[2014/07/15 11:23:48.431405, 5, pid=1932, effective(0, 0), real(0, 0)] ../lib/util/debug.c:331(debug_dump_status) INFO: Current debug levels: all: 100 tdb: 100 printdrivers: 100 lanman: 100 smb: 100 rpc_parse: 100 rpc_srv: 100 rpc_cli: 100 passdb: 100 sam: 100 auth: 100 winbind: 100 vfs: 100 idmap: 100 quota: 100 acls: 100 locking: 100 msdfs: 100 dmapi: 100 registry: 100 [2014/07/15 11:28:35.710502, 4, pid=1932, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:1549(fork_domain_child) child daemon request 20 [2014/07/15 11:28:35.710610, 10, pid=1932, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:440(child_process_request) child_process_request: request fn LIST_TRUSTDOM [2014/07/15 11:28:35.710689, 3, pid=1932, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_misc.c:161(winbindd_dual_list_trusted_domains) [ 1930]: list trusted domains [2014/07/15 11:28:35.710781, 10, pid=1932, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_cache.c:2835(trusted_domains) trusted_domains: [Cached] - doing backend query for info for domain LAN [2014/07/15 11:28:35.710862, 3, pid=1932, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_samr.c:365(sam_trusted_domains) samr: trusted domains [2014/07/15 11:28:35.711105, 4, pid=1932, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_ncacn_np.c:60(make_internal_rpc_pipe_p) Create pipe requested \lsarpc [2014/07/15 11:28:35.711200, 10, pid=1932, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:221(init_pipe_handles) init_pipe_handle_list: created handle list for pipe \lsarpc [2014/07/15 11:28:35.711277, 10, pid=1932, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:238(init_pipe_handles) init_pipe_handle_list: pipe_handles ref count = 1 for pipe \lsarpc [2014/07/15 11:28:35.711388, 4, pid=1932, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_ncacn_np.c:100(make_internal_rpc_pipe_p) Created internal pipe \lsarpc [2014/07/15 11:28:35.711488, 1, pid=1932, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:282(ndr_print_function_debug) lsa_OpenPolicy: struct lsa_OpenPolicy in: struct lsa_OpenPolicy system_name : * system_name : 0x005c (92) attr : * attr: struct lsa_ObjectAttribute len : 0x00000018 (24) root_dir : NULL object_name : NULL attributes : 0x00000000 (0) sec_desc : NULL sec_qos : * sec_qos: struct lsa_QosInfo len : 0x0000000c (12) impersonation_level : 0x0002 (2) context_mode : 0x01 (1) effective_only : 0x00 (0) access_mask : 0x02000000 (33554432) 0: LSA_POLICY_VIEW_LOCAL_INFORMATION 0: LSA_POLICY_VIEW_AUDIT_INFORMATION 0: LSA_POLICY_GET_PRIVATE_INFORMATION 0: LSA_POLICY_TRUST_ADMIN 0: LSA_POLICY_CREATE_ACCOUNT 0: LSA_POLICY_CREATE_SECRET 0: LSA_POLICY_CREATE_PRIVILEGE 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS 0: LSA_POLICY_AUDIT_LOG_ADMIN 0: LSA_POLICY_SERVER_ADMIN 0: LSA_POLICY_LOOKUP_NAMES 0: LSA_POLICY_NOTIFICATION [2014/07/15 11:28:35.711756, 1, pid=1932, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:282(ndr_print_function_debug) lsa_OpenPolicy: struct lsa_OpenPolicy in: struct lsa_OpenPolicy system_name : * system_name : 0x005c (92) attr : * attr: struct lsa_ObjectAttribute len : 0x00000018 (24) root_dir : NULL object_name : NULL attributes : 0x00000000 (0) sec_desc : NULL sec_qos : * sec_qos: struct lsa_QosInfo len : 0x0000000c (12) impersonation_level : 0x0002 (2) context_mode : 0x01 (1) effective_only : 0x00 (0) access_mask : 0x02000000 (33554432) 0: LSA_POLICY_VIEW_LOCAL_INFORMATION 0: LSA_POLICY_VIEW_AUDIT_INFORMATION 0: LSA_POLICY_GET_PRIVATE_INFORMATION 0: LSA_POLICY_TRUST_ADMIN 0: LSA_POLICY_CREATE_ACCOUNT 0: LSA_POLICY_CREATE_SECRET 0: LSA_POLICY_CREATE_PRIVILEGE 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS 0: LSA_POLICY_AUDIT_LOG_ADMIN 0: LSA_POLICY_SERVER_ADMIN 0: LSA_POLICY_LOOKUP_NAMES 0: LSA_POLICY_NOTIFICATION [2014/07/15 11:28:35.713507, 10, pid=1932, effective(0, 0), real(0, 0)] ../libcli/security/access_check.c:58(se_map_generic) se_map_generic(): mapped mask 0xb0000000 to 0x000f0fff [2014/07/15 11:28:35.713643, 4, pid=1932, effective(0, 0), real(0, 0)] ../source3/rpc_server/srv_access_check.c:84(access_check_object) _lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f0fff) but overritten by euid == sec_initial_uid() [2014/07/15 11:28:35.713782, 4, pid=1932, effective(0, 0), real(0, 0)] ../source3/rpc_server/srv_access_check.c:105(access_check_object) _lsa_OpenPolicy2: access GRANTED (requested: 0x000f0fff, granted: 0x000f0fff) [2014/07/15 11:28:35.713925, 6, pid=1932, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:302(create_rpc_handle_internal) Opened policy hnd[1] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 C5 53 93 3A ........ .....S.: [0010] 8C 07 00 00 .... [2014/07/15 11:28:35.714126, 1, pid=1932, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:282(ndr_print_function_debug) lsa_OpenPolicy: struct lsa_OpenPolicy out: struct lsa_OpenPolicy handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 00000005-0000-0000-c553-933a8c070000 result : NT_STATUS_OK [2014/07/15 11:28:35.714482, 1, pid=1932, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:282(ndr_print_function_debug) lsa_OpenPolicy: struct lsa_OpenPolicy out: struct lsa_OpenPolicy handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 00000005-0000-0000-c553-933a8c070000 result : NT_STATUS_OK [2014/07/15 11:28:35.714762, 1, pid=1932, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:282(ndr_print_function_debug) lsa_EnumTrustedDomainsEx: struct lsa_EnumTrustedDomainsEx in: struct lsa_EnumTrustedDomainsEx handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 00000005-0000-0000-c553-933a8c070000 resume_handle : * resume_handle : 0x00000000 (0) max_size : 0xffffffff (4294967295) [2014/07/15 11:28:35.715109, 1, pid=1932, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:282(ndr_print_function_debug) lsa_EnumTrustedDomainsEx: struct lsa_EnumTrustedDomainsEx in: struct lsa_EnumTrustedDomainsEx handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 00000005-0000-0000-c553-933a8c070000 resume_handle : * resume_handle : 0x00000000 (0) max_size : 0xffffffff (4294967295) [2014/07/15 11:28:35.715304, 6, pid=1932, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:337(find_policy_by_hnd_internal) Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 C5 53 93 3A ........ .....S.: [0010] 8C 07 00 00 .... [2014/07/15 11:28:35.715458, 5, pid=1932, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:1249(smbldap_search_ext) smbldap_search_ext: base => [cn=ad,cn=trusts,dc=lan,dc=xxx,dc=com,dc=uy], filter => [(objectClass=ipaNTTrustedDomain)], scope => [2] [2014/07/15 11:28:35.717697, 10, pid=1932, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:595(smb_ldap_setup_conn) smb_ldap_setup_connection: ldapi://%2fvar%2frun%2fslapd-LAN-XXX-COM-UY.socket [2014/07/15 11:28:35.717829, 2, pid=1932, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:794(smbldap_open_connection) smbldap_open_connection: connection opened [2014/07/15 11:28:35.717904, 10, pid=1932, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:954(smbldap_connect_system) ldap_connect_system: Binding to ldap server ldapi://%2fvar%2frun%2fslapd-LAN-XXX-COM-UY.socket as "(null)" [2014/07/15 11:28:35.757701, 3, pid=1932, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:1013(smbldap_connect_system) ldap_connect_system: successful connection to the LDAP server ldap_connect_system: LDAP server does support paged results [2014/07/15 11:28:35.757856, 4, pid=1932, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:1092(smbldap_open) The LDAP server is successfully connected [2014/07/15 11:28:35.760357, 10, pid=1932, effective(0, 0), real(0, 0)] ipa_sam.c:309(get_single_attribute) Attribute [ipaNTTrustPosixOffset] not found. [2014/07/15 11:28:35.760403, 9, pid=1932, effective(0, 0), real(0, 0)] ipa_sam.c:1875(get_uint32_t_from_ldap_msg) Attribute ipaNTTrustPosixOffset not present. [2014/07/15 11:28:35.760433, 10, pid=1932, effective(0, 0), real(0, 0)] ipa_sam.c:309(get_single_attribute) Attribute [ipaNTSupportedEncryptionTypes] not found. [2014/07/15 11:28:35.760459, 9, pid=1932, effective(0, 0), real(0, 0)] ipa_sam.c:1875(get_uint32_t_from_ldap_msg) Attribute ipaNTSupportedEncryptionTypes not present. [2014/07/15 11:28:35.760488, 9, pid=1932, effective(0, 0), real(0, 0)] ipa_sam.c:2011(fill_pdb_trusted_domain) Failed to set forest trust info. [2014/07/15 11:28:35.760514, 5, pid=1932, effective(0, 0), real(0, 0)] ipa_sam.c:2466(ipasam_enum_trusted_domains) ipasam_enum_trusted_domains: got 1 domains [2014/07/15 11:28:35.760542, 1, pid=1932, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:282(ndr_print_function_debug) lsa_EnumTrustedDomainsEx: struct lsa_EnumTrustedDomainsEx out: struct lsa_EnumTrustedDomainsEx resume_handle : * resume_handle : 0xffffffff (4294967295) domains : * domains: struct lsa_DomainListEx count : 0x00000001 (1) domains : * domains: ARRAY(1) domains: struct lsa_TrustDomainInfoInfoEx domain_name: struct lsa_StringLarge length : 0x0014 (20) size : 0x0016 (22) string : * string : 'xxx.com.uy' netbios_name: struct lsa_StringLarge length : 0x0006 (6) size : 0x0008 (8) string : * string : 'XXX' sid : * sid : S-1-5-21-1961021616-2571399029-1586326327 trust_direction : 0x00000003 (3) 1: LSA_TRUST_DIRECTION_INBOUND 1: LSA_TRUST_DIRECTION_OUTBOUND trust_type : LSA_TRUST_TYPE_UPLEVEL (2) trust_attributes : 0x00000008 (8) 0: LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE 0: LSA_TRUST_ATTRIBUTE_UPLEVEL_ONLY 0: LSA_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN 1: LSA_TRUST_ATTRIBUTE_FOREST_TRANSITIVE 0: LSA_TRUST_ATTRIBUTE_CROSS_ORGANIZATION 0: LSA_TRUST_ATTRIBUTE_WITHIN_FOREST 0: LSA_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL 0: LSA_TRUST_ATTRIBUTE_USES_RC4_ENCRYPTION result : NT_STATUS_OK [2014/07/15 11:28:35.761069, 1, pid=1932, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:282(ndr_print_function_debug) lsa_EnumTrustedDomainsEx: struct lsa_EnumTrustedDomainsEx out: struct lsa_EnumTrustedDomainsEx resume_handle : * resume_handle : 0xffffffff (4294967295) domains : * domains: struct lsa_DomainListEx count : 0x00000001 (1) domains : * domains: ARRAY(1) domains: struct lsa_TrustDomainInfoInfoEx domain_name: struct lsa_StringLarge length : 0x0014 (20) size : 0x0016 (22) string : * string : 'xxx.com.uy' netbios_name: struct lsa_StringLarge length : 0x0006 (6) size : 0x0008 (8) string : * string : 'XXX' sid : * sid : S-1-5-21-1961021616-2571399029-1586326327 trust_direction : 0x00000003 (3) 1: LSA_TRUST_DIRECTION_INBOUND 1: LSA_TRUST_DIRECTION_OUTBOUND trust_type : LSA_TRUST_TYPE_UPLEVEL (2) trust_attributes : 0x00000008 (8) 0: LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE 0: LSA_TRUST_ATTRIBUTE_UPLEVEL_ONLY 0: LSA_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN 1: LSA_TRUST_ATTRIBUTE_FOREST_TRANSITIVE 0: LSA_TRUST_ATTRIBUTE_CROSS_ORGANIZATION 0: LSA_TRUST_ATTRIBUTE_WITHIN_FOREST 0: LSA_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL 0: LSA_TRUST_ATTRIBUTE_USES_RC4_ENCRYPTION result : NT_STATUS_OK [2014/07/15 11:28:35.761422, 1, pid=1932, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:282(ndr_print_function_debug) lsa_Close: struct lsa_Close in: struct lsa_Close handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 00000005-0000-0000-c553-933a8c070000 [2014/07/15 11:28:35.761525, 1, pid=1932, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:282(ndr_print_function_debug) lsa_Close: struct lsa_Close in: struct lsa_Close handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 00000005-0000-0000-c553-933a8c070000 [2014/07/15 11:28:35.761624, 6, pid=1932, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:337(find_policy_by_hnd_internal) Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 C5 53 93 3A ........ .....S.: [0010] 8C 07 00 00 .... [2014/07/15 11:28:35.761679, 6, pid=1932, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:337(find_policy_by_hnd_internal) Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 C5 53 93 3A ........ .....S.: [0010] 8C 07 00 00 .... [2014/07/15 11:28:35.761731, 6, pid=1932, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:386(close_policy_hnd) Closed policy [2014/07/15 11:28:35.761759, 1, pid=1932, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:282(ndr_print_function_debug) lsa_Close: struct lsa_Close out: struct lsa_Close handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 00000000-0000-0000-0000-000000000000 result : NT_STATUS_OK [2014/07/15 11:28:35.761867, 1, pid=1932, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:282(ndr_print_function_debug) lsa_Close: struct lsa_Close out: struct lsa_Close handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 00000000-0000-0000-0000-000000000000 result : NT_STATUS_OK [2014/07/15 11:28:35.761972, 10, pid=1932, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:416(close_policy_by_pipe) Deleted handle list for RPC connection \lsarpc [2014/07/15 11:28:35.762012, 4, pid=1932, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:1557(fork_domain_child) Finished processing child request 20 [2014/07/15 11:28:35.762040, 10, pid=1932, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:1573(fork_domain_child) Writing 3554 bytes to parent [2014/07/15 11:28:35.762340, 10, pid=1932, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:1483(fork_domain_child) fork_domain_child: domain LAN no longer in 'startup' mode.