Advertisement
Guest User

Untitled

a guest
Apr 1st, 2022
45
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 22.34 KB | None | 0 0
  1. LibreELEC:~ # smbclient -d=10 -U libreelec -L 0.0.0.0
  2. INFO: Current debug levels:
  3. all: 10
  4. tdb: 10
  5. printdrivers: 10
  6. lanman: 10
  7. smb: 10
  8. rpc_parse: 10
  9. rpc_srv: 10
  10. rpc_cli: 10
  11. passdb: 10
  12. sam: 10
  13. auth: 10
  14. winbind: 10
  15. vfs: 10
  16. idmap: 10
  17. quota: 10
  18. acls: 10
  19. locking: 10
  20. msdfs: 10
  21. dmapi: 10
  22. registry: 10
  23. scavenger: 10
  24. dns: 10
  25. ldb: 10
  26. tevent: 10
  27. auth_audit: 10
  28. auth_json_audit: 10
  29. kerberos: 10
  30. drs_repl: 10
  31. smb2: 10
  32. smb2_credits: 10
  33. dsdb_audit: 10
  34. dsdb_json_audit: 10
  35. dsdb_password_audit: 10
  36. dsdb_password_json_audit: 10
  37. dsdb_transaction_audit: 10
  38. dsdb_transaction_json_audit: 10
  39. dsdb_group_audit: 10
  40. dsdb_group_json_audit: 10
  41. lp_load_ex: refreshing parameters
  42. Initialising global parameters
  43. rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
  44. INFO: Current debug levels:
  45. all: 10
  46. tdb: 10
  47. printdrivers: 10
  48. lanman: 10
  49. smb: 10
  50. rpc_parse: 10
  51. rpc_srv: 10
  52. rpc_cli: 10
  53. passdb: 10
  54. sam: 10
  55. auth: 10
  56. winbind: 10
  57. vfs: 10
  58. idmap: 10
  59. quota: 10
  60. acls: 10
  61. locking: 10
  62. msdfs: 10
  63. dmapi: 10
  64. registry: 10
  65. scavenger: 10
  66. dns: 10
  67. ldb: 10
  68. tevent: 10
  69. auth_audit: 10
  70. auth_json_audit: 10
  71. kerberos: 10
  72. drs_repl: 10
  73. smb2: 10
  74. smb2_credits: 10
  75. dsdb_audit: 10
  76. dsdb_json_audit: 10
  77. dsdb_password_audit: 10
  78. dsdb_password_json_audit: 10
  79. dsdb_transaction_audit: 10
  80. dsdb_transaction_json_audit: 10
  81. dsdb_group_audit: 10
  82. dsdb_group_json_audit: 10
  83. Processing section "[global]"
  84. doing parameter workgroup = WORKGROUP
  85. doing parameter server min protocol = SMB2
  86. doing parameter server max protocol = SMB3
  87. doing parameter server string = LibreELEC
  88. doing parameter browseable = yes
  89. doing parameter writeable = yes
  90. doing parameter printable = no
  91. doing parameter deadtime = 30
  92. doing parameter mangled names = no
  93. doing parameter name resolve order = host bcast
  94. doing parameter printcap name = /dev/null
  95. doing parameter load printers = no
  96. doing parameter enable core files = no
  97. doing parameter passdb backend = smbpasswd
  98. doing parameter smb encrypt = disabled
  99. doing parameter fruit:model = Xserve
  100. doing parameter map to guest = Never
  101. doing parameter guest account = root
  102. doing parameter security = user
  103. doing parameter username map = /run/samba/samba.map
  104. doing parameter socket options = TCP_NODELAY IPTOS_LOWDELAY
  105. doing parameter min receivefile size = 16384
  106. doing parameter aio read size = 16384
  107. doing parameter aio write size = 16384
  108. doing parameter use sendfile = yes
  109. doing parameter strict allocate = no
  110. pm_process() returned Yes
  111. lp_servicenumber: couldn't find homes
  112. added interface eth0 ip=192.168.188.38 bcast=192.168.188.255 netmask=255.255.255.0
