Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- LibreELEC:~ # smbclient -d=10 -U libreelec -L 0.0.0.0
- INFO: Current debug levels:
- all: 10
- tdb: 10
- printdrivers: 10
- lanman: 10
- smb: 10
- rpc_parse: 10
- rpc_srv: 10
- rpc_cli: 10
- passdb: 10
- sam: 10
- auth: 10
- winbind: 10
- vfs: 10
- idmap: 10
- quota: 10
- acls: 10
- locking: 10
- msdfs: 10
- dmapi: 10
- registry: 10
- scavenger: 10
- dns: 10
- ldb: 10
- tevent: 10
- auth_audit: 10
- auth_json_audit: 10
- kerberos: 10
- drs_repl: 10
- smb2: 10
- smb2_credits: 10
- dsdb_audit: 10
- dsdb_json_audit: 10
- dsdb_password_audit: 10
- dsdb_password_json_audit: 10
- dsdb_transaction_audit: 10
- dsdb_transaction_json_audit: 10
- dsdb_group_audit: 10
- dsdb_group_json_audit: 10
- lp_load_ex: refreshing parameters
- Initialising global parameters
- rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
- INFO: Current debug levels:
- all: 10
- tdb: 10
- printdrivers: 10
- lanman: 10
- smb: 10
- rpc_parse: 10
- rpc_srv: 10
- rpc_cli: 10
- passdb: 10
- sam: 10
- auth: 10
- winbind: 10
- vfs: 10
- idmap: 10
- quota: 10
- acls: 10
- locking: 10
- msdfs: 10
- dmapi: 10
- registry: 10
- scavenger: 10
- dns: 10
- ldb: 10
- tevent: 10
- auth_audit: 10
- auth_json_audit: 10
- kerberos: 10
- drs_repl: 10
- smb2: 10
- smb2_credits: 10
- dsdb_audit: 10
- dsdb_json_audit: 10
- dsdb_password_audit: 10
- dsdb_password_json_audit: 10
- dsdb_transaction_audit: 10
- dsdb_transaction_json_audit: 10
- dsdb_group_audit: 10
- dsdb_group_json_audit: 10
- Processing section "[global]"
- doing parameter workgroup = WORKGROUP
- doing parameter server min protocol = SMB2
- doing parameter server max protocol = SMB3
- doing parameter server string = LibreELEC
- doing parameter browseable = yes
- doing parameter writeable = yes
- doing parameter printable = no
- doing parameter deadtime = 30
- doing parameter mangled names = no
- doing parameter name resolve order = host bcast
- doing parameter printcap name = /dev/null
- doing parameter load printers = no
- doing parameter enable core files = no
- doing parameter passdb backend = smbpasswd
- doing parameter smb encrypt = disabled
- doing parameter fruit:model = Xserve
- doing parameter map to guest = Never
- doing parameter guest account = root
- doing parameter security = user
- doing parameter username map = /run/samba/samba.map
- doing parameter socket options = TCP_NODELAY IPTOS_LOWDELAY
- doing parameter min receivefile size = 16384
- doing parameter aio read size = 16384
- doing parameter aio write size = 16384
- doing parameter use sendfile = yes
- doing parameter strict allocate = no
- pm_process() returned Yes
- lp_servicenumber: couldn't find homes
- added interface eth0 ip=192.168.188.38 bcast=192.168.188.255 netmask=255.255.255.0
- Client started (version 4.16.0).
- Connecting to 0.0.0.0 at port 445
- socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=16, IPTOS_THROUGHPUT=16, SO_REUSEPORT=0, SO_SNDBUF=2626560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
- session request ok
- negotiated dialect[SMB3_11] against server[0.0.0.0]
- Password for [WORKGROUP\libreelec]:
- cli_session_setup_spnego_send: Connect to 0.0.0.0 as libreelec@WORKGROUP using SPNEGO
- GENSEC backend 'gssapi_spnego' registered
- GENSEC backend 'gssapi_krb5' registered
- GENSEC backend 'gssapi_krb5_sasl' registered
- GENSEC backend 'spnego' registered
- GENSEC backend 'schannel' registered
- GENSEC backend 'ncalrpc_as_system' registered
- GENSEC backend 'sasl-EXTERNAL' registered
- GENSEC backend 'ntlmssp' registered
- GENSEC backend 'ntlmssp_resume_ccache' registered
- GENSEC backend 'http_basic' registered
- GENSEC backend 'http_ntlm' registered
- GENSEC backend 'http_negotiate' registered
- Starting GENSEC mechanism spnego
- Starting GENSEC submechanism gse_krb5
- Cannot do GSE to an IP address
- Failed to start GENSEC client mech gse_krb5: NT_STATUS_INVALID_PARAMETER
- Starting GENSEC submechanism ntlmssp
- negotiate: struct NEGOTIATE_MESSAGE
- Signature : 'NTLMSSP'
- MessageType : NtLmNegotiate (1)
- NegotiateFlags : 0x62088215 (1644724757)
- 1: NTLMSSP_NEGOTIATE_UNICODE
- 0: NTLMSSP_NEGOTIATE_OEM
- 1: NTLMSSP_REQUEST_TARGET
- 1: NTLMSSP_NEGOTIATE_SIGN
- 0: NTLMSSP_NEGOTIATE_SEAL
- 0: NTLMSSP_NEGOTIATE_DATAGRAM
- 0: NTLMSSP_NEGOTIATE_LM_KEY
- 0: NTLMSSP_NEGOTIATE_NETWARE
- 1: NTLMSSP_NEGOTIATE_NTLM
- 0: NTLMSSP_NEGOTIATE_NT_ONLY
- 0: NTLMSSP_ANONYMOUS
- 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
- 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- 0: NTLMSSP_TARGET_TYPE_DOMAIN
- 0: NTLMSSP_TARGET_TYPE_SERVER
- 0: NTLMSSP_TARGET_TYPE_SHARE
- 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- 0: NTLMSSP_NEGOTIATE_IDENTIFY
- 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
- 0: NTLMSSP_NEGOTIATE_TARGET_INFO
- 1: NTLMSSP_NEGOTIATE_VERSION
- 1: NTLMSSP_NEGOTIATE_128
- 1: NTLMSSP_NEGOTIATE_KEY_EXCH
- 0: NTLMSSP_NEGOTIATE_56
- DomainNameLen : 0x0000 (0)
- DomainNameMaxLen : 0x0000 (0)
- DomainName : *
- DomainName : ''
- WorkstationLen : 0x0000 (0)
- WorkstationMaxLen : 0x0000 (0)
- Workstation : *
- Workstation : ''
- Version: struct ntlmssp_VERSION
- ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
- ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
- ProductBuild : 0x0000 (0)
- Reserved: ARRAY(3)
- [0] : 0x00 (0)
- [1] : 0x00 (0)
- [2] : 0x00 (0)
- NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
- gensec_update_send: ntlmssp[0x1e21a20]: subreq: 0x1e21ee0
- gensec_update_send: spnego[0x1df8970]: subreq: 0x1e217e8
- gensec_update_done: ntlmssp[0x1e21a20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x1e21ee0/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x1e21fd0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215]
- gensec_update_done: spnego[0x1df8970]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x1e217e8/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x1e218d8)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
- Got challenge flags:
- Got NTLMSSP neg_flags=0x628a8215
- NTLMSSP_NEGOTIATE_UNICODE
- NTLMSSP_REQUEST_TARGET
- NTLMSSP_NEGOTIATE_SIGN
- NTLMSSP_NEGOTIATE_NTLM
- NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- NTLMSSP_TARGET_TYPE_SERVER
- NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- NTLMSSP_NEGOTIATE_TARGET_INFO
- NTLMSSP_NEGOTIATE_VERSION
- NTLMSSP_NEGOTIATE_128
- NTLMSSP_NEGOTIATE_KEY_EXCH
- challenge: struct CHALLENGE_MESSAGE
- Signature : 'NTLMSSP'
- MessageType : NtLmChallenge (0x2)
- TargetNameLen : 0x0012 (18)
- TargetNameMaxLen : 0x0012 (18)
- TargetName : *
- TargetName : 'LIBREELEC'
- NegotiateFlags : 0x628a8215 (1653244437)
- 1: NTLMSSP_NEGOTIATE_UNICODE
- 0: NTLMSSP_NEGOTIATE_OEM
- 1: NTLMSSP_REQUEST_TARGET
- 1: NTLMSSP_NEGOTIATE_SIGN
- 0: NTLMSSP_NEGOTIATE_SEAL
- 0: NTLMSSP_NEGOTIATE_DATAGRAM
- 0: NTLMSSP_NEGOTIATE_LM_KEY
- 0: NTLMSSP_NEGOTIATE_NETWARE
- 1: NTLMSSP_NEGOTIATE_NTLM
- 0: NTLMSSP_NEGOTIATE_NT_ONLY
- 0: NTLMSSP_ANONYMOUS
- 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
- 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- 0: NTLMSSP_TARGET_TYPE_DOMAIN
- 1: NTLMSSP_TARGET_TYPE_SERVER
- 0: NTLMSSP_TARGET_TYPE_SHARE
- 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- 0: NTLMSSP_NEGOTIATE_IDENTIFY
- 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
- 1: NTLMSSP_NEGOTIATE_TARGET_INFO
- 1: NTLMSSP_NEGOTIATE_VERSION
- 1: NTLMSSP_NEGOTIATE_128
- 1: NTLMSSP_NEGOTIATE_KEY_EXCH
- 0: NTLMSSP_NEGOTIATE_56
- ServerChallenge : 09e845d1f03034df
- Reserved : 0000000000000000
- TargetInfoLen : 0x0056 (86)
- TargetInfoMaxLen : 0x0056 (86)
- TargetInfo : *
- TargetInfo: struct AV_PAIR_LIST
- count : 0x00000006 (6)
- pair: ARRAY(6)
- pair: struct AV_PAIR
- AvId : MsvAvNbDomainName (0x2)
- AvLen : 0x0012 (18)
- Value : union ntlmssp_AvValue(case 0x2)
- AvNbDomainName : 'LIBREELEC'
- pair: struct AV_PAIR
- AvId : MsvAvNbComputerName (0x1)
- AvLen : 0x0012 (18)
- Value : union ntlmssp_AvValue(case 0x1)
- AvNbComputerName : 'LIBREELEC'
- pair: struct AV_PAIR
- AvId : MsvAvDnsDomainName (0x4)
- AvLen : 0x0000 (0)
- Value : union ntlmssp_AvValue(case 0x4)
- AvDnsDomainName : ''
- pair: struct AV_PAIR
- AvId : MsvAvDnsComputerName (0x3)
- AvLen : 0x0012 (18)
- Value : union ntlmssp_AvValue(case 0x3)
- AvDnsComputerName : 'localhost'
- pair: struct AV_PAIR
- AvId : MsvAvTimestamp (0x7)
- AvLen : 0x0008 (8)
- Value : union ntlmssp_AvValue(case 0x7)
- AvTimestamp : Fri Apr 1 11:48:55 2022 EEST
- pair: struct AV_PAIR
- AvId : MsvAvEOL (0x0)
- AvLen : 0x0000 (0)
- Value : union ntlmssp_AvValue(case 0x0)
- Version: struct ntlmssp_VERSION
- ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6)
- ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1)
- ProductBuild : 0x0000 (0)
- Reserved : 000000
- NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF)
- authenticate: struct AUTHENTICATE_MESSAGE
- Signature : 'NTLMSSP'
- MessageType : NtLmAuthenticate (3)
- LmChallengeResponseLen : 0x0018 (24)
- LmChallengeResponseMaxLen: 0x0018 (24)
- LmChallengeResponse : *
- LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case 24)
- v1: struct LM_RESPONSE
- Response : 000000000000000000000000000000000000000000000000
- NtChallengeResponseLen : 0x00ee (238)
- NtChallengeResponseMaxLen: 0x00ee (238)
- NtChallengeResponse : *
- NtChallengeResponse : union ntlmssp_NTLM_RESPONSE_with_len(case 238)
- v2: struct NTLMv2_RESPONSE
- Response : 1dbf27858213b76859badf797efe2e41
- Challenge: struct NTLMv2_CLIENT_CHALLENGE
- RespType : 0x01 (1)
- HiRespType : 0x01 (1)
- Reserved1 : 0x0000 (0)
- Reserved2 : 0x00000000 (0)
- TimeStamp : Fri Apr 1 11:48:55 2022 EEST
- ChallengeFromClient : a971cd11e573ad2b
- Reserved3 : 0x00000000 (0)
- AvPairs: struct AV_PAIR_LIST
- count : 0x0000000a (10)
- pair: ARRAY(10)
- pair: struct AV_PAIR
- AvId : MsvAvNbDomainName (0x2)
- AvLen : 0x0012 (18)
- Value : union ntlmssp_AvValue(case 0x2)
- AvNbDomainName : 'LIBREELEC'
- pair: struct AV_PAIR
- AvId : MsvAvNbComputerName (0x1)
- AvLen : 0x0012 (18)
- Value : union ntlmssp_AvValue(case 0x1)
- AvNbComputerName : 'LIBREELEC'
- pair: struct AV_PAIR
- AvId : MsvAvDnsDomainName (0x4)
- AvLen : 0x0000 (0)
- Value : union ntlmssp_AvValue(case 0x4)
- AvDnsDomainName : ''
- pair: struct AV_PAIR
- AvId : MsvAvDnsComputerName (0x3)
- AvLen : 0x0012 (18)
- Value : union ntlmssp_AvValue(case 0x3)
- AvDnsComputerName : 'localhost'
- pair: struct AV_PAIR
- AvId : MsvAvTimestamp (0x7)
- AvLen : 0x0008 (8)
- Value : union ntlmssp_AvValue(case 0x7)
- AvTimestamp : Fri Apr 1 11:48:55 2022 EEST
- pair: struct AV_PAIR
- AvId : MsvAvFlags (0x6)
- AvLen : 0x0004 (4)
- Value : union ntlmssp_AvValue(case 0x6)
- AvFlags : 0x00000002 (2)
- 0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT
- 1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE
- 0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE
- pair: struct AV_PAIR
- AvId : MsvAvSingleHost (0x8)
- AvLen : 0x0030 (48)
- Value : union ntlmssp_AvValue(case 0x8)
- AvSingleHost: struct ntlmssp_SingleHostData
- Size : 0x00000030 (48)
- Z4 : 0x00000000 (0)
- token_info: struct LSAP_TOKEN_INFO_INTEGRITY
- Flags : 0x00000000 (0)
- TokenIL : 0x00000000 (0)
- MachineId : f1bdf133328f56f08388493b010cfa425f5777db5a93c17e78a8992cfabaf918
- remaining : DATA_BLOB length=0
- pair: struct AV_PAIR
- AvId : MsvChannelBindings (0xA)
- AvLen : 0x0010 (16)
- Value : union ntlmssp_AvValue(case 0xA)
- ChannelBindings : 00000000000000000000000000000000
- pair: struct AV_PAIR
- AvId : MsvAvTargetName (0x9)
- AvLen : 0x0018 (24)
- Value : union ntlmssp_AvValue(case 0x9)
- AvTargetName : 'cifs/0.0.0.0'
- pair: struct AV_PAIR
- AvId : MsvAvEOL (0x0)
- AvLen : 0x0000 (0)
- Value : union ntlmssp_AvValue(case 0x0)
- DomainNameLen : 0x0012 (18)
- DomainNameMaxLen : 0x0012 (18)
- DomainName : *
- DomainName : 'WORKGROUP'
- UserNameLen : 0x0012 (18)
- UserNameMaxLen : 0x0012 (18)
- UserName : *
- UserName : 'libreelec'
- WorkstationLen : 0x0012 (18)
- WorkstationMaxLen : 0x0012 (18)
- Workstation : *
- Workstation : 'LIBREELEC'
- EncryptedRandomSessionKeyLen: 0x0010 (16)
- EncryptedRandomSessionKeyMaxLen: 0x0010 (16)
- EncryptedRandomSessionKey: *
- EncryptedRandomSessionKey: DATA_BLOB length=16
- [0000] 94 B9 CE D4 0A 04 F6 F0 54 1A 6E 00 2F 8B 0D EC ........ T.n./...
- NegotiateFlags : 0x62088215 (1644724757)
- 1: NTLMSSP_NEGOTIATE_UNICODE
- 0: NTLMSSP_NEGOTIATE_OEM
- 1: NTLMSSP_REQUEST_TARGET
- 1: NTLMSSP_NEGOTIATE_SIGN
- 0: NTLMSSP_NEGOTIATE_SEAL
- 0: NTLMSSP_NEGOTIATE_DATAGRAM
- 0: NTLMSSP_NEGOTIATE_LM_KEY
- 0: NTLMSSP_NEGOTIATE_NETWARE
- 1: NTLMSSP_NEGOTIATE_NTLM
- 0: NTLMSSP_NEGOTIATE_NT_ONLY
- 0: NTLMSSP_ANONYMOUS
- 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
- 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
- 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- 0: NTLMSSP_TARGET_TYPE_DOMAIN
- 0: NTLMSSP_TARGET_TYPE_SERVER
- 0: NTLMSSP_TARGET_TYPE_SHARE
- 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- 0: NTLMSSP_NEGOTIATE_IDENTIFY
- 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
- 0: NTLMSSP_NEGOTIATE_TARGET_INFO
- 1: NTLMSSP_NEGOTIATE_VERSION
- 1: NTLMSSP_NEGOTIATE_128
- 1: NTLMSSP_NEGOTIATE_KEY_EXCH
- 0: NTLMSSP_NEGOTIATE_56
- Version: struct ntlmssp_VERSION
- ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
- ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
- ProductBuild : 0x0000 (0)
- Reserved: ARRAY(3)
- [0] : 0x00 (0)
- [1] : 0x00 (0)
- [2] : 0x00 (0)
- NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
- NTLMSSP: Set final flags:
- Got NTLMSSP neg_flags=0x62088215
- NTLMSSP_NEGOTIATE_UNICODE
- NTLMSSP_REQUEST_TARGET
- NTLMSSP_NEGOTIATE_SIGN
- NTLMSSP_NEGOTIATE_NTLM
- NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- NTLMSSP_NEGOTIATE_VERSION
- NTLMSSP_NEGOTIATE_128
- NTLMSSP_NEGOTIATE_KEY_EXCH
- NTLMSSP Sign/Seal - Initialising with flags:
- Got NTLMSSP neg_flags=0x62088215
- NTLMSSP_NEGOTIATE_UNICODE
- NTLMSSP_REQUEST_TARGET
- NTLMSSP_NEGOTIATE_SIGN
- NTLMSSP_NEGOTIATE_NTLM
- NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- NTLMSSP_NEGOTIATE_VERSION
- NTLMSSP_NEGOTIATE_128
- NTLMSSP_NEGOTIATE_KEY_EXCH
- dump_arc4_state: NTLMSSP send seal arc4 state:
- dump_arc4_state: NTLMSSP recv seal arc4 state:
- gensec_update_send: ntlmssp[0x1e21a20]: subreq: 0x1e1e918
- gensec_update_send: spnego[0x1df8970]: subreq: 0x1e33870
- gensec_update_done: ntlmssp[0x1e21a20]: NT_STATUS_OK tevent_req[0x1e1e918/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x1e1ea08)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:222]
- gensec_update_done: spnego[0x1df8970]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x1e33870/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x1e33960)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
- ntlmssp_check_packet: NTLMSSP signature OK !
- NTLMSSP Sign/Seal - Initialising with flags:
- Got NTLMSSP neg_flags=0x62088215
- NTLMSSP_NEGOTIATE_UNICODE
- NTLMSSP_REQUEST_TARGET
- NTLMSSP_NEGOTIATE_SIGN
- NTLMSSP_NEGOTIATE_NTLM
- NTLMSSP_NEGOTIATE_ALWAYS_SIGN
- NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
- NTLMSSP_NEGOTIATE_VERSION
- NTLMSSP_NEGOTIATE_128
- NTLMSSP_NEGOTIATE_KEY_EXCH
- dump_arc4_state: NTLMSSP send seal arc4 state:
- dump_arc4_state: NTLMSSP recv seal arc4 state:
- gensec_update_send: spnego[0x1df8970]: subreq: 0x1e362c0
- gensec_update_done: spnego[0x1df8970]: NT_STATUS_OK tevent_req[0x1e362c0/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x1e363b0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
- session setup ok
- signed SMB2 message (sign_algo_id=2)
- tconx ok
- Sharename Type Comment
- --------- ---- -------
- Could not connect to srvsvc pipe: NT_STATUS_OBJECT_NAME_NOT_FOUND
- SMB1 disabled -- no workgroup available
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement