[Samba] Active Directory on OpenIndiana: cannot set group permission

Lupe lupe at xstorsystems.com
Wed Jul 25 17:34:09 MDT 2012


Hello Samba team,

   On our Solaris 10u8 system with the exact config, I'm able to set 
both Active Directory user and group permissions.  On our OpenIndiana 
system I'm able to set Active Directory *user* permissions but when I 
try to set Active Directory group permission it fails.  Here is the 
command along with the error:
/usr/bin/chmod 
A=everyone@:rxaRc:d:allow,everyone@:raRc:fi:allow,group:DOMAIN_NAME\\testers:rwxpdDaARWcCos:fd:allow 
/zvue/datapool/group_testers/fs
Invalid group DOMAIN_NAME\testers specified

System info:
I'm on working "OpenIndiana Development oi_151.1.5 X86" with Samba 
Version 3.6.0 and Active Directory Version: 5.2.3790.3959 running on 
Windows server 2003.  As an experiment I tried the latest Samba version 
3.6.6 but got the same results.

 From our OpenIndiana system I can see all Active Directory users and 
groups,

wbinfo -u output:
DOMAIN_NAME\bob
DOMAIN_NAME\bull
DOMAIN_NAME\frank
(showing a few lines of output)

wbinfo -g output:
DOMAIN_NAME\testers
DOMAIN_NAME\domain users
DOMAIN_NAME\domain guests
(showing a few lines of output)

net getdomainsid output:
SID for local machine <host_name> is: 
S-1-5-21-3938218248-254906258-2580095957
SID for domain <domain_name> is: S-1-5-21-714375242-3402532539-2503969851

klist output:
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: <domain_admin_user>@<DOMAIN_NAME>.COM

Valid starting               Expires               Service principal
24/07/2012 16:59  25/07/2012 02:59 
krbtgt/<DOMAIN_NAME>.COM@<DOMAIN_NAME>.COM
         renew until 31/07/2012 16:59
24/07/2012 17:30  25/07/2012 02:59 
ldap/<system_id>.<domain_name>.com@<DOMAIN_NAME>.COM
         renew until 31/07/2012 16:59
(showing a few lines of output)

testparm output:
Load smb config files from /etc/sfw/smb.conf
rlimit_max: increasing rlimit_max (256) to minimum Windows limit (16384)
Processing section "[user_bull]"
WARNING: The optional ':port' in password server = 192.168.1.151:389 is 
deprecated
Loaded services file OK.
WARNING: The setting 'security=ads' should NOT be combined with the 
'password server' parameter.
(by default Samba will discover the correct DC to contact automatically).
Server role: ROLE_DOMAIN_MEMBER
Press enter to see a dump of your service definitions

[global]
         workgroup = DOMAIN_NAME
         realm = DOMAIN_NAME.COM
         server string = Storage Server
         security = ADS
         password server = 192.168.1.151:389
         log file = /var/samba/log/log.%m
         max log size = 10000
         max protocol = SMB2
         socket options = SO_KEEPALIVE
         load printers = No
         printcap cache time = 0
         dns proxy = No
         wins server = 192.168.1.151
         idmap config * : range = 10000-20000
         idmap config * : backend = tdb

[user_bull]
         comment = user_bull Files
         path = "/zvue/datapool/user_bull/fs"
         valid users = DOMAIN_NAME\bull
         read only = No
         acl check permissions = No
         acl map full control = No
         inherit acls = Yes
         ea support = Yes
         map archive = No
         map readonly = no
         store dos attributes = Yes
         vfs objects = shadow_copy_zfs, dirsort, zfsacl
         nfs4: mode = simple
         shadow: exclude = "replication_*", "zpool_backup_auto"
         shadow: filesystem = datapool/user_bull/fs

We set the debug level to 10 in /etc/sfw/smb.conf, I'm attaching the 
relevant section of /var/samba/log/log.winbindd from both systems 
showing group permissions successful(Solaris10u8_nt_status_ok) and 
failure (OpenIndiana_nt_status_unsuccessful).  I'm also attaching our 
/etc/pam.conf, /etc/sfw/smb.conf, /etc/nsswitch.conf, and 
/etc/krb5/krb5.conf.

The only difference between the Solaris10u8 and OpenIndiana config files 
was in /etc/pam.conf.
OpenIndiana has these additional lines:
# GDM Autologin (explicit because of pam_allow).  These need to be
# here as there is no mechanism for packages to amend pam.conf as
# they are installed.
#
gdm-autologin auth  required    pam_unix_cred.so.1
gdm-autologin auth  sufficient  pam_allow.so.1

#
# cups service (explicit because of non-usage of pam_roles.so.1)
#
cups    account required        pam_unix_account.so.1
#
# GDM Autologin (explicit because of pam_allow) This needs to be here
# as there is no mechanism for packages to amend pam.conf as they are
# installed.
#
gdm-autologin account  sufficient  pam_allow.so.1
#

Solaris10u8 has "force check" at end of this line but OpenIndiana does not.:
other   password requisite      pam_authtok_check.so.1 force_check

Any pointers would be appreciated.  If you need additional info (command 
output or file info), please let me know.

Thank for your time,
Lupe
-------------- next part --------------
# CDDL HEADER START
#
# The contents of this file are subject to the terms of the
# Common Development and Distribution License (the "License").
# You may not use this file except in compliance with the License.
#
# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
# or http://www.opensolaris.org/os/licensing.
# See the License for the specific language governing permissions
# and limitations under the License.
#
# When distributing Covered Code, include this CDDL HEADER in each
# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
# If applicable, add the following below this CDDL HEADER, with the
# fields enclosed by brackets "[]" replaced with your own identifying
# information: Portions Copyright [yyyy] [name of copyright owner]
#
# CDDL HEADER END
#
# Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
# Use is subject to license terms.
#

#
# /etc/nsswitch.conf:
#
# "hosts:" and "services:" in this file are used only if the
# /etc/netconfig file has a "-" for nametoaddr_libs of "inet" transports.

passwd:     files winbind
group:      files winbind
hosts:      files dns
ipnodes:    files dns
networks:   files
protocols:  files
rpc:        files
ethers:     files
netmasks:   files
bootparams: files
publickey:  files
# At present there isn't a 'files' backend for netgroup;  the system will 
#   figure it out pretty quickly, and won't use netgroups at all.
netgroup:   files
automount:  files
aliases:    files
services:   files
printers:   user files

auth_attr:  files
prof_attr:  files
project:    files

tnrhtp:     files
tnrhdb:     files



-------------- next part --------------
#
# CDDL HEADER START
#
# The contents of this file are subject to the terms of the
# Common Development and Distribution License (the "License").
# You may not use this file except in compliance with the License.
#
# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
# or http://www.opensolaris.org/os/licensing.
# See the License for the specific language governing permissions
# and limitations under the License.
#
# When distributing Covered Code, include this CDDL HEADER in each
# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
# If applicable, add the following below this CDDL HEADER, with the
# fields enclosed by brackets "[]" replaced with your own identifying
# information: Portions Copyright [yyyy] [name of copyright owner]
#
# CDDL HEADER END
#
#
# Copyright 2010 Sun Microsystems, Inc.  All rights reserved.
# Use is subject to license terms.
#
# PAM configuration
#
# Unless explicitly defined, all services use the modules
# defined in the "other" section.
#
# Modules are defined with relative pathnames, i.e., they are
# relative to /usr/lib/security/$ISA. Absolute path names, as
# present in this file in previous releases are still acceptable.
#
# Authentication management
#
# login service (explicit because of pam_dial_auth)
#
login	auth requisite		pam_authtok_get.so.1
login	auth required		pam_dhkeys.so.1
login	auth required		pam_unix_cred.so.1
login	auth required		pam_unix_auth.so.1
login	auth required		pam_dial_auth.so.1
#
# rlogin service (explicit because of pam_rhost_auth)
#
rlogin	auth sufficient		pam_rhosts_auth.so.1
rlogin	auth requisite		pam_authtok_get.so.1
rlogin	auth required		pam_dhkeys.so.1
rlogin	auth required		pam_unix_cred.so.1
rlogin	auth required		pam_unix_auth.so.1
#
# Kerberized rlogin service
#
krlogin	auth required		pam_unix_cred.so.1
krlogin	auth required		pam_krb5.so.1
#
# rsh service (explicit because of pam_rhost_auth,
# and pam_unix_auth for meaningful pam_setcred)
#
rsh	auth sufficient		pam_rhosts_auth.so.1
rsh	auth required		pam_unix_cred.so.1
#
# Kerberized rsh service
#
krsh	auth required		pam_unix_cred.so.1
krsh	auth required		pam_krb5.so.1
#
# Kerberized telnet service
#
ktelnet	auth required		pam_unix_cred.so.1
ktelnet	auth required		pam_krb5.so.1
#
# PPP service (explicit because of pam_dial_auth)
#
ppp	auth requisite		pam_authtok_get.so.1
ppp	auth required		pam_dhkeys.so.1
ppp	auth required		pam_unix_cred.so.1
ppp	auth required		pam_unix_auth.so.1
ppp	auth required		pam_dial_auth.so.1
#
# GDM Autologin (explicit because of pam_allow).  These need to be
# here as there is no mechanism for packages to amend pam.conf as
# they are installed.
#
gdm-autologin auth  required    pam_unix_cred.so.1
gdm-autologin auth  sufficient  pam_allow.so.1
#
# Default definitions for Authentication management
# Used when service name is not explicitly mentioned for authentication
#
other	auth requisite		pam_authtok_get.so.1
other	auth required		pam_dhkeys.so.1
other	auth required		pam_unix_cred.so.1
other	auth required		pam_unix_auth.so.1
#
# passwd command (explicit because of a different authentication module)
#
passwd	auth required		pam_passwd_auth.so.1
#
# cron service (explicit because of non-usage of pam_roles.so.1)
#
cron	account required	pam_unix_account.so.1
#
# cups service (explicit because of non-usage of pam_roles.so.1)
#
cups	account	required	pam_unix_account.so.1
#
# GDM Autologin (explicit because of pam_allow) This needs to be here
# as there is no mechanism for packages to amend pam.conf as they are
# installed.
#
gdm-autologin account  sufficient  pam_allow.so.1
#
# Default definition for Account management
# Used when service name is not explicitly mentioned for account management
#
other	account requisite	pam_roles.so.1
other	account required	pam_unix_account.so.1
#
# Default definition for Session management
# Used when service name is not explicitly mentioned for session management
#
other	session required	pam_unix_session.so.1
#
# Default definition for Password management
# Used when service name is not explicitly mentioned for password management
#
other	password required	pam_dhkeys.so.1
other	password requisite	pam_authtok_get.so.1
other	password requisite	pam_authtok_check.so.1
other	password required	pam_authtok_store.so.1
#
# Support for Kerberos V5 authentication and example configurations can
# be found in the pam_krb5(5) man page under the "EXAMPLES" section.
#



-------------- next part --------------
# This is the main Samba configuration file. You should read the
# smb.conf(5) manual page in order to understand the options listed
# here. Samba has a huge number of configurable options (perhaps too
# many!) most of which are not shown in this example
#
# For a step to step guide on installing, configuring and using samba, 
# read the Samba-HOWTO-Collection. This may be obtained from:
#  http://www.samba.org/samba/docs/Samba-HOWTO-Collection.pdf
#
# Many working examples of smb.conf files can be found in the 
# Samba-Guide which is generated daily and can be downloaded from: 
#  http://www.samba.org/samba/docs/Samba-Guide.pdf
#
# Any line which starts with a ; (semi-colon) or a # (hash) 
# is a comment and is ignored. In this example we will use a #
# for commentry and a ; for parts of the config file that you
# may wish to enable
#
# NOTE: Whenever you modify this file you should run the command "testparm"
# to check that you have not made any basic syntactic errors. 
#
#======================= Global Settings =====================================
[global]

# workgroup = NT-Domain-Name or Workgroup-Name, eg: MIDEARTH
   workgroup = DOMAIN_NAME

# server string is the equivalent of the NT Description field
   server string = Storage Server

# Security mode. Defines in which mode Samba will operate. Possible 
# values are share, user, server, domain and ads. Most people will want 
# user level security. See the Samba-HOWTO-Collection for details.
   security = ads

# This option is important for security. It allows you to restrict
# connections to machines which are on your local network. The
# following example restricts access to two C class networks and
# the "loopback" interface. For more examples of the syntax see
# the smb.conf man page
;   hosts allow = 127.

# If you want to automatically load your printer list rather
# than setting them up individually then you'll need this
   load printers = no

# you may wish to override the location of the printcap file
;   printcap name = /etc/printcap

# on SystemV system setting printcap name to lpstat should allow
# you to automatically obtain a printer list from the SystemV spool
# system
;   printcap name = lpstat

# disable reloading of printcap, as we don't support printing anyway
printcap cache time = 0

# It should not be necessary to specify the print system type unless
# it is non-standard. Currently supported print systems include:
# bsd, cups, sysv, plp, lprng, aix, hpux, qnx
;   printing = cups

# Uncomment this if you want a guest account, you must add this to /etc/passwd
# otherwise the user "nobody" is used
;  guest account = pcguest

# this tells Samba to use a separate log file for each machine
# that connects
   log file = /var/samba/log/log.%m

# Put a capping on the size of the log files (in Kb).
   max log size = 10000

   log level = 1

# Use password server option only with security = server
# The argument list may include:
#   password server = My_PDC_Name [My_BDC_Name] [My_Next_BDC_Name]
# or to auto-locate the domain controller/s
#   password server = *
   password server = 192.168.1.151:389

# Use the realm option only with security = ads
# Specifies the Active Directory realm the host is part of
   realm = domain_name.com

# Backend to store user information in. New installations should 
# use either tdbsam or ldapsam. smbpasswd is available for backwards 
# compatibility. tdbsam requires no further configuration.
   passdb backend = tdbsam

# winbind
idmap config * : range = 10000-20000
;winbind enum users = yes
;winbind enum groups = yes
winbind nested groups = yes

# Using the following line enables you to customise your configuration
# on a per machine basis. The %m gets replaced with the netbios name
# of the machine that is connecting.
# Note: Consider carefully the location in the configuration file of
#       this line.  The included file is read at that point.
;  include = /usr/sfw/lib/smb.conf.%m

# Configure Samba to use multiple interfaces
# If you have multiple network interfaces then you must list them
# here. See the man page for details.
;   interfaces = 192.168.12.2/24 192.168.13.2/24 

# Browser Control Options:
# set local master to no if you don't want Samba to become a master
# browser on your network. Otherwise the normal election rules apply
;   local master = no

# OS Level determines the precedence of this server in master browser
# elections. The default value should be reasonable
;   os level = 33

# Domain Master specifies Samba to be the Domain Master Browser. This
# allows Samba to collate browse lists between subnets. Don't use this
# if you already have a Windows NT domain controller doing this job
;   domain master = yes 

# Preferred Master causes Samba to force a local browser election on startup
# and gives it a slightly higher chance of winning the election
;   preferred master = yes

# Enable this if you want Samba to be a domain logon server for 
# Windows95 workstations. 
;   domain logons = yes

# if you enable domain logons then you may want a per-machine or
# per user logon script
# run a specific logon batch file per workstation (machine)
;   logon script = %m.bat
# run a specific logon batch file per username
;   logon script = %U.bat

# Where to store roving profiles (only for Win95 and WinNT)
#        %L substitutes for this servers netbios name, %U is username
#        You must uncomment the [Profiles] share below
;   logon path = \\%L\Profiles\%U

# Windows Internet Name Serving Support Section:
# WINS Support - Tells the NMBD component of Samba to enable it's WINS Server
;   wins support = yes

# WINS Server - Tells the NMBD components of Samba to be a WINS Client
#	Note: Samba can be either a WINS Server, or a WINS Client, but NOT both
   wins server = 192.168.1.151

# WINS Proxy - Tells Samba to answer name resolution queries on
# behalf of a non WINS capable client, for this to work there must be
# at least one	WINS Server on the network. The default is NO.
;   wins proxy = yes

# DNS Proxy - tells Samba whether or not to try to resolve NetBIOS names
# via DNS nslookups. The default is NO.
   dns proxy = no 

# These scripts are used on a domain controller or stand-alone 
# machine to add or delete corresponding unix accounts
;  add user script = /usr/sbin/useradd %u
;  add group script = /usr/sbin/groupadd %g
;  add machine script = /usr/sbin/adduser -n -g machines -c Machine -d /dev/null -s /bin/false %u
;  delete user script = /usr/sbin/userdel %u
;  delete user from group script = /usr/sbin/deluser %u %g
;  delete group script = /usr/sbin/groupdel %g

socket options = SO_KEEPALIVE
;use kerberos keytab = yes
max protocol = SMB2

#============================ Share Definitions ==============================
;[homes]
;   comment = Home Directories
;   browseable = no
;   writable = yes

# Un-comment the following and create the netlogon directory for Domain Logons
; [netlogon]
;   comment = Network Logon Service
;   path = /usr/sfw/lib/netlogon
;   guest ok = yes
;   writable = no
;   share modes = no


# Un-comment the following to provide a specific roving profile share
# the default is to use the user's home directory
;[Profiles]
;    path = /usr/local/samba/profiles
;    browseable = no
;    guest ok = yes


# NOTE: If you have a BSD-style print system there is no need to 
# specifically define each individual printer
;[printers]
;   comment = All Printers
;   path = /var/spool/samba
;   browseable = no
;# Set public = yes to allow user 'guest account' to print
;   guest ok = no
;   writable = no
;   printable = yes

# This one is useful for people to share files
;[tmp]
;   comment = Temporary file space
;   path = /tmp
;   read only = no
;   public = yes

# A publicly accessible directory, but read only, except for people in
# the "staff" group
;[public]
;   comment = Public Stuff
;   path = /home/samba
;   public = yes
;   writable = yes
;   printable = no
;   write list = @staff

# Other examples. 
#
# A private printer, usable only by fred. Spool data will be placed in fred's
# home directory. Note that fred must have write access to the spool directory,
# wherever it is.
;[fredsprn]
;   comment = Fred's Printer
;   valid users = fred
;   path = /homes/fred
;   printer = freds_printer
;   public = no
;   writable = no
;   printable = yes

# A private directory, usable only by fred. Note that fred requires write
# access to the directory.
;[fredsdir]
;   comment = Fred's Service
;   path = /usr/somewhere/private
;   valid users = fred
;   public = no
;   writable = yes
;   printable = no

# a service which has a different directory for each machine that connects
# this allows you to tailor configurations to incoming machines. You could
# also use the %U option to tailor it by user name.
# The %m gets replaced with the machine name that is connecting.
;[pchome]
;  comment = PC Directories
;  path = /usr/pc/%m
;  public = no
;  writable = yes


# The following two entries demonstrate how to share a directory so that two
# users can place files there that will be owned by the specific users. In this
# setup, the directory should be writable by both users and should have the
# sticky bit set on it to prevent abuse. Obviously this could be extended to
# as many users as required.
;[myshare]
;   comment = Mary's and Fred's stuff
;   path = /usr/somewhere/shared
;   valid users = mary fred
;   public = no
;   writable = yes
;   printable = no
;   create mask = 0765
[user_bull]
    comment = user_bull Files
    path = "/zvue/datapool/user_bull/fs"
    vfs objects = shadow_copy_zfs dirsort zfsacl
    shadow: filesystem = datapool/user_bull/fs
    shadow: exclude = "replication_*", "zpool_backup_auto"
    nfs4: mode = simple
    acl check permissions = no
    nt acl support = yes
    inherit acls = yes
    acl map full control = no
    ea support = yes
    store dos attributes = yes
    map archive = no
    map readonly = no
    map system = no
    writable = yes
    follow symlinks = yes
    printable = no
    valid users = "DOMAIN_NAME\bull"
    admin users = 




-------------- next part --------------
[libdefaults]
    default_realm = DOMAIN_NAME.COM
    dns_lookup_kdc = true
    dns_lookup_realm = true
    verify_ap_req_nofail = false

[realms]
    DOMAIN_NAME.COM = {
        kdc = 192.168.1.151:88
        admin_server = 192.168.1.151:88
        default_domain = domain_name.com
    }

[domain_realm]
    .domain_name.com = DOMAIN_NAME.COM
    domain_name.com = DOMAIN_NAME.COM

[logging]
    default = FILE:/var/krb5/kdc.log
    kdc = FILE:/var/krb5/kdc.log
    kdc_rotate = {
        period = 1d
        version = 10
    }

[appdefaults]
    kinit = {
        renewable = true
        forwardable= true
    }

-------------- next part --------------
[2012/07/25 14:06:25.511415,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_QueryGroupList: struct wbint_QueryGroupList
          out: struct wbint_QueryGroupList
              groups                   : *
                  groups: struct wbint_Principals
                      num_principals           : 0
                      principals: ARRAY(0)
              result                   : NT_STATUS_OK
[2012/07/25 14:06:25.511657, 10] winbindd/winbindd_list_groups.c:128(winbindd_list_groups_
done)
  Domain BUILTIN returned 0 groups
[2012/07/25 14:06:25.519500,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_QueryGroupList: struct wbint_QueryGroupList
          out: struct wbint_QueryGroupList
              groups                   : *
                  groups: struct wbint_Principals
                      num_principals           : 20
                      principals: ARRAY(20)
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-1000
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'IIS_WPG'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-1003
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'WINS Users'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-515
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Domain Computers'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-516
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Domain Controllers'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-518
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Schema Admins'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-519
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Enterprise Admins'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-517
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Cert Publishers'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-512
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Domain Admins'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-513
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Domain Users'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-514
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Domain Guests'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-520
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Group Policy Creator Owners'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-553
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'RAS and IAS Servers'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-1105
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'DnsAdmins'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-1106
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'DnsUpdateProxy'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-1135
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'testers'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-1165
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Var Users'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-1167
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Var Administrators'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-1171
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'VA_APPLICATION'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-1194
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'bsmith'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-1197
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Var Applications'
              result                   : NT_STATUS_OK
[2012/07/25 14:06:25.523256, 10] winbindd/winbindd_list_groups.c:128(winbindd_list_groups_
done)
  Domain DOMAIN_NAME returned 20 groups
[2012/07/25 14:06:25.523446, 10] winbindd/winbindd.c:677(wb_request_done)
  wb_request_done[19519:LIST_GROUPS]: NT_STATUS_OK
[2012/07/25 14:06:25.523616, 10] winbindd/winbindd.c:738(winbind_client_response_written)
  winbind_client_response_written[19519:LIST_GROUPS]: delivered response to client
[2012/07/25 14:06:25.524075,  6] winbindd/winbindd.c:840(winbind_client_request_read)
  closing socket 28, client exited
[2012/07/25 14:06:36.609102,  6] winbindd/winbindd.c:792(new_connection)
  accepted socket 28
[2012/07/25 14:06:36.609349, 10] winbindd/winbindd.c:642(process_request)
  process_request: request fn INTERFACE_VERSION
[2012/07/25 14:06:36.609421,  3] winbindd/winbindd_misc.c:384(winbindd_interface_version)
  [19592]: request interface version
[2012/07/25 14:06:36.609523, 10] winbindd/winbindd.c:738(winbind_client_response_written)
  winbind_client_response_written[19592:INTERFACE_VERSION]: delivered response to client
[2012/07/25 14:06:36.609662, 10] winbindd/winbindd.c:642(process_request)
  process_request: request fn WINBINDD_PRIV_PIPE_DIR
[2012/07/25 14:06:36.609716,  3] winbindd/winbindd_misc.c:417(winbindd_priv_pipe_dir)
  [19592]: request location of privileged pipe
[2012/07/25 14:06:36.609820, 10] winbindd/winbindd.c:738(winbind_client_response_written)
  winbind_client_response_written[19592:WINBINDD_PRIV_PIPE_DIR]: delivered response to cli
ent
[2012/07/25 14:06:36.609963, 10] winbindd/winbindd.c:615(process_request)
  process_request: Handling async request 19592:LIST_USERS
[2012/07/25 14:06:36.610021,  3] winbindd/winbindd_list_users.c:58(winbindd_list_users_sen
d)
  list_users
[2012/07/25 14:06:36.610075,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_QueryUserList: struct wbint_QueryUserList
          in: struct wbint_QueryUserList
[2012/07/25 14:06:36.610167,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_QueryUserList: struct wbint_QueryUserList
          in: struct wbint_QueryUserList
[2012/07/25 14:06:36.610251,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_QueryUserList: struct wbint_QueryUserList
          in: struct wbint_QueryUserList
[2012/07/25 14:06:36.610351, 10] winbindd/winbindd_cache.c:4807(wcache_fetch_ndr)
  Entry has timed out


[snip]


[2012/07/25 14:06:55.415407, 10] winbindd/winbindd.c:615(process_request)
  process_request: Handling async request 19778:GETGRNAM
[2012/07/25 14:06:55.415494,  3] winbindd/winbindd_getgrnam.c:56(winbindd_getgrnam_send)
  getgrnam DOMAIN_NAME\testers
[2012/07/25 14:06:55.415593,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_LookupName: struct wbint_LookupName
          in: struct wbint_LookupName
              domain                   : *
                  domain                   : 'DOMAIN_NAME'
              name                     : *
                  name                     : 'TESTERS'
              flags                    : 0x00000000 (0)
[2012/07/25 14:06:55.472159,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_LookupName: struct wbint_LookupName
          out: struct wbint_LookupName
              type                     : *
                  type                     : SID_NAME_DOM_GRP (2)
              sid                      : *
                  sid                      : S-1-5-21-714375242-3402532539-2503969851-1135
              result                   : NT_STATUS_OK
[2012/07/25 14:06:55.472498, 10] winbindd/winbindd_util.c:795(find_lookup_domain_from_sid)
  find_lookup_domain_from_sid(S-1-5-21-714375242-3402532539-2503969851-1135)
[2012/07/25 14:06:55.472575, 10] winbindd/winbindd_util.c:805(find_lookup_domain_from_sid)
  calling find_our_domain
[2012/07/25 14:06:55.472642,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_LookupSid: struct wbint_LookupSid
          in: struct wbint_LookupSid
              sid                      : *
                  sid                      : S-1-5-21-714375242-3402532539-2503969851-1135
[2012/07/25 14:06:55.474197,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_LookupSid: struct wbint_LookupSid
          out: struct wbint_LookupSid
              type                     : *
                  type                     : SID_NAME_DOM_GRP (2)
              domain                   : *
                  domain                   : *
                      domain                   : 'DOMAIN_NAME'
              name                     : *
                  name                     : *
                      name                     : 'testers'
              result                   : NT_STATUS_OK
[2012/07/25 14:06:55.474492, 10] winbindd/winbindd_util.c:795(find_lookup_domain_from_sid)
  find_lookup_domain_from_sid(S-1-5-21-714375242-3402532539-2503969851-1135)
[2012/07/25 14:06:55.474548, 10] winbindd/winbindd_util.c:805(find_lookup_domain_from_sid)
  calling find_our_domain
[2012/07/25 14:06:55.474592,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_LookupSid: struct wbint_LookupSid
          in: struct wbint_LookupSid
              sid                      : *
                  sid                      : S-1-5-21-714375242-3402532539-2503969851-1135
[2012/07/25 14:06:55.474727, 10] winbindd/winbindd_cache.c:4807(wcache_fetch_ndr)
  Entry has timed out
[2012/07/25 14:06:55.475932,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_LookupSid: struct wbint_LookupSid
          out: struct wbint_LookupSid
              type                     : *
                  type                     : SID_NAME_DOM_GRP (2)
              domain                   : *
                  domain                   : *
                      domain                   : 'DOMAIN_NAME'
              name                     : *
                  name                     : *
                      name                     : 'testers'
              result                   : NT_STATUS_OK
[2012/07/25 14:06:55.476205,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_Sid2Gid: struct wbint_Sid2Gid
          in: struct wbint_Sid2Gid
              dom_name                 : NULL
              sid                      : *
                  sid                      : S-1-5-21-714375242-3402532539-2503969851-1135
[2012/07/25 14:06:55.487968,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_Sid2Gid: struct wbint_Sid2Gid
          out: struct wbint_Sid2Gid
              gid                      : *
                  gid                      : 0x0000000000002717 (10007)
              result                   : NT_STATUS_OK
[2012/07/25 14:06:55.488153,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_LookupGroupMembers: struct wbint_LookupGroupMembers
          in: struct wbint_LookupGroupMembers
              sid                      : *
                  sid                      : S-1-5-21-714375242-3402532539-2503969851-1135
              type                     : SID_NAME_DOM_GRP (2)
[2012/07/25 14:06:55.492298,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_LookupGroupMembers: struct wbint_LookupGroupMembers
          out: struct wbint_LookupGroupMembers
              members                  : *
                  members: struct wbint_Principals
                      num_principals           : 1
                      principals: ARRAY(1)
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-1123
                              type                     : SID_NAME_USER (1)
                              name                     : *
                                  name                     : 'DOMAIN_NAME\venus'
              result                   : NT_STATUS_OK
[2012/07/25 14:06:55.492808, 10] winbindd/winbindd.c:677(wb_request_done)
  wb_request_done[19778:GETGRNAM]: NT_STATUS_OK
[2012/07/25 14:06:55.492934, 10] winbindd/winbindd.c:738(winbind_client_response_written)
  winbind_client_response_written[19778:GETGRNAM]: delivered response to client
[2012/07/25 14:06:55.566024,  6] winbindd/winbindd.c:840(winbind_client_request_read)
  closing socket 31, client exited

-------------- next part --------------
[2012/07/25 14:00:25.866573,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_QueryGroupList: struct wbint_QueryGroupList
          out: struct wbint_QueryGroupList
              groups                   : *
                  groups: struct wbint_Principals
                      num_principals           : 0
                      principals: ARRAY(0)
              result                   : NT_STATUS_OK
[2012/07/25 14:00:25.866704, 10] winbindd/winbindd_list_groups.c:128(winbindd_list_groups_done)
  Domain BUILTIN returned 0 groups
[2012/07/25 14:00:25.868616,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_QueryGroupList: struct wbint_QueryGroupList
          out: struct wbint_QueryGroupList
              groups                   : *
                  groups: struct wbint_Principals
                      num_principals           : 20
                      principals: ARRAY(20)
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-1000
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'IIS_WPG'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-1003
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'WINS Users'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-515
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Domain Computers'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-516
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Domain Controllers'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-518
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Schema Admins'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-519
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Enterprise Admins'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-517
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Cert Publishers'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-512
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Domain Admins'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-513
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Domain Users'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-514
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Domain Guests'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-520
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Group Policy Creator Owners'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-553
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'RAS and IAS Servers'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-1105
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'DnsAdmins'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-1106
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'DnsUpdateProxy'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-1135
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'testers'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-250
3969851-1165
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Var Users'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-1167
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Var Administrators'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-1171
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'VA_APPLICATION'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-1194
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'bsmith'
                          principals: struct wbint_Principal
                              sid                      : S-1-5-21-714375242-3402532539-2503969851-1197
                              type                     : SID_NAME_DOM_GRP (2)
                              name                     : *
                                  name                     : 'Var Applications'
              result                   : NT_STATUS_OK
[2012/07/25 14:00:25.870383, 10] winbindd/winbindd_list_groups.c:128(winbindd_list_groups_done)
  Domain DOMAIN_NAME returned 20 groups
[2012/07/25 14:00:25.870469,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_QueryGroupList: struct wbint_QueryGroupList
          out: struct wbint_QueryGroupList
              groups                   : *
                  groups: struct wbint_Principals
                      num_principals           : 0
                      principals: ARRAY(0)
              result                   : NT_STATUS_NO_MEMORY
[2012/07/25 14:00:25.870592, 10] winbindd/winbindd_list_groups.c:128(winbindd_list_groups_done)
  Domain STORAGE returned 0 groups
[2012/07/25 14:00:25.870622, 10] winbindd/winbindd_list_groups.c:134(winbindd_list_groups_done)
  list_groups for domain STORAGE failed
[2012/07/25 14:00:25.870701, 10] winbindd/winbindd.c:677(wb_request_done)
  wb_request_done[998:LIST_GROUPS]: NT_STATUS_OK
[2012/07/25 14:00:25.870773, 10] winbindd/winbindd.c:738(winbind_client_response_written)
  winbind_client_response_written[998:LIST_GROUPS]: delivered response to client
[2012/07/25 14:00:25.870990,  6] winbindd/winbindd.c:840(winbind_client_request_read)
  closing socket 27, client exited
[2012/07/25 14:00:25.912989,  6] winbindd/winbindd.c:792(new_connection)
  accepted socket 27
[2012/07/25 14:00:25.913130, 10] winbindd/winbindd.c:642(process_request)
  process_request: request fn INTERFACE_VERSION
[2012/07/25 14:00:25.913165,  3] winbindd/winbindd_misc.c:384(winbindd_interface_version)
  [  999]: request interface version
[2012/07/25 14:00:25.913226, 10] winbindd/winbindd.c:738(winbind_client_response_written)
  winbind_client_response_written[999:INTERFACE_VERSION]: delivered response to client
[2012/07/25 14:00:25.913291, 10] winbindd/winbindd.c:642(process_request)
  process_request: request fn WINBINDD_PRIV_PIPE_DIR
[2012/07/25 14:00:25.913322,  3] winbindd/winbindd_misc.c:417(winbindd_priv_pipe_dir)
  [  999]: request location of privileged pipe
[2012/07/25 14:00:25.913394, 10] winbindd/winbindd.c:738(winbind_client_response_written)
  winbind_client_response_written[999:WINBINDD_PRIV_PIPE_DIR]: delivered response to client

[snip]

[2012/07/25 14:00:37.149706, 10] winbindd/winbindd.c:615(process_request)
  process_request: Handling async request 1198:GETGRNAM
[2012/07/25 14:00:37.149744,  3] winbindd/winbindd_getgrnam.c:56(winbindd_getgrnam_send)
  getgrnam DOMAIN_NAME\testers
[2012/07/25 14:00:37.149787,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_LookupName: struct wbint_LookupName
          in: struct wbint_LookupName
              domain                   : *
                  domain                   : 'DOMAIN_NAME'
              name                     : *
                  name                     : 'TESTERS'
              flags                    : 0x00000000 (0)
[2012/07/25 14:00:37.155253,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_LookupName: struct wbint_LookupName
          out: struct wbint_LookupName
              type                     : *
                  type                     : SID_NAME_DOM_GRP (2)
              sid                      : *
                  sid                      : S-1-5-21-714375242-3402532539-2503969851-1135
              result                   : NT_STATUS_OK
[2012/07/25 14:00:37.155413, 10] winbindd/winbindd_util.c:795(find_lookup_domain_from_sid)
  find_lookup_domain_from_sid(S-1-5-21-714375242-3402532539-2503969851-1135)
[2012/07/25 14:00:37.155452, 10] winbindd/winbindd_util.c:805(find_lookup_domain_from_sid)
  calling find_our_domain
[2012/07/25 14:00:37.155487,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_LookupSid: struct wbint_LookupSid
          in: struct wbint_LookupSid
              sid                      : *
                  sid                      : S-1-5-21-714375242-3402532539-2503969851-1135
[2012/07/25 14:00:37.156382,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_LookupSid: struct wbint_LookupSid
          out: struct wbint_LookupSid
              type                     : *
                  type                     : SID_NAME_DOM_GRP (2)
              domain                   : *
                  domain                   : *
                      domain                   : 'DOMAIN_NAME'
              name                     : *
                  name                     : *
                      name                     : 'testers'
              result                   : NT_STATUS_OK
[2012/07/25 14:00:37.156604, 10] winbindd/wb_sid2gid.c:57(wb_sid2gid_send)
  idmap_cache_find_sid2gid found 10009
[2012/07/25 14:00:37.156662,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_LookupGroupMembers: struct wbint_LookupGroupMembers
          in: struct wbint_LookupGroupMembers
              sid                      : *
                  sid                      : S-1-5-21-714375242-3402532539-2503969851-1135
              type                     : SID_NAME_DOM_GRP (2)
[2012/07/25 14:00:37.179647,  1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug)
       wbint_LookupGroupMembers: struct wbint_LookupGroupMembers
          out: struct wbint_LookupGroupMembers
              members                  : *
                  members: struct wbint_Principals
                      num_principals           : 0
                      principals: ARRAY(0)
              result                   : NT_STATUS_UNSUCCESSFUL
[2012/07/25 14:00:37.179811,  5] winbindd/winbindd_getgrnam.c:146(winbindd_getgrnam_recv)
  Could not convert sid S-1-5-21-714375242-3402532539-2503969851-1135: NT_STATUS_UNSUCCESSFUL
[2012/07/25 14:00:37.179851, 10] winbindd/winbindd.c:677(wb_request_done)
  wb_request_done[1198:GETGRNAM]: NT_STATUS_UNSUCCESSFUL
[2012/07/25 14:00:37.179917, 10] winbindd/winbindd.c:738(winbind_client_response_written)
  winbind_client_response_written[1198:GETGRNAM]: delivered response to client
[2012/07/25 14:00:37.180029,  6] winbindd/winbindd.c:840(winbind_client_request_read)
  closing socket 32, client exited
[2012/07/25 14:00:37.181006,  6] winbindd/winbindd.c:840(winbind_client_request_read)
  closing socket 30, client exited



More information about the samba mailing list