Univention Bugzilla – Attachment 9981 Details for
Bug 49321
lookup of SIDs for Posix GIDs does not work for BUILTIN groups on memberserver
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
debug.log
debug.log (text/x-log), 76.72 KB, created by
Arvid Requate
on 2019-04-18 12:14:45 CEST
(
hide
)
Description:
debug.log
Filename:
MIME Type:
Creator:
Arvid Requate
Created:
2019-04-18 12:14:45 CEST
Size:
76.72 KB
patch
obsolete
>root@member13:~# net rpc testjoin >Join to 'AR41I1' is OK >root@member13:~# net cache flush; /etc/init.d/winbind restart >[ ok ] Restarting winbind (via systemctl): winbind.service. >t@member13:~# smbcontrol winbindd debug 10 >t@member13:~# tail -f /var/log/samba/log.w* & >[1] 20536 >root@member13:~# ==> /var/log/samba/log.wb-AR41I1 <== > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 > >==> /var/log/samba/log.wb-BUILTIN <== > >==> /var/log/samba/log.wb-MEMBER13 <== >[2015/11/25 02:41:22.659256, 0] ../source3/winbindd/winbindd.c:271(winbindd_sig_term_handler) > Got sig[15] terminate (is_parent=0) > >==> /var/log/samba/log.winbindd <== >[2019/02/27 16:25:58.613036, 10, pid=20515, effective(0, 0), real(0, 0)] ../../source4/lib/messaging/messaging.c:684(imessaging_dgm_recv) > imessaging_dgm_recv: dst 20515 matches my id: 20515, type=0x406 >[2019/02/27 16:25:58.613274, 10, pid=20515, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:429(messaging_recv_cb) > messaging_recv_cb: Received message 0x406 len 7 (num_fds:0) from 20535 >[2019/02/27 16:25:58.613457, 5, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_cm.c:163(msg_try_to_go_online) > msg_try_to_go_online: received for domain AR41I1. >[2019/02/27 16:25:58.613633, 5, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_cm.c:175(msg_try_to_go_online) > msg_try_to_go_online: domain AR41I1 already online. >[2019/02/27 16:25:58.614459, 5, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:827(winbind_child_died) > Already reaped child 20535 died > >==> /var/log/samba/log.winbindd-dc-connect <== >[2019/02/27 16:24:21.776201, 4, pid=20398, effective(0, 0), real(0, 0)] ../../source3/libsmb/namequery.c:3257(get_dc_list) > get_dc_list: returning 2 ip addresses in an ordered list >[2019/02/27 16:24:21.776220, 4, pid=20398, effective(0, 0), real(0, 0)] ../../source3/libsmb/namequery.c:3258(get_dc_list) > get_dc_list: 10.200.8.10:389 10.200.8.11:389 >[2019/02/27 16:24:21.776245, 9, pid=20398, effective(0, 0), real(0, 0)] ../../source3/libsmb/conncache.c:151(check_negative_conn_cache) > check_negative_conn_cache returning result 0 for domain AR41I1 server 10.200.8.10 >[2019/02/27 16:24:21.776268, 9, pid=20398, effective(0, 0), real(0, 0)] ../../source3/libsmb/conncache.c:151(check_negative_conn_cache) > check_negative_conn_cache returning result 0 for domain AR41I1 server 10.200.8.11 >[2019/02/27 16:24:21.776322, 10, pid=20398, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm.c:1436(messaging_dgm_send) > messaging_dgm_send: Sending message to 20379 > >==> /var/log/samba/log.winbindd-idmap <== >[2018/03/01 02:41:32.041288, 0] ../../source3/winbindd/idmap_ldap.c:85(get_credentials) > get_credentials: Unable to fetch auth credentials for cn=backup,dc=univention,dc=unconfigured in * > >root@member13:~# wbinfo --gid-to-sid 5053 > >==> /var/log/samba/log.winbindd <== >[2019/02/27 16:27:24.375689, 6, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:920(new_connection) > accepted socket 22 >[2019/02/27 16:27:24.376095, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:768(process_request_send) > process_request_send: process_request: request fn INTERFACE_VERSION >[2019/02/27 16:27:24.376130, 3, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_misc.c:432(winbindd_interface_version) > winbindd_interface_version: [wbinfo (20537)]: request interface version (version = 31) >[2019/02/27 16:27:24.376208, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:854(process_request_written) > process_request_written: [wbinfo(20537):unknown request]: delivered response to client >[2019/02/27 16:27:24.376496, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:744(process_request_send) > process_request_send: process_request: Handling async request wbinfo(20537):XIDS_TO_SIDS >[2019/02/27 16:27:24.376530, 3, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_xids_to_sids.c:52(winbindd_xids_to_sids_send) > xids_to_sids >[2019/02/27 16:27:24.376559, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_xids_to_sids.c:70(winbindd_xids_to_sids_send) > num_xids: 1 >[2019/02/27 16:27:24.376603, 5, pid=20515, effective(0, 0), real(0, 0), class=tdb] ../../source3/lib/gencache.c:85(gencache_init) > Opening cache file at /var/run/samba/gencache.tdb >[2019/02/27 16:27:24.376919, 10, pid=20515, effective(0, 0), real(0, 0), class=idmap] ../../source3/winbindd/idmap.c:124(lp_scan_idmap_found_domain) > lp_scan_idmap_found_domain: Found idmap domain "ar41i1" >[2019/02/27 16:27:24.376986, 10, pid=20515, effective(0, 0), real(0, 0), class=idmap] ../../source3/winbindd/idmap.c:124(lp_scan_idmap_found_domain) > lp_scan_idmap_found_domain: Found idmap domain "*" >[2019/02/27 16:27:24.377040, 1, pid=20515, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > in: struct wbint_LookupName > domain : * > domain : 'MEMBER13' > name : * > name : '' > flags : 0x00000008 (8) >[2019/02/27 16:27:24.377155, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:1628(fork_domain_child) > fork_domain_child called for domain 'MEMBER13' >[2019/02/27 16:27:24.378153, 10, pid=20538, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:1694(fork_domain_child) > Child process 20538 >[2019/02/27 16:27:24.378849, 10, pid=20538, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=0x559bfa488b80 >[2019/02/27 16:27:24.379005, 10, pid=20538, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:80(messaging_dgm_ref) > messaging_dgm_ref: messaging_dgm_init returned Erfolg >[2019/02/27 16:27:24.379192, 10, pid=20538, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:109(messaging_dgm_ref) > messaging_dgm_ref: unique = 10654620220385886510 >[2019/02/27 16:27:24.379235, 5, pid=20538, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:155(make_pdb_method_name) > Attempting to find a passdb backend to match tdbsam (tdbsam) >[2019/02/27 16:27:24.379263, 5, pid=20538, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:176(make_pdb_method_name) > Found pdb backend tdbsam >[2019/02/27 16:27:24.379300, 5, pid=20538, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:187(make_pdb_method_name) > pdb backend tdbsam has a valid init >[2019/02/27 16:27:24.381181, 1, pid=20515, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > out: struct wbint_LookupName > type : * > type : SID_NAME_DOMAIN (3) > sid : * > sid : S-1-5-21-2674612725-1125306964-685080164 > result : NT_STATUS_OK >[2019/02/27 16:27:24.381685, 1, pid=20515, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > in: struct wbint_LookupName > domain : * > domain : 'AR41I1' > name : * > name : '' > flags : 0x00000008 (8) > >==> /var/log/samba/log.wb-AR41I1 <== >[2019/02/27 16:27:24.382018, 10, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:119(child_read_request) > Need to read 40 extra bytes >[2019/02/27 16:27:24.382253, 4, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:1597(child_handler) > child daemon request 56 >[2019/02/27 16:27:24.382374, 10, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:744(child_process_request) > child_process_request: request fn NDRCMD >[2019/02/27 16:27:24.382399, 10, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual_ndr.c:362(winbindd_dual_ndrcmd) > winbindd_dual_ndrcmd: Running command WBINT_LOOKUPNAME (AR41I1) >[2019/02/27 16:27:24.382460, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > in: struct wbint_LookupName > domain : * > domain : 'AR41I1' > name : * > name : '' > flags : 0x00000008 (8) >[2019/02/27 16:27:24.382564, 10, pid=20533, effective(0, 0), real(0, 0)] ../../source3/lib/namemap_cache.c:324(namemap_cache_find_name) > namemap_cache_find_name: gencache_parse(NAME2SID/AR41I1\) failed >[2019/02/27 16:27:24.382590, 10, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_cache.c:1772(wcache_name_to_sid) > wcache_name_to_sid: namemap_cache_find_name failed >[2019/02/27 16:27:24.382611, 10, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_cache.c:1819(wb_cache_name_to_sid) > name_to_sid: [Cached] - doing backend query for name for domain AR41I1 >[2019/02/27 16:27:24.382634, 3, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_msrpc.c:244(msrpc_name_to_sid) > msrpc_name_to_sid: name=AR41I1 >[2019/02/27 16:27:24.382681, 3, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_msrpc.c:258(msrpc_name_to_sid) > name_to_sid [rpc] AR41I1 for domain AR41I1 >[2019/02/27 16:27:24.382704, 10, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_cm.c:2997(cm_connect_lsa_tcp) > cm_connect_lsa_tcp >[2019/02/27 16:27:24.382744, 5, pid=20533, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:130(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /var/run/samba/g_lock.tdb >[2019/02/27 16:27:24.382767, 10, pid=20533, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:116(debug_lock_order) > lock order: 1:<none> 2:<none> 3:/var/run/samba/g_lock.tdb >[2019/02/27 16:27:24.382812, 10, pid=20533, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:345(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2019/02/27 16:27:24.382842, 5, pid=20533, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:159(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /var/run/samba/g_lock.tdb >[2019/02/27 16:27:24.382902, 3, pid=20533, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:515(open_socket_out_send) > Connecting to 10.200.8.11 at port 135 >[2019/02/27 16:27:24.383674, 5, pid=20533, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 372480 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2019/02/27 16:27:24.384783, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:1885(rpc_pipe_bind_send) > Bind RPC Pipe: host backup11.ar41i1.qa auth_type 0, auth_level 1 >[2019/02/27 16:27:24.384822, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND (11) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0048 (72) > auth_length : 0x0000 (0) > call_id : 0x00000011 (17) > u : union dcerpc_payload(case 11) > bind: struct dcerpc_bind > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x00000000 (0) > num_contexts : 0x01 (1) > ctx_list: ARRAY(1) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0000 (0) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : e1af8308-5d1f-11c9-91a4-08002b14a0fa > if_version : 0x00000003 (3) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > auth_info : DATA_BLOB length=0 >[2019/02/27 16:27:24.385873, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:827(rpc_api_pipe_send) > rpc_api_pipe: host backup11.ar41i1.qa >[2019/02/27 16:27:24.385913, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:179(rpc_write_send) > rpc_write_send: data_to_write: 72 >[2019/02/27 16:27:24.386509, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:99(rpc_read_send) > rpc_read_send: data_to_read: 44 >[2019/02/27 16:27:24.386759, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > state->pkt: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND_ACK (12) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x003c (60) > auth_length : 0x0000 (0) > call_id : 0x00000011 (17) > u : union dcerpc_payload(case 12) > bind_ack: struct dcerpc_bind_ack > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x0000859a (34202) > secondary_address_size : 0x0004 (4) > secondary_address : '135' > _pad1 : DATA_BLOB length=2 > [0000] 00 00 .. > num_results : 0x01 (1) > ctx_list: ARRAY(1) > ctx_list: struct dcerpc_ack_ctx > result : DCERPC_BIND_ACK_RESULT_ACCEPTANCE (0) > reason : union dcerpc_bind_ack_reason(case 0) > value : DCERPC_BIND_ACK_REASON_NOT_SPECIFIED (0) > syntax: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > auth_info : DATA_BLOB length=0 >[2019/02/27 16:27:24.387076, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:979(rpc_api_pipe_got_pdu) > rpc_api_pipe: got frag len of 60 at offset 0: NT_STATUS_OK >[2019/02/27 16:27:24.387100, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:1079(rpc_api_pipe_got_pdu) > rpc_api_pipe: host backup11.ar41i1.qa returned 60 bytes. >[2019/02/27 16:27:24.387132, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:1758(check_bind_response) > check_bind_response: accepted! >[2019/02/27 16:27:24.387204, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > epm_Map: struct epm_Map > in: struct epm_Map > object : * > object : 12345778-1234-abcd-ef00-0123456789ab > map_tower : * > map_tower: struct epm_twr_t > tower_length : 0x0000004b (75) > tower: struct epm_tower > num_floors : 0x0005 (5) > floors: ARRAY(5) > floors: struct epm_floor > lhs: struct epm_lhs > protocol : EPM_PROTOCOL_UUID (13) > lhs_data : DATA_BLOB length=18 > [0000] 78 57 34 12 34 12 CD AB EF 00 01 23 45 67 89 AB xW4.4... ...#Eg.. > [0010] 00 00 .. > rhs : union epm_rhs(case 13) > uuid: struct epm_rhs_uuid > unknown : DATA_BLOB length=2 > [0000] 00 00 .. > floors: struct epm_floor > lhs: struct epm_lhs > protocol : EPM_PROTOCOL_UUID (13) > lhs_data : DATA_BLOB length=18 > [0000] 04 5D 88 8A EB 1C C9 11 9F E8 08 00 2B 10 48 60 .]...... ....+.H` > [0010] 02 00 .. > rhs : union epm_rhs(case 13) > uuid: struct epm_rhs_uuid > unknown : DATA_BLOB length=2 > [0000] 00 00 .. > floors: struct epm_floor > lhs: struct epm_lhs > protocol : EPM_PROTOCOL_NCACN (11) > lhs_data : DATA_BLOB length=0 > rhs : union epm_rhs(case 11) > ncacn: struct epm_rhs_ncacn > minor_version : 0x0000 (0) > floors: struct epm_floor > lhs: struct epm_lhs > protocol : EPM_PROTOCOL_TCP (7) > lhs_data : DATA_BLOB length=0 > rhs : union epm_rhs(case 7) > tcp: struct epm_rhs_tcp > port : 0x0087 (135) > floors: struct epm_floor > lhs: struct epm_lhs > protocol : EPM_PROTOCOL_IP (9) > lhs_data : DATA_BLOB length=0 > rhs : union epm_rhs(case 9) > ip: struct epm_rhs_ip > ipaddr : 0.0.0.0 > entry_handle : * > entry_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > max_towers : 0x00000001 (1) >[2019/02/27 16:27:24.387724, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_REQUEST (0) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0018 (24) > auth_length : 0x0000 (0) > call_id : 0x00000012 (18) > u : union dcerpc_payload(case 0) > request: struct dcerpc_request > alloc_hint : 0x00000084 (132) > context_id : 0x0000 (0) > opnum : 0x0003 (3) > object : union dcerpc_object(case 0) > empty: struct dcerpc_empty > stub_and_verifier : DATA_BLOB length=0 >[2019/02/27 16:27:24.387921, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:827(rpc_api_pipe_send) > rpc_api_pipe: host backup11.ar41i1.qa >[2019/02/27 16:27:24.387949, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:179(rpc_write_send) > rpc_write_send: data_to_write: 156 >[2019/02/27 16:27:24.389600, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:99(rpc_read_send) > rpc_read_send: data_to_read: 136 >[2019/02/27 16:27:24.389849, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > state->pkt: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_RESPONSE (2) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0098 (152) > auth_length : 0x0000 (0) > call_id : 0x00000012 (18) > u : union dcerpc_payload(case 2) > response: struct dcerpc_response > alloc_hint : 0x00000080 (128) > context_id : 0x0000 (0) > cancel_count : 0x00 (0) > reserved : 0x00 (0) > stub_and_verifier : DATA_BLOB length=128 > [0000] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ > [0010] 00 00 00 00 01 00 00 00 01 00 00 00 00 00 00 00 ........ ........ > [0020] 01 00 00 00 03 00 00 00 4B 00 00 00 4B 00 00 00 ........ K...K... > [0030] 05 00 13 00 0D 78 57 34 12 34 12 CD AB EF 00 01 .....xW4 .4...... > [0040] 23 45 67 89 AB 00 00 02 00 00 00 13 00 0D 04 5D #Eg..... .......] > [0050] 88 8A EB 1C C9 11 9F E8 08 00 2B 10 48 60 02 00 ........ ..+.H`.. > [0060] 02 00 00 00 01 00 0B 02 00 00 00 01 00 07 02 00 ........ ........ > [0070] C0 01 01 00 09 04 00 00 00 00 00 00 00 00 00 00 ........ ........ >[2019/02/27 16:27:24.390641, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:526(cli_pipe_validate_current_pdu) > Got pdu len 152, data_len 128 >[2019/02/27 16:27:24.390687, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:979(rpc_api_pipe_got_pdu) > rpc_api_pipe: got frag len of 152 at offset 0: NT_STATUS_OK >[2019/02/27 16:27:24.390712, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:1079(rpc_api_pipe_got_pdu) > rpc_api_pipe: host backup11.ar41i1.qa returned 128 bytes. >[2019/02/27 16:27:24.390750, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > epm_Map: struct epm_Map > out: struct epm_Map > entry_handle : * > entry_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > num_towers : * > num_towers : 0x00000001 (1) > towers: ARRAY(1) > towers: struct epm_twr_p_t > twr : * > twr: struct epm_twr_t > tower_length : 0x0000004b (75) > tower: struct epm_tower > num_floors : 0x0005 (5) > floors: ARRAY(5) > floors: struct epm_floor > lhs: struct epm_lhs > protocol : EPM_PROTOCOL_UUID (13) > lhs_data : DATA_BLOB length=18 > [0000] 78 57 34 12 34 12 CD AB EF 00 01 23 45 67 89 AB xW4.4... ...#Eg.. > [0010] 00 00 .. > rhs : union epm_rhs(case 13) > uuid: struct epm_rhs_uuid > unknown : DATA_BLOB length=2 > [0000] 00 00 .. > floors: struct epm_floor > lhs: struct epm_lhs > protocol : EPM_PROTOCOL_UUID (13) > lhs_data : DATA_BLOB length=18 > [0000] 04 5D 88 8A EB 1C C9 11 9F E8 08 00 2B 10 48 60 .]...... ....+.H` > [0010] 02 00 .. > rhs : union epm_rhs(case 13) > uuid: struct epm_rhs_uuid > unknown : DATA_BLOB length=2 > [0000] 00 00 .. > floors: struct epm_floor > lhs: struct epm_lhs > protocol : EPM_PROTOCOL_NCACN (11) > lhs_data : DATA_BLOB length=0 > rhs : union epm_rhs(case 11) > ncacn: struct epm_rhs_ncacn > minor_version : 0x0000 (0) > floors: struct epm_floor > lhs: struct epm_lhs > protocol : EPM_PROTOCOL_TCP (7) > lhs_data : DATA_BLOB length=0 > rhs : union epm_rhs(case 7) > tcp: struct epm_rhs_tcp > port : 0xc001 (49153) > floors: struct epm_floor > lhs: struct epm_lhs > protocol : EPM_PROTOCOL_IP (9) > lhs_data : DATA_BLOB length=0 > rhs : union epm_rhs(case 9) > ip: struct epm_rhs_ip > ipaddr : 0.0.0.0 > result : 0x00000000 (0) >[2019/02/27 16:27:24.391306, 3, pid=20533, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:515(open_socket_out_send) > Connecting to 10.200.8.11 at port 49153 >[2019/02/27 16:27:24.392372, 5, pid=20533, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 372480 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2019/02/27 16:27:24.393360, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > state->creds: struct netlogon_creds_CredentialState > negotiate_flags : 0x610fffff (1628438527) > 1: NETLOGON_NEG_ACCOUNT_LOCKOUT > 1: NETLOGON_NEG_PERSISTENT_SAMREPL > 1: NETLOGON_NEG_ARCFOUR > 1: NETLOGON_NEG_PROMOTION_COUNT > 1: NETLOGON_NEG_CHANGELOG_BDC > 1: NETLOGON_NEG_FULL_SYNC_REPL > 1: NETLOGON_NEG_MULTIPLE_SIDS > 1: NETLOGON_NEG_REDO > 1: NETLOGON_NEG_PASSWORD_CHANGE_REFUSAL > 1: NETLOGON_NEG_SEND_PASSWORD_INFO_PDC > 1: NETLOGON_NEG_GENERIC_PASSTHROUGH > 1: NETLOGON_NEG_CONCURRENT_RPC > 1: NETLOGON_NEG_AVOID_ACCOUNT_DB_REPL > 1: NETLOGON_NEG_AVOID_SECURITYAUTH_DB_REPL > 1: NETLOGON_NEG_STRONG_KEYS > 1: NETLOGON_NEG_TRANSITIVE_TRUSTS > 1: NETLOGON_NEG_DNS_DOMAIN_TRUSTS > 1: NETLOGON_NEG_PASSWORD_SET2 > 1: NETLOGON_NEG_GETDOMAININFO > 1: NETLOGON_NEG_CROSS_FOREST_TRUSTS > 0: NETLOGON_NEG_NEUTRALIZE_NT4_EMULATION > 0: NETLOGON_NEG_RODC_PASSTHROUGH > 0: NETLOGON_NEG_SUPPORTS_AES_SHA2 > 1: NETLOGON_NEG_SUPPORTS_AES > 1: NETLOGON_NEG_AUTHENTICATED_RPC_LSASS > 1: NETLOGON_NEG_AUTHENTICATED_RPC > session_key : b900b9822bbab97d61b3ff9e285852c6 > sequence : 0x5c76ac04 (1551281156) > seed: struct netr_Credential > data : ef0add30c7aa58de > client: struct netr_Credential > data : 80cdcbda0856d5f6 > server: struct netr_Credential > data : 819e5272b1c43e4e > secure_channel_type : SEC_CHAN_WKSTA (0x2) > computer_name : 'MEMBER13' > account_name : 'MEMBER13$' > sid : NULL >[2019/02/27 16:27:24.393816, 5, pid=20533, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:739(gensec_start_mech) > Starting GENSEC mechanism schannel >[2019/02/27 16:27:24.393860, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:1885(rpc_pipe_bind_send) > Bind RPC Pipe: host backup11.ar41i1.qa auth_type 68, auth_level 6 >[2019/02/27 16:27:24.393892, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:1143(create_generic_auth_rpc_bind_req) > create_generic_auth_rpc_bind_req: generate first token >[2019/02/27 16:27:24.393935, 10, pid=20533, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:456(gensec_update_send) > gensec_update_send: schannel[0x559bfa4f05c0]: subreq: 0x559bfa4f0050 >[2019/02/27 16:27:24.393998, 10, pid=20533, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:514(gensec_update_done) > gensec_update_done: schannel[0x559bfa4f05c0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x559bfa4f0050/../../auth/gensec/schannel.c:478]: state[2] error[0 (0x0)] state[struct schannel_update_state (0x559bfa4f0200)] timer[(nil)] finish[../../auth/gensec/schannel.c:494] >[2019/02/27 16:27:24.394044, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > &r: struct dcerpc_auth > auth_type : DCERPC_AUTH_TYPE_SCHANNEL (68) > auth_level : DCERPC_AUTH_LEVEL_PRIVACY (6) > auth_pad_length : 0x00 (0) > auth_reserved : 0x00 (0) > auth_context_id : 0x00000001 (1) > credentials : DATA_BLOB length=24 > [0000] 00 00 00 00 03 00 00 00 41 52 34 31 49 31 00 4D ........ AR41I1.M > [0010] 45 4D 42 45 52 31 33 00 EMBER13. >[2019/02/27 16:27:24.394149, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND (11) > pfc_flags : 0x07 (7) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 1: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0068 (104) > auth_length : 0x0018 (24) > call_id : 0x00000013 (19) > u : union dcerpc_payload(case 11) > bind: struct dcerpc_bind > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x00000000 (0) > num_contexts : 0x01 (1) > ctx_list: ARRAY(1) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0000 (0) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 12345778-1234-abcd-ef00-0123456789ab > if_version : 0x00000000 (0) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > auth_info : DATA_BLOB length=32 > [0000] 44 06 00 00 01 00 00 00 00 00 00 00 03 00 00 00 D....... ........ > [0010] 41 52 34 31 49 31 00 4D 45 4D 42 45 52 31 33 00 AR41I1.M EMBER13. >[2019/02/27 16:27:24.394450, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:827(rpc_api_pipe_send) > rpc_api_pipe: host backup11.ar41i1.qa >[2019/02/27 16:27:24.394479, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:179(rpc_write_send) > rpc_write_send: data_to_write: 104 >[2019/02/27 16:27:24.397206, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:99(rpc_read_send) > rpc_read_send: data_to_read: 64 >[2019/02/27 16:27:24.397460, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > state->pkt: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND_ACK (12) > pfc_flags : 0x07 (7) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 1: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0050 (80) > auth_length : 0x000c (12) > call_id : 0x00000013 (19) > u : union dcerpc_payload(case 12) > bind_ack: struct dcerpc_bind_ack > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x00006d55 (27989) > secondary_address_size : 0x0006 (6) > secondary_address : '49153' > _pad1 : DATA_BLOB length=0 > num_results : 0x01 (1) > ctx_list: ARRAY(1) > ctx_list: struct dcerpc_ack_ctx > result : DCERPC_BIND_ACK_RESULT_ACCEPTANCE (0) > reason : union dcerpc_bind_ack_reason(case 0) > value : DCERPC_BIND_ACK_REASON_NOT_SPECIFIED (0) > syntax: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > auth_info : DATA_BLOB length=20 > [0000] 44 06 00 00 01 00 00 00 01 00 00 00 00 00 00 00 D....... ........ > [0010] 00 00 6C 00 ..l. >[2019/02/27 16:27:24.398549, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:979(rpc_api_pipe_got_pdu) > rpc_api_pipe: got frag len of 80 at offset 0: NT_STATUS_OK >[2019/02/27 16:27:24.398576, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:1079(rpc_api_pipe_got_pdu) > rpc_api_pipe: host backup11.ar41i1.qa returned 80 bytes. >[2019/02/27 16:27:24.398601, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:1758(check_bind_response) > check_bind_response: accepted! >[2019/02/27 16:27:24.398639, 10, pid=20533, effective(0, 0), real(0, 0)] ../../librpc/rpc/dcerpc_util.c:377(dcerpc_pull_auth_trailer) > dcerpc_pull_auth_trailer: auth_pad_length 0 >[2019/02/27 16:27:24.398690, 10, pid=20533, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:456(gensec_update_send) > gensec_update_send: schannel[0x559bfa4f05c0]: subreq: 0x559bfa4f0050 >[2019/02/27 16:27:24.398721, 10, pid=20533, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:514(gensec_update_done) > gensec_update_done: schannel[0x559bfa4f05c0]: NT_STATUS_OK tevent_req[0x559bfa4f0050/../../auth/gensec/schannel.c:478]: state[2] error[0 (0x0)] state[struct schannel_update_state (0x559bfa4f0200)] timer[(nil)] finish[../../auth/gensec/schannel.c:494] >[2019/02/27 16:27:24.398765, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:3387(cli_rpc_pipe_open_schannel_with_creds) > cli_rpc_pipe_open_schannel_with_creds: opened pipe lsarpc to machine backup11.ar41i1.qa with key netlogon_creds_cli:CLI[MEMBER13/MEMBER13$]/SRV[BACKUP11/AR41I1] and bound using schannel. >[2019/02/27 16:27:24.398793, 5, pid=20533, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:130(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /var/run/samba/g_lock.tdb >[2019/02/27 16:27:24.398815, 10, pid=20533, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:116(debug_lock_order) > lock order: 1:<none> 2:<none> 3:/var/run/samba/g_lock.tdb >[2019/02/27 16:27:24.398852, 10, pid=20533, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:345(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2019/02/27 16:27:24.398876, 5, pid=20533, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:159(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /var/run/samba/g_lock.tdb >[2019/02/27 16:27:24.398921, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > lsa_LookupNames4: struct lsa_LookupNames4 > in: struct lsa_LookupNames4 > num_names : 0x00000001 (1) > names: ARRAY(1) > names: struct lsa_String > length : 0x000c (12) > size : 0x000c (12) > string : * > string : 'AR41I1' > sids : * > sids: struct lsa_TransSidArray3 > count : 0x00000000 (0) > sids : NULL > level : LSA_LOOKUP_NAMES_DOMAINS_ONLY (2) > count : * > count : 0x00000000 (0) > lookup_options : LSA_LOOKUP_OPTION_SEARCH_ISOLATED_NAMES (0) > client_revision : LSA_CLIENT_REVISION_2 (2) >[2019/02/27 16:27:24.399072, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > t: struct dcerpc_sec_verification_trailer > _pad : DATA_BLOB length=0 > magic : 0000000000000000 > count: struct dcerpc_sec_vt_count > count : 0x0002 (2) > commands: ARRAY(2) > commands: struct dcerpc_sec_vt > command : 0x0001 (1) > 0x01: DCERPC_SEC_VT_COMMAND_ENUM (1) > 0: DCERPC_SEC_VT_COMMAND_END > 0: DCERPC_SEC_VT_MUST_PROCESS > u : union dcerpc_sec_vt_union(case 0x1) > bitmask1 : 0x00000001 (1) > 1: DCERPC_SEC_VT_CLIENT_SUPPORTS_HEADER_SIGNING > commands: struct dcerpc_sec_vt > command : 0x4002 (16386) > 0x02: DCERPC_SEC_VT_COMMAND_ENUM (2) > 1: DCERPC_SEC_VT_COMMAND_END > 0: DCERPC_SEC_VT_MUST_PROCESS > u : union dcerpc_sec_vt_union(case 0x2) > pcontext: struct dcerpc_sec_vt_pcontext > abstract_syntax: struct ndr_syntax_id > uuid : 12345778-1234-abcd-ef00-0123456789ab > if_version : 0x00000000 (0) > transfer_syntax: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) >[2019/02/27 16:27:24.399276, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_REQUEST (0) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0018 (24) > auth_length : 0x0038 (56) > call_id : 0x00000014 (20) > u : union dcerpc_payload(case 0) > request: struct dcerpc_request > alloc_hint : 0x0000007c (124) > context_id : 0x0000 (0) > opnum : 0x004d (77) > object : union dcerpc_object(case 0) > empty: struct dcerpc_empty > stub_and_verifier : DATA_BLOB length=0 >[2019/02/27 16:27:24.399479, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > &r: struct dcerpc_auth > auth_type : DCERPC_AUTH_TYPE_SCHANNEL (68) > auth_level : DCERPC_AUTH_LEVEL_PRIVACY (6) > auth_pad_length : 0x04 (4) > auth_reserved : 0x00 (0) > auth_context_id : 0x00000001 (1) > credentials : DATA_BLOB length=0 >[2019/02/27 16:27:24.399570, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:827(rpc_api_pipe_send) > rpc_api_pipe: host backup11.ar41i1.qa >[2019/02/27 16:27:24.399593, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:179(rpc_write_send) > rpc_write_send: data_to_write: 216 >[2019/02/27 16:27:24.405334, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:99(rpc_read_send) > rpc_read_send: data_to_read: 232 >[2019/02/27 16:27:24.405578, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > state->pkt: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_RESPONSE (2) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x00f8 (248) > auth_length : 0x0038 (56) > call_id : 0x00000014 (20) > u : union dcerpc_payload(case 2) > response: struct dcerpc_response > alloc_hint : 0x00000094 (148) > context_id : 0x0000 (0) > cancel_count : 0x00 (0) > reserved : 0x00 (0) > stub_and_verifier : DATA_BLOB length=224 > [0000] 43 99 A3 86 E6 8E 16 36 A7 23 B1 3C 67 31 29 D9 C......6 .#.<g1). > [0010] 95 A7 AD E5 58 D9 07 47 1C 56 42 83 FA D0 E4 77 ....X..G .VB....w > [0020] E3 07 51 36 D4 1E 4E A7 67 50 66 88 B0 F4 82 89 ..Q6..N. gPf..... > [0030] 84 45 1E AE 8D 58 1B 3E C8 D1 58 3E EF 2F 6A 84 .E...X.> ..X>./j. > [0040] 12 EA 05 80 29 AB 0A BF C2 F3 C2 DC 88 7C B6 81 ....)... .....|.. > [0050] 17 73 15 61 27 56 AE 9E 88 F8 38 B2 DE C5 13 73 .s.a'V.. ..8....s > [0060] 38 25 10 BB 48 A4 8A 39 FD 4B 24 D8 81 DD BB D2 8%..H..9 .K$..... > [0070] 9F 4D 7D 33 16 A4 91 B8 42 60 5C A9 00 B6 64 6A .M}3.... B`\...dj > [0080] B0 97 CA DC 45 81 6C 98 43 DC 74 4D 8E 68 C3 A6 ....E.l. C.tM.h.. > [0090] F4 DD 16 3D AC 67 1C 67 1F D2 A0 C2 E1 7E 52 F4 ...=.g.g .....~R. > [00A0] 44 06 0C 00 01 00 00 00 13 00 1A 00 FF FF 00 00 D....... ........ > [00B0] 7D CE 8B 2A 59 63 EE 4D 1C 08 52 28 96 82 AE BD }..*Yc.M ..R(.... > [00C0] 80 0A DC ED DE E0 F6 D1 00 00 00 00 00 00 00 00 ........ ........ > [00D0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[2019/02/27 16:27:24.406805, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/librpc/rpc/dcerpc_helpers.c:427(dcerpc_check_auth) > Requested Privacy. >[2019/02/27 16:27:24.406848, 10, pid=20533, effective(0, 0), real(0, 0)] ../../librpc/rpc/dcerpc_util.c:377(dcerpc_pull_auth_trailer) > dcerpc_pull_auth_trailer: auth_pad_length 12 >[2019/02/27 16:27:24.406871, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/librpc/rpc/dcerpc_helpers.c:491(dcerpc_check_auth) > GENSEC auth >[2019/02/27 16:27:24.406916, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:526(cli_pipe_validate_current_pdu) > Got pdu len 248, data_len 148 >[2019/02/27 16:27:24.406938, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:979(rpc_api_pipe_got_pdu) > rpc_api_pipe: got frag len of 248 at offset 0: NT_STATUS_OK >[2019/02/27 16:27:24.406959, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:1079(rpc_api_pipe_got_pdu) > rpc_api_pipe: host backup11.ar41i1.qa returned 148 bytes. >[2019/02/27 16:27:24.406998, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > lsa_LookupNames4: struct lsa_LookupNames4 > out: struct lsa_LookupNames4 > domains : * > domains : * > domains: struct lsa_RefDomainList > count : 0x00000001 (1) > domains : * > domains: ARRAY(1) > domains: struct lsa_DomainInfo > name: struct lsa_StringLarge > length : 0x000c (12) > size : 0x000e (14) > string : * > string : 'AR41I1' > sid : * > sid : S-1-5-21-2660895256-1678062113-3852026326 > max_size : 0x00000020 (32) > sids : * > sids: struct lsa_TransSidArray3 > count : 0x00000001 (1) > sids : * > sids: ARRAY(1) > sids: struct lsa_TranslatedSid3 > sid_type : SID_NAME_DOMAIN (3) > sid : * > sid : S-1-5-21-2660895256-1678062113-3852026326 > sid_index : 0x00000000 (0) > flags : 0x00000000 (0) > count : * > count : 0x00000001 (1) > result : NT_STATUS_OK >[2019/02/27 16:27:24.407257, 10, pid=20533, effective(0, 0), real(0, 0), class=tdb] ../../source3/lib/gencache.c:226(gencache_set_data_blob) > gencache_set_data_blob: Adding cache entry with key=[NAME2SID/AR41I1\] and timeout=[Mi Feb 27 16:32:24 2019 CET] (300 seconds ahead) >[2019/02/27 16:27:24.407316, 10, pid=20533, effective(0, 0), real(0, 0), class=tdb] ../../source3/lib/gencache.c:226(gencache_set_data_blob) > gencache_set_data_blob: Adding cache entry with key=[SID2NAME/S-1-5-21-2660895256-1678062113-3852026326] and timeout=[Mi Feb 27 16:32:24 2019 CET] (300 seconds ahead) >[2019/02/27 16:27:24.407359, 10, pid=20533, effective(0, 0), real(0, 0), class=tdb] ../../source3/lib/gencache.c:226(gencache_set_data_blob) > gencache_set_data_blob: Adding cache entry with key=[NAME2SID/AR41I1\] and timeout=[Mi Feb 27 16:32:24 2019 CET] (300 seconds ahead) >[2019/02/27 16:27:24.407393, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > out: struct wbint_LookupName > type : * > type : SID_NAME_DOMAIN (3) > sid : * > sid : S-1-5-21-2660895256-1678062113-3852026326 > result : NT_STATUS_OK >[2019/02/27 16:27:24.407474, 4, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:1605(child_handler) > Finished processing child request 56 >[2019/02/27 16:27:24.407497, 10, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:154(child_write_response) > Writing 4040 bytes to parent > >==> /var/log/samba/log.winbindd <== >[2019/02/27 16:27:24.408313, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_cache.c:4810(wcache_store_ndr) > could not fetch seqnum for domain AR41I1 >[2019/02/27 16:27:24.408561, 1, pid=20515, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > out: struct wbint_LookupName > type : * > type : SID_NAME_DOMAIN (3) > sid : * > sid : S-1-5-21-2660895256-1678062113-3852026326 > result : NT_STATUS_OK >[2019/02/27 16:27:24.409358, 1, pid=20515, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > wbint_UnixIDs2Sids: struct wbint_UnixIDs2Sids > in: struct wbint_UnixIDs2Sids > domain_name : * > domain_name : 'MEMBER13' > domain_sid : S-1-5-21-2674612725-1125306964-685080164 > num_ids : 0x00000001 (1) > xids: ARRAY(1) > xids: struct unixid > id : 0x000013bd (5053) > type : ID_TYPE_GID (2) >[2019/02/27 16:27:24.409858, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:1630(fork_domain_child) > fork_domain_child called without domain. >[2019/02/27 16:27:24.411237, 10, pid=20539, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:1694(fork_domain_child) > Child process 20539 >[2019/02/27 16:27:24.412098, 10, pid=20539, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=0x559bfa488b80 >[2019/02/27 16:27:24.412456, 10, pid=20539, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:80(messaging_dgm_ref) > messaging_dgm_ref: messaging_dgm_init returned Erfolg >[2019/02/27 16:27:24.412834, 10, pid=20539, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:109(messaging_dgm_ref) > messaging_dgm_ref: unique = 6671421315840285512 >[2019/02/27 16:27:24.413084, 5, pid=20539, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:155(make_pdb_method_name) > Attempting to find a passdb backend to match tdbsam (tdbsam) >[2019/02/27 16:27:24.413304, 5, pid=20539, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:176(make_pdb_method_name) > Found pdb backend tdbsam >[2019/02/27 16:27:24.413508, 5, pid=20539, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:187(make_pdb_method_name) > pdb backend tdbsam has a valid init >[2019/02/27 16:27:24.488774, 1, pid=20515, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > wbint_UnixIDs2Sids: struct wbint_UnixIDs2Sids > out: struct wbint_UnixIDs2Sids > xids: ARRAY(1) > xids: struct unixid > id : 0x000013bd (5053) > type : ID_TYPE_GID (2) > sids: ARRAY(1) > sids : S-0-0 > result : NT_STATUS_OK >[2019/02/27 16:27:24.489839, 1, pid=20515, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > wbint_UnixIDs2Sids: struct wbint_UnixIDs2Sids > in: struct wbint_UnixIDs2Sids > domain_name : * > domain_name : 'ar41i1' > domain_sid : S-1-5-21-2660895256-1678062113-3852026326 > num_ids : 0x00000001 (1) > xids: ARRAY(1) > xids: struct unixid > id : 0x000013bd (5053) > type : ID_TYPE_GID (2) >[2019/02/27 16:27:24.492042, 6, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:920(new_connection) > accepted socket 25 >[2019/02/27 16:27:24.492352, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:768(process_request_send) > process_request_send: process_request: request fn INTERFACE_VERSION >[2019/02/27 16:27:24.492557, 3, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_misc.c:432(winbindd_interface_version) > winbindd_interface_version: [winbindd (20539)]: request interface version (version = 31) >[2019/02/27 16:27:24.492803, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:854(process_request_written) > process_request_written: [winbindd(20539):unknown request]: delivered response to client >[2019/02/27 16:27:24.493213, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:744(process_request_send) > process_request_send: process_request: Handling async request winbindd(20539):LOOKUPNAME >[2019/02/27 16:27:24.493411, 3, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_lookupname.c:82(winbindd_lookupname_send) > lookupname ar41i1+Guests >[2019/02/27 16:27:24.493633, 1, pid=20515, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > in: struct wbint_LookupName > domain : * > domain : 'AR41I1' > name : * > name : 'GUESTS' > flags : 0x00000000 (0) > >==> /var/log/samba/log.wb-AR41I1 <== >[2019/02/27 16:27:24.494467, 10, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:119(child_read_request) > Need to read 44 extra bytes >[2019/02/27 16:27:24.494715, 4, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:1597(child_handler) > child daemon request 56 >[2019/02/27 16:27:24.494922, 10, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:744(child_process_request) > child_process_request: request fn NDRCMD >[2019/02/27 16:27:24.495111, 10, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual_ndr.c:362(winbindd_dual_ndrcmd) > winbindd_dual_ndrcmd: Running command WBINT_LOOKUPNAME (AR41I1) >[2019/02/27 16:27:24.495330, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > in: struct wbint_LookupName > domain : * > domain : 'AR41I1' > name : * > name : 'GUESTS' > flags : 0x00000000 (0) >[2019/02/27 16:27:24.496074, 10, pid=20533, effective(0, 0), real(0, 0)] ../../source3/lib/namemap_cache.c:324(namemap_cache_find_name) > namemap_cache_find_name: gencache_parse(NAME2SID/AR41I1\GUESTS) failed >[2019/02/27 16:27:24.496307, 10, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_cache.c:1772(wcache_name_to_sid) > wcache_name_to_sid: namemap_cache_find_name failed >[2019/02/27 16:27:24.496423, 10, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_cache.c:1819(wb_cache_name_to_sid) > name_to_sid: [Cached] - doing backend query for name for domain AR41I1 >[2019/02/27 16:27:24.496451, 3, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_msrpc.c:244(msrpc_name_to_sid) > msrpc_name_to_sid: name=AR41I1\GUESTS >[2019/02/27 16:27:24.496473, 3, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_msrpc.c:258(msrpc_name_to_sid) > name_to_sid [rpc] AR41I1\GUESTS for domain AR41I1 >[2019/02/27 16:27:24.496521, 10, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_cm.c:2997(cm_connect_lsa_tcp) > cm_connect_lsa_tcp >[2019/02/27 16:27:24.496572, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > lsa_LookupNames4: struct lsa_LookupNames4 > in: struct lsa_LookupNames4 > num_names : 0x00000001 (1) > names: ARRAY(1) > names: struct lsa_String > length : 0x001a (26) > size : 0x001a (26) > string : * > string : 'AR41I1\GUESTS' > sids : * > sids: struct lsa_TransSidArray3 > count : 0x00000000 (0) > sids : NULL > level : LSA_LOOKUP_NAMES_DOMAINS_ONLY (2) > count : * > count : 0x00000000 (0) > lookup_options : LSA_LOOKUP_OPTION_SEARCH_ISOLATED_NAMES (0) > client_revision : LSA_CLIENT_REVISION_2 (2) >[2019/02/27 16:27:24.496730, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_REQUEST (0) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0018 (24) > auth_length : 0x0038 (56) > call_id : 0x00000015 (21) > u : union dcerpc_payload(case 0) > request: struct dcerpc_request > alloc_hint : 0x00000050 (80) > context_id : 0x0000 (0) > opnum : 0x004d (77) > object : union dcerpc_object(case 0) > empty: struct dcerpc_empty > stub_and_verifier : DATA_BLOB length=0 >[2019/02/27 16:27:24.497614, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > &r: struct dcerpc_auth > auth_type : DCERPC_AUTH_TYPE_SCHANNEL (68) > auth_level : DCERPC_AUTH_LEVEL_PRIVACY (6) > auth_pad_length : 0x00 (0) > auth_reserved : 0x00 (0) > auth_context_id : 0x00000001 (1) > credentials : DATA_BLOB length=0 >[2019/02/27 16:27:24.497720, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:827(rpc_api_pipe_send) > rpc_api_pipe: host backup11.ar41i1.qa >[2019/02/27 16:27:24.497749, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:179(rpc_write_send) > rpc_write_send: data_to_write: 168 >[2019/02/27 16:27:24.503712, 5, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:99(rpc_read_send) > rpc_read_send: data_to_read: 200 >[2019/02/27 16:27:24.503972, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:422(ndr_print_debug) > state->pkt: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_RESPONSE (2) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x00d8 (216) > auth_length : 0x0038 (56) > call_id : 0x00000015 (21) > u : union dcerpc_payload(case 2) > response: struct dcerpc_response > alloc_hint : 0x00000078 (120) > context_id : 0x0000 (0) > cancel_count : 0x00 (0) > reserved : 0x00 (0) > stub_and_verifier : DATA_BLOB length=192 > [0000] A5 67 C7 8A 7F C5 03 DB 74 20 F7 DA 10 83 50 68 .g...... t ....Ph > [0010] 8D 34 50 27 42 28 92 4C F3 D5 CF 10 DE 68 AF 64 .4P'B(.L .....h.d > [0020] 88 E0 36 64 35 DB F9 2C 13 EE 75 AB 43 AB 07 BD ..6d5.., ..u.C... > [0030] 28 D0 43 14 83 4E 92 43 F3 22 22 55 BB D0 47 4E (.C..N.C .""U..GN > [0040] 3F 2D E8 4B 2D 85 EA 64 4A AC E6 09 66 F0 79 DE ?-.K-..d J...f.y. > [0050] 9D 5E 11 30 B2 E1 55 B2 AF 26 17 EF 71 68 D5 C2 .^.0..U. .&..qh.. > [0060] 42 12 17 CE 90 DA 5E 8F 47 F5 D1 87 B4 E2 E1 48 B.....^. G......H > [0070] F8 92 62 E2 21 78 4E 8B 7C 01 24 C1 7E 71 25 73 ..b.!xN. |.$.~q%s > [0080] 44 06 08 00 01 00 00 00 13 00 1A 00 FF FF 00 00 D....... ........ > [0090] EC 72 44 94 D2 89 AF 90 03 57 1D 99 76 45 00 CA .rD..... .W..vE.. > [00A0] 6D ED ED 34 58 D5 98 47 00 00 00 00 00 00 00 00 m..4X..G ........ > [00B0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[2019/02/27 16:27:24.504551, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/librpc/rpc/dcerpc_helpers.c:427(dcerpc_check_auth) > Requested Privacy. >[2019/02/27 16:27:24.504578, 10, pid=20533, effective(0, 0), real(0, 0)] ../../librpc/rpc/dcerpc_util.c:377(dcerpc_pull_auth_trailer) > dcerpc_pull_auth_trailer: auth_pad_length 8 >[2019/02/27 16:27:24.504601, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/librpc/rpc/dcerpc_helpers.c:491(dcerpc_check_auth) > GENSEC auth >[2019/02/27 16:27:24.504642, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:526(cli_pipe_validate_current_pdu) > Got pdu len 216, data_len 120 >[2019/02/27 16:27:24.504664, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:979(rpc_api_pipe_got_pdu) > rpc_api_pipe: got frag len of 216 at offset 0: NT_STATUS_OK >[2019/02/27 16:27:24.504685, 10, pid=20533, effective(0, 0), real(0, 0), class=rpc_cli] ../../source3/rpc_client/cli_pipe.c:1079(rpc_api_pipe_got_pdu) > rpc_api_pipe: host backup11.ar41i1.qa returned 120 bytes. >[2019/02/27 16:27:24.504723, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > lsa_LookupNames4: struct lsa_LookupNames4 > out: struct lsa_LookupNames4 > domains : * > domains : * > domains: struct lsa_RefDomainList > count : 0x00000001 (1) > domains : * > domains: ARRAY(1) > domains: struct lsa_DomainInfo > name: struct lsa_StringLarge > length : 0x000c (12) > size : 0x000e (14) > string : * > string : 'AR41I1' > sid : * > sid : S-1-5-21-2660895256-1678062113-3852026326 > max_size : 0x00000020 (32) > sids : * > sids: struct lsa_TransSidArray3 > count : 0x00000001 (1) > sids : * > sids: ARRAY(1) > sids: struct lsa_TranslatedSid3 > sid_type : SID_NAME_UNKNOWN (8) > sid : NULL > sid_index : 0x00000000 (0) > flags : 0x00000000 (0) > count : * > count : 0x00000000 (0) > result : NT_STATUS_NONE_MAPPED >[2019/02/27 16:27:24.504998, 10, pid=20533, effective(0, 0), real(0, 0), class=tdb] ../../source3/lib/gencache.c:226(gencache_set_data_blob) > gencache_set_data_blob: Adding cache entry with key=[NAME2SID/AR41I1\GUESTS] and timeout=[Mi Feb 27 16:32:24 2019 CET] (300 seconds ahead) >[2019/02/27 16:27:24.505057, 1, pid=20533, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > out: struct wbint_LookupName > type : * > type : SID_NAME_USE_NONE (0) > sid : * > sid : S-0-0 > result : NT_STATUS_NONE_MAPPED >[2019/02/27 16:27:24.505129, 4, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:1605(child_handler) > Finished processing child request 56 >[2019/02/27 16:27:24.505151, 10, pid=20533, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_dual.c:154(child_write_response) > Writing 4024 bytes to parent > >==> /var/log/samba/log.winbindd <== >[2019/02/27 16:27:24.505846, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_cache.c:4810(wcache_store_ndr) > could not fetch seqnum for domain AR41I1 >[2019/02/27 16:27:24.506064, 1, pid=20515, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > out: struct wbint_LookupName > type : * > type : SID_NAME_USE_NONE (0) > sid : * > sid : S-0-0 > result : NT_STATUS_NONE_MAPPED >[2019/02/27 16:27:24.506844, 5, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd_lookupname.c:119(winbindd_lookupname_recv) > Could not convert sid S-0-0: NT_STATUS_NONE_MAPPED >[2019/02/27 16:27:24.507092, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:810(process_request_done) > process_request_done: [winbindd(20539):LOOKUPNAME]: NT_STATUS_NONE_MAPPED >[2019/02/27 16:27:24.507241, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:854(process_request_written) > process_request_written: [winbindd(20539):LOOKUPNAME]: delivered response to client >[2019/02/27 16:27:24.507469, 1, pid=20515, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:471(ndr_print_function_debug) > wbint_UnixIDs2Sids: struct wbint_UnixIDs2Sids > out: struct wbint_UnixIDs2Sids > xids: ARRAY(1) > xids: struct unixid > id : 0x000013bd (5053) > type : ID_TYPE_GID (2) > sids: ARRAY(1) > sids : S-0-0 > result : NT_STATUS_OK >[2019/02/27 16:27:24.507771, 10, pid=20515, effective(0, 0), real(0, 0), class=tdb] ../../source3/lib/gencache.c:226(gencache_set_data_blob) > gencache_set_data_blob: Adding cache entry with key=[IDMAP/GID2SID/5053] and timeout=[Mi Feb 27 16:29:24 2019 CET] (120 seconds ahead) >[2019/02/27 16:27:24.507862, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:810(process_request_done) > process_request_done: [wbinfo(20537):XIDS_TO_SIDS]: NT_STATUS_OK >failed to call wbcGidToSid: WBC_ERR_DOMAIN_NOT_FOUND >Could not convert gid 5053 to sid >root@member13:~# [2019/02/27 16:27:24.509114, 10, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:854(process_request_written) > process_request_written: [wbinfo(20537):XIDS_TO_SIDS]: delivered response to client >[2019/02/27 16:27:24.509188, 6, pid=20515, effective(0, 0), real(0, 0), class=winbind] ../../source3/winbindd/winbindd.c:969(winbind_client_request_read) > closing socket 22, client exited
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 49321
: 9981