  113. Client started (version 4.16.0).
  114. Connecting to 0.0.0.0 at port 445
  115. socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=16, IPTOS_THROUGHPUT=16, SO_REUSEPORT=0, SO_SNDBUF=2626560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
  116. session request ok
  117. negotiated dialect[SMB3_11] against server[0.0.0.0]
  118. Password for [WORKGROUP\libreelec]:
  119. cli_session_setup_spnego_send: Connect to 0.0.0.0 as libreelec@WORKGROUP using SPNEGO
  120. GENSEC backend 'gssapi_spnego' registered
  121. GENSEC backend 'gssapi_krb5' registered
  122. GENSEC backend 'gssapi_krb5_sasl' registered
  123. GENSEC backend 'spnego' registered
  124. GENSEC backend 'schannel' registered
  125. GENSEC backend 'ncalrpc_as_system' registered
  126. GENSEC backend 'sasl-EXTERNAL' registered
  127. GENSEC backend 'ntlmssp' registered
  128. GENSEC backend 'ntlmssp_resume_ccache' registered
  129. GENSEC backend 'http_basic' registered
  130. GENSEC backend 'http_ntlm' registered
  131. GENSEC backend 'http_negotiate' registered
  132. Starting GENSEC mechanism spnego
  133. Starting GENSEC submechanism gse_krb5
  134. Cannot do GSE to an IP address
  135. Failed to start GENSEC client mech gse_krb5: NT_STATUS_INVALID_PARAMETER
  136. Starting GENSEC submechanism ntlmssp
  137. negotiate: struct NEGOTIATE_MESSAGE
  138. Signature : 'NTLMSSP'
  139. MessageType : NtLmNegotiate (1)
  140. NegotiateFlags : 0x62088215 (1644724757)
  141. 1: NTLMSSP_NEGOTIATE_UNICODE
  142. 0: NTLMSSP_NEGOTIATE_OEM
  143. 1: NTLMSSP_REQUEST_TARGET
  144. 1: NTLMSSP_NEGOTIATE_SIGN
  145. 0: NTLMSSP_NEGOTIATE_SEAL
  146. 0: NTLMSSP_NEGOTIATE_DATAGRAM
  147. 0: NTLMSSP_NEGOTIATE_LM_KEY
  148. 0: NTLMSSP_NEGOTIATE_NETWARE
  149. 1: NTLMSSP_NEGOTIATE_NTLM
  150. 0: NTLMSSP_NEGOTIATE_NT_ONLY
  151. 0: NTLMSSP_ANONYMOUS
  152. 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
  153. 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
  154. 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
  155. 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  156. 0: NTLMSSP_TARGET_TYPE_DOMAIN
  157. 0: NTLMSSP_TARGET_TYPE_SERVER
  158. 0: NTLMSSP_TARGET_TYPE_SHARE
  159. 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  160. 0: NTLMSSP_NEGOTIATE_IDENTIFY
  161. 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
  162. 0: NTLMSSP_NEGOTIATE_TARGET_INFO
  163. 1: NTLMSSP_NEGOTIATE_VERSION
  164. 1: NTLMSSP_NEGOTIATE_128
  165. 1: NTLMSSP_NEGOTIATE_KEY_EXCH
  166. 0: NTLMSSP_NEGOTIATE_56
  167. DomainNameLen : 0x0000 (0)
  168. DomainNameMaxLen : 0x0000 (0)
  169. DomainName : *
  170. DomainName : ''
  171. WorkstationLen : 0x0000 (0)
  172. WorkstationMaxLen : 0x0000 (0)
  173. Workstation : *
  174. Workstation : ''
