Hallo zusammen,
auf einer Test-7.1 bekomme ich (die hier schon öfter erwähnte) Fehlermeldung bei Anlegen/Abfragen von Quotas.
Wie ist da derzeit der Stand?
Ich habe eine komplett neue 7.1 aufgesetzt und bekomme den obigen Fehler. Sudoers habe ich probiert - dann funktioniert die Schulkonsole nicht mehr, der Fehler in Sophomorix bleibt gleich.
Hier mal der problematische Befehl (mit höherem Debuglevel) /usr/bin/smbcquotas -mNT1 --debuglevel=20 -U administrator%'***' -S UQLIM:thomas:2102184960/2627731456 //server/default-school
. Am Ende meckert er über ein fehlerhaftes Domänen-Logon. Aber das ist eine frisch installierte 7.1:
INFO: Current debug levels:
all: 20
tdb: 20
printdrivers: 20
lanman: 20
smb: 20
rpc_parse: 20
rpc_srv: 20
rpc_cli: 20
passdb: 20
sam: 20
auth: 20
winbind: 20
vfs: 20
idmap: 20
quota: 20
acls: 20
locking: 20
msdfs: 20
dmapi: 20
registry: 20
scavenger: 20
dns: 20
ldb: 20
tevent: 20
auth_audit: 20
auth_json_audit: 20
kerberos: 20
drs_repl: 20
lp_load_ex: refreshing parameters
Initialising global parameters
rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
INFO: Current debug levels:
all: 20
tdb: 20
printdrivers: 20
lanman: 20
smb: 20
rpc_parse: 20
rpc_srv: 20
rpc_cli: 20
passdb: 20
sam: 20
auth: 20
winbind: 20
vfs: 20
idmap: 20
quota: 20
acls: 20
locking: 20
msdfs: 20
dmapi: 20
registry: 20
scavenger: 20
dns: 20
ldb: 20
tevent: 20
auth_audit: 20
auth_json_audit: 20
kerberos: 20
drs_repl: 20
Processing section "[global]"
doing parameter workgroup = TEAM
doing parameter realm = TEAM.LINUXMUSTER.LAN
doing parameter netbios name = SERVER
doing parameter server role = active directory domain controller
doing parameter dns forwarder = 10.0.0.254
doing parameter registry shares = yes
doing parameter host msdfs = yes
doing parameter tls enabled = yes
doing parameter tls keyfile = /etc/linuxmuster/ssl/server.key.pem
doing parameter tls certfile = /etc/linuxmuster/ssl/server.cert.pem
doing parameter tls cafile = /etc/linuxmuster/ssl/cacert.pem
doing parameter tls verify peer = ca_and_name
doing parameter ldap server require strong auth = no
doing parameter rpc_server:spoolss = external
doing parameter rpc_daemon:spoolssd = fork
doing parameter spoolss:architecture = Windows x64
doing parameter printing = cups
doing parameter printcap name = cups
doing parameter time server = yes
doing parameter ntp signd socket directory = /run/samba/ntp_signd
doing parameter ntlm auth = yes
pm_process() returned Yes
lp_servicenumber: couldn't find homes
added interface ens18 ip=10.0.0.1 bcast=10.0.255.255 netmask=255.255.0.0
Opening cache file at /var/cache/samba/gencache.tdb
Opening cache file at /var/run/samba/gencache_notrans.tdb
Adding cache entry with key=[AD_SITENAME/DOMAIN/TEAM.LINUXMUSTER.LAN] and timeout=[Do Jan 1 01:00:00 1970 CET] (-1661709968 seconds in the past)
Could not get allrecord lock on gencache_notrans.tdb: Locking error
sitename_fetch: No stored sitename for realm 'TEAM.LINUXMUSTER.LAN'
internal_resolve_name: looking up server#20 (sitename (null))
name server#20 found.
remove_duplicate_addrs2: looking for duplicate address/port pairs
Connecting to 10.0.0.1 at port 445
Socket options:
SO_KEEPALIVE = 0
SO_REUSEADDR = 0
SO_BROADCAST = 0
TCP_NODELAY = 1
TCP_KEEPCNT = 9
TCP_KEEPIDLE = 7200
TCP_KEEPINTVL = 75
IPTOS_LOWDELAY = 0
IPTOS_THROUGHPUT = 0
SO_REUSEPORT = 0
SO_SNDBUF = 2626560
SO_RCVBUF = 131072
SO_SNDLOWAT = 1
SO_RCVLOWAT = 1
SO_SNDTIMEO = 0
SO_RCVTIMEO = 0
TCP_QUICKACK = 1
TCP_DEFER_ACCEPT = 0
got OID=1.2.840.48018.1.2.2
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'naclrpc_as_system' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
GENSEC backend 'ntlmssp_resume_ccache' registered
GENSEC backend 'http_basic' registered
GENSEC backend 'http_ntlm' registered
GENSEC backend 'krb5' registered
GENSEC backend 'fake_gssapi_krb5' registered
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
negotiate: struct NEGOTIATE_MESSAGE
Signature : 'NTLMSSP'
MessageType : NtLmNegotiate (1)
NegotiateFlags : 0x62088215 (1644724757)
1: NTLMSSP_NEGOTIATE_UNICODE
0: NTLMSSP_NEGOTIATE_OEM
1: NTLMSSP_REQUEST_TARGET
1: NTLMSSP_NEGOTIATE_SIGN
0: NTLMSSP_NEGOTIATE_SEAL
0: NTLMSSP_NEGOTIATE_DATAGRAM
0: NTLMSSP_NEGOTIATE_LM_KEY
0: NTLMSSP_NEGOTIATE_NETWARE
1: NTLMSSP_NEGOTIATE_NTLM
0: NTLMSSP_NEGOTIATE_NT_ONLY
0: NTLMSSP_ANONYMOUS
0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
0: NTLMSSP_TARGET_TYPE_DOMAIN
0: NTLMSSP_TARGET_TYPE_SERVER
0: NTLMSSP_TARGET_TYPE_SHARE
1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
0: NTLMSSP_NEGOTIATE_IDENTIFY
0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
0: NTLMSSP_NEGOTIATE_TARGET_INFO
1: NTLMSSP_NEGOTIATE_VERSION
1: NTLMSSP_NEGOTIATE_128
1: NTLMSSP_NEGOTIATE_KEY_EXCH
0: NTLMSSP_NEGOTIATE_56
DomainNameLen : 0x0000 (0)
DomainNameMaxLen : 0x0000 (0)
DomainName : *
DomainName : ''
WorkstationLen : 0x0000 (0)
WorkstationMaxLen : 0x0000 (0)
Workstation : *
Workstation : ''
Version: struct ntlmssp_VERSION
ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
ProductBuild : 0x0000 (0)
Reserved: ARRAY(3)
[0] : 0x00 (0)
[1] : 0x00 (0)
[2] : 0x00 (0)
NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
smb_signing_sign_pdu: sent SMB signature of
[0000] 42 53 52 53 50 59 4C 20 BSRSPYL
Got challenge flags:
Got NTLMSSP neg_flags=0x62898215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_DOMAIN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
smb_signing_sign_pdu: sent SMB signature of
[0000] 42 53 52 53 50 59 4C 20 BSRSPYL
SPNEGO login failed: The attempted logon is invalid. This is either due to a bad username or authentication information.
cli_full_connection failed! (NT_STATUS_LOGON_FAILURE)