The trust check succeeded... I have attached the pertinent logs... it
looks like it is timing out... I am not sure why though. The link
should be a little slower but it shouldn't be terrible, it is a 2Mb pipe.
mailtestbed:~# wbinfo -t
checking the trust secret via RPC calls succeeded
On 3/30/2010 9:47 AM, François Legal wrote:
> I'm not sure to 100% understand what you mean (it's been a long time since
> I last used an AD server with SFU).
> However, next step now will be to increase winbindd debug level while
> issuing the wbinfo -i command, and see what fails there.
>
> Try first an wbinfo -t, then if it succeeds, increase winbindd verbosity.
>
> François
>
> On Tue, 30 Mar 2010 09:09:09 -0500, Paul Lauss <[email protected]>
> wrote:
>
>> Hello,
>> Thank you so much for your reply! We are using AD 2003 R2 on both the
>> domain and the child domain. I am using 10000-29999 for IDs on the main
>> domain (RDOMAIN) and 30000-100000 on the child domain (KID).
>> Interestingly, in the Unix tab (in AD Users and Computers for any
>> object) under "NIS Domain" on any of the RDOMAIN servers we get the
>> pulldown option "RDOMAIN" but on the Trusted domains server the only
>> option is "KID". I'm not sure if that is expected or would affect this
>> but I can't seem to get the RDOMAIN option in the KID Trusted domain.
>>
>> Thanks,
>> -Paul
>>
>> On 3/30/2010 2:27 AM, François Legal wrote:
>>
>>> Hello,
>>>
>>> I'm not familiar with this kind of setup, but I wonder whether or not
>>>
> the
>
>>> KID domain has the SFU schema extensions setup for idmapping (see idmap
>>> backend = ad) and if porperly setup, check that the defined uid/gid for
>>> that domain fall in the idmap uid range
>>>
>>> François
>>>
>>> On Mon, 29 Mar 2010 17:54:37 -0500, Paul Lauss <[email protected]>
>>> wrote:
>>>
>>>
>>>> I have been killing myself on this issue over the last 2 weeks. I
>>>>
> have
>
>>>> setup pam AD authentication using winbind on our companies email
>>>> servers. That part is currently working. I have been trying to add
>>>>
> an
>
>>>> existing "Trusted" child domain and allow authentication from that
>>>> domain as well. I am part of the way there, but not quite to the
>>>> functional point as of yet. Our primary domain is rdomainprv or
>>>> rdomain.prv and the child domain is kid.rdomain.prv. Below is what I
>>>>
> am
>
>>>> seeing, followed by my configs. Also, we had to open ports 88, 139
>>>>
> and
>
>>>> 389 (I believe those are the correct ports, though the networking guys
>>>> opened them) from the email/winbind server to the child domain, at the
>>>> firewall. Any help would be very much appreciated!
>>>>
>>>> mailtestbed:~# wbinfo --all-domains
>>>> BUILTIN
>>>> MAILTESTBED
>>>> RDOMAINPRV
>>>> KID
>>>>
>>>> mailtestbed:~# wbinfo -u | grep testuser
>>>> KID\testuser
>>>>
>>>> mailtestbed:~# wbinfo -a KID\\testuser%password
>>>> plaintext password authentication succeeded
>>>> challenge/response password authentication succeeded
>>>>
>>>> Here is where it's falling apart:
>>>> mailtestbed:~# wbinfo -i KID\\testuser
>>>> Could not get info for user KID\testuser
>>>>
>>>> mailtestbed:~# id KID\\testuser
>>>> id: KID\testuser: No such user
>>>>
>>>> mailtestbed:~# id testuser
>>>> id: testuser: No such user
>>>>
>>>> mailtestbed:~# getent passwd KID\\testuser
>>>> mailtestbed:~#
>>>>
>>>> mailtestbed:~# getent passwd testuser
>>>> mailtestbed:~#
>>>>
>>>> mailtestbed:~# id RDOMAINPRV\\testmer
>>>> uid=10001(testmer) gid=10001 groups=999(users)
>>>>
>>>> mailtestbed:~# getent passwd RDOMAINPRV\\testmer
>>>> testmer:*:10001:10001::/home/testmer:/bin/bash
>>>>
>>>> mailtestbed:~# wbinfo -i RDOMAINPRV\\testmer
>>>> testmer:*:10001:10001::/home/testmer:/bin/bash
>>>>
>>>> Versions (Debian Lenny)
>>>> samba 2:3.2.5-4lenny9
>>>> winbind 2:3.2.5-4lenny9
>>>>
>>>> smb.conf
>>>> [global]
>>>> workgroup = RDOMAINPRV
>>>> realm = RDOMAIN.PRV
>>>> server string = %h server
>>>> dns proxy = no
>>>> name resolve order = lmhosts host wins bcast
>>>> log file = /var/log/samba/log.%m
>>>> max log size = 1000
>>>> syslog = 0
>>>> panic action = /usr/share/samba/panic-action %d
>>>> security = ADS
>>>> encrypt passwords = yes
>>>> passdb backend = tdbsam
>>>> obey pam restrictions = yes
>>>> unix password sync = yes
>>>> passwd program = /usr/bin/passwd %u
>>>> passwd chat = *Enter\snew\s*\spassword:* %n\n
>>>> *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* .
>>>> pam password change = yes
>>>> allow trusted domains = yes
>>>> winbind trusted domains only = no
>>>> idmap backend = ad
>>>> idmap uid = 10000-1000000
>>>> idmap gid = 10000-1000000
>>>> template homedir = /home/%U
>>>> winbind use default domain = yes
>>>> winbind nss info = rfc2307
>>>> winbind nested groups = yes
>>>> client use spnego = yes
>>>> client ntlmv2 auth = yes
>>>> restrict anonymous = 2
>>>> winbind enum groups = no
>>>> winbind enum users = no
>>>>
>>
>>>> winbind cache time = 30
>>>>
>>>> krb5.conf
>>>> [libdefaults]
>>>> default_realm = RDOMAIN.PRV
>>>> krb4_config = /etc/krb.conf
>>>> krb4_realms = /etc/krb.realms
>>>> kdc_timesync = 1
>>>> ccache_type = 4
>>>> forwardable = true
>>>> proxiable = true
>>>> default_tgs_enctypes = aes256-cts arcfour-hmac-md5
>>>> des3-hmac-sha1 des-cbc-crc des-cbc-md5
>>>> default_tkt_enctypes = aes256-cts arcfour-hmac-md5
>>>> des3-hmac-sha1 des-cbc-crc des-cbc-md5
>>>> permitted_enctypes = aes256-cts arcfour-hmac-md5
>>>>
> des3-hmac-sha1
>
>>>> des-cbc-crc des-cbc-md5
>>>> v4_instance_resolve = false
>>>> v4_name_convert = {
>>>> host = {
>>>> rcmd = host
>>>> ftp = ftp
>>>> }
>>>> plain = {
>>>> something = something-else
>>>> }
>>>> }
>>>> fcc-mit-ticketflags = true
>>>> [realms]
>>>> RDOMAIN.PRV = {
>>>> default_domain = RDOMAIN.PRV
>>>> master_kdc = dc02.rdomain.prv
>>>> admin_server = dc02.rdomain.prv
>>>> kdc = aurad.rdomain.prv
>>>> kdc = addc01.rdomain.prv
>>>> kdc = addc02.rdomain.prv
>>>> kdc = addc03.rdomain.prv
>>>> #kdc = addc04.rdomain.prv
>>>> kdc = addc05.rdomain.prv
>>>> kdc = chlddc01.kid.rdomain.prv
>>>> }
>>>> KID.RDOMAIN.PRV = {
>>>> default_domain = KID.RDOMAIN.PRV
>>>> kdc = chlddc01.kid.rdomain.prv
>>>> master_kdc = addc02.rdomain.prv
>>>> admin_server = addc02.rdomain.prv
>>>> kdc = addc01.rdomain.prv
>>>> kdc = addc02.rdomain.prv
>>>> }
>>>> [domain_realm]
>>>> .rdomain.prv = RDOMAIN.PRV
>>>> rdomain.prv = RDOMAIN.PRV
>>>> .kid.rdomain.prv = KID.RDOMAIN.PRV
>>>> kid.rdomain.prv = KID.RDOMAIN.PRV
>>>> [kdc]
>>>> profile = /var/kerberos/krb5kdc/kdc.conf
>>>> [appdefaults]
>>>> pam = {
>>>> debug = false
>>>> ticket_lifetime = 36000
>>>> renew_lifetime = 36000
>>>> forwardable = true
>>>> krb4_convert = false
>>>> validate = true
>>>> }
>>>> [login]
>>>> krb4_convert = true
>>>> krb4_get_tickets = false
>>>>
>>>>
[2010/03/30 11:10:09, 10] rpc_client/cli_pipe.c:rpc_api_pipe(893)
rpc_api_pipe: Remote machine ADDC05.rdomain.prv pipe \NETLOGON fnum 0x800f
returned 640 bytes.
netr_DsRGetDCName: struct netr_DsRGetDCName
out: struct netr_DsRGetDCName
info : *
info : *
info: struct netr_DsRGetDCNameInfo
dc_unc : *
dc_unc :
'\\chlddc01.kid.rdomain.prv'
dc_address : *
dc_address : '\\10.5.28.3'
dc_address_type : DS_ADDRESS_TYPE_INET (1)
domain_guid :
5e4eeaf2-76ed-4295-89dc-59eb027a3d03
domain_name : *
domain_name : 'kid.rdomain.prv'
forest_name : *
forest_name : 'rdomain.prv'
dc_flags : 0xe00001fd (3758096893)
1: DS_SERVER_PDC
1: DS_SERVER_GC
1: DS_SERVER_LDAP
1: DS_SERVER_DS
1: DS_SERVER_KDC
1: DS_SERVER_TIMESERV
1: DS_SERVER_CLOSEST
1: DS_SERVER_WRITABLE
0: DS_SERVER_GOOD_TIMESERV
0: DS_SERVER_NDNC
0: DS_SERVER_SELECT_SECRET_DOMAIN_6
0: DS_SERVER_FULL_SECRET_DOMAIN_6
1: DS_DNS_CONTROLLER
1: DS_DNS_DOMAIN
1: DS_DNS_FOREST
dc_site_name : *
dc_site_name : 'Manila'
client_site_name : *
client_site_name : 'DataCenter'
result : WERR_OK
[2010/03/30 11:10:09, 10] winbindd/winbindd_cm.c:get_dc_name_via_netlogon(664)
rpccli_netr_GetAnyDCName returned chlddc01.kid.rdomain.prv
[2010/03/30 11:10:09, 10] lib/gencache.c:gencache_get(208)
Returning valid cache entry: key = AD_SITENAME/DOMAIN/rdomain.prv, value =
DataCenter, timeout = Sun Feb 7 00:28:15 2106
[2010/03/30 11:10:09, 5] libads/dns.c:sitename_fetch(817)
sitename_fetch: Returning sitename for rdomain.prv: "DataCenter"
[2010/03/30 11:10:09, 10] libsmb/namequery.c:internal_resolve_name(1443)
internal_resolve_name: looking up chlddc01.kid.rdomain.prv#20 (sitename
DataCenter)
[2010/03/30 11:10:09, 10] lib/gencache.c:gencache_get(208)
Returning expired cache entry: key = NBT/chlddc01.kid.rdomain.prv#20, value =
10.5.28.3:0, timeout = Thu Mar 25 15:01:03 2010
[2010/03/30 11:10:09, 5] libsmb/namecache.c:namecache_fetch(229)
no entry for chlddc01.kid.rdomain.prv#20 found.
[2010/03/30 11:10:09, 3] libsmb/namequery.c:resolve_lmhosts(1162)
resolve_lmhosts: Attempting lmhosts lookup for name
chlddc01.kid.rdomain.prv<0x20>
[2010/03/30 11:10:09, 4] libsmb/namequery.c:getlmhostsent(846)
getlmhostsent: lmhost entry: 10.5.28.3 CHLDDC01
[2010/03/30 11:10:09, 4] libsmb/namequery.c:getlmhostsent(846)
getlmhostsent: lmhost entry: 10.5.28.3 chlddc01.kid.rdomain.prv
[2010/03/30 11:10:09, 10] libsmb/namequery.c:remove_duplicate_addrs2(520)
remove_duplicate_addrs2: looking for duplicate address/port pairs
[2010/03/30 11:10:09, 5] libsmb/namecache.c:namecache_store(143)
namecache_store: storing 1 address for chlddc01.kid.rdomain.prv#20: 10.5.28.3
[2010/03/30 11:10:09, 10] lib/gencache.c:gencache_set(131)
Adding cache entry with key = NBT/chlddc01.kid.rdomain.prv#20; value =
10.5.28.3:0 and timeout = Tue Mar 30 11:21:09 2010
(660 seconds ahead)
[2010/03/30 11:10:09, 10] libsmb/namequery.c:internal_resolve_name(1590)
internal_resolve_name: returning 1 addresses: 10.5.28.3:0
[2010/03/30 11:10:09, 10] winbindd/winbindd_cm.c:get_dcs(1178)
Retrieved DC chlddc01.kid.rdomain.prv at 10.5.28.3 via netlogon
[2010/03/30 11:10:09, 10] winbindd/winbindd_cm.c:cm_prepare_connection(753)
cm_prepare_connection: connecting to DC chlddc01.kid.rdomain.prv for domain
PHUB
[2010/03/30 11:10:09, 6] libsmb/clientgen.c:write_socket(236)
write_socket(22,72)
[...]
[2010/03/30 11:10:11, 10] rpc_parse/parse_prs.c:schannel_decode(1743)
SCHANNEL: schannel_decode seq_num=3 data_len=784
[2010/03/30 11:10:11, 10] rpc_parse/parse_prs.c:schannel_decode(1763)
SCHANNEL: schannel_decode seq_num=3 data_len=784
[2010/03/30 11:10:11, 10]
rpc_client/cli_pipe.c:cli_pipe_validate_current_pdu(576)
cli_pipe_validate_current_pdu: got pdu len 848, data_len 772, ss_len 12
[2010/03/30 11:10:11, 10] rpc_client/cli_pipe.c:rpc_api_pipe(842)
rpc_api_pipe: got PDU len of 848 at offset 0
[2010/03/30 11:10:11, 10] rpc_client/cli_pipe.c:rpc_api_pipe(893)
rpc_api_pipe: Remote machine ADDC05.rdomain.prv pipe \NETLOGON fnum 0x800f
returned 1544 bytes.
netr_DsrEnumerateDomainTrusts: struct netr_DsrEnumerateDomainTrusts
out: struct netr_DsrEnumerateDomainTrusts
trusts : *
trusts: struct netr_DomainTrustList
count : 0x00000006 (6)
array : *
array: ARRAY(6)
array: struct netr_DomainTrust
netbios_name : *
netbios_name : 'EXTRDOMAINPRV'
dns_name : *
dns_name :
'external.rdomain.prv'
trust_flags : 0x00000023 (35)
1: NETR_TRUST_FLAG_IN_FOREST
1: NETR_TRUST_FLAG_OUTBOUND
0: NETR_TRUST_FLAG_TREEROOT
0: NETR_TRUST_FLAG_PRIMARY
0: NETR_TRUST_FLAG_NATIVE
1: NETR_TRUST_FLAG_INBOUND
parent_index : 0x00000005 (5)
trust_type :
NETR_TRUST_TYPE_UPLEVEL (2)
trust_attributes : 0x00000020 (32)
0: NETR_TRUST_ATTRIBUTE_NON_TRANSITIVE
0: NETR_TRUST_ATTRIBUTE_UPLEVEL_ONLY
0:
NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN
0:
NETR_TRUST_ATTRIBUTE_FOREST_TRANSITIVE
0:
NETR_TRUST_ATTRIBUTE_CROSS_ORGANIZATION
1: NETR_TRUST_ATTRIBUTE_WITHIN_FOREST
0:
NETR_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL
sid : *
sid :
S-1-5-21-1597506669-720194359-3590636158
guid :
065cb337-3975-46ff-976a-3577b6fd03c8
array: struct netr_DomainTrust
netbios_name : *
netbios_name : 'USTNET'
dns_name : NULL
trust_flags : 0x00000022 (34)
0: NETR_TRUST_FLAG_IN_FOREST
1: NETR_TRUST_FLAG_OUTBOUND
0: NETR_TRUST_FLAG_TREEROOT
0: NETR_TRUST_FLAG_PRIMARY
0: NETR_TRUST_FLAG_NATIVE
1: NETR_TRUST_FLAG_INBOUND
parent_index : 0x00000000 (0)
trust_type :
NETR_TRUST_TYPE_DOWNLEVEL (1)
trust_attributes : 0x00000004 (4)
0: NETR_TRUST_ATTRIBUTE_NON_TRANSITIVE
0: NETR_TRUST_ATTRIBUTE_UPLEVEL_ONLY
1:
NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN
0:
NETR_TRUST_ATTRIBUTE_FOREST_TRANSITIVE
0:
NETR_TRUST_ATTRIBUTE_CROSS_ORGANIZATION
0: NETR_TRUST_ATTRIBUTE_WITHIN_FOREST
0:
NETR_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL
sid : *
sid :
S-1-5-21-1803833563-1315966708-355810188
guid :
00000000-0000-0000-0000-000000000000
array: struct netr_DomainTrust
netbios_name : *
netbios_name : 'SDOMAIN'
dns_name : NULL
trust_flags : 0x00000022 (34)
0: NETR_TRUST_FLAG_IN_FOREST
1: NETR_TRUST_FLAG_OUTBOUND
0: NETR_TRUST_FLAG_TREEROOT
0: NETR_TRUST_FLAG_PRIMARY
0: NETR_TRUST_FLAG_NATIVE
1: NETR_TRUST_FLAG_INBOUND
parent_index : 0x00000000 (0)
trust_type :
NETR_TRUST_TYPE_DOWNLEVEL (1)
trust_attributes : 0x00000004 (4)
0: NETR_TRUST_ATTRIBUTE_NON_TRANSITIVE
0: NETR_TRUST_ATTRIBUTE_UPLEVEL_ONLY
1:
NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN
0:
NETR_TRUST_ATTRIBUTE_FOREST_TRANSITIVE
0:
NETR_TRUST_ATTRIBUTE_CROSS_ORGANIZATION
0: NETR_TRUST_ATTRIBUTE_WITHIN_FOREST
0:
NETR_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL
sid : *
sid :
S-1-5-21-2100367721-831330134-1706709998
guid :
00000000-0000-0000-0000-000000000000
array: struct netr_DomainTrust
netbios_name : *
netbios_name : 'MEC'
dns_name : NULL
trust_flags : 0x00000022 (34)
0: NETR_TRUST_FLAG_IN_FOREST
1: NETR_TRUST_FLAG_OUTBOUND
0: NETR_TRUST_FLAG_TREEROOT
0: NETR_TRUST_FLAG_PRIMARY
0: NETR_TRUST_FLAG_NATIVE
1: NETR_TRUST_FLAG_INBOUND
parent_index : 0x00000000 (0)
trust_type :
NETR_TRUST_TYPE_DOWNLEVEL (1)
trust_attributes : 0x00000004 (4)
0: NETR_TRUST_ATTRIBUTE_NON_TRANSITIVE
0: NETR_TRUST_ATTRIBUTE_UPLEVEL_ONLY
1:
NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN
0:
NETR_TRUST_ATTRIBUTE_FOREST_TRANSITIVE
0:
NETR_TRUST_ATTRIBUTE_CROSS_ORGANIZATION
0: NETR_TRUST_ATTRIBUTE_WITHIN_FOREST
0:
NETR_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL
sid : *
sid :
S-1-5-21-1702257101-1623065054-1714775081
guid :
00000000-0000-0000-0000-000000000000
array: struct netr_DomainTrust
netbios_name : *
netbios_name : 'KID'
dns_name : *
dns_name :
'kid.rdomain.prv'
trust_flags : 0x00000023 (35)
1: NETR_TRUST_FLAG_IN_FOREST
1: NETR_TRUST_FLAG_OUTBOUND
0: NETR_TRUST_FLAG_TREEROOT
0: NETR_TRUST_FLAG_PRIMARY
0: NETR_TRUST_FLAG_NATIVE
1: NETR_TRUST_FLAG_INBOUND
parent_index : 0x00000005 (5)
trust_type :
NETR_TRUST_TYPE_UPLEVEL (2)
trust_attributes : 0x00000020 (32)
0: NETR_TRUST_ATTRIBUTE_NON_TRANSITIVE
0: NETR_TRUST_ATTRIBUTE_UPLEVEL_ONLY
0:
NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN
0:
NETR_TRUST_ATTRIBUTE_FOREST_TRANSITIVE
0:
NETR_TRUST_ATTRIBUTE_CROSS_ORGANIZATION
1: NETR_TRUST_ATTRIBUTE_WITHIN_FOREST
0:
NETR_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL
sid : *
sid :
S-1-5-21-29899443-2986348974-2400605501
guid :
5e4eeaf2-76ed-4295-89dc-59eb027a3d03
array: struct netr_DomainTrust
netbios_name : *
netbios_name : 'RDOMAINPRV'
dns_name : *
dns_name : 'rdomain.prv'
trust_flags : 0x0000001d (29)
1: NETR_TRUST_FLAG_IN_FOREST
0: NETR_TRUST_FLAG_OUTBOUND
1: NETR_TRUST_FLAG_TREEROOT
1: NETR_TRUST_FLAG_PRIMARY
1: NETR_TRUST_FLAG_NATIVE
0: NETR_TRUST_FLAG_INBOUND
parent_index : 0x00000000 (0)
trust_type :
NETR_TRUST_TYPE_UPLEVEL (2)
trust_attributes : 0x00000000 (0)
0: NETR_TRUST_ATTRIBUTE_NON_TRANSITIVE
0: NETR_TRUST_ATTRIBUTE_UPLEVEL_ONLY
0:
NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN
0:
NETR_TRUST_ATTRIBUTE_FOREST_TRANSITIVE
0:
NETR_TRUST_ATTRIBUTE_CROSS_ORGANIZATION
0: NETR_TRUST_ATTRIBUTE_WITHIN_FOREST
0:
NETR_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL
sid : *
sid :
S-1-5-21-807755311-932547689-390315301
guid :
4565fe06-c79d-4b08-94f0-d671452eb6aa
result : WERR_OK
[2010/03/30 11:10:11, 5]
winbindd/winbindd_cm.c:set_dc_type_and_flags_trustinfo(1715)
set_dc_type_and_flags_trustinfo: domain KID is NOT in native mode.
[2010/03/30 11:10:11, 5]
winbindd/winbindd_cm.c:set_dc_type_and_flags_trustinfo(1719)
set_dc_type_and_flags_trustinfo: domain KID is running active directory.
[2010/03/30 11:10:11, 10]
winbindd/winbindd_cache.c:wcache_tdc_fetch_domain(3863)
wcache_tdc_fetch_domain: Searching for domain KID
[2010/03/30 11:10:11, 10]
winbindd/winbindd_cache.c:wcache_tdc_fetch_domain(3878)
wcache_tdc_fetch_domain: Found domain KID
[2010/03/30 11:10:11, 10] lib/events.c:event_add_timed(128)
Added timed event "async_request_timeout": 97a4a0
[2010/03/30 11:10:11, 10] lib/events.c:get_timed_events_timeout(318)
timed_events_timeout: 299/999822
[2010/03/30 11:10:11, 10] lib/events.c:timed_event_destructor(65)
Destroying timed event 97a4a0 "async_request_timeout"
[2010/03/30 11:10:11, 10]
winbindd/winbindd_cache.c:cache_retrieve_response(2463)
Retrieving response for pid 23898
[2010/03/30 11:10:11, 10] winbindd/winbindd_dual.c:fork_domain_child(1001)
fork_domain_child called for domain 'KID'
[2010/03/30 11:10:11, 10] lib/events.c:event_add_timed(128)
Added timed event "async_request_timeout": 9a6ee0
[2010/03/30 11:10:11, 10] lib/events.c:get_timed_events_timeout(318)
timed_events_timeout: 299/999832
[2010/03/30 11:10:13, 10] lib/events.c:timed_event_destructor(65)
Destroying timed event 9a6ee0 "async_request_timeout"
[2010/03/30 11:10:13, 10]
winbindd/winbindd_cache.c:cache_retrieve_response(2463)
Retrieving response for pid 23902
[2010/03/30 11:10:13, 10] lib/events.c:event_add_timed(128)
Added timed event "async_request_timeout": 9a5570
[2010/03/30 11:10:13, 10] lib/events.c:get_timed_events_timeout(318)
timed_events_timeout: 299/999967
[2010/03/30 11:10:13, 10] lib/events.c:timed_event_destructor(65)
Destroying timed event 9a5570 "async_request_timeout"
[2010/03/30 11:10:13, 10]
winbindd/winbindd_cache.c:cache_retrieve_response(2463)
Retrieving response for pid 23900
[2010/03/30 11:10:13, 5] winbindd/winbindd_idmap.c:winbindd_sid2uid_recv(289)
sid2uid returned an error
[2010/03/30 11:10:13, 5] winbindd/winbindd_user.c:getpwsid_sid2uid_recv(293)
Could not query uid for user KID\testuser
[2010/03/30 11:10:43, 10] lib/events.c:event_add_timed(128)
Added timed event "async_request_timeout": 97a4a0
[2010/03/30 11:10:43, 10] lib/events.c:get_timed_events_timeout(318)
timed_events_timeout: 299/999922
[2010/03/30 11:10:43, 10] lib/events.c:timed_event_destructor(65)
Destroying timed event 97a4a0 "async_request_timeout"
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba