daily pastebin goal
94%
SHARE
TWEET

Untitled

a guest Jun 17th, 2017 479 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. @ Pull new source changes
  2. Already up-to-date.
  3. Status: OK
  4.  
  5. @ Run autogen.sh && configure.developer && make
  6. Status: OK
  7.  
  8. @ Kill Samba4 deamon
  9. Status: OK
  10.  
  11. @ Delete old Samba4 binaries
  12. Status: OK
  13.  
  14. @ Insatall fresh Samba4 binaries
  15. Status: OK
  16.  
  17. @ Get current Samba4 version
  18. Version 4.0.0alpha14-GIT-51bc104+
  19.  
  20. @ Revert Windows server to clean state
  21. Status: OK
  22.  
  23. @ Test network connection to Windows server
  24. PING 10.191.44.13 (10.191.44.13) 56(84) bytes of data.
  25.  
  26. --- 10.191.44.13 ping statistics ---
  27. 10 packets transmitted, 10 received, 0% packet loss, time 8999ms
  28. rtt min/avg/max/mdev = 0.306/0.708/4.048/1.113 ms
  29. Status: OK
  30.  
  31. @ Check Domain & Forest functional levels of Windows server (via LDAP)
  32. # record 1
  33. dn:
  34. domainFunctionality: 0
  35. forestFunctionality: 0
  36.  
  37. # returned 1 records
  38. # 1 entries
  39. # 0 referrals
  40. Status: OK
  41.  
  42. @ Synchronize time with Windows server
  43. 28 Sep 16:17:01 ntpdate[9346]: adjust time server 10.191.44.13 offset 0.044697 sec
  44. Status: OK
  45.  
  46. @ Test Kerberos connection to Windows server
  47. Password for Administrator@AUTOREPL2.TEST:
  48. Authenticated to Kerberos v5
  49. Status: OK
  50.  
  51. @ Vampire  from Windows server
  52. adding hidden service IPC$
  53. adding hidden service ADMIN$
  54. added interface ip=10.191.44.12 nmask=255.255.0.0
  55. added interface ip=10.191.44.12 nmask=255.255.0.0
  56. Mapped to DCERPC endpoint \pipe\lsarpc
  57. added interface ip=10.191.44.12 nmask=255.255.0.0
  58. added interface ip=10.191.44.12 nmask=255.255.0.0
  59. Shutdown SMB signing
  60. BSRSPYL SMB signing enabled
  61. Shutdown SMB signing
  62. Starting GENSEC mechanism spnego
  63. Server claims it's principal name is not_defined_in_RFC4178@please_ignore
  64. Starting GENSEC submechanism gssapi_krb5
  65. Failed to get CCACHE for GSSAPI client: Cannot contact any KDC for requested realm
  66. Cannot reach a KDC we require to contact cifs/win2008R2-b.autorepl2.test@AUTOREPL2.TEST : kinit for administrator@AUTOREPL2.TEST failed (Cannot contact any KDC for requested realm: unable to reach any KDC in realm AUTOREPL2.TEST)
  67.  
  68. Failed to start GENSEC client mech gssapi_krb5: NT_STATUS_INVALID_PARAMETER
  69. Starting GENSEC submechanism ntlmssp
  70. Got challenge flags:
  71. Got NTLMSSP neg_flags=0x62898215
  72.   NTLMSSP_NEGOTIATE_UNICODE
  73.   NTLMSSP_REQUEST_TARGET
  74.   NTLMSSP_NEGOTIATE_SIGN
  75.   NTLMSSP_NEGOTIATE_NTLM
  76.   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  77.   NTLMSSP_NEGOTIATE_NTLM2
  78.   NTLMSSP_NEGOTIATE_TARGET_INFO
  79.   NTLMSSP_NEGOTIATE_VERSION
  80.   NTLMSSP_NEGOTIATE_128
  81.   NTLMSSP_NEGOTIATE_KEY_EXCH
  82. NTLMSSP challenge set by NTLM2
  83. challenge is:
  84. [0000] 1A E0 71 81 E3 1A 74 75                            ..q...tu
  85. NTLMSSP: Set final flags:
  86. Got NTLMSSP neg_flags=0x60088215
  87.   NTLMSSP_NEGOTIATE_UNICODE
  88.   NTLMSSP_REQUEST_TARGET
  89.   NTLMSSP_NEGOTIATE_SIGN
  90.   NTLMSSP_NEGOTIATE_NTLM
  91.   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  92.   NTLMSSP_NEGOTIATE_NTLM2
  93.   NTLMSSP_NEGOTIATE_128
  94.   NTLMSSP_NEGOTIATE_KEY_EXCH
  95. SMB signing enabled!
  96. [0000] F7 CB 7A F7 0A 04 E7 11                            ..z.....
  97. Seen valid packet, so turning signing on
  98. Seen valid packet, so marking signing as 'seen valid'
  99. sign_outgoing_message: SENT SIG (seq: 2): sent SMB signature of
  100. [0000] BE 83 50 8F F7 9D 5A B9                            ..P...Z.
  101. [0000] EE 53 5F 6B 95 B4 6A 93                            .S_k..j.
  102. sign_outgoing_message: SENT SIG (seq: 4): sent SMB signature of
  103. [0000] ED 28 38 EB D4 23 E8 5F                            .(8..#._
  104. [0000] 50 48 49 53 EE F7 79 E1                            PHIS..y.
  105. sign_outgoing_message: SENT SIG (seq: 6): sent SMB signature of
  106. [0000] D4 58 5B 9F DE D1 FF 15                            .X[.....
  107. [0000] 03 78 9F 79 17 90 38 29                            .x.y..8)
  108. sign_outgoing_message: SENT SIG (seq: 8): sent SMB signature of
  109. [0000] BA 5D 87 7A C3 58 3B 2E                            .].z.X;.
  110. [0000] D5 44 A9 14 E9 D0 E7 B5                            .D......
  111. sign_outgoing_message: SENT SIG (seq: 10): sent SMB signature of
  112. [0000] F3 27 AB 37 6D B5 1C 22                            .'.7m.."
  113. [0000] 24 51 62 11 0E 14 6E FE                            $Qb...n.
  114. sign_outgoing_message: SENT SIG (seq: 12): sent SMB signature of
  115. [0000] FE 70 0C 35 74 E6 44 05                            .p.5t.D.
  116. [0000] ED 21 7F 8D 67 76 3A 5D                            .!..gv:]
  117. sign_outgoing_message: SENT SIG (seq: 14): sent SMB signature of
  118. [0000] 22 4A 42 1F 9B 21 D4 03                            "JB..!..
  119. [0000] 09 B3 C6 ED 65 3B 47 4D                            ....e;GM
  120. sign_outgoing_message: SENT SIG (seq: 16): sent SMB signature of
  121. [0000] 98 76 64 D9 28 98 2E D1                            .vd.(...
  122. [0000] E8 D9 4C CE D0 58 CC F1                            ..L..X..
  123. sign_outgoing_message: SENT SIG (seq: 18): sent SMB signature of
  124. [0000] 9C 03 58 1F 56 03 ED 0D                            ..X.V...
  125. [0000] F9 7D B2 60 4F 10 53 BA                            .}.`O.S.
  126. sign_outgoing_message: SENT SIG (seq: 20): sent SMB signature of
  127. [0000] AB C5 CE 8A 57 7E 59 1E                            ....W~Y.
  128. [0000] 72 B6 2B 1A 7F F3 76 9A                            r.+...v.
  129. sign_outgoing_message: SENT SIG (seq: 22): sent SMB signature of
  130. [0000] CA 25 FF D4 12 F3 21 5F                            .%....!_
  131. [0000] 76 12 5A CE F8 54 23 2E                            v.Z..T#.
  132. sign_outgoing_message: SENT SIG (seq: 24): sent SMB signature of
  133. [0000] D1 BE 67 7F 1F D9 39 8C                            ..g...9.
  134. [0000] AE B7 BB 74 04 F5 E2 99                            ...t....
  135. sign_outgoing_message: SENT SIG (seq: 26): sent SMB signature of
  136. [0000] A4 64 87 15 52 43 E3 4E                            .d..RC.N
  137. [0000] D4 5E 8F 79 E2 0E 04 78                            .^.y...x
  138. sign_outgoing_message: SENT SIG (seq: 28): sent SMB signature of
  139. [0000] 55 91 8F 88 00 67 33 F9                            U....g3.
  140. [0000] CC 7A 26 84 18 25 EF 27                            .z&..%.'
  141. Mapped to DCERPC endpoint 135
  142. added interface ip=10.191.44.12 nmask=255.255.0.0
  143. added interface ip=10.191.44.12 nmask=255.255.0.0
  144. Mapped to DCERPC endpoint 49156
  145. added interface ip=10.191.44.12 nmask=255.255.0.0
  146. added interface ip=10.191.44.12 nmask=255.255.0.0
  147. Starting GENSEC mechanism spnego
  148. Starting GENSEC submechanism gssapi_krb5
  149. Failed to get CCACHE for GSSAPI client: Cannot contact any KDC for requested realm
  150. Cannot reach a KDC we require to contact ldap/WIN2008R2-B.AUTOREPL2.TEST@AUTOREPL2.TEST : kinit for administrator@AUTOREPL2.TEST failed (Cannot contact any KDC for requested realm: unable to reach any KDC in realm AUTOREPL2.TEST)
  151.  
  152. Failed to start GENSEC client mech gssapi_krb5: NT_STATUS_INVALID_PARAMETER
  153. Starting GENSEC submechanism ntlmssp
  154. Got challenge flags:
  155. Got NTLMSSP neg_flags=0x62898235
  156.   NTLMSSP_NEGOTIATE_UNICODE
  157.   NTLMSSP_REQUEST_TARGET
  158.   NTLMSSP_NEGOTIATE_SIGN
  159.   NTLMSSP_NEGOTIATE_SEAL
  160.   NTLMSSP_NEGOTIATE_NTLM
  161.   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  162.   NTLMSSP_NEGOTIATE_NTLM2
  163.   NTLMSSP_NEGOTIATE_TARGET_INFO
  164.   NTLMSSP_NEGOTIATE_VERSION
  165.   NTLMSSP_NEGOTIATE_128
  166.   NTLMSSP_NEGOTIATE_KEY_EXCH
  167. NTLMSSP challenge set by NTLM2
  168. challenge is:
  169. [0000] 42 FB C3 1C AB A0 05 A3                            B.......
  170. NTLMSSP: Set final flags:
  171. Got NTLMSSP neg_flags=0x60088235
  172.   NTLMSSP_NEGOTIATE_UNICODE
  173.   NTLMSSP_REQUEST_TARGET
  174.   NTLMSSP_NEGOTIATE_SIGN
  175.   NTLMSSP_NEGOTIATE_SEAL
  176.   NTLMSSP_NEGOTIATE_NTLM
  177.   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  178.   NTLMSSP_NEGOTIATE_NTLM2
  179.   NTLMSSP_NEGOTIATE_128
  180.   NTLMSSP_NEGOTIATE_KEY_EXCH
  181. NTLMSSP Sign/Seal - Initialising with flags:
  182. Got NTLMSSP neg_flags=0x60088235
  183.   NTLMSSP_NEGOTIATE_UNICODE
  184.   NTLMSSP_REQUEST_TARGET
  185.   NTLMSSP_NEGOTIATE_SIGN
  186.   NTLMSSP_NEGOTIATE_SEAL
  187.   NTLMSSP_NEGOTIATE_NTLM
  188.   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  189.   NTLMSSP_NEGOTIATE_NTLM2
  190.   NTLMSSP_NEGOTIATE_128
  191.   NTLMSSP_NEGOTIATE_KEY_EXCH
  192. added interface ip=10.191.44.12 nmask=255.255.0.0
  193. added interface ip=10.191.44.12 nmask=255.255.0.0
  194. Starting GENSEC mechanism spnego
  195. Starting GENSEC submechanism gssapi_krb5
  196. Failed to get CCACHE for GSSAPI client: Cannot contact any KDC for requested realm
  197. Cannot reach a KDC we require to contact ldap/win2008R2-b.autorepl2.test@AUTOREPL2.TEST : kinit for administrator@AUTOREPL2.TEST failed (Cannot contact any KDC for requested realm: unable to reach any KDC in realm AUTOREPL2.TEST)
  198.  
  199. Failed to start GENSEC client mech gssapi_krb5: NT_STATUS_INVALID_PARAMETER
  200. Starting GENSEC submechanism ntlmssp
  201. Got challenge flags:
  202. Got NTLMSSP neg_flags=0x62898205
  203.   NTLMSSP_NEGOTIATE_UNICODE
  204.   NTLMSSP_REQUEST_TARGET
  205.   NTLMSSP_NEGOTIATE_NTLM
  206.   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  207.   NTLMSSP_NEGOTIATE_NTLM2
  208.   NTLMSSP_NEGOTIATE_TARGET_INFO
  209.   NTLMSSP_NEGOTIATE_VERSION
  210.   NTLMSSP_NEGOTIATE_128
  211.   NTLMSSP_NEGOTIATE_KEY_EXCH
  212. NTLMSSP challenge set by NTLM2
  213. challenge is:
  214. [0000] 16 93 DB 59 DD E4 55 33                            ...Y..U3
  215. NTLMSSP: Set final flags:
  216. Got NTLMSSP neg_flags=0x60088205
  217.   NTLMSSP_NEGOTIATE_UNICODE
  218.   NTLMSSP_REQUEST_TARGET
  219.   NTLMSSP_NEGOTIATE_NTLM
  220.   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  221.   NTLMSSP_NEGOTIATE_NTLM2
  222.   NTLMSSP_NEGOTIATE_128
  223.   NTLMSSP_NEGOTIATE_KEY_EXCH
  224. ldb: No modules specified for this database
  225. ldb_wrap open of ldap://win2008R2-b.autorepl2.test
  226. ldb: start ldb transaction (nesting: 0)
  227. ldb: commit ldb transaction (nesting: 0)
  228. ldb: start ldb transaction (nesting: 0)
  229. ldb: commit ldb transaction (nesting: 0)
  230. CLDAP response: forest=autorepl2.test dns=autorepl2.test netbios=AUTOREPL02 server_site=Default-First-Site-Name  client_site=Default-First-Site-Name
  231. added interface ip=10.191.44.12 nmask=255.255.0.0
  232. added interface ip=10.191.44.12 nmask=255.255.0.0
  233. Starting GENSEC mechanism spnego
  234. Starting GENSEC submechanism gssapi_krb5
  235. Failed to get CCACHE for GSSAPI client: Cannot contact any KDC for requested realm
  236. Cannot reach a KDC we require to contact ldap/win2008R2-b.autorepl2.test@AUTOREPL2.TEST : kinit for administrator@AUTOREPL2.TEST failed (Cannot contact any KDC for requested realm: unable to reach any KDC in realm AUTOREPL2.TEST)
  237.  
  238. Failed to start GENSEC client mech gssapi_krb5: NT_STATUS_INVALID_PARAMETER
  239. Starting GENSEC submechanism ntlmssp
  240. Got challenge flags:
  241. Got NTLMSSP neg_flags=0x62898205
  242.   NTLMSSP_NEGOTIATE_UNICODE
  243.   NTLMSSP_REQUEST_TARGET
  244.   NTLMSSP_NEGOTIATE_NTLM
  245.   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  246.   NTLMSSP_NEGOTIATE_NTLM2
  247.   NTLMSSP_NEGOTIATE_TARGET_INFO
  248.   NTLMSSP_NEGOTIATE_VERSION
  249.   NTLMSSP_NEGOTIATE_128
  250.   NTLMSSP_NEGOTIATE_KEY_EXCH
  251. NTLMSSP challenge set by NTLM2
  252. challenge is:
  253. [0000] C5 FF 24 8F B6 18 BF DB                            ..$.....
  254. NTLMSSP: Set final flags:
  255. Got NTLMSSP neg_flags=0x60088205
  256.   NTLMSSP_NEGOTIATE_UNICODE
  257.   NTLMSSP_REQUEST_TARGET
  258.   NTLMSSP_NEGOTIATE_NTLM
  259.   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  260.   NTLMSSP_NEGOTIATE_NTLM2
  261.   NTLMSSP_NEGOTIATE_128
  262.   NTLMSSP_NEGOTIATE_KEY_EXCH
  263. ldb: No modules specified for this database
  264. ldb_wrap open of ldap://win2008R2-b.autorepl2.test/
  265. Become DC [UBUNTU1] of Domain[AUTOREPL02]/[autorepl2.test]
  266. Promotion Partner is Server[win2008R2-b.autorepl2.test] from Site[Default-First-Site-Name]
  267. Options:crossRef behavior_version[0]
  268.     schema object_version[47]
  269.     domain behavior_version[0]
  270.     domain w2k3_update_revision[9]
  271. ldb: start ldb transaction (nesting: 0)
  272. ldb: commit ldb transaction (nesting: 0)
  273. ldb: start ldb transaction (nesting: 0)
  274. ldb: cancel ldb transaction (nesting: 0)
  275. ldb: start ldb transaction (nesting: 0)
  276. ldb: commit ldb transaction (nesting: 0)
  277. Mapped to DCERPC endpoint 135
  278. added interface ip=10.191.44.12 nmask=255.255.0.0
  279. added interface ip=10.191.44.12 nmask=255.255.0.0
  280. Mapped to DCERPC endpoint 49156
  281. added interface ip=10.191.44.12 nmask=255.255.0.0
  282. added interface ip=10.191.44.12 nmask=255.255.0.0
  283. Starting GENSEC mechanism gssapi_krb5
  284. Failed to get CCACHE for GSSAPI client: Cannot contact any KDC for requested realm
  285. Cannot reach a KDC we require to contact ldap/WIN2008R2-B.AUTOREPL2.TEST@AUTOREPL2.TEST : kinit for administrator@AUTOREPL2.TEST failed (Cannot contact any KDC for requested realm: unable to reach any KDC in realm AUTOREPL2.TEST)
  286.  
  287. Failed to start GENSEC client mech gssapi_krb5: NT_STATUS_INVALID_PARAMETER
  288. Failed to start GENSEC client mechanism gssapi_krb5: NT_STATUS_INVALID_PARAMETER
  289. Failed to bind to uuid e3514235-4b06-11d1-ab04-00c04fc2dcd2 - NT_STATUS_INVALID_PARAMETER
  290. libnet_BecomeDC() failed - NT_STATUS_INVALID_PARAMETER
  291. Traceback (most recent call last):
  292.   File "bin/python/samba/netcmd/__init__.py", line 99, in _run
  293.     return self.run(*args, **kwargs)
  294.   File "bin/python/samba/netcmd/vampire.py", line 51, in run
  295.     (domain_name, domain_sid) = net.vampire(domain=domain, target_dir=target_dir)
  296. RuntimeError: NT_STATUS_INVALID_PARAMETER
  297. Status: FAILED
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top