I am encountering issues trying to integrate FreeIPA with AD, on *nix promp I get "internal server rror" and within I receive the following message in httpd_errorlog.

[Tue Jun 30 13:16:57.623833 2015] [:error] [pid 1062] ipa: INFO: [jsonserver_session] admin@IPA.*redacted*: ping(): SUCCESS
INFO: Current debug levels:
  all: 100
  tdb: 100
  printdrivers: 100
  lanman: 100
  smb: 100
  rpc_parse: 100
  rpc_srv: 100
  rpc_cli: 100
  passdb: 100
  sam: 100
  auth: 100
  winbind: 100
  vfs: 100
  idmap: 100
  quota: 100
  acls: 100
  locking: 100
  msdfs: 100
  dmapi: 100
  registry: 100
  scavenger: 100
  dns: 100
  ldb: 100
pm_process() returned Yes
GENSEC backend 'gssapi_spnego' registered
GENSEC backend 'gssapi_krb5' registered
GENSEC backend 'gssapi_krb5_sasl' registered
GENSEC backend 'sasl-DIGEST-MD5' registered
GENSEC backend 'spnego' registered
GENSEC backend 'schannel' registered
GENSEC backend 'sasl-EXTERNAL' registered
GENSEC backend 'ntlmssp' registered
Using binding ncacn_np:ipaserver01.ipa.*redacted*[,]
s4_tevent: Added timed event "dcerpc_connect_timeout_handler": 0x7fdde035d720
s4_tevent: Added timed event "composite_trigger": 0x7fdde023db30
s4_tevent: Added timed event "composite_trigger": 0x7fdde0360510
s4_tevent: Running timer event 0x7fdde023db30 "composite_trigger"
s4_tevent: Destroying timer event 0x7fdde0360510 "composite_trigger"
Mapped to DCERPC endpoint \pipe\lsarpc
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 netmask=255.255.255.0 added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 netmask=255.255.255.0
s4_tevent: Ending timer event 0x7fdde023db30 "composite_trigger"
s4_tevent: Added timed event "connect_multi_timer": 0x7fdde037f530
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde023e850
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde023e850
s4_tevent: Destroying timer event 0x7fdde037f530 "connect_multi_timer"
Socket options:
        SO_KEEPALIVE = 0
        SO_REUSEADDR = 0
        SO_BROADCAST = 0
        TCP_NODELAY = 1
        TCP_KEEPCNT = 9
        TCP_KEEPIDLE = 7200
        TCP_KEEPINTVL = 75
        IPTOS_LOWDELAY = 0
        IPTOS_THROUGHPUT = 0
        SO_REUSEPORT = 0
        SO_SNDBUF = 663750
        SO_RCVBUF = 262006
        SO_SNDLOWAT = 1
        SO_RCVLOWAT = 1
        SO_SNDTIMEO = 0
        SO_RCVTIMEO = 0
        TCP_QUICKACK = 1
        TCP_DEFER_ACCEPT = 0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde023db30
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0 s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde023db30 "tevent_req_timedout"
Starting GENSEC mechanism spnego
Starting GENSEC submechanism gssapi_krb5
Ticket in credentials cache for admin@IPA.*redacted* will expire in 86364 secs
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde024c910
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0 s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde024c910 "tevent_req_timedout"
gensec_gssapi: NO credentials were delegated
GSSAPI Connection will be cryptographically sealed
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0403a90
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0 s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde0403a90 "tevent_req_timedout"
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde040b200
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0 s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde040b200 "tevent_req_timedout"
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=65535, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0414e30
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde0271b80
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde0414e30 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde02712f0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde02712f0
s4_tevent: Destroying timer event 0x7fdde0271b80 "dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0270250
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0270250
s4_tevent: Destroying timer event 0x7fdde035d720 "dcerpc_connect_timeout_handler"
     lsa_OpenPolicy2: struct lsa_OpenPolicy2
        in: struct lsa_OpenPolicy2
            system_name              : *
                system_name              : ''
            attr                     : *
                attr: struct lsa_ObjectAttribute
                    len                      : 0x00000000 (0)
                    root_dir                 : NULL
                    object_name              : NULL
                    attributes               : 0x00000000 (0)
                    sec_desc                 : NULL
                    sec_qos                  : *
                        sec_qos: struct lsa_QosInfo
                            len                      : 0x00000000 (0)
                            impersonation_level      : 0x0000 (0)
                            context_mode             : 0x00 (0)
                            effective_only           : 0x00 (0)
            access_mask              : 0x02000000 (33554432)
                   0: LSA_POLICY_VIEW_LOCAL_INFORMATION
                   0: LSA_POLICY_VIEW_AUDIT_INFORMATION
                   0: LSA_POLICY_GET_PRIVATE_INFORMATION
                   0: LSA_POLICY_TRUST_ADMIN
                   0: LSA_POLICY_CREATE_ACCOUNT
                   0: LSA_POLICY_CREATE_SECRET
                   0: LSA_POLICY_CREATE_PRIVILEGE
                   0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS
                   0: LSA_POLICY_SET_AUDIT_REQUIREMENTS
                   0: LSA_POLICY_AUDIT_LOG_ADMIN
                   0: LSA_POLICY_SERVER_ADMIN
                   0: LSA_POLICY_LOOKUP_NAMES
                   0: LSA_POLICY_NOTIFICATION
rpc request data:
[0000] 00 00 02 00 01 00 00 00 00 00 00 00 01 00 00 00 ........ ........ [0010] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ [0020] 00 00 00 00 00 00 00 00 04 00 02 00 00 00 00 00 ........ ........
[0030] 00 00 00 00 00 00 00 02                            ........
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde02715a0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=80, this_data=80, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde041fcc0
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde041fcc0 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0272060
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0272060
s4_tevent: Destroying timer event 0x7fdde02715a0 "dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde02712f0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde02712f0
     lsa_OpenPolicy2: struct lsa_OpenPolicy2
        out: struct lsa_OpenPolicy2
            handle                   : *
                handle: struct policy_handle
                    handle_type              : 0x00000000 (0)
uuid : 0000000d-0000-0000-9255-bd882a050000
            result                   : NT_STATUS_OK
rpc reply data:
[0000] 00 00 00 00 0D 00 00 00 00 00 00 00 92 55 BD 88 ........ .....U..
[0010] 2A 05 00 00 00 00 00 00                            *.......
     lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
        in: struct lsa_QueryInfoPolicy2
            handle                   : *
                handle: struct policy_handle
                    handle_type              : 0x00000000 (0)
uuid : 0000000d-0000-0000-9255-bd882a050000
            level                    : LSA_POLICY_INFO_DNS (12)
rpc request data:
[0000] 00 00 00 00 0D 00 00 00 00 00 00 00 92 55 BD 88 ........ .....U..
[0010] 2A 05 00 00 0C 00                                 *.....
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde02715a0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=46, this_data=46, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde042e270
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde042e270 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0272060
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0272060
s4_tevent: Destroying timer event 0x7fdde02715a0 "dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde02712f0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde02712f0
     lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
        out: struct lsa_QueryInfoPolicy2
            info                     : *
                info                     : *
info : union lsa_PolicyInformation(case 12)
                    dns: struct lsa_DnsDomainInfo
                        name: struct lsa_StringLarge
                            length                   : 0x0006 (6)
                            size                     : 0x0008 (8)
                            string                   : *
                                string                   : 'IPA'
                        dns_domain: struct lsa_StringLarge
                            length                   : 0x001a (26)
                            size                     : 0x001c (28)
                            string                   : *
string : 'ipa.*redacted*'
                        dns_forest: struct lsa_StringLarge
                            length                   : 0x001a (26)
                            size                     : 0x001c (28)
                            string                   : *
string : 'ipa.*redacted*' domain_guid : 00000015-373c-115e-f650-6d06416af799
                        sid                      : *
sid : S-1-5-21-291387196-107827446-2583128641
            result                   : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 0C 00 00 00 06 00 08 00 04 00 02 00 ........ ........ [0010] 1A 00 1C 00 08 00 02 00 1A 00 1C 00 0C 00 02 00 ........ ........ [0020] 15 00 00 00 3C 37 5E 11 F6 50 6D 06 41 6A F7 99 ....<7^. .Pm.Aj.. [0030] 10 00 02 00 04 00 00 00 00 00 00 00 03 00 00 00 ........ ........ [0040] 49 00 50 00 41 00 00 00 0E 00 00 00 00 00 00 00 I.P.A... ........ [0050] 0D 00 00 00 69 00 70 00 61 00 2E 00 68 00 73 00 ....i.p. a...h [0060] 61 00 2E 00 63 00 6F 00 2E 00 75 00 6B 00 00 00 a...c.o. ..u.k... [0070] 0E 00 00 00 00 00 00 00 0D 00 00 00 69 00 70 00 ....... ....i.p.
[0080] 61 00 2E 00 68 00 73 00   61 00 2E 00 63 00 6F 00   .
[0090] 2E 00 75 00 6B 00 00 00 04 00 00 00 01 04 00 00 ..u.k... ........ [00A0] 00 00 00 05 15 00 00 00 3C 37 5E 11 F6 50 6D 06 ........ <7^..Pm.
[00B0] 41 6A F7 99 00 00 00 00                            Aj......
     lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
        in: struct lsa_QueryInfoPolicy2
            handle                   : *
                handle: struct policy_handle
                    handle_type              : 0x00000000 (0)
uuid : 0000000d-0000-0000-9255-bd882a050000
            level                    : LSA_POLICY_INFO_ROLE (6)
rpc request data:
[0000] 00 00 00 00 0D 00 00 00 00 00 00 00 92 55 BD 88 ........ .....U..
[0010] 2A 05 00 00 06 00                                 *.....
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde02718d0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde035bb90
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=46, this_data=46, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde044add0
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde035bb90
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde0383eb0
s4_tevent: Destroying timer event 0x7fdde044add0 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0272390
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0272390
s4_tevent: Destroying timer event 0x7fdde02718d0 "dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0271620
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0271620
     lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
        out: struct lsa_QueryInfoPolicy2
            info                     : *
                info                     : *
info : union lsa_PolicyInformation(case 6)
                    role: struct lsa_ServerRole
                        role                     : LSA_ROLE_PRIMARY (3)
            result                   : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 06 00 00 00 03 00 00 00 00 00 00 00 ........ ........
lpcfg_load: refreshing parameters from /usr/share/ipa/smb.conf.empty
params.c:pm_process() - Processing configuration file "/usr/share/ipa/smb.conf.empty"
Processing section "[global]"
INFO: Current debug levels:
  all: 100
  tdb: 100
  printdrivers: 100
  lanman: 100
  smb: 100
  rpc_parse: 100
  rpc_srv: 100
  rpc_cli: 100
  passdb: 100
  sam: 100
  auth: 100
  winbind: 100
  vfs: 100
  idmap: 100
  quota: 100
  acls: 100
  locking: 100
  msdfs: 100
  dmapi: 100
  registry: 100
  scavenger: 100
  dns: 100
  ldb: 100
pm_process() returned Yes
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 netmask=255.255.255.0 added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 netmask=255.255.255.0 added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 netmask=255.255.255.0 added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 netmask=255.255.255.0
finddcs: searching for a DC by DNS domain *redacted*
finddcs: looking for SRV records for _ldap._tcp.*redacted*
ads_dns_lookup_srv: 2 records returned in the answer section.
ads_dns_parse_rr_srv: Parsed achdcs002.*redacted* [0, 100, 389]
ads_dns_parse_rr_srv: Parsed achdcs03.*redacted* [0, 100, 389]
Addrs = 192.168.35.10@389/achdcs002,192.168.35.19@389/achdcs03
finddcs: DNS SRV response 0 at '192.168.35.10'
finddcs: DNS SRV response 1 at '192.168.35.19'
finddcs: performing CLDAP query on 192.168.35.10
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0275670
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde02779a0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde02779a0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde04ea460
s4_tevent: Destroying timer event 0x7fdde0275670 "tevent_req_timedout"
s4_tevent: Destroying timer event 0x7fdde04ea460 "tevent_req_timedout"
     &response->data.nt5_ex: struct NETLOGON_SAM_LOGON_RESPONSE_EX
        command                  : LOGON_SAM_LOGON_RESPONSE_EX (23)
        sbz                      : 0x0000 (0)
        server_type              : 0x000033fd (13309)
               1: NBT_SERVER_PDC
               1: NBT_SERVER_GC
               1: NBT_SERVER_LDAP
               1: NBT_SERVER_DS
               1: NBT_SERVER_KDC
               1: NBT_SERVER_TIMESERV
               1: NBT_SERVER_CLOSEST
               1: NBT_SERVER_WRITABLE
               1: NBT_SERVER_GOOD_TIMESERV
               0: NBT_SERVER_NDNC
               0: NBT_SERVER_SELECT_SECRET_DOMAIN_6
               1: NBT_SERVER_FULL_SECRET_DOMAIN_6
               1: NBT_SERVER_ADS_WEB_SERVICE
               0: NBT_SERVER_HAS_DNS_NAME
               0: NBT_SERVER_IS_DEFAULT_NC
               0: NBT_SERVER_FOREST_ROOT
        domain_uuid              : ac57e335-f22b-483b-9504-d6ebfbee1d94
        forest                   : '*redacted*'
        dns_domain               : '*redacted'
        pdc_dns_name             : 'achdcs002.*redacted*'
        domain_name              : '*redacted*'
        pdc_name                 : 'ACHDCS002'
        user_name                : ''
        server_site              : 'ACH'
        client_site              : 'ACH'
        sockaddr_size            : 0x00 (0)
        sockaddr: struct nbt_sockaddr
            sockaddr_family          : 0x00000000 (0)
            pdc_ip                   : (null)
            remaining                : DATA_BLOB length=0
        next_closest_site        : NULL
        nt_version               : 0x00000005 (5)
               1: NETLOGON_NT_VERSION_1
               0: NETLOGON_NT_VERSION_5
               1: NETLOGON_NT_VERSION_5EX
               0: NETLOGON_NT_VERSION_5EX_WITH_IP
               0: NETLOGON_NT_VERSION_WITH_CLOSEST_SITE
               0: NETLOGON_NT_VERSION_AVOID_NT4EMUL
               0: NETLOGON_NT_VERSION_PDC
               0: NETLOGON_NT_VERSION_IP
               0: NETLOGON_NT_VERSION_LOCAL
               0: NETLOGON_NT_VERSION_GC
        lmnt_token               : 0xffff (65535)
        lm20_token               : 0xffff (65535)
finddcs: Found matching DC 192.168.35.10 with server_type=0x000033fd
lpcfg_load: refreshing parameters from /usr/share/ipa/smb.conf.empty
params.c:pm_process() - Processing configuration file "/usr/share/ipa/smb.conf.empty"
Processing section "[global]"
INFO: Current debug levels:
  all: 100
  tdb: 100
  printdrivers: 100
  lanman: 100
  smb: 100
  rpc_parse: 100
  rpc_srv: 100
  rpc_cli: 100
  passdb: 100
  sam: 100
  auth: 100
  winbind: 100
  vfs: 100
  idmap: 100
  quota: 100
  acls: 100
  locking: 100
  msdfs: 100
  dmapi: 100
  registry: 100
  scavenger: 100
  dns: 100
  ldb: 100
pm_process() returned Yes
Using binding ncacn_np:achdcs002.*redacted*.co.uk[,]
s4_tevent: Added timed event "dcerpc_connect_timeout_handler": 0x7fdde00e0fa0
s4_tevent: Added timed event "composite_trigger": 0x7fdde0277490
s4_tevent: Added timed event "composite_trigger": 0x7fdde00e2b30
s4_tevent: Running timer event 0x7fdde0277490 "composite_trigger"
s4_tevent: Destroying timer event 0x7fdde00e2b30 "composite_trigger"
Mapped to DCERPC endpoint \pipe\lsarpc
added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 netmask=255.255.255.0 added interface ens160 ip=192.168.35.27 bcast=192.168.35.255 netmask=255.255.255.0
s4_tevent: Ending timer event 0x7fdde0277490 "composite_trigger"
s4_tevent: Added timed event "connect_multi_timer": 0x7fdde04cc0a0
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0275b70
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0275b70
s4_tevent: Destroying timer event 0x7fdde04cc0a0 "connect_multi_timer"
Socket options:
        SO_KEEPALIVE = 0
        SO_REUSEADDR = 0
        SO_BROADCAST = 0
        TCP_NODELAY = 1
        TCP_KEEPCNT = 9
        TCP_KEEPIDLE = 7200
        TCP_KEEPINTVL = 75
        IPTOS_LOWDELAY = 0
        IPTOS_THROUGHPUT = 0
        SO_REUSEPORT = 0
        SO_SNDBUF = 23400
        SO_RCVBUF = 87380
        SO_SNDLOWAT = 1
        SO_RCVLOWAT = 1
        SO_SNDTIMEO = 0
        SO_RCVTIMEO = 0
        TCP_QUICKACK = 1
        TCP_DEFER_ACCEPT = 0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0277490
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60 s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
s4_tevent: Destroying timer event 0x7fdde0277490 "tevent_req_timedout"
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
     negotiate: struct NEGOTIATE_MESSAGE
        Signature                : 'NTLMSSP'
        MessageType              : NtLmNegotiate (1)
        NegotiateFlags           : 0x60088215 (1611170325)
               1: NTLMSSP_NEGOTIATE_UNICODE
               0: NTLMSSP_NEGOTIATE_OEM
               1: NTLMSSP_REQUEST_TARGET
               1: NTLMSSP_NEGOTIATE_SIGN
               0: NTLMSSP_NEGOTIATE_SEAL
               0: NTLMSSP_NEGOTIATE_DATAGRAM
               0: NTLMSSP_NEGOTIATE_LM_KEY
               0: NTLMSSP_NEGOTIATE_NETWARE
               1: NTLMSSP_NEGOTIATE_NTLM
               0: NTLMSSP_NEGOTIATE_NT_ONLY
               0: NTLMSSP_ANONYMOUS
               0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
               0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
               0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
               1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
               0: NTLMSSP_TARGET_TYPE_DOMAIN
               0: NTLMSSP_TARGET_TYPE_SERVER
               0: NTLMSSP_TARGET_TYPE_SHARE
               1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
               0: NTLMSSP_NEGOTIATE_IDENTIFY
               0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
               0: NTLMSSP_NEGOTIATE_TARGET_INFO
               0: NTLMSSP_NEGOTIATE_VERSION
               1: NTLMSSP_NEGOTIATE_128
               1: NTLMSSP_NEGOTIATE_KEY_EXCH
               0: NTLMSSP_NEGOTIATE_56
        DomainNameLen            : 0x0003 (3)
        DomainNameMaxLen         : 0x0003 (3)
        DomainName               : *
            DomainName               : 'IPA'
        WorkstationLen           : 0x0003 (3)
        WorkstationMaxLen        : 0x0003 (3)
        Workstation              : *
            Workstation              : 'IPA'
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0319b00
smb_signing_sign_pdu: sent SMB signature of
[0000] 42 53 52 53 50 59 4C 20                            BSRSPYL
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60 s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
s4_tevent: Destroying timer event 0x7fdde0319b00 "tevent_req_timedout"
Got challenge flags:
Got NTLMSSP neg_flags=0x62898215
  NTLMSSP_NEGOTIATE_UNICODE
  NTLMSSP_REQUEST_TARGET
  NTLMSSP_NEGOTIATE_SIGN
  NTLMSSP_NEGOTIATE_NTLM
  NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  NTLMSSP_NEGOTIATE_NTLM2
  NTLMSSP_NEGOTIATE_TARGET_INFO
  NTLMSSP_NEGOTIATE_VERSION
  NTLMSSP_NEGOTIATE_128
  NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x60088215
  NTLMSSP_NEGOTIATE_UNICODE
  NTLMSSP_REQUEST_TARGET
  NTLMSSP_NEGOTIATE_SIGN
  NTLMSSP_NEGOTIATE_NTLM
  NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  NTLMSSP_NEGOTIATE_NTLM2
  NTLMSSP_NEGOTIATE_128
  NTLMSSP_NEGOTIATE_KEY_EXCH
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde035fbe0
smb_signing_sign_pdu: sent SMB signature of
[0000] 42 53 52 53 50 59 4C 20                            BSRSPYL
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60 s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
s4_tevent: Destroying timer event 0x7fdde035fbe0 "tevent_req_timedout"
smb_signing_activate: user_session_key
[0000] 91 3E 7A 6D 06 F3 13 71 8C EB 89 6F 4B 51 E1 8E .>zm...q ...oKQ..
smb_signing_activate: NULL response_data
smb_signing_md5: sequence number 1
smb_signing_check_pdu: seq 1: got good SMB signature of
[0000] DA 34 34 6B 6A 64 16 04                            .44kjd..
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde037d9a0
smb_signing_md5: sequence number 2
smb_signing_sign_pdu: sent SMB signature of
[0000] 42 7D BB 3D C6 F4 DF 05                            B}.=....
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60 s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
smb_signing_md5: sequence number 3
smb_signing_check_pdu: seq 3: got good SMB signature of
[0000] 14 92 54 DC ED A6 81 DA                            ..T.....
s4_tevent: Destroying timer event 0x7fdde037d9a0 "tevent_req_timedout"
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0377dc0
smb_signing_md5: sequence number 4
smb_signing_sign_pdu: sent SMB signature of
[0000] AE 02 E6 A9 31 9D E5 30                            ....1..0
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60 s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
smb_signing_md5: sequence number 5
smb_signing_check_pdu: seq 5: got good SMB signature of
[0000] 87 8F 05 02 A0 F0 54 F1                            ......T.
s4_tevent: Destroying timer event 0x7fdde0377dc0 "tevent_req_timedout"
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=65535, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde03e1c80
smb_signing_md5: sequence number 6
smb_signing_sign_pdu: sent SMB signature of
[0000] DA 7B C9 36 72 95 50 B2                            .{.6r.P.
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde03d2da0
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
smb_signing_md5: sequence number 7
smb_signing_check_pdu: seq 7: got good SMB signature of
[0000] EB 01 CC 74 62 CE DB C2                            ...tb...
s4_tevent: Destroying timer event 0x7fdde03e1c80 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fb990
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fb990
s4_tevent: Destroying timer event 0x7fdde03d2da0 "dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fabe0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fabe0
s4_tevent: Destroying timer event 0x7fdde00e0fa0 "dcerpc_connect_timeout_handler"
     lsa_OpenPolicy2: struct lsa_OpenPolicy2
        in: struct lsa_OpenPolicy2
            system_name              : *
                system_name              : ''
            attr                     : *
                attr: struct lsa_ObjectAttribute
                    len                      : 0x00000000 (0)
                    root_dir                 : NULL
                    object_name              : NULL
                    attributes               : 0x00000000 (0)
                    sec_desc                 : NULL
                    sec_qos                  : *
                        sec_qos: struct lsa_QosInfo
                            len                      : 0x00000000 (0)
                            impersonation_level      : 0x0000 (0)
                            context_mode             : 0x00 (0)
                            effective_only           : 0x00 (0)
            access_mask              : 0x02000000 (33554432)
                   0: LSA_POLICY_VIEW_LOCAL_INFORMATION
                   0: LSA_POLICY_VIEW_AUDIT_INFORMATION
                   0: LSA_POLICY_GET_PRIVATE_INFORMATION
                   0: LSA_POLICY_TRUST_ADMIN
                   0: LSA_POLICY_CREATE_ACCOUNT
                   0: LSA_POLICY_CREATE_SECRET
                   0: LSA_POLICY_CREATE_PRIVILEGE
                   0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS
                   0: LSA_POLICY_SET_AUDIT_REQUIREMENTS
                   0: LSA_POLICY_AUDIT_LOG_ADMIN
                   0: LSA_POLICY_SERVER_ADMIN
                   0: LSA_POLICY_LOOKUP_NAMES
                   0: LSA_POLICY_NOTIFICATION
rpc request data:
[0000] 00 00 02 00 01 00 00 00 00 00 00 00 01 00 00 00 ........ ........ [0010] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ [0020] 00 00 00 00 00 00 00 00 04 00 02 00 00 00 00 00 ........ ........
[0030] 00 00 00 00 00 00 00 02                            ........
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde03f1490
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=80, this_data=80, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde03f6740
smb_signing_md5: sequence number 8
smb_signing_sign_pdu: sent SMB signature of
[0000] 0E 0D 12 02 06 74 B7 D5                            .....t..
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
smb_signing_md5: sequence number 9
smb_signing_check_pdu: seq 9: got good SMB signature of
[0000] DD 05 A9 E5 80 34 B6 8D                            .....4..
s4_tevent: Destroying timer event 0x7fdde03f6740 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fbe00
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fbe00
s4_tevent: Destroying timer event 0x7fdde03f1490 "dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0275e20
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0275e20
     lsa_OpenPolicy2: struct lsa_OpenPolicy2
        out: struct lsa_OpenPolicy2
            handle                   : *
                handle: struct policy_handle
                    handle_type              : 0x00000000 (0)
uuid : 0593f50d-b3c4-4b0a-b3d7-f502da1ea0e6
            result                   : NT_STATUS_OK
rpc reply data:
[0000] 00 00 00 00 0D F5 93 05 C4 B3 0A 4B B3 D7 F5 02 ........ ...K....
[0010] DA 1E A0 E6 00 00 00 00                            ........
     lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
        in: struct lsa_QueryInfoPolicy2
            handle                   : *
                handle: struct policy_handle
                    handle_type              : 0x00000000 (0)
uuid : 0593f50d-b3c4-4b0a-b3d7-f502da1ea0e6
            level                    : LSA_POLICY_INFO_DNS (12)
rpc request data:
[0000] 00 00 00 00 0D F5 93 05 C4 B3 0A 4B B3 D7 F5 02 ........ ...K....
[0010] DA 1E A0 E6 0C 00                                 ......
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde040bb30
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=46, this_data=46, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0416090
smb_signing_md5: sequence number 10
smb_signing_sign_pdu: sent SMB signature of
[0000] 9E DF 1C E9 AA 22 79 E4                            ....."y.
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
smb_signing_md5: sequence number 11
smb_signing_check_pdu: seq 11: got good SMB signature of
[0000] 41 6F A0 71 3B 0F C9 36                            Ao.q;..6
s4_tevent: Destroying timer event 0x7fdde0416090 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fbe00
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fbe00
s4_tevent: Destroying timer event 0x7fdde040bb30 "dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde0275e20
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde0275e20
     lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
        out: struct lsa_QueryInfoPolicy2
            info                     : *
                info                     : *
info : union lsa_PolicyInformation(case 12)
                    dns: struct lsa_DnsDomainInfo
                        name: struct lsa_StringLarge
                            length                   : 0x0010 (16)
                            size                     : 0x0012 (18)
                            string                   : *
                                string                   : '*redacted*'
                        dns_domain: struct lsa_StringLarge
                            length                   : 0x0012 (18)
                            size                     : 0x0014 (20)
                            string                   : *
                                string                   : '*redacted*k'
                        dns_forest: struct lsa_StringLarge
                            length                   : 0x0012 (18)
                            size                     : 0x0014 (20)
                            string                   : *
                                string                   : '*redacted*'
domain_guid : ac57e335-f22b-483b-9504-d6ebfbee1d94
                        sid                      : *
sid : S-1-5-21-2821962302-3963220949-2539344233
            result                   : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 0C 00 00 00 10 00 12 00 04 00 02 00 ........ ........ [0010] 12 00 14 00 08 00 02 00 12 00 14 00 0C 00 02 00 ........ ........ [0020] 35 E3 57 AC 2B F2 3B 48 95 04 D6 EB FB EE 1D 94 5.W.+.;H ........ [0030] 10 00 02 00 09 00 00 00 00 00 00 00 08 00 00 00 ........ ........
[0040] 48 00 53 00 41 00 47 00   52 00 4F 00 55 00 50 00   .
[0050] 0A 00 00 00 00 00 00 00 09 00 00 00 68 00 73 00 ........ ....h... [0060] 61 00 2E 00 63 00 6F 00 2E 00 75 00 6B 00 00 00 a...c.o. ..u.k... [0070] 0A 00 00 00 00 00 00 00 09 00 00 00 68 00 73 00 ........ ....h... [0080] 61 00 2E 00 63 00 6F 00 2E 00 75 00 6B 00 00 00 a...c.o. ..u.k... [0090] 04 00 00 00 01 04 00 00 00 00 00 05 15 00 00 00 ........ ........ [00A0] 3E BA 33 A8 D5 F3 39 EC 69 51 5B 97 00 00 00 00 >.3...9. iQ[.....
     lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
        in: struct lsa_QueryInfoPolicy2
            handle                   : *
                handle: struct policy_handle
                    handle_type              : 0x00000000 (0)
uuid : 0593f50d-b3c4-4b0a-b3d7-f502da1ea0e6
            level                    : LSA_POLICY_INFO_ROLE (6)
rpc request data:
[0000] 00 00 00 00 0D F5 93 05 C4 B3 0A 4B B3 D7 F5 02 ........ ...K....
[0010] DA 1E A0 E6 06 00                                 ......
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde043f610
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=46, this_data=46, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde0445b20
smb_signing_md5: sequence number 12
smb_signing_sign_pdu: sent SMB signature of
[0000] 76 0D 68 E2 C8 D4 98 19                            v.h.....
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
smb_signing_md5: sequence number 13
smb_signing_check_pdu: seq 13: got good SMB signature of
[0000] 17 FD 16 79 CC 2E F2 C6                            ...y....
s4_tevent: Destroying timer event 0x7fdde0445b20 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fc140
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fc140
s4_tevent: Destroying timer event 0x7fdde043f610 "dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde04fb500
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde04fb500
     lsa_QueryInfoPolicy2: struct lsa_QueryInfoPolicy2
        out: struct lsa_QueryInfoPolicy2
            info                     : *
                info                     : *
info : union lsa_PolicyInformation(case 6)
                    role: struct lsa_ServerRole
                        role                     : LSA_ROLE_PRIMARY (3)
            result                   : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 06 00 00 00 03 00 00 00 00 00 00 00 ........ ........ lsa_QueryTrustedDomainInfoByName: struct lsa_QueryTrustedDomainInfoByName
        in: struct lsa_QueryTrustedDomainInfoByName
            handle                   : *
                handle: struct policy_handle
                    handle_type              : 0x00000000 (0)
uuid : 0593f50d-b3c4-4b0a-b3d7-f502da1ea0e6
            trusted_domain           : *
                trusted_domain: struct lsa_String
                    length                   : 0x001a (26)
                    size                     : 0x001a (26)
                    string                   : *
                        string                   : 'ipa.*redacted*'
level : LSA_TRUSTED_DOMAIN_INFO_FULL_INFO (8)
rpc request data:
[0000] 00 00 00 00 0D F5 93 05 C4 B3 0A 4B B3 D7 F5 02 ........ ...K.... [0010] DA 1E A0 E6 1A 00 1A 00 00 00 02 00 0D 00 00 00 ........ ........ [0020] 00 00 00 00 0D 00 00 00 69 00 70 00 61 00 2E 00 ........ i.p.a...
[0030] 68 00 73 00 61 00 2E 00   63 00 6F 00 2E 00 75 00   a... c.o...u.
[0040] 6B 00 08 00                                       k...
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Added timed event "dcerpc_timeout_handler": 0x7fdde00ef550
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Schedule immediate event "dcerpc_io_trigger": 0x7fdde0230710
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=92, this_data=92, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0
s4_tevent: Added timed event "tevent_req_timedout": 0x7fdde00ee2f0
smb_signing_md5: sequence number 14
smb_signing_sign_pdu: sent SMB signature of
[0000] B0 93 27 43 EE 4A 37 94                            ..'C.J7.
s4_tevent: Schedule immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
s4_tevent: Run immediate event "dcerpc_io_trigger": 0x7fdde0230710
s4_tevent: Run immediate event "tevent_queue_immediate_trigger": 0x7fdde00f5a60
smb_signing_md5: sequence number 15
smb_signing_check_pdu: seq 15: got good SMB signature of
[0000] 8F F4 5B 5F 27 39 4C 42                            ..[_'9LB
s4_tevent: Destroying timer event 0x7fdde00ee2f0 "tevent_req_timedout"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde050c440
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde050c440
s4_tevent: Destroying timer event 0x7fdde00ef550 "dcerpc_timeout_handler"
s4_tevent: Schedule immediate event "tevent_req_trigger": 0x7fdde05110e0
s4_tevent: Run immediate event "tevent_req_trigger": 0x7fdde05110e0
lsa_QueryTrustedDomainInfoByName: struct lsa_QueryTrustedDomainInfoByName
        out: struct lsa_QueryTrustedDomainInfoByName
            info                     : *
                info                     : *
info : union lsa_TrustedDomainInfo(case 8)
                    full_info: struct lsa_TrustDomainInfoFullInfo
                        info_ex: struct lsa_TrustDomainInfoInfoEx
                            domain_name: struct lsa_StringLarge
                                length                   : 0x001a (26)
                                size                     : 0x001c (28)
                                string                   : *
string : 'ipa.*redacted*'
                            netbios_name: struct lsa_StringLarge
                                length                   : 0x001a (26)
                                size                     : 0x001c (28)
                                string                   : *
string : 'ipa.*redacted*'
                            sid                      : NULL
                            trust_direction          : 0x00000003 (3)
                                   1: LSA_TRUST_DIRECTION_INBOUND
                                   1: LSA_TRUST_DIRECTION_OUTBOUND
trust_type : LSA_TRUST_TYPE_MIT (3)
                            trust_attributes         : 0x00000000 (0)
                                   0: LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE
                                   0: LSA_TRUST_ATTRIBUTE_UPLEVEL_ONLY
0: LSA_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN 0: LSA_TRUST_ATTRIBUTE_FOREST_TRANSITIVE 0: LSA_TRUST_ATTRIBUTE_CROSS_ORGANIZATION
                                   0: LSA_TRUST_ATTRIBUTE_WITHIN_FOREST
0: LSA_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL 0: LSA_TRUST_ATTRIBUTE_USES_RC4_ENCRYPTION posix_offset: struct lsa_TrustDomainInfoPosixOffset
                            posix_offset             : 0x00000000 (0)
                        auth_info: struct lsa_TrustDomainInfoAuthInfo
                            incoming_count           : 0x00000000 (0)
                            incoming_current_auth_info: NULL
                            incoming_previous_auth_info: NULL
                            outgoing_count           : 0x00000000 (0)
                            outgoing_current_auth_info: NULL
                            outgoing_previous_auth_info: NULL
            result                   : NT_STATUS_OK
rpc reply data:
[0000] 00 00 02 00 08 00 00 00 1A 00 1C 00 04 00 02 00 ........ ........ [0010] 1A 00 1C 00 08 00 02 00 00 00 00 00 03 00 00 00 ........ ........ [0020] 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ [0030] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ [0040] 00 00 00 00 0E 00 00 00 00 00 00 00 0D 00 00 00 ........ ........
[0050] 69 00 70 00 61 00 2E 00   68 00 73 00 61 00 2E 00   i.p.a... h...
[0060] 63 00 6F 00 2E 00 75 00 6B 00 00 00 0E 00 00 00 c.o...u. k....... [0070] 00 00 00 00 0D 00 00 00 69 00 70 00 61 00 2E 00 ........ i.p.a...
[0080] 68 00 73 00 61 00 2E 00   63 00 6F 00 2E 00 75 00   ... c.o...u.
[0090] 6B 00 00 00 00 00 00 00                            k.......
[Tue Jun 30 13:17:01.369249 2015] [:error] [pid 1063] ipa: ERROR: non-public: TypeError: default/librpc/gen_ndr/py_lsa.c:9436: Expected type 'security.dom_sid' for 'py_dom_sid' of type 'NoneType' [Tue Jun 30 13:17:01.369285 2015] [:error] [pid 1063] Traceback (most recent call last): [Tue Jun 30 13:17:01.369289 2015] [:error] [pid 1063] File "/usr/lib/python2.7/site-packages/ipaserver/rpcserver.py", line 348, in wsgi_execute [Tue Jun 30 13:17:01.369292 2015] [:error] [pid 1063] result = self.Command[name](*args, **options) [Tue Jun 30 13:17:01.369294 2015] [:error] [pid 1063] File "/usr/lib/python2.7/site-packages/ipalib/frontend.py", line 439, in __call__ [Tue Jun 30 13:17:01.369303 2015] [:error] [pid 1063] ret = self.run(*args, **options) [Tue Jun 30 13:17:01.369306 2015] [:error] [pid 1063] File "/usr/lib/python2.7/site-packages/ipalib/frontend.py", line 754, in run [Tue Jun 30 13:17:01.369308 2015] [:error] [pid 1063] return self.execute(*args, **options) [Tue Jun 30 13:17:01.369310 2015] [:error] [pid 1063] File "/usr/lib/python2.7/site-packages/ipalib/plugins/trust.py", line 474, in execute [Tue Jun 30 13:17:01.369313 2015] [:error] [pid 1063] result = self.execute_ad(full_join, *keys, **options) [Tue Jun 30 13:17:01.369315 2015] [:error] [pid 1063] File "/usr/lib/python2.7/site-packages/ipalib/plugins/trust.py", line 709, in execute_ad [Tue Jun 30 13:17:01.369318 2015] [:error] [pid 1063] self.realm_passwd [Tue Jun 30 13:17:01.369320 2015] [:error] [pid 1063] File "/usr/lib/python2.7/site-packages/ipaserver/dcerpc.py", line 1222, in join_ad_full_credentials [Tue Jun 30 13:17:01.369323 2015] [:error] [pid 1063] self.remote_domain.establish_trust(self.local_domain, trustdom_pass) [Tue Jun 30 13:17:01.369325 2015] [:error] [pid 1063] File "/usr/lib/python2.7/site-packages/ipaserver/dcerpc.py", line 963, in establish_trust [Tue Jun 30 13:17:01.369327 2015] [:error] [pid 1063] self._pipe.DeleteTrustedDomain(self._policy_handle, res.info_ex.sid) [Tue Jun 30 13:17:01.369330 2015] [:error] [pid 1063] TypeError: default/librpc/gen_ndr/py_lsa.c:9436: Expected type 'security.dom_sid' for 'py_dom_sid' of type 'NoneType' [Tue Jun 30 13:17:01.369648 2015] [:error] [pid 1063] ipa: INFO: [jsonserver_session] admin@IPA.*redacted*: trust_add(u'*redacted*', trust_type=u'ad', realm_admin=u'*redacted*', realm_passwd=u'********', all=False, raw=False, version=u'2.112'): TypeError



These are whole logs with "log level = 100" set in smb.conf.empty. Log files were emptied before the above command was ran. If there is any other information required please let me know.

Software versions:
Fedora 22: 4.1.4
Fedora 22: 4.2 Alpha 1

Oracle Linux 7.1 64bit: without DNS
ipa-server.x86_64 - 4.1.0-18.0.1-el17_1.3
ipa-server-trust-ad.x86_64 - 4.1.0-18.0.1-el17_1.3

CentOS 7.1 64bit: With DNS
ipa-server.x86_64 - 4.1.0-18-el7.centos.3
ipa-server-trust-ad.x86_64 - 4.1.0-18-el7.centos.3


Regards,
David

--
Manage your subscription for the Freeipa-users mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-users
Go to http://freeipa.org for more info on the project

Reply via email to