Displaying 8 results from an estimated 8 matches for "cdom".
Did you mean:
cdm
2018 Jun 25
0
smbclient suddenly getting access denied
...y on the Windows server. The Windows
server is running Windows Server 2016 and my Samba client is running
3.6.3 (it's the latest from SLES 11 but ported to SLES 10 - long
story...).
But today when I try to connect I get:
client3:/mnt/cifs_share01 # smbclient //client3.dom1.com/cifs_share01
-U cdom\rjmuser01
Enter cdom\rjmuser01's password:
Domain=[CDOM] OS=[Unix] Server=[Samba 3.6.3-9.1-3798-SUSE-CODE10-i386]
tree connect failed: NT_STATUS_ACCESS_DENIED
When I check the log I see:
[2018/06/25 10:10:05.905044, 4] smbd/reply.c:794(reply_tcon_and_X)
Client requested device type [?????]...
2016 Dec 20
2
samba 4.5.0 on hpux ia64: smbd not able to use domain users for file sharing
...46, 10, pid=6958, effective(0, 0), real(0, 0)]
../source3/auth/user_util.c:219(user_in_list)
user_in_list: checking user gold in list
[2016/12/20 21:50:11.775297, 10, pid=6958, effective(0, 0), real(0, 0)]
../source3/auth/user_util.c:224(user_in_list)
user_in_list: checking user |gold| against |CDOM\Administrator|
[2016/12/20 21:50:11.775352, 10, pid=6958, effective(0, 0), real(0, 0)]
../source3/auth/user_util.c:224(user_in_list)
user_in_list: checking user |gold| against |CDOM\administrator|
[2016/12/20 21:50:11.775406, 10, pid=6958, effective(0, 0), real(0, 0)]
../source3/auth/user_util.c:...
2016 Dec 20
0
samba 4.5.0 on hpux ia64: smbd not able to use domain users for file sharing
...ve(0, 0), real(0,
> 0)] ../source3/auth/user_util.c:219(user_in_list)
> user_in_list: checking user gold in list
> [2016/12/20 21:50:11.775297, 10, pid=6958, effective(0, 0), real(0,
> 0)] ../source3/auth/user_util.c:224(user_in_list)
> user_in_list: checking user |gold| against |CDOM\Administrator|
> [2016/12/20 21:50:11.775352, 10, pid=6958, effective(0, 0), real(0,
> 0)] ../source3/auth/user_util.c:224(user_in_list)
> user_in_list: checking user |gold| against |CDOM\administrator|
> [2016/12/20 21:50:11.775406, 10, pid=6958, effective(0, 0), real(0,
> 0)] ../...
2012 Aug 24
2
Physical cdrom passthrough to windows 7 DomU
I''m currently using xen 4.1 on an Ubuntu 12.04 Dom0 and I''m trying to
passthrough the machines phyical cdom drive as
''phy:/dev/cdrom,hdc:cdrom,r'' in the config file. If a cd is present in
the drive on bootup everything works fine; I can read data from the
disk, eject it and so on. If however the drive is empty on startup I
get a bsod of type driver_irql_not_less_or_equal. Does an...
2012 Aug 24
2
Physical cdrom passthrough to windows 7 DomU
I''m currently using xen 4.1 on an Ubuntu 12.04 Dom0 and I''m trying to
passthrough the machines phyical cdom drive as
''phy:/dev/cdrom,hdc:cdrom,r'' in the config file. If a cd is present in
the drive on bootup everything works fine; I can read data from the
disk, eject it and so on. If however the drive is empty on startup I
get a bsod of type driver_irql_not_less_or_equal. Does an...
2016 Dec 20
2
samba 4.5.0 on hpux ia64: smbd not able to use domain users for file sharing
Hi ,
Below is the content of smb.conf file for ADS member.
[global]
password server = WIN2008.CIFSDOM.COM
client ldap sasl wrapping = plain
security = ADS
workgroup = CIFSDOM
realm = CIFSDOM.COM
guest account = smbnull
log file = /var/log/samba/%m.log
log level = 10
# Default idmap config used for BUILTIN and local accounts/groups
2016 Dec 21
2
samba 4.5.0 on hpux ia64: smbd not able to use domain users for file sharing
...t; 0)] ../source3/auth/user_util.c:219(user_in_list)
> > user_in_list: checking user gold in list
> > [2016/12/20 21:50:11.775297, 10, pid=6958, effective(0, 0), real(0,
> > 0)] ../source3/auth/user_util.c:224(user_in_list)
> > user_in_list: checking user |gold| against |CDOM\Administrator|
> > [2016/12/20 21:50:11.775352, 10, pid=6958, effective(0, 0), real(0,
> > 0)] ../source3/auth/user_util.c:224(user_in_list)
> > user_in_list: checking user |gold| against |CDOM\administrator|
> > [2016/12/20 21:50:11.775406, 10, pid=6958, effective(0, 0),...
2012 Jan 31
26
[PATCH 00/10] FLASK updates: MSI interrupts, cleanups
This patch set adds XSM security labels to useful debugging output
locations, and fixes some assumptions that all interrupts behaved like
GSI interrupts (which had useful non-dynamic IDs). It also cleans up the
policy build process and adds an example of how to use the user field in
the security context.
Debug output:
[PATCH 01/10] xsm: Add security labels to event-channel dump
[PATCH 02/10] xsm: