Skip to content

Instantly share code, notes, and snippets.

@prydom
Created December 15, 2014 00:06
Show Gist options
  • Save prydom/b18b7776e1e6f7cf2aac to your computer and use it in GitHub Desktop.
Save prydom/b18b7776e1e6f7cf2aac to your computer and use it in GitHub Desktop.
4.1.13's SAM lookup
[2014/12/14 18:31:10.032596, 3, pid=65150, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:177(auth_check_ntlm_password)
check_ntlm_password: Checking password for unmapped user [JXPRYDE8]\[jxpryde]@[JXPRYDE8] with the new password interface
[2014/12/14 18:31:10.032623, 3, pid=65150, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:180(auth_check_ntlm_password)
check_ntlm_password: mapped user is: [JXPRYDE-ARCH-THINK]\[jxpryde]@[JXPRYDE8]
[2014/12/14 18:31:10.032649, 10, pid=65150, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:189(auth_check_ntlm_password)
check_ntlm_password: auth_context challenge created by random
[2014/12/14 18:31:10.032673, 10, pid=65150, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:191(auth_check_ntlm_password)
challenge is:
[2014/12/14 18:31:10.032699, 5, pid=65150, effective(0, 0), real(0, 0)] ../lib/util/util.c:556(dump_data)
REDATCTED
[2014/12/14 18:31:10.032735, 10, pid=65150, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_sam.c:75(auth_samstrict_auth)
Check auth for: [jxpryde]
[2014/12/14 18:31:10.032763, 8, pid=65150, effective(0, 0), real(0, 0)] ../source3/lib/util.c:1200(is_myname)
is_myname("JXPRYDE-ARCH-THINK") returns 1
[2014/12/14 18:31:10.032824, 4, pid=65150, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx)
push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1
[2014/12/14 18:31:10.032858, 4, pid=65150, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:485(push_conn_ctx)
push_conn_ctx(0) : conn_ctx_stack_ndx = 0
[2014/12/14 18:31:10.032884, 4, pid=65150, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1
[2014/12/14 18:31:10.032910, 5, pid=65150, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug)
Security token: (NULL)
[2014/12/14 18:31:10.032936, 5, pid=65150, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:629(debug_unix_user_token)
UNIX token of user 0
Primary group is 0 and contains 0 supplementary groups
[2014/12/14 18:31:10.033048, 10, pid=65150, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username)
pdb_set_username: setting username jxpryde, was
[2014/12/14 18:31:10.033083, 10, pid=65150, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain)
pdb_set_domain: setting domain JXPRYDE-ARCH-THINK, was
[2014/12/14 18:31:10.033109, 10, pid=65150, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username)
pdb_set_nt_username: setting nt username , was
[2014/12/14 18:31:10.033135, 10, pid=65150, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname)
pdb_set_full_name: setting full name , was
[2014/12/14 18:31:10.033163, 4, pid=65150, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server)
Home server: jxpryde-arch-think
[2014/12/14 18:31:10.033194, 10, pid=65150, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir)
pdb_set_homedir: setting home dir \\jxpryde-arch-think\jxpryde, was
//... SNIP ... about 1000 lines of verbose repetitive logs later relating to UNIX group matchings ...
[2014/12/14 18:31:10.038269, 3, pid=65150, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:226(auth_check_ntlm_password)
check_ntlm_password: sam authentication for user [jxpryde] succeeded
[2014/12/14 18:31:10.038309, 4, pid=65150, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx)
push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1
[2014/12/14 18:31:10.038335, 4, pid=65150, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:485(push_conn_ctx)
push_conn_ctx(0) : conn_ctx_stack_ndx = 0
[2014/12/14 18:31:10.038360, 4, pid=65150, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx)
setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1
[2014/12/14 18:31:10.038383, 5, pid=65150, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug)
Security token: (NULL)
[2014/12/14 18:31:10.038407, 5, pid=65150, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:629(debug_unix_user_token)
UNIX token of user 0
Primary group is 0 and contains 0 supplementary groups
[2014/12/14 18:31:10.038446, 4, pid=65150, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx)
pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0
[2014/12/14 18:31:10.038471, 5, pid=65150, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:265(auth_check_ntlm_password)
check_ntlm_password: PAM Account for user [jxpryde] succeeded
[2014/12/14 18:31:10.038495, 2, pid=65150, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:278(auth_check_ntlm_password)
check_ntlm_password: authentication for user [jxpryde] -> [jxpryde] -> [jxpryde] succeeded
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment