[Samba] Active Directory on OpenIndiana: cannot set group permission
Lupe
lupe at xstorsystems.com
Wed Jul 25 17:34:09 MDT 2012
Hello Samba team,
On our Solaris 10u8 system with the exact config, I'm able to set
both Active Directory user and group permissions. On our OpenIndiana
system I'm able to set Active Directory *user* permissions but when I
try to set Active Directory group permission it fails. Here is the
command along with the error:
/usr/bin/chmod
A=everyone@:rxaRc:d:allow,everyone@:raRc:fi:allow,group:DOMAIN_NAME\\testers:rwxpdDaARWcCos:fd:allow
/zvue/datapool/group_testers/fs
Invalid group DOMAIN_NAME\testers specified
System info:
I'm on working "OpenIndiana Development oi_151.1.5 X86" with Samba
Version 3.6.0 and Active Directory Version: 5.2.3790.3959 running on
Windows server 2003. As an experiment I tried the latest Samba version
3.6.6 but got the same results.
From our OpenIndiana system I can see all Active Directory users and
groups,
wbinfo -u output:
DOMAIN_NAME\bob
DOMAIN_NAME\bull
DOMAIN_NAME\frank
(showing a few lines of output)
wbinfo -g output:
DOMAIN_NAME\testers
DOMAIN_NAME\domain users
DOMAIN_NAME\domain guests
(showing a few lines of output)
net getdomainsid output:
SID for local machine <host_name> is:
S-1-5-21-3938218248-254906258-2580095957
SID for domain <domain_name> is: S-1-5-21-714375242-3402532539-2503969851
klist output:
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: <domain_admin_user>@<DOMAIN_NAME>.COM
Valid starting Expires Service principal
24/07/2012 16:59 25/07/2012 02:59
krbtgt/<DOMAIN_NAME>.COM@<DOMAIN_NAME>.COM
renew until 31/07/2012 16:59
24/07/2012 17:30 25/07/2012 02:59
ldap/<system_id>.<domain_name>.com@<DOMAIN_NAME>.COM
renew until 31/07/2012 16:59
(showing a few lines of output)
testparm output:
Load smb config files from /etc/sfw/smb.conf
rlimit_max: increasing rlimit_max (256) to minimum Windows limit (16384)
Processing section "[user_bull]"
WARNING: The optional ':port' in password server = 192.168.1.151:389 is
deprecated
Loaded services file OK.
WARNING: The setting 'security=ads' should NOT be combined with the
'password server' parameter.
(by default Samba will discover the correct DC to contact automatically).
Server role: ROLE_DOMAIN_MEMBER
Press enter to see a dump of your service definitions
[global]
workgroup = DOMAIN_NAME
realm = DOMAIN_NAME.COM
server string = Storage Server
security = ADS
password server = 192.168.1.151:389
log file = /var/samba/log/log.%m
max log size = 10000
max protocol = SMB2
socket options = SO_KEEPALIVE
load printers = No
printcap cache time = 0
dns proxy = No
wins server = 192.168.1.151
idmap config * : range = 10000-20000
idmap config * : backend = tdb
[user_bull]
comment = user_bull Files
path = "/zvue/datapool/user_bull/fs"
valid users = DOMAIN_NAME\bull
read only = No
acl check permissions = No
acl map full control = No
inherit acls = Yes
ea support = Yes
map archive = No
map readonly = no
store dos attributes = Yes
vfs objects = shadow_copy_zfs, dirsort, zfsacl
nfs4: mode = simple
shadow: exclude = "replication_*", "zpool_backup_auto"
shadow: filesystem = datapool/user_bull/fs
We set the debug level to 10 in /etc/sfw/smb.conf, I'm attaching the
relevant section of /var/samba/log/log.winbindd from both systems
showing group permissions successful(Solaris10u8_nt_status_ok) and
failure (OpenIndiana_nt_status_unsuccessful). I'm also attaching our
/etc/pam.conf, /etc/sfw/smb.conf, /etc/nsswitch.conf, and
/etc/krb5/krb5.conf.
The only difference between the Solaris10u8 and OpenIndiana config files
was in /etc/pam.conf.
OpenIndiana has these additional lines:
# GDM Autologin (explicit because of pam_allow). These need to be
# here as there is no mechanism for packages to amend pam.conf as
# they are installed.
#
gdm-autologin auth required pam_unix_cred.so.1
gdm-autologin auth sufficient pam_allow.so.1
#
# cups service (explicit because of non-usage of pam_roles.so.1)
#
cups account required pam_unix_account.so.1
#
# GDM Autologin (explicit because of pam_allow) This needs to be here
# as there is no mechanism for packages to amend pam.conf as they are
# installed.
#
gdm-autologin account sufficient pam_allow.so.1
#
Solaris10u8 has "force check" at end of this line but OpenIndiana does not.:
other password requisite pam_authtok_check.so.1 force_check
Any pointers would be appreciated. If you need additional info (command
output or file info), please let me know.
Thank for your time,
Lupe
-------------- next part --------------
# CDDL HEADER START
#
# The contents of this file are subject to the terms of the
# Common Development and Distribution License (the "License").
# You may not use this file except in compliance with the License.
#
# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
# or http://www.opensolaris.org/os/licensing.
# See the License for the specific language governing permissions
# and limitations under the License.
#
# When distributing Covered Code, include this CDDL HEADER in each
# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
# If applicable, add the following below this CDDL HEADER, with the
# fields enclosed by brackets "[]" replaced with your own identifying
# information: Portions Copyright [yyyy] [name of copyright owner]
#
# CDDL HEADER END
#
# Copyright 2009 Sun Microsystems, Inc. All rights reserved.
# Use is subject to license terms.
#
#
# /etc/nsswitch.conf:
#
# "hosts:" and "services:" in this file are used only if the
# /etc/netconfig file has a "-" for nametoaddr_libs of "inet" transports.
passwd: files winbind
group: files winbind
hosts: files dns
ipnodes: files dns
networks: files
protocols: files
rpc: files
ethers: files
netmasks: files
bootparams: files
publickey: files
# At present there isn't a 'files' backend for netgroup; the system will
# figure it out pretty quickly, and won't use netgroups at all.
netgroup: files
automount: files
aliases: files
services: files
printers: user files
auth_attr: files
prof_attr: files
project: files
tnrhtp: files
tnrhdb: files
-------------- next part --------------
#
# CDDL HEADER START
#
# The contents of this file are subject to the terms of the
# Common Development and Distribution License (the "License").
# You may not use this file except in compliance with the License.
#
# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
# or http://www.opensolaris.org/os/licensing.
# See the License for the specific language governing permissions
# and limitations under the License.
#
# When distributing Covered Code, include this CDDL HEADER in each
# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
# If applicable, add the following below this CDDL HEADER, with the
# fields enclosed by brackets "[]" replaced with your own identifying
# information: Portions Copyright [yyyy] [name of copyright owner]
#
# CDDL HEADER END
#
#
# Copyright 2010 Sun Microsystems, Inc. All rights reserved.
# Use is subject to license terms.
#
# PAM configuration
#
# Unless explicitly defined, all services use the modules
# defined in the "other" section.
#
# Modules are defined with relative pathnames, i.e., they are
# relative to /usr/lib/security/$ISA. Absolute path names, as
# present in this file in previous releases are still acceptable.
#
# Authentication management
#
# login service (explicit because of pam_dial_auth)
#
login auth requisite pam_authtok_get.so.1
login auth required pam_dhkeys.so.1
login auth required pam_unix_cred.so.1
login auth required pam_unix_auth.so.1
login auth required pam_dial_auth.so.1
#
# rlogin service (explicit because of pam_rhost_auth)
#
rlogin auth sufficient pam_rhosts_auth.so.1
rlogin auth requisite pam_authtok_get.so.1
rlogin auth required pam_dhkeys.so.1
rlogin auth required pam_unix_cred.so.1
rlogin auth required pam_unix_auth.so.1
#
# Kerberized rlogin service
#
krlogin auth required pam_unix_cred.so.1
krlogin auth required pam_krb5.so.1
#
# rsh service (explicit because of pam_rhost_auth,
# and pam_unix_auth for meaningful pam_setcred)
#
rsh auth sufficient pam_rhosts_auth.so.1
rsh auth required pam_unix_cred.so.1
#
# Kerberized rsh service
#
krsh auth required pam_unix_cred.so.1
krsh auth required pam_krb5.so.1
#
# Kerberized telnet service
#
ktelnet auth required pam_unix_cred.so.1
ktelnet auth required pam_krb5.so.1
#
# PPP service (explicit because of pam_dial_auth)
#
ppp auth requisite pam_authtok_get.so.1
ppp auth required pam_dhkeys.so.1
ppp auth required pam_unix_cred.so.1
ppp auth required pam_unix_auth.so.1
ppp auth required pam_dial_auth.so.1
#
# GDM Autologin (explicit because of pam_allow). These need to be
# here as there is no mechanism for packages to amend pam.conf as
# they are installed.
#
gdm-autologin auth required pam_unix_cred.so.1
gdm-autologin auth sufficient pam_allow.so.1
#
# Default definitions for Authentication management
# Used when service name is not explicitly mentioned for authentication
#
other auth requisite pam_authtok_get.so.1
other auth required pam_dhkeys.so.1
other auth required pam_unix_cred.so.1
other auth required pam_unix_auth.so.1
#
# passwd command (explicit because of a different authentication module)
#
passwd auth required pam_passwd_auth.so.1
#
# cron service (explicit because of non-usage of pam_roles.so.1)
#
cron account required pam_unix_account.so.1
#
# cups service (explicit because of non-usage of pam_roles.so.1)
#
cups account required pam_unix_account.so.1
#
# GDM Autologin (explicit because of pam_allow) This needs to be here
# as there is no mechanism for packages to amend pam.conf as they are
# installed.
#
gdm-autologin account sufficient pam_allow.so.1
#
# Default definition for Account management
# Used when service name is not explicitly mentioned for account management
#
other account requisite pam_roles.so.1
other account required pam_unix_account.so.1
#
# Default definition for Session management
# Used when service name is not explicitly mentioned for session management
#
other session required pam_unix_session.so.1
#
# Default definition for Password management
# Used when service name is not explicitly mentioned for password management
#
other password required pam_dhkeys.so.1
other password requisite pam_authtok_get.so.1
other password requisite pam_authtok_check.so.1
other password required pam_authtok_store.so.1
#
# Support for Kerberos V5 authentication and example configurations can
# be found in the pam_krb5(5) man page under the "EXAMPLES" section.
#
-------------- next part --------------
# This is the main Samba configuration file. You should read the
# smb.conf(5) manual page in order to understand the options listed
# here. Samba has a huge number of configurable options (perhaps too
# many!) most of which are not shown in this example
#
# For a step to step guide on installing, configuring and using samba,
# read the Samba-HOWTO-Collection. This may be obtained from:
# http://www.samba.org/samba/docs/Samba-HOWTO-Collection.pdf
#
# Many working examples of smb.conf files can be found in the
# Samba-Guide which is generated daily and can be downloaded from:
# http://www.samba.org/samba/docs/Samba-Guide.pdf
#
# Any line which starts with a ; (semi-colon) or a # (hash)
# is a comment and is ignored. In this example we will use a #
# for commentry and a ; for parts of the config file that you
# may wish to enable
#
# NOTE: Whenever you modify this file you should run the command "testparm"
# to check that you have not made any basic syntactic errors.
#
#======================= Global Settings =====================================
[global]
# workgroup = NT-Domain-Name or Workgroup-Name, eg: MIDEARTH
workgroup = DOMAIN_NAME
# server string is the equivalent of the NT Description field
server string = Storage Server
# Security mode. Defines in which mode Samba will operate. Possible
# values are share, user, server, domain and ads. Most people will want
# user level security. See the Samba-HOWTO-Collection for details.
security = ads
# This option is important for security. It allows you to restrict
# connections to machines which are on your local network. The
# following example restricts access to two C class networks and
# the "loopback" interface. For more examples of the syntax see
# the smb.conf man page
; hosts allow = 127.
# If you want to automatically load your printer list rather
# than setting them up individually then you'll need this
load printers = no
# you may wish to override the location of the printcap file
; printcap name = /etc/printcap
# on SystemV system setting printcap name to lpstat should allow
# you to automatically obtain a printer list from the SystemV spool
# system
; printcap name = lpstat
# disable reloading of printcap, as we don't support printing anyway
printcap cache time = 0
# It should not be necessary to specify the print system type unless
# it is non-standard. Currently supported print systems include:
# bsd, cups, sysv, plp, lprng, aix, hpux, qnx
; printing = cups
# Uncomment this if you want a guest account, you must add this to /etc/passwd
# otherwise the user "nobody" is used
; guest account = pcguest
# this tells Samba to use a separate log file for each machine
# that connects
log file = /var/samba/log/log.%m
# Put a capping on the size of the log files (in Kb).
max log size = 10000
log level = 1
# Use password server option only with security = server
# The argument list may include:
# password server = My_PDC_Name [My_BDC_Name] [My_Next_BDC_Name]
# or to auto-locate the domain controller/s
# password server = *
password server = 192.168.1.151:389
# Use the realm option only with security = ads
# Specifies the Active Directory realm the host is part of
realm = domain_name.com
# Backend to store user information in. New installations should
# use either tdbsam or ldapsam. smbpasswd is available for backwards
# compatibility. tdbsam requires no further configuration.
passdb backend = tdbsam
# winbind
idmap config * : range = 10000-20000
;winbind enum users = yes
;winbind enum groups = yes
winbind nested groups = yes
# Using the following line enables you to customise your configuration
# on a per machine basis. The %m gets replaced with the netbios name
# of the machine that is connecting.
# Note: Consider carefully the location in the configuration file of
# this line. The included file is read at that point.
; include = /usr/sfw/lib/smb.conf.%m
# Configure Samba to use multiple interfaces
# If you have multiple network interfaces then you must list them
# here. See the man page for details.
; interfaces = 192.168.12.2/24 192.168.13.2/24
# Browser Control Options:
# set local master to no if you don't want Samba to become a master
# browser on your network. Otherwise the normal election rules apply
; local master = no
# OS Level determines the precedence of this server in master browser
# elections. The default value should be reasonable
; os level = 33
# Domain Master specifies Samba to be the Domain Master Browser. This
# allows Samba to collate browse lists between subnets. Don't use this
# if you already have a Windows NT domain controller doing this job
; domain master = yes
# Preferred Master causes Samba to force a local browser election on startup
# and gives it a slightly higher chance of winning the election
; preferred master = yes
# Enable this if you want Samba to be a domain logon server for
# Windows95 workstations.
; domain logons = yes
# if you enable domain logons then you may want a per-machine or
# per user logon script
# run a specific logon batch file per workstation (machine)
; logon script = %m.bat
# run a specific logon batch file per username
; logon script = %U.bat
# Where to store roving profiles (only for Win95 and WinNT)
# %L substitutes for this servers netbios name, %U is username
# You must uncomment the [Profiles] share below
; logon path = \\%L\Profiles\%U
# Windows Internet Name Serving Support Section:
# WINS Support - Tells the NMBD component of Samba to enable it's WINS Server
; wins support = yes
# WINS Server - Tells the NMBD components of Samba to be a WINS Client
# Note: Samba can be either a WINS Server, or a WINS Client, but NOT both
wins server = 192.168.1.151
# WINS Proxy - Tells Samba to answer name resolution queries on
# behalf of a non WINS capable client, for this to work there must be
# at least one WINS Server on the network. The default is NO.
; wins proxy = yes
# DNS Proxy - tells Samba whether or not to try to resolve NetBIOS names
# via DNS nslookups. The default is NO.
dns proxy = no
# These scripts are used on a domain controller or stand-alone
# machine to add or delete corresponding unix accounts
; add user script = /usr/sbin/useradd %u
; add group script = /usr/sbin/groupadd %g
; add machine script = /usr/sbin/adduser -n -g machines -c Machine -d /dev/null -s /bin/false %u
; delete user script = /usr/sbin/userdel %u
; delete user from group script = /usr/sbin/deluser %u %g
; delete group script = /usr/sbin/groupdel %g
socket options = SO_KEEPALIVE
;use kerberos keytab = yes
max protocol = SMB2
#============================ Share Definitions ==============================
;[homes]
; comment = Home Directories
; browseable = no
; writable = yes
# Un-comment the following and create the netlogon directory for Domain Logons
; [netlogon]
; comment = Network Logon Service
; path = /usr/sfw/lib/netlogon
; guest ok = yes
; writable = no
; share modes = no
# Un-comment the following to provide a specific roving profile share
# the default is to use the user's home directory
;[Profiles]
; path = /usr/local/samba/profiles
; browseable = no
; guest ok = yes
# NOTE: If you have a BSD-style print system there is no need to
# specifically define each individual printer
;[printers]
; comment = All Printers
; path = /var/spool/samba
; browseable = no
;# Set public = yes to allow user 'guest account' to print
; guest ok = no
; writable = no
; printable = yes
# This one is useful for people to share files
;[tmp]
; comment = Temporary file space
; path = /tmp
; read only = no
; public = yes
# A publicly accessible directory, but read only, except for people in
# the "staff" group
;[public]
; comment = Public Stuff
; path = /home/samba
; public = yes
; writable = yes
; printable = no
; write list = @staff
# Other examples.
#
# A private printer, usable only by fred. Spool data will be placed in fred's
# home directory. Note that fred must have write access to the spool directory,
# wherever it is.
;[fredsprn]
; comment = Fred's Printer
; valid users = fred
; path = /homes/fred
; printer = freds_printer
; public = no
; writable = no
; printable = yes
# A private directory, usable only by fred. Note that fred requires write
# access to the directory.
;[fredsdir]
; comment = Fred's Service
; path = /usr/somewhere/private
; valid users = fred
; public = no
; writable = yes
; printable = no
# a service which has a different directory for each machine that connects
# this allows you to tailor configurations to incoming machines. You could
# also use the %U option to tailor it by user name.
# The %m gets replaced with the machine name that is connecting.
;[pchome]
; comment = PC Directories
; path = /usr/pc/%m
; public = no
; writable = yes
# The following two entries demonstrate how to share a directory so that two
# users can place files there that will be owned by the specific users. In this
# setup, the directory should be writable by both users and should have the
# sticky bit set on it to prevent abuse. Obviously this could be extended to
# as many users as required.
;[myshare]
; comment = Mary's and Fred's stuff
; path = /usr/somewhere/shared
; valid users = mary fred
; public = no
; writable = yes
; printable = no
; create mask = 0765
[user_bull]
comment = user_bull Files
path = "/zvue/datapool/user_bull/fs"
vfs objects = shadow_copy_zfs dirsort zfsacl
shadow: filesystem = datapool/user_bull/fs
shadow: exclude = "replication_*", "zpool_backup_auto"
nfs4: mode = simple
acl check permissions = no
nt acl support = yes
inherit acls = yes
acl map full control = no
ea support = yes
store dos attributes = yes
map archive = no
map readonly = no
map system = no
writable = yes
follow symlinks = yes
printable = no
valid users = "DOMAIN_NAME\bull"
admin users =
-------------- next part --------------
[libdefaults]
default_realm = DOMAIN_NAME.COM
dns_lookup_kdc = true
dns_lookup_realm = true
verify_ap_req_nofail = false
[realms]
DOMAIN_NAME.COM = {
kdc = 192.168.1.151:88
admin_server = 192.168.1.151:88
default_domain = domain_name.com
}
[domain_realm]
.domain_name.com = DOMAIN_NAME.COM
domain_name.com = DOMAIN_NAME.COM
[logging]
default = FILE:/var/krb5/kdc.log
kdc = FILE:/var/krb5/kdc.log
kdc_rotate = {
period = 1d
version = 10
}
[appdefaults]
kinit = {
renewable = true
forwardable= true
}
-------------- next part --------------
[2012/07/25 14:06:25.511415, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_QueryGroupList: struct wbint_QueryGroupList
out: struct wbint_QueryGroupList
groups : *
groups: struct wbint_Principals
num_principals : 0
principals: ARRAY(0)
result : NT_STATUS_OK
[2012/07/25 14:06:25.511657, 10] winbindd/winbindd_list_groups.c:128(winbindd_list_groups_
done)
Domain BUILTIN returned 0 groups
[2012/07/25 14:06:25.519500, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_QueryGroupList: struct wbint_QueryGroupList
out: struct wbint_QueryGroupList
groups : *
groups: struct wbint_Principals
num_principals : 20
principals: ARRAY(20)
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-1000
type : SID_NAME_DOM_GRP (2)
name : *
name : 'IIS_WPG'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-1003
type : SID_NAME_DOM_GRP (2)
name : *
name : 'WINS Users'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-515
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Domain Computers'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-516
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Domain Controllers'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-518
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Schema Admins'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-519
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Enterprise Admins'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-517
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Cert Publishers'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-512
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Domain Admins'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-513
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Domain Users'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-514
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Domain Guests'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-520
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Group Policy Creator Owners'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-553
type : SID_NAME_DOM_GRP (2)
name : *
name : 'RAS and IAS Servers'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-1105
type : SID_NAME_DOM_GRP (2)
name : *
name : 'DnsAdmins'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-1106
type : SID_NAME_DOM_GRP (2)
name : *
name : 'DnsUpdateProxy'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-1135
type : SID_NAME_DOM_GRP (2)
name : *
name : 'testers'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-1165
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Var Users'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-1167
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Var Administrators'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-1171
type : SID_NAME_DOM_GRP (2)
name : *
name : 'VA_APPLICATION'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-1194
type : SID_NAME_DOM_GRP (2)
name : *
name : 'bsmith'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-1197
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Var Applications'
result : NT_STATUS_OK
[2012/07/25 14:06:25.523256, 10] winbindd/winbindd_list_groups.c:128(winbindd_list_groups_
done)
Domain DOMAIN_NAME returned 20 groups
[2012/07/25 14:06:25.523446, 10] winbindd/winbindd.c:677(wb_request_done)
wb_request_done[19519:LIST_GROUPS]: NT_STATUS_OK
[2012/07/25 14:06:25.523616, 10] winbindd/winbindd.c:738(winbind_client_response_written)
winbind_client_response_written[19519:LIST_GROUPS]: delivered response to client
[2012/07/25 14:06:25.524075, 6] winbindd/winbindd.c:840(winbind_client_request_read)
closing socket 28, client exited
[2012/07/25 14:06:36.609102, 6] winbindd/winbindd.c:792(new_connection)
accepted socket 28
[2012/07/25 14:06:36.609349, 10] winbindd/winbindd.c:642(process_request)
process_request: request fn INTERFACE_VERSION
[2012/07/25 14:06:36.609421, 3] winbindd/winbindd_misc.c:384(winbindd_interface_version)
[19592]: request interface version
[2012/07/25 14:06:36.609523, 10] winbindd/winbindd.c:738(winbind_client_response_written)
winbind_client_response_written[19592:INTERFACE_VERSION]: delivered response to client
[2012/07/25 14:06:36.609662, 10] winbindd/winbindd.c:642(process_request)
process_request: request fn WINBINDD_PRIV_PIPE_DIR
[2012/07/25 14:06:36.609716, 3] winbindd/winbindd_misc.c:417(winbindd_priv_pipe_dir)
[19592]: request location of privileged pipe
[2012/07/25 14:06:36.609820, 10] winbindd/winbindd.c:738(winbind_client_response_written)
winbind_client_response_written[19592:WINBINDD_PRIV_PIPE_DIR]: delivered response to cli
ent
[2012/07/25 14:06:36.609963, 10] winbindd/winbindd.c:615(process_request)
process_request: Handling async request 19592:LIST_USERS
[2012/07/25 14:06:36.610021, 3] winbindd/winbindd_list_users.c:58(winbindd_list_users_sen
d)
list_users
[2012/07/25 14:06:36.610075, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_QueryUserList: struct wbint_QueryUserList
in: struct wbint_QueryUserList
[2012/07/25 14:06:36.610167, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_QueryUserList: struct wbint_QueryUserList
in: struct wbint_QueryUserList
[2012/07/25 14:06:36.610251, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_QueryUserList: struct wbint_QueryUserList
in: struct wbint_QueryUserList
[2012/07/25 14:06:36.610351, 10] winbindd/winbindd_cache.c:4807(wcache_fetch_ndr)
Entry has timed out
[snip]
[2012/07/25 14:06:55.415407, 10] winbindd/winbindd.c:615(process_request)
process_request: Handling async request 19778:GETGRNAM
[2012/07/25 14:06:55.415494, 3] winbindd/winbindd_getgrnam.c:56(winbindd_getgrnam_send)
getgrnam DOMAIN_NAME\testers
[2012/07/25 14:06:55.415593, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_LookupName: struct wbint_LookupName
in: struct wbint_LookupName
domain : *
domain : 'DOMAIN_NAME'
name : *
name : 'TESTERS'
flags : 0x00000000 (0)
[2012/07/25 14:06:55.472159, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_LookupName: struct wbint_LookupName
out: struct wbint_LookupName
type : *
type : SID_NAME_DOM_GRP (2)
sid : *
sid : S-1-5-21-714375242-3402532539-2503969851-1135
result : NT_STATUS_OK
[2012/07/25 14:06:55.472498, 10] winbindd/winbindd_util.c:795(find_lookup_domain_from_sid)
find_lookup_domain_from_sid(S-1-5-21-714375242-3402532539-2503969851-1135)
[2012/07/25 14:06:55.472575, 10] winbindd/winbindd_util.c:805(find_lookup_domain_from_sid)
calling find_our_domain
[2012/07/25 14:06:55.472642, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_LookupSid: struct wbint_LookupSid
in: struct wbint_LookupSid
sid : *
sid : S-1-5-21-714375242-3402532539-2503969851-1135
[2012/07/25 14:06:55.474197, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_LookupSid: struct wbint_LookupSid
out: struct wbint_LookupSid
type : *
type : SID_NAME_DOM_GRP (2)
domain : *
domain : *
domain : 'DOMAIN_NAME'
name : *
name : *
name : 'testers'
result : NT_STATUS_OK
[2012/07/25 14:06:55.474492, 10] winbindd/winbindd_util.c:795(find_lookup_domain_from_sid)
find_lookup_domain_from_sid(S-1-5-21-714375242-3402532539-2503969851-1135)
[2012/07/25 14:06:55.474548, 10] winbindd/winbindd_util.c:805(find_lookup_domain_from_sid)
calling find_our_domain
[2012/07/25 14:06:55.474592, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_LookupSid: struct wbint_LookupSid
in: struct wbint_LookupSid
sid : *
sid : S-1-5-21-714375242-3402532539-2503969851-1135
[2012/07/25 14:06:55.474727, 10] winbindd/winbindd_cache.c:4807(wcache_fetch_ndr)
Entry has timed out
[2012/07/25 14:06:55.475932, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_LookupSid: struct wbint_LookupSid
out: struct wbint_LookupSid
type : *
type : SID_NAME_DOM_GRP (2)
domain : *
domain : *
domain : 'DOMAIN_NAME'
name : *
name : *
name : 'testers'
result : NT_STATUS_OK
[2012/07/25 14:06:55.476205, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_Sid2Gid: struct wbint_Sid2Gid
in: struct wbint_Sid2Gid
dom_name : NULL
sid : *
sid : S-1-5-21-714375242-3402532539-2503969851-1135
[2012/07/25 14:06:55.487968, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_Sid2Gid: struct wbint_Sid2Gid
out: struct wbint_Sid2Gid
gid : *
gid : 0x0000000000002717 (10007)
result : NT_STATUS_OK
[2012/07/25 14:06:55.488153, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_LookupGroupMembers: struct wbint_LookupGroupMembers
in: struct wbint_LookupGroupMembers
sid : *
sid : S-1-5-21-714375242-3402532539-2503969851-1135
type : SID_NAME_DOM_GRP (2)
[2012/07/25 14:06:55.492298, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_LookupGroupMembers: struct wbint_LookupGroupMembers
out: struct wbint_LookupGroupMembers
members : *
members: struct wbint_Principals
num_principals : 1
principals: ARRAY(1)
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-1123
type : SID_NAME_USER (1)
name : *
name : 'DOMAIN_NAME\venus'
result : NT_STATUS_OK
[2012/07/25 14:06:55.492808, 10] winbindd/winbindd.c:677(wb_request_done)
wb_request_done[19778:GETGRNAM]: NT_STATUS_OK
[2012/07/25 14:06:55.492934, 10] winbindd/winbindd.c:738(winbind_client_response_written)
winbind_client_response_written[19778:GETGRNAM]: delivered response to client
[2012/07/25 14:06:55.566024, 6] winbindd/winbindd.c:840(winbind_client_request_read)
closing socket 31, client exited
-------------- next part --------------
[2012/07/25 14:00:25.866573, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_QueryGroupList: struct wbint_QueryGroupList
out: struct wbint_QueryGroupList
groups : *
groups: struct wbint_Principals
num_principals : 0
principals: ARRAY(0)
result : NT_STATUS_OK
[2012/07/25 14:00:25.866704, 10] winbindd/winbindd_list_groups.c:128(winbindd_list_groups_done)
Domain BUILTIN returned 0 groups
[2012/07/25 14:00:25.868616, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_QueryGroupList: struct wbint_QueryGroupList
out: struct wbint_QueryGroupList
groups : *
groups: struct wbint_Principals
num_principals : 20
principals: ARRAY(20)
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-1000
type : SID_NAME_DOM_GRP (2)
name : *
name : 'IIS_WPG'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-1003
type : SID_NAME_DOM_GRP (2)
name : *
name : 'WINS Users'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-515
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Domain Computers'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-516
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Domain Controllers'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-518
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Schema Admins'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-519
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Enterprise Admins'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-517
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Cert Publishers'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-512
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Domain Admins'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-513
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Domain Users'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-514
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Domain Guests'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-520
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Group Policy Creator Owners'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-553
type : SID_NAME_DOM_GRP (2)
name : *
name : 'RAS and IAS Servers'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-1105
type : SID_NAME_DOM_GRP (2)
name : *
name : 'DnsAdmins'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-1106
type : SID_NAME_DOM_GRP (2)
name : *
name : 'DnsUpdateProxy'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-1135
type : SID_NAME_DOM_GRP (2)
name : *
name : 'testers'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-250
3969851-1165
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Var Users'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-1167
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Var Administrators'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-1171
type : SID_NAME_DOM_GRP (2)
name : *
name : 'VA_APPLICATION'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-1194
type : SID_NAME_DOM_GRP (2)
name : *
name : 'bsmith'
principals: struct wbint_Principal
sid : S-1-5-21-714375242-3402532539-2503969851-1197
type : SID_NAME_DOM_GRP (2)
name : *
name : 'Var Applications'
result : NT_STATUS_OK
[2012/07/25 14:00:25.870383, 10] winbindd/winbindd_list_groups.c:128(winbindd_list_groups_done)
Domain DOMAIN_NAME returned 20 groups
[2012/07/25 14:00:25.870469, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_QueryGroupList: struct wbint_QueryGroupList
out: struct wbint_QueryGroupList
groups : *
groups: struct wbint_Principals
num_principals : 0
principals: ARRAY(0)
result : NT_STATUS_NO_MEMORY
[2012/07/25 14:00:25.870592, 10] winbindd/winbindd_list_groups.c:128(winbindd_list_groups_done)
Domain STORAGE returned 0 groups
[2012/07/25 14:00:25.870622, 10] winbindd/winbindd_list_groups.c:134(winbindd_list_groups_done)
list_groups for domain STORAGE failed
[2012/07/25 14:00:25.870701, 10] winbindd/winbindd.c:677(wb_request_done)
wb_request_done[998:LIST_GROUPS]: NT_STATUS_OK
[2012/07/25 14:00:25.870773, 10] winbindd/winbindd.c:738(winbind_client_response_written)
winbind_client_response_written[998:LIST_GROUPS]: delivered response to client
[2012/07/25 14:00:25.870990, 6] winbindd/winbindd.c:840(winbind_client_request_read)
closing socket 27, client exited
[2012/07/25 14:00:25.912989, 6] winbindd/winbindd.c:792(new_connection)
accepted socket 27
[2012/07/25 14:00:25.913130, 10] winbindd/winbindd.c:642(process_request)
process_request: request fn INTERFACE_VERSION
[2012/07/25 14:00:25.913165, 3] winbindd/winbindd_misc.c:384(winbindd_interface_version)
[ 999]: request interface version
[2012/07/25 14:00:25.913226, 10] winbindd/winbindd.c:738(winbind_client_response_written)
winbind_client_response_written[999:INTERFACE_VERSION]: delivered response to client
[2012/07/25 14:00:25.913291, 10] winbindd/winbindd.c:642(process_request)
process_request: request fn WINBINDD_PRIV_PIPE_DIR
[2012/07/25 14:00:25.913322, 3] winbindd/winbindd_misc.c:417(winbindd_priv_pipe_dir)
[ 999]: request location of privileged pipe
[2012/07/25 14:00:25.913394, 10] winbindd/winbindd.c:738(winbind_client_response_written)
winbind_client_response_written[999:WINBINDD_PRIV_PIPE_DIR]: delivered response to client
[snip]
[2012/07/25 14:00:37.149706, 10] winbindd/winbindd.c:615(process_request)
process_request: Handling async request 1198:GETGRNAM
[2012/07/25 14:00:37.149744, 3] winbindd/winbindd_getgrnam.c:56(winbindd_getgrnam_send)
getgrnam DOMAIN_NAME\testers
[2012/07/25 14:00:37.149787, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_LookupName: struct wbint_LookupName
in: struct wbint_LookupName
domain : *
domain : 'DOMAIN_NAME'
name : *
name : 'TESTERS'
flags : 0x00000000 (0)
[2012/07/25 14:00:37.155253, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_LookupName: struct wbint_LookupName
out: struct wbint_LookupName
type : *
type : SID_NAME_DOM_GRP (2)
sid : *
sid : S-1-5-21-714375242-3402532539-2503969851-1135
result : NT_STATUS_OK
[2012/07/25 14:00:37.155413, 10] winbindd/winbindd_util.c:795(find_lookup_domain_from_sid)
find_lookup_domain_from_sid(S-1-5-21-714375242-3402532539-2503969851-1135)
[2012/07/25 14:00:37.155452, 10] winbindd/winbindd_util.c:805(find_lookup_domain_from_sid)
calling find_our_domain
[2012/07/25 14:00:37.155487, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_LookupSid: struct wbint_LookupSid
in: struct wbint_LookupSid
sid : *
sid : S-1-5-21-714375242-3402532539-2503969851-1135
[2012/07/25 14:00:37.156382, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_LookupSid: struct wbint_LookupSid
out: struct wbint_LookupSid
type : *
type : SID_NAME_DOM_GRP (2)
domain : *
domain : *
domain : 'DOMAIN_NAME'
name : *
name : *
name : 'testers'
result : NT_STATUS_OK
[2012/07/25 14:00:37.156604, 10] winbindd/wb_sid2gid.c:57(wb_sid2gid_send)
idmap_cache_find_sid2gid found 10009
[2012/07/25 14:00:37.156662, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_LookupGroupMembers: struct wbint_LookupGroupMembers
in: struct wbint_LookupGroupMembers
sid : *
sid : S-1-5-21-714375242-3402532539-2503969851-1135
type : SID_NAME_DOM_GRP (2)
[2012/07/25 14:00:37.179647, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
wbint_LookupGroupMembers: struct wbint_LookupGroupMembers
out: struct wbint_LookupGroupMembers
members : *
members: struct wbint_Principals
num_principals : 0
principals: ARRAY(0)
result : NT_STATUS_UNSUCCESSFUL
[2012/07/25 14:00:37.179811, 5] winbindd/winbindd_getgrnam.c:146(winbindd_getgrnam_recv)
Could not convert sid S-1-5-21-714375242-3402532539-2503969851-1135: NT_STATUS_UNSUCCESSFUL
[2012/07/25 14:00:37.179851, 10] winbindd/winbindd.c:677(wb_request_done)
wb_request_done[1198:GETGRNAM]: NT_STATUS_UNSUCCESSFUL
[2012/07/25 14:00:37.179917, 10] winbindd/winbindd.c:738(winbind_client_response_written)
winbind_client_response_written[1198:GETGRNAM]: delivered response to client
[2012/07/25 14:00:37.180029, 6] winbindd/winbindd.c:840(winbind_client_request_read)
closing socket 32, client exited
[2012/07/25 14:00:37.181006, 6] winbindd/winbindd.c:840(winbind_client_request_read)
closing socket 30, client exited
More information about the samba
mailing list