  175. Version: struct ntlmssp_VERSION
  176. ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
  177. ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
  178. ProductBuild : 0x0000 (0)
  179. Reserved: ARRAY(3)
  180. [0] : 0x00 (0)
  181. [1] : 0x00 (0)
  182. [2] : 0x00 (0)
  183. NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
  184. gensec_update_send: ntlmssp[0x1e21a20]: subreq: 0x1e21ee0
  185. gensec_update_send: spnego[0x1df8970]: subreq: 0x1e217e8
  186. gensec_update_done: ntlmssp[0x1e21a20]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x1e21ee0/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x1e21fd0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215]
  187. gensec_update_done: spnego[0x1df8970]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x1e217e8/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x1e218d8)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
  188. Got challenge flags:
  189. Got NTLMSSP neg_flags=0x628a8215
  190. NTLMSSP_NEGOTIATE_UNICODE
  191. NTLMSSP_REQUEST_TARGET
  192. NTLMSSP_NEGOTIATE_SIGN
  193. NTLMSSP_NEGOTIATE_NTLM
  194. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  195. NTLMSSP_TARGET_TYPE_SERVER
  196. NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  197. NTLMSSP_NEGOTIATE_TARGET_INFO
  198. NTLMSSP_NEGOTIATE_VERSION
  199. NTLMSSP_NEGOTIATE_128
  200. NTLMSSP_NEGOTIATE_KEY_EXCH
  201. challenge: struct CHALLENGE_MESSAGE
  202. Signature : 'NTLMSSP'
  203. MessageType : NtLmChallenge (0x2)
  204. TargetNameLen : 0x0012 (18)
  205. TargetNameMaxLen : 0x0012 (18)
  206. TargetName : *
  207. TargetName : 'LIBREELEC'
  208. NegotiateFlags : 0x628a8215 (1653244437)
  209. 1: NTLMSSP_NEGOTIATE_UNICODE
  210. 0: NTLMSSP_NEGOTIATE_OEM
  211. 1: NTLMSSP_REQUEST_TARGET
  212. 1: NTLMSSP_NEGOTIATE_SIGN
  213. 0: NTLMSSP_NEGOTIATE_SEAL
  214. 0: NTLMSSP_NEGOTIATE_DATAGRAM
  215. 0: NTLMSSP_NEGOTIATE_LM_KEY
  216. 0: NTLMSSP_NEGOTIATE_NETWARE
  217. 1: NTLMSSP_NEGOTIATE_NTLM
  218. 0: NTLMSSP_NEGOTIATE_NT_ONLY
  219. 0: NTLMSSP_ANONYMOUS
  220. 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
  221. 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
  222. 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
  223. 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  224. 0: NTLMSSP_TARGET_TYPE_DOMAIN
  225. 1: NTLMSSP_TARGET_TYPE_SERVER
  226. 0: NTLMSSP_TARGET_TYPE_SHARE
  227. 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  228. 0: NTLMSSP_NEGOTIATE_IDENTIFY
  229. 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
  230. 1: NTLMSSP_NEGOTIATE_TARGET_INFO
  231. 1: NTLMSSP_NEGOTIATE_VERSION
  232. 1: NTLMSSP_NEGOTIATE_128
  233. 1: NTLMSSP_NEGOTIATE_KEY_EXCH
  234. 0: NTLMSSP_NEGOTIATE_56
  235. ServerChallenge : 09e845d1f03034df
  236. Reserved : 0000000000000000
  237. TargetInfoLen : 0x0056 (86)
  238. TargetInfoMaxLen : 0x0056 (86)
  239. TargetInfo : *
  240. TargetInfo: struct AV_PAIR_LIST
  241. count : 0x00000006 (6)
  242. pair: ARRAY(6)
  243. pair: struct AV_PAIR
  244. AvId : MsvAvNbDomainName (0x2)
  245. AvLen : 0x0012 (18)
  246. Value : union ntlmssp_AvValue(case 0x2)
  247. AvNbDomainName : 'LIBREELEC'
  248. pair: struct AV_PAIR
  249. AvId : MsvAvNbComputerName (0x1)
  250. AvLen : 0x0012 (18)
  251. Value : union ntlmssp_AvValue(case 0x1)
  252. AvNbComputerName : 'LIBREELEC'
  253. pair: struct AV_PAIR
  254. AvId : MsvAvDnsDomainName (0x4)
  255. AvLen : 0x0000 (0)
  256. Value : union ntlmssp_AvValue(case 0x4)
  257. AvDnsDomainName : ''
  258. pair: struct AV_PAIR
  259. AvId : MsvAvDnsComputerName (0x3)
  260. AvLen : 0x0012 (18)
  261. Value : union ntlmssp_AvValue(case 0x3)
  262. AvDnsComputerName : 'localhost'
  263. pair: struct AV_PAIR
  264. AvId : MsvAvTimestamp (0x7)
  265. AvLen : 0x0008 (8)
  266. Value : union ntlmssp_AvValue(case 0x7)
  267. AvTimestamp : Fri Apr 1 11:48:55 2022 EEST
  268. pair: struct AV_PAIR
  269. AvId : MsvAvEOL (0x0)
  270. AvLen : 0x0000 (0)
  271. Value : union ntlmssp_AvValue(case 0x0)
  272. Version: struct ntlmssp_VERSION
  273. ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6)
  274. ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1)
  275. ProductBuild : 0x0000 (0)
  276. Reserved : 000000
  277. NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF)
  278. authenticate: struct AUTHENTICATE_MESSAGE
  279. Signature : 'NTLMSSP'
  280. MessageType : NtLmAuthenticate (3)
  281. LmChallengeResponseLen : 0x0018 (24)
  282. LmChallengeResponseMaxLen: 0x0018 (24)
  283. LmChallengeResponse : *
  284. LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case 24)
  285. v1: struct LM_RESPONSE
  286. Response : 000000000000000000000000000000000000000000000000
  287. NtChallengeResponseLen : 0x00ee (238)
  288. NtChallengeResponseMaxLen: 0x00ee (238)
  289. NtChallengeResponse : *
  290. NtChallengeResponse : union ntlmssp_NTLM_RESPONSE_with_len(case 238)
  291. v2: struct NTLMv2_RESPONSE
  292. Response : 1dbf27858213b76859badf797efe2e41
  293. Challenge: struct NTLMv2_CLIENT_CHALLENGE
  294. RespType : 0x01 (1)
  295. HiRespType : 0x01 (1)
  296. Reserved1 : 0x0000 (0)
  297. Reserved2 : 0x00000000 (0)
  298. TimeStamp : Fri Apr 1 11:48:55 2022 EEST
  299. ChallengeFromClient : a971cd11e573ad2b
  300. Reserved3 : 0x00000000 (0)
  301. AvPairs: struct AV_PAIR_LIST
  302. count : 0x0000000a (10)
  303. pair: ARRAY(10)
  304. pair: struct AV_PAIR
  305. AvId : MsvAvNbDomainName (0x2)
  306. AvLen : 0x0012 (18)
  307. Value : union ntlmssp_AvValue(case 0x2)
  308. AvNbDomainName : 'LIBREELEC'
  309. pair: struct AV_PAIR
  310. AvId : MsvAvNbComputerName (0x1)
  311. AvLen : 0x0012 (18)
  312. Value : union ntlmssp_AvValue(case 0x1)
  313. AvNbComputerName : 'LIBREELEC'
  314. pair: struct AV_PAIR
  315. AvId : MsvAvDnsDomainName (0x4)
  316. AvLen : 0x0000 (0)
  317. Value : union ntlmssp_AvValue(case 0x4)
  318. AvDnsDomainName : ''
  319. pair: struct AV_PAIR
  320. AvId : MsvAvDnsComputerName (0x3)
  321. AvLen : 0x0012 (18)
  322. Value : union ntlmssp_AvValue(case 0x3)
  323. AvDnsComputerName : 'localhost'
  324. pair: struct AV_PAIR
  325. AvId : MsvAvTimestamp (0x7)
  326. AvLen : 0x0008 (8)
  327. Value : union ntlmssp_AvValue(case 0x7)
  328. AvTimestamp : Fri Apr 1 11:48:55 2022 EEST
  329. pair: struct AV_PAIR
  330. AvId : MsvAvFlags (0x6)
  331. AvLen : 0x0004 (4)
  332. Value : union ntlmssp_AvValue(case 0x6)
  333. AvFlags : 0x00000002 (2)
  334. 0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT
  335. 1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE
  336. 0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE
  337. pair: struct AV_PAIR
  338. AvId : MsvAvSingleHost (0x8)
  339. AvLen : 0x0030 (48)
  340. Value : union ntlmssp_AvValue(case 0x8)
  341. AvSingleHost: struct ntlmssp_SingleHostData
  342. Size : 0x00000030 (48)
  343. Z4 : 0x00000000 (0)
  344. token_info: struct LSAP_TOKEN_INFO_INTEGRITY
  345. Flags : 0x00000000 (0)
  346. TokenIL : 0x00000000 (0)
  347. MachineId : f1bdf133328f56f08388493b010cfa425f5777db5a93c17e78a8992cfabaf918
  348. remaining : DATA_BLOB length=0
  349. pair: struct AV_PAIR
  350. AvId : MsvChannelBindings (0xA)
  351. AvLen : 0x0010 (16)
  352. Value : union ntlmssp_AvValue(case 0xA)
  353. ChannelBindings : 00000000000000000000000000000000
  354. pair: struct AV_PAIR
  355. AvId : MsvAvTargetName (0x9)
  356. AvLen : 0x0018 (24)
  357. Value : union ntlmssp_AvValue(case 0x9)
  358. AvTargetName : 'cifs/0.0.0.0'
  359. pair: struct AV_PAIR
  360. AvId : MsvAvEOL (0x0)
  361. AvLen : 0x0000 (0)
  362. Value : union ntlmssp_AvValue(case 0x0)
  363. DomainNameLen : 0x0012 (18)
  364. DomainNameMaxLen : 0x0012 (18)
  365. DomainName : *
  366. DomainName : 'WORKGROUP'
  367. UserNameLen : 0x0012 (18)
  368. UserNameMaxLen : 0x0012 (18)
  369. UserName : *
  370. UserName : 'libreelec'
  371. WorkstationLen : 0x0012 (18)
  372. WorkstationMaxLen : 0x0012 (18)
  373. Workstation : *
  374. Workstation : 'LIBREELEC'
  375. EncryptedRandomSessionKeyLen: 0x0010 (16)
  376. EncryptedRandomSessionKeyMaxLen: 0x0010 (16)
  377. EncryptedRandomSessionKey: *
  378. EncryptedRandomSessionKey: DATA_BLOB length=16
  379. [0000] 94 B9 CE D4 0A 04 F6 F0 54 1A 6E 00 2F 8B 0D EC ........ T.n./...
  380. NegotiateFlags : 0x62088215 (1644724757)
  381. 1: NTLMSSP_NEGOTIATE_UNICODE
  382. 0: NTLMSSP_NEGOTIATE_OEM
  383. 1: NTLMSSP_REQUEST_TARGET
  384. 1: NTLMSSP_NEGOTIATE_SIGN
  385. 0: NTLMSSP_NEGOTIATE_SEAL
  386. 0: NTLMSSP_NEGOTIATE_DATAGRAM
  387. 0: NTLMSSP_NEGOTIATE_LM_KEY
  388. 0: NTLMSSP_NEGOTIATE_NETWARE
  389. 1: NTLMSSP_NEGOTIATE_NTLM
  390. 0: NTLMSSP_NEGOTIATE_NT_ONLY
  391. 0: NTLMSSP_ANONYMOUS
  392. 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
  393. 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
  394. 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
  395. 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  396. 0: NTLMSSP_TARGET_TYPE_DOMAIN
  397. 0: NTLMSSP_TARGET_TYPE_SERVER
  398. 0: NTLMSSP_TARGET_TYPE_SHARE
  399. 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  400. 0: NTLMSSP_NEGOTIATE_IDENTIFY
  401. 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
  402. 0: NTLMSSP_NEGOTIATE_TARGET_INFO
  403. 1: NTLMSSP_NEGOTIATE_VERSION
  404. 1: NTLMSSP_NEGOTIATE_128
  405. 1: NTLMSSP_NEGOTIATE_KEY_EXCH
  406. 0: NTLMSSP_NEGOTIATE_56
  407. Version: struct ntlmssp_VERSION
  408. ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
  409. ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
  410. ProductBuild : 0x0000 (0)
  411. Reserved: ARRAY(3)
  412. [0] : 0x00 (0)
  413. [1] : 0x00 (0)
  414. [2] : 0x00 (0)
  415. NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
  416. NTLMSSP: Set final flags:
  417. Got NTLMSSP neg_flags=0x62088215
  418. NTLMSSP_NEGOTIATE_UNICODE
  419. NTLMSSP_REQUEST_TARGET
  420. NTLMSSP_NEGOTIATE_SIGN
  421. NTLMSSP_NEGOTIATE_NTLM
  422. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  423. NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  424. NTLMSSP_NEGOTIATE_VERSION
  425. NTLMSSP_NEGOTIATE_128
  426. NTLMSSP_NEGOTIATE_KEY_EXCH
  427. NTLMSSP Sign/Seal - Initialising with flags:
  428. Got NTLMSSP neg_flags=0x62088215
  429. NTLMSSP_NEGOTIATE_UNICODE
  430. NTLMSSP_REQUEST_TARGET
  431. NTLMSSP_NEGOTIATE_SIGN
  432. NTLMSSP_NEGOTIATE_NTLM
  433. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  434. NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  435. NTLMSSP_NEGOTIATE_VERSION
  436. NTLMSSP_NEGOTIATE_128
  437. NTLMSSP_NEGOTIATE_KEY_EXCH
  438. dump_arc4_state: NTLMSSP send seal arc4 state:
  439.  
  440. dump_arc4_state: NTLMSSP recv seal arc4 state:
  441.  
  442. gensec_update_send: ntlmssp[0x1e21a20]: subreq: 0x1e1e918
  443. gensec_update_send: spnego[0x1df8970]: subreq: 0x1e33870
  444. gensec_update_done: ntlmssp[0x1e21a20]: NT_STATUS_OK tevent_req[0x1e1e918/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x1e1ea08)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:222]
  445. gensec_update_done: spnego[0x1df8970]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x1e33870/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x1e33960)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
  446. ntlmssp_check_packet: NTLMSSP signature OK !
  447. NTLMSSP Sign/Seal - Initialising with flags:
  448. Got NTLMSSP neg_flags=0x62088215
  449. NTLMSSP_NEGOTIATE_UNICODE
  450. NTLMSSP_REQUEST_TARGET
  451. NTLMSSP_NEGOTIATE_SIGN
  452. NTLMSSP_NEGOTIATE_NTLM
  453. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  454. NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  455. NTLMSSP_NEGOTIATE_VERSION
  456. NTLMSSP_NEGOTIATE_128
  457. NTLMSSP_NEGOTIATE_KEY_EXCH
  458. dump_arc4_state: NTLMSSP send seal arc4 state:
  459.  
  460. dump_arc4_state: NTLMSSP recv seal arc4 state:
  461.  
  462. gensec_update_send: spnego[0x1df8970]: subreq: 0x1e362c0
  463. gensec_update_done: spnego[0x1df8970]: NT_STATUS_OK tevent_req[0x1e362c0/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x1e363b0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
  464. session setup ok
  465. signed SMB2 message (sign_algo_id=2)
  466. tconx ok
  467.  
  468. Sharename Type Comment
  469. --------- ---- -------
  470. Could not connect to srvsvc pipe: NT_STATUS_OBJECT_NAME_NOT_FOUND
  471. SMB1 disabled -- no workgroup available
  472.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement