Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Running timed event "check_domain_online_handler" 0x7f3bca824420
- check_domain_online_handler: called for domain MPATHWAYS2 (online = False)
- Overriding messaging pointer for type 1030 - private_data=(nil)
- Overriding messaging pointer for type 1031 - private_data=(nil)
- Deregistering messaging pointer for type 1028 - private_data=(nil)
- Deregistering messaging pointer for type 1027 - private_data=(nil)
- Deregistering messaging pointer for type 1280 - private_data=(nil)
- Deregistering messaging pointer for type 1 - private_data=(nil)
- connection_ok: Connection to itcs-dc02.adsroot.itcs.umich.edu for domain UMROOT is not connected
- socket was closed, no need to send close request.
- Cache entry with key = SAFJOIN/DOMAIN/UMROOT couldn't be found
- Returning valid cache entry: key = SAF/DOMAIN/UMROOT, value = itcs-dc02.adsroot.itcs.umich.edu, timeout = Thu Apr 12 14:57:29 2012
- saf_fetch: Returning "itcs-dc02.adsroot.itcs.umich.edu" for "UMROOT" domain
- Cache entry with key = NEG_CONN_CACHE/UMROOT,itcs-dc02.adsroot.itcs.umich.edu couldn't be found
- check_negative_conn_cache returning result 0 for domain UMROOT server itcs-dc02.adsroot.itcs.umich.edu
- cm_open_connection: saf_servername is 'itcs-dc02.adsroot.itcs.umich.edu' for domain UMROOT
- cm_open_connection: dcname is 'itcs-dc02.adsroot.itcs.umich.edu' for domain UMROOT
- Cache entry with key = NEG_CONN_CACHE/UMROOT,itcs-dc02.adsroot.itcs.umich.edu couldn't be found
- check_negative_conn_cache returning result 0 for domain UMROOT server itcs-dc02.adsroot.itcs.umich.edu
- Returning valid cache entry: key = AD_SITENAME/DOMAIN/ADSROOT.ITCS.UMICH.EDU, value = UM-AnnArbor-Campus, timeout = Wed Feb 6 10:06:39 2036
- sitename_fetch: Returning sitename for ADSROOT.ITCS.UMICH.EDU: "UM-AnnArbor-Campus"
- internal_resolve_name: looking up itcs-dc02.adsroot.itcs.umich.edu#20 (sitename UM-AnnArbor-Campus)
- Returning valid cache entry: key = NBT/ITCS-DC02.ADSROOT.ITCS.UMICH.EDU#20, value = 141.213.143.141:0, timeout = Thu Apr 12 14:45:55 2012
- name itcs-dc02.adsroot.itcs.umich.edu#20 found.
- Connecting to 141.213.143.141 at port 445
- cm_prepare_connection: connecting to DC itcs-dc02.adsroot.itcs.umich.edu for domain UMROOT
- connecting to itcs-dc02.adsroot.itcs.umich.edu from TRI-BIO-PROFILE with kerberos principal [TRI-BIO-PROFILE$@ADSROOT.ITCS.UMICH.EDU] and realm [adsroot.itcs.umich.edu]
- Doing spnego session setup (blob length=124)
- got OID=1.2.840.48018.1.2.2
- got OID=1.2.840.113554.1.2.2
- got OID=1.2.840.113554.1.2.2.3
- got OID=1.3.6.1.4.1.311.2.2.10
- got principal=not_defined_in_RFC4178@please_ignore
- kerberos_kinit_password: as TRI-BIO-PROFILE$@ADSROOT.ITCS.UMICH.EDU using [MEMORY:cliconnect] as ccache and config [(null)]
- cli_session_setup_spnego: got a bad server principal, trying to guess ...
- cli_session_setup_spnego: guessed server principal=cifs/itcs-dc02.adsroot.itcs.umich.edu@ADSROOT.ITCS.UMICH.EDU
- Doing kerberos session setup
- ads_cleanup_expired_creds: Ticket in ccache[MEMORY:cliconnect] expiration Fri, 13 Apr 2012 00:42:59 EDT
- ads_krb5_mk_req: Ticket (cifs/itcs-dc02.adsroot.itcs.umich.edu@ADSROOT.ITCS.UMICH.EDU) in ccache (MEMORY:cliconnect) is valid until: (Fri, 13 Apr 2012 00:42:59 EDT - 1334292179)
- ads_krb5_mk_req: server marked as OK to delegate to, building forwardable TGT
- Got KRB5 session key of length 16
- cli_session_setup_blob: Remaining (0) sending (3093) current (3093)
- smb_signing_sign_pdu: sent SMB signature of
- [0000] 42 53 52 53 50 59 4C 20 BSRSPYL
- write_socket(22,3178)
- write_socket(22,3178) wrote 3178
- got smb length of 253
- size=253
- smb_com=0x73
- smb_rcls=0
- smb_reh=0
- smb_err=0
- smb_flg=136
- smb_flg2=51205
- smb_tid=0
- smb_pid=21027
- smb_uid=2050
- smb_mid=2
- smt_wct=4
- smb_vwv[ 0]= 255 (0xFF)
- smb_vwv[ 1]= 253 (0xFD)
- smb_vwv[ 2]= 0 (0x0)
- smb_vwv[ 3]= 22 (0x16)
- smb_bcc=210
- [0000] A1 14 30 12 A0 03 0A 01 00 A1 0B 06 09 2A 86 48 ..0..... .....*.H
- [0010] 82 F7 12 01 02 02 00 57 00 69 00 6E 00 64 00 6F .......W .i.n.d.o
- [0020] 00 77 00 73 00 20 00 53 00 65 00 72 00 76 00 65 .w.s. .S .e.r.v.e
- [0030] 00 72 00 20 00 28 00 52 00 29 00 20 00 32 00 30 .r. .(.R .). .2.0
- [0040] 00 30 00 38 00 20 00 45 00 6E 00 74 00 65 00 72 .0.8. .E .n.t.e.r
- [0050] 00 70 00 72 00 69 00 73 00 65 00 20 00 36 00 30 .p.r.i.s .e. .6.0
- [0060] 00 30 00 32 00 20 00 53 00 65 00 72 00 76 00 69 .0.2. .S .e.r.v.i
- [0070] 00 63 00 65 00 20 00 50 00 61 00 63 00 6B 00 20 .c.e. .P .a.c.k.
- [0080] 00 32 00 00 00 57 00 69 00 6E 00 64 00 6F 00 77 .2...W.i .n.d.o.w
- [0090] 00 73 00 20 00 53 00 65 00 72 00 76 00 65 00 72 .s. .S.e .r.v.e.r
- [00A0] 00 20 00 28 00 52 00 29 00 20 00 32 00 30 00 30 . .(.R.) . .2.0.0
- [00B0] 00 38 00 20 00 45 00 6E 00 74 00 65 00 72 00 70 .8. .E.n .t.e.r.p
- [00C0] 00 72 00 69 00 73 00 65 00 20 00 36 00 2E 00 30 .r.i.s.e . .6...0
- [00D0] 00 00 ..
- size=253
- smb_com=0x73
- smb_rcls=0
- smb_reh=0
- smb_err=0
- smb_flg=136
- smb_flg2=51205
- smb_tid=0
- smb_pid=21027
- smb_uid=2050
- smb_mid=2
- smt_wct=4
- smb_vwv[ 0]= 255 (0xFF)
- smb_vwv[ 1]= 253 (0xFD)
- smb_vwv[ 2]= 0 (0x0)
- smb_vwv[ 3]= 22 (0x16)
- smb_bcc=210
- [0000] A1 14 30 12 A0 03 0A 01 00 A1 0B 06 09 2A 86 48 ..0..... .....*.H
- [0010] 82 F7 12 01 02 02 00 57 00 69 00 6E 00 64 00 6F .......W .i.n.d.o
- [0020] 00 77 00 73 00 20 00 53 00 65 00 72 00 76 00 65 .w.s. .S .e.r.v.e
- [0030] 00 72 00 20 00 28 00 52 00 29 00 20 00 32 00 30 .r. .(.R .). .2.0
- [0040] 00 30 00 38 00 20 00 45 00 6E 00 74 00 65 00 72 .0.8. .E .n.t.e.r
- [0050] 00 70 00 72 00 69 00 73 00 65 00 20 00 36 00 30 .p.r.i.s .e. .6.0
- [0060] 00 30 00 32 00 20 00 53 00 65 00 72 00 76 00 69 .0.2. .S .e.r.v.i
- [0070] 00 63 00 65 00 20 00 50 00 61 00 63 00 6B 00 20 .c.e. .P .a.c.k.
- [0080] 00 32 00 00 00 57 00 69 00 6E 00 64 00 6F 00 77 .2...W.i .n.d.o.w
- [0090] 00 73 00 20 00 53 00 65 00 72 00 76 00 65 00 72 .s. .S.e .r.v.e.r
- [00A0] 00 20 00 28 00 52 00 29 00 20 00 32 00 30 00 30 . .(.R.) . .2.0.0
- [00B0] 00 38 00 20 00 45 00 6E 00 74 00 65 00 72 00 70 .8. .E.n .t.e.r.p
- [00C0] 00 72 00 69 00 73 00 65 00 20 00 36 00 2E 00 30 .r.i.s.e . .6...0
- [00D0] 00 00 ..
- smb_signing_activate: user_session_key
- [0000] DB 07 D5 4A CD 0C 24 B9 A5 34 58 8A 18 DC 71 76 ...J..$. .4X...qv
- smb_signing_activate: NULL response_data
- smb_signing_md5: sequence number 1
- smb_signing_check_pdu: seq 1: got good SMB signature of
- [0000] 87 1A 41 F8 E3 D5 02 CE ..A.....
- cli_init_creds: user TRI-BIO-PROFILE$ domain UMROOT
- saf_store: domain = [UMROOT], server = [itcs-dc02.adsroot.itcs.umich.edu], expire = [1334257079]
- Adding cache entry with key = SAF/DOMAIN/UMROOT and timeout = Thu Apr 12 14:57:59 2012
- (900 seconds ahead)
- saf_store: domain = [adsroot.itcs.umich.edu], server = [itcs-dc02.adsroot.itcs.umich.edu], expire = [1334257079]
- Adding cache entry with key = SAF/DOMAIN/ADSROOT.ITCS.UMICH.EDU and timeout = Thu Apr 12 14:57:59 2012
- (900 seconds ahead)
- smb_signing_md5: sequence number 2
- smb_signing_sign_pdu: sent SMB signature of
- [0000] 26 99 A0 59 2C 83 EA 97 &..Y,...
- smb_signing_md5: sequence number 3
- smb_signing_check_pdu: seq 3: got good SMB signature of
- [0000] 7F 34 71 9A B9 68 DE EF .4q..h..
- set_domain_online: called for domain UMROOT
- Deregistering messaging pointer for type 1030 - private_data=(nil)
- Deregistering messaging pointer for type 1031 - private_data=(nil)
- smb_signing_md5: sequence number 4
- smb_signing_sign_pdu: sent SMB signature of
- [0000] CA AB 88 C1 A7 78 E1 A6 .....x..
- smb_signing_md5: sequence number 5
- smb_signing_check_pdu: seq 5: got good SMB signature of
- [0000] 41 7C DC 90 4C 62 85 3C A|..Lb.<
- Bind RPC Pipe: host itcs-dc02.adsroot.itcs.umich.edu auth_type 0, auth_level 1
- 000000 smb_io_rpc_hdr hdr
- 0000 major : 05
- 0001 minor : 00
- 0002 pkt_type : 0b
- 0003 flags : 03
- 0004 pack_type0: 10
- 0005 pack_type1: 00
- 0006 pack_type2: 00
- 0007 pack_type3: 00
- 0008 frag_len : 0048
- 000a auth_len : 0000
- 000c call_id : 0000000d
- 000010 smb_io_rpc_hdr_rb
- 000010 smb_io_rpc_hdr_bba
- 0010 max_tsize: 10b8
- 0012 max_rsize: 10b8
- 0014 assoc_gid: 00000000
- 0018 num_contexts: 01
- 001c context_id : 0000
- 001e num_transfer_syntaxes: 01
- 00001f smb_io_rpc_iface
- 000020 smb_io_uuid uuid
- 0020 data : 12345678
- 0024 data : 1234
- 0026 data : abcd
- 0028 data : ef 00
- 002a data : 01 23 45 67 cf fb
- 0030 version: 00000001
- 000034 smb_io_rpc_iface
- 000034 smb_io_uuid uuid
- 0034 data : 8a885d04
- 0038 data : 1ceb
- 003a data : 11c9
- 003c data : 9f e8
- 003e data : 08 00 2b 10 48 60
- 0044 version: 00000002
- rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu
- num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=82, param_disp=0, data_disp=0
- smb_signing_md5: sequence number 6
- smb_signing_sign_pdu: sent SMB signature of
- [0000] 66 9D E0 89 40 C6 50 37 f...@.P7
- smb_signing_md5: sequence number 7
- smb_signing_check_pdu: seq 7: got good SMB signature of
- [0000] CC 8F 81 29 40 B5 6A BF ...)@.j.
- 000000 smb_io_rpc_hdr rpc_hdr
- 0000 major : 05
- 0001 minor : 00
- 0002 pkt_type : 0c
- 0003 flags : 03
- 0004 pack_type0: 10
- 0005 pack_type1: 00
- 0006 pack_type2: 00
- 0007 pack_type3: 00
- 0008 frag_len : 0044
- 000a auth_len : 0000
- 000c call_id : 0000000d
- rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK
- rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu returned 68 bytes.
- 000000 smb_io_rpc_hdr hdr
- 0000 major : 05
- 0001 minor : 00
- 0002 pkt_type : 0c
- 0003 flags : 03
- 0004 pack_type0: 10
- 0005 pack_type1: 00
- 0006 pack_type2: 00
- 0007 pack_type3: 00
- 0008 frag_len : 0044
- 000a auth_len : 0000
- 000c call_id : 0000000d
- 000010 smb_io_rpc_hdr_ba
- 000010 smb_io_rpc_hdr_bba
- 0010 max_tsize: 10b8
- 0012 max_rsize: 10b8
- 0014 assoc_gid: 004a9df8
- 000018 smb_io_rpc_addr_str
- 0018 len: 000c
- 001a str: \pipe\lsass.
- 000026 smb_io_rpc_results
- 0028 num_results: 01
- 002c result : 0000
- 002e reason : 0000
- 000030 smb_io_rpc_iface
- 000030 smb_io_uuid uuid
- 0030 data : 8a885d04
- 0034 data : 1ceb
- 0036 data : 11c9
- 0038 data : 9f e8
- 003a data : 08 00 2b 10 48 60
- 0040 version: 00000002
- check_bind_response: accepted!
- cli_rpc_pipe_open_noauth: opened pipe \netlogon to machine itcs-dc02.adsroot.itcs.umich.edu and bound anonymously.
- netr_ServerReqChallenge: struct netr_ServerReqChallenge
- in: struct netr_ServerReqChallenge
- server_name : *
- server_name : '\\ITCS-DC02.ADSROOT.ITCS.UMICH.EDU'
- computer_name : *
- computer_name : 'TRI-BIO-PROFILE'
- credentials : *
- credentials: struct netr_Credential
- data : a461c9801bc9103c
- 000000 smb_io_rpc_hdr hdr
- 0000 major : 05
- 0001 minor : 00
- 0002 pkt_type : 00
- 0003 flags : 03
- 0004 pack_type0: 10
- 0005 pack_type1: 00
- 0006 pack_type2: 00
- 0007 pack_type3: 00
- 0008 frag_len : 00a4
- 000a auth_len : 0000
- 000c call_id : 0000000e
- 000010 smb_io_rpc_hdr_req hdr_req
- 0010 alloc_hint: 0000008c
- 0014 context_id: 0000
- 0016 opnum : 0004
- rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu
- num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=164, this_data=164, max_data=4280, param_offset=82, param_disp=0, data_disp=0
- smb_signing_md5: sequence number 8
- smb_signing_sign_pdu: sent SMB signature of
- [0000] 6B 79 11 79 C1 48 B0 A7 ky.y.H..
- smb_signing_md5: sequence number 9
- smb_signing_check_pdu: seq 9: got good SMB signature of
- [0000] F1 57 72 3C E9 E9 53 82 .Wr<..S.
- 000000 smb_io_rpc_hdr rpc_hdr
- 0000 major : 05
- 0001 minor : 00
- 0002 pkt_type : 02
- 0003 flags : 03
- 0004 pack_type0: 10
- 0005 pack_type1: 00
- 0006 pack_type2: 00
- 0007 pack_type3: 00
- 0008 frag_len : 0024
- 000a auth_len : 0000
- 000c call_id : 0000000e
- 000010 smb_io_rpc_hdr_resp rpc_hdr_resp
- 0010 alloc_hint: 0000000c
- 0014 context_id: 0000
- 0016 cancel_ct : 00
- 0017 reserved : 00
- cli_pipe_validate_current_pdu: got pdu len 36, data_len 12, ss_len 0
- rpc_api_pipe: got frag len of 36 at offset 0: NT_STATUS_OK
- rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu returned 24 bytes.
- netr_ServerReqChallenge: struct netr_ServerReqChallenge
- out: struct netr_ServerReqChallenge
- return_credentials : *
- return_credentials: struct netr_Credential
- data : 18a59ef66ab183a5
- result : NT_STATUS_OK
- netr_ServerAuthenticate2: struct netr_ServerAuthenticate2
- in: struct netr_ServerAuthenticate2
- server_name : *
- server_name : '\\ITCS-DC02.ADSROOT.ITCS.UMICH.EDU'
- account_name : *
- account_name : 'TRI-BIO-PROFILE$'
- secure_channel_type : SEC_CHAN_WKSTA (2)
- computer_name : *
- computer_name : 'TRI-BIO-PROFILE'
- credentials : *
- credentials: struct netr_Credential
- data : 2a54330a3b378fcb
- negotiate_flags : *
- negotiate_flags : 0x600fffff (1611661311)
- 1: NETLOGON_NEG_ACCOUNT_LOCKOUT
- 1: NETLOGON_NEG_PERSISTENT_SAMREPL
- 1: NETLOGON_NEG_ARCFOUR
- 1: NETLOGON_NEG_PROMOTION_COUNT
- 1: NETLOGON_NEG_CHANGELOG_BDC
- 1: NETLOGON_NEG_FULL_SYNC_REPL
- 1: NETLOGON_NEG_MULTIPLE_SIDS
- 1: NETLOGON_NEG_REDO
- 1: NETLOGON_NEG_PASSWORD_CHANGE_REFUSAL
- 1: NETLOGON_NEG_SEND_PASSWORD_INFO_PDC
- 1: NETLOGON_NEG_GENERIC_PASSTHROUGH
- 1: NETLOGON_NEG_CONCURRENT_RPC
- 1: NETLOGON_NEG_AVOID_ACCOUNT_DB_REPL
- 1: NETLOGON_NEG_AVOID_SECURITYAUTH_DB_REPL
- 1: NETLOGON_NEG_STRONG_KEYS
- 1: NETLOGON_NEG_TRANSITIVE_TRUSTS
- 1: NETLOGON_NEG_DNS_DOMAIN_TRUSTS
- 1: NETLOGON_NEG_PASSWORD_SET2
- 1: NETLOGON_NEG_GETDOMAININFO
- 1: NETLOGON_NEG_CROSS_FOREST_TRUSTS
- 0: NETLOGON_NEG_NEUTRALIZE_NT4_EMULATION
- 0: NETLOGON_NEG_RODC_PASSTHROUGH
- 0: NETLOGON_NEG_SUPPORTS_AES_SHA2
- 0: NETLOGON_NEG_SUPPORTS_AES
- 1: NETLOGON_NEG_AUTHENTICATED_RPC_LSASS
- 1: NETLOGON_NEG_AUTHENTICATED_RPC
- 000000 smb_io_rpc_hdr hdr
- 0000 major : 05
- 0001 minor : 00
- 0002 pkt_type : 00
- 0003 flags : 03
- 0004 pack_type0: 10
- 0005 pack_type1: 00
- 0006 pack_type2: 00
- 0007 pack_type3: 00
- 0008 frag_len : 00d8
- 000a auth_len : 0000
- 000c call_id : 0000000f
- 000010 smb_io_rpc_hdr_req hdr_req
- 0010 alloc_hint: 000000c0
- 0014 context_id: 0000
- 0016 opnum : 000f
- rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu
- num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=216, this_data=216, max_data=4280, param_offset=82, param_disp=0, data_disp=0
- smb_signing_md5: sequence number 10
- smb_signing_sign_pdu: sent SMB signature of
- [0000] 6F 6E 60 7A 11 42 6B 9D on`z.Bk.
- smb_signing_md5: sequence number 11
- smb_signing_check_pdu: seq 11: got good SMB signature of
- [0000] 8E 48 DB 91 6D E0 0B D4 .H..m...
- 000000 smb_io_rpc_hdr rpc_hdr
- 0000 major : 05
- 0001 minor : 00
- 0002 pkt_type : 02
- 0003 flags : 03
- 0004 pack_type0: 10
- 0005 pack_type1: 00
- 0006 pack_type2: 00
- 0007 pack_type3: 00
- 0008 frag_len : 0028
- 000a auth_len : 0000
- 000c call_id : 0000000f
- 000010 smb_io_rpc_hdr_resp rpc_hdr_resp
- 0010 alloc_hint: 00000010
- 0014 context_id: 0000
- 0016 cancel_ct : 00
- 0017 reserved : 00
- cli_pipe_validate_current_pdu: got pdu len 40, data_len 16, ss_len 0
- rpc_api_pipe: got frag len of 40 at offset 0: NT_STATUS_OK
- rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu returned 32 bytes.
- netr_ServerAuthenticate2: struct netr_ServerAuthenticate2
- out: struct netr_ServerAuthenticate2
- return_credentials : *
- return_credentials: struct netr_Credential
- data : c9a70d0f55026ed7
- negotiate_flags : *
- negotiate_flags : 0x600fffff (1611661311)
- 1: NETLOGON_NEG_ACCOUNT_LOCKOUT
- 1: NETLOGON_NEG_PERSISTENT_SAMREPL
- 1: NETLOGON_NEG_ARCFOUR
- 1: NETLOGON_NEG_PROMOTION_COUNT
- 1: NETLOGON_NEG_CHANGELOG_BDC
- 1: NETLOGON_NEG_FULL_SYNC_REPL
- 1: NETLOGON_NEG_MULTIPLE_SIDS
- 1: NETLOGON_NEG_REDO
- 1: NETLOGON_NEG_PASSWORD_CHANGE_REFUSAL
- 1: NETLOGON_NEG_SEND_PASSWORD_INFO_PDC
- 1: NETLOGON_NEG_GENERIC_PASSTHROUGH
- 1: NETLOGON_NEG_CONCURRENT_RPC
- 1: NETLOGON_NEG_AVOID_ACCOUNT_DB_REPL
- 1: NETLOGON_NEG_AVOID_SECURITYAUTH_DB_REPL
- 1: NETLOGON_NEG_STRONG_KEYS
- 1: NETLOGON_NEG_TRANSITIVE_TRUSTS
- 1: NETLOGON_NEG_DNS_DOMAIN_TRUSTS
- 1: NETLOGON_NEG_PASSWORD_SET2
- 1: NETLOGON_NEG_GETDOMAININFO
- 1: NETLOGON_NEG_CROSS_FOREST_TRUSTS
- 0: NETLOGON_NEG_NEUTRALIZE_NT4_EMULATION
- 0: NETLOGON_NEG_RODC_PASSTHROUGH
- 0: NETLOGON_NEG_SUPPORTS_AES_SHA2
- 0: NETLOGON_NEG_SUPPORTS_AES
- 1: NETLOGON_NEG_AUTHENTICATED_RPC_LSASS
- 1: NETLOGON_NEG_AUTHENTICATED_RPC
- result : NT_STATUS_OK
- rpccli_netlogon_setup_creds: server itcs-dc02.adsroot.itcs.umich.edu credential chain established.
- smb_signing_md5: sequence number 12
- smb_signing_sign_pdu: sent SMB signature of
- [0000] 95 FB 0E 31 BE EE 4E 0A ...1..N.
- smb_signing_md5: sequence number 13
- smb_signing_check_pdu: seq 13: got good SMB signature of
- [0000] 64 9C 35 35 1E 27 48 78 d.55.'Hx
- Bind RPC Pipe: host itcs-dc02.adsroot.itcs.umich.edu auth_type 2, auth_level 6
- &r: struct NL_AUTH_MESSAGE
- MessageType : NL_NEGOTIATE_REQUEST (0x0)
- Flags : 0x00000003 (3)
- 1: NL_FLAG_OEM_NETBIOS_DOMAIN_NAME
- 1: NL_FLAG_OEM_NETBIOS_COMPUTER_NAME
- 0: NL_FLAG_UTF8_DNS_DOMAIN_NAME
- 0: NL_FLAG_UTF8_DNS_HOST_NAME
- 0: NL_FLAG_UTF8_NETBIOS_COMPUTER_NAME
- oem_netbios_domain : 'UMROOT'
- oem_netbios_computer : 'TRI-BIO-PROFILE'
- 000000 smb_io_rpc_hdr hdr
- 0000 major : 05
- 0001 minor : 00
- 0002 pkt_type : 0b
- 0003 flags : 03
- 0004 pack_type0: 10
- 0005 pack_type1: 00
- 0006 pack_type2: 00
- 0007 pack_type3: 00
- 0008 frag_len : 006f
- 000a auth_len : 001f
- 000c call_id : 00000010
- 000010 smb_io_rpc_hdr_rb
- 000010 smb_io_rpc_hdr_bba
- 0010 max_tsize: 10b8
- 0012 max_rsize: 10b8
- 0014 assoc_gid: 00000000
- 0018 num_contexts: 01
- 001c context_id : 0000
- 001e num_transfer_syntaxes: 01
- 00001f smb_io_rpc_iface
- 000020 smb_io_uuid uuid
- 0020 data : 12345678
- 0024 data : 1234
- 0026 data : abcd
- 0028 data : ef 00
- 002a data : 01 23 45 67 cf fb
- 0030 version: 00000001
- 000034 smb_io_rpc_iface
- 000034 smb_io_uuid uuid
- 0034 data : 8a885d04
- 0038 data : 1ceb
- 003a data : 11c9
- 003c data : 9f e8
- 003e data : 08 00 2b 10 48 60
- 0044 version: 00000002
- 000048 smb_io_rpc_hdr_auth hdr_auth
- 0048 auth_type : 44
- 0049 auth_level : 06
- 004a auth_pad_len : 00
- 004b auth_reserved: 00
- 004c auth_context_id: 00000001
- rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu
- num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=111, this_data=111, max_data=4280, param_offset=82, param_disp=0, data_disp=0
- smb_signing_md5: sequence number 14
- smb_signing_sign_pdu: sent SMB signature of
- [0000] C5 99 56 0F 07 52 F3 D6 ..V..R..
- smb_signing_md5: sequence number 15
- smb_signing_check_pdu: seq 15: got good SMB signature of
- [0000] F5 C9 B9 67 0E 6D BC 44 ...g.m.D
- 000000 smb_io_rpc_hdr rpc_hdr
- 0000 major : 05
- 0001 minor : 00
- 0002 pkt_type : 0c
- 0003 flags : 03
- 0004 pack_type0: 10
- 0005 pack_type1: 00
- 0006 pack_type2: 00
- 0007 pack_type3: 00
- 0008 frag_len : 0058
- 000a auth_len : 000c
- 000c call_id : 00000010
- rpc_api_pipe: got frag len of 88 at offset 0: NT_STATUS_OK
- rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu returned 88 bytes.
- 000000 smb_io_rpc_hdr hdr
- 0000 major : 05
- 0001 minor : 00
- 0002 pkt_type : 0c
- 0003 flags : 03
- 0004 pack_type0: 10
- 0005 pack_type1: 00
- 0006 pack_type2: 00
- 0007 pack_type3: 00
- 0008 frag_len : 0058
- 000a auth_len : 000c
- 000c call_id : 00000010
- 000010 smb_io_rpc_hdr_ba
- 000010 smb_io_rpc_hdr_bba
- 0010 max_tsize: 10b8
- 0012 max_rsize: 10b8
- 0014 assoc_gid: 004a9df9
- 000018 smb_io_rpc_addr_str
- 0018 len: 000c
- 001a str: \pipe\lsass.
- 000026 smb_io_rpc_results
- 0028 num_results: 01
- 002c result : 0000
- 002e reason : 0000
- 000030 smb_io_rpc_iface
- 000030 smb_io_uuid uuid
- 0030 data : 8a885d04
- 0034 data : 1ceb
- 0036 data : 11c9
- 0038 data : 9f e8
- 003a data : 08 00 2b 10 48 60
- 0040 version: 00000002
- check_bind_response: accepted!
- cli_rpc_pipe_open_schannel_with_key: opened pipe \netlogon to machine itcs-dc02.adsroot.itcs.umich.edu for domain UMROOT and bound using schannel.
- smb_signing_md5: sequence number 16
- smb_signing_sign_pdu: sent SMB signature of
- [0000] A9 E6 D4 61 2B 9E D5 AE ...a+...
- smb_signing_md5: sequence number 17
- smb_signing_check_pdu: seq 17: got good SMB signature of
- [0000] E2 4A 8A 8D 98 B2 70 24 .J....p$
- rpc_pipe_destructor: closed \netlogon
- netr_DsRGetDCName: struct netr_DsRGetDCName
- in: struct netr_DsRGetDCName
- server_unc : *
- server_unc : 'itcs-dc02.adsroot.itcs.umich.edu'
- domain_name : *
- domain_name : 'MPATHWAYS2'
- domain_guid : NULL
- site_guid : NULL
- flags : 0x40000000 (1073741824)
- 0: DS_FORCE_REDISCOVERY
- 0: DS_DIRECTORY_SERVICE_REQUIRED
- 0: DS_DIRECTORY_SERVICE_PREFERRED
- 0: DS_GC_SERVER_REQUIRED
- 0: DS_PDC_REQUIRED
- 0: DS_BACKGROUND_ONLY
- 0: DS_IP_REQUIRED
- 0: DS_KDC_REQUIRED
- 0: DS_TIMESERV_REQUIRED
- 0: DS_WRITABLE_REQUIRED
- 0: DS_GOOD_TIMESERV_PREFERRED
- 0: DS_AVOID_SELF
- 0: DS_ONLY_LDAP_NEEDED
- 0: DS_IS_FLAT_NAME
- 0: DS_IS_DNS_NAME
- 0: DS_TRY_NEXTCLOSEST_SITE
- 0: DS_DIRECTORY_SERVICE_6_REQUIRED
- 0: DS_WEB_SERVICE_REQUIRED
- 1: DS_RETURN_DNS_NAME
- 0: DS_RETURN_FLAT_NAME
- 000000 smb_io_rpc_hdr hdr
- 0000 major : 05
- 0001 minor : 00
- 0002 pkt_type : 00
- 0003 flags : 03
- 0004 pack_type0: 10
- 0005 pack_type1: 00
- 0006 pack_type2: 00
- 0007 pack_type3: 00
- 0008 frag_len : 00c8
- 000a auth_len : 0020
- 000c call_id : 00000011
- 000010 smb_io_rpc_hdr_req hdr_req
- 0010 alloc_hint: 00000088
- 0014 context_id: 0000
- 0016 opnum : 0014
- 0000a0 smb_io_rpc_hdr_auth hdr_auth
- 00a0 auth_type : 44
- 00a1 auth_level : 06
- 00a2 auth_pad_len : 00
- 00a3 auth_reserved: 00
- 00a4 auth_context_id: 00000001
- add_schannel_auth_footer: SCHANNEL seq_num=0
- &r: struct NL_AUTH_SIGNATURE
- SignatureAlgorithm : NL_SIGN_HMAC_MD5 (0x77)
- SealAlgorithm : NL_SEAL_RC4 (0x7A)
- Pad : 0xffff (65535)
- Flags : 0x0000 (0)
- SequenceNumber : 6a2a7f2940ff31f9
- Checksum : 94356f372fb5b740
- Confounder : 551a514e0bf27559
- rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu
- num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=200, this_data=200, max_data=4280, param_offset=82, param_disp=0, data_disp=0
- smb_signing_md5: sequence number 18
- smb_signing_sign_pdu: sent SMB signature of
- [0000] 95 E2 15 58 68 90 D9 40 ...Xh..@
- smb_signing_md5: sequence number 19
- smb_signing_check_pdu: seq 19: got good SMB signature of
- [0000] CE DA 44 08 69 B8 D1 34 ..D.i..4
- 000000 smb_io_rpc_hdr rpc_hdr
- 0000 major : 05
- 0001 minor : 00
- 0002 pkt_type : 02
- 0003 flags : 03
- 0004 pack_type0: 10
- 0005 pack_type1: 00
- 0006 pack_type2: 00
- 0007 pack_type3: 00
- 0008 frag_len : 01f0
- 000a auth_len : 0020
- 000c call_id : 00000011
- 000010 smb_io_rpc_hdr_resp rpc_hdr_resp
- 0010 alloc_hint: 000001ac
- 0014 context_id: 0000
- 0016 cancel_ct : 00
- 0017 reserved : 00
- 0001c8 smb_io_rpc_hdr_auth hdr_auth
- 01c8 auth_type : 44
- 01c9 auth_level : 06
- 01ca auth_pad_len : 04
- 01cb auth_reserved: 00
- 01cc auth_context_id: 00000001
- &r: struct NL_AUTH_SIGNATURE
- SignatureAlgorithm : NL_SIGN_HMAC_MD5 (0x77)
- SealAlgorithm : NL_SEAL_RC4 (0x7A)
- Pad : 0xffff (65535)
- Flags : 0x0000 (0)
- SequenceNumber : 4a72d44c3fe4e35d
- Checksum : d0ed5a82a5cde228
- Confounder : d14880ad3c1ff254
- cli_pipe_validate_current_pdu: got pdu len 496, data_len 428, ss_len 4
- rpc_api_pipe: got frag len of 496 at offset 0: NT_STATUS_OK
- rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu returned 856 bytes.
- netr_DsRGetDCName: struct netr_DsRGetDCName
- out: struct netr_DsRGetDCName
- info : *
- info : *
- info: struct netr_DsRGetDCNameInfo
- dc_unc : *
- dc_unc : '\\hollyhock.mpathways.dsc.umich.edu'
- dc_address : *
- dc_address : '\\141.211.228.179'
- dc_address_type : DS_ADDRESS_TYPE_INET (1)
- domain_guid : e403872f-dbe3-47bb-8551-e3bd5e405650
- domain_name : *
- domain_name : 'mpathways.dsc.umich.edu'
- forest_name : *
- forest_name : 'mpathways.dsc.umich.edu'
- dc_flags : 0xe00001fc (3758096892)
- 0: DS_SERVER_PDC
- 1: DS_SERVER_GC
- 1: DS_SERVER_LDAP
- 1: DS_SERVER_DS
- 1: DS_SERVER_KDC
- 1: DS_SERVER_TIMESERV
- 1: DS_SERVER_CLOSEST
- 1: DS_SERVER_WRITABLE
- 0: DS_SERVER_GOOD_TIMESERV
- 0: DS_SERVER_NDNC
- 0: DS_SERVER_SELECT_SECRET_DOMAIN_6
- 0: DS_SERVER_FULL_SECRET_DOMAIN_6
- 1: DS_DNS_CONTROLLER
- 1: DS_DNS_DOMAIN
- 1: DS_DNS_FOREST
- dc_site_name : *
- dc_site_name : 'Default-First-Site-Name'
- client_site_name : *
- client_site_name : 'Default-First-Site-Name'
- result : WERR_OK
- rpccli_netr_GetAnyDCName returned hollyhock.mpathways.dsc.umich.edu
- Returning valid cache entry: key = AD_SITENAME/DOMAIN/ADSROOT.ITCS.UMICH.EDU, value = UM-AnnArbor-Campus, timeout = Wed Feb 6 10:06:39 2036
- sitename_fetch: Returning sitename for ADSROOT.ITCS.UMICH.EDU: "UM-AnnArbor-Campus"
- internal_resolve_name: looking up hollyhock.mpathways.dsc.umich.edu#20 (sitename UM-AnnArbor-Campus)
- Returning valid cache entry: key = NBT/HOLLYHOCK.MPATHWAYS.DSC.UMICH.EDU#20, value = 141.211.228.179:0, timeout = Thu Apr 12 14:50:43 2012
- name hollyhock.mpathways.dsc.umich.edu#20 found.
- Returning expired cache entry: key = NEG_CONN_CACHE/MPATHWAYS2,hollyhock.mpathways.dsc.umich.edu, value = c0000001, timeout = Thu Apr 12 14:42:59 2012
- Adding cache entry with key = NEG_CONN_CACHE/MPATHWAYS2,hollyhock.mpathways.dsc.umich.edu and timeout = Wed Dec 31 19:00:00 1969
- (-1334256179 seconds in the past)
- check_negative_conn_cache returning result 0 for domain MPATHWAYS2 server hollyhock.mpathways.dsc.umich.edu
- Retrieved DC hollyhock.mpathways.dsc.umich.edu at 141.211.228.179 via netlogon
- messaging_tdb_store:
- array: struct messaging_array
- num_messages : 0x00000001 (1)
- messages: ARRAY(1)
- messages: struct messaging_rec
- msg_version : 0x00000002 (2)
- msg_type : MSG_WINBIND_TRY_TO_GO_ONLINE (1030)
- dest: struct server_id
- id : 0x000051fc (20988)
- src: struct server_id
- id : 0x00005223 (21027)
- buf : DATA_BLOB length=11
- [0000] 4D 50 41 54 48 57 41 59 53 32 00 MPATHWAY S2.
- messaging_tdb_signal_handler: sig[10] count[1] msgs[1]
- message_dispatch: received_messages = 1
- messaging_tdb_fetch:
- result: struct messaging_array
- num_messages : 0x00000001 (1)
- messages: ARRAY(1)
- messages: struct messaging_rec
- msg_version : 0x00000002 (2)
- msg_type : MSG_WINBIND_TRY_TO_GO_ONLINE (1030)
- dest: struct server_id
- id : 0x000051fc (20988)
- src: struct server_id
- id : 0x00005223 (21027)
- buf : DATA_BLOB length=11
- [0000] 4D 50 41 54 48 57 41 59 53 32 00 MPATHWAY S2.
- msg_try_to_go_online: received for domain MPATHWAYS2.
- wcache_tdc_fetch_domain: Searching for domain MPATHWAYS2
- wcache_tdc_fetch_domain: Found domain MPATHWAYS2
- connection_ok: Connection to for domain MPATHWAYS2 is not connected
- Cache entry with key = SAFJOIN/DOMAIN/MPATHWAYS2 couldn't be found
- Cache entry with key = SAF/DOMAIN/MPATHWAYS2 couldn't be found
- saf_fetch: failed to find server for "MPATHWAYS2" domain
- cm_open_connection: dcname is '' for domain MPATHWAYS2
- netr_DsRGetDCName: struct netr_DsRGetDCName
- in: struct netr_DsRGetDCName
- server_unc : *
- server_unc : 'itcs-dc02.adsroot.itcs.umich.edu'
- domain_name : *
- domain_name : 'MPATHWAYS2'
- domain_guid : NULL
- site_guid : NULL
- flags : 0x40000000 (1073741824)
- 0: DS_FORCE_REDISCOVERY
- 0: DS_DIRECTORY_SERVICE_REQUIRED
- 0: DS_DIRECTORY_SERVICE_PREFERRED
- 0: DS_GC_SERVER_REQUIRED
- 0: DS_PDC_REQUIRED
- 0: DS_BACKGROUND_ONLY
- 0: DS_IP_REQUIRED
- 0: DS_KDC_REQUIRED
- 0: DS_TIMESERV_REQUIRED
- 0: DS_WRITABLE_REQUIRED
- 0: DS_GOOD_TIMESERV_PREFERRED
- 0: DS_AVOID_SELF
- 0: DS_ONLY_LDAP_NEEDED
- 0: DS_IS_FLAT_NAME
- 0: DS_IS_DNS_NAME
- 0: DS_TRY_NEXTCLOSEST_SITE
- 0: DS_DIRECTORY_SERVICE_6_REQUIRED
- 0: DS_WEB_SERVICE_REQUIRED
- 1: DS_RETURN_DNS_NAME
- 0: DS_RETURN_FLAT_NAME
- 000000 smb_io_rpc_hdr hdr
- 0000 major : 05
- 0001 minor : 00
- 0002 pkt_type : 00
- 0003 flags : 03
- 0004 pack_type0: 10
- 0005 pack_type1: 00
- 0006 pack_type2: 00
- 0007 pack_type3: 00
- 0008 frag_len : 00c8
- 000a auth_len : 0020
- 000c call_id : 0000000d
- 000010 smb_io_rpc_hdr_req hdr_req
- 0010 alloc_hint: 00000088
- 0014 context_id: 0000
- 0016 opnum : 0014
- 0000a0 smb_io_rpc_hdr_auth hdr_auth
- 00a0 auth_type : 44
- 00a1 auth_level : 06
- 00a2 auth_pad_len : 00
- 00a3 auth_reserved: 00
- 00a4 auth_context_id: 00000001
- add_schannel_auth_footer: SCHANNEL seq_num=6
- &r: struct NL_AUTH_SIGNATURE
- SignatureAlgorithm : NL_SIGN_HMAC_MD5 (0x77)
- SealAlgorithm : NL_SEAL_RC4 (0x7A)
- Pad : 0xffff (65535)
- Flags : 0x0000 (0)
- SequenceNumber : 5b1836c921cad5d1
- Checksum : 097956a66e843981
- Confounder : 5c5bea0231499b2f
- rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu
- num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=200, this_data=200, max_data=4280, param_offset=82, param_disp=0, data_disp=0
- smb_signing_md5: sequence number 42
- smb_signing_sign_pdu: sent SMB signature of
- [0000] 31 30 FF 9D 03 B3 C6 BB 10......
- smb_signing_md5: sequence number 43
- smb_signing_check_pdu: seq 43: got good SMB signature of
- [0000] EF 67 C3 6E 3C ED 18 4A .g.n<..J
- 000000 smb_io_rpc_hdr rpc_hdr
- 0000 major : 05
- 0001 minor : 00
- 0002 pkt_type : 02
- 0003 flags : 03
- 0004 pack_type0: 10
- 0005 pack_type1: 00
- 0006 pack_type2: 00
- 0007 pack_type3: 00
- 0008 frag_len : 01f0
- 000a auth_len : 0020
- 000c call_id : 0000000d
- 000010 smb_io_rpc_hdr_resp rpc_hdr_resp
- 0010 alloc_hint: 000001ac
- 0014 context_id: 0000
- 0016 cancel_ct : 00
- 0017 reserved : 00
- 0001c8 smb_io_rpc_hdr_auth hdr_auth
- 01c8 auth_type : 44
- 01c9 auth_level : 06
- 01ca auth_pad_len : 04
- 01cb auth_reserved: 00
- 01cc auth_context_id: 00000001
- &r: struct NL_AUTH_SIGNATURE
- SignatureAlgorithm : NL_SIGN_HMAC_MD5 (0x77)
- SealAlgorithm : NL_SEAL_RC4 (0x7A)
- Pad : 0xffff (65535)
- Flags : 0x0000 (0)
- SequenceNumber : 836d154c64bb2de1
- Checksum : 2e27e495ee4a69ae
- Confounder : b1b2c6b672eeab9b
- cli_pipe_validate_current_pdu: got pdu len 496, data_len 428, ss_len 4
- rpc_api_pipe: got frag len of 496 at offset 0: NT_STATUS_OK
- rpc_api_pipe: host itcs-dc02.adsroot.itcs.umich.edu returned 856 bytes.
- netr_DsRGetDCName: struct netr_DsRGetDCName
- out: struct netr_DsRGetDCName
- info : *
- info : *
- info: struct netr_DsRGetDCNameInfo
- dc_unc : *
- dc_unc : '\\hollyhock.mpathways.dsc.umich.edu'
- dc_address : *
- dc_address : '\\141.211.228.179'
- dc_address_type : DS_ADDRESS_TYPE_INET (1)
- domain_guid : e403872f-dbe3-47bb-8551-e3bd5e405650
- domain_name : *
- domain_name : 'mpathways.dsc.umich.edu'
- forest_name : *
- forest_name : 'mpathways.dsc.umich.edu'
- dc_flags : 0xe00001fc (3758096892)
- 0: DS_SERVER_PDC
- 1: DS_SERVER_GC
- 1: DS_SERVER_LDAP
- 1: DS_SERVER_DS
- 1: DS_SERVER_KDC
- 1: DS_SERVER_TIMESERV
- 1: DS_SERVER_CLOSEST
- 1: DS_SERVER_WRITABLE
- 0: DS_SERVER_GOOD_TIMESERV
- 0: DS_SERVER_NDNC
- 0: DS_SERVER_SELECT_SECRET_DOMAIN_6
- 0: DS_SERVER_FULL_SECRET_DOMAIN_6
- 1: DS_DNS_CONTROLLER
- 1: DS_DNS_DOMAIN
- 1: DS_DNS_FOREST
- dc_site_name : *
- dc_site_name : 'Default-First-Site-Name'
- client_site_name : *
- client_site_name : 'Default-First-Site-Name'
- result : WERR_OK
- rpccli_netr_GetAnyDCName returned hollyhock.mpathways.dsc.umich.edu
- Returning valid cache entry: key = AD_SITENAME/DOMAIN/ADSROOT.ITCS.UMICH.EDU, value = UM-AnnArbor-Campus, timeout = Wed Feb 6 10:06:39 2036
- sitename_fetch: Returning sitename for ADSROOT.ITCS.UMICH.EDU: "UM-AnnArbor-Campus"
- internal_resolve_name: looking up hollyhock.mpathways.dsc.umich.edu#20 (sitename UM-AnnArbor-Campus)
- Returning valid cache entry: key = NBT/HOLLYHOCK.MPATHWAYS.DSC.UMICH.EDU#20, value = 141.211.228.179:0, timeout = Thu Apr 12 14:50:43 2012
- name hollyhock.mpathways.dsc.umich.edu#20 found.
- Returning expired cache entry: key = NEG_CONN_CACHE/MPATHWAYS2,hollyhock.mpathways.dsc.umich.edu, value = , timeout = Wed Dec 31 19:00:00 1969
- check_negative_conn_cache returning result 0 for domain MPATHWAYS2 server hollyhock.mpathways.dsc.umich.edu
- Retrieved DC hollyhock.mpathways.dsc.umich.edu at 141.211.228.179 via netlogon
- Connecting to 141.211.228.179 at port 445
- Running timed event "tevent_req_timedout" 0x7f3bca8227b0
- Connecting to 141.211.228.179 at port 139
- find_new_dc: smbsock_any_connect failed for domain MPATHWAYS2 address 141.211.228.179. Error was NT_STATUS_CONNECTION_REFUSED
- Adding cache entry with key = NEG_CONN_CACHE/MPATHWAYS2,hollyhock.mpathways.dsc.umich.edu and timeout = Thu Apr 12 14:43:29 2012
- (30 seconds ahead)
- add_failed_connection_entry: added domain MPATHWAYS2 (hollyhock.mpathways.dsc.umich.edu) to failed conn cache
- Deleting cache entry (key = SAFJOIN/DOMAIN/MPATHWAYS2)
- Cache entry with key = SAFJOIN/DOMAIN/MPATHWAYS2 couldn't be found
- Deleting cache entry (key = SAF/DOMAIN/MPATHWAYS2)
- Cache entry with key = SAF/DOMAIN/MPATHWAYS2 couldn't be found
- Adding cache entry with key = NEG_CONN_CACHE/mpathways.dsc.umich.edu,hollyhock.mpathways.dsc.umich.edu and timeout = Thu Apr 12 14:43:29 2012
- (30 seconds ahead)
- add_failed_connection_entry: added domain mpathways.dsc.umich.edu (hollyhock.mpathways.dsc.umich.edu) to failed conn cache
- Deleting cache entry (key = SAFJOIN/DOMAIN/MPATHWAYS.DSC.UMICH.EDU)
- Cache entry with key = SAFJOIN/DOMAIN/MPATHWAYS.DSC.UMICH.EDU couldn't be found
- Deleting cache entry (key = SAF/DOMAIN/MPATHWAYS.DSC.UMICH.EDU)
- Cache entry with key = SAF/DOMAIN/MPATHWAYS.DSC.UMICH.EDU couldn't be found
- set_global_winbindd_state_offline: offline requested.
- set_global_winbindd_state_offline: rejecting.
- set_domain_offline: called for domain MPATHWAYS2
- set_domain_offline: added event handler for domain MPATHWAYS2
- timed_events_timeout: 29/999971
- timed_events_timeout: 29/999936
- Got sig[2] terminate (is_parent=1)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement