Advertisement
Guest User

Untitled

a guest
Jun 17th, 2017
506
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 12.40 KB | None | 0 0
  1. @ Pull new source changes
  2. Already up-to-date.
  3. Status: OK
  4.  
  5. @ Run autogen.sh && configure.developer && make
  6. Status: OK
  7.  
  8. @ Kill Samba4 deamon
  9. Status: OK
  10.  
  11. @ Delete old Samba4 binaries
  12. Status: OK
  13.  
  14. @ Insatall fresh Samba4 binaries
  15. Status: OK
  16.  
  17. @ Get current Samba4 version
  18. Version 4.0.0alpha14-GIT-51bc104+
  19.  
  20. @ Revert Windows server to clean state
  21. Status: OK
  22.  
  23. @ Test network connection to Windows server
  24. PING 10.191.44.13 (10.191.44.13) 56(84) bytes of data.
  25.  
  26. --- 10.191.44.13 ping statistics ---
  27. 10 packets transmitted, 10 received, 0% packet loss, time 8999ms
  28. rtt min/avg/max/mdev = 0.306/0.708/4.048/1.113 ms
  29. Status: OK
  30.  
  31. @ Check Domain & Forest functional levels of Windows server (via LDAP)
  32. # record 1
  33. dn:
  34. domainFunctionality: 0
  35. forestFunctionality: 0
  36.  
  37. # returned 1 records
  38. # 1 entries
  39. # 0 referrals
  40. Status: OK
  41.  
  42. @ Synchronize time with Windows server
  43. 28 Sep 16:17:01 ntpdate[9346]: adjust time server 10.191.44.13 offset 0.044697 sec
  44. Status: OK
  45.  
  46. @ Test Kerberos connection to Windows server
  47. Password for Administrator@AUTOREPL2.TEST:
  48. Authenticated to Kerberos v5
  49. Status: OK
  50.  
  51. @ Vampire from Windows server
  52. adding hidden service IPC$
  53. adding hidden service ADMIN$
  54. added interface ip=10.191.44.12 nmask=255.255.0.0
  55. added interface ip=10.191.44.12 nmask=255.255.0.0
  56. Mapped to DCERPC endpoint \pipe\lsarpc
  57. added interface ip=10.191.44.12 nmask=255.255.0.0
  58. added interface ip=10.191.44.12 nmask=255.255.0.0
  59. Shutdown SMB signing
  60. BSRSPYL SMB signing enabled
  61. Shutdown SMB signing
  62. Starting GENSEC mechanism spnego
  63. Server claims it's principal name is not_defined_in_RFC4178@please_ignore
  64. Starting GENSEC submechanism gssapi_krb5
  65. Failed to get CCACHE for GSSAPI client: Cannot contact any KDC for requested realm
  66. Cannot reach a KDC we require to contact cifs/win2008R2-b.autorepl2.test@AUTOREPL2.TEST : kinit for administrator@AUTOREPL2.TEST failed (Cannot contact any KDC for requested realm: unable to reach any KDC in realm AUTOREPL2.TEST)
  67.  
  68. Failed to start GENSEC client mech gssapi_krb5: NT_STATUS_INVALID_PARAMETER
  69. Starting GENSEC submechanism ntlmssp
  70. Got challenge flags:
  71. Got NTLMSSP neg_flags=0x62898215
  72. NTLMSSP_NEGOTIATE_UNICODE
  73. NTLMSSP_REQUEST_TARGET
  74. NTLMSSP_NEGOTIATE_SIGN
  75. NTLMSSP_NEGOTIATE_NTLM
  76. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  77. NTLMSSP_NEGOTIATE_NTLM2
  78. NTLMSSP_NEGOTIATE_TARGET_INFO
  79. NTLMSSP_NEGOTIATE_VERSION
  80. NTLMSSP_NEGOTIATE_128
  81. NTLMSSP_NEGOTIATE_KEY_EXCH
  82. NTLMSSP challenge set by NTLM2
  83. challenge is:
  84. [0000] 1A E0 71 81 E3 1A 74 75 ..q...tu
  85. NTLMSSP: Set final flags:
  86. Got NTLMSSP neg_flags=0x60088215
  87. NTLMSSP_NEGOTIATE_UNICODE
  88. NTLMSSP_REQUEST_TARGET
  89. NTLMSSP_NEGOTIATE_SIGN
  90. NTLMSSP_NEGOTIATE_NTLM
  91. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  92. NTLMSSP_NEGOTIATE_NTLM2
  93. NTLMSSP_NEGOTIATE_128
  94. NTLMSSP_NEGOTIATE_KEY_EXCH
  95. SMB signing enabled!
  96. [0000] F7 CB 7A F7 0A 04 E7 11 ..z.....
  97. Seen valid packet, so turning signing on
  98. Seen valid packet, so marking signing as 'seen valid'
  99. sign_outgoing_message: SENT SIG (seq: 2): sent SMB signature of
  100. [0000] BE 83 50 8F F7 9D 5A B9 ..P...Z.
  101. [0000] EE 53 5F 6B 95 B4 6A 93 .S_k..j.
  102. sign_outgoing_message: SENT SIG (seq: 4): sent SMB signature of
  103. [0000] ED 28 38 EB D4 23 E8 5F .(8..#._
  104. [0000] 50 48 49 53 EE F7 79 E1 PHIS..y.
  105. sign_outgoing_message: SENT SIG (seq: 6): sent SMB signature of
  106. [0000] D4 58 5B 9F DE D1 FF 15 .X[.....
  107. [0000] 03 78 9F 79 17 90 38 29 .x.y..8)
  108. sign_outgoing_message: SENT SIG (seq: 8): sent SMB signature of
  109. [0000] BA 5D 87 7A C3 58 3B 2E .].z.X;.
  110. [0000] D5 44 A9 14 E9 D0 E7 B5 .D......
  111. sign_outgoing_message: SENT SIG (seq: 10): sent SMB signature of
  112. [0000] F3 27 AB 37 6D B5 1C 22 .'.7m.."
  113. [0000] 24 51 62 11 0E 14 6E FE $Qb...n.
  114. sign_outgoing_message: SENT SIG (seq: 12): sent SMB signature of
  115. [0000] FE 70 0C 35 74 E6 44 05 .p.5t.D.
  116. [0000] ED 21 7F 8D 67 76 3A 5D .!..gv:]
  117. sign_outgoing_message: SENT SIG (seq: 14): sent SMB signature of
  118. [0000] 22 4A 42 1F 9B 21 D4 03 "JB..!..
  119. [0000] 09 B3 C6 ED 65 3B 47 4D ....e;GM
  120. sign_outgoing_message: SENT SIG (seq: 16): sent SMB signature of
  121. [0000] 98 76 64 D9 28 98 2E D1 .vd.(...
  122. [0000] E8 D9 4C CE D0 58 CC F1 ..L..X..
  123. sign_outgoing_message: SENT SIG (seq: 18): sent SMB signature of
  124. [0000] 9C 03 58 1F 56 03 ED 0D ..X.V...
  125. [0000] F9 7D B2 60 4F 10 53 BA .}.`O.S.
  126. sign_outgoing_message: SENT SIG (seq: 20): sent SMB signature of
  127. [0000] AB C5 CE 8A 57 7E 59 1E ....W~Y.
  128. [0000] 72 B6 2B 1A 7F F3 76 9A r.+...v.
  129. sign_outgoing_message: SENT SIG (seq: 22): sent SMB signature of
  130. [0000] CA 25 FF D4 12 F3 21 5F .%....!_
  131. [0000] 76 12 5A CE F8 54 23 2E v.Z..T#.
  132. sign_outgoing_message: SENT SIG (seq: 24): sent SMB signature of
  133. [0000] D1 BE 67 7F 1F D9 39 8C ..g...9.
  134. [0000] AE B7 BB 74 04 F5 E2 99 ...t....
  135. sign_outgoing_message: SENT SIG (seq: 26): sent SMB signature of
  136. [0000] A4 64 87 15 52 43 E3 4E .d..RC.N
  137. [0000] D4 5E 8F 79 E2 0E 04 78 .^.y...x
  138. sign_outgoing_message: SENT SIG (seq: 28): sent SMB signature of
  139. [0000] 55 91 8F 88 00 67 33 F9 U....g3.
  140. [0000] CC 7A 26 84 18 25 EF 27 .z&..%.'
  141. Mapped to DCERPC endpoint 135
  142. added interface ip=10.191.44.12 nmask=255.255.0.0
  143. added interface ip=10.191.44.12 nmask=255.255.0.0
  144. Mapped to DCERPC endpoint 49156
  145. added interface ip=10.191.44.12 nmask=255.255.0.0
  146. added interface ip=10.191.44.12 nmask=255.255.0.0
  147. Starting GENSEC mechanism spnego
  148. Starting GENSEC submechanism gssapi_krb5
  149. Failed to get CCACHE for GSSAPI client: Cannot contact any KDC for requested realm
  150. Cannot reach a KDC we require to contact ldap/WIN2008R2-B.AUTOREPL2.TEST@AUTOREPL2.TEST : kinit for administrator@AUTOREPL2.TEST failed (Cannot contact any KDC for requested realm: unable to reach any KDC in realm AUTOREPL2.TEST)
  151.  
  152. Failed to start GENSEC client mech gssapi_krb5: NT_STATUS_INVALID_PARAMETER
  153. Starting GENSEC submechanism ntlmssp
  154. Got challenge flags:
  155. Got NTLMSSP neg_flags=0x62898235
  156. NTLMSSP_NEGOTIATE_UNICODE
  157. NTLMSSP_REQUEST_TARGET
  158. NTLMSSP_NEGOTIATE_SIGN
  159. NTLMSSP_NEGOTIATE_SEAL
  160. NTLMSSP_NEGOTIATE_NTLM
  161. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  162. NTLMSSP_NEGOTIATE_NTLM2
  163. NTLMSSP_NEGOTIATE_TARGET_INFO
  164. NTLMSSP_NEGOTIATE_VERSION
  165. NTLMSSP_NEGOTIATE_128
  166. NTLMSSP_NEGOTIATE_KEY_EXCH
  167. NTLMSSP challenge set by NTLM2
  168. challenge is:
  169. [0000] 42 FB C3 1C AB A0 05 A3 B.......
  170. NTLMSSP: Set final flags:
  171. Got NTLMSSP neg_flags=0x60088235
  172. NTLMSSP_NEGOTIATE_UNICODE
  173. NTLMSSP_REQUEST_TARGET
  174. NTLMSSP_NEGOTIATE_SIGN
  175. NTLMSSP_NEGOTIATE_SEAL
  176. NTLMSSP_NEGOTIATE_NTLM
  177. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  178. NTLMSSP_NEGOTIATE_NTLM2
  179. NTLMSSP_NEGOTIATE_128
  180. NTLMSSP_NEGOTIATE_KEY_EXCH
  181. NTLMSSP Sign/Seal - Initialising with flags:
  182. Got NTLMSSP neg_flags=0x60088235
  183. NTLMSSP_NEGOTIATE_UNICODE
  184. NTLMSSP_REQUEST_TARGET
  185. NTLMSSP_NEGOTIATE_SIGN
  186. NTLMSSP_NEGOTIATE_SEAL
  187. NTLMSSP_NEGOTIATE_NTLM
  188. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  189. NTLMSSP_NEGOTIATE_NTLM2
  190. NTLMSSP_NEGOTIATE_128
  191. NTLMSSP_NEGOTIATE_KEY_EXCH
  192. added interface ip=10.191.44.12 nmask=255.255.0.0
  193. added interface ip=10.191.44.12 nmask=255.255.0.0
  194. Starting GENSEC mechanism spnego
  195. Starting GENSEC submechanism gssapi_krb5
  196. Failed to get CCACHE for GSSAPI client: Cannot contact any KDC for requested realm
  197. Cannot reach a KDC we require to contact ldap/win2008R2-b.autorepl2.test@AUTOREPL2.TEST : kinit for administrator@AUTOREPL2.TEST failed (Cannot contact any KDC for requested realm: unable to reach any KDC in realm AUTOREPL2.TEST)
  198.  
  199. Failed to start GENSEC client mech gssapi_krb5: NT_STATUS_INVALID_PARAMETER
  200. Starting GENSEC submechanism ntlmssp
  201. Got challenge flags:
  202. Got NTLMSSP neg_flags=0x62898205
  203. NTLMSSP_NEGOTIATE_UNICODE
  204. NTLMSSP_REQUEST_TARGET
  205. NTLMSSP_NEGOTIATE_NTLM
  206. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  207. NTLMSSP_NEGOTIATE_NTLM2
  208. NTLMSSP_NEGOTIATE_TARGET_INFO
  209. NTLMSSP_NEGOTIATE_VERSION
  210. NTLMSSP_NEGOTIATE_128
  211. NTLMSSP_NEGOTIATE_KEY_EXCH
  212. NTLMSSP challenge set by NTLM2
  213. challenge is:
  214. [0000] 16 93 DB 59 DD E4 55 33 ...Y..U3
  215. NTLMSSP: Set final flags:
  216. Got NTLMSSP neg_flags=0x60088205
  217. NTLMSSP_NEGOTIATE_UNICODE
  218. NTLMSSP_REQUEST_TARGET
  219. NTLMSSP_NEGOTIATE_NTLM
  220. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  221. NTLMSSP_NEGOTIATE_NTLM2
  222. NTLMSSP_NEGOTIATE_128
  223. NTLMSSP_NEGOTIATE_KEY_EXCH
  224. ldb: No modules specified for this database
  225. ldb_wrap open of ldap://win2008R2-b.autorepl2.test
  226. ldb: start ldb transaction (nesting: 0)
  227. ldb: commit ldb transaction (nesting: 0)
  228. ldb: start ldb transaction (nesting: 0)
  229. ldb: commit ldb transaction (nesting: 0)
  230. CLDAP response: forest=autorepl2.test dns=autorepl2.test netbios=AUTOREPL02 server_site=Default-First-Site-Name client_site=Default-First-Site-Name
  231. added interface ip=10.191.44.12 nmask=255.255.0.0
  232. added interface ip=10.191.44.12 nmask=255.255.0.0
  233. Starting GENSEC mechanism spnego
  234. Starting GENSEC submechanism gssapi_krb5
  235. Failed to get CCACHE for GSSAPI client: Cannot contact any KDC for requested realm
  236. Cannot reach a KDC we require to contact ldap/win2008R2-b.autorepl2.test@AUTOREPL2.TEST : kinit for administrator@AUTOREPL2.TEST failed (Cannot contact any KDC for requested realm: unable to reach any KDC in realm AUTOREPL2.TEST)
  237.  
  238. Failed to start GENSEC client mech gssapi_krb5: NT_STATUS_INVALID_PARAMETER
  239. Starting GENSEC submechanism ntlmssp
  240. Got challenge flags:
  241. Got NTLMSSP neg_flags=0x62898205
  242. NTLMSSP_NEGOTIATE_UNICODE
  243. NTLMSSP_REQUEST_TARGET
  244. NTLMSSP_NEGOTIATE_NTLM
  245. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  246. NTLMSSP_NEGOTIATE_NTLM2
  247. NTLMSSP_NEGOTIATE_TARGET_INFO
  248. NTLMSSP_NEGOTIATE_VERSION
  249. NTLMSSP_NEGOTIATE_128
  250. NTLMSSP_NEGOTIATE_KEY_EXCH
  251. NTLMSSP challenge set by NTLM2
  252. challenge is:
  253. [0000] C5 FF 24 8F B6 18 BF DB ..$.....
  254. NTLMSSP: Set final flags:
  255. Got NTLMSSP neg_flags=0x60088205
  256. NTLMSSP_NEGOTIATE_UNICODE
  257. NTLMSSP_REQUEST_TARGET
  258. NTLMSSP_NEGOTIATE_NTLM
  259. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  260. NTLMSSP_NEGOTIATE_NTLM2
  261. NTLMSSP_NEGOTIATE_128
  262. NTLMSSP_NEGOTIATE_KEY_EXCH
  263. ldb: No modules specified for this database
  264. ldb_wrap open of ldap://win2008R2-b.autorepl2.test/
  265. Become DC [UBUNTU1] of Domain[AUTOREPL02]/[autorepl2.test]
  266. Promotion Partner is Server[win2008R2-b.autorepl2.test] from Site[Default-First-Site-Name]
  267. Options:crossRef behavior_version[0]
  268. schema object_version[47]
  269. domain behavior_version[0]
  270. domain w2k3_update_revision[9]
  271. ldb: start ldb transaction (nesting: 0)
  272. ldb: commit ldb transaction (nesting: 0)
  273. ldb: start ldb transaction (nesting: 0)
  274. ldb: cancel ldb transaction (nesting: 0)
  275. ldb: start ldb transaction (nesting: 0)
  276. ldb: commit ldb transaction (nesting: 0)
  277. Mapped to DCERPC endpoint 135
  278. added interface ip=10.191.44.12 nmask=255.255.0.0
  279. added interface ip=10.191.44.12 nmask=255.255.0.0
  280. Mapped to DCERPC endpoint 49156
  281. added interface ip=10.191.44.12 nmask=255.255.0.0
  282. added interface ip=10.191.44.12 nmask=255.255.0.0
  283. Starting GENSEC mechanism gssapi_krb5
  284. Failed to get CCACHE for GSSAPI client: Cannot contact any KDC for requested realm
  285. Cannot reach a KDC we require to contact ldap/WIN2008R2-B.AUTOREPL2.TEST@AUTOREPL2.TEST : kinit for administrator@AUTOREPL2.TEST failed (Cannot contact any KDC for requested realm: unable to reach any KDC in realm AUTOREPL2.TEST)
  286.  
  287. Failed to start GENSEC client mech gssapi_krb5: NT_STATUS_INVALID_PARAMETER
  288. Failed to start GENSEC client mechanism gssapi_krb5: NT_STATUS_INVALID_PARAMETER
  289. Failed to bind to uuid e3514235-4b06-11d1-ab04-00c04fc2dcd2 - NT_STATUS_INVALID_PARAMETER
  290. libnet_BecomeDC() failed - NT_STATUS_INVALID_PARAMETER
  291. Traceback (most recent call last):
  292. File "bin/python/samba/netcmd/__init__.py", line 99, in _run
  293. return self.run(*args, **kwargs)
  294. File "bin/python/samba/netcmd/vampire.py", line 51, in run
  295. (domain_name, domain_sid) = net.vampire(domain=domain, target_dir=target_dir)
  296. RuntimeError: NT_STATUS_INVALID_PARAMETER
  297. Status: FAILED
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement