Advertisement
szabozoltan69

samba log

Jan 6th, 2020
524
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 3.84 KB | None | 0 0
  1. [2020/01/06 18:37:56.819306,  5, pid=31436, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:866(debug_unix_user_token)
  2.   UNIX token of user 0
  3.   Primary group is 0 and contains 0 supplementary groups
  4. [2020/01/06 18:37:56.819443, 10, pid=31436, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:362(account_policy_get)
  5.   account_policy_get: name: password history, val: 0
  6. [2020/01/06 18:37:56.819545,  4, pid=31436, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:438(pop_sec_ctx)
  7.   pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1
  8. [2020/01/06 18:37:56.819639,  5, pid=31436, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:813(tdb_update_samacct_only)
  9.   Storing account pi with RID 1000
  10. [2020/01/06 18:37:56.819725,  5, pid=31436, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:130(dbwrap_lock_order_lock)
  11.   dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/private/passdb.tdb
  12. [2020/01/06 18:37:56.819844, 10, pid=31436, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:116(debug_lock_order)
  13.   lock order:  1:/var/lib/samba/private/passdb.tdb 2:<none> 3:<none>
  14. [2020/01/06 18:37:56.819950,  5, pid=31436, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:159(dbwrap_lock_order_unlock)
  15.   dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/private/passdb.tdb
  16. [2020/01/06 18:37:56.820034, 10, pid=31436, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:947(tdb_update_sam)
  17.   tdb_update_sam: Updating key for RID 1000
  18. [2020/01/06 18:37:56.820122,  5, pid=31436, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:130(dbwrap_lock_order_lock)
  19.   dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/private/passdb.tdb
  20. [2020/01/06 18:37:56.820203, 10, pid=31436, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:116(debug_lock_order)
  21.   lock order:  1:/var/lib/samba/private/passdb.tdb 2:<none> 3:<none>
  22. [2020/01/06 18:37:56.820300,  5, pid=31436, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:159(dbwrap_lock_order_unlock)
  23.   dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/private/passdb.tdb
  24. [2020/01/06 18:37:56.820422,  4, pid=31436, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:438(pop_sec_ctx)
  25.   pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0
  26. [2020/01/06 18:37:56.820518,  5, pid=31436, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:251(auth_check_ntlm_password)
  27.   auth_check_ntlm_password: sam_ignoredomain authentication for user [pi] FAILED with error NT_STATUS_WRONG_PASSWORD, authoritative=1
  28. [2020/01/06 18:37:56.820783,  2, pid=31436, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:334(auth_check_ntlm_password)
  29.   check_ntlm_password:  Authentication for user [pi] -> [pi] FAILED with error NT_STATUS_WRONG_PASSWORD, authoritative=1
  30. [2020/01/06 18:37:56.820932,  2, pid=31436, effective(0, 0), real(0, 0)] ../auth/auth_log.c:610(log_authentication_event_human_readable)
  31.   Auth: [SMB,(null)] user []\[pi] at [Mon, 06 Jan 2020 18:37:56.820877 CET] with [NTLMv1] status [NT_STATUS_WRONG_PASSWORD] workstation [192.168.0.100] remote host [ipv4:192.168.0.100:33737] mapped to []\[pi]. local host [ipv4:192.168.0.111:445]
  32.   {"timestamp": "2020-01-06T18:37:56.821243+0100", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 0}, "status": "NT_STATUS_WRONG_PASSWORD", "localAddress": "ipv4:192.168.0.111:445", "remoteAddress": "ipv4:192.168.0.100:33737", "serviceDescription": "SMB", "authDescription": null, "clientDomain": "", "clientAccount": "pi", "workstation": "192.168.0.100", "becameAccount": null, "becameDomain": null, "becameSid": null, "mappedAccount": "pi", "mappedDomain": "", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "NTLMv1", "duration": 29492}}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement