Advertisement
Guest User

Untitled

a guest
Nov 1st, 2012
110
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.11 KB | None | 0 0
  1. bin/samba-tool gpo create "SMC Students" -U administrator -d 10
  2. INFO: Current debug levels:
  3. all: 10
  4. tdb: 10
  5. printdrivers: 10
  6. lanman: 10
  7. smb: 10
  8. rpc_parse: 10
  9. rpc_srv: 10
  10. rpc_cli: 10
  11. passdb: 10
  12. sam: 10
  13. auth: 10
  14. winbind: 10
  15. vfs: 10
  16. idmap: 10
  17. quota: 10
  18. acls: 10
  19. locking: 10
  20. msdfs: 10
  21. dmapi: 10
  22. registry: 10
  23. lpcfg_load: refreshing parameters from /vol/samba4/build/etc/smb.conf
  24. params.c:pm_process() - Processing configuration file "/vol/samba4/build/etc/smb.conf"
  25. Processing section "[global]"
  26. Processing section "[netlogon]"
  27. Processing section "[sysvol]"
  28. Processing section "[storage]"
  29. Processing section "[profiles]"
  30. pm_process() returned Yes
  31. GENSEC backend 'gssapi_spnego' registered
  32. GENSEC backend 'gssapi_krb5' registered
  33. GENSEC backend 'gssapi_krb5_sasl' registered
  34. GENSEC backend 'sasl-DIGEST-MD5' registered
  35. GENSEC backend 'schannel' registered
  36. GENSEC backend 'spnego' registered
  37. GENSEC backend 'ntlmssp' registered
  38. GENSEC backend 'krb5' registered
  39. GENSEC backend 'fake_gssapi_krb5' registered
  40. added interface bond0 ip=192.168.0.2 bcast=192.168.255.255 netmask=255.255.0.0
  41. added interface bond0 ip=192.168.0.2 bcast=192.168.255.255 netmask=255.255.0.0
  42. added interface bond0 ip=192.168.0.2 bcast=192.168.255.255 netmask=255.255.0.0
  43. added interface bond0 ip=192.168.0.2 bcast=192.168.255.255 netmask=255.255.0.0
  44. finddcs: searching for a DC by DNS domain internal.stmaryscollege.co.uk
  45. finddcs: looking for SRV records for _ldap._tcp.internal.stmaryscollege.co.uk
  46. ads_dns_lookup_srv: 1 records returned in the answer section.
  47. ads_dns_parse_rr_srv: Parsed tainan.internal.stmaryscollege.co.uk [0, 100, 389]
  48. finddcs: DNS SRV response 0 at '192.168.0.2'
  49. finddcs: performing CLDAP query on 192.168.0.2
  50. &response->data.nt5_ex: struct NETLOGON_SAM_LOGON_RESPONSE_EX
  51. command : LOGON_SAM_LOGON_RESPONSE_EX (23)
  52. sbz : 0x0000 (0)
  53. server_type : 0x000003fd (1021)
  54. 1: NBT_SERVER_PDC
  55. 1: NBT_SERVER_GC
  56. 1: NBT_SERVER_LDAP
  57. 1: NBT_SERVER_DS
  58. 1: NBT_SERVER_KDC
  59. 1: NBT_SERVER_TIMESERV
  60. 1: NBT_SERVER_CLOSEST
  61. 1: NBT_SERVER_WRITABLE
  62. 1: NBT_SERVER_GOOD_TIMESERV
  63. 0: NBT_SERVER_NDNC
  64. 0: NBT_SERVER_SELECT_SECRET_DOMAIN_6
  65. 0: NBT_SERVER_FULL_SECRET_DOMAIN_6
  66. 0: NBT_SERVER_ADS_WEB_SERVICE
  67. 0: NBT_SERVER_HAS_DNS_NAME
  68. 0: NBT_SERVER_IS_DEFAULT_NC
  69. 0: NBT_SERVER_FOREST_ROOT
  70. domain_uuid : 3cd804c3-57f1-4bc8-a47f-9c18f7f2d500
  71. forest : 'internal.stmaryscollege.co.uk'
  72. dns_domain : 'internal.stmaryscollege.co.uk'
  73. pdc_dns_name : 'tainan.internal.stmaryscollege.co.uk'
  74. domain_name : 'SMC'
  75. pdc_name : 'TAINAN'
  76. user_name : ''
  77. server_site : 'Default-First-Site-Name'
  78. client_site : 'Default-First-Site-Name'
  79. sockaddr_size : 0x00 (0)
  80. sockaddr: struct nbt_sockaddr
  81. sockaddr_family : 0x00000000 (0)
  82. pdc_ip : (null)
  83. remaining : DATA_BLOB length=0
  84. next_closest_site : NULL
  85. nt_version : 0x00000005 (5)
  86. 1: NETLOGON_NT_VERSION_1
  87. 0: NETLOGON_NT_VERSION_5
  88. 1: NETLOGON_NT_VERSION_5EX
  89. 0: NETLOGON_NT_VERSION_5EX_WITH_IP
  90. 0: NETLOGON_NT_VERSION_WITH_CLOSEST_SITE
  91. 0: NETLOGON_NT_VERSION_AVOID_NT4EMUL
  92. 0: NETLOGON_NT_VERSION_PDC
  93. 0: NETLOGON_NT_VERSION_IP
  94. 0: NETLOGON_NT_VERSION_LOCAL
  95. 0: NETLOGON_NT_VERSION_GC
  96. lmnt_token : 0xffff (65535)
  97. lm20_token : 0xffff (65535)
  98. finddcs: Found matching DC 192.168.0.2 with server_type=0x000003fd
  99. Security token SIDs (1):
  100. SID[ 0]: S-1-5-18
  101. Privileges (0xFFFFFFFFFFFFFFFF):
  102. Privilege[ 0]: SeMachineAccountPrivilege
  103. Privilege[ 1]: SeTakeOwnershipPrivilege
  104. Privilege[ 2]: SeBackupPrivilege
  105. Privilege[ 3]: SeRestorePrivilege
  106. Privilege[ 4]: SeRemoteShutdownPrivilege
  107. Privilege[ 5]: SePrintOperatorPrivilege
  108. Privilege[ 6]: SeAddUsersPrivilege
  109. Privilege[ 7]: SeDiskOperatorPrivilege
  110. Privilege[ 8]: SeSecurityPrivilege
  111. Privilege[ 9]: SeSystemtimePrivilege
  112. Privilege[ 10]: SeShutdownPrivilege
  113. Privilege[ 11]: SeDebugPrivilege
  114. Privilege[ 12]: SeSystemEnvironmentPrivilege
  115. Privilege[ 13]: SeSystemProfilePrivilege
  116. Privilege[ 14]: SeProfileSingleProcessPrivilege
  117. Privilege[ 15]: SeIncreaseBasePriorityPrivilege
  118. Privilege[ 16]: SeLoadDriverPrivilege
  119. Privilege[ 17]: SeCreatePagefilePrivilege
  120. Privilege[ 18]: SeIncreaseQuotaPrivilege
  121. Privilege[ 19]: SeChangeNotifyPrivilege
  122. Privilege[ 20]: SeUndockPrivilege
  123. Privilege[ 21]: SeManageVolumePrivilege
  124. Privilege[ 22]: SeImpersonatePrivilege
  125. Privilege[ 23]: SeCreateGlobalPrivilege
  126. Privilege[ 24]: SeEnableDelegationPrivilege
  127. Rights (0x 0):
  128. lpcfg_servicenumber: couldn't find ldb
  129. added interface bond0 ip=192.168.0.2 bcast=192.168.255.255 netmask=255.255.0.0
  130. added interface bond0 ip=192.168.0.2 bcast=192.168.255.255 netmask=255.255.0.0
  131. Starting GENSEC mechanism spnego
  132. Starting GENSEC submechanism gssapi_krb5
  133. Password for [SMC\administrator]:
  134. Received smb_krb5 packet of length 319
  135. Received smb_krb5 packet of length 1365
  136. gensec_gssapi: credentials were delegated
  137. GSSAPI Connection will have no cryptographic protection
  138. added interface bond0 ip=192.168.0.2 bcast=192.168.255.255 netmask=255.255.0.0
  139. added interface bond0 ip=192.168.0.2 bcast=192.168.255.255 netmask=255.255.0.0
  140. Socket options:
  141. SO_KEEPALIVE = 0
  142. SO_REUSEADDR = 0
  143. SO_BROADCAST = 0
  144. TCP_NODELAY = 1
  145. TCP_KEEPCNT = 9
  146. TCP_KEEPIDLE = 7200
  147. TCP_KEEPINTVL = 75
  148. IPTOS_LOWDELAY = 0
  149. IPTOS_THROUGHPUT = 0
  150. SO_SNDBUF = 171800
  151. SO_RCVBUF = 87380
  152. SO_SNDLOWAT = 1
  153. SO_RCVLOWAT = 1
  154. SO_SNDTIMEO = 0
  155. SO_RCVTIMEO = 0
  156. TCP_QUICKACK = 1
  157. TCP_DEFER_ACCEPT = 0
  158. Starting GENSEC mechanism spnego
  159. Starting GENSEC submechanism gssapi_krb5
  160. Received smb_krb5 packet of length 319
  161. Received smb_krb5 packet of length 1365
  162. gensec_gssapi: credentials were delegated
  163. GSSAPI Connection will have no cryptographic protection
  164. num_setup=0, max_setup=0, param_total=8, this_param=8, max_param=0, data_total=392, this_data=392, max_data=0, param_offset=74, param_pad=1, param_disp=0, data_offset=84, data_pad=2, data_disp=0
  165. ERROR(runtime): uncaught exception - (-1073741734, 'NT_STATUS_INVALID_OWNER')
  166. File "/vol/samba4/build/lib64/python2.7/site-packages/samba/netcmd/__init__.py", line 175, in _run
  167. return self.run(*args, **kwargs)
  168. File "/vol/samba4/build/lib64/python2.7/site-packages/samba/netcmd/gpo.py", line 987, in run
  169. conn.set_acl(sharepath, fs_sd, sio)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement