[Freeipa-users] IPA ERROR: non-public: TypeError -- ipa trust-add internal server error

David Fox paw at 4gotten.me
Wed Jul 1 13:37:44 UTC 2015


I am encountering issues trying to integrate FreeIPA with AD, on *nix 
promp I get "internal server rror" and within I receive the following 
message in httpd_errorlog.

[Tue Jun 30 13:16:57.623833 2015] [:error] [pid 1062] ipa: INFO: 
[jsonserver_session] admin at IPA.*redacted*: ping(): SUCCESS
INFO: Current debug levels:
   all: 100
   tdb: 100
   printdrivers: 100
   lanman: 100
   smb: 100
   rpc_parse: 100
   rpc_srv: 100
   rpc_cli: 100
   passdb: 100
   sam: 100
   auth: 100
   winbind: 100
   vfs: 100
   idmap: 100
   quota: 100
   acls: 100
   locking: 100
   msdfs: 100
   dmapi: 100
   registry: 100
   scavenger: 100
   dns: 100
   ldb: 100
pm_process() returned Yes
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'sasl-DIGEST-MD5' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
Using binding ncacn_np:ipaserver01.ipa.*redacted*[,]
s4_tevent: Added timed event "dcerpc_connect_timeout_handler": 
0x7fdde035d720
s4_tevent: Added timed event "composite_trigger": 0x7fdde023db30
s4_tevent: Added timed event "composite_trigger": 0x7fdde0360510
s4_tevent: Running timer event 0x7fdde023db30 "composite_trigger"
s4_tevent: Destroying timer event 0x7fdde0360510 "composite_trigger"
Mapped to DCERPC endpoint \pipe\lsarpc
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 
netmask=255.255.255.0
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 
netmask=255.255.255.0
s4_tevent: Ending timer event 0x7fdde023db30 "composite_trigger"
s4_tevent: Added timed event "connect_multi_timer": 0x7fdde037f530
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde023e850
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde023e850
s4_tevent: Destroying timer event 0x7fdde037f530 "connect_multi_timer"
Socket options:
	SO_KEEPALIVE = 0
	SO_REUSEADDR = 0
	SO_BROADCAST = 0
	TCP_NODELAY = 1
	TCP_KEEPCNT = 9
	TCP_KEEPIDLE = 7200
	TCP_KEEPINTVL = 75
	IPTOS_LOWDELAY = 0
	IPTOS_THROUGHPUT = 0
	SO_REUSEPORT = 0
	SO_SNDBUF = 663750
	SO_RCVBUF = 262006
	SO_SNDLOWAT = 1
	SO_RCVLOWAT = 1
	SO_SNDTIMEO = 0
	SO_RCVTIMEO = 0
	TCP_QUICKACK = 1
	TCP_DEFER_ACCEPT = 0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde023db30
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde023db30 "tevent_req_timedout"
Starting GENSEC mechanism spnego
Starting GENSEC submechanism gssapi_krb5
Ticket in credentials cache for admin at IPA.*redacted* will expire in 
86364 secs
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde024c910
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde024c910 "tevent_req_timedout"
gensec_gssapi: NO credentials were delegated
GSSAPI Connection will be cryptographically sealed
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0403a90
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde0403a90 "tevent_req_timedout"
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde040b200
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde040b200 "tevent_req_timedout"
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, 
data_total=72, this_data=72, max_data=65535, param_offset=84, 
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0414e30
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde0271b80
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde0414e30 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde02712f0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde02712f0
s4_tevent: Destroying timer event 0x7fdde0271b80 
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0270250
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0270250
s4_tevent: Destroying timer event 0x7fdde035d720 
"dcerpc_connect_timeout_handler"
      lsa_OpenPolicy2: struct lsa_OpenPolicy2
         in: struct lsa_OpenPolicy2
             system_name              : *
                 system_name              : ''
             attr                     : *
                 attr: struct lsa_ObjectAttribute
                     len                      : 0x00000000 (0)
                     root_dir                 : NULL
                     object_name              : NULL
                     attributes               : 0x00000000 (0)
                     sec_desc                 : NULL
                     sec_qos                  : *
                         sec_qos: struct lsa_QosInfo
                             len                      : 0x00000000 (0)
                             impersonation_level      : 0x0000 (0)
                             context_mode             : 0x00 (0)
                             effective_only           : 0x00 (0)
             access_mask              : 0x02000000 (33554432)
                    0: LSA_POLICY_VIEW_LOCAL_INFORMATION
                    0: LSA_POLICY_VIEW_AUDIT_INFORMATION
                    0: LSA_POLICY_GET_PRIVATE_INFORMATION
                    0: LSA_POLICY_TRUST_ADMIN
                    0: LSA_POLICY_CREATE_ACCOUNT
                    0: LSA_POLICY_CREATE_SECRET
                    0: LSA_POLICY_CREATE_PRIVILEGE
                    0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS
                    0: LSA_POLICY_SET_AUDIT_REQUIREMENTS
                    0: LSA_POLICY_AUDIT_LOG_ADMIN
                    0: LSA_POLICY_SERVER_ADMIN
                    0: LSA_POLICY_LOOKUP_NAMES
                    0: LSA_POLICY_NOTIFICATION
rpc request data:
[0000] 00 00 02 00 01 00 00 00   00 00 00 00 01 00 00 00   ........ 
........
[0010] 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00   ........ 
........
[0020] 00 00 00 00 00 00 00 00   04 00 02 00 00 00 00 00   ........ 
........
[0030] 00 00 00 00 00 00 00 02                            ........
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde02715a0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, 
data_total=80, this_data=80, max_data=4280, param_offset=84, 
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde041fcc0
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde041fcc0 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0272060
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0272060
s4_tevent: Destroying timer event 0x7fdde02715a0 
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde02712f0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde02712f0
      lsa_OpenPolicy2: struct lsa_OpenPolicy2
         out: struct lsa_OpenPolicy2
             handle                   : *
                 handle: struct policy_handle
                     handle_type              : 0x00000000 (0)
                     uuid                     : 
0000000d-0000-0000-9255-bd882a050000
             result                   : NT_STATUS_OK
rpc reply data:
[0000] 00 00 00 00 0D 00 00 00   00 00 00 00 92 55 BD 88   ........ 
.....U..
[0010] 2A 05 00 00 00 00 00 00                            *.......
      lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
         in: struct lsa_QueryInfoPolicy2
             handle                   : *
                 handle: struct policy_handle
                     handle_type              : 0x00000000 (0)
                     uuid                     : 
0000000d-0000-0000-9255-bd882a050000
             level                    : LSA_POLICY_INFO_DNS (12)
rpc request data:
[0000] 00 00 00 00 0D 00 00 00   00 00 00 00 92 55 BD 88   ........ 
.....U..
[0010] 2A 05 00 00 0C 00                                 *.....
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde02715a0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, 
data_total=46, this_data=46, max_data=4280, param_offset=84, 
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde042e270
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde042e270 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0272060
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0272060
s4_tevent: Destroying timer event 0x7fdde02715a0 
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde02712f0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde02712f0
      lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
         out: struct lsa_QueryInfoPolicy2
             info                     : *
                 info                     : *
                     info                     : union 
lsa_PolicyInformation(case 12)
                     dns: struct lsa_DnsDomainInfo
                         name: struct lsa_StringLarge
                             length                   : 0x0006 (6)
                             size                     : 0x0008 (8)
                             string                   : *
                                 string                   : 'IPA'
                         dns_domain: struct lsa_StringLarge
                             length                   : 0x001a (26)
                             size                     : 0x001c (28)
                             string                   : *
                                 string                   : 
'ipa.*redacted*'
                         dns_forest: struct lsa_StringLarge
                             length                   : 0x001a (26)
                             size                     : 0x001c (28)
                             string                   : *
                                 string                   : 
'ipa.*redacted*'
                         domain_guid              : 
00000015-373c-115e-f650-6d06416af799
                         sid                      : *
                             sid                      : 
S-1-5-21-291387196-107827446-2583128641
             result                   : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 0C 00 00 00   06 00 08 00 04 00 02 00   ........ 
........
[0010] 1A 00 1C 00 08 00 02 00   1A 00 1C 00 0C 00 02 00   ........ 
........
[0020] 15 00 00 00 3C 37 5E 11   F6 50 6D 06 41 6A F7 99   ....<7^. 
.Pm.Aj..
[0030] 10 00 02 00 04 00 00 00   00 00 00 00 03 00 00 00   ........ 
........
[0040] 49 00 50 00 41 00 00 00   0E 00 00 00 00 00 00 00   I.P.A... 
........
[0050] 0D 00 00 00 69 00 70 00   61 00 2E 00 68 00 73 00   ....i.p. 
a...h
[0060] 61 00 2E 00 63 00 6F 00   2E 00 75 00 6B 00 00 00   a...c.o. 
..u.k...
[0070] 0E 00 00 00 00 00 00 00   0D 00 00 00 69 00 70 00   ....... 
....i.p.
[0080] 61 00 2E 00 68 00 73 00   61 00 2E 00 63 00 6F 00   .
[0090] 2E 00 75 00 6B 00 00 00   04 00 00 00 01 04 00 00   ..u.k... 
........
[00A0] 00 00 00 05 15 00 00 00   3C 37 5E 11 F6 50 6D 06   ........ 
<7^..Pm.
[00B0] 41 6A F7 99 00 00 00 00                            Aj......
      lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
         in: struct lsa_QueryInfoPolicy2
             handle                   : *
                 handle: struct policy_handle
                     handle_type              : 0x00000000 (0)
                     uuid                     : 
0000000d-0000-0000-9255-bd882a050000
             level                    : LSA_POLICY_INFO_ROLE (6)
rpc request data:
[0000] 00 00 00 00 0D 00 00 00   00 00 00 00 92 55 BD 88   ........ 
.....U..
[0010] 2A 05 00 00 06 00                                 *.....
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde02718d0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, 
data_total=46, this_data=46, max_data=4280, param_offset=84, 
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde044add0
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde044add0 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0272390
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0272390
s4_tevent: Destroying timer event 0x7fdde02718d0 
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0271620
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0271620
      lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
         out: struct lsa_QueryInfoPolicy2
             info                     : *
                 info                     : *
                     info                     : union 
lsa_PolicyInformation(case 6)
                     role: struct lsa_ServerRole
                         role                     : LSA_ROLE_PRIMARY (3)
             result                   : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 06 00 00 00   03 00 00 00 00 00 00 00   ........ 
........
lpcfg_load: refreshing parameters from /usr/share/ipa/smb.conf.empty
params.c:pm_process() - Processing configuration file 
"/usr/share/ipa/smb.conf.empty"
Processing section "[global]"
INFO: Current debug levels:
   all: 100
   tdb: 100
   printdrivers: 100
   lanman: 100
   smb: 100
   rpc_parse: 100
   rpc_srv: 100
   rpc_cli: 100
   passdb: 100
   sam: 100
   auth: 100
   winbind: 100
   vfs: 100
   idmap: 100
   quota: 100
   acls: 100
   locking: 100
   msdfs: 100
   dmapi: 100
   registry: 100
   scavenger: 100
   dns: 100
   ldb: 100
pm_process() returned Yes
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 
netmask=255.255.255.0
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 
netmask=255.255.255.0
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 
netmask=255.255.255.0
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 
netmask=255.255.255.0
finddcs: searching for a DC by DNS domain *redacted*
finddcs: looking for SRV records for _ldap._tcp.*redacted*
ads_dns_lookup_srv: 2 records returned in the answer section.
ads_dns_parse_rr_srv: Parsed achdcs002.*redacted* [0, 100, 389]
ads_dns_parse_rr_srv: Parsed achdcs03.*redacted* [0, 100, 389]
Addrs = 192.168.35.10 at 389/achdcs002,192.168.35.19 at 389/achdcs03
finddcs: DNS SRV response 0 at '192.168.35.10'
finddcs: DNS SRV response 1 at '192.168.35.19'
finddcs: performing CLDAP query on 192.168.35.10
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0275670
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde02779a0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde02779a0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde04ea460
s4_tevent: Destroying timer event 0x7fdde0275670 "tevent_req_timedout"
s4_tevent: Destroying timer event 0x7fdde04ea460 "tevent_req_timedout"
      &response->data.nt5_ex: struct NETLOGON_SAM_LOGON_RESPONSE_EX
         command                  : LOGON_SAM_LOGON_RESPONSE_EX (23)
         sbz                      : 0x0000 (0)
         server_type              : 0x000033fd (13309)
                1: NBT_SERVER_PDC
                1: NBT_SERVER_GC
                1: NBT_SERVER_LDAP
                1: NBT_SERVER_DS
                1: NBT_SERVER_KDC
                1: NBT_SERVER_TIMESERV
                1: NBT_SERVER_CLOSEST
                1: NBT_SERVER_WRITABLE
                1: NBT_SERVER_GOOD_TIMESERV
                0: NBT_SERVER_NDNC
                0: NBT_SERVER_SELECT_SECRET_DOMAIN_6
                1: NBT_SERVER_FULL_SECRET_DOMAIN_6
                1: NBT_SERVER_ADS_WEB_SERVICE
                0: NBT_SERVER_HAS_DNS_NAME
                0: NBT_SERVER_IS_DEFAULT_NC
                0: NBT_SERVER_FOREST_ROOT
         domain_uuid              : ac57e335-f22b-483b-9504-d6ebfbee1d94
         forest                   : '*redacted*'
         dns_domain               : '*redacted'
         pdc_dns_name             : 'achdcs002.*redacted*'
         domain_name              : '*redacted*'
         pdc_name                 : 'ACHDCS002'
         user_name                : ''
         server_site              : 'ACH'
         client_site              : 'ACH'
         sockaddr_size            : 0x00 (0)
         sockaddr: struct nbt_sockaddr
             sockaddr_family          : 0x00000000 (0)
             pdc_ip                   : (null)
             remaining                : DATA_BLOB length=0
         next_closest_site        : NULL
         nt_version               : 0x00000005 (5)
                1: NETLOGON_NT_VERSION_1
                0: NETLOGON_NT_VERSION_5
                1: NETLOGON_NT_VERSION_5EX
                0: NETLOGON_NT_VERSION_5EX_WITH_IP
                0: NETLOGON_NT_VERSION_WITH_CLOSEST_SITE
                0: NETLOGON_NT_VERSION_AVOID_NT4EMUL
                0: NETLOGON_NT_VERSION_PDC
                0: NETLOGON_NT_VERSION_IP
                0: NETLOGON_NT_VERSION_LOCAL
                0: NETLOGON_NT_VERSION_GC
         lmnt_token               : 0xffff (65535)
         lm20_token               : 0xffff (65535)
finddcs: Found matching DC 192.168.35.10 with server_type=0x000033fd
lpcfg_load: refreshing parameters from /usr/share/ipa/smb.conf.empty
params.c:pm_process() - Processing configuration file 
"/usr/share/ipa/smb.conf.empty"
Processing section "[global]"
INFO: Current debug levels:
   all: 100
   tdb: 100
   printdrivers: 100
   lanman: 100
   smb: 100
   rpc_parse: 100
   rpc_srv: 100
   rpc_cli: 100
   passdb: 100
   sam: 100
   auth: 100
   winbind: 100
   vfs: 100
   idmap: 100
   quota: 100
   acls: 100
   locking: 100
   msdfs: 100
   dmapi: 100
   registry: 100
   scavenger: 100
   dns: 100
   ldb: 100
pm_process() returned Yes
Using binding ncacn_np:achdcs002.*redacted*.co.uk[,]
s4_tevent: Added timed event "dcerpc_connect_timeout_handler": 
0x7fdde00e0fa0
s4_tevent: Added timed event "composite_trigger": 0x7fdde0277490
s4_tevent: Added timed event "composite_trigger": 0x7fdde00e2b30
s4_tevent: Running timer event 0x7fdde0277490 "composite_trigger"
s4_tevent: Destroying timer event 0x7fdde00e2b30 "composite_trigger"
Mapped to DCERPC endpoint \pipe\lsarpc
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 
netmask=255.255.255.0
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 
netmask=255.255.255.0
s4_tevent: Ending timer event 0x7fdde0277490 "composite_trigger"
s4_tevent: Added timed event "connect_multi_timer": 0x7fdde04cc0a0
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0275b70
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0275b70
s4_tevent: Destroying timer event 0x7fdde04cc0a0 "connect_multi_timer"
Socket options:
	SO_KEEPALIVE = 0
	SO_REUSEADDR = 0
	SO_BROADCAST = 0
	TCP_NODELAY = 1
	TCP_KEEPCNT = 9
	TCP_KEEPIDLE = 7200
	TCP_KEEPINTVL = 75
	IPTOS_LOWDELAY = 0
	IPTOS_THROUGHPUT = 0
	SO_REUSEPORT = 0
	SO_SNDBUF = 23400
	SO_RCVBUF = 87380
	SO_SNDLOWAT = 1
	SO_RCVLOWAT = 1
	SO_SNDTIMEO = 0
	SO_RCVTIMEO = 0
	TCP_QUICKACK = 1
	TCP_DEFER_ACCEPT = 0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0277490
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
s4_tevent: Destroying timer event 0x7fdde0277490 "tevent_req_timedout"
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
      negotiate: struct NEGOTIATE_MESSAGE
         Signature                : 'NTLMSSP'
         MessageType              : NtLmNegotiate (1)
         NegotiateFlags           : 0x60088215 (1611170325)
                1: NTLMSSP_NEGOTIATE_UNICODE
                0: NTLMSSP_NEGOTIATE_OEM
                1: NTLMSSP_REQUEST_TARGET
                1: NTLMSSP_NEGOTIATE_SIGN
                0: NTLMSSP_NEGOTIATE_SEAL
                0: NTLMSSP_NEGOTIATE_DATAGRAM
                0: NTLMSSP_NEGOTIATE_LM_KEY
                0: NTLMSSP_NEGOTIATE_NETWARE
                1: NTLMSSP_NEGOTIATE_NTLM
                0: NTLMSSP_NEGOTIATE_NT_ONLY
                0: NTLMSSP_ANONYMOUS
                0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
                0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
                0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
                1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
                0: NTLMSSP_TARGET_TYPE_DOMAIN
                0: NTLMSSP_TARGET_TYPE_SERVER
                0: NTLMSSP_TARGET_TYPE_SHARE
                1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
                0: NTLMSSP_NEGOTIATE_IDENTIFY
                0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
                0: NTLMSSP_NEGOTIATE_TARGET_INFO
                0: NTLMSSP_NEGOTIATE_VERSION
                1: NTLMSSP_NEGOTIATE_128
                1: NTLMSSP_NEGOTIATE_KEY_EXCH
                0: NTLMSSP_NEGOTIATE_56
         DomainNameLen            : 0x0003 (3)
         DomainNameMaxLen         : 0x0003 (3)
         DomainName               : *
             DomainName               : 'IPA'
         WorkstationLen           : 0x0003 (3)
         WorkstationMaxLen        : 0x0003 (3)
         Workstation              : *
             Workstation              : 'IPA'
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0319b00
smb_signing_sign_pdu: sent SMB signature of
[0000] 42 53 52 53 50 59 4C 20                            BSRSPYL
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
s4_tevent: Destroying timer event 0x7fdde0319b00 "tevent_req_timedout"
Got challenge flags:
Got NTLMSSP neg_flags=0x62898215
   NTLMSSP_NEGOTIATE_UNICODE
   NTLMSSP_REQUEST_TARGET
   NTLMSSP_NEGOTIATE_SIGN
   NTLMSSP_NEGOTIATE_NTLM
   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
   NTLMSSP_NEGOTIATE_NTLM2
   NTLMSSP_NEGOTIATE_TARGET_INFO
   NTLMSSP_NEGOTIATE_VERSION
   NTLMSSP_NEGOTIATE_128
   NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x60088215
   NTLMSSP_NEGOTIATE_UNICODE
   NTLMSSP_REQUEST_TARGET
   NTLMSSP_NEGOTIATE_SIGN
   NTLMSSP_NEGOTIATE_NTLM
   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
   NTLMSSP_NEGOTIATE_NTLM2
   NTLMSSP_NEGOTIATE_128
   NTLMSSP_NEGOTIATE_KEY_EXCH
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde035fbe0
smb_signing_sign_pdu: sent SMB signature of
[0000] 42 53 52 53 50 59 4C 20                            BSRSPYL
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
s4_tevent: Destroying timer event 0x7fdde035fbe0 "tevent_req_timedout"
smb_signing_activate: user_session_key
[0000] 91 3E 7A 6D 06 F3 13 71   8C EB 89 6F 4B 51 E1 8E   .>zm...q 
...oKQ..
smb_signing_activate: NULL response_data
smb_signing_md5: sequence number 1
smb_signing_check_pdu: seq 1: got good SMB signature of
[0000] DA 34 34 6B 6A 64 16 04                            .44kjd..
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde037d9a0
smb_signing_md5: sequence number 2
smb_signing_sign_pdu: sent SMB signature of
[0000] 42 7D BB 3D C6 F4 DF 05                            B}.=....
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
smb_signing_md5: sequence number 3
smb_signing_check_pdu: seq 3: got good SMB signature of
[0000] 14 92 54 DC ED A6 81 DA                            ..T.....
s4_tevent: Destroying timer event 0x7fdde037d9a0 "tevent_req_timedout"
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0377dc0
smb_signing_md5: sequence number 4
smb_signing_sign_pdu: sent SMB signature of
[0000] AE 02 E6 A9 31 9D E5 30                            ....1..0
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
smb_signing_md5: sequence number 5
smb_signing_check_pdu: seq 5: got good SMB signature of
[0000] 87 8F 05 02 A0 F0 54 F1                            ......T.
s4_tevent: Destroying timer event 0x7fdde0377dc0 "tevent_req_timedout"
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, 
data_total=72, this_data=72, max_data=65535, param_offset=84, 
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde03e1c80
smb_signing_md5: sequence number 6
smb_signing_sign_pdu: sent SMB signature of
[0000] DA 7B C9 36 72 95 50 B2                            .{.6r.P.
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde03d2da0
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
smb_signing_md5: sequence number 7
smb_signing_check_pdu: seq 7: got good SMB signature of
[0000] EB 01 CC 74 62 CE DB C2                            ...tb...
s4_tevent: Destroying timer event 0x7fdde03e1c80 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fb990
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fb990
s4_tevent: Destroying timer event 0x7fdde03d2da0 
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fabe0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fabe0
s4_tevent: Destroying timer event 0x7fdde00e0fa0 
"dcerpc_connect_timeout_handler"
      lsa_OpenPolicy2: struct lsa_OpenPolicy2
         in: struct lsa_OpenPolicy2
             system_name              : *
                 system_name              : ''
             attr                     : *
                 attr: struct lsa_ObjectAttribute
                     len                      : 0x00000000 (0)
                     root_dir                 : NULL
                     object_name              : NULL
                     attributes               : 0x00000000 (0)
                     sec_desc                 : NULL
                     sec_qos                  : *
                         sec_qos: struct lsa_QosInfo
                             len                      : 0x00000000 (0)
                             impersonation_level      : 0x0000 (0)
                             context_mode             : 0x00 (0)
                             effective_only           : 0x00 (0)
             access_mask              : 0x02000000 (33554432)
                    0: LSA_POLICY_VIEW_LOCAL_INFORMATION
                    0: LSA_POLICY_VIEW_AUDIT_INFORMATION
                    0: LSA_POLICY_GET_PRIVATE_INFORMATION
                    0: LSA_POLICY_TRUST_ADMIN
                    0: LSA_POLICY_CREATE_ACCOUNT
                    0: LSA_POLICY_CREATE_SECRET
                    0: LSA_POLICY_CREATE_PRIVILEGE
                    0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS
                    0: LSA_POLICY_SET_AUDIT_REQUIREMENTS
                    0: LSA_POLICY_AUDIT_LOG_ADMIN
                    0: LSA_POLICY_SERVER_ADMIN
                    0: LSA_POLICY_LOOKUP_NAMES
                    0: LSA_POLICY_NOTIFICATION
rpc request data:
[0000] 00 00 02 00 01 00 00 00   00 00 00 00 01 00 00 00   ........ 
........
[0010] 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00   ........ 
........
[0020] 00 00 00 00 00 00 00 00   04 00 02 00 00 00 00 00   ........ 
........
[0030] 00 00 00 00 00 00 00 02                            ........
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde03f1490
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, 
data_total=80, this_data=80, max_data=4280, param_offset=84, 
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde03f6740
smb_signing_md5: sequence number 8
smb_signing_sign_pdu: sent SMB signature of
[0000] 0E 0D 12 02 06 74 B7 D5                            .....t..
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
smb_signing_md5: sequence number 9
smb_signing_check_pdu: seq 9: got good SMB signature of
[0000] DD 05 A9 E5 80 34 B6 8D                            .....4..
s4_tevent: Destroying timer event 0x7fdde03f6740 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fbe00
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fbe00
s4_tevent: Destroying timer event 0x7fdde03f1490 
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0275e20
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0275e20
      lsa_OpenPolicy2: struct lsa_OpenPolicy2
         out: struct lsa_OpenPolicy2
             handle                   : *
                 handle: struct policy_handle
                     handle_type              : 0x00000000 (0)
                     uuid                     : 
0593f50d-b3c4-4b0a-b3d7-f502da1ea0e6
             result                   : NT_STATUS_OK
rpc reply data:
[0000] 00 00 00 00 0D F5 93 05   C4 B3 0A 4B B3 D7 F5 02   ........ 
...K....
[0010] DA 1E A0 E6 00 00 00 00                            ........
      lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
         in: struct lsa_QueryInfoPolicy2
             handle                   : *
                 handle: struct policy_handle
                     handle_type              : 0x00000000 (0)
                     uuid                     : 
0593f50d-b3c4-4b0a-b3d7-f502da1ea0e6
             level                    : LSA_POLICY_INFO_DNS (12)
rpc request data:
[0000] 00 00 00 00 0D F5 93 05   C4 B3 0A 4B B3 D7 F5 02   ........ 
...K....
[0010] DA 1E A0 E6 0C 00                                 ......
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde040bb30
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, 
data_total=46, this_data=46, max_data=4280, param_offset=84, 
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0416090
smb_signing_md5: sequence number 10
smb_signing_sign_pdu: sent SMB signature of
[0000] 9E DF 1C E9 AA 22 79 E4                            ....."y.
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
smb_signing_md5: sequence number 11
smb_signing_check_pdu: seq 11: got good SMB signature of
[0000] 41 6F A0 71 3B 0F C9 36                            Ao.q;..6
s4_tevent: Destroying timer event 0x7fdde0416090 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fbe00
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fbe00
s4_tevent: Destroying timer event 0x7fdde040bb30 
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0275e20
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0275e20
      lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
         out: struct lsa_QueryInfoPolicy2
             info                     : *
                 info                     : *
                     info                     : union 
lsa_PolicyInformation(case 12)
                     dns: struct lsa_DnsDomainInfo
                         name: struct lsa_StringLarge
                             length                   : 0x0010 (16)
                             size                     : 0x0012 (18)
                             string                   : *
                                 string                   : '*redacted*'
                         dns_domain: struct lsa_StringLarge
                             length                   : 0x0012 (18)
                             size                     : 0x0014 (20)
                             string                   : *
                                 string                   : '*redacted*k'
                         dns_forest: struct lsa_StringLarge
                             length                   : 0x0012 (18)
                             size                     : 0x0014 (20)
                             string                   : *
                                 string                   : '*redacted*'
                         domain_guid              : 
ac57e335-f22b-483b-9504-d6ebfbee1d94
                         sid                      : *
                             sid                      : 
S-1-5-21-2821962302-3963220949-2539344233
             result                   : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 0C 00 00 00   10 00 12 00 04 00 02 00   ........ 
........
[0010] 12 00 14 00 08 00 02 00   12 00 14 00 0C 00 02 00   ........ 
........
[0020] 35 E3 57 AC 2B F2 3B 48   95 04 D6 EB FB EE 1D 94   5.W.+.;H 
........
[0030] 10 00 02 00 09 00 00 00   00 00 00 00 08 00 00 00   ........ 
........
[0040] 48 00 53 00 41 00 47 00   52 00 4F 00 55 00 50 00   .
[0050] 0A 00 00 00 00 00 00 00   09 00 00 00 68 00 73 00   ........ 
....h...
[0060] 61 00 2E 00 63 00 6F 00   2E 00 75 00 6B 00 00 00   a...c.o. 
..u.k...
[0070] 0A 00 00 00 00 00 00 00   09 00 00 00 68 00 73 00   ........ 
....h...
[0080] 61 00 2E 00 63 00 6F 00   2E 00 75 00 6B 00 00 00   a...c.o. 
..u.k...
[0090] 04 00 00 00 01 04 00 00   00 00 00 05 15 00 00 00   ........ 
........
[00A0] 3E BA 33 A8 D5 F3 39 EC   69 51 5B 97 00 00 00 00   >.3...9. 
iQ[.....
      lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
         in: struct lsa_QueryInfoPolicy2
             handle                   : *
                 handle: struct policy_handle
                     handle_type              : 0x00000000 (0)
                     uuid                     : 
0593f50d-b3c4-4b0a-b3d7-f502da1ea0e6
             level                    : LSA_POLICY_INFO_ROLE (6)
rpc request data:
[0000] 00 00 00 00 0D F5 93 05   C4 B3 0A 4B B3 D7 F5 02   ........ 
...K....
[0010] DA 1E A0 E6 06 00                                 ......
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde043f610
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, 
data_total=46, this_data=46, max_data=4280, param_offset=84, 
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0445b20
smb_signing_md5: sequence number 12
smb_signing_sign_pdu: sent SMB signature of
[0000] 76 0D 68 E2 C8 D4 98 19                            v.h.....
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
smb_signing_md5: sequence number 13
smb_signing_check_pdu: seq 13: got good SMB signature of
[0000] 17 FD 16 79 CC 2E F2 C6                            ...y....
s4_tevent: Destroying timer event 0x7fdde0445b20 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fc140
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fc140
s4_tevent: Destroying timer event 0x7fdde043f610 
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fb500
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fb500
      lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
         out: struct lsa_QueryInfoPolicy2
             info                     : *
                 info                     : *
                     info                     : union 
lsa_PolicyInformation(case 6)
                     role: struct lsa_ServerRole
                         role                     : LSA_ROLE_PRIMARY (3)
             result                   : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 06 00 00 00   03 00 00 00 00 00 00 00   ........ 
........
      lsa_QueryTrustedDomainInfoByName: struct 
lsa_QueryTrustedDomainInfoByName
         in: struct lsa_QueryTrustedDomainInfoByName
             handle                   : *
                 handle: struct policy_handle
                     handle_type              : 0x00000000 (0)
                     uuid                     : 
0593f50d-b3c4-4b0a-b3d7-f502da1ea0e6
             trusted_domain           : *
                 trusted_domain: struct lsa_String
                     length                   : 0x001a (26)
                     size                     : 0x001a (26)
                     string                   : *
                         string                   : 'ipa.*redacted*'
             level                    : LSA_TRUSTED_DOMAIN_INFO_FULL_INFO 
(8)
rpc request data:
[0000] 00 00 00 00 0D F5 93 05   C4 B3 0A 4B B3 D7 F5 02   ........ 
...K....
[0010] DA 1E A0 E6 1A 00 1A 00   00 00 02 00 0D 00 00 00   ........ 
........
[0020] 00 00 00 00 0D 00 00 00   69 00 70 00 61 00 2E 00   ........ 
i.p.a...
[0030] 68 00 73 00 61 00 2E 00   63 00 6F 00 2E 00 75 00   a... c.o...u.
[0040] 6B 00 08 00                                       k...
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde00ef550
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, 
data_total=92, this_data=92, max_data=4280, param_offset=84, 
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde00ee2f0
smb_signing_md5: sequence number 14
smb_signing_sign_pdu: sent SMB signature of
[0000] B0 93 27 43 EE 4A 37 94                            ..'C.J7.
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 
0x7fdde00f5a60
smb_signing_md5: sequence number 15
smb_signing_check_pdu: seq 15: got good SMB signature of
[0000] 8F F4 5B 5F 27 39 4C 42                            ..[_'9LB
s4_tevent: Destroying timer event 0x7fdde00ee2f0 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde050c440
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde050c440
s4_tevent: Destroying timer event 0x7fdde00ef550 
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde05110e0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde05110e0
      lsa_QueryTrustedDomainInfoByName: struct 
lsa_QueryTrustedDomainInfoByName
         out: struct lsa_QueryTrustedDomainInfoByName
             info                     : *
                 info                     : *
                     info                     : union 
lsa_TrustedDomainInfo(case 8)
                     full_info: struct lsa_TrustDomainInfoFullInfo
                         info_ex: struct lsa_TrustDomainInfoInfoEx
                             domain_name: struct lsa_StringLarge
                                 length                   : 0x001a (26)
                                 size                     : 0x001c (28)
                                 string                   : *
                                     string                   : 
'ipa.*redacted*'
                             netbios_name: struct lsa_StringLarge
                                 length                   : 0x001a (26)
                                 size                     : 0x001c (28)
                                 string                   : *
                                     string                   : 
'ipa.*redacted*'
                             sid                      : NULL
                             trust_direction          : 0x00000003 (3)
                                    1: LSA_TRUST_DIRECTION_INBOUND
                                    1: LSA_TRUST_DIRECTION_OUTBOUND
                             trust_type               : 
LSA_TRUST_TYPE_MIT (3)
                             trust_attributes         : 0x00000000 (0)
                                    0: LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE
                                    0: LSA_TRUST_ATTRIBUTE_UPLEVEL_ONLY
                                    0: 
LSA_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN
                                    0: 
LSA_TRUST_ATTRIBUTE_FOREST_TRANSITIVE
                                    0: 
LSA_TRUST_ATTRIBUTE_CROSS_ORGANIZATION
                                    0: LSA_TRUST_ATTRIBUTE_WITHIN_FOREST
                                    0: 
LSA_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL
                                    0: 
LSA_TRUST_ATTRIBUTE_USES_RC4_ENCRYPTION
                         posix_offset: struct 
lsa_TrustDomainInfoPosixOffset
                             posix_offset             : 0x00000000 (0)
                         auth_info: struct lsa_TrustDomainInfoAuthInfo
                             incoming_count           : 0x00000000 (0)
                             incoming_current_auth_info: NULL
                             incoming_previous_auth_info: NULL
                             outgoing_count           : 0x00000000 (0)
                             outgoing_current_auth_info: NULL
                             outgoing_previous_auth_info: NULL
             result                   : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 08 00 00 00   1A 00 1C 00 04 00 02 00   ........ 
........
[0010] 1A 00 1C 00 08 00 02 00   00 00 00 00 03 00 00 00   ........ 
........
[0020] 03 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00   ........ 
........
[0030] 00 00 00 00 00 00 00 00   00 00 00 00 00 00 00 00   ........ 
........
[0040] 00 00 00 00 0E 00 00 00   00 00 00 00 0D 00 00 00   ........ 
........
[0050] 69 00 70 00 61 00 2E 00   68 00 73 00 61 00 2E 00   i.p.a... h...
[0060] 63 00 6F 00 2E 00 75 00   6B 00 00 00 0E 00 00 00   c.o...u. 
k.......
[0070] 00 00 00 00 0D 00 00 00   69 00 70 00 61 00 2E 00   ........ 
i.p.a...
[0080] 68 00 73 00 61 00 2E 00   63 00 6F 00 2E 00 75 00   ... c.o...u.
[0090] 6B 00 00 00 00 00 00 00                            k.......
[Tue Jun 30 13:17:01.369249 2015] [:error] [pid 1063] ipa: ERROR: 
non-public: TypeError: default/librpc/gen_ndr/py_lsa.c:9436: Expected 
type 'security.dom_sid' for 'py_dom_sid' of type 'NoneType'
[Tue Jun 30 13:17:01.369285 2015] [:error] [pid 1063] Traceback (most 
recent call last):
[Tue Jun 30 13:17:01.369289 2015] [:error] [pid 1063]   File 
"/usr/lib/python2.7/site-packages/ipaserver/rpcserver.py", line 348, in 
wsgi_execute
[Tue Jun 30 13:17:01.369292 2015] [:error] [pid 1063]     result = 
self.Command[name](*args, **options)
[Tue Jun 30 13:17:01.369294 2015] [:error] [pid 1063]   File 
"/usr/lib/python2.7/site-packages/ipalib/frontend.py", line 439, in 
__call__
[Tue Jun 30 13:17:01.369303 2015] [:error] [pid 1063]     ret = 
self.run(*args, **options)
[Tue Jun 30 13:17:01.369306 2015] [:error] [pid 1063]   File 
"/usr/lib/python2.7/site-packages/ipalib/frontend.py", line 754, in run
[Tue Jun 30 13:17:01.369308 2015] [:error] [pid 1063]     return 
self.execute(*args, **options)
[Tue Jun 30 13:17:01.369310 2015] [:error] [pid 1063]   File 
"/usr/lib/python2.7/site-packages/ipalib/plugins/trust.py", line 474, in 
execute
[Tue Jun 30 13:17:01.369313 2015] [:error] [pid 1063]     result = 
self.execute_ad(full_join, *keys, **options)
[Tue Jun 30 13:17:01.369315 2015] [:error] [pid 1063]   File 
"/usr/lib/python2.7/site-packages/ipalib/plugins/trust.py", line 709, in 
execute_ad
[Tue Jun 30 13:17:01.369318 2015] [:error] [pid 1063]     
self.realm_passwd
[Tue Jun 30 13:17:01.369320 2015] [:error] [pid 1063]   File 
"/usr/lib/python2.7/site-packages/ipaserver/dcerpc.py", line 1222, in 
join_ad_full_credentials
[Tue Jun 30 13:17:01.369323 2015] [:error] [pid 1063]     
self.remote_domain.establish_trust(self.local_domain, trustdom_pass)
[Tue Jun 30 13:17:01.369325 2015] [:error] [pid 1063]   File 
"/usr/lib/python2.7/site-packages/ipaserver/dcerpc.py", line 963, in 
establish_trust
[Tue Jun 30 13:17:01.369327 2015] [:error] [pid 1063]     
self._pipe.DeleteTrustedDomain(self._policy_handle, res.info_ex.sid)
[Tue Jun 30 13:17:01.369330 2015] [:error] [pid 1063] TypeError: 
default/librpc/gen_ndr/py_lsa.c:9436: Expected type 'security.dom_sid' 
for 'py_dom_sid' of type 'NoneType'
[Tue Jun 30 13:17:01.369648 2015] [:error] [pid 1063] ipa: INFO: 
[jsonserver_session] admin at IPA.*redacted*: trust_add(u'*redacted*', 
trust_type=u'ad', realm_admin=u'*redacted*', realm_passwd=u'********', 
all=False, raw=False, version=u'2.112'): TypeError


These are whole logs with "log level = 100" set in smb.conf.empty. Log 
files were emptied before the above command was ran. If there is any 
other information required please let me know.

Software versions:
Fedora 22: 4.1.4
Fedora 22: 4.2 Alpha 1

Oracle Linux 7.1 64bit: without DNS
ipa-server.x86_64 - 4.1.0-18.0.1-el17_1.3
ipa-server-trust-ad.x86_64 - 4.1.0-18.0.1-el17_1.3

CentOS 7.1 64bit: With DNS
ipa-server.x86_64 - 4.1.0-18-el7.centos.3
ipa-server-trust-ad.x86_64 - 4.1.0-18-el7.centos.3


Regards,
David




More information about the Freeipa-users mailing list