Netzwerk-Freigaben funktionieren nicht

Einklappen
X
 
  • Zeit
  • Anzeigen
Alles löschen
neue Beiträge
  • Iksi
    Lox Guru
    • 27.08.2015
    • 1111

    Netzwerk-Freigaben funktionieren nicht

    Hallo,

    ich würde gerne über den Loxberry auf mein NAS zugreifen um dort die BackUps zu speichern.

    Also habe ich unter Netzwerkfreigaben einen neuen Server angelegt, aber leider zeigt er dort keine Freigaben an.

    Hier das DebugLog:

    Code:
    ================================================================================
    <LOGSTART>29.04.2018 17:03:21 TASK STARTED
    <LOGSTART>netshares.cgi - debugging starts
    <ALERT> WARNING! THIS LOGFILE WILL CONTAIN YOUR NETSHARE CREDENTIALS!
    <INFO> Output of 'cat /etc/fstab':
    proc /proc proc defaults,nofail 0 0
    PARTUUID=4bd27daf-01 /boot vfat defaults,nofail 0 2
    PARTUUID=4bd27daf-02 / ext4 defaults,noatime,nofail 0 1
    # a swapfile is not a swap partition, no line here
    #   use  dphys-swapfile swap[on|off]  for that
    tmpfs /var/log tmpfs nodev,nosuid,size=50M,mode=755,uid=1,gid=1,nofail 0 0
    tmpfs /var/tmp tmpfs nodev,nosuid,size=25M,nofail 0 0
    tmpfs /tmp tmpfs nodev,nosuid,size=200M,nofail 0 0
    tmpfs /opt/loxberry/log/plugins tmpfs nodev,nosuid,size=25M,mode=755,uid=1001,gid=1001,nofail 0 0
    tmpfs /opt/loxberry/log/system_tmpfs tmpfs nodev,nosuid,size=25M,mode=755,uid=1001,gid=1001,nofail 0 0
    <INFO> Output of 'mount':
    /dev/mmcblk0p2 on / type ext4 (rw,noatime,data=ordered)
    devtmpfs on /dev type devtmpfs (rw,relatime,size=470132k,nr_inodes=117533,mode=755)
    sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
    proc on /proc type proc (rw,relatime)
    tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)
    devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
    tmpfs on /run type tmpfs (rw,nosuid,nodev,mode=755)
    tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
    tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
    cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,release_agent=/lib/systemd/systemd-cgroups-agent,name=systemd)
    cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
    cgroup on /sys/fs/cgroup/net_cls type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls)
    cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
    cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
    cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
    cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
    systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=27,pgrp=1,timeout=0,minproto=5,maxproto=5,direct)
    sunrpc on /run/rpc_pipefs type rpc_pipefs (rw,relatime)
    debugfs on /sys/kernel/debug type debugfs (rw,relatime)
    mqueue on /dev/mqueue type mqueue (rw,relatime)
    configfs on /sys/kernel/config type configfs (rw,relatime)
    tmpfs on /var/tmp type tmpfs (rw,nosuid,nodev,relatime,size=25600k)
    tmpfs on /tmp type tmpfs (rw,nosuid,nodev,relatime,size=204800k)
    tmpfs on /var/log type tmpfs (rw,nosuid,nodev,relatime,size=51200k,mode=755,uid=1,gid=1)
    tmpfs on /opt/loxberry/log/plugins type tmpfs (rw,nosuid,nodev,relatime,size=25600k,mode=755,uid=1001,gid=1001)
    tmpfs on /opt/loxberry/log/system_tmpfs type tmpfs (rw,nosuid,nodev,relatime,size=25600k,mode=755,uid=1001,gid=1001)
    /dev/mmcblk0p1 on /boot type vfat (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=ascii,shortname=mixed,errors=remount-ro)
    /etc/auto.smb on /media/smb type autofs (rw,relatime,fd=6,pgrp=16878,timeout=300,minproto=5,maxproto=5,indirect)
    /etc/auto.smb on /media/smb/192.168.0.195/NAS type autofs (rw,relatime,fd=6,pgrp=16878,timeout=300,minproto=5,maxproto=5,offset)
    /etc/auto.smb on /media/smb/192.168.0.195/info type autofs (rw,relatime,fd=6,pgrp=16878,timeout=300,minproto=5,maxproto=5,offset)
    <INFO> Output of 'ls -l /etc/creds':
    lrwxrwxrwx 1 root root 38 Apr  1 21:25 /etc/creds -> /opt/loxberry/system/samba/credentials
    <INFO> Output of 'ls -l /opt/loxberry/system/samba/credentials':
    total 4
    -rw-r--r-- 1 loxberry loxberry 42 Apr 29 17:02 192.168.0.195
    <OK> Server: 192.168.0.195
    <INFO> Type: smb
    <INFO> PATH: /opt/loxberry/system/storage/smb/192.168.0.195
    <INFO> Output of 'cat /opt/loxberry/system/samba/credentials/192.168.0.195':
    uid=1001
    gid=1001
    username=tv
    password=xx
    <INFO> Output of '/etc/auto.smb 192.168.0.195'
    -fstype=cifs,uid=$UID,gid=$GID,credentials=/etc/creds/192.168.0.195 \
         "/NAS" "://192.168.0.195/NAS" \
         "/info" "://192.168.0.195/info"
    <INFO> Output of 'smbclient -A /opt/loxberry/system/samba/credentials/192.168.0.195 -gL 192.168.0.195 --debuglevel=10':
    INFO: Current debug levels:
      all: 10
      tdb: 10
      printdrivers: 10
      lanman: 10
      smb: 10
      rpc_parse: 10
      rpc_srv: 10
      rpc_cli: 10
      passdb: 10
      sam: 10
      auth: 10
      winbind: 10
      vfs: 10
      idmap: 10
      quota: 10
      acls: 10
      locking: 10
      msdfs: 10
      dmapi: 10
      registry: 10
      scavenger: 10
      dns: 10
      ldb: 10
      tevent: 10
    lp_load_ex: refreshing parameters
    Initialising global parameters
    rlimit_max: increasing rlimit_max (8192) to minimum Windows limit (16384)
    INFO: Current debug levels:
      all: 10
      tdb: 10
      printdrivers: 10
      lanman: 10
      smb: 10
      rpc_parse: 10
      rpc_srv: 10
      rpc_cli: 10
      passdb: 10
      sam: 10
      auth: 10
      winbind: 10
      vfs: 10
      idmap: 10
      quota: 10
      acls: 10
      locking: 10
      msdfs: 10
      dmapi: 10
      registry: 10
      scavenger: 10
      dns: 10
      ldb: 10
      tevent: 10
    Processing section "[global]"
    doing parameter workgroup = WORKGROUP
    doing parameter dns proxy = no
    doing parameter allow insecure wide links = yes
    doing parameter client max protocol = SMB3
    doing parameter log file = /var/log/samba/log.%m
    doing parameter max log size = 1000
    doing parameter panic action = /usr/share/samba/panic-action %d
    doing parameter server role = standalone server
    doing parameter passdb backend = tdbsam
    doing parameter obey pam restrictions = yes
    doing parameter unix password sync = no
    doing parameter passwd program = /usr/bin/passwd %u
    doing parameter passwd chat = *Enter\snew\s*\spassword:* %n\n *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* .
    doing parameter pam password change = yes
    doing parameter map to guest = bad user
    doing parameter usershare allow guests = no
    pm_process() returned Yes
    lp_servicenumber: couldn't find homes
    added interface eth0 ip=192.168.0.102 bcast=192.168.0.255 netmask=255.255.255.0
    Netbios name list:-
    my_netbios_names[0]="LOXBERRY"
    Client started (version 4.5.12-Debian).
    Connecting to 192.168.0.195 at port 445
    Socket options:
        SO_KEEPALIVE = 0
        SO_REUSEADDR = 0
        SO_BROADCAST = 0
        TCP_NODELAY = 1
        TCP_KEEPCNT = 9
        TCP_KEEPIDLE = 7200
        TCP_KEEPINTVL = 75
        IPTOS_LOWDELAY = 0
        IPTOS_THROUGHPUT = 0
        SO_REUSEPORT = 0
        SO_SNDBUF = 44800
        SO_RCVBUF = 341760
        SO_SNDLOWAT = 1
        SO_RCVLOWAT = 1
        SO_SNDTIMEO = 0
        SO_RCVTIMEO = 0
        TCP_QUICKACK = 1
        TCP_DEFER_ACCEPT = 0
     session request ok
    Doing spnego session setup (blob length=42)
    got OID=1.3.6.1.4.1.311.2.2.10
    got principal=NONE
    GENSEC backend 'gssapi_spnego' registered
    GENSEC backend 'gssapi_krb5' registered
    GENSEC backend 'gssapi_krb5_sasl' registered
    GENSEC backend 'spnego' registered
    GENSEC backend 'schannel' registered
    GENSEC backend 'naclrpc_as_system' registered
    GENSEC backend 'sasl-EXTERNAL' registered
    GENSEC backend 'ntlmssp' registered
    GENSEC backend 'ntlmssp_resume_ccache' registered
    GENSEC backend 'http_basic' registered
    GENSEC backend 'http_ntlm' registered
    GENSEC backend 'krb5' registered
    GENSEC backend 'fake_gssapi_krb5' registered
    Starting GENSEC mechanism spnego
    Starting GENSEC submechanism ntlmssp
         negotiate: struct NEGOTIATE_MESSAGE
            Signature                : 'NTLMSSP'
            MessageType              : NtLmNegotiate (1)
            NegotiateFlags           : 0x62088215 (1644724757)
                   1: NTLMSSP_NEGOTIATE_UNICODE
                   0: NTLMSSP_NEGOTIATE_OEM    
                   1: NTLMSSP_REQUEST_TARGET  
                   1: NTLMSSP_NEGOTIATE_SIGN  
                   0: NTLMSSP_NEGOTIATE_SEAL  
                   0: NTLMSSP_NEGOTIATE_DATAGRAM
                   0: NTLMSSP_NEGOTIATE_LM_KEY
                   0: NTLMSSP_NEGOTIATE_NETWARE
                   1: NTLMSSP_NEGOTIATE_NTLM  
                   0: NTLMSSP_NEGOTIATE_NT_ONLY
                   0: NTLMSSP_ANONYMOUS        
                   0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
                   0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
                   0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
                   1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
                   0: NTLMSSP_TARGET_TYPE_DOMAIN
                   0: NTLMSSP_TARGET_TYPE_SERVER
                   0: NTLMSSP_TARGET_TYPE_SHARE
                   1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
                   0: NTLMSSP_NEGOTIATE_IDENTIFY
                   0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
                   0: NTLMSSP_NEGOTIATE_TARGET_INFO
                   1: NTLMSSP_NEGOTIATE_VERSION
                   1: NTLMSSP_NEGOTIATE_128    
                   1: NTLMSSP_NEGOTIATE_KEY_EXCH
                   0: NTLMSSP_NEGOTIATE_56    
            DomainNameLen            : 0x0000 (0)
            DomainNameMaxLen         : 0x0000 (0)
            DomainName               : *
                DomainName               : ''
            WorkstationLen           : 0x0000 (0)
            WorkstationMaxLen        : 0x0000 (0)
            Workstation              : *
                Workstation              : ''
            Version: struct ntlmssp_VERSION
                ProductMajorVersion      : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
                ProductMinorVersion      : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
                ProductBuild             : 0x0000 (0)
                Reserved: ARRAY(3)
                    [0]                      : 0x00 (0)
                    [1]                      : 0x00 (0)
                    [2]                      : 0x00 (0)
                NTLMRevisionCurrent      : NTLMSSP_REVISION_W2K3 (15)
    Got challenge flags:
    Got NTLMSSP neg_flags=0x628a8215
      NTLMSSP_NEGOTIATE_UNICODE
      NTLMSSP_REQUEST_TARGET
      NTLMSSP_NEGOTIATE_SIGN
      NTLMSSP_NEGOTIATE_NTLM
      NTLMSSP_NEGOTIATE_ALWAYS_SIGN
      NTLMSSP_TARGET_TYPE_SERVER
      NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
      NTLMSSP_NEGOTIATE_TARGET_INFO
      NTLMSSP_NEGOTIATE_VERSION
      NTLMSSP_NEGOTIATE_128
      NTLMSSP_NEGOTIATE_KEY_EXCH
    NTLMSSP: Set final flags:
    Got NTLMSSP neg_flags=0x62088215
      NTLMSSP_NEGOTIATE_UNICODE
      NTLMSSP_REQUEST_TARGET
      NTLMSSP_NEGOTIATE_SIGN
      NTLMSSP_NEGOTIATE_NTLM
      NTLMSSP_NEGOTIATE_ALWAYS_SIGN
      NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
      NTLMSSP_NEGOTIATE_VERSION
      NTLMSSP_NEGOTIATE_128
      NTLMSSP_NEGOTIATE_KEY_EXCH
    NTLMSSP Sign/Seal - Initialising with flags:
    Got NTLMSSP neg_flags=0x62088215
      NTLMSSP_NEGOTIATE_UNICODE
      NTLMSSP_REQUEST_TARGET
      NTLMSSP_NEGOTIATE_SIGN
      NTLMSSP_NEGOTIATE_NTLM
      NTLMSSP_NEGOTIATE_ALWAYS_SIGN
      NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
      NTLMSSP_NEGOTIATE_VERSION
      NTLMSSP_NEGOTIATE_128
      NTLMSSP_NEGOTIATE_KEY_EXCH
    NTLMSSP Sign/Seal - Initialising with flags:
    Got NTLMSSP neg_flags=0x62088215
      NTLMSSP_NEGOTIATE_UNICODE
      NTLMSSP_REQUEST_TARGET
      NTLMSSP_NEGOTIATE_SIGN
      NTLMSSP_NEGOTIATE_NTLM
      NTLMSSP_NEGOTIATE_ALWAYS_SIGN
      NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
      NTLMSSP_NEGOTIATE_VERSION
      NTLMSSP_NEGOTIATE_128
      NTLMSSP_NEGOTIATE_KEY_EXCH
    Domain=[LAN] OS=[Unix] Server=[Samba 3.6.3-31a.osstech]
     session setup ok
     tconx ok
    Bind RPC Pipe: host 192.168.0.195 auth_type 0, auth_level 1
         &r: struct ncacn_packet
            rpc_vers                 : 0x05 (5)
            rpc_vers_minor           : 0x00 (0)
            ptype                    : DCERPC_PKT_BIND (11)
            pfc_flags                : 0x03 (3)
                   1: DCERPC_PFC_FLAG_FIRST    
                   1: DCERPC_PFC_FLAG_LAST    
                   0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
                   0: DCERPC_PFC_FLAG_CONC_MPX
                   0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
                   0: DCERPC_PFC_FLAG_MAYBE    
                   0: DCERPC_PFC_FLAG_OBJECT_UUID
            drep: ARRAY(4)
                [0]                      : 0x10 (16)
                [1]                      : 0x00 (0)
                [2]                      : 0x00 (0)
                [3]                      : 0x00 (0)
            frag_length              : 0x0048 (72)
            auth_length              : 0x0000 (0)
            call_id                  : 0x00000001 (1)
            u                        : union dcerpc_payload(case 11)
            bind: struct dcerpc_bind
                max_xmit_frag            : 0x10b8 (4280)
                max_recv_frag            : 0x10b8 (4280)
                assoc_group_id           : 0x00000000 (0)
                num_contexts             : 0x01 (1)
                ctx_list: ARRAY(1)
                    ctx_list: struct dcerpc_ctx_list
                        context_id               : 0x0000 (0)
                        num_transfer_syntaxes    : 0x01 (1)
                        abstract_syntax: struct ndr_syntax_id
                            uuid                     : 4b324fc8-1670-01d3-1278-5a47bf6ee188
                            if_version               : 0x00000003 (3)
                        transfer_syntaxes: ARRAY(1)
                            transfer_syntaxes: struct ndr_syntax_id
                                uuid                     : 8a885d04-1ceb-11c9-9fe8-08002b104860
                                if_version               : 0x00000002 (2)
                auth_info                : DATA_BLOB length=0
    rpc_api_pipe: host 192.168.0.195
    num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
    rpc_read_send: data_to_read: 52
         r: struct ncacn_packet
            rpc_vers                 : 0x05 (5)
            rpc_vers_minor           : 0x00 (0)
            ptype                    : DCERPC_PKT_BIND_ACK (12)
            pfc_flags                : 0x03 (3)
                   1: DCERPC_PFC_FLAG_FIRST    
                   1: DCERPC_PFC_FLAG_LAST    
                   0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
                   0: DCERPC_PFC_FLAG_CONC_MPX
                   0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
                   0: DCERPC_PFC_FLAG_MAYBE    
                   0: DCERPC_PFC_FLAG_OBJECT_UUID
            drep: ARRAY(4)
                [0]                      : 0x10 (16)
                [1]                      : 0x00 (0)
                [2]                      : 0x00 (0)
                [3]                      : 0x00 (0)
            frag_length              : 0x0044 (68)
            auth_length              : 0x0000 (0)
            call_id                  : 0x00000001 (1)
            u                        : union dcerpc_payload(case 12)
            bind_ack: struct dcerpc_bind_ack
                max_xmit_frag            : 0x10b8 (4280)
                max_recv_frag            : 0x10b8 (4280)
                assoc_group_id           : 0x000053f0 (21488)
                secondary_address_size   : 0x000d (13)
                secondary_address        : '\PIPE\srvsvc'
                _pad1                    : DATA_BLOB length=1
    [0000] 00                                                 .
                num_results              : 0x01 (1)
                ctx_list: ARRAY(1)
                    ctx_list: struct dcerpc_ack_ctx
                        result                   : DCERPC_BIND_ACK_RESULT_ACCEPTANCE (0)
                        reason                   : union dcerpc_bind_ack_reason(case 0)
                        value                    : DCERPC_BIND_ACK_REASON_NOT_SPECIFIED (0)
                        syntax: struct ndr_syntax_id
                            uuid                     : 8a885d04-1ceb-11c9-9fe8-08002b104860
                            if_version               : 0x00000002 (2)
                auth_info                : DATA_BLOB length=0
    rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK
    rpc_api_pipe: host 192.168.0.195 returned 68 bytes.
    check_bind_response: accepted!
    cli_rpc_pipe_open_noauth: opened pipe srvsvc to machine 192.168.0.195 and bound anonymously.
         srvsvc_NetShareEnumAll: struct srvsvc_NetShareEnumAll
            in: struct srvsvc_NetShareEnumAll
                server_unc               : *
                    server_unc               : '192.168.0.195'
                info_ctr                 : *
                    info_ctr: struct srvsvc_NetShareInfoCtr
                        level                    : 0x00000001 (1)
                        ctr                      : union srvsvc_NetShareCtr(case 1)
                        ctr1                     : *
                            ctr1: struct srvsvc_NetShareCtr1
                                count                    : 0x00000000 (0)
                                array                    : NULL
                max_buffer               : 0xffffffff (4294967295)
                resume_handle            : *
                    resume_handle            : 0x00000000 (0)
         &r: struct ncacn_packet
            rpc_vers                 : 0x05 (5)
            rpc_vers_minor           : 0x00 (0)
            ptype                    : DCERPC_PKT_REQUEST (0)
            pfc_flags                : 0x03 (3)
                   1: DCERPC_PFC_FLAG_FIRST    
                   1: DCERPC_PFC_FLAG_LAST    
                   0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
                   0: DCERPC_PFC_FLAG_CONC_MPX
                   0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
                   0: DCERPC_PFC_FLAG_MAYBE    
                   0: DCERPC_PFC_FLAG_OBJECT_UUID
            drep: ARRAY(4)
                [0]                      : 0x10 (16)
                [1]                      : 0x00 (0)
                [2]                      : 0x00 (0)
                [3]                      : 0x00 (0)
            frag_length              : 0x0018 (24)
            auth_length              : 0x0000 (0)
            call_id                  : 0x00000002 (2)
            u                        : union dcerpc_payload(case 0)
            request: struct dcerpc_request
                alloc_hint               : 0x0000004c (76)
                context_id               : 0x0000 (0)
                opnum                    : 0x000f (15)
                object                   : union dcerpc_object(case 0)
                empty: struct dcerpc_empty
                _pad                     : DATA_BLOB length=0
                stub_and_verifier        : DATA_BLOB length=0
    rpc_api_pipe: host 192.168.0.195
    num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=100, this_data=100, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
    rpc_read_send: data_to_read: 300
         r: struct ncacn_packet
            rpc_vers                 : 0x05 (5)
            rpc_vers_minor           : 0x00 (0)
            ptype                    : DCERPC_PKT_RESPONSE (2)
            pfc_flags                : 0x03 (3)
                   1: DCERPC_PFC_FLAG_FIRST    
                   1: DCERPC_PFC_FLAG_LAST    
                   0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
                   0: DCERPC_PFC_FLAG_CONC_MPX
                   0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
                   0: DCERPC_PFC_FLAG_MAYBE    
                   0: DCERPC_PFC_FLAG_OBJECT_UUID
            drep: ARRAY(4)
                [0]                      : 0x10 (16)
                [1]                      : 0x00 (0)
                [2]                      : 0x00 (0)
                [3]                      : 0x00 (0)
            frag_length              : 0x013c (316)
            auth_length              : 0x0000 (0)
            call_id                  : 0x00000002 (2)
            u                        : union dcerpc_payload(case 2)
            response: struct dcerpc_response
                alloc_hint               : 0x00000124 (292)
                context_id               : 0x0000 (0)
                cancel_count             : 0x00 (0)
                _pad                     : DATA_BLOB length=1
    [0000] 00                                                 .
                stub_and_verifier        : DATA_BLOB length=292
    [0000] 01 00 00 00 01 00 00 00   0C 00 02 00 03 00 00 00   ........ ........
    [0010] 10 00 02 00 03 00 00 00   14 00 02 00 03 00 00 80   ........ ........
    [0020] 18 00 02 00 1C 00 02 00   00 00 00 00 20 00 02 00   ........ .... ...
    [0030] 24 00 02 00 00 00 00 00   28 00 02 00 05 00 00 00   $....... (.......
    [0040] 00 00 00 00 05 00 00 00   49 00 50 00 43 00 24 00   ........ I.P.C.$.
    [0050] 00 00 00 00 1F 00 00 00   00 00 00 00 1F 00 00 00   ........ ........
    [0060] 49 00 50 00 43 00 20 00   53 00 65 00 72 00 76 00   I.P.C. . S.e.r.v.
    [0070] 69 00 63 00 65 00 20 00   28 00 22 00 4D 00 79 00   i.c.e. . (.".M.y.
    [0080] 20 00 4C 00 69 00 6E 00   6B 00 53 00 74 00 61 00    .L.i.n. k.S.t.a.
    [0090] 74 00 69 00 6F 00 6E 00   22 00 29 00 00 00 00 00   t.i.o.n. ".).....
    [00A0] 04 00 00 00 00 00 00 00   04 00 00 00 4E 00 41 00   ........ ....N.A.
    [00B0] 53 00 00 00 01 00 00 00   00 00 00 00 01 00 00 00   S....... ........
    [00C0] 00 00 00 00 05 00 00 00   00 00 00 00 05 00 00 00   ........ ........
    [00D0] 69 00 6E 00 66 00 6F 00   00 00 00 00 16 00 00 00   i.n.f.o. ........
    [00E0] 00 00 00 00 16 00 00 00   4C 00 69 00 6E 00 6B 00   ........ L.i.n.k.
    [00F0] 53 00 74 00 61 00 74 00   69 00 6F 00 6E 00 20 00   S.t.a.t. i.o.n. .
    [0100] 55 00 74 00 69 00 6C 00   69 00 74 00 69 00 65 00   U.t.i.l. i.t.i.e.
    [0110] 73 00 00 00 03 00 00 00   2C 00 02 00 00 00 00 00   s....... ,.......
    [0120] 00 00 00 00                                        ....
    Got pdu len 316, data_len 292
    rpc_api_pipe: got frag len of 316 at offset 0: NT_STATUS_OK
    rpc_api_pipe: host 192.168.0.195 returned 292 bytes.
         srvsvc_NetShareEnumAll: struct srvsvc_NetShareEnumAll
            out: struct srvsvc_NetShareEnumAll
                info_ctr                 : *
                    info_ctr: struct srvsvc_NetShareInfoCtr
                        level                    : 0x00000001 (1)
                        ctr                      : union srvsvc_NetShareCtr(case 1)
                        ctr1                     : *
                            ctr1: struct srvsvc_NetShareCtr1
                                count                    : 0x00000003 (3)
                                array                    : *
                                    array: ARRAY(3)
                                        array: struct srvsvc_NetShareInfo1
                                            name                     : *
                                                name                     : 'IPC$'
                                            type                     : STYPE_IPC_HIDDEN (0x80000003)
                                            comment                  : *
                                                comment                  : 'IPC Service ("My LinkStation")'
                                        array: struct srvsvc_NetShareInfo1
                                            name                     : *
                                                name                     : 'NAS'
                                            type                     : STYPE_DISKTREE (0x0)
                                            comment                  : *
                                                comment                  : ''
                                        array: struct srvsvc_NetShareInfo1
                                            name                     : *
                                                name                     : 'info'
                                            type                     : STYPE_DISKTREE (0x0)
                                            comment                  : *
                                                comment                  : 'LinkStation Utilities'
                totalentries             : *
                    totalentries             : 0x00000003 (3)
                resume_handle            : *
                    resume_handle            : 0x00000000 (0)
                result                   : WERR_OK
    Connecting to 192.168.0.195 at port 139
    Socket options:
        SO_KEEPALIVE = 0
        SO_REUSEADDR = 0
        SO_BROADCAST = 0
        TCP_NODELAY = 1
        TCP_KEEPCNT = 9
        TCP_KEEPIDLE = 7200
        TCP_KEEPINTVL = 75
        IPTOS_LOWDELAY = 0
        IPTOS_THROUGHPUT = 0
        SO_REUSEPORT = 0
        SO_SNDBUF = 44800
        SO_RCVBUF = 341760
        SO_SNDLOWAT = 1
        SO_RCVLOWAT = 1
        SO_SNDTIMEO = 0
        SO_RCVTIMEO = 0
        TCP_QUICKACK = 1
        TCP_DEFER_ACCEPT = 0
     session request ok
    Doing spnego session setup (blob length=42)
    got OID=1.3.6.1.4.1.311.2.2.10
    got principal=NONE
    Starting GENSEC mechanism spnego
    Starting GENSEC submechanism ntlmssp
         negotiate: struct NEGOTIATE_MESSAGE
            Signature                : 'NTLMSSP'
            MessageType              : NtLmNegotiate (1)
            NegotiateFlags           : 0x62088215 (1644724757)
                   1: NTLMSSP_NEGOTIATE_UNICODE
                   0: NTLMSSP_NEGOTIATE_OEM    
                   1: NTLMSSP_REQUEST_TARGET  
                   1: NTLMSSP_NEGOTIATE_SIGN  
                   0: NTLMSSP_NEGOTIATE_SEAL  
                   0: NTLMSSP_NEGOTIATE_DATAGRAM
                   0: NTLMSSP_NEGOTIATE_LM_KEY
                   0: NTLMSSP_NEGOTIATE_NETWARE
                   1: NTLMSSP_NEGOTIATE_NTLM  
                   0: NTLMSSP_NEGOTIATE_NT_ONLY
                   0: NTLMSSP_ANONYMOUS        
                   0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
                   0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
                   0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
                   1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
                   0: NTLMSSP_TARGET_TYPE_DOMAIN
                   0: NTLMSSP_TARGET_TYPE_SERVER
                   0: NTLMSSP_TARGET_TYPE_SHARE
                   1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
                   0: NTLMSSP_NEGOTIATE_IDENTIFY
                   0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
                   0: NTLMSSP_NEGOTIATE_TARGET_INFO
                   1: NTLMSSP_NEGOTIATE_VERSION
                   1: NTLMSSP_NEGOTIATE_128    
                   1: NTLMSSP_NEGOTIATE_KEY_EXCH
                   0: NTLMSSP_NEGOTIATE_56    
            DomainNameLen            : 0x0000 (0)
            DomainNameMaxLen         : 0x0000 (0)
            DomainName               : *
                DomainName               : ''
            WorkstationLen           : 0x0000 (0)
            WorkstationMaxLen        : 0x0000 (0)
            Workstation              : *
                Workstation              : ''
            Version: struct ntlmssp_VERSION
                ProductMajorVersion      : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
                ProductMinorVersion      : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
                ProductBuild             : 0x0000 (0)
                Reserved: ARRAY(3)
                    [0]                      : 0x00 (0)
                    [1]                      : 0x00 (0)
                    [2]                      : 0x00 (0)
                NTLMRevisionCurrent      : NTLMSSP_REVISION_W2K3 (15)
    Got challenge flags:
    Got NTLMSSP neg_flags=0x628a8215
      NTLMSSP_NEGOTIATE_UNICODE
      NTLMSSP_REQUEST_TARGET
      NTLMSSP_NEGOTIATE_SIGN
      NTLMSSP_NEGOTIATE_NTLM
      NTLMSSP_NEGOTIATE_ALWAYS_SIGN
      NTLMSSP_TARGET_TYPE_SERVER
      NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
      NTLMSSP_NEGOTIATE_TARGET_INFO
      NTLMSSP_NEGOTIATE_VERSION
      NTLMSSP_NEGOTIATE_128
      NTLMSSP_NEGOTIATE_KEY_EXCH
    NTLMSSP: Set final flags:
    Got NTLMSSP neg_flags=0x62088215
      NTLMSSP_NEGOTIATE_UNICODE
      NTLMSSP_REQUEST_TARGET
      NTLMSSP_NEGOTIATE_SIGN
      NTLMSSP_NEGOTIATE_NTLM
      NTLMSSP_NEGOTIATE_ALWAYS_SIGN
      NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
      NTLMSSP_NEGOTIATE_VERSION
      NTLMSSP_NEGOTIATE_128
      NTLMSSP_NEGOTIATE_KEY_EXCH
    NTLMSSP Sign/Seal - Initialising with flags:
    Got NTLMSSP neg_flags=0x62088215
      NTLMSSP_NEGOTIATE_UNICODE
      NTLMSSP_REQUEST_TARGET
      NTLMSSP_NEGOTIATE_SIGN
      NTLMSSP_NEGOTIATE_NTLM
      NTLMSSP_NEGOTIATE_ALWAYS_SIGN
      NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
      NTLMSSP_NEGOTIATE_VERSION
      NTLMSSP_NEGOTIATE_128
      NTLMSSP_NEGOTIATE_KEY_EXCH
    NTLMSSP Sign/Seal - Initialising with flags:
    Got NTLMSSP neg_flags=0x62088215
      NTLMSSP_NEGOTIATE_UNICODE
      NTLMSSP_REQUEST_TARGET
      NTLMSSP_NEGOTIATE_SIGN
      NTLMSSP_NEGOTIATE_NTLM
      NTLMSSP_NEGOTIATE_ALWAYS_SIGN
      NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
      NTLMSSP_NEGOTIATE_VERSION
      NTLMSSP_NEGOTIATE_128
      NTLMSSP_NEGOTIATE_KEY_EXCH
    Domain=[LAN] OS=[Unix] Server=[Samba 3.6.3-31a.osstech]
     session setup ok
     tconx ok
    num_setup=0, max_setup=0, param_total=30, this_param=30, max_param=8, data_total=0, this_data=0, max_data=65535, param_offset=92, param_pad=2, param_disp=0, data_offset=124, data_pad=2, data_disp=0
    num_setup=0, max_setup=0, param_total=30, this_param=30, max_param=8, data_total=0, this_data=0, max_data=65535, param_offset=92, param_pad=2, param_disp=0, data_offset=124, data_pad=2, data_disp=0
    IPC|IPC$|IPC Service ("My LinkStation")
    Disk|NAS|
    Disk|info|LinkStation Utilities
    Server|LINKSTATION|My LinkStation
    Workgroup|LAN|LINKSTATION
    Workgroup|WORKGROUP|DESKTOP-G4T6061
    Anbei noch ein Bild von der Monitorausgabe
    Zuletzt geändert von Prof.Mobilux; 29.04.2018, 17:49. Grund: Passwort ausge-x-t.
  • svethi
    Lebende Foren Legende
    • 25.08.2015
    • 6292

    #2
    Was ist das denn für ein Uralt Server der nur SMB1 kann? Den solltest Du mal updaten.
    Miniserver; KNX; Vitogate; EnOcean (EnOceanPi); Loxone Air; Caldav-Kalenderanbindung; RaspberryPi und für keine Frickellösung zu schade :-)

    Kommentar


    • Prof.Mobilux
      Prof.Mobilux kommentierte
      Kommentar bearbeiten
      Die Meldung kommt immer. Hat nix damit zu tun, dass der Server nur SMB1 kann. er sagt nur, dass Du eine extra Option beim mount angeben musst, *wenn* Du SMB1 nutzen *möchtest*.

    • svethi
      svethi kommentierte
      Kommentar bearbeiten
      Aber der sagt doch das der mount fehlgeschlagen ist. Aber Du wirst schon Recht haben. Hast es ja auch eingerichtet ;-)
  • Iksi
    Lox Guru
    • 27.08.2015
    • 1111

    #3
    Das ist eine Buffalo Linkstation. Und bislang hatte ich da nie Probleme mit.
    Was sind denn die Vorteile einer neuen SMB Version ?

    Hab gerade gesehen dass es ein Update gibt, werde das mal einspielen....
    Zuletzt geändert von Iksi; 29.04.2018, 17:29.

    Kommentar

    • Prof.Mobilux
      Supermoderator
      • 25.08.2015
      • 4626

      #4
      An der SMB1 Meldung liegt es nicht. Update bringt nichts, wir haben seit 1.2.0.3 dort nichts geändert. Oder ist Dein LB noch älter?

      Also er findet bei Dir 2 Shares: "NAS" und "info". Als Benutzer nimmst Du "tv", korrekt? Wenn Dir die Shares nicht angezeigt werden, hat der LoxBerry unter dem Benutzer "tv" dort keine Leseberechtigung (oder besser gesagt: Er glaubt, dort keine Leseberechtigung zu haben). Könntest du das mal prüfen?

      Dann versuche bitte mal über den Dateimanager ins Verzeichnis /system/storage/smb/192.168.0.195 zu gehen. Dort müsstest Du 2 Verzeichnisse sehen: "NAS" und "info". Kannst du dort hineingehen und werden Dir Dateien dort angezeigt?

      Klicke auf die Grafik für eine vergrößerte Ansicht

Name: 29-04-_2018_17-46-51.jpg
Ansichten: 1005
Größe: 109,5 KB
ID: 153440
      Zuletzt geändert von Prof.Mobilux; 29.04.2018, 17:47.
      🇺🇦 Hilfe für die Menschen der Ukraine: https://www.loxforum.com/forum/proje...Cr-die-ukraine


      LoxBerry - Beyond the Limits

      Kommentar

      • Iksi
        Lox Guru
        • 27.08.2015
        • 1111

        #5
        Ich kann im Dateimanager in die Verzeichnisse gehen, aber er sagt die wären leer.
        Eigentlich benötige ich keinen Benutzernamen, den User tv habe ich nur Testweise genutzt, da das ein Account ist den ich für meinen TV anlegen musste.

        Ohne Benutezrnamen ist es aber das gleiche.

        Kommentar

        • Prof.Mobilux
          Supermoderator
          • 25.08.2015
          • 4626

          #6
          Dann hast Du keine Leseberechtigung. Ohne Benutzer bzw. Authentifizierung habe ich nie getestet. Versuche mal bitte "guest" als Benutzer und auch als Passwort (beides kleingeschrieben). LoxBerry neu booten nachdem Du das geändert hast. Dann nochmal per Dateimanager probieren ob Du Dateien siehst.

          Wenn das nicht geht:

          Lege mal bitte auf dem NAS einen Benutzer an und gebe ihm Schreib- und Leseberchtigung auf die Shares. Den gleichen Benutzer nimmst Du dann für den LoxBerry. Wieder neu booten und nochmal probieren.
          🇺🇦 Hilfe für die Menschen der Ukraine: https://www.loxforum.com/forum/proje...Cr-die-ukraine


          LoxBerry - Beyond the Limits

          Kommentar

          • Iksi
            Lox Guru
            • 27.08.2015
            • 1111

            #7
            Also:

            ich habe jetzt meine Linkstation geupdatet, seit dem kommt auf dem Monitor auch keine Meldung mehr bzgl. SMB1 oder dergleichen.

            Ich habe ein Share angelegt und dieses nur für den Nutzer TV freigegeben (Schreib- und lese) --> kein Erfolg
            Ich habe im NAS einen Nutzer loxberry mit gleichem Passwort wie auf dem Loxberry angelegt und auch dort den Server entsprechend eingestellt --> kein Erfolg ....

            Hier nochmal das aktuelle DebuLog

            Code:
            Log Viewer - /system_tmpfs/netshare_debug.log
            ================================================================================
            29.04.2018 23:00:36 TASK STARTED
            netshares.cgi - debugging starts
            ALERT: WARNING! THIS LOGFILE WILL CONTAIN YOUR NETSHARE CREDENTIALS!
            INFO: Output of 'cat /etc/fstab':
            proc /proc proc defaults,nofail 0 0
            PARTUUID=4bd27daf-01 /boot vfat defaults,nofail 0 2
            PARTUUID=4bd27daf-02 / ext4 defaults,noatime,nofail 0 1
            # a swapfile is not a swap partition, no line here
            # use dphys-swapfile swap[on|off] for that
            tmpfs /var/log tmpfs nodev,nosuid,size=50M,mode=755,uid=1,gid=1,nofail 0 0
            tmpfs /var/tmp tmpfs nodev,nosuid,size=25M,nofail 0 0
            tmpfs /tmp tmpfs nodev,nosuid,size=200M,nofail 0 0
            tmpfs /opt/loxberry/log/plugins tmpfs nodev,nosuid,size=25M,mode=755,uid=1001,gid=1001,nofail 0 0
            tmpfs /opt/loxberry/log/system_tmpfs tmpfs nodev,nosuid,size=25M,mode=755,uid=1001,gid=1001,nofail 0 0
            INFO: Output of 'mount':
            /dev/mmcblk0p2 on / type ext4 (rw,noatime,data=ordered)
            devtmpfs on /dev type devtmpfs (rw,relatime,size=470132k,nr_inodes=117533,mode=755)
            sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
            proc on /proc type proc (rw,relatime)
            tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)
            devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
            tmpfs on /run type tmpfs (rw,nosuid,nodev,mode=755)
            tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
            tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
            cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,release_agent=/lib/systemd/systemd-cgroups-agent,name=systemd)
            cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer)
            cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct)
            cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices)
            cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
            cgroup on /sys/fs/cgroup/net_cls type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls)
            cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset)
            systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=25,pgrp=1,timeout=0,minproto=5,maxproto=5,direct)
            mqueue on /dev/mqueue type mqueue (rw,relatime)
            debugfs on /sys/kernel/debug type debugfs (rw,relatime)
            sunrpc on /run/rpc_pipefs type rpc_pipefs (rw,relatime)
            configfs on /sys/kernel/config type configfs (rw,relatime)
            tmpfs on /var/log type tmpfs (rw,nosuid,nodev,relatime,size=51200k,mode=755,uid=1,gid=1)
            tmpfs on /tmp type tmpfs (rw,nosuid,nodev,relatime,size=204800k)
            tmpfs on /opt/loxberry/log/system_tmpfs type tmpfs (rw,nosuid,nodev,relatime,size=25600k,mode=755,uid=1001,gid=1001)
            tmpfs on /var/tmp type tmpfs (rw,nosuid,nodev,relatime,size=25600k)
            tmpfs on /opt/loxberry/log/plugins type tmpfs (rw,nosuid,nodev,relatime,size=25600k,mode=755,uid=1001,gid=1001)
            /dev/mmcblk0p1 on /boot type vfat (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=ascii,shortname=mixed,errors=remount-ro)
            /etc/auto.smb on /media/smb type autofs (rw,relatime,fd=6,pgrp=394,timeout=300,minproto=5,maxproto=5,indirect)
            /etc/auto.smb on /media/smb/192.168.0.195/NAS type autofs (rw,relatime,fd=6,pgrp=394,timeout=300,minproto=5,maxproto=5,offset)
            /etc/auto.smb on /media/smb/192.168.0.195/Test type autofs (rw,relatime,fd=6,pgrp=394,timeout=300,minproto=5,maxproto=5,offset)
            /etc/auto.smb on /media/smb/192.168.0.195/info type autofs (rw,relatime,fd=6,pgrp=394,timeout=300,minproto=5,maxproto=5,offset)
            INFO: Output of 'ls -l /etc/creds':
            lrwxrwxrwx 1 root root 38 Apr 1 21:25 /etc/creds -> /opt/loxberry/system/samba/credentials
            INFO: Output of 'ls -l /opt/loxberry/system/samba/credentials':
            total 4
            -rw-r--r-- 1 loxberry loxberry 57 Apr 29 22:59 192.168.0.195
            OK: Server: 192.168.0.195
            INFO: Type: smb
            INFO: PATH: /opt/loxberry/system/storage/smb/192.168.0.195
            INFO: Output of 'cat /opt/loxberry/system/samba/credentials/192.168.0.195':
            uid=1001
            gid=1001
            username=loxberry
            password=123
            INFO: Output of '/etc/auto.smb 192.168.0.195'
            -fstype=cifs,uid=$UID,gid=$GID,credentials=/etc/creds/192.168.0.195 \
            "/info" "://192.168.0.195/info" \
            "/NAS" "://192.168.0.195/NAS" \
            "/Test" "://192.168.0.195/Test"
            INFO: Output of 'smbclient -A /opt/loxberry/system/samba/credentials/192.168.0.195 -gL 192.168.0.195 --debuglevel=10':
            INFO: Current debug levels:
            all: 10
            tdb: 10
            printdrivers: 10
            lanman: 10
            smb: 10
            rpc_parse: 10
            rpc_srv: 10
            rpc_cli: 10
            passdb: 10
            sam: 10
            auth: 10
            winbind: 10
            vfs: 10
            idmap: 10
            quota: 10
            acls: 10
            locking: 10
            msdfs: 10
            dmapi: 10
            registry: 10
            scavenger: 10
            dns: 10
            ldb: 10
            tevent: 10
            lp_load_ex: refreshing parameters
            Initialising global parameters
            rlimit_max: increasing rlimit_max (8192) to minimum Windows limit (16384)
            INFO: Current debug levels:
            all: 10
            tdb: 10
            printdrivers: 10
            lanman: 10
            smb: 10
            rpc_parse: 10
            rpc_srv: 10
            rpc_cli: 10
            passdb: 10
            sam: 10
            auth: 10
            winbind: 10
            vfs: 10
            idmap: 10
            quota: 10
            acls: 10
            locking: 10
            msdfs: 10
            dmapi: 10
            registry: 10
            scavenger: 10
            dns: 10
            ldb: 10
            tevent: 10
            Processing section "[global]"
            doing parameter workgroup = WORKGROUP
            doing parameter dns proxy = no
            doing parameter allow insecure wide links = yes
            doing parameter client max protocol = SMB3
            doing parameter log file = /var/log/samba/log.%m
            doing parameter max log size = 1000
            doing parameter panic action = /usr/share/samba/panic-action %d
            doing parameter server role = standalone server
            doing parameter passdb backend = tdbsam
            doing parameter obey pam restrictions = yes
            doing parameter unix password sync = no
            doing parameter passwd program = /usr/bin/passwd %u
            doing parameter passwd chat = *Enter\snew\s*\spassword:* %n\n *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* .
            doing parameter pam password change = yes
            doing parameter map to guest = bad user
            doing parameter usershare allow guests = no
            pm_process() returned Yes
            lp_servicenumber: couldn't find homes
            added interface eth0 ip=192.168.0.102 bcast=192.168.0.255 netmask=255.255.255.0
            Netbios name list:-
            my_netbios_names[0]="LOXBERRY"
            Client started (version 4.5.12-Debian).
            Connecting to 192.168.0.195 at port 445
            Socket options:
            SO_KEEPALIVE = 0
            SO_REUSEADDR = 0
            SO_BROADCAST = 0
            TCP_NODELAY = 1
            TCP_KEEPCNT = 9
            TCP_KEEPIDLE = 7200
            TCP_KEEPINTVL = 75
            IPTOS_LOWDELAY = 0
            IPTOS_THROUGHPUT = 0
            SO_REUSEPORT = 0
            SO_SNDBUF = 44800
            SO_RCVBUF = 341760
            SO_SNDLOWAT = 1
            SO_RCVLOWAT = 1
            SO_SNDTIMEO = 0
            SO_RCVTIMEO = 0
            TCP_QUICKACK = 1
            TCP_DEFER_ACCEPT = 0
            session request ok
            Doing spnego session setup (blob length=42)
            got OID=1.3.6.1.4.1.311.2.2.10
            got principal=NONE
            GENSEC backend 'gssapi_spnego' registered
            GENSEC backend 'gssapi_krb5' registered
            GENSEC backend 'gssapi_krb5_sasl' registered
            GENSEC backend 'spnego' registered
            GENSEC backend 'schannel' registered
            GENSEC backend 'naclrpc_as_system' registered
            GENSEC backend 'sasl-EXTERNAL' registered
            GENSEC backend 'ntlmssp' registered
            GENSEC backend 'ntlmssp_resume_ccache' registered
            GENSEC backend 'http_basic' registered
            GENSEC backend 'http_ntlm' registered
            GENSEC backend 'krb5' registered
            GENSEC backend 'fake_gssapi_krb5' registered
            Starting GENSEC mechanism spnego
            Starting GENSEC submechanism ntlmssp
            negotiate: struct NEGOTIATE_MESSAGE
            Signature : 'NTLMSSP'
            MessageType : NtLmNegotiate (1)
            NegotiateFlags : 0x62088215 (1644724757)
            1: NTLMSSP_NEGOTIATE_UNICODE
            0: NTLMSSP_NEGOTIATE_OEM
            1: NTLMSSP_REQUEST_TARGET
            1: NTLMSSP_NEGOTIATE_SIGN
            0: NTLMSSP_NEGOTIATE_SEAL
            0: NTLMSSP_NEGOTIATE_DATAGRAM
            0: NTLMSSP_NEGOTIATE_LM_KEY
            0: NTLMSSP_NEGOTIATE_NETWARE
            1: NTLMSSP_NEGOTIATE_NTLM
            0: NTLMSSP_NEGOTIATE_NT_ONLY
            0: NTLMSSP_ANONYMOUS
            0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
            0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
            0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
            1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
            0: NTLMSSP_TARGET_TYPE_DOMAIN
            0: NTLMSSP_TARGET_TYPE_SERVER
            0: NTLMSSP_TARGET_TYPE_SHARE
            1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
            0: NTLMSSP_NEGOTIATE_IDENTIFY
            0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
            0: NTLMSSP_NEGOTIATE_TARGET_INFO
            1: NTLMSSP_NEGOTIATE_VERSION
            1: NTLMSSP_NEGOTIATE_128
            1: NTLMSSP_NEGOTIATE_KEY_EXCH
            0: NTLMSSP_NEGOTIATE_56
            DomainNameLen : 0x0000 (0)
            DomainNameMaxLen : 0x0000 (0)
            DomainName : *
            DomainName : ''
            WorkstationLen : 0x0000 (0)
            WorkstationMaxLen : 0x0000 (0)
            Workstation : *
            Workstation : ''
            Version: struct ntlmssp_VERSION
            ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
            ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
            ProductBuild : 0x0000 (0)
            Reserved: ARRAY(3)
            [0] : 0x00 (0)
            [1] : 0x00 (0)
            [2] : 0x00 (0)
            NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
            Got challenge flags:
            Got NTLMSSP neg_flags=0x628a8215
            NTLMSSP_NEGOTIATE_UNICODE
            NTLMSSP_REQUEST_TARGET
            NTLMSSP_NEGOTIATE_SIGN
            NTLMSSP_NEGOTIATE_NTLM
            NTLMSSP_NEGOTIATE_ALWAYS_SIGN
            NTLMSSP_TARGET_TYPE_SERVER
            NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
            NTLMSSP_NEGOTIATE_TARGET_INFO
            NTLMSSP_NEGOTIATE_VERSION
            NTLMSSP_NEGOTIATE_128
            NTLMSSP_NEGOTIATE_KEY_EXCH
            NTLMSSP: Set final flags:
            Got NTLMSSP neg_flags=0x62088215
            NTLMSSP_NEGOTIATE_UNICODE
            NTLMSSP_REQUEST_TARGET
            NTLMSSP_NEGOTIATE_SIGN
            NTLMSSP_NEGOTIATE_NTLM
            NTLMSSP_NEGOTIATE_ALWAYS_SIGN
            NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
            NTLMSSP_NEGOTIATE_VERSION
            NTLMSSP_NEGOTIATE_128
            NTLMSSP_NEGOTIATE_KEY_EXCH
            NTLMSSP Sign/Seal - Initialising with flags:
            Got NTLMSSP neg_flags=0x62088215
            NTLMSSP_NEGOTIATE_UNICODE
            NTLMSSP_REQUEST_TARGET
            NTLMSSP_NEGOTIATE_SIGN
            NTLMSSP_NEGOTIATE_NTLM
            NTLMSSP_NEGOTIATE_ALWAYS_SIGN
            NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
            NTLMSSP_NEGOTIATE_VERSION
            NTLMSSP_NEGOTIATE_128
            NTLMSSP_NEGOTIATE_KEY_EXCH
            NTLMSSP Sign/Seal - Initialising with flags:
            Got NTLMSSP neg_flags=0x62088215
            NTLMSSP_NEGOTIATE_UNICODE
            NTLMSSP_REQUEST_TARGET
            NTLMSSP_NEGOTIATE_SIGN
            NTLMSSP_NEGOTIATE_NTLM
            NTLMSSP_NEGOTIATE_ALWAYS_SIGN
            NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
            NTLMSSP_NEGOTIATE_VERSION
            NTLMSSP_NEGOTIATE_128
            NTLMSSP_NEGOTIATE_KEY_EXCH
            Domain=[LAN] OS=[Unix] Server=[Samba 3.6.3-31a.osstech]
            session setup ok
            tconx ok
            Bind RPC Pipe: host 192.168.0.195 auth_type 0, auth_level 1
            &r: struct ncacn_packet
            rpc_vers : 0x05 (5)
            rpc_vers_minor : 0x00 (0)
            ptype : DCERPC_PKT_BIND (11)
            pfc_flags : 0x03 (3)
            1: DCERPC_PFC_FLAG_FIRST
            1: DCERPC_PFC_FLAG_LAST
            0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
            0: DCERPC_PFC_FLAG_CONC_MPX
            0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
            0: DCERPC_PFC_FLAG_MAYBE
            0: DCERPC_PFC_FLAG_OBJECT_UUID
            drep: ARRAY(4)
            [0] : 0x10 (16)
            [1] : 0x00 (0)
            [2] : 0x00 (0)
            [3] : 0x00 (0)
            frag_length : 0x0048 (72)
            auth_length : 0x0000 (0)
            call_id : 0x00000001 (1)
            u : union dcerpc_payload(case 11)
            bind: struct dcerpc_bind
            max_xmit_frag : 0x10b8 (4280)
            max_recv_frag : 0x10b8 (4280)
            assoc_group_id : 0x00000000 (0)
            num_contexts : 0x01 (1)
            ctx_list: ARRAY(1)
            ctx_list: struct dcerpc_ctx_list
            context_id : 0x0000 (0)
            num_transfer_syntaxes : 0x01 (1)
            abstract_syntax: struct ndr_syntax_id
            uuid : 4b324fc8-1670-01d3-1278-5a47bf6ee188
            if_version : 0x00000003 (3)
            transfer_syntaxes: ARRAY(1)
            transfer_syntaxes: struct ndr_syntax_id
            uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860
            if_version : 0x00000002 (2)
            auth_info : DATA_BLOB length=0
            rpc_api_pipe: host 192.168.0.195
            num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
            rpc_read_send: data_to_read: 52
            r: struct ncacn_packet
            rpc_vers : 0x05 (5)
            rpc_vers_minor : 0x00 (0)
            ptype : DCERPC_PKT_BIND_ACK (12)
            pfc_flags : 0x03 (3)
            1: DCERPC_PFC_FLAG_FIRST
            1: DCERPC_PFC_FLAG_LAST
            0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
            0: DCERPC_PFC_FLAG_CONC_MPX
            0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
            0: DCERPC_PFC_FLAG_MAYBE
            0: DCERPC_PFC_FLAG_OBJECT_UUID
            drep: ARRAY(4)
            [0] : 0x10 (16)
            [1] : 0x00 (0)
            [2] : 0x00 (0)
            [3] : 0x00 (0)
            frag_length : 0x0044 (68)
            auth_length : 0x0000 (0)
            call_id : 0x00000001 (1)
            u : union dcerpc_payload(case 12)
            bind_ack: struct dcerpc_bind_ack
            max_xmit_frag : 0x10b8 (4280)
            max_recv_frag : 0x10b8 (4280)
            assoc_group_id : 0x000053f0 (21488)
            secondary_address_size : 0x000d (13)
            secondary_address : '\PIPE\srvsvc'
            _pad1 : DATA_BLOB length=1
            [0000] 00 .
            num_results : 0x01 (1)
            ctx_list: ARRAY(1)
            ctx_list: struct dcerpc_ack_ctx
            result : DCERPC_BIND_ACK_RESULT_ACCEPTANCE (0)
            reason : union dcerpc_bind_ack_reason(case 0)
            value : DCERPC_BIND_ACK_REASON_NOT_SPECIFIED (0)
            syntax: struct ndr_syntax_id
            uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860
            if_version : 0x00000002 (2)
            auth_info : DATA_BLOB length=0
            rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK
            rpc_api_pipe: host 192.168.0.195 returned 68 bytes.
            check_bind_response: accepted!
            cli_rpc_pipe_open_noauth: opened pipe srvsvc to machine 192.168.0.195 and bound anonymously.
            srvsvc_NetShareEnumAll: struct srvsvc_NetShareEnumAll
            in: struct srvsvc_NetShareEnumAll
            server_unc : *
            server_unc : '192.168.0.195'
            info_ctr : *
            info_ctr: struct srvsvc_NetShareInfoCtr
            level : 0x00000001 (1)
            ctr : union srvsvc_NetShareCtr(case 1)
            ctr1 : *
            ctr1: struct srvsvc_NetShareCtr1
            count : 0x00000000 (0)
            array : NULL
            max_buffer : 0xffffffff (4294967295)
            resume_handle : *
            resume_handle : 0x00000000 (0)
            &r: struct ncacn_packet
            rpc_vers : 0x05 (5)
            rpc_vers_minor : 0x00 (0)
            ptype : DCERPC_PKT_REQUEST (0)
            pfc_flags : 0x03 (3)
            1: DCERPC_PFC_FLAG_FIRST
            1: DCERPC_PFC_FLAG_LAST
            0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
            0: DCERPC_PFC_FLAG_CONC_MPX
            0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
            0: DCERPC_PFC_FLAG_MAYBE
            0: DCERPC_PFC_FLAG_OBJECT_UUID
            drep: ARRAY(4)
            [0] : 0x10 (16)
            [1] : 0x00 (0)
            [2] : 0x00 (0)
            [3] : 0x00 (0)
            frag_length : 0x0018 (24)
            auth_length : 0x0000 (0)
            call_id : 0x00000002 (2)
            u : union dcerpc_payload(case 0)
            request: struct dcerpc_request
            alloc_hint : 0x0000004c (76)
            context_id : 0x0000 (0)
            opnum : 0x000f (15)
            object : union dcerpc_object(case 0)
            empty: struct dcerpc_empty
            _pad : DATA_BLOB length=0
            stub_and_verifier : DATA_BLOB length=0
            rpc_api_pipe: host 192.168.0.195
            num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=100, this_data=100, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
            rpc_read_send: data_to_read: 360
            r: struct ncacn_packet
            rpc_vers : 0x05 (5)
            rpc_vers_minor : 0x00 (0)
            ptype : DCERPC_PKT_RESPONSE (2)
            pfc_flags : 0x03 (3)
            1: DCERPC_PFC_FLAG_FIRST
            1: DCERPC_PFC_FLAG_LAST
            0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
            0: DCERPC_PFC_FLAG_CONC_MPX
            0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
            0: DCERPC_PFC_FLAG_MAYBE
            0: DCERPC_PFC_FLAG_OBJECT_UUID
            drep: ARRAY(4)
            [0] : 0x10 (16)
            [1] : 0x00 (0)
            [2] : 0x00 (0)
            [3] : 0x00 (0)
            frag_length : 0x0178 (376)
            auth_length : 0x0000 (0)
            call_id : 0x00000002 (2)
            u : union dcerpc_payload(case 2)
            response: struct dcerpc_response
            alloc_hint : 0x00000160 (352)
            context_id : 0x0000 (0)
            cancel_count : 0x00 (0)
            _pad : DATA_BLOB length=1
            [0000] 00 .
            stub_and_verifier : DATA_BLOB length=352
            [0000] 01 00 00 00 01 00 00 00 0C 00 02 00 04 00 00 00 ........ ........
            [0010] 10 00 02 00 04 00 00 00 14 00 02 00 00 00 00 00 ........ ........
            [0020] 18 00 02 00 1C 00 02 00 00 00 00 00 20 00 02 00 ........ .... ...
            [0030] 24 00 02 00 00 00 00 00 28 00 02 00 2C 00 02 00 $....... (...,...
            [0040] 03 00 00 80 30 00 02 00 05 00 00 00 00 00 00 00 ....0... ........
            [0050] 05 00 00 00 69 00 6E 00 66 00 6F 00 00 00 00 00 ....i.n. f.o.....
            [0060] 16 00 00 00 00 00 00 00 16 00 00 00 4C 00 69 00 ........ ....L.i.
            [0070] 6E 00 6B 00 53 00 74 00 61 00 74 00 69 00 6F 00 n.k.S.t. a.t.i.o.
            [0080] 6E 00 20 00 55 00 74 00 69 00 6C 00 69 00 74 00 n. .U.t. i.l.i.t.
            [0090] 69 00 65 00 73 00 00 00 04 00 00 00 00 00 00 00 i.e.s... ........
            [00A0] 04 00 00 00 4E 00 41 00 53 00 00 00 01 00 00 00 ....N.A. S.......
            [00B0] 00 00 00 00 01 00 00 00 00 00 00 00 05 00 00 00 ........ ........
            [00C0] 00 00 00 00 05 00 00 00 54 00 65 00 73 00 74 00 ........ T.e.s.t.
            [00D0] 00 00 00 00 05 00 00 00 00 00 00 00 05 00 00 00 ........ ........
            [00E0] 74 00 65 00 73 00 74 00 00 00 00 00 05 00 00 00 t.e.s.t. ........
            [00F0] 00 00 00 00 05 00 00 00 49 00 50 00 43 00 24 00 ........ I.P.C.$.
            [0100] 00 00 00 00 1F 00 00 00 00 00 00 00 1F 00 00 00 ........ ........
            [0110] 49 00 50 00 43 00 20 00 53 00 65 00 72 00 76 00 I.P.C. . S.e.r.v.
            [0120] 69 00 63 00 65 00 20 00 28 00 22 00 4D 00 79 00 i.c.e. . (.".M.y.
            [0130] 20 00 4C 00 69 00 6E 00 6B 00 53 00 74 00 61 00 .L.i.n. k.S.t.a.
            [0140] 74 00 69 00 6F 00 6E 00 22 00 29 00 00 00 00 00 t.i.o.n. ".).....
            [0150] 04 00 00 00 34 00 02 00 00 00 00 00 00 00 00 00 ....4... ........
            Got pdu len 376, data_len 352
            rpc_api_pipe: got frag len of 376 at offset 0: NT_STATUS_OK
            rpc_api_pipe: host 192.168.0.195 returned 352 bytes.
            srvsvc_NetShareEnumAll: struct srvsvc_NetShareEnumAll
            out: struct srvsvc_NetShareEnumAll
            info_ctr : *
            info_ctr: struct srvsvc_NetShareInfoCtr
            level : 0x00000001 (1)
            ctr : union srvsvc_NetShareCtr(case 1)
            ctr1 : *
            ctr1: struct srvsvc_NetShareCtr1
            count : 0x00000004 (4)
            array : *
            array: ARRAY(4)
            array: struct srvsvc_NetShareInfo1
            name : *
            name : 'info'
            type : STYPE_DISKTREE (0x0)
            comment : *
            comment : 'LinkStation Utilities'
            array: struct srvsvc_NetShareInfo1
            name : *
            name : 'NAS'
            type : STYPE_DISKTREE (0x0)
            comment : *
            comment : ''
            array: struct srvsvc_NetShareInfo1
            name : *
            name : 'Test'
            type : STYPE_DISKTREE (0x0)
            comment : *
            comment : 'test'
            array: struct srvsvc_NetShareInfo1
            name : *
            name : 'IPC$'
            type : STYPE_IPC_HIDDEN (0x80000003)
            comment : *
            comment : 'IPC Service ("My LinkStation")'
            totalentries : *
            totalentries : 0x00000004 (4)
            resume_handle : *
            resume_handle : 0x00000000 (0)
            result : WERR_OK
            Connecting to 192.168.0.195 at port 139
            Socket options:
            SO_KEEPALIVE = 0
            SO_REUSEADDR = 0
            SO_BROADCAST = 0
            TCP_NODELAY = 1
            TCP_KEEPCNT = 9
            TCP_KEEPIDLE = 7200
            TCP_KEEPINTVL = 75
            IPTOS_LOWDELAY = 0
            IPTOS_THROUGHPUT = 0
            SO_REUSEPORT = 0
            SO_SNDBUF = 44800
            SO_RCVBUF = 341760
            SO_SNDLOWAT = 1
            SO_RCVLOWAT = 1
            SO_SNDTIMEO = 0
            SO_RCVTIMEO = 0
            TCP_QUICKACK = 1
            TCP_DEFER_ACCEPT = 0
            session request ok
            Doing spnego session setup (blob length=42)
            got OID=1.3.6.1.4.1.311.2.2.10
            got principal=NONE
            Starting GENSEC mechanism spnego
            Starting GENSEC submechanism ntlmssp
            negotiate: struct NEGOTIATE_MESSAGE
            Signature : 'NTLMSSP'
            MessageType : NtLmNegotiate (1)
            NegotiateFlags : 0x62088215 (1644724757)
            1: NTLMSSP_NEGOTIATE_UNICODE
            0: NTLMSSP_NEGOTIATE_OEM
            1: NTLMSSP_REQUEST_TARGET
            1: NTLMSSP_NEGOTIATE_SIGN
            0: NTLMSSP_NEGOTIATE_SEAL
            0: NTLMSSP_NEGOTIATE_DATAGRAM
            0: NTLMSSP_NEGOTIATE_LM_KEY
            0: NTLMSSP_NEGOTIATE_NETWARE
            1: NTLMSSP_NEGOTIATE_NTLM
            0: NTLMSSP_NEGOTIATE_NT_ONLY
            0: NTLMSSP_ANONYMOUS
            0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
            0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
            0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
            1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
            0: NTLMSSP_TARGET_TYPE_DOMAIN
            0: NTLMSSP_TARGET_TYPE_SERVER
            0: NTLMSSP_TARGET_TYPE_SHARE
            1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
            0: NTLMSSP_NEGOTIATE_IDENTIFY
            0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
            0: NTLMSSP_NEGOTIATE_TARGET_INFO
            1: NTLMSSP_NEGOTIATE_VERSION
            1: NTLMSSP_NEGOTIATE_128
            1: NTLMSSP_NEGOTIATE_KEY_EXCH
            0: NTLMSSP_NEGOTIATE_56
            DomainNameLen : 0x0000 (0)
            DomainNameMaxLen : 0x0000 (0)
            DomainName : *
            DomainName : ''
            WorkstationLen : 0x0000 (0)
            WorkstationMaxLen : 0x0000 (0)
            Workstation : *
            Workstation : ''
            Version: struct ntlmssp_VERSION
            ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
            ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
            ProductBuild : 0x0000 (0)
            Reserved: ARRAY(3)
            [0] : 0x00 (0)
            [1] : 0x00 (0)
            [2] : 0x00 (0)
            NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
            Got challenge flags:
            Got NTLMSSP neg_flags=0x628a8215
            NTLMSSP_NEGOTIATE_UNICODE
            NTLMSSP_REQUEST_TARGET
            NTLMSSP_NEGOTIATE_SIGN
            NTLMSSP_NEGOTIATE_NTLM
            NTLMSSP_NEGOTIATE_ALWAYS_SIGN
            NTLMSSP_TARGET_TYPE_SERVER
            NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
            NTLMSSP_NEGOTIATE_TARGET_INFO
            NTLMSSP_NEGOTIATE_VERSION
            NTLMSSP_NEGOTIATE_128
            NTLMSSP_NEGOTIATE_KEY_EXCH
            NTLMSSP: Set final flags:
            Got NTLMSSP neg_flags=0x62088215
            NTLMSSP_NEGOTIATE_UNICODE
            NTLMSSP_REQUEST_TARGET
            NTLMSSP_NEGOTIATE_SIGN
            NTLMSSP_NEGOTIATE_NTLM
            NTLMSSP_NEGOTIATE_ALWAYS_SIGN
            NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
            NTLMSSP_NEGOTIATE_VERSION
            NTLMSSP_NEGOTIATE_128
            NTLMSSP_NEGOTIATE_KEY_EXCH
            NTLMSSP Sign/Seal - Initialising with flags:
            Got NTLMSSP neg_flags=0x62088215
            NTLMSSP_NEGOTIATE_UNICODE
            NTLMSSP_REQUEST_TARGET
            NTLMSSP_NEGOTIATE_SIGN
            NTLMSSP_NEGOTIATE_NTLM
            NTLMSSP_NEGOTIATE_ALWAYS_SIGN
            NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
            NTLMSSP_NEGOTIATE_VERSION
            NTLMSSP_NEGOTIATE_128
            NTLMSSP_NEGOTIATE_KEY_EXCH
            NTLMSSP Sign/Seal - Initialising with flags:
            Got NTLMSSP neg_flags=0x62088215
            NTLMSSP_NEGOTIATE_UNICODE
            NTLMSSP_REQUEST_TARGET
            NTLMSSP_NEGOTIATE_SIGN
            NTLMSSP_NEGOTIATE_NTLM
            NTLMSSP_NEGOTIATE_ALWAYS_SIGN
            NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
            NTLMSSP_NEGOTIATE_VERSION
            NTLMSSP_NEGOTIATE_128
            NTLMSSP_NEGOTIATE_KEY_EXCH
            Domain=[LAN] OS=[Unix] Server=[Samba 3.6.3-31a.osstech]
            session setup ok
            tconx ok
            num_setup=0, max_setup=0, param_total=30, this_param=30, max_param=8, data_total=0, this_data=0, max_data=65535, param_offset=92, param_pad=2, param_disp=0, data_offset=124, data_pad=2, data_disp=0
            num_setup=0, max_setup=0, param_total=30, this_param=30, max_param=8, data_total=0, this_data=0, max_data=65535, param_offset=92, param_pad=2, param_disp=0, data_offset=124, data_pad=2, data_disp=0
            Disk|info|LinkStation Utilities
            Disk|NAS|
            Disk|Test|test
            IPC|IPC$|IPC Service ("My LinkStation")
            Server|LINKSTATION|My LinkStation
            Workgroup|LAN|LINKSTATION
            Workgroup|WORKGROUP|LOXBERRY

            Kommentar

            • Iksi
              Lox Guru
              • 27.08.2015
              • 1111

              #8
              Hmm, die Ausgabe auf dem Monitor kommt doch noch, scheinbar nicht immer aber manchmal.
              Dort steht ja was von Return code 112. Wenn ich das jetzt im Netz richtig verstanden habe bedeutet das doch das die letzten 3 Fehler aus folgender Liste zutreffen:
              RETURN CODES mount has the following return codes (the bits can be ORed): 0 success 1 incorrect invocation or permissions 2 system error (out of memory, cannot fork, no more loop devices) 4 internal mount bug 8 user interrupt 16 problems writing or locking /etc/mtab 32 mount failure 64 some mount succeeded Das hört sich für mich doch so an dass er Probleme mit /etc/mtab hat oder nicht ?

              Kommentar

              • Prof.Mobilux
                Supermoderator
                • 25.08.2015
                • 4626

                #9
                Die Shares sind gemountet. Du hast jetzt noch einen weiteren Share Test. Ich verstehe nicht, warum du den Inhalt nicht siehst. Da bin ich aktuell überfragt.
                🇺🇦 Hilfe für die Menschen der Ukraine: https://www.loxforum.com/forum/proje...Cr-die-ukraine


                LoxBerry - Beyond the Limits

                Kommentar

                • Prof.Mobilux
                  Supermoderator
                  • 25.08.2015
                  • 4626

                  #10
                  Von Christian Fenzl kam noch ein Hinweis: Es könnte sein, dass einige Links nicht gehen. Könntest Du uns einen Teamviewer-Zugang zum LoxBerry freischalten? Oder SSH als Portforwarding in Deinem Router einrichten, sodass ich per SSH auf den LoxBerry kommen kann?

                  Wenn das nicht geht mach mal bitte ein paar Screenshots aus dem Dateimanager von folgenden Pfaden:

                  /system/storage
                  /system/storage/smb
                  /system/storage/smb/192.168.0.195
                  /system/storage/smb/192.168.0.195/NAS
                  🇺🇦 Hilfe für die Menschen der Ukraine: https://www.loxforum.com/forum/proje...Cr-die-ukraine


                  LoxBerry - Beyond the Limits

                  Kommentar

                  • Iksi
                    Lox Guru
                    • 27.08.2015
                    • 1111

                    #11
                    Wie schalte ich denn einen TeamViewer Zugang frei?
                    Oder meinst du per TeamViewer auf meinen PC

                    Kommentar

                    • Prof.Mobilux
                      Supermoderator
                      • 25.08.2015
                      • 4626

                      #12
                      Ja das geht nur über deinen PC. Du müsstest mir ein Browserfenster mit dem Loxberry aufmachen und ein Putty Fenster zum Loxberry, wo du schon zu root gewechselt bist. Dann würde ich mich einloggen und könnte schauen wo das Problem liegt.
                      🇺🇦 Hilfe für die Menschen der Ukraine: https://www.loxforum.com/forum/proje...Cr-die-ukraine


                      LoxBerry - Beyond the Limits

                      Kommentar

                      • Iksi
                        Lox Guru
                        • 27.08.2015
                        • 1111

                        #13
                        Ja klar, das wäre kein Thema, müsste nur schauen wann.
                        Evtl. Morgen abend ?

                        Gesendet von meinem BLN-L21 mit Tapatalk

                        Kommentar

                        • Prof.Mobilux
                          Supermoderator
                          • 25.08.2015
                          • 4626

                          #14
                          Ich konnte mir heute Iksi 's LoxBerry per Teamviewer anschauen. Es ist tatsächlich so, dass sein NAS nur SMB1.0 spricht. Bei SMB2.1/3.0 verbindet er sich zwar und man sieht alle Shares, aber man kann nicht mal in die Verzeichnisse wechseln. Es kommt der Fehler "No such File or Directory".

                          Lösung: in /etc/auto.smb habe ich die fehlende Option "proto=1.0" für ihn ergänzt.
                          🇺🇦 Hilfe für die Menschen der Ukraine: https://www.loxforum.com/forum/proje...Cr-die-ukraine


                          LoxBerry - Beyond the Limits

                          Kommentar

                          • Iksi
                            Lox Guru
                            • 27.08.2015
                            • 1111

                            #15
                            Super, danke :-)

                            Gesendet von meinem BLN-L21 mit Tapatalk

                            Kommentar

                            Lädt...