[Samba] NT_STATUS_TRUSTED_RELATIONSHIP_FAILURE with Server 2008R2
Niels Dettenbach (Syndicat IT&Internet)
nd at syndicat.com
Sun Apr 15 04:34:02 MDT 2012
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
"Oliver R." <samba at solar-imperium.com> schrieb:
> NTLMSSP_NEGOTIATE_KEY_EXCH
>SPNEGO login failed: Trust relationship failure
>lang_tdb_init: /usr/lib/samba/en_US.UTF-8.msg: No such file or
>directory
hmm,
i'm not a deeper samba expert, but firstly i would check this file not found error in more detail - i.e. if the file is present (anywhere) and try to solve that.
Afair with samba 3.4/5/6 there was some updates with the database / trust backend (tdbsam etc.) defaults, so make shure you have read all the CHANGES in between too.
hth a little,
best regards,
Niels.
>> netmask=255.255.254.0
>> added interface bge0 ip=10.10.10.43 bcast=10.10.10.255
>> netmask=255.255.255.0
>> added interface bge0:2 ip=10.10.10.60 bcast=10.10.10.255
>> netmask=255.255.255.0
>> added interface bge0:4 ip=10.10.10.61 bcast=10.10.10.255
>> netmask=255.255.255.0
>> added interface bge0:3 ip=10.10.10.62 bcast=10.10.10.255
>> netmask=255.255.255.0
>> add_interface: not adding duplicate interface 0.0.0.0
>> Netbios name list:-
>> my_netbios_names[0]="myserver"
>> Client started (version 3.5.8).
>> Enter cdavis15's password:
>> Opening cache file at /cm-views/samba.server/locks/gencache.tdb
>> Opening cache file at
>/cm-views/samba.server/locks/gencache_notrans.tdb
>> Cache entry with key = AD_SITENAME/DOMAIN/ couldn't be found
>> sitename_fetch: No stored sitename for
>> internal_resolve_name: looking up myserver#20 (sitename (null))
>> Cache entry with key = NBT/myserver#20 couldn't be found
>> no entry for myserver#20 found.
>> resolve_lmhosts: Attempting lmhosts lookup for name myserver<0x20>
>> startlmhosts: Can't open lmhosts file /etc/samba/lmhosts. Error was
>No
>> such file or directory
>> resolve_wins: Attempting wins lookup for name myserver<0x20>
>> resolve_wins: WINS server resolution selected and no WINS servers
>listed.
>> resolve_hosts: Attempting host lookup for name myserver<0x20>
>> remove_duplicate_addrs2: looking for duplicate address/port pairs
>> namecache_store: storing 1 address for myserver#20: 10.10.10.62
>> Adding cache entry with key = NBT/myserver#20 and timeout = Fri Apr
>13
>> 17:34:17 2012
>> (660 seconds ahead)
>> internal_resolve_name: returning 1 addresses: 10.10.10.62:0
>> Running timed event "tevent_req_timedout" 7b11d0
>> Connecting to 10.10.10.62 at port 445
>> Socket options:
>> SO_KEEPALIVE = 0
>> SO_REUSEADDR = 0
>> SO_BROADCAST = 0
>> TCP_NODELAY = 1
>> IPTOS_LOWDELAY = 0
>> IPTOS_THROUGHPUT = 0
>> SO_SNDBUF = 49152
>> SO_RCVBUF = 49152
>> Could not test socket option SO_SNDLOWAT.
>> Could not test socket option SO_RCVLOWAT.
>> Could not test socket option SO_SNDTIMEO.
>> Could not test socket option SO_RCVTIMEO.
>> session request ok
>> Substituting charset 'ISO8859-1' for LOCALE
>> Substituting charset 'ISO8859-1' for LOCALE
>> Substituting charset 'ISO8859-1' for LOCALE
>> Substituting charset 'ISO8859-1' for LOCALE
>> Substituting charset 'ISO8859-1' for LOCALE
>> Substituting charset 'ISO8859-1' for LOCALE
>> Substituting charset 'ISO8859-1' for LOCALE
>> Substituting charset 'ISO8859-1' for LOCALE
>> Substituting charset 'ISO8859-1' for LOCALE
>> Substituting charset 'ISO8859-1' for LOCALE
>> Substituting charset 'ISO8859-1' for LOCALE
>> Substituting charset 'ISO8859-1' for LOCALE
>> Substituting charset 'ISO8859-1' for LOCALE
>> Substituting charset 'ISO8859-1' for LOCALE
>> Doing spnego session setup (blob length=58)
>> got OID=1.3.6.1.4.1.311.2.2.10
>> got principal=NONE
>> &negotiate: struct NEGOTIATE_MESSAGE
>> Signature : 'NTLMSSP'
>> MessageType : NtLmNegotiate (1)
>> NegotiateFlags : 0x60088215 (1611170325)
>> 1: NTLMSSP_NEGOTIATE_UNICODE
>> 0: NTLMSSP_NEGOTIATE_OEM
>> 1: NTLMSSP_REQUEST_TARGET
>> 1: NTLMSSP_NEGOTIATE_SIGN
>> 0: NTLMSSP_NEGOTIATE_SEAL
>> 0: NTLMSSP_NEGOTIATE_DATAGRAM
>> 0: NTLMSSP_NEGOTIATE_LM_KEY
>> 0: NTLMSSP_NEGOTIATE_NETWARE
>> 1: NTLMSSP_NEGOTIATE_NTLM
>> 0: NTLMSSP_NEGOTIATE_NT_ONLY
>> 0: NTLMSSP_ANONYMOUS
>> 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
>> 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
>> 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
>> 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
>> 0: NTLMSSP_TARGET_TYPE_DOMAIN
>> 0: NTLMSSP_TARGET_TYPE_SERVER
>> 0: NTLMSSP_TARGET_TYPE_SHARE
>> 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
>> 0: NTLMSSP_NEGOTIATE_IDENTIFY
>> 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
>> 0: NTLMSSP_NEGOTIATE_TARGET_INFO
>> 0: NTLMSSP_NEGOTIATE_VERSION
>> 1: NTLMSSP_NEGOTIATE_128
>> 1: NTLMSSP_NEGOTIATE_KEY_EXCH
>> 0: NTLMSSP_NEGOTIATE_56
>> DomainNameLen : 0x0007 (7)
>> DomainNameMaxLen : 0x0007 (7)
>> DomainName : *
>> DomainName : 'MYDOMAIN'
>> WorkstationLen : 0x000f (15)
>> WorkstationMaxLen : 0x000f (15)
>> Workstation : *
>> Workstation : 'myserver'
>> smb_signing_sign_pdu: sent SMB signature of
>> [0000] 42 53 52 53 50 59 4C 20 BSRSPYL
>> write_socket(6,174)
>> write_socket(6,174) wrote 174
>> got smb length of 256
>> size=256
>> smb_com=0x73
>> smb_rcls=22
>> smb_reh=0
>> smb_err=49152
>> smb_flg=136
>> smb_flg2=51203
>> smb_tid=0
>> smb_pid=28352
>> smb_uid=100
>> smb_mid=2
>> smt_wct=4
>> smb_vwv[ 0]= 255 (0xFF)
>> smb_vwv[ 1]= 0 (0x0)
>> smb_vwv[ 2]= 0 (0x0)
>> smb_vwv[ 3]= 163 (0xA3)
>> smb_bcc=213
>> [0000] A1 81 A0 30 81 9D A0 03 0A 01 01 A1 0C 06 0A 2B ¡. 0.. .
>> ...¡...+
>> [0010] 06 01 04 01 82 37 02 02 0A A2 81 87 04 81 84 4E .....7..
>> .......N
>> [0020] 54 4C 4D 53 53 50 00 02 00 00 00 0E 00 0E 00 30 TLMSSP..
>> .......0
>> [0030] 00 00 00 15 82 89 60 79 0C B4 2C A3 64 A6 AD 00 ......`y
>> ..,.d...
>> [0040] 00 00 00 00 00 00 00 46 00 46 00 3E 00 00 00 53 .......F
>> .F.>...S
>> [0050] 00 50 00 45 00 43 00 54 00 52 00 45 00 02 00 0E .P.E.C.T
>> .R.E....
>> [0060] 00 53 00 50 00 45 00 43 00 54 00 52 00 45 00 01 .S.P.E.C
>> .T.R.E..
>> [0070] 00 1E 00 43 00 4F 00 53 00 2D 00 43 00 43 00 2D ...C.O.S
>> .-.C.C.-
>> [0080] 00 43 00 4D 00 2D 00 56 00 49 00 45 00 57 00 53 .C.M.-.V
>> .I.E.W.S
>> [0090] 00 04 00 00 00 03 00 06 00 63 00 63 00 31 00 00 ........
>> .c.c.1..
>> [00A0] 00 00 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 ...U.n.i
>> .x...S.a
>> [00B0] 00 6D 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E .m.b.a.
>> .3...5..
>> [00C0] 00 38 00 00 00 53 00 50 00 45 00 43 00 54 00 52 .8...S.P
>> .E.C.T.R
>> [00D0] 00 45 00 00 00 .E...
>> size=256
>> smb_com=0x73
>> smb_rcls=22
>> smb_reh=0
>> smb_err=49152
>> smb_flg=136
>> smb_flg2=51203
>> smb_tid=0
>> smb_pid=28352
>> smb_uid=100
>> smb_mid=2
>> smt_wct=4
>> smb_vwv[ 0]= 255 (0xFF)
>> smb_vwv[ 1]= 0 (0x0)
>> smb_vwv[ 2]= 0 (0x0)
>> smb_vwv[ 3]= 163 (0xA3)
>> smb_bcc=213
>> [0000] A1 81 A0 30 81 9D A0 03 0A 01 01 A1 0C 06 0A 2B ¡. 0.. .
>> ...¡...+
>> [0010] 06 01 04 01 82 37 02 02 0A A2 81 87 04 81 84 4E .....7..
>> .......N
>> [0020] 54 4C 4D 53 53 50 00 02 00 00 00 0E 00 0E 00 30 TLMSSP..
>> .......0
>> [0030] 00 00 00 15 82 89 60 79 0C B4 2C A3 64 A6 AD 00 ......`y
>> ..,.d...
>> [0040] 00 00 00 00 00 00 00 46 00 46 00 3E 00 00 00 53 .......F
>> .F.>...S
>> [0050] 00 50 00 45 00 43 00 54 00 52 00 45 00 02 00 0E .P.E.C.T
>> .R.E....
>> [0060] 00 53 00 50 00 45 00 43 00 54 00 52 00 45 00 01 .S.P.E.C
>> .T.R.E..
>> [0070] 00 1E 00 43 00 4F 00 53 00 2D 00 43 00 43 00 2D ...C.O.S
>> .-.C.C.-
>> [0080] 00 43 00 4D 00 2D 00 56 00 49 00 45 00 57 00 53 .C.M.-.V
>> .I.E.W.S
>> [0090] 00 04 00 00 00 03 00 06 00 63 00 63 00 31 00 00 ........
>> .c.c.1..
>> [00A0] 00 00 00 55 00 6E 00 69 00 78 00 00 00 53 00 61 ...U.n.i
>> .x...S.a
>> [00B0] 00 6D 00 62 00 61 00 20 00 33 00 2E 00 35 00 2E .m.b.a.
>> .3...5..
>> [00C0] 00 38 00 00 00 53 00 50 00 45 00 43 00 54 00 52 .8...S.P
>> .E.C.T.R
>> [00D0] 00 45 00 00 00 .E...
>> &challenge: struct CHALLENGE_MESSAGE
>> Signature : 'NTLMSSP'
>> MessageType : NtLmChallenge (0x2)
>> TargetNameLen : 0x000e (14)
>> TargetNameMaxLen : 0x000e (14)
>> TargetName : *
>> TargetName : 'MYDOMAIN'
>> NegotiateFlags : 0x60898215 (1619624469)
>> 1: NTLMSSP_NEGOTIATE_UNICODE
>> 0: NTLMSSP_NEGOTIATE_OEM
>> 1: NTLMSSP_REQUEST_TARGET
>> 1: NTLMSSP_NEGOTIATE_SIGN
>> 0: NTLMSSP_NEGOTIATE_SEAL
>> 0: NTLMSSP_NEGOTIATE_DATAGRAM
>> 0: NTLMSSP_NEGOTIATE_LM_KEY
>> 0: NTLMSSP_NEGOTIATE_NETWARE
>> 1: NTLMSSP_NEGOTIATE_NTLM
>> 0: NTLMSSP_NEGOTIATE_NT_ONLY
>> 0: NTLMSSP_ANONYMOUS
>> 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
>> 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
>> 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
>> 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
>> 1: NTLMSSP_TARGET_TYPE_DOMAIN
>> 0: NTLMSSP_TARGET_TYPE_SERVER
>> 0: NTLMSSP_TARGET_TYPE_SHARE
>> 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
>> 0: NTLMSSP_NEGOTIATE_IDENTIFY
>> 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
>> 1: NTLMSSP_NEGOTIATE_TARGET_INFO
>> 0: NTLMSSP_NEGOTIATE_VERSION
>> 1: NTLMSSP_NEGOTIATE_128
>> 1: NTLMSSP_NEGOTIATE_KEY_EXCH
>> 0: NTLMSSP_NEGOTIATE_56
>> ServerChallenge : 790cb42ca364a6ad
>> Reserved : 0000000000000000
>> TargetInfoLen : 0x0046 (70)
>> TargetNameInfoMaxLen : 0x0046 (70)
>> TargetInfo : *
>> TargetInfo: struct AV_PAIR_LIST
>> count : 0x00000005 (5)
>> pair: ARRAY(5)
>> pair: struct AV_PAIR
>> AvId : MsvAvNbDomainName
>> (0x2)
>> AvLen : 0x000e (14)
>> Value : union
>> ntlmssp_AvValue(case 0x2)
>> AvNbDomainName : 'MYDOMAIN'
>> pair: struct AV_PAIR
>> AvId :
>MsvAvNbComputerName
>> (0x1)
>> AvLen : 0x001e (30)
>> Value : union
>> ntlmssp_AvValue(case 0x1)
>> AvNbComputerName : 'myserver'
>> pair: struct AV_PAIR
>> AvId : MsvAvDnsDomainName
>
>> (0x4)
>> AvLen : 0x0000 (0)
>> Value : union
>> ntlmssp_AvValue(case 0x4)
>> AvDnsDomainName : ''
>> pair: struct AV_PAIR
>> AvId :
>> MsvAvDnsComputerName (0x3)
>> AvLen : 0x0006 (6)
>> Value : union
>> ntlmssp_AvValue(case 0x3)
>> AvDnsComputerName : 'cc1'
>> pair: struct AV_PAIR
>> AvId : MsvAvEOL (0x0)
>> AvLen : 0x0000 (0)
>> Value : union
>> ntlmssp_AvValue(case 0x0)
>> Got challenge flags:
>> Got NTLMSSP neg_flags=0x60898215
>> NTLMSSP_NEGOTIATE_UNICODE
>> NTLMSSP_REQUEST_TARGET
>> NTLMSSP_NEGOTIATE_SIGN
>> NTLMSSP_NEGOTIATE_NTLM
>> NTLMSSP_NEGOTIATE_ALWAYS_SIGN
>> NTLMSSP_NEGOTIATE_NTLM2
>> NTLMSSP_NEGOTIATE_TARGET_INFO
>> NTLMSSP_NEGOTIATE_128
>> NTLMSSP_NEGOTIATE_KEY_EXCH
>> NTLMSSP: Set final flags:
>> Got NTLMSSP neg_flags=0x60088215
>> NTLMSSP_NEGOTIATE_UNICODE
>> NTLMSSP_REQUEST_TARGET
>> NTLMSSP_NEGOTIATE_SIGN
>> NTLMSSP_NEGOTIATE_NTLM
>> NTLMSSP_NEGOTIATE_ALWAYS_SIGN
>> NTLMSSP_NEGOTIATE_NTLM2
>> NTLMSSP_NEGOTIATE_128
>> NTLMSSP_NEGOTIATE_KEY_EXCH
>> &authenticate: struct AUTHENTICATE_MESSAGE
>> Signature : 'NTLMSSP'
>> MessageType : NtLmAuthenticate (3)
>> LmChallengeResponseLen : 0x0018 (24)
>> LmChallengeResponseMaxLen: 0x0018 (24)
>> LmChallengeResponse : *
>> LmChallengeResponse : union ntlmssp_LM_RESPONSE(case
>24)
>> v1: struct LM_RESPONSE
>> Response :
>> 078e894cc35e1708df68607b51c47cd6fc4cd6febd7d4ca4
>> NtChallengeResponseLen : 0x0072 (114)
>> NtChallengeResponseMaxLen: 0x0072 (114)
>> NtChallengeResponse : *
>> NtChallengeResponse : union
>> ntlmssp_NTLM_RESPONSE(case 114)
>> v2: struct NTLMv2_RESPONSE
>> Response :
>> ff564e232df73299417995e0973dd4e3
>> Challenge: struct NTLMv2_CLIENT_CHALLENGE
>> RespType : 0x01 (1)
>> HiRespType : 0x01 (1)
>> Reserved1 : 0x0000 (0)
>> Reserved2 : 0x00000000 (0)
>> TimeStamp : April 13, 2012
>05:23:17
>> PM GMT GMT
>> ChallengeFromClient : 7cc0c9cc205d2ce2
>> Reserved3 : 0x00000000 (0)
>> AvPairs: struct AV_PAIR_LIST
>> count : 0x00000005 (5)
>> pair: ARRAY(5)
>> pair: struct AV_PAIR
>> AvId :
>> MsvAvNbDomainName (0x2)
>> AvLen : 0x000e
>(14)
>> Value : union
>> ntlmssp_AvValue(case 0x2)
>> AvNbDomainName : 'MYDOMAIN'
>> pair: struct AV_PAIR
>> AvId :
>> MsvAvNbComputerName (0x1)
>> AvLen : 0x001e
>(30)
>> Value : union
>> ntlmssp_AvValue(case 0x1)
>> AvNbComputerName : 'myserver'
>> pair: struct AV_PAIR
>> AvId :
>> MsvAvDnsDomainName (0x4)
>> AvLen : 0x0000 (0)
>> Value : union
>> ntlmssp_AvValue(case 0x4)
>> AvDnsDomainName : ''
>> pair: struct AV_PAIR
>> AvId :
>> MsvAvDnsComputerName (0x3)
>> AvLen : 0x0006 (6)
>> Value : union
>> ntlmssp_AvValue(case 0x3)
>> AvDnsComputerName : 'cc1'
>> pair: struct AV_PAIR
>> AvId : MsvAvEOL
>(0x0)
>> AvLen : 0x0000 (0)
>> Value : union
>> ntlmssp_AvValue(case 0x0)
>> DomainNameLen : 0x000e (14)
>> DomainNameMaxLen : 0x000e (14)
>> DomainName : *
>> DomainName : 'MYDOMAIN'
>> UserNameLen : 0x0010 (16)
>> UserNameMaxLen : 0x0010 (16)
>> UserName : *
>> UserName : 'cdavis15'
>> WorkstationLen : 0x001e (30)
>> WorkstationMaxLen : 0x001e (30)
>> Workstation : *
>> Workstation : 'myserver'
>> EncryptedRandomSessionKeyLen: 0x0010 (16)
>> EncryptedRandomSessionKeyMaxLen: 0x0010 (16)
>> EncryptedRandomSessionKey: *
>> EncryptedRandomSessionKey: DATA_BLOB length=16
>> [0000] 7F 69 AF 9D 61 58 E0 8F FB 4B BF 94 3B B4 B9 EE .i..aXà.
>> ûK¿.;..î
>> NegotiateFlags : 0x60088215 (1611170325)
>> 1: NTLMSSP_NEGOTIATE_UNICODE
>> 0: NTLMSSP_NEGOTIATE_OEM
>> 1: NTLMSSP_REQUEST_TARGET
>> 1: NTLMSSP_NEGOTIATE_SIGN
>> 0: NTLMSSP_NEGOTIATE_SEAL
>> 0: NTLMSSP_NEGOTIATE_DATAGRAM
>> 0: NTLMSSP_NEGOTIATE_LM_KEY
>> 0: NTLMSSP_NEGOTIATE_NETWARE
>> 1: NTLMSSP_NEGOTIATE_NTLM
>> 0: NTLMSSP_NEGOTIATE_NT_ONLY
>> 0: NTLMSSP_ANONYMOUS
>> 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
>> 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
>> 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
>> 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
>> 0: NTLMSSP_TARGET_TYPE_DOMAIN
>> 0: NTLMSSP_TARGET_TYPE_SERVER
>> 0: NTLMSSP_TARGET_TYPE_SHARE
>> 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
>> 0: NTLMSSP_NEGOTIATE_IDENTIFY
>> 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
>> 0: NTLMSSP_NEGOTIATE_TARGET_INFO
>> 0: NTLMSSP_NEGOTIATE_VERSION
>> 1: NTLMSSP_NEGOTIATE_128
>> 1: NTLMSSP_NEGOTIATE_KEY_EXCH
>> 0: NTLMSSP_NEGOTIATE_56
>> NTLMSSP Sign/Seal - Initialising with flags:
>> Got NTLMSSP neg_flags=0x60088215
>> NTLMSSP_NEGOTIATE_UNICODE
>> NTLMSSP_REQUEST_TARGET
>> NTLMSSP_NEGOTIATE_SIGN
>> NTLMSSP_NEGOTIATE_NTLM
>> NTLMSSP_NEGOTIATE_ALWAYS_SIGN
>> NTLMSSP_NEGOTIATE_NTLM2
>> NTLMSSP_NEGOTIATE_128
>> NTLMSSP_NEGOTIATE_KEY_EXCH
>> smb_signing_sign_pdu: sent SMB signature of
>> [0000] 42 53 52 53 50 59 4C 20 BSRSPYL
>> write_socket(6,380)
>> write_socket(6,380) wrote 380
>> got smb length of 35
>> size=35
>> smb_com=0x73
>> smb_rcls=141
>> smb_reh=1
>> smb_err=49152
>> smb_flg=136
>> smb_flg2=51203
>> smb_tid=0
>> smb_pid=28352
>> smb_uid=100
>> smb_mid=3
>> smt_wct=0
>> smb_bcc=0
>> size=35
>> smb_com=0x73
>> smb_rcls=141
>> smb_reh=1
>> smb_err=49152
>> smb_flg=136
>> smb_flg2=51203
>> smb_tid=0
>> smb_pid=28352
>> smb_uid=100
>> smb_mid=3
>> smt_wct=0
>> smb_bcc=0
>> SPNEGO login failed: Trust relationship failure
>> session setup failed: NT_STATUS_TRUSTED_RELATIONSHIP_FAILURE
>>
>>
>
>--
>To unsubscribe from this list go to the following URL and read the
>instructions: https://lists.samba.org/mailman/options/samba
- --
Niels Dettenbach
Syndicat IT&Internet
http://www.syndicat.com
-----BEGIN PGP SIGNATURE-----
Version: APG v1.0.8
iIEEAREIAEEFAk+KpBo6HE5pZWxzIERldHRlbmJhY2ggKFN5bmRpY2F0IElUJklu
dGVybmV0KSA8bmRAc3luZGljYXQuY29tPgAKCRBU3ERlZRyiDUa0AJ9wnIVXJnW6
WdKRIyhNsbh7Bc+xFQCfdDQrO+dlZjVuTg+h8k4hMPwgRr0=
=4E7g
-----END PGP SIGNATURE-----
More information about the samba
mailing list