やまです。

たかはしもとのぶ様ありがとうございました。

> とりあえず、log level を 3 位にして再度確認してみてはいかがでしょうか。

smb.conf に
log level = 3 を追加して

# net ads join

をしてみました。結果は同じでしたがログは以下のようになっていました。

/var/log/messages

Sep 28 10:34:08 servera winbindd[3446]: [2006/09/28 10:34:08, 0]
nsswitch/winbindd_dual.c:child_read_request(49)
Sep 28 10:34:08 servera winbindd[3446]:   Got invalid request length: 0
Sep 28 10:34:10 servera nmbd[3433]: [2006/09/28 10:34:10, 0]
nmbd/nmbd.c:terminate(58)
Sep 28 10:34:10 servera nmbd[3433]:   Got SIGTERM: going down...
Sep 28 10:34:10 servera smbd[3567]: [2006/09/28 10:34:10, 0]
printing/print_cups.c:cups_cache_reload(85)
Sep 28 10:34:10 servera smbd[3567]:   Unable to connect to CUPS server
localhost - Connection refused
Sep 28 10:34:10 servera smbd[3567]: [2006/09/28 10:34:10, 0]
printing/print_cups.c:cups_cache_reload(85)
Sep 28 10:34:10 servera smbd[3567]:   Unable to connect to CUPS server
localhost - Connection refused
Sep 28 10:34:10 servera smbd[3568]: [2006/09/28 10:34:10, 0]
libads/kerberos.c:ads_kinit_password(208)
Sep 28 10:34:10 servera smbd[3568]:   kerberos_kinit_password
[EMAIL PROTECTED] failed: Clients credentials have been revoked
Sep 28 10:34:10 servera smbd[3568]: [2006/09/28 10:34:10, 0]
printing/nt_printing.c:nt_printing_init(649)
Sep 28 10:34:10 servera smbd[3568]:   nt_printing_init: error checking
published printers: WERR_ACCESS_DENIED
Sep 28 10:34:13 servera winbindd[3576]: [2006/09/28 10:34:13, 0]
libads/kerberos.c:ads_kinit_password(208)
Sep 28 10:34:13 servera winbindd[3576]:   kerberos_kinit_password
[EMAIL PROTECTED] failed: Clients credentials have been revoked


/var/log/samba/smbd.log

[2006/09/28 10:34:08, 3] smbd/sec_ctx.c:set_sec_ctx(241)  setting sec
ctx (0, 0) - sec_ctx_stack_ndx = 0
[2006/09/28 10:34:08, 5] auth/auth_util.c:debug_nt_user_token(448)  NT
user token: (NULL)
[2006/09/28 10:34:08, 5] auth/auth_util.c:debug_unix_user_token(474)
UNIX token of user 0  Primary group is 0 and contains 0 supplementary groups
[2006/09/28 10:34:08, 5] smbd/uid.c:change_to_root_user(284)
change_to_root_user: now uid=(0,0) gid=(0,0)
[2006/09/28 10:34:08, 3] smbd/connection.c:yield_connection(69)
Yielding connection to
[2006/09/28 10:34:08, 3] smbd/server.c:exit_server_common(675)  Server
exit (normal exit)
[2006/09/28 10:34:08, 3] smbd/sec_ctx.c:set_sec_ctx(241)  setting sec
ctx (0, 0) - sec_ctx_stack_ndx = 0
[2006/09/28 10:34:08, 5] auth/auth_util.c:debug_nt_user_token(448)  NT
user token: (NULL)
[2006/09/28 10:34:08, 5] auth/auth_util.c:debug_unix_user_token(474)
UNIX token of user 0  Primary group is 0 and contains 0 supplementary groups
[2006/09/28 10:34:08, 5] smbd/uid.c:change_to_root_user(284)
change_to_root_user: now uid=(0,0) gid=(0,0)
[2006/09/28 10:34:08, 3] smbd/connection.c:yield_connection(69)
Yielding connection to
[2006/09/28 10:34:08, 3] smbd/connection.c:yield_connection(76)
yield_connection: tdb_delete for name  failed with error Record does not
exist.
[2006/09/28 10:34:08, 3] smbd/server.c:exit_server_common(675)  Server
exit (normal exit)
[2006/09/28 10:34:10, 2] lib/interface.c:add_interface(81)  added
interface ip=192.168.10.10 bcast=192.168.10.255 nmask=255.255.0.0
[2006/09/28 10:34:10, 1] smbd/files.c:file_init(195)  file_init:
Information only: requested 10000 open files, 1715 are available.
[2006/09/28 10:34:10, 3] smbd/server.c:main(877)  loaded services
[2006/09/28 10:34:10, 3] smbd/server.c:main(892)  Becoming a daemon.
[2006/09/28 10:34:10, 2] lib/tallocmsg.c:register_msg_pool_usage(61)
Registered MSG_REQ_POOL_USAGE
[2006/09/28 10:34:10, 2] lib/dmallocmsg.c:register_dmalloc_msgs(71)
Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED
[2006/09/28 10:34:10, 3] smbd/sec_ctx.c:push_sec_ctx(208)
push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1
[2006/09/28 10:34:10, 3] smbd/uid.c:push_conn_ctx(354)  push_conn_ctx(0)
: conn_ctx_stack_ndx = 0
[2006/09/28 10:34:10, 3] smbd/sec_ctx.c:set_sec_ctx(241)  setting sec
ctx (0, 0) - sec_ctx_stack_ndx = 1
[2006/09/28 10:34:10, 3] smbd/sec_ctx.c:pop_sec_ctx(339)  pop_sec_ctx
(0, 0) - sec_ctx_stack_ndx = 0
[2006/09/28 10:34:10, 3] passdb/lookup_sid.c:store_gid_sid_cache(1059)
store_gid_sid_cache: gid 16777216 in cache -> S-1-5-32-544
[2006/09/28 10:34:10, 3] passdb/lookup_sid.c:store_gid_sid_cache(1059)
store_gid_sid_cache: gid 16777217 in cache -> S-1-5-32-545
[2006/09/28 10:34:10, 3] lib/privileges.c:get_privileges(261)
get_privileges: No privileges assigned to SID [S-1-22-1-0]
[2006/09/28 10:34:10, 3] lib/privileges.c:get_privileges(261)
get_privileges: No privileges assigned to SID [S-1-5-2]
[2006/09/28 10:34:10, 3] lib/privileges.c:get_privileges(261)
get_privileges: No privileges assigned to SID [S-1-5-11]
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(250)
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(251)
  se_access_check: user sid is S-1-22-1-0
  se_access_check: also S-1-5-32-544
  se_access_check: also S-1-1-0
  se_access_check: also S-1-5-2
  se_access_check: also S-1-5-11
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(250)
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(251)
  se_access_check: user sid is S-1-22-1-0
  se_access_check: also S-1-5-32-544
  se_access_check: also S-1-1-0
  se_access_check: also S-1-5-2
  se_access_check: also S-1-5-11
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(250)
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(251)
  se_access_check: user sid is S-1-22-1-0
  se_access_check: also S-1-5-32-544
  se_access_check: also S-1-1-0
  se_access_check: also S-1-5-2
  se_access_check: also S-1-5-11
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(250)
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(251)
  se_access_check: user sid is S-1-22-1-0
  se_access_check: also S-1-5-32-544
  se_access_check: also S-1-1-0
  se_access_check: also S-1-5-2
  se_access_check: also S-1-5-11
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(250)
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(251)
  se_access_check: user sid is S-1-22-1-0
  se_access_check: also S-1-5-32-544
  se_access_check: also S-1-1-0
  se_access_check: also S-1-5-2
  se_access_check: also S-1-5-11
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(250)
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(251)
  se_access_check: user sid is S-1-22-1-0
  se_access_check: also S-1-5-32-544
  se_access_check: also S-1-1-0
  se_access_check: also S-1-5-2
  se_access_check: also S-1-5-11
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(250)
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(251)
  se_access_check: user sid is S-1-22-1-0
  se_access_check: also S-1-5-32-544
  se_access_check: also S-1-1-0
  se_access_check: also S-1-5-2
  se_access_check: also S-1-5-11
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(250)
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(251)
  se_access_check: user sid is S-1-22-1-0
  se_access_check: also S-1-5-32-544
  se_access_check: also S-1-1-0
  se_access_check: also S-1-5-2
  se_access_check: also S-1-5-11
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(250)
[2006/09/28 10:34:10, 3] lib/util_seaccess.c:se_access_check(251)
  se_access_check: user sid is S-1-22-1-0
  se_access_check: also S-1-5-32-544
  se_access_check: also S-1-1-0
  se_access_check: also S-1-5-2
  se_access_check: also S-1-5-11
[2006/09/28 10:34:10, 3] libsmb/namequery.c:get_dc_list(1426)
get_dc_list: preferred server list: ", 192.168.10.13"
[2006/09/28 10:34:10, 3] libads/ldap.c:ads_connect(287)  Connected to
LDAP server 192.168.10.13
[2006/09/28 10:34:10, 3] libads/sasl.c:ads_sasl_spnego_bind(210)
ads_sasl_spnego_bind: got OID=1 2 840 48018 1 2 2
[2006/09/28 10:34:10, 3] libads/sasl.c:ads_sasl_spnego_bind(210)
ads_sasl_spnego_bind: got OID=1 2 840 113554 1 2 2
[2006/09/28 10:34:10, 3] libads/sasl.c:ads_sasl_spnego_bind(210)
ads_sasl_spnego_bind: got OID=1 2 840 113554 1 2 2 3
[2006/09/28 10:34:10, 3] libads/sasl.c:ads_sasl_spnego_bind(210)
ads_sasl_spnego_bind: got OID=1 3 6 1 4 1 311 2 2 10
[2006/09/28 10:34:10, 3] libads/sasl.c:ads_sasl_spnego_bind(219)
ads_sasl_spnego_bind: got server principal name
[EMAIL PROTECTED]
[2006/09/28 10:34:10, 3] libsmb/clikrb5.c:ads_krb5_mk_req(552)
ads_krb5_mk_req: krb5_cc_get_principal failed (No such file or directory)
[2006/09/28 10:34:10, 0] libads/kerberos.c:ads_kinit_password(208)
kerberos_kinit_password [EMAIL PROTECTED] failed: Clients
credentials have been revoked
[2006/09/28 10:34:10, 3]
printing/nt_printing.c:check_published_printers(3228)  ads_connect
failed: Clients credentials have been revoked
[2006/09/28 10:34:10, 0] printing/nt_printing.c:nt_printing_init(649)
nt_printing_init: error checking published printers: WERR_ACCESS_DENIED
[2006/09/28 10:34:10, 3] smbd/sec_ctx.c:push_sec_ctx(208)
push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1
[2006/09/28 10:34:10, 3] smbd/uid.c:push_conn_ctx(354)  push_conn_ctx(0)
: conn_ctx_stack_ndx = 0
[2006/09/28 10:34:10, 3] smbd/sec_ctx.c:set_sec_ctx(241)  setting sec
ctx (0, 0) - sec_ctx_stack_ndx = 1
[2006/09/28 10:34:10, 3] smbd/sec_ctx.c:pop_sec_ctx(339)  pop_sec_ctx
(0, 0) - sec_ctx_stack_ndx = 0
[2006/09/28 10:34:10, 3] smbd/sec_ctx.c:push_sec_ctx(208)
push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1
[2006/09/28 10:34:10, 3] smbd/uid.c:push_conn_ctx(354)  push_conn_ctx(0)
: conn_ctx_stack_ndx = 0
[2006/09/28 10:34:10, 3] smbd/sec_ctx.c:set_sec_ctx(241)  setting sec
ctx (0, 0) - sec_ctx_stack_ndx = 1
[2006/09/28 10:34:10, 3] smbd/sec_ctx.c:pop_sec_ctx(339)  pop_sec_ctx
(0, 0) - sec_ctx_stack_ndx = 0
[2006/09/28 10:34:10, 3] smbd/sec_ctx.c:push_sec_ctx(208)
push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1
[2006/09/28 10:34:10, 3] smbd/uid.c:push_conn_ctx(354)  push_conn_ctx(0)
: conn_ctx_stack_ndx = 0
[2006/09/28 10:34:10, 3] smbd/sec_ctx.c:set_sec_ctx(241)  setting sec
ctx (0, 0) - sec_ctx_stack_ndx = 1
[2006/09/28 10:34:10, 3] smbd/sec_ctx.c:pop_sec_ctx(339)  pop_sec_ctx
(0, 0) - sec_ctx_stack_ndx = 0
[2006/09/28 10:34:10, 3] passdb/lookup_sid.c:fetch_gid_from_cache(1015)
 fetch gid from cache 16777216 -> S-1-5-32-544
[2006/09/28 10:34:10, 3] passdb/lookup_sid.c:fetch_gid_from_cache(1015)
 fetch gid from cache 16777217 -> S-1-5-32-545
[2006/09/28 10:34:10, 3] lib/privileges.c:get_privileges(261)
get_privileges: No privileges assigned to SID [S-1-22-1-65534]
[2006/09/28 10:34:10, 3] lib/privileges.c:get_privileges(261)
get_privileges: No privileges assigned to SID [S-1-22-2-65534]
[2006/09/28 10:34:10, 3] lib/privileges.c:get_privileges(261)
get_privileges: No privileges assigned to SID [S-1-5-2]
[2006/09/28 10:34:10, 3] lib/privileges.c:get_privileges(261)
get_privileges: No privileges assigned to SID [S-1-5-32-546]
[2006/09/28 10:34:10, 3]
printing/printing.c:start_background_queue(1386)
start_background_queue: Starting background LPQ thread
[2006/09/28 10:34:10, 2] smbd/server.c:open_sockets_smbd(384)  waiting
for a connection


/var/log/samba/winbind.log

[2006/09/28 10:34:11, 2] lib/interface.c:add_interface(81)  added
interface ip=192.168.10.10 bcast=192.168.10.255 nmask=255.255.0.0
[2006/09/28 10:34:11, 2] lib/interface.c:add_interface(81)  added
interface ip=192.168.10.10 bcast=192.168.10.255 nmask=255.255.0.0
[2006/09/28 10:34:11, 2] lib/tallocmsg.c:register_msg_pool_usage(61)
Registered MSG_REQ_POOL_USAGE
[2006/09/28 10:34:11, 2] lib/dmallocmsg.c:register_dmalloc_msgs(71)
Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED
[2006/09/28 10:34:11, 2]
nsswitch/winbindd_util.c:add_trusted_domain(175)  Added domain DOM
DOM.DOMAIN.CO.JP S-1-5-21-1580741134-1478702350-1546849883
[2006/09/28 10:34:11, 2]
nsswitch/winbindd_util.c:add_trusted_domain(175)  Added domain SERVERA
S-1-5-21-1130872369-3648040123-148798162
[2006/09/28 10:34:11, 2]
nsswitch/winbindd_util.c:add_trusted_domain(175)  Added domain BUILTIN
S-1-5-32



> もしくは、あらかじめ Active Directory 側でコンピュータアカウントを作成
> して実行したらどのようになるでしょうか。

予めActiveDirectoryに servera を作成しておいて

# net ads join

をしてみました。がこれも結果は同じものでした。実行の方法に間違いがありま
すか?


> Active Directory に SERVERA というエントリが既にあったりしないでしょうか。

最初はありませんでした。

ただ net ads join を行うと中途半端に登録されているので
都度削除しています。また、ドメインコントローラが数台あるのですが
それらにも登録されていないかチェックして全て削除しています。
削除した情報がすぐに他のコントローラにも伝えられれば良いのですが
その方法については残念ながら知らないのです。


余計な情報かもしれませんが net ads の他のオプションも実行してみました。

# net ads info

LDAP server: 192.168.10.13
LDAP server name: server.dom.domain.co.jp
Realm: DOM.DOMAIN.CO.JP
Bind Path: dc=DOM,dc=DOMAIN,dc=CO,dc=JP
LDAP port: 389
Server time: 木, 28  9 2006 09:37:41 JST
KDC server: 192.168.10.13
Server time offset: 3


# net ads testjoin

[2006/09/28 09:28:51, 0] libads/kerberos.c:ads_kinit_password(208)
  kerberos_kinit_password [EMAIL PROTECTED] failed: Clients
credentials have been revoked
[2006/09/28 09:28:51, 0] libads/kerberos.c:ads_kinit_password(208)
  kerberos_kinit_password [EMAIL PROTECTED] failed: Clients
credentials have been revoked
[2006/09/28 09:28:51, 0] utils/net_ads.c:ads_startup(281)
  ads_connect: Clients credentials have been revoked
Join to domain is not valid


# net ads status

accountExpires: 9223372036854775807
badPasswordTime: 0
badPwdCount: 0
codePage: 0
cn: servera
countryCode: 0
instanceType: 4
isCriticalSystemObject: FALSE
lastLogoff: 0
lastLogon: 128038768153709702
localPolicyFlags: 0
logonCount: 0
-------------- Security Descriptor (revision: 1, type: 0x8c14)
owner SID: S-1-5-21-1580741134-1478702350-1546849883-512
group SID: S-1-5-21-1580741134-1478702350-1546849883-513
------- (system) ACL (revision: 2, size: 28, number of ACEs: 1)
------- ACE (type: 0x02, flags: 0xd2, size: 0x14, mask: 0xd016b)
access SID:  S-1-1-0
access type: SYSTEM AUDIT
Permissions:
        [Create All Child Objects]
        [Delete All Child Objects]
        [All validate writes]
        [Write All Properties]
        [Delete Subtree]
        [Change Password]
        [Reset Password]
        [Delete]
        [Modify Permissions]
        [Modify Owner]
------- (user) ACL (revision: 4, size: 1064, number of ACEs: 25)
------- ACE (type: 0x00, flags: 0x00, size: 0x24, mask: 0xf01ff)
access SID:  S-1-5-21-1580741134-1478702350-1546849883-512
access type: ALLOWED
Permissions: [Full Control]
------- ACE (type: 0x00, flags: 0x00, size: 0x18, mask: 0xf01ff)
access SID:  S-1-5-32-548
access type: ALLOWED
Permissions: [Full Control]
------- ACE (type: 0x00, flags: 0x00, size: 0x14, mask: 0xf01ff)
access SID:  S-1-5-18
access type: ALLOWED
Permissions: [Full Control]
------- ACE (type: 0x00, flags: 0x00, size: 0x24, mask: 0x301d4)
access SID:  S-1-5-21-1580741134-1478702350-1546849883-512
access type: ALLOWED
Permissions:
        [List Contents]
        [Read All Properties]
        [Delete Subtree]
        [List Object]
        [Change Password]
        [Reset Password]
        [Delete]
        [Read Permissions]
------- ACE (type: 0x05, flags: 0x00, size: 0x38, mask: 0x20, object
flags: 0x1)
access SID:  S-1-5-21-1580741134-1478702350-1546849883-512
access type: ALLOWED OBJECT
Permissions:
        [Write All Properties]
------- ACE (type: 0x00, flags: 0x00, size: 0x14, mask: 0x20094)
access SID:  S-1-5-11
access type: ALLOWED
Permissions:
        [List Contents]
        [Read All Properties]
        [List Object]
        [Read Permissions]
------- ACE (type: 0x05, flags: 0x00, size: 0x28, mask: 0x100, object
flags: 0x1)
access SID:  S-1-1-0
access type: ALLOWED OBJECT
Permissions:
        [Change Password]
        [Reset Password]
------- ACE (type: 0x00, flags: 0x00, size: 0x14, mask: 0x3)
access SID:  S-1-5-10
access type: ALLOWED
Permissions:
        [Create All Child Objects]
        [Delete All Child Objects]
------- ACE (type: 0x05, flags: 0x00, size: 0x2c, mask: 0x3, object
flags: 0x1)
access SID:  S-1-5-32-550
access type: ALLOWED OBJECT
Permissions:
        [Create All Child Objects]
        [Delete All Child Objects]
------- ACE (type: 0x05, flags: 0x00, size: 0x38, mask: 0x30, object
flags: 0x1)
access SID:  S-1-5-21-1580741134-1478702350-1546849883-517
access type: ALLOWED OBJECT
Permissions:
        [Read All Properties]
        [Write All Properties]
------- ACE (type: 0x05, flags: 0x00, size: 0x28, mask: 0x8, object
flags: 0x1)
access SID:  S-1-5-10
access type: ALLOWED OBJECT
Permissions:
        [All validate writes]
------- ACE (type: 0x05, flags: 0x00, size: 0x28, mask: 0x30, object
flags: 0x1)
access SID:  S-1-5-10
access type: ALLOWED OBJECT
Permissions:
        [Read All Properties]
        [Write All Properties]
------- ACE (type: 0x05, flags: 0x00, size: 0x28, mask: 0x8, object
flags: 0x1)
access SID:  S-1-5-10
access type: ALLOWED OBJECT
Permissions:
        [All validate writes]
------- ACE (type: 0x05, flags: 0x00, size: 0x38, mask: 0x8, object
flags: 0x1)
access SID:  S-1-5-21-1580741134-1478702350-1546849883-512
access type: ALLOWED OBJECT
Permissions:
        [All validate writes]
------- ACE (type: 0x05, flags: 0x00, size: 0x38, mask: 0x8, object
flags: 0x1)
access SID:  S-1-5-21-1580741134-1478702350-1546849883-512
access type: ALLOWED OBJECT
Permissions:
        [All validate writes]
------- ACE (type: 0x00, flags: 0x12, size: 0x18, mask: 0xf01bd)
access SID:  S-1-5-32-544
access type: ALLOWED
Permissions:
        [Create All Child Objects]
        [List Contents]
        [All validate writes]
        [Read All Properties]
        [Write All Properties]
        [List Object]
        [Change Password]
        [Reset Password]
        [Delete]
        [Read Permissions]
        [Modify Permissions]
        [Modify Owner]
------- ACE (type: 0x00, flags: 0x12, size: 0x24, mask: 0xf01ff)
access SID:  S-1-5-21-1580741134-1478702350-1546849883-519
access type: ALLOWED
Permissions: [Full Control]
------- ACE (type: 0x00, flags: 0x12, size: 0x18, mask: 0x4)
access SID:  S-1-5-32-554
access type: ALLOWED
Permissions:
        [List Contents]
------- ACE (type: 0x05, flags: 0x1a, size: 0x3c, mask: 0x10, object
flags: 0x3)
access SID:  S-1-5-32-554
access type: ALLOWED OBJECT
Permissions:
        [Read All Properties]
------- ACE (type: 0x05, flags: 0x1a, size: 0x3c, mask: 0x10, object
flags: 0x3)
access SID:  S-1-5-32-554
access type: ALLOWED OBJECT
Permissions:
        [Read All Properties]
------- ACE (type: 0x05, flags: 0x1a, size: 0x3c, mask: 0x10, object
flags: 0x3)
access SID:  S-1-5-32-554
access type: ALLOWED OBJECT
Permissions:
        [Read All Properties]
------- ACE (type: 0x05, flags: 0x1a, size: 0x3c, mask: 0x10, object
flags: 0x3)
access SID:  S-1-5-32-554
access type: ALLOWED OBJECT
Permissions:
        [Read All Properties]
------- ACE (type: 0x05, flags: 0x1a, size: 0x3c, mask: 0x10, object
flags: 0x3)
access SID:  S-1-5-32-554
access type: ALLOWED OBJECT
Permissions:
        [Read All Properties]
------- ACE (type: 0x05, flags: 0x1a, size: 0x2c, mask: 0x20094, object
flags: 0x2)
access SID:  S-1-5-32-554
access type: ALLOWED OBJECT
Permissions:
        [List Contents]
        [Read All Properties]
        [List Object]
        [Read Permissions]
------- ACE (type: 0x05, flags: 0x1a, size: 0x2c, mask: 0x20094, object
flags: 0x2)
access SID:  S-1-5-32-554
access type: ALLOWED OBJECT
Permissions:
        [List Contents]
        [Read All Properties]
        [List Object]
        [Read Permissions]
-------------- End Of Security Descriptor
distinguishedName: CN=servera,CN=Computers,DC=DOM,DC=domain,DC=co,DC=jp
objectCategory:
CN=Computer,CN=Schema,CN=Configuration,DC=DOM,DC=domain,DC=co,DC=jp
objectClass: top
objectClass: person
objectClass: organizationalPerson
objectClass: user
objectClass: computer
objectGUID: 60478e1c-97e0-4a8e-91de-c5da079a2f73
objectSid: S-1-5-21-1580741134-1478702350-1546849883-6460
primaryGroupID: 515
pwdLastSet: 0
name: servera
sAMAccountName: servera$
sAMAccountType: 805306369
userAccountControl: 69634
uSNChanged: 3009503
uSNCreated: 3009498
whenChanged: 20060928002655.0Z
whenCreated: 20060928002655.0Z

すいません。よろしくお願い致します。

--------------------------------------
[10th Anniversary] special auction campaign now!
http://pr.mail.yahoo.co.jp/auction/

メールによる返信