[jcifs] NTLM usrname/password failure after each 5 mins

Ti Lian Hwang lian_hwang.ti at fairprice.com.sg
Wed Jun 18 01:58:41 GMT 2008


PS: The below was using jcifs_1.2.22c.jar

-----Original Message-----
From: Ti Lian Hwang 
Sent: Wednesday, June 18, 2008 9:47 AM
To: 'Michael B Allen'
Cc: jcifs at lists.samba.org
Subject: RE: [jcifs] NTLM usrname/password failure after each 5 mins


Sorry the ssnLimit error was not a NPE error.
It was a "Invalid access to memory location."

See logs belows, and no, it does not solve the timeout problem.

        <init-param>
            <param-name>jcifs.util.loglevel</param-name>
            <param-value>6</param-value>
        </init-param>
        <init-param>
            <param-name>jcifs.smb.client.soTimeout</param-name>
            <param-value>2000</param-value>
        </init-param>
        <init-param>
            <param-name>jcifs.smb.client.ssnLimit</param-name>
            <param-value>1</param-value>

Note that the log has been passed through "cat -v" as there are \000 (appearing as ^@) in the data.

SmbComNegotiate[command=SMB_COM_NEGOTIATE,received=false,errorCode=0,flags=0x0018,flags2=0xC003,signSeq=0,tid=0,pid=33906,uid=0,mid=1,wordCount=0,byteCount=12,wordCount=0,dialects=NT LM 0.12]^M
00000: FF 53 4D 42 72 00 00 00 00 18 03 C0 00 00 00 00  |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00  |..........r.....|^M
00020: 00 0C 00 02 4E 54 20 4C 4D 20 30 2E 31 32 00     |....NT LM 0.12. |^M
^M
New data read: Transport8[0.0.0.0<00>/10.10.1.7:0]^M
00000: FF 53 4D 42 72 00 00 00 00 98 03 C0 00 00 00 00  |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00  |..........r.....|^M
^M
byteCount=50 but readBytesWireFormat returned 30^M
SmbComNegotiateResponse[command=SMB_COM_NEGOTIATE,received=false,errorCode=0,flags=0x0098,flags2=0xC003,signSeq=0,tid=0,pid=33906,uid=0,mid=1,wordCount=17,byteCount=50,wordCount=17,dialectIndex=0,securityMode=0xF,security=user,encryptedPasswords=true,maxMpxCount=50,maxNumberVcs=1,maxBufferSize=16644,maxRawSize=65536,sessionKey=0x00000000,capabilities=0x0001F3FD,serverTime=Wed Jun 18 09:38:56 GMT+08:00 2008,serverTimeZone=65056,encryptionKeyLength=8,byteCount=50,encryptionKey=0x556678958D3F4FCC,oemDomainName=FAIRPRICEHQ]^M
00000: FF 53 4D 42 72 00 00 00 00 98 03 C0 00 00 00 00  |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00  |..........r.....|^M
00020: 11 00 00 0F 32 00 01 00 04 41 00 00 00 00 01     |....2....A..... |^M
^M
NodeStatusRequest[nameTrnId=6,isResponse=false,opCode=QUERY,isAuthAnswer=false,isTruncated=false,isRecurAvailable=false,isRecurDesired=false,isBroadcast=false,resultCode=0,questionCount=1,answerCount=0,authorityCount=0,additionalCount=0,questionName=*^@^@^@^@^@^@^@^@^@^@^@^@^@^@<00>,questionType=0x0021,questionClass=IN,recordName=null,recordType=0x0000,recordClass=0x0000,ttl=0,rDataLength=0]^M
NetBIOS: new data read from socket^M
00000: 00 06 00 00 00 01 00 00 00 00 00 00 20 43 4B 41  |............ CKA|^M
00010: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41  |AAAAAAAAAAAAAAAA|^M
00020: 41 41 41 41 41 41 41 41 41 41 41 41 41 00 00 21  |AAAAAAAAAAAAA..!|^M
00030: 00 01                                            |..              |^M
^M
NodeStatusResponse[nameTrnId=6,isResponse=true,opCode=QUERY,isAuthAnswer=true,isTruncated=false,isRecurAvailable=false,isRecurDesired=false,isBroadcast=false,resultCode=0,questionCount=0,answerCount=1,authorityCount=0,additionalCount=0,questionName=null,questionType=0x0000,questionClass=IN,recordName=*^@^@^@^@^@^@^@^@^@^@^@^@^@^@<00>,recordType=0x0021,recordClass=IN,ttl=0,rDataLength=191]^M
00000: 00 06 84 00 00 00 00 01 00 00 00 00 20 43 4B 41  |............ CKA|^M
00010: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41  |AAAAAAAAAAAAAAAA|^M
00020: 41 41 41 41 41 41 41 41 41 41 41 41 41 00 00 21  |AAAAAAAAAAAAA..!|^M
00030: 00 01 00 00 00 00 00 BF 08 53 54 41 52 44 55 53  |.......M-?.STARDUS|^M
00040: 54 20 20 20 20 20 20 20 00 44 00 46 41 49 52 50  |T       .D.FAIRP|^M
00050: 52 49 43 45 48 51 20 20 20 20 00 C4 00 46 41 49  |RICEHQ    .M-D.FAI|^M
00060: 52 50 52 49 43 45 48 51 20 20 20 20 1C C4 00 53  |RPRICEHQ    .M-D.S|^M
00070: 54 41 52 44 55 53 54 20 20 20 20 20 20 20 20 44  |TARDUST        D|^M
00080: 00 46 41 49 52 50 52 49 43 45 48 51 20 20 20 20  |.FAIRPRICEHQ    |^M
00090: 1B 44 00 46 41 49 52 50 52 49 43 45 48 51 20 20  |.D.FAIRPRICEHQ  |^M
000A0: 20 20 1E C4 00 46 41 49 52 50 52 49 43 45 48 51  |  .M-D.FAIRPRICEHQ|^M
000B0: 20 20 20 20 1D 44 00 01 02 5F 5F 4D 53 42 52 4F  |    .D...__MSBRO|^M
000C0: 57 53 45 5F 5F 02 01 C4 00 00 60 08 A5 A7 C5 00  |WSE__..M-D..`.M-%M-'M-E.|^M
000D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  |................|^M
000E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  |................|^M
000F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  |................|^M
00100: 00 00 00 00 00 00 00 00 00                       |.........       |^M
^M
SmbComNegotiate[command=SMB_COM_NEGOTIATE,received=false,errorCode=0,flags=0x0018,flags2=0xC003,signSeq=0,tid=0,pid=33906,uid=0,mid=1,wordCount=0,byteCount=12,wordCount=0,dialects=NT LM 0.12]^M
00000: FF 53 4D 42 72 00 00 00 00 18 03 C0 00 00 00 00  |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00  |..........r.....|^M
00020: 00 0C 00 02 4E 54 20 4C 4D 20 30 2E 31 32 00     |....NT LM 0.12. |^M
^M
New data read: Transport9[0.0.0.0<00>/10.10.1.7:0]^M
00000: FF 53 4D 42 72 00 00 00 00 98 03 C0 00 00 00 00  |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00  |..........r.....|^M
^M
byteCount=50 but readBytesWireFormat returned 30^M
SmbComNegotiateResponse[command=SMB_COM_NEGOTIATE,received=false,errorCode=0,flags=0x0098,flags2=0xC003,signSeq=0,tid=0,pid=33906,uid=0,mid=1,wordCount=17,byteCount=50,wordCount=17,dialectIndex=0,securityMode=0xF,security=user,encryptedPasswords=true,maxMpxCount=50,maxNumberVcs=1,maxBufferSize=16644,maxRawSize=65536,sessionKey=0x00000000,capabilities=0x0001F3FD,serverTime=Wed Jun 18 09:38:57 GMT+08:00 2008,serverTimeZone=65056,encryptionKeyLength=8,byteCount=50,encryptionKey=0x993A4A5A0CA6ACD2,oemDomainName=FAIRPRICEHQ]^M
00000: FF 53 4D 42 72 00 00 00 00 98 03 C0 00 00 00 00  |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00  |..........r.....|^M
00020: 11 00 00 0F 32 00 01 00 04 41 00 00 00 00 01     |....2....A..... |^M
^M
NodeStatusRequest[nameTrnId=7,isResponse=false,opCode=QUERY,isAuthAnswer=false,isTruncated=false,isRecurAvailable=false,isRecurDesired=false,isBroadcast=false,resultCode=0,questionCount=1,answerCount=0,authorityCount=0,additionalCount=0,questionName=*^@^@^@^@^@^@^@^@^@^@^@^@^@^@<00>,questionType=0x0021,questionClass=IN,recordName=null,recordType=0x0000,recordClass=0x0000,ttl=0,rDataLength=0]^M
00000: 00 07 00 00 00 01 00 00 00 00 00 00 20 43 4B 41  |............ CKA|^M
00010: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41  |AAAAAAAAAAAAAAAA|^M
00020: 41 41 41 41 41 41 41 41 41 41 41 41 41 00 00 21  |AAAAAAAAAAAAA..!|^M
00030: 00 01                                            |..              |^M
^M
NetBIOS: new data read from socket^M
NodeStatusResponse[nameTrnId=7,isResponse=true,opCode=QUERY,isAuthAnswer=true,isTruncated=false,isRecurAvailable=false,isRecurDesired=false,isBroadcast=false,resultCode=0,questionCount=0,answerCount=1,authorityCount=0,additionalCount=0,questionName=null,questionType=0x0000,questionClass=IN,recordName=*^@^@^@^@^@^@^@^@^@^@^@^@^@^@<00>,recordType=0x0021,recordClass=IN,ttl=0,rDataLength=191]^M
00000: 00 07 84 00 00 00 00 01 00 00 00 00 20 43 4B 41  |............ CKA|^M
00010: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41  |AAAAAAAAAAAAAAAA|^M
00020: 41 41 41 41 41 41 41 41 41 41 41 41 41 00 00 21  |AAAAAAAAAAAAA..!|^M
00030: 00 01 00 00 00 00 00 BF 08 53 54 41 52 44 55 53  |.......M-?.STARDUS|^M
00040: 54 20 20 20 20 20 20 20 00 44 00 46 41 49 52 50  |T       .D.FAIRP|^M
00050: 52 49 43 45 48 51 20 20 20 20 00 C4 00 46 41 49  |RICEHQ    .M-D.FAI|^M
00060: 52 50 52 49 43 45 48 51 20 20 20 20 1C C4 00 53  |RPRICEHQ    .M-D.S|^M
00070: 54 41 52 44 55 53 54 20 20 20 20 20 20 20 20 44  |TARDUST        D|^M
00080: 00 46 41 49 52 50 52 49 43 45 48 51 20 20 20 20  |.FAIRPRICEHQ    |^M
00090: 1B 44 00 46 41 49 52 50 52 49 43 45 48 51 20 20  |.D.FAIRPRICEHQ  |^M
000A0: 20 20 1E C4 00 46 41 49 52 50 52 49 43 45 48 51  |  .M-D.FAIRPRICEHQ|^M
000B0: 20 20 20 20 1D 44 00 01 02 5F 5F 4D 53 42 52 4F  |    .D...__MSBRO|^M
000C0: 57 53 45 5F 5F 02 01 C4 00 00 60 08 A5 A7 C5 00  |WSE__..M-D..`.M-%M-'M-E.|^M
000D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  |................|^M
000E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  |................|^M
000F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  |................|^M
00100: 00 00 00 00 00 00 00 00 00                       |.........       |^M
^M
SmbComNegotiate[command=SMB_COM_NEGOTIATE,received=false,errorCode=0,flags=0x0018,flags2=0xC003,signSeq=0,tid=0,pid=33906,uid=0,mid=1,wordCount=0,byteCount=12,wordCount=0,dialects=NT LM 0.12]^M
00000: FF 53 4D 42 72 00 00 00 00 18 03 C0 00 00 00 00  |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00  |..........r.....|^M
00020: 00 0C 00 02 4E 54 20 4C 4D 20 30 2E 31 32 00     |....NT LM 0.12. |^M
^M
New data read: Transport10[STARDUST<00>/10.10.1.7:0]^M
00000: FF 53 4D 42 72 00 00 00 00 98 03 C0 00 00 00 00  |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00  |..........r.....|^M
^M
byteCount=50 but readBytesWireFormat returned 30^M
SmbComNegotiateResponse[command=SMB_COM_NEGOTIATE,received=false,errorCode=0,flags=0x0098,flags2=0xC003,signSeq=0,tid=0,pid=33906,uid=0,mid=1,wordCount=17,byteCount=50,wordCount=17,dialectIndex=0,securityMode=0xF,security=user,encryptedPasswords=true,maxMpxCount=50,maxNumberVcs=1,maxBufferSize=16644,maxRawSize=65536,sessionKey=0x00000000,capabilities=0x0001F3FD,serverTime=Wed Jun 18 09:38:57 GMT+08:00 2008,serverTimeZone=65056,encryptionKeyLength=8,byteCount=50,encryptionKey=0xFEF617CA7950CB7B,oemDomainName=FAIRPRICEHQ]^M
00000: FF 53 4D 42 72 00 00 00 00 98 03 C0 00 00 00 00  |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00  |..........r.....|^M
00020: 11 00 00 0F 32 00 01 00 04 41 00 00 00 00 01     |....2....A..... |^M
^M
treeConnect: unc=\\STARDUST\IPC$,service=?????^M
sessionSetup: accountName=test6,primaryDomain=CHEERS^M
NtlmHttpFilter: CHEERS\test6: 0xC0000005: jcifs.smb.SmbAuthException: Invalid access to memory location.^M
>> Failed to negotiate NTLM for null /JcifsTest/test^M

-----Original Message-----
From: Michael B Allen [mailto:ioplex at gmail.com]
Sent: Wednesday, June 18, 2008 12:33 AM
To: Ti Lian Hwang
Cc: jcifs at lists.samba.org
Subject: Re: [jcifs] NTLM usrname/password failure after each 5 mins


On 6/17/08, Ti Lian Hwang <lian_hwang.ti at fairprice.com.sg> wrote:
> to use jcifs.smb.client.ssnLimit = 1.
>
> but that option causes a null pointer error everytime I tried it
> (prior to January anyway).

If you can provide a stack trace of that I would be happy to fix it.
An NPE is almost always a bug worth reporting.

Mike

-- 
Michael B Allen
PHP Active Directory SPNEGO SSO
http://www.ioplex.com/


More information about the jcifs mailing list