[kio-extras] [Bug 435478] Connexion to SMB Share doesn't work
bugzilla_noreply at kde.org
bugzilla_noreply at kde.org
Thu Apr 8 18:43:27 BST 2021
https://bugs.kde.org/show_bug.cgi?id=435478
--- Comment #4 from makosol at hotmail.com ---
alexandre at alexandre:~$ kwriteconfig5 --file kioslaverc --group SMB --key
DebugLevel 10
alexandre at alexandre:~$ export KDE_FORK_SLAVES=1
alexandre at alexandre:~$ export QT_MESSAGE_PATTERN='[%{time
process}](%{pid})/(%{category}) %{function}: %{message}'
alexandre at alexandre:~$ export QT_LOGGING_RULES='log_kio_smb=true'
alexandre at alexandre:~$ dolphin --new-window
smb://Alexandre@diskstation.local/photo/
[ 0.000](3021)/(log_kio_smb) unknown: auth_initialize_smbc
[ 0.000](3021)/(log_kio_smb) unknown: Setting debug level to: 10
INFO: Current debug levels:
all: 10
tdb: 10
printdrivers: 10
lanman: 10
smb: 10
rpc_parse: 10
rpc_srv: 10
rpc_cli: 10
passdb: 10
sam: 10
auth: 10
winbind: 10
vfs: 10
idmap: 10
quota: 10
acls: 10
locking: 10
msdfs: 10
dmapi: 10
registry: 10
scavenger: 10
dns: 10
ldb: 10
tevent: 10
auth_audit: 10
auth_json_audit: 10
kerberos: 10
drs_repl: 10
smb2: 10
smb2_credits: 10
dsdb_audit: 10
dsdb_json_audit: 10
dsdb_password_audit: 10
dsdb_password_json_audit: 10
dsdb_transaction_audit: 10
dsdb_transaction_json_audit: 10
dsdb_group_audit: 10
dsdb_group_json_audit: 10
Using netbios name ALEXANDRE.
Using workgroup WORKGROUP.
[ 0.000](3021)/(log_kio_smb) unknown: Using libsmbclient library version
4.11.6
[ 0.055](3021)/(log_kio_smb) unknown:
QUrl("smb://Alexandre@diskstation.local/photo")
[ 0.055](3021)/(log_kio_smb) unknown: checkURL
QUrl("smb://Alexandre@diskstation.local/photo")
[ 0.055](3021)/(log_kio_smb) unknown: checkURL return3
QUrl("smb://Alexandre@diskstation.local/photo")
[ 0.055](3021)/(log_kio_smb) unknown: updateCache "/photo"
[ 0.055](3021)/(log_kio_smb) unknown: Starting discovery.
parsed path: fname='smb://Alexandre@diskstation.local/photo'
server='diskstation.local' share='photo' path='' options=''
SMBC_check_options(): server='diskstation.local' share='photo' path=''
options=''
[ 0.055](3021)/(log_kio_smb) unknown: auth_smbc_get_dat: set user=
Alexandre , workgroup= WORKGROUP server= diskstation.local , share= photo
[ 0.055](3021)/(log_kio_smb) unknown: updateCache "/photo"
[ 0.055](3021)/(log_kio_smb) unknown: libsmb-auth-callback URL:
QUrl("smb://diskstation.local/photo")
[ 0.057](3021)/(log_kio_smb) unknown: got password through cache
"Alexandre"
SMBC_server: server_n=[diskstation.local] server=[diskstation.local]
-> server_n=[diskstation.local] server=[diskstation.local]
Opening cache file at /run/samba/gencache.tdb
tdb(/run/samba/gencache.tdb): tdb_open_ex: could not open file
/run/samba/gencache.tdb: Permission non accordée
Opening /run/samba/gencache.tdb failed: Permission non accordée
sitename_fetch: No stored sitename for realm ''
internal_resolve_name: looking up diskstation.local#20 (sitename (null))
Opening cache file at /run/samba/gencache.tdb
tdb(/run/samba/gencache.tdb): tdb_open_ex: could not open file
/run/samba/gencache.tdb: Permission non accordée
Opening /run/samba/gencache.tdb failed: Permission non accordée
no entry for diskstation.local#20 found.
resolve_hosts: Attempting host lookup for name diskstation.local<0x20>
remove_duplicate_addrs2: looking for duplicate address/port pairs
namecache_store: storing 1 address for diskstation.local#20: 192.168.1.15
Opening cache file at /run/samba/gencache.tdb
tdb(/run/samba/gencache.tdb): tdb_open_ex: could not open file
/run/samba/gencache.tdb: Permission non accordée
Opening /run/samba/gencache.tdb failed: Permission non accordée
internal_resolve_name: returning 1 addresses: 192.168.1.15:0
Connecting to 192.168.1.15 at port 445
Socket options:
SO_KEEPALIVE = 0
SO_REUSEADDR = 0
SO_BROADCAST = 0
TCP_NODELAY = 1
TCP_KEEPCNT = 9
TCP_KEEPIDLE = 7200
TCP_KEEPINTVL = 75
IPTOS_LOWDELAY = 0
IPTOS_THROUGHPUT = 0
SO_REUSEPORT = 0
SO_SNDBUF = 87040
SO_RCVBUF = 131072
SO_SNDLOWAT = 1
SO_RCVLOWAT = 1
SO_SNDTIMEO = 0
SO_RCVTIMEO = 0
TCP_QUICKACK = 1
TCP_DEFER_ACCEPT = 0
[ 0.000](3025)/(log_kio_smb) unknown: auth_initialize_smbc
[ 0.000](3025)/(log_kio_smb) unknown: Setting debug level to: 10
INFO: Current debug levels:
all: 10
tdb: 10
printdrivers: 10
lanman: 10
smb: 10
rpc_parse: 10
rpc_srv: 10
rpc_cli: 10
passdb: 10
sam: 10
auth: 10
winbind: 10
vfs: 10
idmap: 10
quota: 10
acls: 10
locking: 10
msdfs: 10
dmapi: 10
registry: 10
scavenger: 10
dns: 10
ldb: 10
tevent: 10
auth_audit: 10
auth_json_audit: 10
kerberos: 10
drs_repl: 10
smb2: 10
smb2_credits: 10
dsdb_audit: 10
dsdb_json_audit: 10
dsdb_password_audit: 10
dsdb_password_json_audit: 10
dsdb_transaction_audit: 10
dsdb_transaction_json_audit: 10
dsdb_group_audit: 10
dsdb_group_json_audit: 10
Using netbios name ALEXANDRE.
Using workgroup WORKGROUP.
[ 0.000](3025)/(log_kio_smb) unknown: Using libsmbclient library version
4.11.6
cli_session_creds_prepare_krb5: Doing kinit for Alexandre at WORKGROUP to access
diskstation.local
kerberos_kinit_password_ext: as Alexandre at WORKGROUP using [MEMORY:cliconnect]
as ccache and config [(null)]
Kinit for Alexandre at WORKGROUP to access diskstation.local failed: Cannot
contact any KDC for requested realm
cli_session_setup_spnego_send: Connect to diskstation.local as
Alexandre at WORKGROUP using SPNEGO
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Starting GENSEC mechanism spnego
Starting GENSEC submechanism gse_krb5
smb_gss_krb5_import_cred ccache[MEMORY:cliconnect] failed with [ Miscellaneous
failure (see text): unknown mech-code 2 for mech 1 2 840 113554 1 2 2] -the
caller may retry after a kinit.
Failed to start GENSEC client mech gse_krb5: NT_STATUS_INTERNAL_ERROR
Starting GENSEC submechanism ntlmssp
negotiate: struct NEGOTIATE_MESSAGE
Signature : 'NTLMSSP'
MessageType : NtLmNegotiate (1)
NegotiateFlags : 0x62088215 (1644724757)
1: NTLMSSP_NEGOTIATE_UNICODE
0: NTLMSSP_NEGOTIATE_OEM
1: NTLMSSP_REQUEST_TARGET
1: NTLMSSP_NEGOTIATE_SIGN
0: NTLMSSP_NEGOTIATE_SEAL
0: NTLMSSP_NEGOTIATE_DATAGRAM
0: NTLMSSP_NEGOTIATE_LM_KEY
0: NTLMSSP_NEGOTIATE_NETWARE
1: NTLMSSP_NEGOTIATE_NTLM
0: NTLMSSP_NEGOTIATE_NT_ONLY
0: NTLMSSP_ANONYMOUS
0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
0: NTLMSSP_TARGET_TYPE_DOMAIN
0: NTLMSSP_TARGET_TYPE_SERVER
0: NTLMSSP_TARGET_TYPE_SHARE
1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
0: NTLMSSP_NEGOTIATE_IDENTIFY
0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
0: NTLMSSP_NEGOTIATE_TARGET_INFO
1: NTLMSSP_NEGOTIATE_VERSION
1: NTLMSSP_NEGOTIATE_128
1: NTLMSSP_NEGOTIATE_KEY_EXCH
0: NTLMSSP_NEGOTIATE_56
DomainNameLen : 0x0000 (0)
DomainNameMaxLen : 0x0000 (0)
DomainName : *
DomainName : ''
WorkstationLen : 0x0000 (0)
WorkstationMaxLen : 0x0000 (0)
Workstation : *
Workstation : ''
Version: struct ntlmssp_VERSION
ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
ProductBuild : 0x0000 (0)
Reserved: ARRAY(3)
[0] : 0x00 (0)
[1] : 0x00 (0)
[2] : 0x00 (0)
NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
gensec_update_send: ntlmssp[0x55cc66933e60]: subreq: 0x55cc66907a40
gensec_update_send: spnego[0x55cc6692e1d0]: subreq: 0x55cc66933410
gensec_update_done: ntlmssp[0x55cc66933e60]: NT_STATUS_MORE_PROCESSING_REQUIRED
tevent_req[0x55cc66907a40/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0
(0x0)] state[struct gensec_ntlmssp_update_state (0x55cc66907bf0)] timer[(nil)]
finish[../../auth/ntlmssp/ntlmssp.c:215]
gensec_update_done: spnego[0x55cc6692e1d0]: NT_STATUS_MORE_PROCESSING_REQUIRED
tevent_req[0x55cc66933410/../../auth/gensec/spnego.c:1630]: state[2] error[0
(0x0)] state[struct gensec_spnego_update_state (0x55cc669335c0)] timer[(nil)]
finish[../../auth/gensec/spnego.c:2115]
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
short string '', sent with NULL termination despite NOTERM flag in IDL
challenge: struct CHALLENGE_MESSAGE
Signature : 'NTLMSSP'
MessageType : NtLmChallenge (0x2)
TargetNameLen : 0x0016 (22)
TargetNameMaxLen : 0x0016 (22)
TargetName : *
TargetName : 'DISKSTATION'
NegotiateFlags : 0x628a8215 (1653244437)
1: NTLMSSP_NEGOTIATE_UNICODE
0: NTLMSSP_NEGOTIATE_OEM
1: NTLMSSP_REQUEST_TARGET
1: NTLMSSP_NEGOTIATE_SIGN
0: NTLMSSP_NEGOTIATE_SEAL
0: NTLMSSP_NEGOTIATE_DATAGRAM
0: NTLMSSP_NEGOTIATE_LM_KEY
0: NTLMSSP_NEGOTIATE_NETWARE
1: NTLMSSP_NEGOTIATE_NTLM
0: NTLMSSP_NEGOTIATE_NT_ONLY
0: NTLMSSP_ANONYMOUS
0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
0: NTLMSSP_TARGET_TYPE_DOMAIN
1: NTLMSSP_TARGET_TYPE_SERVER
0: NTLMSSP_TARGET_TYPE_SHARE
1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
0: NTLMSSP_NEGOTIATE_IDENTIFY
0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
1: NTLMSSP_NEGOTIATE_TARGET_INFO
1: NTLMSSP_NEGOTIATE_VERSION
1: NTLMSSP_NEGOTIATE_128
1: NTLMSSP_NEGOTIATE_KEY_EXCH
0: NTLMSSP_NEGOTIATE_56
ServerChallenge : 45be990c09d3b3f1
Reserved : 0000000000000000
TargetInfoLen : 0x0064 (100)
TargetInfoMaxLen : 0x0064 (100)
TargetInfo : *
TargetInfo: struct AV_PAIR_LIST
count : 0x00000006 (6)
pair: ARRAY(6)
pair: struct AV_PAIR
AvId : MsvAvNbDomainName (0x2)
AvLen : 0x0016 (22)
Value : union ntlmssp_AvValue(case
0x2)
AvNbDomainName : 'DISKSTATION'
pair: struct AV_PAIR
AvId : MsvAvNbComputerName (0x1)
AvLen : 0x0016 (22)
Value : union ntlmssp_AvValue(case
0x1)
AvNbComputerName : 'DISKSTATION'
pair: struct AV_PAIR
AvId : MsvAvDnsDomainName (0x4)
AvLen : 0x0002 (2)
[ 0.022](3025)/(log_kio_smb) unknown:
QUrl("smb://Alexandre@diskstation.local/photo/")
Value : union ntlmssp_AvValue(case
0x4)
AvDnsDomainName : ''
pair: struct AV_PAIR
AvId : MsvAvDnsComputerName (0x3)
[ 0.022](3025)/(log_kio_smb) unknown: updateCache "/photo"
AvLen : 0x0016 (22)
Value : union ntlmssp_AvValue(case
0x3)
AvDnsComputerName : 'diskstation'
pair: struct AV_PAIR
AvId : MsvAvTimestamp (0x7)
AvLen : 0x0008 (8)
Value : union ntlmssp_AvValue(case
0x7)
smbc_stat(smb://Alexandre@diskstation.local/photo)
AvTimestamp : jeu. avril 8 19:42:37 2021
CEST
pair: struct AV_PAIR
AvId : MsvAvEOL (0x0)
AvLen : 0x0000 (0)
Value : union ntlmssp_AvValue(case
0x0)
[ 0.022](3025)/(log_kio_smb) unknown: auth_smbc_get_dat: set user=
Alexandre , workgroup= WORKGROUP server= diskstation.local , share= photo
Version: struct ntlmssp_VERSION
ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6)
ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1)
ProductBuild : 0x0000 (0)
Reserved : 000000
NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF)
short string '', sent with NULL termination despite NOTERM flag in IDL
[ 0.022](3025)/(log_kio_smb) unknown: updateCache "/photo"
[ 0.022](3025)/(log_kio_smb) unknown: libsmb-auth-callback URL:
QUrl("smb://diskstation.local/photo")
short string '', sent with NULL termination despite NOTERM flag in IDL
authenticate: struct AUTHENTICATE_MESSAGE
Signature : 'NTLMSSP'
MessageType : NtLmAuthenticate (3)
LmChallengeResponseLen : 0x0018 (24)
LmChallengeResponseMaxLen: 0x0018 (24)
LmChallengeResponse : *
LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case
24)
v1: struct LM_RESPONSE
Response :
000000000000000000000000000000000000000000000000
NtChallengeResponseLen : 0x0110 (272)
NtChallengeResponseMaxLen: 0x0110 (272)
NtChallengeResponse : *
NtChallengeResponse : union
ntlmssp_NTLM_RESPONSE_with_len(case 272)
v2: struct NTLMv2_RESPONSE
Response : 8603f961ee8d8288a86dea31407d01f4
Challenge: struct NTLMv2_CLIENT_CHALLENGE
RespType : 0x01 (1)
HiRespType : 0x01 (1)
Reserved1 : 0x0000 (0)
Reserved2 : 0x00000000 (0)
TimeStamp : jeu. avril 8 19:42:37 2021 CEST
ChallengeFromClient : 3b022726c87861e1
Reserved3 : 0x00000000 (0)
AvPairs: struct AV_PAIR_LIST
count : 0x0000000a (10)
pair: ARRAY(10)
pair: struct AV_PAIR
AvId : MsvAvNbDomainName
(0x2)
AvLen : 0x0016 (22)
Value : union
ntlmssp_AvValue(case 0x2)
AvNbDomainName : 'DISKSTATION'
pair: struct AV_PAIR
AvId : MsvAvNbComputerName
(0x1)
AvLen : 0x0016 (22)
Value : union
ntlmssp_AvValue(case 0x1)
AvNbComputerName : 'DISKSTATION'
pair: struct AV_PAIR
AvId : MsvAvDnsDomainName
(0x4)
AvLen : 0x0002 (2)
Value : union
ntlmssp_AvValue(case 0x4)
AvDnsDomainName : ''
pair: struct AV_PAIR
AvId : MsvAvDnsComputerName
(0x3)
AvLen : 0x0016 (22)
Value : union
ntlmssp_AvValue(case 0x3)
AvDnsComputerName : 'diskstation'
pair: struct AV_PAIR
AvId : MsvAvTimestamp (0x7)
AvLen : 0x0008 (8)
Value : union
ntlmssp_AvValue(case 0x7)
AvTimestamp : jeu. avril 8
19:42:37 2021 CEST
pair: struct AV_PAIR
AvId : MsvAvFlags (0x6)
AvLen : 0x0004 (4)
Value : union
ntlmssp_AvValue(case 0x6)
AvFlags : 0x00000002 (2)
0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT
1:
NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE
0:
NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE
pair: struct AV_PAIR
AvId : MsvAvSingleHost
(0x8)
AvLen : 0x0030 (48)
Value : union
ntlmssp_AvValue(case 0x8)
AvSingleHost: struct ntlmssp_SingleHostData
Size : 0x00000030 (48)
Z4 : 0x00000000 (0)
token_info: struct
LSAP_TOKEN_INFO_INTEGRITY
Flags : 0x00000000
(0)
TokenIL : 0x00000000
(0)
MachineId :
7b5019682259e41f952597ac73ed1a27e63d3dcf3014d612c0ccfd6572fd9b43
remaining : DATA_BLOB
length=0
pair: struct AV_PAIR
AvId : MsvChannelBindings
(0xA)
AvLen : 0x0010 (16)
Value : union
ntlmssp_AvValue(case 0xA)
ChannelBindings :
00000000000000000000000000000000
pair: struct AV_PAIR
AvId : MsvAvTargetName
(0x9)
AvLen : 0x002c (44)
Value : union
ntlmssp_AvValue(case 0x9)
AvTargetName :
'cifs/diskstation.local'
pair: struct AV_PAIR
AvId : MsvAvEOL (0x0)
AvLen : 0x0000 (0)
Value : union
ntlmssp_AvValue(case 0x0)
DomainNameLen : 0x0012 (18)
DomainNameMaxLen : 0x0012 (18)
DomainName : *
DomainName : 'WORKGROUP'
UserNameLen : 0x0012 (18)
UserNameMaxLen : 0x0012 (18)
UserName : *
UserName : 'Alexandre'
WorkstationLen : 0x0012 (18)
WorkstationMaxLen : 0x0012 (18)
Workstation : *
Workstation : 'ALEXANDRE'
EncryptedRandomSessionKeyLen: 0x0010 (16)
EncryptedRandomSessionKeyMaxLen: 0x0010 (16)
EncryptedRandomSessionKey: *
EncryptedRandomSessionKey: DATA_BLOB length=16
[0000] A3 BE 70 01 A2 62 2B 64 D9 D1 66 AE 56 C3 DE BF ..p..b+d ..f.V...
NegotiateFlags : 0x62088215 (1644724757)
1: NTLMSSP_NEGOTIATE_UNICODE
0: NTLMSSP_NEGOTIATE_OEM
1: NTLMSSP_REQUEST_TARGET
1: NTLMSSP_NEGOTIATE_SIGN
0: NTLMSSP_NEGOTIATE_SEAL
0: NTLMSSP_NEGOTIATE_DATAGRAM
0: NTLMSSP_NEGOTIATE_LM_KEY
0: NTLMSSP_NEGOTIATE_NETWARE
1: NTLMSSP_NEGOTIATE_NTLM
0: NTLMSSP_NEGOTIATE_NT_ONLY
0: NTLMSSP_ANONYMOUS
0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
0: NTLMSSP_TARGET_TYPE_DOMAIN
0: NTLMSSP_TARGET_TYPE_SERVER
0: NTLMSSP_TARGET_TYPE_SHARE
1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
0: NTLMSSP_NEGOTIATE_IDENTIFY
0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
0: NTLMSSP_NEGOTIATE_TARGET_INFO
1: NTLMSSP_NEGOTIATE_VERSION
1: NTLMSSP_NEGOTIATE_128
1: NTLMSSP_NEGOTIATE_KEY_EXCH
0: NTLMSSP_NEGOTIATE_56
Version: struct ntlmssp_VERSION
ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
ProductBuild : 0x0000 (0)
Reserved: ARRAY(3)
[0] : 0x00 (0)
[1] : 0x00 (0)
[2] : 0x00 (0)
NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
gensec_update_send: ntlmssp[0x55cc66933e60]: subreq: 0x55cc66928c50
gensec_update_send: spnego[0x55cc6692e1d0]: subreq: 0x55cc66937990
gensec_update_done: ntlmssp[0x55cc66933e60]: NT_STATUS_OK
tevent_req[0x55cc66928c50/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0
(0x0)] state[struct gensec_ntlmssp_update_state (0x55cc66928e00)] timer[(nil)]
finish[../../auth/ntlmssp/ntlmssp.c:222]
gensec_update_done: spnego[0x55cc6692e1d0]: NT_STATUS_MORE_PROCESSING_REQUIRED
tevent_req[0x55cc66937990/../../auth/gensec/spnego.c:1630]: state[2] error[0
(0x0)] state[struct gensec_spnego_update_state (0x55cc66937b40)] timer[(nil)]
finish[../../auth/gensec/spnego.c:2115]
[ 0.024](3025)/(log_kio_smb) unknown: got password through cache
"Alexandre"
SMBC_server: server_n=[diskstation.local] server=[diskstation.local]
-> server_n=[diskstation.local] server=[diskstation.local]
Opening cache file at /run/samba/gencache.tdb
tdb(/run/samba/gencache.tdb): tdb_open_ex: could not open file
/run/samba/gencache.tdb: Permission non accordée
Opening /run/samba/gencache.tdb failed: Permission non accordée
sitename_fetch: No stored sitename for realm ''
internal_resolve_name: looking up diskstation.local#20 (sitename (null))
Opening cache file at /run/samba/gencache.tdb
tdb(/run/samba/gencache.tdb): tdb_open_ex: could not open file
/run/samba/gencache.tdb: Permission non accordée
Opening /run/samba/gencache.tdb failed: Permission non accordée
no entry for diskstation.local#20 found.
resolve_hosts: Attempting host lookup for name diskstation.local<0x20>
remove_duplicate_addrs2: looking for duplicate address/port pairs
namecache_store: storing 1 address for diskstation.local#20: 192.168.1.15
Opening cache file at /run/samba/gencache.tdb
tdb(/run/samba/gencache.tdb): tdb_open_ex: could not open file
/run/samba/gencache.tdb: Permission non accordée
Opening /run/samba/gencache.tdb failed: Permission non accordée
internal_resolve_name: returning 1 addresses: 192.168.1.15:0
Connecting to 192.168.1.15 at port 445
Socket options:
SO_KEEPALIVE = 0
SO_REUSEADDR = 0
SO_BROADCAST = 0
TCP_NODELAY = 1
TCP_KEEPCNT = 9
TCP_KEEPIDLE = 7200
TCP_KEEPINTVL = 75
IPTOS_LOWDELAY = 0
IPTOS_THROUGHPUT = 0
SO_REUSEPORT = 0
SO_SNDBUF = 87040
SO_RCVBUF = 131072
SO_SNDLOWAT = 1
SO_RCVLOWAT = 1
SO_SNDTIMEO = 0
SO_RCVTIMEO = 0
TCP_QUICKACK = 1
TCP_DEFER_ACCEPT = 0
ntlmssp_check_packet: NTLMSSP signature OK !
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
gensec_update_send: spnego[0x55cc6692e1d0]: subreq: 0x55cc66937990
gensec_update_done: spnego[0x55cc6692e1d0]: NT_STATUS_OK
tevent_req[0x55cc66937990/../../auth/gensec/spnego.c:1630]: state[2] error[0
(0x0)] state[struct gensec_spnego_update_state (0x55cc66937b40)] timer[(nil)]
finish[../../auth/gensec/spnego.c:2115]
session setup ok
signed SMB2 message
cli_session_creds_prepare_krb5: Doing kinit for Alexandre at WORKGROUP to access
diskstation.local
kerberos_kinit_password_ext: as Alexandre at WORKGROUP using [MEMORY:cliconnect]
as ccache and config [(null)]
Kinit for Alexandre at WORKGROUP to access diskstation.local failed: Cannot
contact any KDC for requested realm
cli_session_setup_spnego_send: Connect to diskstation.local as
Alexandre at WORKGROUP using SPNEGO
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'http_negotiate' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Starting GENSEC mechanism spnego
Starting GENSEC submechanism gse_krb5
smb_gss_krb5_import_cred ccache[MEMORY:cliconnect] failed with [ Miscellaneous
failure (see text): unknown mech-code 2 for mech 1 2 840 113554 1 2 2] -the
caller may retry after a kinit.
Failed to start GENSEC client mech gse_krb5: NT_STATUS_INTERNAL_ERROR
Starting GENSEC submechanism ntlmssp
negotiate: struct NEGOTIATE_MESSAGE
Signature : 'NTLMSSP'
MessageType : NtLmNegotiate (1)
NegotiateFlags : 0x62088215 (1644724757)
1: NTLMSSP_NEGOTIATE_UNICODE
0: NTLMSSP_NEGOTIATE_OEM
1: NTLMSSP_REQUEST_TARGET
1: NTLMSSP_NEGOTIATE_SIGN
0: NTLMSSP_NEGOTIATE_SEAL
0: NTLMSSP_NEGOTIATE_DATAGRAM
0: NTLMSSP_NEGOTIATE_LM_KEY
0: NTLMSSP_NEGOTIATE_NETWARE
1: NTLMSSP_NEGOTIATE_NTLM
0: NTLMSSP_NEGOTIATE_NT_ONLY
0: NTLMSSP_ANONYMOUS
0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
0: NTLMSSP_TARGET_TYPE_DOMAIN
0: NTLMSSP_TARGET_TYPE_SERVER
0: NTLMSSP_TARGET_TYPE_SHARE
1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
0: NTLMSSP_NEGOTIATE_IDENTIFY
0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
0: NTLMSSP_NEGOTIATE_TARGET_INFO
1: NTLMSSP_NEGOTIATE_VERSION
1: NTLMSSP_NEGOTIATE_128
1: NTLMSSP_NEGOTIATE_KEY_EXCH
0: NTLMSSP_NEGOTIATE_56
DomainNameLen : 0x0000 (0)
DomainNameMaxLen : 0x0000 (0)
DomainName : *
DomainName : ''
WorkstationLen : 0x0000 (0)
WorkstationMaxLen : 0x0000 (0)
Workstation : *
Workstation : ''
Version: struct ntlmssp_VERSION
ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
ProductBuild : 0x0000 (0)
Reserved: ARRAY(3)
[0] : 0x00 (0)
[1] : 0x00 (0)
[2] : 0x00 (0)
NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
gensec_update_send: ntlmssp[0x5579c2640540]: subreq: 0x5579c2614a40
gensec_update_send: spnego[0x5579c263a860]: subreq: 0x5579c263faf0
gensec_update_done: ntlmssp[0x5579c2640540]: NT_STATUS_MORE_PROCESSING_REQUIRED
tevent_req[0x5579c2614a40/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0
(0x0)] state[struct gensec_ntlmssp_update_state (0x5579c2614bf0)] timer[(nil)]
finish[../../auth/ntlmssp/ntlmssp.c:215]
gensec_update_done: spnego[0x5579c263a860]: NT_STATUS_MORE_PROCESSING_REQUIRED
tevent_req[0x5579c263faf0/../../auth/gensec/spnego.c:1630]: state[2] error[0
(0x0)] state[struct gensec_spnego_update_state (0x5579c263fca0)] timer[(nil)]
finish[../../auth/gensec/spnego.c:2115]
map_errno_from_nt_status: 32 bit codes: code=c000020c
[ 0.204](3021)/(log_kio_smb) unknown: open
"smb://Alexandre@diskstation.local/photo" url-type: 3 dirfd: -1 errNum: 103
[ 0.204](3021)/(log_kio_smb) unknown: Discovery finished.
[ 0.204](3021)/(log_kio_smb) unknown: reporting generic error: 103
[ 0.204](3021)/(log_kio_smb) unknown: errNum 103
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
short string '', sent with NULL termination despite NOTERM flag in IDL
challenge: struct CHALLENGE_MESSAGE
Signature : 'NTLMSSP'
MessageType : NtLmChallenge (0x2)
TargetNameLen : 0x0016 (22)
TargetNameMaxLen : 0x0016 (22)
TargetName : *
TargetName : 'DISKSTATION'
NegotiateFlags : 0x628a8215 (1653244437)
1: NTLMSSP_NEGOTIATE_UNICODE
0: NTLMSSP_NEGOTIATE_OEM
1: NTLMSSP_REQUEST_TARGET
1: NTLMSSP_NEGOTIATE_SIGN
0: NTLMSSP_NEGOTIATE_SEAL
0: NTLMSSP_NEGOTIATE_DATAGRAM
0: NTLMSSP_NEGOTIATE_LM_KEY
0: NTLMSSP_NEGOTIATE_NETWARE
1: NTLMSSP_NEGOTIATE_NTLM
0: NTLMSSP_NEGOTIATE_NT_ONLY
0: NTLMSSP_ANONYMOUS
0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
0: NTLMSSP_TARGET_TYPE_DOMAIN
1: NTLMSSP_TARGET_TYPE_SERVER
0: NTLMSSP_TARGET_TYPE_SHARE
1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
0: NTLMSSP_NEGOTIATE_IDENTIFY
0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
1: NTLMSSP_NEGOTIATE_TARGET_INFO
1: NTLMSSP_NEGOTIATE_VERSION
1: NTLMSSP_NEGOTIATE_128
1: NTLMSSP_NEGOTIATE_KEY_EXCH
0: NTLMSSP_NEGOTIATE_56
ServerChallenge : be11b3e3b5f8da50
Reserved : 0000000000000000
TargetInfoLen : 0x0064 (100)
TargetInfoMaxLen : 0x0064 (100)
TargetInfo : *
TargetInfo: struct AV_PAIR_LIST
count : 0x00000006 (6)
pair: ARRAY(6)
pair: struct AV_PAIR
AvId : MsvAvNbDomainName (0x2)
AvLen : 0x0016 (22)
Value : union ntlmssp_AvValue(case
0x2)
AvNbDomainName : 'DISKSTATION'
pair: struct AV_PAIR
AvId : MsvAvNbComputerName (0x1)
AvLen : 0x0016 (22)
Value : union ntlmssp_AvValue(case
0x1)
AvNbComputerName : 'DISKSTATION'
pair: struct AV_PAIR
AvId : MsvAvDnsDomainName (0x4)
AvLen : 0x0002 (2)
Value : union ntlmssp_AvValue(case
0x4)
AvDnsDomainName : ''
pair: struct AV_PAIR
AvId : MsvAvDnsComputerName (0x3)
AvLen : 0x0016 (22)
Value : union ntlmssp_AvValue(case
0x3)
AvDnsComputerName : 'diskstation'
pair: struct AV_PAIR
AvId : MsvAvTimestamp (0x7)
AvLen : 0x0008 (8)
Value : union ntlmssp_AvValue(case
0x7)
AvTimestamp : jeu. avril 8 19:42:37 2021
CEST
pair: struct AV_PAIR
AvId : MsvAvEOL (0x0)
AvLen : 0x0000 (0)
Value : union ntlmssp_AvValue(case
0x0)
Version: struct ntlmssp_VERSION
ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6)
ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1)
ProductBuild : 0x0000 (0)
Reserved : 000000
NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF)
short string '', sent with NULL termination despite NOTERM flag in IDL
short string '', sent with NULL termination despite NOTERM flag in IDL
authenticate: struct AUTHENTICATE_MESSAGE
Signature : 'NTLMSSP'
MessageType : NtLmAuthenticate (3)
LmChallengeResponseLen : 0x0018 (24)
LmChallengeResponseMaxLen: 0x0018 (24)
LmChallengeResponse : *
LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case
24)
v1: struct LM_RESPONSE
Response :
000000000000000000000000000000000000000000000000
NtChallengeResponseLen : 0x0110 (272)
NtChallengeResponseMaxLen: 0x0110 (272)
NtChallengeResponse : *
NtChallengeResponse : union
ntlmssp_NTLM_RESPONSE_with_len(case 272)
v2: struct NTLMv2_RESPONSE
Response : 6197d522b76448e406ede53b9aa95592
Challenge: struct NTLMv2_CLIENT_CHALLENGE
RespType : 0x01 (1)
HiRespType : 0x01 (1)
Reserved1 : 0x0000 (0)
Reserved2 : 0x00000000 (0)
TimeStamp : jeu. avril 8 19:42:37 2021 CEST
ChallengeFromClient : f6debd6ec1ee5816
Reserved3 : 0x00000000 (0)
AvPairs: struct AV_PAIR_LIST
count : 0x0000000a (10)
pair: ARRAY(10)
pair: struct AV_PAIR
AvId : MsvAvNbDomainName
(0x2)
AvLen : 0x0016 (22)
Value : union
ntlmssp_AvValue(case 0x2)
AvNbDomainName : 'DISKSTATION'
pair: struct AV_PAIR
AvId : MsvAvNbComputerName
(0x1)
AvLen : 0x0016 (22)
Value : union
ntlmssp_AvValue(case 0x1)
AvNbComputerName : 'DISKSTATION'
pair: struct AV_PAIR
AvId : MsvAvDnsDomainName
(0x4)
AvLen : 0x0002 (2)
Value : union
ntlmssp_AvValue(case 0x4)
AvDnsDomainName : ''
pair: struct AV_PAIR
AvId : MsvAvDnsComputerName
(0x3)
AvLen : 0x0016 (22)
Value : union
ntlmssp_AvValue(case 0x3)
AvDnsComputerName : 'diskstation'
pair: struct AV_PAIR
AvId : MsvAvTimestamp (0x7)
AvLen : 0x0008 (8)
Value : union
ntlmssp_AvValue(case 0x7)
AvTimestamp : jeu. avril 8
19:42:37 2021 CEST
pair: struct AV_PAIR
AvId : MsvAvFlags (0x6)
AvLen : 0x0004 (4)
Value : union
ntlmssp_AvValue(case 0x6)
AvFlags : 0x00000002 (2)
0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT
1:
NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE
0:
NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE
pair: struct AV_PAIR
AvId : MsvAvSingleHost
(0x8)
AvLen : 0x0030 (48)
Value : union
ntlmssp_AvValue(case 0x8)
AvSingleHost: struct ntlmssp_SingleHostData
Size : 0x00000030 (48)
Z4 : 0x00000000 (0)
token_info: struct
LSAP_TOKEN_INFO_INTEGRITY
Flags : 0x00000000
(0)
TokenIL : 0x00000000
(0)
MachineId :
dc770842728622d9fd9271ebc506e6a7157d1a50915da87fa61aca6f8a98b34e
remaining : DATA_BLOB
length=0
pair: struct AV_PAIR
AvId : MsvChannelBindings
(0xA)
AvLen : 0x0010 (16)
Value : union
ntlmssp_AvValue(case 0xA)
ChannelBindings :
00000000000000000000000000000000
pair: struct AV_PAIR
AvId : MsvAvTargetName
(0x9)
AvLen : 0x002c (44)
Value : union
ntlmssp_AvValue(case 0x9)
AvTargetName :
'cifs/diskstation.local'
pair: struct AV_PAIR
AvId : MsvAvEOL (0x0)
AvLen : 0x0000 (0)
Value : union
ntlmssp_AvValue(case 0x0)
DomainNameLen : 0x0012 (18)
DomainNameMaxLen : 0x0012 (18)
DomainName : *
DomainName : 'WORKGROUP'
UserNameLen : 0x0012 (18)
UserNameMaxLen : 0x0012 (18)
UserName : *
UserName : 'Alexandre'
WorkstationLen : 0x0012 (18)
WorkstationMaxLen : 0x0012 (18)
Workstation : *
Workstation : 'ALEXANDRE'
EncryptedRandomSessionKeyLen: 0x0010 (16)
EncryptedRandomSessionKeyMaxLen: 0x0010 (16)
EncryptedRandomSessionKey: *
EncryptedRandomSessionKey: DATA_BLOB length=16
[0000] 59 89 55 B9 50 56 2F 18 55 F9 5F 0E 23 74 F5 67 Y.U.PV/. U._.#t.g
NegotiateFlags : 0x62088215 (1644724757)
1: NTLMSSP_NEGOTIATE_UNICODE
0: NTLMSSP_NEGOTIATE_OEM
1: NTLMSSP_REQUEST_TARGET
1: NTLMSSP_NEGOTIATE_SIGN
0: NTLMSSP_NEGOTIATE_SEAL
0: NTLMSSP_NEGOTIATE_DATAGRAM
0: NTLMSSP_NEGOTIATE_LM_KEY
0: NTLMSSP_NEGOTIATE_NETWARE
1: NTLMSSP_NEGOTIATE_NTLM
0: NTLMSSP_NEGOTIATE_NT_ONLY
0: NTLMSSP_ANONYMOUS
0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
0: NTLMSSP_TARGET_TYPE_DOMAIN
0: NTLMSSP_TARGET_TYPE_SERVER
0: NTLMSSP_TARGET_TYPE_SHARE
1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
0: NTLMSSP_NEGOTIATE_IDENTIFY
0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
0: NTLMSSP_NEGOTIATE_TARGET_INFO
1: NTLMSSP_NEGOTIATE_VERSION
1: NTLMSSP_NEGOTIATE_128
1: NTLMSSP_NEGOTIATE_KEY_EXCH
0: NTLMSSP_NEGOTIATE_56
Version: struct ntlmssp_VERSION
ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
ProductBuild : 0x0000 (0)
Reserved: ARRAY(3)
[0] : 0x00 (0)
[1] : 0x00 (0)
[2] : 0x00 (0)
NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
gensec_update_send: ntlmssp[0x5579c2640540]: subreq: 0x5579c26352a0
gensec_update_send: spnego[0x5579c263a860]: subreq: 0x5579c2644170
gensec_update_done: ntlmssp[0x5579c2640540]: NT_STATUS_OK
tevent_req[0x5579c26352a0/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0
(0x0)] state[struct gensec_ntlmssp_update_state (0x5579c2635450)] timer[(nil)]
finish[../../auth/ntlmssp/ntlmssp.c:222]
gensec_update_done: spnego[0x5579c263a860]: NT_STATUS_MORE_PROCESSING_REQUIRED
tevent_req[0x5579c2644170/../../auth/gensec/spnego.c:1630]: state[2] error[0
(0x0)] state[struct gensec_spnego_update_state (0x5579c2644320)] timer[(nil)]
finish[../../auth/gensec/spnego.c:2115]
ntlmssp_check_packet: NTLMSSP signature OK !
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
gensec_update_send: spnego[0x5579c263a860]: subreq: 0x5579c2644170
gensec_update_done: spnego[0x5579c263a860]: NT_STATUS_OK
tevent_req[0x5579c2644170/../../auth/gensec/spnego.c:1630]: state[2] error[0
(0x0)] state[struct gensec_spnego_update_state (0x5579c2644320)] timer[(nil)]
finish[../../auth/gensec/spnego.c:2115]
session setup ok
signed SMB2 message
signed SMB2 message
tconx ok
Case sensitive: True
Server connect ok: //diskstation.local/photo: 0x5579c2641d90
SMBC_getatr: sending qpathinfo
parsed path: fname='smb://Alexandre@diskstation.local/photo'
server='diskstation.local' share='photo' path='' options=''
SMBC_check_options(): server='diskstation.local' share='photo' path=''
options=''
[ 0.399](3025)/(log_kio_smb) unknown:
QUrl("smb://Alexandre@diskstation.local/photo/")
[ 0.399](3025)/(log_kio_smb) unknown: updateCache "/photo"
smbc_stat(smb://Alexandre@diskstation.local/photo)
SMBC_getatr: sending qpathinfo
parsed path: fname='smb://Alexandre@diskstation.local/photo'
server='diskstation.local' share='photo' path='' options=''
SMBC_check_options(): server='diskstation.local' share='photo' path=''
options=''
--
You are receiving this mail because:
You are on the CC list for the bug.
More information about the kfm-devel
mailing list