Advertisement
Guest User

Untitled

a guest
Apr 13th, 2012
112
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 42.00 KB | None | 0 0
  1. Running timed event "check_domain_online_handler" 0x7f3bca824420
  2. check_domain_online_handler: called for domain MPATHWAYS2 (online = False)
  3. Overriding messaging pointer for type 1030 - private_data=(nil)
  4. Overriding messaging pointer for type 1031 - private_data=(nil)
  5. Deregistering messaging pointer for type 1028 - private_data=(nil)
  6. Deregistering messaging pointer for type 1027 - private_data=(nil)
  7. Deregistering messaging pointer for type 1280 - private_data=(nil)
  8. Deregistering messaging pointer for type 1 - private_data=(nil)
  9. connection_ok: Connection to itcs-dc02.adsroot.itcs.umich.edu for domain UMROOT is not connected
  10. socket was closed, no need to send close request.
  11. Cache entry with key = SAFJOIN/DOMAIN/UMROOT couldn't be found
  12. Returning valid cache entry: key = SAF/DOMAIN/UMROOT, value = itcs-dc02.adsroot.itcs.umich.edu, timeout = Thu Apr 12 14:57:29 2012
  13. saf_fetch: Returning "itcs-dc02.adsroot.itcs.umich.edu" for "UMROOT" domain
  14. Cache entry with key = NEG_CONN_CACHE/UMROOT,itcs-dc02.adsroot.itcs.umich.edu couldn't be found
  15. check_negative_conn_cache returning result 0 for domain UMROOT server itcs-dc02.adsroot.itcs.umich.edu
  16. cm_open_connection: saf_servername is 'itcs-dc02.adsroot.itcs.umich.edu' for domain UMROOT
  17. cm_open_connection: dcname is 'itcs-dc02.adsroot.itcs.umich.edu' for domain UMROOT
  18. Cache entry with key = NEG_CONN_CACHE/UMROOT,itcs-dc02.adsroot.itcs.umich.edu couldn't be found
  19. check_negative_conn_cache returning result 0 for domain UMROOT server itcs-dc02.adsroot.itcs.umich.edu
  20. Returning valid cache entry: key = AD_SITENAME/DOMAIN/ADSROOT.ITCS.UMICH.EDU, value = UM-AnnArbor-Campus, timeout = Wed Feb 6 10:06:39 2036
  21. sitename_fetch: Returning sitename for ADSROOT.ITCS.UMICH.EDU: "UM-AnnArbor-Campus"
  22. internal_resolve_name: looking up itcs-dc02.adsroot.itcs.umich.edu#20 (sitename UM-AnnArbor-Campus)
  23. Returning valid cache entry: key = NBT/ITCS-DC02.ADSROOT.ITCS.UMICH.EDU#20, value = 141.213.143.141:0, timeout = Thu Apr 12 14:45:55 2012
  24. name itcs-dc02.adsroot.itcs.umich.edu#20 found.
  25. Connecting to 141.213.143.141 at port 445
  26. cm_prepare_connection: connecting to DC itcs-dc02.adsroot.itcs.umich.edu for domain UMROOT
  27. connecting to itcs-dc02.adsroot.itcs.umich.edu from TRI-BIO-PROFILE with kerberos principal [TRI-BIO-PROFILE$@ADSROOT.ITCS.UMICH.EDU] and realm [adsroot.itcs.umich.edu]
  28. Doing spnego session setup (blob length=124)
  29. got OID=1.2.840.48018.1.2.2
  30. got OID=1.2.840.113554.1.2.2
  31. got OID=1.2.840.113554.1.2.2.3
  32. got OID=1.3.6.1.4.1.311.2.2.10
  33. got principal=not_defined_in_RFC4178@please_ignore
  34. kerberos_kinit_password: as TRI-BIO-PROFILE$@ADSROOT.ITCS.UMICH.EDU using [MEMORY:cliconnect] as ccache and config [(null)]
  35. cli_session_setup_spnego: got a bad server principal, trying to guess ...
  36. cli_session_setup_spnego: guessed server principal=cifs/itcs-dc02.adsroot.itcs.umich.edu@ADSROOT.ITCS.UMICH.EDU
  37. Doing kerberos session setup
  38. ads_cleanup_expired_creds: Ticket in ccache[MEMORY:cliconnect] expiration Fri, 13 Apr 2012 00:42:59 EDT
  39. ads_krb5_mk_req: Ticket (cifs/itcs-dc02.adsroot.itcs.umich.edu@ADSROOT.ITCS.UMICH.EDU) in ccache (MEMORY:cliconnect) is valid until: (Fri, 13 Apr 2012 00:42:59 EDT - 1334292179)
  40. ads_krb5_mk_req: server marked as OK to delegate to, building forwardable TGT
  41. Got KRB5 session key of length 16
  42. cli_session_setup_blob: Remaining (0) sending (3093) current (3093)
  43. smb_signing_sign_pdu: sent SMB signature of
  44. [0000] 42 53 52 53 50 59 4C 20 BSRSPYL
  45. write_socket(22,3178)
  46. write_socket(22,3178) wrote 3178
  47. got smb length of 253
  48. size=253
  49. smb_com=0x73
  50. smb_rcls=0
  51. smb_reh=0
  52. smb_err=0
  53. smb_flg=136
  54. smb_flg2=51205
  55. smb_tid=0
  56. smb_pid=21027
  57. smb_uid=2050
  58. smb_mid=2
  59. smt_wct=4
  60. smb_vwv[ 0]= 255 (0xFF)
  61. smb_vwv[ 1]= 253 (0xFD)
  62. smb_vwv[ 2]= 0 (0x0)
  63. smb_vwv[ 3]= 22 (0x16)
  64. smb_bcc=210
  65. [0000] A1 14 30 12 A0 03 0A 01 00 A1 0B 06 09 2A 86 48 ..0..... .....*.H
  66. [0010] 82 F7 12 01 02 02 00 57 00 69 00 6E 00 64 00 6F .......W .i.n.d.o
  67. [0020] 00 77 00 73 00 20 00 53 00 65 00 72 00 76 00 65 .w.s. .S .e.r.v.e
  68. [0030] 00 72 00 20 00 28 00 52 00 29 00 20 00 32 00 30 .r. .(.R .). .2.0
  69. [0040] 00 30 00 38 00 20 00 45 00 6E 00 74 00 65 00 72 .0.8. .E .n.t.e.r
  70. [0050] 00 70 00 72 00 69 00 73 00 65 00 20 00 36 00 30 .p.r.i.s .e. .6.0
  71. [0060] 00 30 00 32 00 20 00 53 00 65 00 72 00 76 00 69 .0.2. .S .e.r.v.i
  72. [0070] 00 63 00 65 00 20 00 50 00 61 00 63 00 6B 00 20 .c.e. .P .a.c.k.
  73. [0080] 00 32 00 00 00 57 00 69 00 6E 00 64 00 6F 00 77 .2...W.i .n.d.o.w
  74. [0090] 00 73 00 20 00 53 00 65 00 72 00 76 00 65 00 72 .s. .S.e .r.v.e.r
  75. [00A0] 00 20 00 28 00 52 00 29 00 20 00 32 00 30 00 30 . .(.R.) . .2.0.0
  76. [00B0] 00 38 00 20 00 45 00 6E 00 74 00 65 00 72 00 70 .8. .E.n .t.e.r.p
  77. [00C0] 00 72 00 69 00 73 00 65 00 20 00 36 00 2E 00 30 .r.i.s.e . .6...0
  78. [00D0] 00 00 ..
  79. size=253
  80. smb_com=0x73
  81. smb_rcls=0
  82. smb_reh=0
  83. smb_err=0
  84. smb_flg=136
  85. smb_flg2=51205
  86. smb_tid=0
  87. smb_pid=21027
  88. smb_uid=2050
  89. smb_mid=2
  90. smt_wct=4
  91. smb_vwv[ 0]= 255 (0xFF)
  92. smb_vwv[ 1]= 253 (0xFD)
  93. smb_vwv[ 2]= 0 (0x0)
  94. smb_vwv[ 3]= 22 (0x16)
  95. smb_bcc=210
  96. [0000] A1 14 30 12 A0 03 0A 01 00 A1 0B 06 09 2A 86 48 ..0..... .....*.H
  97. [0010] 82 F7 12 01 02 02 00 57 00 69 00 6E 00 64 00 6F .......W .i.n.d.o
  98. [0020] 00 77 00 73 00 20 00 53 00 65 00 72 00 76 00 65 .w.s. .S .e.r.v.e
  99. [0030] 00 72 00 20 00 28 00 52 00 29 00 20 00 32 00 30 .r. .(.R .). .2.0
  100. [0040] 00 30 00 38 00 20 00 45 00 6E 00 74 00 65 00 72 .0.8. .E .n.t.e.r
  101. [0050] 00 70 00 72 00 69 00 73 00 65 00 20 00 36 00 30 .p.r.i.s .e. .6.0
  102. [0060] 00 30 00 32 00 20 00 53 00 65 00 72 00 76 00 69 .0.2. .S .e.r.v.i
  103. [0070] 00 63 00 65 00 20 00 50 00 61 00 63 00 6B 00 20 .c.e. .P .a.c.k.
  104. [0080] 00 32 00 00 00 57 00 69 00 6E 00 64 00 6F 00 77 .2...W.i .n.d.o.w
  105. [0090] 00 73 00 20 00 53 00 65 00 72 00 76 00 65 00 72 .s. .S.e .r.v.e.r
  106. [00A0] 00 20 00 28 00 52 00 29 00 20 00 32 00 30 00 30 . .(.R.) . .2.0.0
  107. [00B0] 00 38 00 20 00 45 00 6E 00 74 00 65 00 72 00 70 .8. .E.n .t.e.r.p
  108. [00C0] 00 72 00 69 00 73 00 65 00 20 00 36 00 2E 00 30 .r.i.s.e . .6...0
  109. [00D0] 00 00 ..
  110. smb_signing_activate: user_session_key
  111. [0000] DB 07 D5 4A CD 0C 24 B9 A5 34 58 8A 18 DC 71 76 ...J..$. .4X...qv
  112. smb_signing_activate: NULL response_data
  113. smb_signing_md5: sequence number 1
  114. smb_signing_check_pdu: seq 1: got good SMB signature of
  115. [0000] 87 1A 41 F8 E3 D5 02 CE ..A.....
  116. cli_init_creds: user TRI-BIO-PROFILE$ domain UMROOT
  117. saf_store: domain = [UMROOT], server = [itcs-dc02.adsroot.itcs.umich.edu], expire = [1334257079]
  118. Adding cache entry with key = SAF/DOMAIN/UMROOT and timeout = Thu Apr 12 14:57:59 2012
  119. (900 seconds ahead)
  120. saf_store: domain = [adsroot.itcs.umich.edu], server = [itcs-dc02.adsroot.itcs.umich.edu], expire = [1334257079]
  121. Adding cache entry with key = SAF/DOMAIN/ADSROOT.ITCS.UMICH.EDU and timeout = Thu Apr 12 14:57:59 2012
  122. (900 seconds ahead)
  123. smb_signing_md5: sequence number 2
  124. smb_signing_sign_pdu: sent SMB signature of
  125. [0000] 26 99 A0 59 2C 83 EA 97 &..Y,...
  126. smb_signing_md5: sequence number 3
  127. smb_signing_check_pdu: seq 3: got good SMB signature of
  128. [0000] 7F 34 71 9A B9 68 DE EF .4q..h..
  129. set_domain_online: called for domain UMROOT
  130. Deregistering messaging pointer for type 1030 - private_data=(nil)
  131. Deregistering messaging pointer for type 1031 - private_data=(nil)
  132. smb_signing_md5: sequence number 4
  133. smb_signing_sign_pdu: sent SMB signature of
  134. [0000] CA AB 88 C1 A7 78 E1 A6 .....x..
  135. smb_signing_md5: sequence number 5
  136. smb_signing_check_pdu: seq 5: got good SMB signature of
  137. [0000] 41 7C DC 90 4C 62 85 3C A|..Lb.<
  138. Bind RPC Pipe: host itcs-dc02.adsroot.itcs.umich.edu auth_type 0, auth_level 1
  139. 000000 smb_io_rpc_hdr hdr
  140. 0000 major : 05
  141. 0001 minor : 00
  142. 0002 pkt_type : 0b
  143. 0003 flags : 03
  144. 0004 pack_type0: 10
  145. 0005 pack_type1: 00
  146. 0006 pack_type2: 00
  147. 0007 pack_type3: 00
  148. 0008 frag_len : 0048
  149. 000a auth_len : 0000
  150. 000c call_id : 0000000d
  151. 000010 smb_io_rpc_hdr_rb
  152. 000010 smb_io_rpc_hdr_bba
  153. 0010 max_tsize: 10b8
  154. 0012 max_rsize: 10b8
  155. 0014 assoc_gid: 00000000
  156. 0018 num_contexts: 01
  157. 001c context_id : 0000
  158. 001e num_transfer_syntaxes: 01
  159. 00001f smb_io_rpc_iface
  160. 000020 smb_io_uuid uuid
  161. 0020 data : 12345678
  162. 0024 data : 1234
  163. 0026 data : abcd
  164. 0028 data : ef 00
  165. 002a data : 01 23 45 67 cf fb
  166. 0030 version: 00000001
  167. 000034 smb_io_rpc_iface
  168. 000034 smb_io_uuid uuid
  169. 0034 data : 8a885d04
  170. 0038 data : 1ceb
  171. 003a data : 11c9
  172. 003c data : 9f e8
  173. 003e data : 08 00 2b 10 48 60
  174. 0044 version: 00000002
  175. rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu
  176. num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0
  177. smb_signing_md5: sequence number 6
  178. smb_signing_sign_pdu: sent SMB signature of
  179. [0000] 66 9D E0 89 40 C6 50 37 f...@.P7
  180. smb_signing_md5: sequence number 7
  181. smb_signing_check_pdu: seq 7: got good SMB signature of
  182. [0000] CC 8F 81 29 40 B5 6A BF ...)@.j.
  183. 000000 smb_io_rpc_hdr rpc_hdr
  184. 0000 major : 05
  185. 0001 minor : 00
  186. 0002 pkt_type : 0c
  187. 0003 flags : 03
  188. 0004 pack_type0: 10
  189. 0005 pack_type1: 00
  190. 0006 pack_type2: 00
  191. 0007 pack_type3: 00
  192. 0008 frag_len : 0044
  193. 000a auth_len : 0000
  194. 000c call_id : 0000000d
  195. rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK
  196. rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu returned 68 bytes.
  197. 000000 smb_io_rpc_hdr hdr
  198. 0000 major : 05
  199. 0001 minor : 00
  200. 0002 pkt_type : 0c
  201. 0003 flags : 03
  202. 0004 pack_type0: 10
  203. 0005 pack_type1: 00
  204. 0006 pack_type2: 00
  205. 0007 pack_type3: 00
  206. 0008 frag_len : 0044
  207. 000a auth_len : 0000
  208. 000c call_id : 0000000d
  209. 000010 smb_io_rpc_hdr_ba
  210. 000010 smb_io_rpc_hdr_bba
  211. 0010 max_tsize: 10b8
  212. 0012 max_rsize: 10b8
  213. 0014 assoc_gid: 004a9df8
  214. 000018 smb_io_rpc_addr_str
  215. 0018 len: 000c
  216. 001a str: \pipe\lsass.
  217. 000026 smb_io_rpc_results
  218. 0028 num_results: 01
  219. 002c result : 0000
  220. 002e reason : 0000
  221. 000030 smb_io_rpc_iface
  222. 000030 smb_io_uuid uuid
  223. 0030 data : 8a885d04
  224. 0034 data : 1ceb
  225. 0036 data : 11c9
  226. 0038 data : 9f e8
  227. 003a data : 08 00 2b 10 48 60
  228. 0040 version: 00000002
  229. check_bind_response: accepted!
  230. cli_rpc_pipe_open_noauth: opened pipe \netlogon to machine itcs-dc02.adsroot.itcs.umich.edu and bound anonymously.
  231. netr_ServerReqChallenge: struct netr_ServerReqChallenge
  232. in: struct netr_ServerReqChallenge
  233. server_name : *
  234. server_name : '\\ITCS-DC02.ADSROOT.ITCS.UMICH.EDU'
  235. computer_name : *
  236. computer_name : 'TRI-BIO-PROFILE'
  237. credentials : *
  238. credentials: struct netr_Credential
  239. data : a461c9801bc9103c
  240. 000000 smb_io_rpc_hdr hdr
  241. 0000 major : 05
  242. 0001 minor : 00
  243. 0002 pkt_type : 00
  244. 0003 flags : 03
  245. 0004 pack_type0: 10
  246. 0005 pack_type1: 00
  247. 0006 pack_type2: 00
  248. 0007 pack_type3: 00
  249. 0008 frag_len : 00a4
  250. 000a auth_len : 0000
  251. 000c call_id : 0000000e
  252. 000010 smb_io_rpc_hdr_req hdr_req
  253. 0010 alloc_hint: 0000008c
  254. 0014 context_id: 0000
  255. 0016 opnum : 0004
  256. rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu
  257. num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=164, this_data=164, max_data=4280, param_offset=82, param_disp=0, data_disp=0
  258. smb_signing_md5: sequence number 8
  259. smb_signing_sign_pdu: sent SMB signature of
  260. [0000] 6B 79 11 79 C1 48 B0 A7 ky.y.H..
  261. smb_signing_md5: sequence number 9
  262. smb_signing_check_pdu: seq 9: got good SMB signature of
  263. [0000] F1 57 72 3C E9 E9 53 82 .Wr<..S.
  264. 000000 smb_io_rpc_hdr rpc_hdr
  265. 0000 major : 05
  266. 0001 minor : 00
  267. 0002 pkt_type : 02
  268. 0003 flags : 03
  269. 0004 pack_type0: 10
  270. 0005 pack_type1: 00
  271. 0006 pack_type2: 00
  272. 0007 pack_type3: 00
  273. 0008 frag_len : 0024
  274. 000a auth_len : 0000
  275. 000c call_id : 0000000e
  276. 000010 smb_io_rpc_hdr_resp rpc_hdr_resp
  277. 0010 alloc_hint: 0000000c
  278. 0014 context_id: 0000
  279. 0016 cancel_ct : 00
  280. 0017 reserved : 00
  281. cli_pipe_validate_current_pdu: got pdu len 36, data_len 12, ss_len 0
  282. rpc_api_pipe: got frag len of 36 at offset 0: NT_STATUS_OK
  283. rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu returned 24 bytes.
  284. netr_ServerReqChallenge: struct netr_ServerReqChallenge
  285. out: struct netr_ServerReqChallenge
  286. return_credentials : *
  287. return_credentials: struct netr_Credential
  288. data : 18a59ef66ab183a5
  289. result : NT_STATUS_OK
  290. netr_ServerAuthenticate2: struct netr_ServerAuthenticate2
  291. in: struct netr_ServerAuthenticate2
  292. server_name : *
  293. server_name : '\\ITCS-DC02.ADSROOT.ITCS.UMICH.EDU'
  294. account_name : *
  295. account_name : 'TRI-BIO-PROFILE$'
  296. secure_channel_type : SEC_CHAN_WKSTA (2)
  297. computer_name : *
  298. computer_name : 'TRI-BIO-PROFILE'
  299. credentials : *
  300. credentials: struct netr_Credential
  301. data : 2a54330a3b378fcb
  302. negotiate_flags : *
  303. negotiate_flags : 0x600fffff (1611661311)
  304. 1: NETLOGON_NEG_ACCOUNT_LOCKOUT
  305. 1: NETLOGON_NEG_PERSISTENT_SAMREPL
  306. 1: NETLOGON_NEG_ARCFOUR
  307. 1: NETLOGON_NEG_PROMOTION_COUNT
  308. 1: NETLOGON_NEG_CHANGELOG_BDC
  309. 1: NETLOGON_NEG_FULL_SYNC_REPL
  310. 1: NETLOGON_NEG_MULTIPLE_SIDS
  311. 1: NETLOGON_NEG_REDO
  312. 1: NETLOGON_NEG_PASSWORD_CHANGE_REFUSAL
  313. 1: NETLOGON_NEG_SEND_PASSWORD_INFO_PDC
  314. 1: NETLOGON_NEG_GENERIC_PASSTHROUGH
  315. 1: NETLOGON_NEG_CONCURRENT_RPC
  316. 1: NETLOGON_NEG_AVOID_ACCOUNT_DB_REPL
  317. 1: NETLOGON_NEG_AVOID_SECURITYAUTH_DB_REPL
  318. 1: NETLOGON_NEG_STRONG_KEYS
  319. 1: NETLOGON_NEG_TRANSITIVE_TRUSTS
  320. 1: NETLOGON_NEG_DNS_DOMAIN_TRUSTS
  321. 1: NETLOGON_NEG_PASSWORD_SET2
  322. 1: NETLOGON_NEG_GETDOMAININFO
  323. 1: NETLOGON_NEG_CROSS_FOREST_TRUSTS
  324. 0: NETLOGON_NEG_NEUTRALIZE_NT4_EMULATION
  325. 0: NETLOGON_NEG_RODC_PASSTHROUGH
  326. 0: NETLOGON_NEG_SUPPORTS_AES_SHA2
  327. 0: NETLOGON_NEG_SUPPORTS_AES
  328. 1: NETLOGON_NEG_AUTHENTICATED_RPC_LSASS
  329. 1: NETLOGON_NEG_AUTHENTICATED_RPC
  330. 000000 smb_io_rpc_hdr hdr
  331. 0000 major : 05
  332. 0001 minor : 00
  333. 0002 pkt_type : 00
  334. 0003 flags : 03
  335. 0004 pack_type0: 10
  336. 0005 pack_type1: 00
  337. 0006 pack_type2: 00
  338. 0007 pack_type3: 00
  339. 0008 frag_len : 00d8
  340. 000a auth_len : 0000
  341. 000c call_id : 0000000f
  342. 000010 smb_io_rpc_hdr_req hdr_req
  343. 0010 alloc_hint: 000000c0
  344. 0014 context_id: 0000
  345. 0016 opnum : 000f
  346. rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu
  347. num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=216, this_data=216, max_data=4280, param_offset=82, param_disp=0, data_disp=0
  348. smb_signing_md5: sequence number 10
  349. smb_signing_sign_pdu: sent SMB signature of
  350. [0000] 6F 6E 60 7A 11 42 6B 9D on`z.Bk.
  351. smb_signing_md5: sequence number 11
  352. smb_signing_check_pdu: seq 11: got good SMB signature of
  353. [0000] 8E 48 DB 91 6D E0 0B D4 .H..m...
  354. 000000 smb_io_rpc_hdr rpc_hdr
  355. 0000 major : 05
  356. 0001 minor : 00
  357. 0002 pkt_type : 02
  358. 0003 flags : 03
  359. 0004 pack_type0: 10
  360. 0005 pack_type1: 00
  361. 0006 pack_type2: 00
  362. 0007 pack_type3: 00
  363. 0008 frag_len : 0028
  364. 000a auth_len : 0000
  365. 000c call_id : 0000000f
  366. 000010 smb_io_rpc_hdr_resp rpc_hdr_resp
  367. 0010 alloc_hint: 00000010
  368. 0014 context_id: 0000
  369. 0016 cancel_ct : 00
  370. 0017 reserved : 00
  371. cli_pipe_validate_current_pdu: got pdu len 40, data_len 16, ss_len 0
  372. rpc_api_pipe: got frag len of 40 at offset 0: NT_STATUS_OK
  373. rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu returned 32 bytes.
  374. netr_ServerAuthenticate2: struct netr_ServerAuthenticate2
  375. out: struct netr_ServerAuthenticate2
  376. return_credentials : *
  377. return_credentials: struct netr_Credential
  378. data : c9a70d0f55026ed7
  379. negotiate_flags : *
  380. negotiate_flags : 0x600fffff (1611661311)
  381. 1: NETLOGON_NEG_ACCOUNT_LOCKOUT
  382. 1: NETLOGON_NEG_PERSISTENT_SAMREPL
  383. 1: NETLOGON_NEG_ARCFOUR
  384. 1: NETLOGON_NEG_PROMOTION_COUNT
  385. 1: NETLOGON_NEG_CHANGELOG_BDC
  386. 1: NETLOGON_NEG_FULL_SYNC_REPL
  387. 1: NETLOGON_NEG_MULTIPLE_SIDS
  388. 1: NETLOGON_NEG_REDO
  389. 1: NETLOGON_NEG_PASSWORD_CHANGE_REFUSAL
  390. 1: NETLOGON_NEG_SEND_PASSWORD_INFO_PDC
  391. 1: NETLOGON_NEG_GENERIC_PASSTHROUGH
  392. 1: NETLOGON_NEG_CONCURRENT_RPC
  393. 1: NETLOGON_NEG_AVOID_ACCOUNT_DB_REPL
  394. 1: NETLOGON_NEG_AVOID_SECURITYAUTH_DB_REPL
  395. 1: NETLOGON_NEG_STRONG_KEYS
  396. 1: NETLOGON_NEG_TRANSITIVE_TRUSTS
  397. 1: NETLOGON_NEG_DNS_DOMAIN_TRUSTS
  398. 1: NETLOGON_NEG_PASSWORD_SET2
  399. 1: NETLOGON_NEG_GETDOMAININFO
  400. 1: NETLOGON_NEG_CROSS_FOREST_TRUSTS
  401. 0: NETLOGON_NEG_NEUTRALIZE_NT4_EMULATION
  402. 0: NETLOGON_NEG_RODC_PASSTHROUGH
  403. 0: NETLOGON_NEG_SUPPORTS_AES_SHA2
  404. 0: NETLOGON_NEG_SUPPORTS_AES
  405. 1: NETLOGON_NEG_AUTHENTICATED_RPC_LSASS
  406. 1: NETLOGON_NEG_AUTHENTICATED_RPC
  407. result : NT_STATUS_OK
  408. rpccli_netlogon_setup_creds: server itcs-dc02.adsroot.itcs.umich.edu credential chain established.
  409. smb_signing_md5: sequence number 12
  410. smb_signing_sign_pdu: sent SMB signature of
  411. [0000] 95 FB 0E 31 BE EE 4E 0A ...1..N.
  412. smb_signing_md5: sequence number 13
  413. smb_signing_check_pdu: seq 13: got good SMB signature of
  414. [0000] 64 9C 35 35 1E 27 48 78 d.55.'Hx
  415. Bind RPC Pipe: host itcs-dc02.adsroot.itcs.umich.edu auth_type 2, auth_level 6
  416. &r: struct NL_AUTH_MESSAGE
  417. MessageType : NL_NEGOTIATE_REQUEST (0x0)
  418. Flags : 0x00000003 (3)
  419. 1: NL_FLAG_OEM_NETBIOS_DOMAIN_NAME
  420. 1: NL_FLAG_OEM_NETBIOS_COMPUTER_NAME
  421. 0: NL_FLAG_UTF8_DNS_DOMAIN_NAME
  422. 0: NL_FLAG_UTF8_DNS_HOST_NAME
  423. 0: NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME
  424. oem_netbios_domain : 'UMROOT'
  425. oem_netbios_computer : 'TRI-BIO-PROFILE'
  426. 000000 smb_io_rpc_hdr hdr
  427. 0000 major : 05
  428. 0001 minor : 00
  429. 0002 pkt_type : 0b
  430. 0003 flags : 03
  431. 0004 pack_type0: 10
  432. 0005 pack_type1: 00
  433. 0006 pack_type2: 00
  434. 0007 pack_type3: 00
  435. 0008 frag_len : 006f
  436. 000a auth_len : 001f
  437. 000c call_id : 00000010
  438. 000010 smb_io_rpc_hdr_rb
  439. 000010 smb_io_rpc_hdr_bba
  440. 0010 max_tsize: 10b8
  441. 0012 max_rsize: 10b8
  442. 0014 assoc_gid: 00000000
  443. 0018 num_contexts: 01
  444. 001c context_id : 0000
  445. 001e num_transfer_syntaxes: 01
  446. 00001f smb_io_rpc_iface
  447. 000020 smb_io_uuid uuid
  448. 0020 data : 12345678
  449. 0024 data : 1234
  450. 0026 data : abcd
  451. 0028 data : ef 00
  452. 002a data : 01 23 45 67 cf fb
  453. 0030 version: 00000001
  454. 000034 smb_io_rpc_iface
  455. 000034 smb_io_uuid uuid
  456. 0034 data : 8a885d04
  457. 0038 data : 1ceb
  458. 003a data : 11c9
  459. 003c data : 9f e8
  460. 003e data : 08 00 2b 10 48 60
  461. 0044 version: 00000002
  462. 000048 smb_io_rpc_hdr_auth hdr_auth
  463. 0048 auth_type : 44
  464. 0049 auth_level : 06
  465. 004a auth_pad_len : 00
  466. 004b auth_reserved: 00
  467. 004c auth_context_id: 00000001
  468. rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu
  469. num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=111, this_data=111, max_data=4280, param_offset=82, param_disp=0, data_disp=0
  470. smb_signing_md5: sequence number 14
  471. smb_signing_sign_pdu: sent SMB signature of
  472. [0000] C5 99 56 0F 07 52 F3 D6 ..V..R..
  473. smb_signing_md5: sequence number 15
  474. smb_signing_check_pdu: seq 15: got good SMB signature of
  475. [0000] F5 C9 B9 67 0E 6D BC 44 ...g.m.D
  476. 000000 smb_io_rpc_hdr rpc_hdr
  477. 0000 major : 05
  478. 0001 minor : 00
  479. 0002 pkt_type : 0c
  480. 0003 flags : 03
  481. 0004 pack_type0: 10
  482. 0005 pack_type1: 00
  483. 0006 pack_type2: 00
  484. 0007 pack_type3: 00
  485. 0008 frag_len : 0058
  486. 000a auth_len : 000c
  487. 000c call_id : 00000010
  488. rpc_api_pipe: got frag len of 88 at offset 0: NT_STATUS_OK
  489. rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu returned 88 bytes.
  490. 000000 smb_io_rpc_hdr hdr
  491. 0000 major : 05
  492. 0001 minor : 00
  493. 0002 pkt_type : 0c
  494. 0003 flags : 03
  495. 0004 pack_type0: 10
  496. 0005 pack_type1: 00
  497. 0006 pack_type2: 00
  498. 0007 pack_type3: 00
  499. 0008 frag_len : 0058
  500. 000a auth_len : 000c
  501. 000c call_id : 00000010
  502. 000010 smb_io_rpc_hdr_ba
  503. 000010 smb_io_rpc_hdr_bba
  504. 0010 max_tsize: 10b8
  505. 0012 max_rsize: 10b8
  506. 0014 assoc_gid: 004a9df9
  507. 000018 smb_io_rpc_addr_str
  508. 0018 len: 000c
  509. 001a str: \pipe\lsass.
  510. 000026 smb_io_rpc_results
  511. 0028 num_results: 01
  512. 002c result : 0000
  513. 002e reason : 0000
  514. 000030 smb_io_rpc_iface
  515. 000030 smb_io_uuid uuid
  516. 0030 data : 8a885d04
  517. 0034 data : 1ceb
  518. 0036 data : 11c9
  519. 0038 data : 9f e8
  520. 003a data : 08 00 2b 10 48 60
  521. 0040 version: 00000002
  522. check_bind_response: accepted!
  523. cli_rpc_pipe_open_schannel_with_key: opened pipe \netlogon to machine itcs-dc02.adsroot.itcs.umich.edu for domain UMROOT and bound using schannel.
  524. smb_signing_md5: sequence number 16
  525. smb_signing_sign_pdu: sent SMB signature of
  526. [0000] A9 E6 D4 61 2B 9E D5 AE ...a+...
  527. smb_signing_md5: sequence number 17
  528. smb_signing_check_pdu: seq 17: got good SMB signature of
  529. [0000] E2 4A 8A 8D 98 B2 70 24 .J....p$
  530. rpc_pipe_destructor: closed \netlogon
  531. netr_DsRGetDCName: struct netr_DsRGetDCName
  532. in: struct netr_DsRGetDCName
  533. server_unc : *
  534. server_unc : 'itcs-dc02.adsroot.itcs.umich.edu'
  535. domain_name : *
  536. domain_name : 'MPATHWAYS2'
  537. domain_guid : NULL
  538. site_guid : NULL
  539. flags : 0x40000000 (1073741824)
  540. 0: DS_FORCE_REDISCOVERY
  541. 0: DS_DIRECTORY_SERVICE_REQUIRED
  542. 0: DS_DIRECTORY_SERVICE_PREFERRED
  543. 0: DS_GC_SERVER_REQUIRED
  544. 0: DS_PDC_REQUIRED
  545. 0: DS_BACKGROUND_ONLY
  546. 0: DS_IP_REQUIRED
  547. 0: DS_KDC_REQUIRED
  548. 0: DS_TIMESERV_REQUIRED
  549. 0: DS_WRITABLE_REQUIRED
  550. 0: DS_GOOD_TIMESERV_PREFERRED
  551. 0: DS_AVOID_SELF
  552. 0: DS_ONLY_LDAP_NEEDED
  553. 0: DS_IS_FLAT_NAME
  554. 0: DS_IS_DNS_NAME
  555. 0: DS_TRY_NEXTCLOSEST_SITE
  556. 0: DS_DIRECTORY_SERVICE_6_REQUIRED
  557. 0: DS_WEB_SERVICE_REQUIRED
  558. 1: DS_RETURN_DNS_NAME
  559. 0: DS_RETURN_FLAT_NAME
  560. 000000 smb_io_rpc_hdr hdr
  561. 0000 major : 05
  562. 0001 minor : 00
  563. 0002 pkt_type : 00
  564. 0003 flags : 03
  565. 0004 pack_type0: 10
  566. 0005 pack_type1: 00
  567. 0006 pack_type2: 00
  568. 0007 pack_type3: 00
  569. 0008 frag_len : 00c8
  570. 000a auth_len : 0020
  571. 000c call_id : 00000011
  572. 000010 smb_io_rpc_hdr_req hdr_req
  573. 0010 alloc_hint: 00000088
  574. 0014 context_id: 0000
  575. 0016 opnum : 0014
  576. 0000a0 smb_io_rpc_hdr_auth hdr_auth
  577. 00a0 auth_type : 44
  578. 00a1 auth_level : 06
  579. 00a2 auth_pad_len : 00
  580. 00a3 auth_reserved: 00
  581. 00a4 auth_context_id: 00000001
  582. add_schannel_auth_footer: SCHANNEL seq_num=0
  583. &r: struct NL_AUTH_SIGNATURE
  584. SignatureAlgorithm : NL_SIGN_HMAC_MD5 (0x77)
  585. SealAlgorithm : NL_SEAL_RC4 (0x7A)
  586. Pad : 0xffff (65535)
  587. Flags : 0x0000 (0)
  588. SequenceNumber : 6a2a7f2940ff31f9
  589. Checksum : 94356f372fb5b740
  590. Confounder : 551a514e0bf27559
  591. rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu
  592. num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=200, this_data=200, max_data=4280, param_offset=82, param_disp=0, data_disp=0
  593. smb_signing_md5: sequence number 18
  594. smb_signing_sign_pdu: sent SMB signature of
  595. [0000] 95 E2 15 58 68 90 D9 40 ...Xh..@
  596. smb_signing_md5: sequence number 19
  597. smb_signing_check_pdu: seq 19: got good SMB signature of
  598. [0000] CE DA 44 08 69 B8 D1 34 ..D.i..4
  599. 000000 smb_io_rpc_hdr rpc_hdr
  600. 0000 major : 05
  601. 0001 minor : 00
  602. 0002 pkt_type : 02
  603. 0003 flags : 03
  604. 0004 pack_type0: 10
  605. 0005 pack_type1: 00
  606. 0006 pack_type2: 00
  607. 0007 pack_type3: 00
  608. 0008 frag_len : 01f0
  609. 000a auth_len : 0020
  610. 000c call_id : 00000011
  611. 000010 smb_io_rpc_hdr_resp rpc_hdr_resp
  612. 0010 alloc_hint: 000001ac
  613. 0014 context_id: 0000
  614. 0016 cancel_ct : 00
  615. 0017 reserved : 00
  616. 0001c8 smb_io_rpc_hdr_auth hdr_auth
  617. 01c8 auth_type : 44
  618. 01c9 auth_level : 06
  619. 01ca auth_pad_len : 04
  620. 01cb auth_reserved: 00
  621. 01cc auth_context_id: 00000001
  622. &r: struct NL_AUTH_SIGNATURE
  623. SignatureAlgorithm : NL_SIGN_HMAC_MD5 (0x77)
  624. SealAlgorithm : NL_SEAL_RC4 (0x7A)
  625. Pad : 0xffff (65535)
  626. Flags : 0x0000 (0)
  627. SequenceNumber : 4a72d44c3fe4e35d
  628. Checksum : d0ed5a82a5cde228
  629. Confounder : d14880ad3c1ff254
  630. cli_pipe_validate_current_pdu: got pdu len 496, data_len 428, ss_len 4
  631. rpc_api_pipe: got frag len of 496 at offset 0: NT_STATUS_OK
  632. rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu returned 856 bytes.
  633. netr_DsRGetDCName: struct netr_DsRGetDCName
  634. out: struct netr_DsRGetDCName
  635. info : *
  636. info : *
  637. info: struct netr_DsRGetDCNameInfo
  638. dc_unc : *
  639. dc_unc : '\\hollyhock.mpathways.dsc.umich.edu'
  640. dc_address : *
  641. dc_address : '\\141.211.228.179'
  642. dc_address_type : DS_ADDRESS_TYPE_INET (1)
  643. domain_guid : e403872f-dbe3-47bb-8551-e3bd5e405650
  644. domain_name : *
  645. domain_name : 'mpathways.dsc.umich.edu'
  646. forest_name : *
  647. forest_name : 'mpathways.dsc.umich.edu'
  648. dc_flags : 0xe00001fc (3758096892)
  649. 0: DS_SERVER_PDC
  650. 1: DS_SERVER_GC
  651. 1: DS_SERVER_LDAP
  652. 1: DS_SERVER_DS
  653. 1: DS_SERVER_KDC
  654. 1: DS_SERVER_TIMESERV
  655. 1: DS_SERVER_CLOSEST
  656. 1: DS_SERVER_WRITABLE
  657. 0: DS_SERVER_GOOD_TIMESERV
  658. 0: DS_SERVER_NDNC
  659. 0: DS_SERVER_SELECT_SECRET_DOMAIN_6
  660. 0: DS_SERVER_FULL_SECRET_DOMAIN_6
  661. 1: DS_DNS_CONTROLLER
  662. 1: DS_DNS_DOMAIN
  663. 1: DS_DNS_FOREST
  664. dc_site_name : *
  665. dc_site_name : 'Default-First-Site-Name'
  666. client_site_name : *
  667. client_site_name : 'Default-First-Site-Name'
  668. result : WERR_OK
  669. rpccli_netr_GetAnyDCName returned hollyhock.mpathways.dsc.umich.edu
  670. Returning valid cache entry: key = AD_SITENAME/DOMAIN/ADSROOT.ITCS.UMICH.EDU, value = UM-AnnArbor-Campus, timeout = Wed Feb 6 10:06:39 2036
  671. sitename_fetch: Returning sitename for ADSROOT.ITCS.UMICH.EDU: "UM-AnnArbor-Campus"
  672. internal_resolve_name: looking up hollyhock.mpathways.dsc.umich.edu#20 (sitename UM-AnnArbor-Campus)
  673. Returning valid cache entry: key = NBT/HOLLYHOCK.MPATHWAYS.DSC.UMICH.EDU#20, value = 141.211.228.179:0, timeout = Thu Apr 12 14:50:43 2012
  674. name hollyhock.mpathways.dsc.umich.edu#20 found.
  675. Returning expired cache entry: key = NEG_CONN_CACHE/MPATHWAYS2,hollyhock.mpathways.dsc.umich.edu, value = c0000001, timeout = Thu Apr 12 14:42:59 2012
  676. Adding cache entry with key = NEG_CONN_CACHE/MPATHWAYS2,hollyhock.mpathways.dsc.umich.edu and timeout = Wed Dec 31 19:00:00 1969
  677. (-1334256179 seconds in the past)
  678. check_negative_conn_cache returning result 0 for domain MPATHWAYS2 server hollyhock.mpathways.dsc.umich.edu
  679. Retrieved DC hollyhock.mpathways.dsc.umich.edu at 141.211.228.179 via netlogon
  680. messaging_tdb_store:
  681. array: struct messaging_array
  682. num_messages : 0x00000001 (1)
  683. messages: ARRAY(1)
  684. messages: struct messaging_rec
  685. msg_version : 0x00000002 (2)
  686. msg_type : MSG_WINBIND_TRY_TO_GO_ONLINE (1030)
  687. dest: struct server_id
  688. id : 0x000051fc (20988)
  689. src: struct server_id
  690. id : 0x00005223 (21027)
  691. buf : DATA_BLOB length=11
  692. [0000] 4D 50 41 54 48 57 41 59 53 32 00 MPATHWAY S2.
  693. messaging_tdb_signal_handler: sig[10] count[1] msgs[1]
  694. message_dispatch: received_messages = 1
  695. messaging_tdb_fetch:
  696. result: struct messaging_array
  697. num_messages : 0x00000001 (1)
  698. messages: ARRAY(1)
  699. messages: struct messaging_rec
  700. msg_version : 0x00000002 (2)
  701. msg_type : MSG_WINBIND_TRY_TO_GO_ONLINE (1030)
  702. dest: struct server_id
  703. id : 0x000051fc (20988)
  704. src: struct server_id
  705. id : 0x00005223 (21027)
  706. buf : DATA_BLOB length=11
  707. [0000] 4D 50 41 54 48 57 41 59 53 32 00 MPATHWAY S2.
  708. msg_try_to_go_online: received for domain MPATHWAYS2.
  709. wcache_tdc_fetch_domain: Searching for domain MPATHWAYS2
  710. wcache_tdc_fetch_domain: Found domain MPATHWAYS2
  711. connection_ok: Connection to for domain MPATHWAYS2 is not connected
  712. Cache entry with key = SAFJOIN/DOMAIN/MPATHWAYS2 couldn't be found
  713. Cache entry with key = SAF/DOMAIN/MPATHWAYS2 couldn't be found
  714. saf_fetch: failed to find server for "MPATHWAYS2" domain
  715. cm_open_connection: dcname is '' for domain MPATHWAYS2
  716. netr_DsRGetDCName: struct netr_DsRGetDCName
  717. in: struct netr_DsRGetDCName
  718. server_unc : *
  719. server_unc : 'itcs-dc02.adsroot.itcs.umich.edu'
  720. domain_name : *
  721. domain_name : 'MPATHWAYS2'
  722. domain_guid : NULL
  723. site_guid : NULL
  724. flags : 0x40000000 (1073741824)
  725. 0: DS_FORCE_REDISCOVERY
  726. 0: DS_DIRECTORY_SERVICE_REQUIRED
  727. 0: DS_DIRECTORY_SERVICE_PREFERRED
  728. 0: DS_GC_SERVER_REQUIRED
  729. 0: DS_PDC_REQUIRED
  730. 0: DS_BACKGROUND_ONLY
  731. 0: DS_IP_REQUIRED
  732. 0: DS_KDC_REQUIRED
  733. 0: DS_TIMESERV_REQUIRED
  734. 0: DS_WRITABLE_REQUIRED
  735. 0: DS_GOOD_TIMESERV_PREFERRED
  736. 0: DS_AVOID_SELF
  737. 0: DS_ONLY_LDAP_NEEDED
  738. 0: DS_IS_FLAT_NAME
  739. 0: DS_IS_DNS_NAME
  740. 0: DS_TRY_NEXTCLOSEST_SITE
  741. 0: DS_DIRECTORY_SERVICE_6_REQUIRED
  742. 0: DS_WEB_SERVICE_REQUIRED
  743. 1: DS_RETURN_DNS_NAME
  744. 0: DS_RETURN_FLAT_NAME
  745. 000000 smb_io_rpc_hdr hdr
  746. 0000 major : 05
  747. 0001 minor : 00
  748. 0002 pkt_type : 00
  749. 0003 flags : 03
  750. 0004 pack_type0: 10
  751. 0005 pack_type1: 00
  752. 0006 pack_type2: 00
  753. 0007 pack_type3: 00
  754. 0008 frag_len : 00c8
  755. 000a auth_len : 0020
  756. 000c call_id : 0000000d
  757. 000010 smb_io_rpc_hdr_req hdr_req
  758. 0010 alloc_hint: 00000088
  759. 0014 context_id: 0000
  760. 0016 opnum : 0014
  761. 0000a0 smb_io_rpc_hdr_auth hdr_auth
  762. 00a0 auth_type : 44
  763. 00a1 auth_level : 06
  764. 00a2 auth_pad_len : 00
  765. 00a3 auth_reserved: 00
  766. 00a4 auth_context_id: 00000001
  767. add_schannel_auth_footer: SCHANNEL seq_num=6
  768. &r: struct NL_AUTH_SIGNATURE
  769. SignatureAlgorithm : NL_SIGN_HMAC_MD5 (0x77)
  770. SealAlgorithm : NL_SEAL_RC4 (0x7A)
  771. Pad : 0xffff (65535)
  772. Flags : 0x0000 (0)
  773. SequenceNumber : 5b1836c921cad5d1
  774. Checksum : 097956a66e843981
  775. Confounder : 5c5bea0231499b2f
  776. rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu
  777. num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=200, this_data=200, max_data=4280, param_offset=82, param_disp=0, data_disp=0
  778. smb_signing_md5: sequence number 42
  779. smb_signing_sign_pdu: sent SMB signature of
  780. [0000] 31 30 FF 9D 03 B3 C6 BB 10......
  781. smb_signing_md5: sequence number 43
  782. smb_signing_check_pdu: seq 43: got good SMB signature of
  783. [0000] EF 67 C3 6E 3C ED 18 4A .g.n<..J
  784. 000000 smb_io_rpc_hdr rpc_hdr
  785. 0000 major : 05
  786. 0001 minor : 00
  787. 0002 pkt_type : 02
  788. 0003 flags : 03
  789. 0004 pack_type0: 10
  790. 0005 pack_type1: 00
  791. 0006 pack_type2: 00
  792. 0007 pack_type3: 00
  793. 0008 frag_len : 01f0
  794. 000a auth_len : 0020
  795. 000c call_id : 0000000d
  796. 000010 smb_io_rpc_hdr_resp rpc_hdr_resp
  797. 0010 alloc_hint: 000001ac
  798. 0014 context_id: 0000
  799. 0016 cancel_ct : 00
  800. 0017 reserved : 00
  801. 0001c8 smb_io_rpc_hdr_auth hdr_auth
  802. 01c8 auth_type : 44
  803. 01c9 auth_level : 06
  804. 01ca auth_pad_len : 04
  805. 01cb auth_reserved: 00
  806. 01cc auth_context_id: 00000001
  807. &r: struct NL_AUTH_SIGNATURE
  808. SignatureAlgorithm : NL_SIGN_HMAC_MD5 (0x77)
  809. SealAlgorithm : NL_SEAL_RC4 (0x7A)
  810. Pad : 0xffff (65535)
  811. Flags : 0x0000 (0)
  812. SequenceNumber : 836d154c64bb2de1
  813. Checksum : 2e27e495ee4a69ae
  814. Confounder : b1b2c6b672eeab9b
  815. cli_pipe_validate_current_pdu: got pdu len 496, data_len 428, ss_len 4
  816. rpc_api_pipe: got frag len of 496 at offset 0: NT_STATUS_OK
  817. rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu returned 856 bytes.
  818. netr_DsRGetDCName: struct netr_DsRGetDCName
  819. out: struct netr_DsRGetDCName
  820. info : *
  821. info : *
  822. info: struct netr_DsRGetDCNameInfo
  823. dc_unc : *
  824. dc_unc : '\\hollyhock.mpathways.dsc.umich.edu'
  825. dc_address : *
  826. dc_address : '\\141.211.228.179'
  827. dc_address_type : DS_ADDRESS_TYPE_INET (1)
  828. domain_guid : e403872f-dbe3-47bb-8551-e3bd5e405650
  829. domain_name : *
  830. domain_name : 'mpathways.dsc.umich.edu'
  831. forest_name : *
  832. forest_name : 'mpathways.dsc.umich.edu'
  833. dc_flags : 0xe00001fc (3758096892)
  834. 0: DS_SERVER_PDC
  835. 1: DS_SERVER_GC
  836. 1: DS_SERVER_LDAP
  837. 1: DS_SERVER_DS
  838. 1: DS_SERVER_KDC
  839. 1: DS_SERVER_TIMESERV
  840. 1: DS_SERVER_CLOSEST
  841. 1: DS_SERVER_WRITABLE
  842. 0: DS_SERVER_GOOD_TIMESERV
  843. 0: DS_SERVER_NDNC
  844. 0: DS_SERVER_SELECT_SECRET_DOMAIN_6
  845. 0: DS_SERVER_FULL_SECRET_DOMAIN_6
  846. 1: DS_DNS_CONTROLLER
  847. 1: DS_DNS_DOMAIN
  848. 1: DS_DNS_FOREST
  849. dc_site_name : *
  850. dc_site_name : 'Default-First-Site-Name'
  851. client_site_name : *
  852. client_site_name : 'Default-First-Site-Name'
  853. result : WERR_OK
  854. rpccli_netr_GetAnyDCName returned hollyhock.mpathways.dsc.umich.edu
  855. Returning valid cache entry: key = AD_SITENAME/DOMAIN/ADSROOT.ITCS.UMICH.EDU, value = UM-AnnArbor-Campus, timeout = Wed Feb 6 10:06:39 2036
  856. sitename_fetch: Returning sitename for ADSROOT.ITCS.UMICH.EDU: "UM-AnnArbor-Campus"
  857. internal_resolve_name: looking up hollyhock.mpathways.dsc.umich.edu#20 (sitename UM-AnnArbor-Campus)
  858. Returning valid cache entry: key = NBT/HOLLYHOCK.MPATHWAYS.DSC.UMICH.EDU#20, value = 141.211.228.179:0, timeout = Thu Apr 12 14:50:43 2012
  859. name hollyhock.mpathways.dsc.umich.edu#20 found.
  860. Returning expired cache entry: key = NEG_CONN_CACHE/MPATHWAYS2,hollyhock.mpathways.dsc.umich.edu, value = , timeout = Wed Dec 31 19:00:00 1969
  861. check_negative_conn_cache returning result 0 for domain MPATHWAYS2 server hollyhock.mpathways.dsc.umich.edu
  862. Retrieved DC hollyhock.mpathways.dsc.umich.edu at 141.211.228.179 via netlogon
  863. Connecting to 141.211.228.179 at port 445
  864. Running timed event "tevent_req_timedout" 0x7f3bca8227b0
  865. Connecting to 141.211.228.179 at port 139
  866. find_new_dc: smbsock_any_connect failed for domain MPATHWAYS2 address 141.211.228.179. Error was NT_STATUS_CONNECTION_REFUSED
  867. Adding cache entry with key = NEG_CONN_CACHE/MPATHWAYS2,hollyhock.mpathways.dsc.umich.edu and timeout = Thu Apr 12 14:43:29 2012
  868. (30 seconds ahead)
  869. add_failed_connection_entry: added domain MPATHWAYS2 (hollyhock.mpathways.dsc.umich.edu) to failed conn cache
  870. Deleting cache entry (key = SAFJOIN/DOMAIN/MPATHWAYS2)
  871. Cache entry with key = SAFJOIN/DOMAIN/MPATHWAYS2 couldn't be found
  872. Deleting cache entry (key = SAF/DOMAIN/MPATHWAYS2)
  873. Cache entry with key = SAF/DOMAIN/MPATHWAYS2 couldn't be found
  874. Adding cache entry with key = NEG_CONN_CACHE/mpathways.dsc.umich.edu,hollyhock.mpathways.dsc.umich.edu and timeout = Thu Apr 12 14:43:29 2012
  875. (30 seconds ahead)
  876. add_failed_connection_entry: added domain mpathways.dsc.umich.edu (hollyhock.mpathways.dsc.umich.edu) to failed conn cache
  877. Deleting cache entry (key = SAFJOIN/DOMAIN/MPATHWAYS.DSC.UMICH.EDU)
  878. Cache entry with key = SAFJOIN/DOMAIN/MPATHWAYS.DSC.UMICH.EDU couldn't be found
  879. Deleting cache entry (key = SAF/DOMAIN/MPATHWAYS.DSC.UMICH.EDU)
  880. Cache entry with key = SAF/DOMAIN/MPATHWAYS.DSC.UMICH.EDU couldn't be found
  881. set_global_winbindd_state_offline: offline requested.
  882. set_global_winbindd_state_offline: rejecting.
  883. set_domain_offline: called for domain MPATHWAYS2
  884. set_domain_offline: added event handler for domain MPATHWAYS2
  885. timed_events_timeout: 29/999971
  886. timed_events_timeout: 29/999936
  887. Got sig[2] terminate (is_parent=1)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement