[Freeipa-users] IPA ERROR: non-public: TypeError -- ipa trust-add internal server error
David Fox
paw at 4gotten.me
Wed Jul 1 13:37:44 UTC 2015
I am encountering issues trying to integrate FreeIPA with AD, on *nix
promp I get "internal server rror" and within I receive the following
message in httpd_errorlog.
[Tue Jun 30 13:16:57.623833 2015] [:error] [pid 1062] ipa: INFO:
[jsonserver_session] admin at IPA.*redacted*: ping(): SUCCESS
INFO: Current debug levels:
all: 100
tdb: 100
printdrivers: 100
lanman: 100
smb: 100
rpc_parse: 100
rpc_srv: 100
rpc_cli: 100
passdb: 100
sam: 100
auth: 100
winbind: 100
vfs: 100
idmap: 100
quota: 100
acls: 100
locking: 100
msdfs: 100
dmapi: 100
registry: 100
scavenger: 100
dns: 100
ldb: 100
pm_process() returned Yes
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'sasl-DIGEST-MD5' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
Using binding ncacn_np:ipaserver01.ipa.*redacted*[,]
s4_tevent: Added timed event "dcerpc_connect_timeout_handler":
0x7fdde035d720
s4_tevent: Added timed event "composite_trigger": 0x7fdde023db30
s4_tevent: Added timed event "composite_trigger": 0x7fdde0360510
s4_tevent: Running timer event 0x7fdde023db30 "composite_trigger"
s4_tevent: Destroying timer event 0x7fdde0360510 "composite_trigger"
Mapped to DCERPC endpoint \pipe\lsarpc
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255
netmask=255.255.255.0
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255
netmask=255.255.255.0
s4_tevent: Ending timer event 0x7fdde023db30 "composite_trigger"
s4_tevent: Added timed event "connect_multi_timer": 0x7fdde037f530
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde023e850
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde023e850
s4_tevent: Destroying timer event 0x7fdde037f530 "connect_multi_timer"
Socket options:
SO_KEEPALIVE = 0
SO_REUSEADDR = 0
SO_BROADCAST = 0
TCP_NODELAY = 1
TCP_KEEPCNT = 9
TCP_KEEPIDLE = 7200
TCP_KEEPINTVL = 75
IPTOS_LOWDELAY = 0
IPTOS_THROUGHPUT = 0
SO_REUSEPORT = 0
SO_SNDBUF = 663750
SO_RCVBUF = 262006
SO_SNDLOWAT = 1
SO_RCVLOWAT = 1
SO_SNDTIMEO = 0
SO_RCVTIMEO = 0
TCP_QUICKACK = 1
TCP_DEFER_ACCEPT = 0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde023db30
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde023db30 "tevent_req_timedout"
Starting GENSEC mechanism spnego
Starting GENSEC submechanism gssapi_krb5
Ticket in credentials cache for admin at IPA.*redacted* will expire in
86364 secs
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde024c910
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde024c910 "tevent_req_timedout"
gensec_gssapi: NO credentials were delegated
GSSAPI Connection will be cryptographically sealed
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0403a90
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde0403a90 "tevent_req_timedout"
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde040b200
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde040b200 "tevent_req_timedout"
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0,
data_total=72, this_data=72, max_data=65535, param_offset=84,
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0414e30
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde0271b80
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde0414e30 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde02712f0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde02712f0
s4_tevent: Destroying timer event 0x7fdde0271b80
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0270250
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0270250
s4_tevent: Destroying timer event 0x7fdde035d720
"dcerpc_connect_timeout_handler"
lsa_OpenPolicy2: struct lsa_OpenPolicy2
in: struct lsa_OpenPolicy2
system_name : *
system_name : ''
attr : *
attr: struct lsa_ObjectAttribute
len : 0x00000000 (0)
root_dir : NULL
object_name : NULL
attributes : 0x00000000 (0)
sec_desc : NULL
sec_qos : *
sec_qos: struct lsa_QosInfo
len : 0x00000000 (0)
impersonation_level : 0x0000 (0)
context_mode : 0x00 (0)
effective_only : 0x00 (0)
access_mask : 0x02000000 (33554432)
0: LSA_POLICY_VIEW_LOCAL_INFORMATION
0: LSA_POLICY_VIEW_AUDIT_INFORMATION
0: LSA_POLICY_GET_PRIVATE_INFORMATION
0: LSA_POLICY_TRUST_ADMIN
0: LSA_POLICY_CREATE_ACCOUNT
0: LSA_POLICY_CREATE_SECRET
0: LSA_POLICY_CREATE_PRIVILEGE
0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS
0: LSA_POLICY_SET_AUDIT_REQUIREMENTS
0: LSA_POLICY_AUDIT_LOG_ADMIN
0: LSA_POLICY_SERVER_ADMIN
0: LSA_POLICY_LOOKUP_NAMES
0: LSA_POLICY_NOTIFICATION
rpc request data:
[0000] 00 00 02 00 01 00 00 00 00 00 00 00 01 00 00 00 ........
........
[0010] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........
........
[0020] 00 00 00 00 00 00 00 00 04 00 02 00 00 00 00 00 ........
........
[0030] 00 00 00 00 00 00 00 02 ........
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde02715a0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0,
data_total=80, this_data=80, max_data=4280, param_offset=84,
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde041fcc0
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde041fcc0 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0272060
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0272060
s4_tevent: Destroying timer event 0x7fdde02715a0
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde02712f0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde02712f0
lsa_OpenPolicy2: struct lsa_OpenPolicy2
out: struct lsa_OpenPolicy2
handle : *
handle: struct policy_handle
handle_type : 0x00000000 (0)
uuid :
0000000d-0000-0000-9255-bd882a050000
result : NT_STATUS_OK
rpc reply data:
[0000] 00 00 00 00 0D 00 00 00 00 00 00 00 92 55 BD 88 ........
.....U..
[0010] 2A 05 00 00 00 00 00 00 *.......
lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
in: struct lsa_QueryInfoPolicy2
handle : *
handle: struct policy_handle
handle_type : 0x00000000 (0)
uuid :
0000000d-0000-0000-9255-bd882a050000
level : LSA_POLICY_INFO_DNS (12)
rpc request data:
[0000] 00 00 00 00 0D 00 00 00 00 00 00 00 92 55 BD 88 ........
.....U..
[0010] 2A 05 00 00 0C 00 *.....
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde02715a0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0,
data_total=46, this_data=46, max_data=4280, param_offset=84,
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde042e270
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde042e270 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0272060
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0272060
s4_tevent: Destroying timer event 0x7fdde02715a0
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde02712f0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde02712f0
lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
out: struct lsa_QueryInfoPolicy2
info : *
info : *
info : union
lsa_PolicyInformation(case 12)
dns: struct lsa_DnsDomainInfo
name: struct lsa_StringLarge
length : 0x0006 (6)
size : 0x0008 (8)
string : *
string : 'IPA'
dns_domain: struct lsa_StringLarge
length : 0x001a (26)
size : 0x001c (28)
string : *
string :
'ipa.*redacted*'
dns_forest: struct lsa_StringLarge
length : 0x001a (26)
size : 0x001c (28)
string : *
string :
'ipa.*redacted*'
domain_guid :
00000015-373c-115e-f650-6d06416af799
sid : *
sid :
S-1-5-21-291387196-107827446-2583128641
result : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 0C 00 00 00 06 00 08 00 04 00 02 00 ........
........
[0010] 1A 00 1C 00 08 00 02 00 1A 00 1C 00 0C 00 02 00 ........
........
[0020] 15 00 00 00 3C 37 5E 11 F6 50 6D 06 41 6A F7 99 ....<7^.
.Pm.Aj..
[0030] 10 00 02 00 04 00 00 00 00 00 00 00 03 00 00 00 ........
........
[0040] 49 00 50 00 41 00 00 00 0E 00 00 00 00 00 00 00 I.P.A...
........
[0050] 0D 00 00 00 69 00 70 00 61 00 2E 00 68 00 73 00 ....i.p.
a...h
[0060] 61 00 2E 00 63 00 6F 00 2E 00 75 00 6B 00 00 00 a...c.o.
..u.k...
[0070] 0E 00 00 00 00 00 00 00 0D 00 00 00 69 00 70 00 .......
....i.p.
[0080] 61 00 2E 00 68 00 73 00 61 00 2E 00 63 00 6F 00 .
[0090] 2E 00 75 00 6B 00 00 00 04 00 00 00 01 04 00 00 ..u.k...
........
[00A0] 00 00 00 05 15 00 00 00 3C 37 5E 11 F6 50 6D 06 ........
<7^..Pm.
[00B0] 41 6A F7 99 00 00 00 00 Aj......
lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
in: struct lsa_QueryInfoPolicy2
handle : *
handle: struct policy_handle
handle_type : 0x00000000 (0)
uuid :
0000000d-0000-0000-9255-bd882a050000
level : LSA_POLICY_INFO_ROLE (6)
rpc request data:
[0000] 00 00 00 00 0D 00 00 00 00 00 00 00 92 55 BD 88 ........
.....U..
[0010] 2A 05 00 00 06 00 *.....
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde02718d0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0,
data_total=46, this_data=46, max_data=4280, param_offset=84,
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde044add0
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde044add0 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0272390
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0272390
s4_tevent: Destroying timer event 0x7fdde02718d0
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0271620
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0271620
lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
out: struct lsa_QueryInfoPolicy2
info : *
info : *
info : union
lsa_PolicyInformation(case 6)
role: struct lsa_ServerRole
role : LSA_ROLE_PRIMARY (3)
result : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 06 00 00 00 03 00 00 00 00 00 00 00 ........
........
lpcfg_load: refreshing parameters from /usr/share/ipa/smb.conf.empty
params.c:pm_process() - Processing configuration file
"/usr/share/ipa/smb.conf.empty"
Processing section "[global]"
INFO: Current debug levels:
all: 100
tdb: 100
printdrivers: 100
lanman: 100
smb: 100
rpc_parse: 100
rpc_srv: 100
rpc_cli: 100
passdb: 100
sam: 100
auth: 100
winbind: 100
vfs: 100
idmap: 100
quota: 100
acls: 100
locking: 100
msdfs: 100
dmapi: 100
registry: 100
scavenger: 100
dns: 100
ldb: 100
pm_process() returned Yes
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255
netmask=255.255.255.0
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255
netmask=255.255.255.0
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255
netmask=255.255.255.0
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255
netmask=255.255.255.0
finddcs: searching for a DC by DNS domain *redacted*
finddcs: looking for SRV records for _ldap._tcp.*redacted*
ads_dns_lookup_srv: 2 records returned in the answer section.
ads_dns_parse_rr_srv: Parsed achdcs002.*redacted* [0, 100, 389]
ads_dns_parse_rr_srv: Parsed achdcs03.*redacted* [0, 100, 389]
Addrs = 192.168.35.10 at 389/achdcs002,192.168.35.19 at 389/achdcs03
finddcs: DNS SRV response 0 at '192.168.35.10'
finddcs: DNS SRV response 1 at '192.168.35.19'
finddcs: performing CLDAP query on 192.168.35.10
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0275670
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde02779a0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde02779a0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde04ea460
s4_tevent: Destroying timer event 0x7fdde0275670 "tevent_req_timedout"
s4_tevent: Destroying timer event 0x7fdde04ea460 "tevent_req_timedout"
&response->data.nt5_ex: struct NETLOGON_SAM_LOGON_RESPONSE_EX
command : LOGON_SAM_LOGON_RESPONSE_EX (23)
sbz : 0x0000 (0)
server_type : 0x000033fd (13309)
1: NBT_SERVER_PDC
1: NBT_SERVER_GC
1: NBT_SERVER_LDAP
1: NBT_SERVER_DS
1: NBT_SERVER_KDC
1: NBT_SERVER_TIMESERV
1: NBT_SERVER_CLOSEST
1: NBT_SERVER_WRITABLE
1: NBT_SERVER_GOOD_TIMESERV
0: NBT_SERVER_NDNC
0: NBT_SERVER_SELECT_SECRET_DOMAIN_6
1: NBT_SERVER_FULL_SECRET_DOMAIN_6
1: NBT_SERVER_ADS_WEB_SERVICE
0: NBT_SERVER_HAS_DNS_NAME
0: NBT_SERVER_IS_DEFAULT_NC
0: NBT_SERVER_FOREST_ROOT
domain_uuid : ac57e335-f22b-483b-9504-d6ebfbee1d94
forest : '*redacted*'
dns_domain : '*redacted'
pdc_dns_name : 'achdcs002.*redacted*'
domain_name : '*redacted*'
pdc_name : 'ACHDCS002'
user_name : ''
server_site : 'ACH'
client_site : 'ACH'
sockaddr_size : 0x00 (0)
sockaddr: struct nbt_sockaddr
sockaddr_family : 0x00000000 (0)
pdc_ip : (null)
remaining : DATA_BLOB length=0
next_closest_site : NULL
nt_version : 0x00000005 (5)
1: NETLOGON_NT_VERSION_1
0: NETLOGON_NT_VERSION_5
1: NETLOGON_NT_VERSION_5EX
0: NETLOGON_NT_VERSION_5EX_WITH_IP
0: NETLOGON_NT_VERSION_WITH_CLOSEST_SITE
0: NETLOGON_NT_VERSION_AVOID_NT4EMUL
0: NETLOGON_NT_VERSION_PDC
0: NETLOGON_NT_VERSION_IP
0: NETLOGON_NT_VERSION_LOCAL
0: NETLOGON_NT_VERSION_GC
lmnt_token : 0xffff (65535)
lm20_token : 0xffff (65535)
finddcs: Found matching DC 192.168.35.10 with server_type=0x000033fd
lpcfg_load: refreshing parameters from /usr/share/ipa/smb.conf.empty
params.c:pm_process() - Processing configuration file
"/usr/share/ipa/smb.conf.empty"
Processing section "[global]"
INFO: Current debug levels:
all: 100
tdb: 100
printdrivers: 100
lanman: 100
smb: 100
rpc_parse: 100
rpc_srv: 100
rpc_cli: 100
passdb: 100
sam: 100
auth: 100
winbind: 100
vfs: 100
idmap: 100
quota: 100
acls: 100
locking: 100
msdfs: 100
dmapi: 100
registry: 100
scavenger: 100
dns: 100
ldb: 100
pm_process() returned Yes
Using binding ncacn_np:achdcs002.*redacted*.co.uk[,]
s4_tevent: Added timed event "dcerpc_connect_timeout_handler":
0x7fdde00e0fa0
s4_tevent: Added timed event "composite_trigger": 0x7fdde0277490
s4_tevent: Added timed event "composite_trigger": 0x7fdde00e2b30
s4_tevent: Running timer event 0x7fdde0277490 "composite_trigger"
s4_tevent: Destroying timer event 0x7fdde00e2b30 "composite_trigger"
Mapped to DCERPC endpoint \pipe\lsarpc
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255
netmask=255.255.255.0
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255
netmask=255.255.255.0
s4_tevent: Ending timer event 0x7fdde0277490 "composite_trigger"
s4_tevent: Added timed event "connect_multi_timer": 0x7fdde04cc0a0
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0275b70
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0275b70
s4_tevent: Destroying timer event 0x7fdde04cc0a0 "connect_multi_timer"
Socket options:
SO_KEEPALIVE = 0
SO_REUSEADDR = 0
SO_BROADCAST = 0
TCP_NODELAY = 1
TCP_KEEPCNT = 9
TCP_KEEPIDLE = 7200
TCP_KEEPINTVL = 75
IPTOS_LOWDELAY = 0
IPTOS_THROUGHPUT = 0
SO_REUSEPORT = 0
SO_SNDBUF = 23400
SO_RCVBUF = 87380
SO_SNDLOWAT = 1
SO_RCVLOWAT = 1
SO_SNDTIMEO = 0
SO_RCVTIMEO = 0
TCP_QUICKACK = 1
TCP_DEFER_ACCEPT = 0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0277490
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
s4_tevent: Destroying timer event 0x7fdde0277490 "tevent_req_timedout"
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
negotiate: struct NEGOTIATE_MESSAGE
Signature : 'NTLMSSP'
MessageType : NtLmNegotiate (1)
NegotiateFlags : 0x60088215 (1611170325)
1: NTLMSSP_NEGOTIATE_UNICODE
0: NTLMSSP_NEGOTIATE_OEM
1: NTLMSSP_REQUEST_TARGET
1: NTLMSSP_NEGOTIATE_SIGN
0: NTLMSSP_NEGOTIATE_SEAL
0: NTLMSSP_NEGOTIATE_DATAGRAM
0: NTLMSSP_NEGOTIATE_LM_KEY
0: NTLMSSP_NEGOTIATE_NETWARE
1: NTLMSSP_NEGOTIATE_NTLM
0: NTLMSSP_NEGOTIATE_NT_ONLY
0: NTLMSSP_ANONYMOUS
0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
0: NTLMSSP_TARGET_TYPE_DOMAIN
0: NTLMSSP_TARGET_TYPE_SERVER
0: NTLMSSP_TARGET_TYPE_SHARE
1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
0: NTLMSSP_NEGOTIATE_IDENTIFY
0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
0: NTLMSSP_NEGOTIATE_TARGET_INFO
0: NTLMSSP_NEGOTIATE_VERSION
1: NTLMSSP_NEGOTIATE_128
1: NTLMSSP_NEGOTIATE_KEY_EXCH
0: NTLMSSP_NEGOTIATE_56
DomainNameLen : 0x0003 (3)
DomainNameMaxLen : 0x0003 (3)
DomainName : *
DomainName : 'IPA'
WorkstationLen : 0x0003 (3)
WorkstationMaxLen : 0x0003 (3)
Workstation : *
Workstation : 'IPA'
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0319b00
smb_signing_sign_pdu: sent SMB signature of
[0000] 42 53 52 53 50 59 4C 20 BSRSPYL
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
s4_tevent: Destroying timer event 0x7fdde0319b00 "tevent_req_timedout"
Got challenge flags:
Got NTLMSSP neg_flags=0x62898215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_NTLM2
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x60088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_NTLM2
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde035fbe0
smb_signing_sign_pdu: sent SMB signature of
[0000] 42 53 52 53 50 59 4C 20 BSRSPYL
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
s4_tevent: Destroying timer event 0x7fdde035fbe0 "tevent_req_timedout"
smb_signing_activate: user_session_key
[0000] 91 3E 7A 6D 06 F3 13 71 8C EB 89 6F 4B 51 E1 8E .>zm...q
...oKQ..
smb_signing_activate: NULL response_data
smb_signing_md5: sequence number 1
smb_signing_check_pdu: seq 1: got good SMB signature of
[0000] DA 34 34 6B 6A 64 16 04 .44kjd..
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde037d9a0
smb_signing_md5: sequence number 2
smb_signing_sign_pdu: sent SMB signature of
[0000] 42 7D BB 3D C6 F4 DF 05 B}.=....
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
smb_signing_md5: sequence number 3
smb_signing_check_pdu: seq 3: got good SMB signature of
[0000] 14 92 54 DC ED A6 81 DA ..T.....
s4_tevent: Destroying timer event 0x7fdde037d9a0 "tevent_req_timedout"
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0377dc0
smb_signing_md5: sequence number 4
smb_signing_sign_pdu: sent SMB signature of
[0000] AE 02 E6 A9 31 9D E5 30 ....1..0
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
smb_signing_md5: sequence number 5
smb_signing_check_pdu: seq 5: got good SMB signature of
[0000] 87 8F 05 02 A0 F0 54 F1 ......T.
s4_tevent: Destroying timer event 0x7fdde0377dc0 "tevent_req_timedout"
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0,
data_total=72, this_data=72, max_data=65535, param_offset=84,
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde03e1c80
smb_signing_md5: sequence number 6
smb_signing_sign_pdu: sent SMB signature of
[0000] DA 7B C9 36 72 95 50 B2 .{.6r.P.
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde03d2da0
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
smb_signing_md5: sequence number 7
smb_signing_check_pdu: seq 7: got good SMB signature of
[0000] EB 01 CC 74 62 CE DB C2 ...tb...
s4_tevent: Destroying timer event 0x7fdde03e1c80 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fb990
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fb990
s4_tevent: Destroying timer event 0x7fdde03d2da0
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fabe0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fabe0
s4_tevent: Destroying timer event 0x7fdde00e0fa0
"dcerpc_connect_timeout_handler"
lsa_OpenPolicy2: struct lsa_OpenPolicy2
in: struct lsa_OpenPolicy2
system_name : *
system_name : ''
attr : *
attr: struct lsa_ObjectAttribute
len : 0x00000000 (0)
root_dir : NULL
object_name : NULL
attributes : 0x00000000 (0)
sec_desc : NULL
sec_qos : *
sec_qos: struct lsa_QosInfo
len : 0x00000000 (0)
impersonation_level : 0x0000 (0)
context_mode : 0x00 (0)
effective_only : 0x00 (0)
access_mask : 0x02000000 (33554432)
0: LSA_POLICY_VIEW_LOCAL_INFORMATION
0: LSA_POLICY_VIEW_AUDIT_INFORMATION
0: LSA_POLICY_GET_PRIVATE_INFORMATION
0: LSA_POLICY_TRUST_ADMIN
0: LSA_POLICY_CREATE_ACCOUNT
0: LSA_POLICY_CREATE_SECRET
0: LSA_POLICY_CREATE_PRIVILEGE
0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS
0: LSA_POLICY_SET_AUDIT_REQUIREMENTS
0: LSA_POLICY_AUDIT_LOG_ADMIN
0: LSA_POLICY_SERVER_ADMIN
0: LSA_POLICY_LOOKUP_NAMES
0: LSA_POLICY_NOTIFICATION
rpc request data:
[0000] 00 00 02 00 01 00 00 00 00 00 00 00 01 00 00 00 ........
........
[0010] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........
........
[0020] 00 00 00 00 00 00 00 00 04 00 02 00 00 00 00 00 ........
........
[0030] 00 00 00 00 00 00 00 02 ........
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde03f1490
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0,
data_total=80, this_data=80, max_data=4280, param_offset=84,
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde03f6740
smb_signing_md5: sequence number 8
smb_signing_sign_pdu: sent SMB signature of
[0000] 0E 0D 12 02 06 74 B7 D5 .....t..
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
smb_signing_md5: sequence number 9
smb_signing_check_pdu: seq 9: got good SMB signature of
[0000] DD 05 A9 E5 80 34 B6 8D .....4..
s4_tevent: Destroying timer event 0x7fdde03f6740 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fbe00
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fbe00
s4_tevent: Destroying timer event 0x7fdde03f1490
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0275e20
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0275e20
lsa_OpenPolicy2: struct lsa_OpenPolicy2
out: struct lsa_OpenPolicy2
handle : *
handle: struct policy_handle
handle_type : 0x00000000 (0)
uuid :
0593f50d-b3c4-4b0a-b3d7-f502da1ea0e6
result : NT_STATUS_OK
rpc reply data:
[0000] 00 00 00 00 0D F5 93 05 C4 B3 0A 4B B3 D7 F5 02 ........
...K....
[0010] DA 1E A0 E6 00 00 00 00 ........
lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
in: struct lsa_QueryInfoPolicy2
handle : *
handle: struct policy_handle
handle_type : 0x00000000 (0)
uuid :
0593f50d-b3c4-4b0a-b3d7-f502da1ea0e6
level : LSA_POLICY_INFO_DNS (12)
rpc request data:
[0000] 00 00 00 00 0D F5 93 05 C4 B3 0A 4B B3 D7 F5 02 ........
...K....
[0010] DA 1E A0 E6 0C 00 ......
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde040bb30
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0,
data_total=46, this_data=46, max_data=4280, param_offset=84,
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0416090
smb_signing_md5: sequence number 10
smb_signing_sign_pdu: sent SMB signature of
[0000] 9E DF 1C E9 AA 22 79 E4 ....."y.
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
smb_signing_md5: sequence number 11
smb_signing_check_pdu: seq 11: got good SMB signature of
[0000] 41 6F A0 71 3B 0F C9 36 Ao.q;..6
s4_tevent: Destroying timer event 0x7fdde0416090 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fbe00
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fbe00
s4_tevent: Destroying timer event 0x7fdde040bb30
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0275e20
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0275e20
lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
out: struct lsa_QueryInfoPolicy2
info : *
info : *
info : union
lsa_PolicyInformation(case 12)
dns: struct lsa_DnsDomainInfo
name: struct lsa_StringLarge
length : 0x0010 (16)
size : 0x0012 (18)
string : *
string : '*redacted*'
dns_domain: struct lsa_StringLarge
length : 0x0012 (18)
size : 0x0014 (20)
string : *
string : '*redacted*k'
dns_forest: struct lsa_StringLarge
length : 0x0012 (18)
size : 0x0014 (20)
string : *
string : '*redacted*'
domain_guid :
ac57e335-f22b-483b-9504-d6ebfbee1d94
sid : *
sid :
S-1-5-21-2821962302-3963220949-2539344233
result : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 0C 00 00 00 10 00 12 00 04 00 02 00 ........
........
[0010] 12 00 14 00 08 00 02 00 12 00 14 00 0C 00 02 00 ........
........
[0020] 35 E3 57 AC 2B F2 3B 48 95 04 D6 EB FB EE 1D 94 5.W.+.;H
........
[0030] 10 00 02 00 09 00 00 00 00 00 00 00 08 00 00 00 ........
........
[0040] 48 00 53 00 41 00 47 00 52 00 4F 00 55 00 50 00 .
[0050] 0A 00 00 00 00 00 00 00 09 00 00 00 68 00 73 00 ........
....h...
[0060] 61 00 2E 00 63 00 6F 00 2E 00 75 00 6B 00 00 00 a...c.o.
..u.k...
[0070] 0A 00 00 00 00 00 00 00 09 00 00 00 68 00 73 00 ........
....h...
[0080] 61 00 2E 00 63 00 6F 00 2E 00 75 00 6B 00 00 00 a...c.o.
..u.k...
[0090] 04 00 00 00 01 04 00 00 00 00 00 05 15 00 00 00 ........
........
[00A0] 3E BA 33 A8 D5 F3 39 EC 69 51 5B 97 00 00 00 00 >.3...9.
iQ[.....
lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
in: struct lsa_QueryInfoPolicy2
handle : *
handle: struct policy_handle
handle_type : 0x00000000 (0)
uuid :
0593f50d-b3c4-4b0a-b3d7-f502da1ea0e6
level : LSA_POLICY_INFO_ROLE (6)
rpc request data:
[0000] 00 00 00 00 0D F5 93 05 C4 B3 0A 4B B3 D7 F5 02 ........
...K....
[0010] DA 1E A0 E6 06 00 ......
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde043f610
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0,
data_total=46, this_data=46, max_data=4280, param_offset=84,
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0445b20
smb_signing_md5: sequence number 12
smb_signing_sign_pdu: sent SMB signature of
[0000] 76 0D 68 E2 C8 D4 98 19 v.h.....
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
smb_signing_md5: sequence number 13
smb_signing_check_pdu: seq 13: got good SMB signature of
[0000] 17 FD 16 79 CC 2E F2 C6 ...y....
s4_tevent: Destroying timer event 0x7fdde0445b20 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fc140
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fc140
s4_tevent: Destroying timer event 0x7fdde043f610
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fb500
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fb500
lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
out: struct lsa_QueryInfoPolicy2
info : *
info : *
info : union
lsa_PolicyInformation(case 6)
role: struct lsa_ServerRole
role : LSA_ROLE_PRIMARY (3)
result : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 06 00 00 00 03 00 00 00 00 00 00 00 ........
........
lsa_QueryTrustedDomainInfoByName: struct
lsa_QueryTrustedDomainInfoByName
in: struct lsa_QueryTrustedDomainInfoByName
handle : *
handle: struct policy_handle
handle_type : 0x00000000 (0)
uuid :
0593f50d-b3c4-4b0a-b3d7-f502da1ea0e6
trusted_domain : *
trusted_domain: struct lsa_String
length : 0x001a (26)
size : 0x001a (26)
string : *
string : 'ipa.*redacted*'
level : LSA_TRUSTED_DOMAIN_INFO_FULL_INFO
(8)
rpc request data:
[0000] 00 00 00 00 0D F5 93 05 C4 B3 0A 4B B3 D7 F5 02 ........
...K....
[0010] DA 1E A0 E6 1A 00 1A 00 00 00 02 00 0D 00 00 00 ........
........
[0020] 00 00 00 00 0D 00 00 00 69 00 70 00 61 00 2E 00 ........
i.p.a...
[0030] 68 00 73 00 61 00 2E 00 63 00 6F 00 2E 00 75 00 a... c.o...u.
[0040] 6B 00 08 00 k...
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde00ef550
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0,
data_total=92, this_data=92, max_data=4280, param_offset=84,
param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde00ee2f0
smb_signing_md5: sequence number 14
smb_signing_sign_pdu: sent SMB signature of
[0000] B0 93 27 43 EE 4A 37 94 ..'C.J7.
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Run immediate event "tevent_queue_immediate_trigger":
0x7fdde00f5a60
smb_signing_md5: sequence number 15
smb_signing_check_pdu: seq 15: got good SMB signature of
[0000] 8F F4 5B 5F 27 39 4C 42 ..[_'9LB
s4_tevent: Destroying timer event 0x7fdde00ee2f0 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde050c440
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde050c440
s4_tevent: Destroying timer event 0x7fdde00ef550
"dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde05110e0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde05110e0
lsa_QueryTrustedDomainInfoByName: struct
lsa_QueryTrustedDomainInfoByName
out: struct lsa_QueryTrustedDomainInfoByName
info : *
info : *
info : union
lsa_TrustedDomainInfo(case 8)
full_info: struct lsa_TrustDomainInfoFullInfo
info_ex: struct lsa_TrustDomainInfoInfoEx
domain_name: struct lsa_StringLarge
length : 0x001a (26)
size : 0x001c (28)
string : *
string :
'ipa.*redacted*'
netbios_name: struct lsa_StringLarge
length : 0x001a (26)
size : 0x001c (28)
string : *
string :
'ipa.*redacted*'
sid : NULL
trust_direction : 0x00000003 (3)
1: LSA_TRUST_DIRECTION_INBOUND
1: LSA_TRUST_DIRECTION_OUTBOUND
trust_type :
LSA_TRUST_TYPE_MIT (3)
trust_attributes : 0x00000000 (0)
0: LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE
0: LSA_TRUST_ATTRIBUTE_UPLEVEL_ONLY
0:
LSA_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN
0:
LSA_TRUST_ATTRIBUTE_FOREST_TRANSITIVE
0:
LSA_TRUST_ATTRIBUTE_CROSS_ORGANIZATION
0: LSA_TRUST_ATTRIBUTE_WITHIN_FOREST
0:
LSA_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL
0:
LSA_TRUST_ATTRIBUTE_USES_RC4_ENCRYPTION
posix_offset: struct
lsa_TrustDomainInfoPosixOffset
posix_offset : 0x00000000 (0)
auth_info: struct lsa_TrustDomainInfoAuthInfo
incoming_count : 0x00000000 (0)
incoming_current_auth_info: NULL
incoming_previous_auth_info: NULL
outgoing_count : 0x00000000 (0)
outgoing_current_auth_info: NULL
outgoing_previous_auth_info: NULL
result : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 08 00 00 00 1A 00 1C 00 04 00 02 00 ........
........
[0010] 1A 00 1C 00 08 00 02 00 00 00 00 00 03 00 00 00 ........
........
[0020] 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........
........
[0030] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........
........
[0040] 00 00 00 00 0E 00 00 00 00 00 00 00 0D 00 00 00 ........
........
[0050] 69 00 70 00 61 00 2E 00 68 00 73 00 61 00 2E 00 i.p.a... h...
[0060] 63 00 6F 00 2E 00 75 00 6B 00 00 00 0E 00 00 00 c.o...u.
k.......
[0070] 00 00 00 00 0D 00 00 00 69 00 70 00 61 00 2E 00 ........
i.p.a...
[0080] 68 00 73 00 61 00 2E 00 63 00 6F 00 2E 00 75 00 ... c.o...u.
[0090] 6B 00 00 00 00 00 00 00 k.......
[Tue Jun 30 13:17:01.369249 2015] [:error] [pid 1063] ipa: ERROR:
non-public: TypeError: default/librpc/gen_ndr/py_lsa.c:9436: Expected
type 'security.dom_sid' for 'py_dom_sid' of type 'NoneType'
[Tue Jun 30 13:17:01.369285 2015] [:error] [pid 1063] Traceback (most
recent call last):
[Tue Jun 30 13:17:01.369289 2015] [:error] [pid 1063] File
"/usr/lib/python2.7/site-packages/ipaserver/rpcserver.py", line 348, in
wsgi_execute
[Tue Jun 30 13:17:01.369292 2015] [:error] [pid 1063] result =
self.Command[name](*args, **options)
[Tue Jun 30 13:17:01.369294 2015] [:error] [pid 1063] File
"/usr/lib/python2.7/site-packages/ipalib/frontend.py", line 439, in
__call__
[Tue Jun 30 13:17:01.369303 2015] [:error] [pid 1063] ret =
self.run(*args, **options)
[Tue Jun 30 13:17:01.369306 2015] [:error] [pid 1063] File
"/usr/lib/python2.7/site-packages/ipalib/frontend.py", line 754, in run
[Tue Jun 30 13:17:01.369308 2015] [:error] [pid 1063] return
self.execute(*args, **options)
[Tue Jun 30 13:17:01.369310 2015] [:error] [pid 1063] File
"/usr/lib/python2.7/site-packages/ipalib/plugins/trust.py", line 474, in
execute
[Tue Jun 30 13:17:01.369313 2015] [:error] [pid 1063] result =
self.execute_ad(full_join, *keys, **options)
[Tue Jun 30 13:17:01.369315 2015] [:error] [pid 1063] File
"/usr/lib/python2.7/site-packages/ipalib/plugins/trust.py", line 709, in
execute_ad
[Tue Jun 30 13:17:01.369318 2015] [:error] [pid 1063]
self.realm_passwd
[Tue Jun 30 13:17:01.369320 2015] [:error] [pid 1063] File
"/usr/lib/python2.7/site-packages/ipaserver/dcerpc.py", line 1222, in
join_ad_full_credentials
[Tue Jun 30 13:17:01.369323 2015] [:error] [pid 1063]
self.remote_domain.establish_trust(self.local_domain, trustdom_pass)
[Tue Jun 30 13:17:01.369325 2015] [:error] [pid 1063] File
"/usr/lib/python2.7/site-packages/ipaserver/dcerpc.py", line 963, in
establish_trust
[Tue Jun 30 13:17:01.369327 2015] [:error] [pid 1063]
self._pipe.DeleteTrustedDomain(self._policy_handle, res.info_ex.sid)
[Tue Jun 30 13:17:01.369330 2015] [:error] [pid 1063] TypeError:
default/librpc/gen_ndr/py_lsa.c:9436: Expected type 'security.dom_sid'
for 'py_dom_sid' of type 'NoneType'
[Tue Jun 30 13:17:01.369648 2015] [:error] [pid 1063] ipa: INFO:
[jsonserver_session] admin at IPA.*redacted*: trust_add(u'*redacted*',
trust_type=u'ad', realm_admin=u'*redacted*', realm_passwd=u'********',
all=False, raw=False, version=u'2.112'): TypeError
These are whole logs with "log level = 100" set in smb.conf.empty. Log
files were emptied before the above command was ran. If there is any
other information required please let me know.
Software versions:
Fedora 22: 4.1.4
Fedora 22: 4.2 Alpha 1
Oracle Linux 7.1 64bit: without DNS
ipa-server.x86_64 - 4.1.0-18.0.1-el17_1.3
ipa-server-trust-ad.x86_64 - 4.1.0-18.0.1-el17_1.3
CentOS 7.1 64bit: With DNS
ipa-server.x86_64 - 4.1.0-18-el7.centos.3
ipa-server-trust-ad.x86_64 - 4.1.0-18-el7.centos.3
Regards,
David
More information about the Freeipa-users
mailing list