[jcifs] NTLM usrname/password failure after each 5 mins
Ti Lian Hwang
lian_hwang.ti at fairprice.com.sg
Wed Jun 18 01:58:41 GMT 2008
PS: The below was using jcifs_1.2.22c.jar
-----Original Message-----
From: Ti Lian Hwang
Sent: Wednesday, June 18, 2008 9:47 AM
To: 'Michael B Allen'
Cc: jcifs at lists.samba.org
Subject: RE: [jcifs] NTLM usrname/password failure after each 5 mins
Sorry the ssnLimit error was not a NPE error.
It was a "Invalid access to memory location."
See logs belows, and no, it does not solve the timeout problem.
<init-param>
<param-name>jcifs.util.loglevel</param-name>
<param-value>6</param-value>
</init-param>
<init-param>
<param-name>jcifs.smb.client.soTimeout</param-name>
<param-value>2000</param-value>
</init-param>
<init-param>
<param-name>jcifs.smb.client.ssnLimit</param-name>
<param-value>1</param-value>
Note that the log has been passed through "cat -v" as there are \000 (appearing as ^@) in the data.
SmbComNegotiate[command=SMB_COM_NEGOTIATE,received=false,errorCode=0,flags=0x0018,flags2=0xC003,signSeq=0,tid=0,pid=33906,uid=0,mid=1,wordCount=0,byteCount=12,wordCount=0,dialects=NT LM 0.12]^M
00000: FF 53 4D 42 72 00 00 00 00 18 03 C0 00 00 00 00 |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00 |..........r.....|^M
00020: 00 0C 00 02 4E 54 20 4C 4D 20 30 2E 31 32 00 |....NT LM 0.12. |^M
^M
New data read: Transport8[0.0.0.0<00>/10.10.1.7:0]^M
00000: FF 53 4D 42 72 00 00 00 00 98 03 C0 00 00 00 00 |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00 |..........r.....|^M
^M
byteCount=50 but readBytesWireFormat returned 30^M
SmbComNegotiateResponse[command=SMB_COM_NEGOTIATE,received=false,errorCode=0,flags=0x0098,flags2=0xC003,signSeq=0,tid=0,pid=33906,uid=0,mid=1,wordCount=17,byteCount=50,wordCount=17,dialectIndex=0,securityMode=0xF,security=user,encryptedPasswords=true,maxMpxCount=50,maxNumberVcs=1,maxBufferSize=16644,maxRawSize=65536,sessionKey=0x00000000,capabilities=0x0001F3FD,serverTime=Wed Jun 18 09:38:56 GMT+08:00 2008,serverTimeZone=65056,encryptionKeyLength=8,byteCount=50,encryptionKey=0x556678958D3F4FCC,oemDomainName=FAIRPRICEHQ]^M
00000: FF 53 4D 42 72 00 00 00 00 98 03 C0 00 00 00 00 |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00 |..........r.....|^M
00020: 11 00 00 0F 32 00 01 00 04 41 00 00 00 00 01 |....2....A..... |^M
^M
NodeStatusRequest[nameTrnId=6,isResponse=false,opCode=QUERY,isAuthAnswer=false,isTruncated=false,isRecurAvailable=false,isRecurDesired=false,isBroadcast=false,resultCode=0,questionCount=1,answerCount=0,authorityCount=0,additionalCount=0,questionName=*^@^@^@^@^@^@^@^@^@^@^@^@^@^@<00>,questionType=0x0021,questionClass=IN,recordName=null,recordType=0x0000,recordClass=0x0000,ttl=0,rDataLength=0]^M
NetBIOS: new data read from socket^M
00000: 00 06 00 00 00 01 00 00 00 00 00 00 20 43 4B 41 |............ CKA|^M
00010: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 |AAAAAAAAAAAAAAAA|^M
00020: 41 41 41 41 41 41 41 41 41 41 41 41 41 00 00 21 |AAAAAAAAAAAAA..!|^M
00030: 00 01 |.. |^M
^M
NodeStatusResponse[nameTrnId=6,isResponse=true,opCode=QUERY,isAuthAnswer=true,isTruncated=false,isRecurAvailable=false,isRecurDesired=false,isBroadcast=false,resultCode=0,questionCount=0,answerCount=1,authorityCount=0,additionalCount=0,questionName=null,questionType=0x0000,questionClass=IN,recordName=*^@^@^@^@^@^@^@^@^@^@^@^@^@^@<00>,recordType=0x0021,recordClass=IN,ttl=0,rDataLength=191]^M
00000: 00 06 84 00 00 00 00 01 00 00 00 00 20 43 4B 41 |............ CKA|^M
00010: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 |AAAAAAAAAAAAAAAA|^M
00020: 41 41 41 41 41 41 41 41 41 41 41 41 41 00 00 21 |AAAAAAAAAAAAA..!|^M
00030: 00 01 00 00 00 00 00 BF 08 53 54 41 52 44 55 53 |.......M-?.STARDUS|^M
00040: 54 20 20 20 20 20 20 20 00 44 00 46 41 49 52 50 |T .D.FAIRP|^M
00050: 52 49 43 45 48 51 20 20 20 20 00 C4 00 46 41 49 |RICEHQ .M-D.FAI|^M
00060: 52 50 52 49 43 45 48 51 20 20 20 20 1C C4 00 53 |RPRICEHQ .M-D.S|^M
00070: 54 41 52 44 55 53 54 20 20 20 20 20 20 20 20 44 |TARDUST D|^M
00080: 00 46 41 49 52 50 52 49 43 45 48 51 20 20 20 20 |.FAIRPRICEHQ |^M
00090: 1B 44 00 46 41 49 52 50 52 49 43 45 48 51 20 20 |.D.FAIRPRICEHQ |^M
000A0: 20 20 1E C4 00 46 41 49 52 50 52 49 43 45 48 51 | .M-D.FAIRPRICEHQ|^M
000B0: 20 20 20 20 1D 44 00 01 02 5F 5F 4D 53 42 52 4F | .D...__MSBRO|^M
000C0: 57 53 45 5F 5F 02 01 C4 00 00 60 08 A5 A7 C5 00 |WSE__..M-D..`.M-%M-'M-E.|^M
000D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|^M
000E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|^M
000F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|^M
00100: 00 00 00 00 00 00 00 00 00 |......... |^M
^M
SmbComNegotiate[command=SMB_COM_NEGOTIATE,received=false,errorCode=0,flags=0x0018,flags2=0xC003,signSeq=0,tid=0,pid=33906,uid=0,mid=1,wordCount=0,byteCount=12,wordCount=0,dialects=NT LM 0.12]^M
00000: FF 53 4D 42 72 00 00 00 00 18 03 C0 00 00 00 00 |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00 |..........r.....|^M
00020: 00 0C 00 02 4E 54 20 4C 4D 20 30 2E 31 32 00 |....NT LM 0.12. |^M
^M
New data read: Transport9[0.0.0.0<00>/10.10.1.7:0]^M
00000: FF 53 4D 42 72 00 00 00 00 98 03 C0 00 00 00 00 |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00 |..........r.....|^M
^M
byteCount=50 but readBytesWireFormat returned 30^M
SmbComNegotiateResponse[command=SMB_COM_NEGOTIATE,received=false,errorCode=0,flags=0x0098,flags2=0xC003,signSeq=0,tid=0,pid=33906,uid=0,mid=1,wordCount=17,byteCount=50,wordCount=17,dialectIndex=0,securityMode=0xF,security=user,encryptedPasswords=true,maxMpxCount=50,maxNumberVcs=1,maxBufferSize=16644,maxRawSize=65536,sessionKey=0x00000000,capabilities=0x0001F3FD,serverTime=Wed Jun 18 09:38:57 GMT+08:00 2008,serverTimeZone=65056,encryptionKeyLength=8,byteCount=50,encryptionKey=0x993A4A5A0CA6ACD2,oemDomainName=FAIRPRICEHQ]^M
00000: FF 53 4D 42 72 00 00 00 00 98 03 C0 00 00 00 00 |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00 |..........r.....|^M
00020: 11 00 00 0F 32 00 01 00 04 41 00 00 00 00 01 |....2....A..... |^M
^M
NodeStatusRequest[nameTrnId=7,isResponse=false,opCode=QUERY,isAuthAnswer=false,isTruncated=false,isRecurAvailable=false,isRecurDesired=false,isBroadcast=false,resultCode=0,questionCount=1,answerCount=0,authorityCount=0,additionalCount=0,questionName=*^@^@^@^@^@^@^@^@^@^@^@^@^@^@<00>,questionType=0x0021,questionClass=IN,recordName=null,recordType=0x0000,recordClass=0x0000,ttl=0,rDataLength=0]^M
00000: 00 07 00 00 00 01 00 00 00 00 00 00 20 43 4B 41 |............ CKA|^M
00010: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 |AAAAAAAAAAAAAAAA|^M
00020: 41 41 41 41 41 41 41 41 41 41 41 41 41 00 00 21 |AAAAAAAAAAAAA..!|^M
00030: 00 01 |.. |^M
^M
NetBIOS: new data read from socket^M
NodeStatusResponse[nameTrnId=7,isResponse=true,opCode=QUERY,isAuthAnswer=true,isTruncated=false,isRecurAvailable=false,isRecurDesired=false,isBroadcast=false,resultCode=0,questionCount=0,answerCount=1,authorityCount=0,additionalCount=0,questionName=null,questionType=0x0000,questionClass=IN,recordName=*^@^@^@^@^@^@^@^@^@^@^@^@^@^@<00>,recordType=0x0021,recordClass=IN,ttl=0,rDataLength=191]^M
00000: 00 07 84 00 00 00 00 01 00 00 00 00 20 43 4B 41 |............ CKA|^M
00010: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 |AAAAAAAAAAAAAAAA|^M
00020: 41 41 41 41 41 41 41 41 41 41 41 41 41 00 00 21 |AAAAAAAAAAAAA..!|^M
00030: 00 01 00 00 00 00 00 BF 08 53 54 41 52 44 55 53 |.......M-?.STARDUS|^M
00040: 54 20 20 20 20 20 20 20 00 44 00 46 41 49 52 50 |T .D.FAIRP|^M
00050: 52 49 43 45 48 51 20 20 20 20 00 C4 00 46 41 49 |RICEHQ .M-D.FAI|^M
00060: 52 50 52 49 43 45 48 51 20 20 20 20 1C C4 00 53 |RPRICEHQ .M-D.S|^M
00070: 54 41 52 44 55 53 54 20 20 20 20 20 20 20 20 44 |TARDUST D|^M
00080: 00 46 41 49 52 50 52 49 43 45 48 51 20 20 20 20 |.FAIRPRICEHQ |^M
00090: 1B 44 00 46 41 49 52 50 52 49 43 45 48 51 20 20 |.D.FAIRPRICEHQ |^M
000A0: 20 20 1E C4 00 46 41 49 52 50 52 49 43 45 48 51 | .M-D.FAIRPRICEHQ|^M
000B0: 20 20 20 20 1D 44 00 01 02 5F 5F 4D 53 42 52 4F | .D...__MSBRO|^M
000C0: 57 53 45 5F 5F 02 01 C4 00 00 60 08 A5 A7 C5 00 |WSE__..M-D..`.M-%M-'M-E.|^M
000D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|^M
000E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|^M
000F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|^M
00100: 00 00 00 00 00 00 00 00 00 |......... |^M
^M
SmbComNegotiate[command=SMB_COM_NEGOTIATE,received=false,errorCode=0,flags=0x0018,flags2=0xC003,signSeq=0,tid=0,pid=33906,uid=0,mid=1,wordCount=0,byteCount=12,wordCount=0,dialects=NT LM 0.12]^M
00000: FF 53 4D 42 72 00 00 00 00 18 03 C0 00 00 00 00 |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00 |..........r.....|^M
00020: 00 0C 00 02 4E 54 20 4C 4D 20 30 2E 31 32 00 |....NT LM 0.12. |^M
^M
New data read: Transport10[STARDUST<00>/10.10.1.7:0]^M
00000: FF 53 4D 42 72 00 00 00 00 98 03 C0 00 00 00 00 |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00 |..........r.....|^M
^M
byteCount=50 but readBytesWireFormat returned 30^M
SmbComNegotiateResponse[command=SMB_COM_NEGOTIATE,received=false,errorCode=0,flags=0x0098,flags2=0xC003,signSeq=0,tid=0,pid=33906,uid=0,mid=1,wordCount=17,byteCount=50,wordCount=17,dialectIndex=0,securityMode=0xF,security=user,encryptedPasswords=true,maxMpxCount=50,maxNumberVcs=1,maxBufferSize=16644,maxRawSize=65536,sessionKey=0x00000000,capabilities=0x0001F3FD,serverTime=Wed Jun 18 09:38:57 GMT+08:00 2008,serverTimeZone=65056,encryptionKeyLength=8,byteCount=50,encryptionKey=0xFEF617CA7950CB7B,oemDomainName=FAIRPRICEHQ]^M
00000: FF 53 4D 42 72 00 00 00 00 98 03 C0 00 00 00 00 |M-^?SMBr......M- at ....|^M
00010: 00 00 00 00 00 00 00 00 00 00 72 84 00 00 01 00 |..........r.....|^M
00020: 11 00 00 0F 32 00 01 00 04 41 00 00 00 00 01 |....2....A..... |^M
^M
treeConnect: unc=\\STARDUST\IPC$,service=?????^M
sessionSetup: accountName=test6,primaryDomain=CHEERS^M
NtlmHttpFilter: CHEERS\test6: 0xC0000005: jcifs.smb.SmbAuthException: Invalid access to memory location.^M
>> Failed to negotiate NTLM for null /JcifsTest/test^M
-----Original Message-----
From: Michael B Allen [mailto:ioplex at gmail.com]
Sent: Wednesday, June 18, 2008 12:33 AM
To: Ti Lian Hwang
Cc: jcifs at lists.samba.org
Subject: Re: [jcifs] NTLM usrname/password failure after each 5 mins
On 6/17/08, Ti Lian Hwang <lian_hwang.ti at fairprice.com.sg> wrote:
> to use jcifs.smb.client.ssnLimit = 1.
>
> but that option causes a null pointer error everytime I tried it
> (prior to January anyway).
If you can provide a stack trace of that I would be happy to fix it.
An NPE is almost always a bug worth reporting.
Mike
--
Michael B Allen
PHP Active Directory SPNEGO SSO
http://www.ioplex.com/
More information about the jcifs
mailing list