length 63
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBreadX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/pipes.c:(238)
readX-IPC pnum=74ab min=1024 max=1024 nread=48
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7293 of length 45
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBclose (pid 26434)
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7294 of length 364
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBwriteX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (512, 50) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(334)
2 user groups:
50 6
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 0
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1195)
Doing \PIPE\NETLOGON
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe.c:(1227)
api_rpcTNP: pipe 29866 rpc command: NET_SAMLOGON
[2005/07/05 15:35:23, 3] rpc_server/srv_netlog_nt.c:(618)
SAM Logon (Interactive). Domain:[DECAPM0_MJU_SMB]. User:[paula]
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(296)
push_sec_ctx(512, 50) : sec_ctx_stack_ndx = 1
[2005/07/05 15:35:23, 3] smbd/uid.c:(285)
push_conn_ctx(117) : conn_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1
[2005/07/05 15:35:23, 3] smbd/sec_ctx.c:(435)
pop_sec_ctx (512, 50) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:23, 3] rpc_server/srv_util.c:(187)
domain group access 513/7 granted
[2005/07/05 15:35:23, 3] rpc_server/srv_pipe_hnd.c:(444)
free_pipe_context: destroying talloc pool of size 4788
[2005/07/05 15:35:23, 3] smbd/pipes.c:(197)
writeX-IPC pnum=74aa nwritten=296
[2005/07/05 15:35:23, 3] smbd/process.c:(858)
Transaction 7295 of length 63
[2005/07/05 15:35:23, 3] smbd/process.c:(696)
switch message SMBreadX (pid 26434)
[2005/07/05 15:35:23, 3] smbd/pipes.c:(238)
readX-IPC pnum=74aa min=1024 max=1024 nread=616
[2005/07/05 15:35:34, 3] smbd/process.c:(858)
Transaction 7296 of length 43
[2005/07/05 15:35:34, 3] smbd/process.c:(696)
switch message SMBulogoffX (pid 26434)
[2005/07/05 15:35:34, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:34, 3] smbd/reply.c:(1838)
ulogoffX vuid=118
[2005/07/05 15:35:34, 3] smbd/process.c:(858)
Transaction 7297 of length 39
[2005/07/05 15:35:34, 3] smbd/process.c:(696)
switch message SMBtdis (pid 26434)
[2005/07/05 15:35:34, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:34, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:34, 3] smbd/service.c:(675)
xba0687 (10.44.37.199) closed connection to service IPC$
[2005/07/05 15:35:34, 3] smbd/connection.c:(48)
Yielding connection to IPC$
[2005/07/05 15:35:34, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:34, 3] smbd/vfs.c:(600)
vfs_ChDir to /
[2005/07/05 15:35:53, 3] smbd/process.c:(858)
Transaction 7298 of length 45
[2005/07/05 15:35:53, 3] smbd/process.c:(696)
switch message SMBclose (pid 26434)
[2005/07/05 15:35:53, 3] smbd/sec_ctx.c:(328)
setting sec ctx (512, 50) - sec_ctx_stack_ndx = 0
[2005/07/05 15:35:53, 3] smbd/sec_ctx.c:(334)
2 user groups:
50 6
[2005/07/05 15:35:53, 3] smbd/vfs.c:(600)
vfs_ChDir to /tmp
[2005/07/05 15:36:04, 3] smbd/process.c:(858)
Transaction 7299 of length 43
[2005/07/05 15:36:04, 3] smbd/process.c:(696)
switch message SMBulogoffX (pid 26434)
[2005/07/05 15:36:04, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:36:04, 3] smbd/reply.c:(1838)
ulogoffX vuid=117
[2005/07/05 15:36:04, 3] smbd/process.c:(858)
Transaction 7300 of length 39
[2005/07/05 15:36:04, 3] smbd/process.c:(696)
switch message SMBtdis (pid 26434)
[2005/07/05 15:36:04, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:36:04, 3] smbd/sec_ctx.c:(328)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0
[2005/07/05 15:36:04, 3] smbd/service.c:(675)
xba0687 (10.44.37.199) closed connection to service IPC$
[2005/07/05 15:36:04, 3] smbd/connection.c:(48)
################### SYSINTERNALS.COM REGMON LOG
It's an attached file.
-------------- next part --------------
Sysinternals.com regmon is the program I use to monitor registry activity on
processes. I managed to log the Windoze authentication process with 2 tries of
one user (I only show the first as the second puts the same values) and another,
successful, and I have compared the data. There are some distinctive keys and
values and what the system gets from them.
It seems to me that in the Cache keys it looks for a certain SID. I think
something could be written or modified there (I might be crazy, of course, but
when the issue is so bitchy that a flamethrower is behind you, what can you try
to do?), so I need some kind of clue here.
This log file has been cut by some fields and of course from a lot of lines. The
original is 988KB size and this one is about 26KB. I still maintain the big one
in case somebody could help me with this issue and wants information of it. Some
data like real domain name or real users has been modified for anonimity
reasons.
### Here it seems the authentication process starts...
lsass.exe:568 OpenKey HKLM\SECURITY\Policy SUCCESS Access: 0x2001F
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$3 SUCCESS 0E 00 1E 00 0E 00 00
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$2 SUCCESS 0E 00 1E 00 0E 00 1A
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$1 SUCCESS 0C 00 1E 00 0C 00 1A
00 ...
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\SecDesc SUCCESS Access: 0x20019
lsass.exe:568 QueryValue HKLM\SECURITY\Policy\SecDesc\(Default) BUFFER OVERFLOW
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\SecDesc SUCCESS
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$10 SUCCESS 0E 00 1E 00 0E 00 00
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$9 SUCCESS 0C 00 1E 00 0C 00 1A
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$8 BUFFER OVERFLOW
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$8 SUCCESS 0E 00 1E 00 0E 00 44
00 ...
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\SecDesc SUCCESS Access: 0x20019
lsass.exe:568 QueryValue HKLM\SECURITY\Policy\SecDesc\(Default) SUCCESS NONE
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\SecDesc SUCCESS
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$7 SUCCESS 0C 00 1E 00 0C 00 1A
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$6 SUCCESS 06 00 1E 00 06 00 1A
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$5 SUCCESS 0C 00 1E 00 0C 00 1A
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$4 BUFFER OVERFLOW
### It has searched in every node of Cache and seems it hasn't found
anything...
### And now, some (?) less important keys...
lsass.exe:568 CloseKey HKLM\SECURITY\Policy SUCCESS
winlogon.exe:512 OpenKey HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS Access: 0x1
winlogon.exe:512 QueryValue HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon\ForceFriendlyUI NOT FOUND
winlogon.exe:512 CloseKey HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS
winlogon.exe:512 OpenKey
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system SUCCESS Access:
0x1
winlogon.exe:512 QueryValue
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\ForceFriendlyUI
NOT FOUND
winlogon.exe:512 CloseKey
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system SUCCESS
### lsass returns and does some more checking.... The keys and values seem
interesting...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$4 SUCCESS 0E 00 1E 00 0E 00 44
00 ...
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Control\Lsa SUCCESS Access:
0x1
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Control\Lsa\EveryoneIncludesAnonymous SUCCESS 0x0
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Control\Lsa SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC SUCCESS Access:
0x2001F
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\CurrVal SUCCESS
Access: 0x20019
lsass.exe:568 QueryValue
HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\CurrVal\(Default) BUFFER OVERFLOW
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\CurrVal SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\CurrVal SUCCESS
Access: 0x20019
lsass.exe:568 QueryValue
HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\CurrVal\(Default) SUCCESS NONE
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\CurrVal SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\CurrVal SUCCESS
Access: 0x20019
lsass.exe:568 QueryValue
HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\CurrVal\(Default) SUCCESS NONE
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\CurrVal SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\OldVal SUCCESS
Access: 0x20019
lsass.exe:568 QueryValue
HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\OldVal\(Default) BUFFER OVERFLOW
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\OldVal SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\OldVal SUCCESS
Access: 0x20019
lsass.exe:568 QueryValue
HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\OldVal\(Default) SUCCESS NONE
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\OldVal SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\OldVal SUCCESS
Access: 0x20019
lsass.exe:568 QueryValue
HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\OldVal\(Default) SUCCESS NONE
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\OldVal SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\CupdTime SUCCESS
Access: 0x20019
lsass.exe:568 QueryValue
HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\CupdTime\(Default) SUCCESS NONE
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC\CupdTime
SUCCESS
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\Secrets\$MACHINE.ACC SUCCESS
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Control\Lsa SUCCESS Access:
0x1
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Control\Lsa\EveryoneIncludesAnonymous SUCCESS 0x0
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Control\Lsa SUCCESS
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Control\ComputerName ACCESS
DENIED Access: 0x20019
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Services\Tcpip\Parameters
ACCESS DENIED Access: 0x20019
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Control\Lsa SUCCESS Access:
0x1
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Control\Lsa\EveryoneIncludesAnonymous SUCCESS 0x0
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Control\Lsa SUCCESS
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Control\ComputerName SUCCESS
Access: 0x20019
lsass.exe:568 OpenKey
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName SUCCESS
Access: 0x20019
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName\ComputerName
SUCCESS "XBA0668"
lsass.exe:568 CloseKey
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName SUCCESS
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Control\ComputerName
SUCCESS
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Services\Tcpip\Parameters
SUCCESS Access: 0x20019
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\Hostname SUCCESS
"XBA0668"
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Services\Tcpip\Parameters
SUCCESS
lsass.exe:568 OpenKey HKLM\Software\Policies\Microsoft\System\DNSclient NOT
FOUND
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Services\Tcpip\Parameters
SUCCESS Access: 0x20019
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\Domain SUCCESS
""
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Services\Tcpip\Parameters
SUCCESS
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Control\Lsa SUCCESS Access:
0x1
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Control\Lsa\EveryoneIncludesAnonymous SUCCESS 0x0
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Control\Lsa SUCCESS
### You see it's repeating the process, quite typical of their
programming... :/
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$3 SUCCESS 0E 00 1E 00 0E 00 00
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$2 SUCCESS 0E 00 1E 00 0E 00 1A
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$1 SUCCESS 0C 00 1E 00 0C 00 1A
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$10 SUCCESS 0E 00 1E 00 0E 00 00
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$9 SUCCESS 0C 00 1E 00 0C 00 1A
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$8 BUFFER OVERFLOW
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$8 SUCCESS 0E 00 1E 00 0E 00 44
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$7 SUCCESS 0C 00 1E 00 0C 00 1A
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$6 SUCCESS 06 00 1E 00 06 00 1A
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$5 SUCCESS 0C 00 1E 00 0C 00 1A
00 ...
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$4 BUFFER OVERFLOW
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$4 SUCCESS 0E 00 1E 00 0E 00 44
00 ...
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Control\ComputerName SUCCESS
Access: 0x20019
lsass.exe:568 OpenKey
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName SUCCESS
Access: 0x20019
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName\ComputerName
SUCCESS "XBA0668"
lsass.exe:568 CloseKey
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName SUCCESS
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Control\ComputerName
SUCCESS
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Control\ComputerName SUCCESS
Access: 0x20019
lsass.exe:568 OpenKey
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName SUCCESS
Access: 0x20019
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName\ComputerName
SUCCESS "XBA0668"
lsass.exe:568 CloseKey
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName SUCCESS
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Control\ComputerName
SUCCESS
### Here looks for one user. It is the one with problems. It's curious none
of the names are found.
lsass.exe:568 OpenKey HKLM\SAM\SAM\DOMAINS\Builtin\Groups\Names\juans NOT FOUND
lsass.exe:568 OpenKey HKLM\SAM\SAM\DOMAINS\Builtin\Aliases\Names\juans NOT FOUND
lsass.exe:568 OpenKey HKLM\SAM\SAM\DOMAINS\Builtin\Users\Names\juans NOT FOUND
lsass.exe:568 OpenKey HKLM\SAM\SAM\DOMAINS\Account\Groups\Names\juans NOT FOUND
lsass.exe:568 OpenKey HKLM\SAM\SAM\DOMAINS\Account\Aliases\Names\juans NOT FOUND
lsass.exe:568 OpenKey HKLM\SAM\SAM\DOMAINS\Account\Users\Names\juans NOT FOUND
lsass.exe:568 CloseKey HKLM\SECURITY\Policy SUCCESS
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Control\ComputerName SUCCESS
Access: 0x20019
lsass.exe:568 OpenKey
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName SUCCESS
Access: 0x20019
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName\ComputerName
SUCCESS "XBA0668"
lsass.exe:568 CloseKey
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName SUCCESS
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Control\ComputerName
SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy SUCCESS Access: 0x2001F
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\SecDesc SUCCESS Access: 0x20019
lsass.exe:568 QueryValue HKLM\SECURITY\Policy\SecDesc\(Default) BUFFER OVERFLOW
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\SecDesc SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\SecDesc SUCCESS Access: 0x20019
lsass.exe:568 QueryValue HKLM\SECURITY\Policy\SecDesc\(Default) SUCCESS NONE
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\SecDesc SUCCESS
lsass.exe:568 OpenKey HKLM\SAM\SAM\DOMAINS\Builtin\Groups\Names\juans NOT FOUND
lsass.exe:568 OpenKey HKLM\SAM\SAM\DOMAINS\Builtin\Aliases\Names\juans NOT FOUND
lsass.exe:568 OpenKey HKLM\SAM\SAM\DOMAINS\Builtin\Users\Names\juans NOT FOUND
lsass.exe:568 OpenKey HKLM\SAM\SAM\DOMAINS\Account\Groups\Names\juans NOT FOUND
lsass.exe:568 OpenKey HKLM\SAM\SAM\DOMAINS\Account\Aliases\Names\juans NOT FOUND
lsass.exe:568 OpenKey HKLM\SAM\SAM\DOMAINS\Account\Users\Names\juans NOT FOUND
lsass.exe:568 CloseKey HKLM\SECURITY\Policy SUCCESS
### Here comes a definitive data: the user SID of the old domain.
lsass.exe:568 OpenKey
HKLM\Security\Recovery\S-1-5-21-1517441303-804621452-1457755469-2368 NOT FOUND
### As it fails, it looks like lsass "gives up". Returns user and
password incorrect and then the system
### continues its way.
winlogon.exe:512 CloseKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS
winlogon.exe:512 OpenKey HKCU SUCCESS Access: 0x80000000
winlogon.exe:512 CloseKey HKCU SUCCESS
winlogon.exe:512 OpenKey HKCU SUCCESS Access: 0x80000000
winlogon.exe:512 CloseKey HKCU SUCCESS
svchost.exe:792 OpenKey HKLM\Software\Microsoft\COM3 SUCCESS Access: 0x20019
svchost.exe:792 QueryValue HKLM\Software\Microsoft\COM3\REGDBVersion SUCCESS 07
00 00 00 00 00 00 00
svchost.exe:792 CloseKey HKLM\Software\Microsoft\COM3 SUCCESS
svchost.exe:792 OpenKey HKLM\Software\Microsoft\COM3 SUCCESS Access: 0x20019
.
.
.
.
.
### Blah blah blah. Next cut is the result of a successful login. There are
plenty of differences.
lsass.exe:568 OpenKey HKLM\SECURITY\Policy SUCCESS Access: 0x2001F
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\SecDesc SUCCESS Access: 0x20019
lsass.exe:568 QueryValue HKLM\SECURITY\Policy\SecDesc\(Default) BUFFER OVERFLOW
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\SecDesc SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\SecDesc SUCCESS Access: 0x20019
lsass.exe:568 QueryValue HKLM\SECURITY\Policy\SecDesc\(Default) SUCCESS NONE
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\SecDesc SUCCESS
lsass.exe:568 CloseKey HKLM\SECURITY\Policy SUCCESS
winlogon.exe:512 OpenKey HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS Access: 0x1
winlogon.exe:512 QueryValue HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon\ForceFriendlyUI NOT FOUND
winlogon.exe:512 CloseKey HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS
winlogon.exe:512 OpenKey
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system SUCCESS Access:
0x1
winlogon.exe:512 QueryValue
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\ForceFriendlyUI
NOT FOUND
winlogon.exe:512 CloseKey
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system SUCCESS
winlogon.exe:512 OpenKey HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS Access: 0x1
winlogon.exe:512 QueryValue HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon\NoDomainUI NOT FOUND
winlogon.exe:512 CloseKey HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS
winlogon.exe:512 OpenKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS Access: 0x80000000
winlogon.exe:512 QueryValue HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\RasDisable NOT FOUND
winlogon.exe:512 QueryValue HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon\DisableCAD SUCCESS 0x0
winlogon.exe:512 OpenKey
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System SUCCESS Access:
0x20019
winlogon.exe:512 QueryValue
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableCAD NOT
FOUND
winlogon.exe:512 CloseKey
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy SUCCESS Access: 0x2001F
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\SecDesc SUCCESS Access: 0x20019
lsass.exe:568 QueryValue HKLM\SECURITY\Policy\SecDesc\(Default) BUFFER OVERFLOW
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\SecDesc SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\SecDesc SUCCESS Access: 0x20019
lsass.exe:568 QueryValue HKLM\SECURITY\Policy\SecDesc\(Default) SUCCESS NONE
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\SecDesc SUCCESS
lsass.exe:568 CloseKey HKLM\SECURITY\Policy SUCCESS
winlogon.exe:512 OpenKey HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS Access: 0x1
winlogon.exe:512 QueryValue HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon\ForceFriendlyUI NOT FOUND
winlogon.exe:512 CloseKey HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS
winlogon.exe:512 OpenKey
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system SUCCESS Access:
0x1
winlogon.exe:512 QueryValue
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\ForceFriendlyUI
NOT FOUND
winlogon.exe:512 CloseKey
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system SUCCESS
### It seems it's an important data. While in the previous test lsass looks
in each key of 'cache',
### here it does it only once. Looks like he is happy with what he has found.
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$3 SUCCESS 0E 00 1E 00 0E 00 00
00 ...
### Then, lsass starts to act as usual.
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Control\Lsa SUCCESS Access:
0x20019
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Control\Lsa\NoDefaultAdminOwner SUCCESS 0x1
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Control\Lsa SUCCESS
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Control\ComputerName SUCCESS
Access: 0x20019
lsass.exe:568 OpenKey
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName SUCCESS
Access: 0x20019
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName\ComputerName
SUCCESS "XBA0668"
lsass.exe:568 CloseKey
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName SUCCESS
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Control\ComputerName
SUCCESS
### Winlogon gets everything he wants so the system knows this user really
exists and has everything he needs
### to let the user log on.
winlogon.exe:512 OpenKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\ProfileList SUCCESS Access: 0x20019
winlogon.exe:512 OpenKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\ProfileList\S-1-5-21-3737319058-609539873-3195808661-1368
SUCCESS Access: 0x2001F
winlogon.exe:512 QueryValue HKLM\Software\Microsoft\Windows
NT\CurrentVersion\ProfileList\S-1-5-21-3737319058-609539873-3195808661-1368\NextLogonCacheable
NOT FOUND
winlogon.exe:512 CloseKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\ProfileList SUCCESS
winlogon.exe:512 CloseKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\ProfileList\S-1-5-21-3737319058-609539873-3195808661-1368
SUCCESS
winlogon.exe:512 OpenKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\winlogon SUCCESS Access: 0x20019
winlogon.exe:512 QueryValue HKLM\Software\Microsoft\Windows
NT\CurrentVersion\winlogon\SyncForegroundPolicy NOT FOUND
winlogon.exe:512 CloseKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\winlogon SUCCESS
winlogon.exe:512 OpenKey HKLM\Software\Policies\Microsoft\Windows
NT\CurrentVersion\winlogon NOT FOUND
winlogon.exe:512 OpenKey HKLM\Software\Microsoft\Windows\CurrentVersion\Group
Policy\State\S-1-5-21-3737319058-609539873-3195808661-1368 SUCCESS Access:
0x20019
winlogon.exe:512 QueryValue HKLM\Software\Microsoft\Windows\CurrentVersion\Group
Policy\State\S-1-5-21-3737319058-609539873-3195808661-1368\NextRefreshMode
SUCCESS 0x2
winlogon.exe:512 QueryValue HKLM\Software\Microsoft\Windows\CurrentVersion\Group
Policy\State\S-1-5-21-3737319058-609539873-3195808661-1368\NextRefreshReason
SUCCESS 0x0
winlogon.exe:512 CloseKey HKLM\Software\Microsoft\Windows\CurrentVersion\Group
Policy\State\S-1-5-21-3737319058-609539873-3195808661-1368 SUCCESS
winlogon.exe:512 OpenKey HKLM\Software\Microsoft\Windows\CurrentVersion\Group
Policy\State\S-1-5-21-3737319058-609539873-3195808661-1368 SUCCESS Access:
0x20019
winlogon.exe:512 QueryValue HKLM\Software\Microsoft\Windows\CurrentVersion\Group
Policy\State\S-1-5-21-3737319058-609539873-3195808661-1368\NextRefreshMode
SUCCESS 0x2
winlogon.exe:512 QueryValue HKLM\Software\Microsoft\Windows\CurrentVersion\Group
Policy\State\S-1-5-21-3737319058-609539873-3195808661-1368\NextRefreshReason
SUCCESS 0x0
winlogon.exe:512 CloseKey HKLM\Software\Microsoft\Windows\CurrentVersion\Group
Policy\State\S-1-5-21-3737319058-609539873-3195808661-1368 SUCCESS
### lsass gets some policies and values...
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Control\Lsa SUCCESS Access:
0x1
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Control\Lsa\EveryoneIncludesAnonymous SUCCESS 0x0
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Control\Lsa SUCCESS
lsass.exe:568 QueryValue HKLM\SECURITY\Cache\NL$3 SUCCESS 0E 00 1E 00 0E 00 00
00 ...
lsass.exe:568 OpenKey HKLM\SECURITY\Policy SUCCESS Access: 0x2001F
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\SecDesc SUCCESS Access: 0x20019
lsass.exe:568 QueryValue HKLM\SECURITY\Policy\SecDesc\(Default) BUFFER OVERFLOW
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\SecDesc SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\SecDesc SUCCESS Access: 0x20019
lsass.exe:568 QueryValue HKLM\SECURITY\Policy\SecDesc\(Default) SUCCESS NONE
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\SecDesc SUCCESS
lsass.exe:568 CloseKey HKLM\SECURITY\Policy SUCCESS
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Control\Lsa SUCCESS Access:
0x20019
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Control\Lsa\NoDefaultAdminOwner SUCCESS 0x1
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Control\Lsa SUCCESS
lsass.exe:568 OpenKey HKLM\System\CurrentControlSet\Control\ComputerName SUCCESS
Access: 0x20019
lsass.exe:568 OpenKey
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName SUCCESS
Access: 0x20019
lsass.exe:568 QueryValue
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName\ComputerName
SUCCESS "XBA0668"
lsass.exe:568 CloseKey
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName SUCCESS
lsass.exe:568 CloseKey HKLM\System\CurrentControlSet\Control\ComputerName
SUCCESS
### ... and winlogon gets more values.
winlogon.exe:512 OpenKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\ProfileList SUCCESS Access: 0x20019
winlogon.exe:512 OpenKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\ProfileList\S-1-5-21-3737319058-609539873-3195808661-1368
SUCCESS Access: 0x2001F
winlogon.exe:512 SetValue HKLM\Software\Microsoft\Windows
NT\CurrentVersion\ProfileList\S-1-5-21-3737319058-609539873-3195808661-1368\OptimizedLogonStatus
SUCCESS 0x8
winlogon.exe:512 CloseKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\ProfileList SUCCESS
winlogon.exe:512 CloseKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\ProfileList\S-1-5-21-3737319058-609539873-3195808661-1368
SUCCESS
winlogon.exe:512 OpenKey
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System SUCCESS Access:
0x20019
winlogon.exe:512 QueryValue
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\ScForceOption NOT
FOUND
winlogon.exe:512 CloseKey
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System SUCCESS
winlogon.exe:512 QueryKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon BUFFER OVERFLOW
winlogon.exe:512 QueryValue HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\RestrictShell NOT FOUND
winlogon.exe:512 QueryKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon BUFFER OVERFLOW
winlogon.exe:512 QueryValue HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\ScRemoveOption SUCCESS "0"
winlogon.exe:512 CloseKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS
winlogon.exe:512 CreateKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS Access: 0x2000F
### here it goes. The user name.
winlogon.exe:512 QueryValue HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\DefaultUserName BUFFER OVERFLOW
winlogon.exe:512 SetValue HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\DefaultUserName SUCCESS "username"
winlogon.exe:512 QueryKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon BUFFER OVERFLOW
winlogon.exe:512 QueryValue HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\DefaultDomainName BUFFER OVERFLOW
winlogon.exe:512 SetValue HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\DefaultDomainName SUCCESS "DOMAIN_SMB"
winlogon.exe:512 SetValue HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\AltDefaultUserName SUCCESS "username"
winlogon.exe:512 QueryKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon BUFFER OVERFLOW
winlogon.exe:512 QueryValue HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\AltDefaultDomainName BUFFER OVERFLOW
winlogon.exe:512 SetValue HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\AltDefaultDomainName SUCCESS "DOMAIN_SMB"
winlogon.exe:512 QueryValue HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon\DisableCAD SUCCESS 0x0
winlogon.exe:512 OpenKey
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System SUCCESS Access:
0x20019
winlogon.exe:512 QueryValue
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableCAD NOT
FOUND
winlogon.exe:512 CloseKey
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy SUCCESS Access: 0x2001F
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\SecDesc SUCCESS Access: 0x20019
lsass.exe:568 QueryValue HKLM\SECURITY\Policy\SecDesc\(Default) BUFFER OVERFLOW
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\SecDesc SUCCESS
lsass.exe:568 OpenKey HKLM\SECURITY\Policy\SecDesc SUCCESS Access: 0x20019
lsass.exe:568 QueryValue HKLM\SECURITY\Policy\SecDesc\(Default) SUCCESS NONE
lsass.exe:568 CloseKey HKLM\SECURITY\Policy\SecDesc SUCCESS
lsass.exe:568 CloseKey HKLM\SECURITY\Policy SUCCESS
winlogon.exe:512 OpenKey HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS Access: 0x1
winlogon.exe:512 QueryValue HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon\ForceFriendlyUI NOT FOUND
winlogon.exe:512 CloseKey HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS
winlogon.exe:512 OpenKey
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system SUCCESS Access:
0x1
winlogon.exe:512 QueryValue
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system\ForceFriendlyUI
NOT FOUND
winlogon.exe:512 CloseKey
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system SUCCESS
winlogon.exe:512 OpenKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS Access: 0x2000000
winlogon.exe:512 QueryValue HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\PasswordExpiryWarning SUCCESS 0xE
winlogon.exe:512 CloseKey HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS
winlogon.exe:512 OpenKey HKCU NOT FOUND
winlogon.exe:512 OpenKey HKU\.Default SUCCESS Access: 0x2000000
winlogon.exe:512 CreateKey HKU\.Default\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS Access: 0x2001F
winlogon.exe:512 QueryValue HKU\.Default\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\ReportDC SUCCESS 0x0
winlogon.exe:512 SetValue HKU\.Default\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\ReportDC SUCCESS 0x0
winlogon.exe:512 CloseKey HKU\.Default\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon SUCCESS
winlogon.exe:512 CloseKey HKU\.Default SUCCESS
### I think the rest is not relevant. The system allows the log on and builds
the environment.
### I chose the previous lines because of all the registry I have seen (and I
have seen A LOT!)
### these values pose a weird thing to me.
