[Samba] Samba ADS Winbind unable to join SuSe 9.1

Sundaram Ramasamy sfgroups at gmail.com
Thu Nov 18 01:46:28 GMT 2004


Hi all,

We are trying to add SuSe 9.1 file server to Windows Domain. Here is
our configuration.

      Windows 2000 Active Directory
       SuSe 9.1 with Samba 3.0.8
       
  When I try to add Linux file server to windows domain using net
command, net command dies with segment fault message. While starting
winbind process, it dies with segment fault error message.

Here is my configuration files and error message on this problem.

smb.conf:
========
# Global parameters
[global]
        workgroup = xyz
        realm = xyz.COM
        security = ADS
        map to guest = Bad User
        password server = 192.168.1.201
        socket options = TCP_NODELAY SO_RCVBUF=8192 SO_SNDBUF=8192
        preferred master = No
        local master = No
        domain master = No
        wins server = 192.168.1.201
        ldap ssl = no
        idmap uid = 10000-20000
        idmap gid = 10000-20000
        winbind separator = /
        winbind use default domain = Yes
        printer admin = @ntadmin, root, administrator
 
[homes]
        comment = Home Directory
        valid users = xyz/%S
        read only = No
        browseable = No


net as join -UAdministrator -d 10  command output
=====================================

  ads_try_connect: trying ldap server port 389
[2004/11/17 20:11:24, 3] libads/ldap.c:ads_connect(247)
  Connected to LDAP server 192.168.1.201
[2004/11/17 20:11:24, 3] libads/ldap.c:ads_server_info(2431)
  got ldap server name visual1 at XYZ.COM, using bind path: dc=XYZ,dc=COM
[2004/11/17 20:11:24, 4] libads/ldap.c:ads_server_info(2437)
  time offset is -86 seconds
[2004/11/17 20:11:24, 4] libads/sasl.c:ads_sasl_bind(447)
  Found SASL mechanism GSS-SPNEGO
[2004/11/17 20:11:24, 3] libads/sasl.c:ads_sasl_spnego_bind(204)
  ads_sasl_spnego_bind: got OID=1 2 840 48018 1 2 2
[2004/11/17 20:11:24, 3] libads/sasl.c:ads_sasl_spnego_bind(204)
  ads_sasl_spnego_bind: got OID=1 2 840 113554 1 2 2
[2004/11/17 20:11:24, 3] libads/sasl.c:ads_sasl_spnego_bind(204)
  ads_sasl_spnego_bind: got OID=1 2 840 113554 1 2 2 3
[2004/11/17 20:11:24, 3] libads/sasl.c:ads_sasl_spnego_bind(204)
  ads_sasl_spnego_bind: got OID=1 3 6 1 4 1 311 2 2 10
[2004/11/17 20:11:24, 3] libads/sasl.c:ads_sasl_spnego_bind(211)
  ads_sasl_spnego_bind: got server principal name =visual1$@XYZ.COM
[2004/11/17 20:11:24, 3] libsmb/clikrb5.c:ads_krb5_mk_req(382)
  ads_krb5_mk_req: krb5_cc_get_principal failed (No such file or directory)
[2004/11/17 20:11:24, 3] libsmb/clikrb5.c:ads_cleanup_expired_creds(319)
  Ticket in ccache[MEMORY:net_ads] expiration Thu, 18 Nov 2004 06:09:58 GMT
[2004/11/17 20:11:24, 10] libsmb/clikrb5.c:ads_krb5_mk_req(409)
  ads_krb5_mk_req: Ticket (visual1$@XYZ.COM) in ccache
(MEMORY:net_ads) is valid until: (Thu, 18 Nov 2004 06:09:58 GMT -
1100776198)
[2004/11/17 20:11:24, 10] libsmb/clikrb5.c:get_krb5_smb_session_key(511)
  Got KRB5 session key of length 16
[2004/11/17 20:11:24, 10] lib/util.c:name_to_fqdn(2506)
  name_to_fqdn: lookup for filesrv1 -> filesrv1.XYZ.com.
[2004/11/17 20:11:24, 0] libads/ldap.c:ads_add_machine_acct(1366)
  ads_add_machine_acct: Host account for filesrv1 already exists -
modifying old account
[2004/11/17 20:11:24, 5] libads/ldap_utils.c:ads_do_search_retry(56)
  Search for (objectclass=*) gave 1 replies
[2004/11/17 20:11:25, 3] libads/ldap.c:ads_workgroup_name(2526)
  Found alternate name 'XYZ' for realm 'XYZ.COM'

net command strace output:
=====================
# strace -v -f -F -o /tmp/aa net ads join -UAdministrator

6418  fcntl64(3, F_SETLKW64, {type=F_WRLCK, whence=SEEK_SET,
start=324, len=1}, 0xbfffe370) = 0
6418  fcntl64(3, F_SETLKW64, {type=F_UNLCK, whence=SEEK_SET,
start=324, len=1}, 0xbfffe370) = 0
6418  fcntl64(3, F_SETLKW64, {type=F_WRLCK, whence=SEEK_SET,
start=344, len=1}, 0xbfffe470) = 0
6418  fcntl64(3, F_SETLKW64, {type=F_UNLCK, whence=SEEK_SET,
start=344, len=1}, 0xbfffe470) = 0
6418  time(NULL)                        = 1100740285
6418  fcntl64(3, F_SETLKW64, {type=F_WRLCK, whence=SEEK_SET,
start=532, len=1}, 0xbfffe470) = 0
6418  fcntl64(3, F_SETLKW64, {type=F_UNLCK, whence=SEEK_SET,
start=532, len=1}, 0xbfffe470) = 0
6418  fcntl64(3, F_SETLKW64, {type=F_WRLCK, whence=SEEK_SET,
start=552, len=1}, 0xbfffe470) = 0
6418  fcntl64(3, F_SETLKW64, {type=F_UNLCK, whence=SEEK_SET,
start=552, len=1}, 0xbfffe470) = 0
6418  getuid32()                        = 0
6418  geteuid32()                       = 0
6418  getgid32()                        = 0
6418  getegid32()                       = 0
6418  open("/etc/krb5.conf", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No
such file or directory)
6418  getuid32()                        = 0
6418  geteuid32()                       = 0
6418  getgid32()                        = 0
6418  getegid32()                       = 0
6418  --- SIGSEGV (Segmentation fault) @ 0 (0) ---
6418  +++ killed by SIGSEGV +++

#tcpdump output:
=============

20:11:24.603653 IP (tos 0x0, ttl  64, id 52256, offset 0, flags [DF],
length: 77) 172.68.1.53.32772 > 172.68.1.201.53: [bad udp cksum 665e!]
 12980+ SRV? _kerberos._udp.XYZ.COM. (49)
E..M. @. at ..0...5.......5.9..2...........        _kerberos._udp.XYZ.COM..!..
20:11:24.603913 IP (tos 0x0, ttl 128, id 16643, offset 0, flags
[none], length: 137) 172.68.1.201.53 > 172.68.1.53.32772:  12980* q:
SRV? _kerberos._udp.XYZ.COM. 1/0/1 _kerberos._udp.XYZ.COM.[|domain]
E...A.....u........5.5...u..2...........        _kerberos._udp.XYZ.COM..!.....!.
20:11:24.608671 IP (tos 0x0, ttl  64, id 52261, offset 0, flags [DF],
length: 70) 172.68.1.53.32772 > 172.68.1.201.53: [bad udp cksum f609!]
 43489+ AAAA? visual1.XYZ.com. (42)
E..F.%@. at ..2...5.......5.2...............visual1.XYZ.com.....
20:11:24.608847 IP (tos 0x0, ttl 128, id 16644, offset 0, flags
[none], length: 112) 172.68.1.201.53 > 172.68.1.53.32772:  43489* q:
AAAA? visual1.XYZ.com. 0/1/0 ns: XYZ.com. SOA[|domain]
E..pA.....u*.......5.5...\...............visual1.XYZ.com.................
20:11:24.609466 IP (tos 0x0, ttl  64, id 52261, offset 0, flags [DF],
length: 87) 172.68.1.53.32772 > 172.68.1.201.53:  43490+[|domain]
E..W.%@. at ..!...5.......5.C...............visual1.XYZ.com.XYZ.com
20:11:24.609944 IP (tos 0x0, ttl 128, id 16645, offset 0, flags
[none], length: 153) 172.68.1.201.53 > 172.68.1.53.32772:  43490
NXDomain* q:[|domain]
E...A.....u........5.5...................visual1.XYZ.com.XYZ.com
20:11:24.610677 IP (tos 0x0, ttl  64, id 52263, offset 0, flags [DF],
length: 70) 172.68.1.53.32772 > 172.68.1.201.53: [bad udp cksum f0a!] 
43491+ A? visual1.XYZ.com. (42)
E..F.'@. at ..0...5.......5.2...............visual1.XYZ.com.....
20:11:24.610840 IP (tos 0x0, ttl 128, id 16646, offset 0, flags
[none], length: 86) 172.68.1.201.53 > 172.68.1.53.32772:  43491* q: A?
visual1.XYZ.com. 1/0/0 visual1.XYZ.com. A[|domain]
E..VA.....uB.......5.5...Byk.............visual1.XYZ.com.................
20:11:24.611458 IP (tos 0x0, ttl  64, id 52263, offset 0, flags [DF],
length: 214) 172.68.1.53.32772 > 172.68.1.201.88:  v5
E....'@. at ......5.......X..."j..0...........
Administ.........0........0..
20:11:24.612940 IP (tos 0x0, ttl 128, id 16647, offset 0, flags
[none], length: 186) 172.68.1.201.88 > 172.68.1.53.32772:
E...A.....t........5.X.....u~..0................20041118010958Z................GRO
20:11:24.617136 IP (tos 0x0, ttl  64, id 52269, offset 0, flags [DF],
length: 77) 172.68.1.53.32772 > 172.68.1.201.53: [bad udp cksum 35e7!]
 43492+ SRV? _kerberos._udp.XYZ.COM. (49)
E..M.- at .@..#...5.......5.9..............        _kerberos._udp.XYZ.COM..!..
20:11:24.617321 IP (tos 0x0, ttl 128, id 16648, offset 0, flags
[none], length: 137) 172.68.1.201.53 > 172.68.1.53.32772:  43492* q:
SRV? _kerberos._udp.XYZ.COM. 1/0/1 _kerberos._udp.XYZ.COM.[|domain]
.......5.5...u>.............    _kerberos._udp.XYZ.COM..!.....!.
20:11:24.619378 IP (tos 0x0, ttl  64, id 52271, offset 0, flags [DF],
length: 70) 172.68.1.53.32772 > 172.68.1.201.53: [bad udp cksum f209!]
 43493+ AAAA? visual1.XYZ.com. (42)
E..F./@. at ..(...5.......5.2...............visual1.XYZ.com.....
20:11:24.619545 IP (tos 0x0, ttl 128, id 16649, offset 0, flags
[none], length: 112) 172.68.1.201.53 > 172.68.1.53.32772:  43493* q:
AAAA? visual1.XYZ.com. 0/1/0 ns: XYZ.com. SOA[|domain]
E..pA   ....u%.......5.5...\...............visual1.XYZ.com.................
20:11:24.620110 IP (tos 0x0, ttl  64, id 52272, offset 0, flags [DF],
length: 87) 172.68.1.53.32772 > 172.68.1.201.53:  43494+[|domain]
E..W.0 at .@......5.......5.C...............visual1.XYZ.com.XYZ.com
20:11:24.620628 IP (tos 0x0, ttl 128, id 16650, offset 0, flags
[none], length: 153) 172.68.1.201.53 > 172.68.1.53.32772:  43494
NXDomain* q:[|domain]
E...A
....t........5.5...................visual1.XYZ.com.XYZ.com
20:11:24.621315 IP (tos 0x0, ttl  64, id 52273, offset 0, flags [DF],
length: 70) 172.68.1.53.32772 > 172.68.1.201.53: [bad udp cksum b0a!] 
43495+ A? visual1.XYZ.com. (42)
E..F.1 at .@..&...5.......5.2...............visual1.XYZ.com.....
20:11:24.621467 IP (tos 0x0, ttl 128, id 16651, offset 0, flags
[none], length: 86) 172.68.1.201.53 > 172.68.1.53.32772:  43495* q: A?
visual1.XYZ.com. 1/0/0 visual1.XYZ.com. A[|domain]
E..VA.....u=.......5.5...Byg.............visual1.XYZ.com.................
20:11:24.622027 IP (tos 0x0, ttl  64, id 52274, offset 0, flags [DF],
length: 294) 172.68.1.53.32772 > 172.68.1.201.88:  v5
E..&.2 at .@..E...5.......X...rj...0............
.L0J0H......A.?0=......6.4..D....G:.
20:11:24.624091 IP (tos 0x0, ttl 128, id 16652, offset 0, flags
[none], length: 1372) 172.68.1.201.88 > 172.68.1.53.32772:  v5
A..\A.....p6.......5.X...H.6k..<0..8..............XYZ.COM..0........0..
20:11:24.629206 IP (tos 0x0, ttl  64, id 52281, offset 0, flags [DF],
length: 77) 172.68.1.53.32772 > 172.68.1.201.53: [bad udp cksum 31e7!]
 43496+ SRV? _kerberos._udp.XYZ.COM. (49)
E..M.9 at .@......5.......5.9..............        _kerberos._udp.XYZ.COM..!..
20:11:24.633996 IP (tos 0x0, ttl  64, id 43729, offset 0, flags [DF],
length: 52) 172.68.1.53.32983 > 172.68.1.201.389: . [tcp sum ok]
160:160(0) ack 386 win 6432 <nop,nop,timestamp 79154238 903811>
E..4.. at .@......5........0.g{{...... .C.....
...>.
20:11:24.639739 IP (tos 0x0, ttl 128, id 16653, offset 0, flags
[none], length: 137) 172.68.1.201.53 > 172.68.1.53.32772:  43496* q:
SRV? _kerberos._udp.XYZ.COM. 1/0/1 _kerberos._udp.XYZ.COM.[|domain]
....u........5.5...u>.............      _kerberos._udp.XYZ.COM..!.....!.
20:11:24.641923 IP (tos 0x0, ttl  64, id 52294, offset 0, flags [DF],
length: 70) 172.68.1.53.32772 > 172.68.1.201.53: [bad udp cksum ee09!]
 43497+ AAAA? visual1.XYZ.com. (42)
E..F.F at .@......5.......5.2...............visual1.XYZ.com.....
20:11:24.655293 IP (tos 0x0, ttl 128, id 16654, offset 0, flags
[none], length: 112) 172.68.1.201.53 > 172.68.1.53.32772:  43497* q:
AAAA? visual1.XYZ.com. 0/1/0 ns: XYZ.com. SOA[|domain]
E..pA.....u .......5.5...\...............visual1.XYZ.com.................
20:11:24.655877 IP (tos 0x0, ttl  64, id 52308, offset 0, flags [DF],
length: 87) 172.68.1.53.32772 > 172.68.1.201.53:  43498+[|domain]
E..W.T at .@......5.......5.C...............visual1.XYZ.com.XYZ.com
20:11:24.656048 IP (tos 0x0, ttl 128, id 16655, offset 0, flags
[none], length: 153) 172.68.1.201.53 > 172.68.1.53.32772:  43498
NXDomain* q:[|domain]
E...A.....t........5.5...................visual1.XYZ.com.XYZ.com
20:11:24.656751 IP (tos 0x0, ttl  64, id 52309, offset 0, flags [DF],
length: 70) 172.68.1.53.32772 > 172.68.1.201.53: [bad udp cksum 70a!] 
43499+ A? visual1.XYZ.com. (42)
E..F.U at .@......5.......5.2...............visual1.XYZ.com.....
20:11:24.657123 IP (tos 0x0, ttl 128, id 16656, offset 0, flags
[none], length: 86) 172.68.1.201.53 > 172.68.1.53.32772:  43499* q: A?
visual1.XYZ.com. 1/0/0 visual1.XYZ.com. A[|domain]
E..VA.....u8.......5.5...Byc.............visual1.XYZ.com.................
20:11:24.657676 IP (tos 0x0, ttl  64, id 52310, offset 0, flags [DF],
length: 1358) 172.68.1.53.32772 > 172.68.1.201.88:
E..N.V at .@......5.......X.:..l...0..*..............0...0................n...0......
20:11:24.660014 IP (tos 0x0, ttl 128, id 16657, offset 0, flags
[none], length: 1294) 172.68.1.201.88 > 172.68.1.53.32772:
A...XYZ.COM..0........0.....m...0............
20:11:24.662236 IP (tos 0x0, ttl  64, id 43730, offset 0, flags [DF],
length: 1343) 172.68.1.53.32983 > 172.68.1.201.389: P 160:1451(1291)
ack 386 win 6432 <nop,nop,timestamp 79154266 903811>
E..?.. at .@......5........0.g{{...... .......
..0......`.............
GSS-SPNE
20:11:24.665375 IP (tos 0x0, ttl 128, id 16658, offset 0, flags [DF],
length: 102) 172.68.1.201.389 > 172.68.1.53.32983: P 386:436(50) ack
1451 win 64085 <nop,nop,timestamp 903812 79154266>
E..fA. at ...51.......5....{...0.l....Uc).....
.....Z0....,...a....#
..........0...
20:11:24.665642 IP (tos 0x0, ttl  64, id 43731, offset 0, flags [DF],
length: 52) 172.68.1.53.32983 > 172.68.1.201.389: . [tcp sum ok]
1451:1451(0) ack 436 win 6432 <nop,nop,timestamp 79154270 903812>
E..4.. at .@......5........0.l.{..%... .......
...^.
20:11:24.665958 IP (tos 0x0, ttl  64, id 43732, offset 0, flags [DF],
length: 174) 172.68.1.53.32983 > 172.68.1.201.389: P 1451:1573(122)
ack 436 win 6432 <nop,nop,timestamp 79154270 903812>
E..... at .@..'...5........0.l.{..%... .......
..0x...cs.@<WKGUID=AA31282576881
20:11:24.666711 IP (tos 0x0, ttl 128, id 16659, offset 0, flags [DF],
length: 200) 172.68.1.201.389 > 172.68.1.53.32983: P 436:584(148) ack
1573 win 65535 <nop,nop,timestamp 903812 79154270>
E...A. at ...4........5....{..%0.m......Y.....
.....^0....x...d....o.#CN=Computers,
20:11:24.667812 IP (tos 0x0, ttl  64, id 43733, offset 0, flags [DF],
length: 126) 172.68.1.53.32983 > 172.68.1.201.389: P 1573:1647(74) ack
584 win 7504 <nop,nop,timestamp 79154272 903812>
E..~.. at .@..V...5........0.m.{......P.......
..0H...cC.#CN=Computers,dc=GROTE
20:11:24.668610 IP (tos 0x0, ttl 128, id 16660, offset 0, flags [DF],
length: 806) 172.68.1.201.389 > 172.68.1.53.32983: P 584:1338(754) ack
1647 win 65461 <nop,nop,timestamp 903812 79154272>
E..&A. at ...2o.......5....{...0.mJ...........
.....`0........d......#CN=Computers,
20:11:24.670904 IP (tos 0x0, ttl  64, id 43734, offset 0, flags [DF],
length: 154) 172.68.1.53.32983 > 172.68.1.201.389: P 1647:1749(102)
ack 1338 win 9048 <nop,nop,timestamp 79154275 903812>
E..... at .@..9...5........0.mJ{.....#X.......
..0d...c_..dc=XYZ,dc=CO
20:11:24.673086 IP (tos 0x0, ttl 128, id 16661, offset 0, flags [DF],
length: 1500) 172.68.1.201.389 > 172.68.1.53.32983: . 1338:2786(1448)
ack 1749 win 65359 <nop,nop,timestamp 903812 79154275>
E...A. at .../........5....{...0.m....O.\.....
.....c0...
....d...
../CN=filesrv1,C
20:11:24.673202 IP (tos 0x0, ttl 128, id 16662, offset 0, flags [DF],
length: 1427) 172.68.1.201.389 > 172.68.1.53.32983: P 2786:4161(1375)
ack 1749 win 65359 <nop,nop,timestamp 903812 79154275>
E...A. at ...0........5....{..S0.m....O.%.....
.....c.... ...*.....<..........B.L.
20:11:24.673213 IP (tos 0x0, ttl  64, id 43735, offset 0, flags [DF],
length: 52) 172.68.1.53.32983 > 172.68.1.201.389: . [tcp sum ok]
1749:1749(0) ack 4161 win 14480 <nop,nop,timestamp 79154277 903812>
E..4.. at .@......5........0.m.{.....8........
...e.
20:11:24.676243 IP (tos 0x0, ttl  64, id 43736, offset 0, flags [DF],
length: 466) 172.68.1.53.32983 > 172.68.1.201.389: P 1749:2163(414)
ack 4161 win 14480 <nop,nop,timestamp 79154280 903812>
E..... at .@.      ....5........0.m.{.....8........
..0......f..s./CN=filesrv1,CN=Co
20:11:24.715852 IP (tos 0x0, ttl 128, id 16663, offset 0, flags [DF],
length: 74) 172.68.1.201.389 > 172.68.1.53.32983: P [tcp sum ok]
4161:4183(22) ack 2163 win 64945 <nop,nop,timestamp 903813 79154280>
E..JA. at ...5H.......5....{...0.oN.... at ......
.....h0........g.....
......
20:11:24.716359 IP (tos 0x0, ttl  64, id 43737, offset 0, flags [DF],
length: 154) 172.68.1.53.32983 > 172.68.1.201.389: P 2163:2265(102)
ack 4183 win 14480 <nop,nop,timestamp 79154320 903813>
E..... at .@..6...5........0.oN{.....8........
..0d..  c_..dc=XYZ,dc=CO
20:11:24.718557 IP (tos 0x0, ttl 128, id 16664, offset 0, flags [DF],
length: 1500) 172.68.1.201.389 > 172.68.1.53.32983: . 4183:5631(1448)
ack 2265 win 64843 <nop,nop,timestamp 903813 79154320>
E...A. at .../........5....{...0.o....K.......
......0...
...     d...
../CN=filesrv1,C
20:11:24.718671 IP (tos 0x0, ttl 128, id 16665, offset 0, flags [DF],
length: 1427) 172.68.1.201.389 > 172.68.1.53.32983: P 5631:7006(1375)
ack 2265 win 64843 <nop,nop,timestamp 903813 79154320>
E...A. at .../........5....{..p0.o....K.......
.......... ...*.....<..........B.L.
20:11:24.718682 IP (tos 0x0, ttl  64, id 43738, offset 0, flags [DF],
length: 52) 172.68.1.53.32983 > 172.68.1.201.389: . [tcp sum ok]
2265:2265(0) ack 7006 win 20272 <nop,nop,timestamp 79154323 903813>
E..4.. at .@......5........0.o.{.....O0.......
.....
20:11:24.720077 IP (tos 0x0, ttl  64, id 43739, offset 0, flags [DF],
length: 195) 172.68.1.53.32983 > 172.68.1.201.389: P 2265:2408(143)
ack 7006 win 20272 <nop,nop,timestamp 79154324 903813>
E..... at .@......5........0.o.{.....O0.......
..0....
cA..dc=XYZ,dc=C
20:11:24.720723 IP (tos 0x0, ttl 128, id 16666, offset 0, flags [DF],
length: 217) 172.68.1.201.389 > 172.68.1.53.32983: P 7006:7171(165)
ack 2408 win 64700 <nop,nop,timestamp 903813 79154324>
E...A. at ...4........5....{...0.pC....s......
......0....X..
d
....O..dc=GROTECOMPA
20:11:24.726200 IP (tos 0x0, ttl  64, id 52378, offset 0, flags [DF],
length: 77) 172.68.1.53.32772 > 172.68.1.201.53: [bad udp cksum 2de7!]
 43500+ SRV? _kerberos._udp.XYZ.COM. (49)
E..M.. at .@......5.......5.9..............        _kerberos._udp.XYZ.COM..!..
20:11:24.726458 IP (tos 0x0, ttl 128, id 16667, offset 0, flags
[none], length: 137) 172.68.1.201.53 > 172.68.1.53.32772:  43500* q:
SRV? _kerberos._udp.XYZ.COM. 1/0/1 _kerberos._udp.XYZ.COM.[|domain]
E...A.....t........5.5...u>.............        _kerberos._udp.XYZ.COM..!.....!.
20:11:24.728587 IP (tos 0x0, ttl  64, id 52380, offset 0, flags [DF],
length: 70) 172.68.1.53.32772 > 172.68.1.201.53: [bad udp cksum ea09!]
 43501+ AAAA? visual1.XYZ.com. (42)
E..F.. at .@......5.......5.2...............visual1.XYZ.com.....
20:11:24.728749 IP (tos 0x0, ttl 128, id 16668, offset 0, flags
[none], length: 112) 172.68.1.201.53 > 172.68.1.53.32772:  43501* q:
AAAA? visual1.XYZ.com. 0/1/0 ns: XYZ.com. SOA[|domain]
E..pA.....u........5.5...\.{.............visual1.XYZ.com.................
20:11:24.729313 IP (tos 0x0, ttl  64, id 52381, offset 0, flags [DF],
length: 87) 172.68.1.53.32772 > 172.68.1.201.53:  43502+[|domain]
E..W.. at .@......5.......5.C...............visual1.XYZ.com.XYZ.com
20:11:24.729830 IP (tos 0x0, ttl 128, id 16669, offset 0, flags
[none], length: 153) 172.68.1.201.53 > 172.68.1.53.32772:  43502
NXDomain* q:[|domain]
E...A.....t........5.5...................visual1.XYZ.com.XYZ.com
20:11:24.730526 IP (tos 0x0, ttl  64, id 52382, offset 0, flags [DF],
length: 70) 172.68.1.53.32772 > 172.68.1.201.53: [bad udp cksum 30a!] 
43503+ A? visual1.XYZ.com. (42)
E..F.. at .@......5.......5.2...............visual1.XYZ.com.....
20:11:24.730683 IP (tos 0x0, ttl 128, id 16670, offset 0, flags
[none], length: 86) 172.68.1.201.53 > 172.68.1.53.32772:  43503* q: A?
visual1.XYZ.com. 1/0/0 visual1.XYZ.com. A[|domain]
E..VA.....u*.......5.5...By_.............visual1.XYZ.com.................
20:11:24.731232 IP (tos 0x0, ttl  64, id 52383, offset 0, flags [DF],
length: 1377) 172.68.1.53.32772 > 172.68.1.201.88:
E..a.. at .@......5.......X.M..l..A0..=..............0...0................n...0......
20:11:24.733031 IP (tos 0x0, ttl 128, id 16671, offset 0, flags
[none], length: 1310) 172.68.1.201.88 > 172.68.1.53.32772:
E...A.....pa.......5.X...
A...XYZ.COM..0........0..
20:11:24.734371 IP (tos 0x0, ttl  64, id 52386, offset 0, flags [DF],
length: 1371) 172.68.1.53.32772 > 172.68.1.201.464: UDP, length: 1343
E..[.. at .@......5.........G...?....n...0..........................a...0............
20:11:24.760971 IP (tos 0x0, ttl  64, id 43740, offset 0, flags [DF],
length: 52) 172.68.1.53.32983 > 172.68.1.201.389: . [tcp sum ok]
2408:2408(0) ack 7171 win 23168 <nop,nop,timestamp 79154365 903813>
E..4.. at .@......5........0.pC{..t..Z........
.....
20:11:25.027351 IP (tos 0x0, ttl 128, id 16672, offset 0, flags
[none], length: 193) 172.68.1.201.464 > 172.68.1.53.32772: UDP,
length: 165
E...A ....t........5......9p.....QoO0M...........A0?......8.6......p.....b...a....
20:11:25.027936 IP (tos 0x0, ttl  64, id 43741, offset 0, flags [DF],
length: 192) 172.68.1.53.32983 > 172.68.1.201.389: P 2408:2548(140)
ack 7171 win 23168 <nop,nop,timestamp 79154632 903813>
E..... at .@......5........0.pC{..t..Z........
..0.....c....dc=XYZ,dc=
20:11:25.068304 IP (tos 0x0, ttl 128, id 16675, offset 0, flags [DF],
length: 884) 172.68.1.201.389 > 172.68.1.53.32983: P 7171:8003(832)
ack 2548 win 64560 <nop,nop,timestamp 903816 79154632>
E..tA#@...2........5....{..t0.p....0.......
......0........d......7CN=VISUAL1,OU
20:11:25.068326 IP (tos 0x0, ttl  64, id 43742, offset 0, flags [DF],
length: 52) 172.68.1.53.32983 > 172.68.1.201.389: . [tcp sum ok]
2548:2548(0) ack 8003 win 26064 <nop,nop,timestamp 79154672 903816>
E..4.. at .@......5........0.p.{.....e........


Any help to fix this problem.

Some place I see domain name appending twice in the tcpdump log, is
that casuing segment fault problem.

.visual1.XYZ.com.XYZ.com

Thanks
-- 
Software Groups (SFG)
http://sfg.homeunix.com


More information about the samba mailing list