https://bugs.kde.org/show_bug.cgi?id=435478
--- Comment #4 from mako...@hotmail.com --- alexandre@alexandre:~$ kwriteconfig5 --file kioslaverc --group SMB --key DebugLevel 10 alexandre@alexandre:~$ export KDE_FORK_SLAVES=1 alexandre@alexandre:~$ export QT_MESSAGE_PATTERN='[%{time process}](%{pid})/(%{category}) %{function}: %{message}' alexandre@alexandre:~$ export QT_LOGGING_RULES='log_kio_smb=true' alexandre@alexandre:~$ dolphin --new-window smb://Alexandre@diskstation.local/photo/ [ 0.000](3021)/(log_kio_smb) unknown: auth_initialize_smbc [ 0.000](3021)/(log_kio_smb) unknown: Setting debug level to: 10 INFO: Current debug levels: all: 10 tdb: 10 printdrivers: 10 lanman: 10 smb: 10 rpc_parse: 10 rpc_srv: 10 rpc_cli: 10 passdb: 10 sam: 10 auth: 10 winbind: 10 vfs: 10 idmap: 10 quota: 10 acls: 10 locking: 10 msdfs: 10 dmapi: 10 registry: 10 scavenger: 10 dns: 10 ldb: 10 tevent: 10 auth_audit: 10 auth_json_audit: 10 kerberos: 10 drs_repl: 10 smb2: 10 smb2_credits: 10 dsdb_audit: 10 dsdb_json_audit: 10 dsdb_password_audit: 10 dsdb_password_json_audit: 10 dsdb_transaction_audit: 10 dsdb_transaction_json_audit: 10 dsdb_group_audit: 10 dsdb_group_json_audit: 10 Using netbios name ALEXANDRE. Using workgroup WORKGROUP. [ 0.000](3021)/(log_kio_smb) unknown: Using libsmbclient library version 4.11.6 [ 0.055](3021)/(log_kio_smb) unknown: QUrl("smb://Alexandre@diskstation.local/photo") [ 0.055](3021)/(log_kio_smb) unknown: checkURL QUrl("smb://Alexandre@diskstation.local/photo") [ 0.055](3021)/(log_kio_smb) unknown: checkURL return3 QUrl("smb://Alexandre@diskstation.local/photo") [ 0.055](3021)/(log_kio_smb) unknown: updateCache "/photo" [ 0.055](3021)/(log_kio_smb) unknown: Starting discovery. parsed path: fname='smb://Alexandre@diskstation.local/photo' server='diskstation.local' share='photo' path='' options='' SMBC_check_options(): server='diskstation.local' share='photo' path='' options='' [ 0.055](3021)/(log_kio_smb) unknown: auth_smbc_get_dat: set user= Alexandre , workgroup= WORKGROUP server= diskstation.local , share= photo [ 0.055](3021)/(log_kio_smb) unknown: updateCache "/photo" [ 0.055](3021)/(log_kio_smb) unknown: libsmb-auth-callback URL: QUrl("smb://diskstation.local/photo") [ 0.057](3021)/(log_kio_smb) unknown: got password through cache "Alexandre" SMBC_server: server_n=[diskstation.local] server=[diskstation.local] -> server_n=[diskstation.local] server=[diskstation.local] Opening cache file at /run/samba/gencache.tdb tdb(/run/samba/gencache.tdb): tdb_open_ex: could not open file /run/samba/gencache.tdb: Permission non accordée Opening /run/samba/gencache.tdb failed: Permission non accordée sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up diskstation.local#20 (sitename (null)) Opening cache file at /run/samba/gencache.tdb tdb(/run/samba/gencache.tdb): tdb_open_ex: could not open file /run/samba/gencache.tdb: Permission non accordée Opening /run/samba/gencache.tdb failed: Permission non accordée no entry for diskstation.local#20 found. resolve_hosts: Attempting host lookup for name diskstation.local<0x20> remove_duplicate_addrs2: looking for duplicate address/port pairs namecache_store: storing 1 address for diskstation.local#20: 192.168.1.15 Opening cache file at /run/samba/gencache.tdb tdb(/run/samba/gencache.tdb): tdb_open_ex: could not open file /run/samba/gencache.tdb: Permission non accordée Opening /run/samba/gencache.tdb failed: Permission non accordée internal_resolve_name: returning 1 addresses: 192.168.1.15:0 Connecting to 192.168.1.15 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 131072 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 [ 0.000](3025)/(log_kio_smb) unknown: auth_initialize_smbc [ 0.000](3025)/(log_kio_smb) unknown: Setting debug level to: 10 INFO: Current debug levels: all: 10 tdb: 10 printdrivers: 10 lanman: 10 smb: 10 rpc_parse: 10 rpc_srv: 10 rpc_cli: 10 passdb: 10 sam: 10 auth: 10 winbind: 10 vfs: 10 idmap: 10 quota: 10 acls: 10 locking: 10 msdfs: 10 dmapi: 10 registry: 10 scavenger: 10 dns: 10 ldb: 10 tevent: 10 auth_audit: 10 auth_json_audit: 10 kerberos: 10 drs_repl: 10 smb2: 10 smb2_credits: 10 dsdb_audit: 10 dsdb_json_audit: 10 dsdb_password_audit: 10 dsdb_password_json_audit: 10 dsdb_transaction_audit: 10 dsdb_transaction_json_audit: 10 dsdb_group_audit: 10 dsdb_group_json_audit: 10 Using netbios name ALEXANDRE. Using workgroup WORKGROUP. [ 0.000](3025)/(log_kio_smb) unknown: Using libsmbclient library version 4.11.6 cli_session_creds_prepare_krb5: Doing kinit for Alexandre@WORKGROUP to access diskstation.local kerberos_kinit_password_ext: as Alexandre@WORKGROUP using [MEMORY:cliconnect] as ccache and config [(null)] Kinit for Alexandre@WORKGROUP to access diskstation.local failed: Cannot contact any KDC for requested realm cli_session_setup_spnego_send: Connect to diskstation.local as Alexandre@WORKGROUP using SPNEGO GENSEC backend 'gssapi_spnego' registered GENSEC backend 'gssapi_krb5' registered GENSEC backend 'gssapi_krb5_sasl' registered GENSEC backend 'spnego' registered GENSEC backend 'schannel' registered GENSEC backend 'naclrpc_as_system' registered GENSEC backend 'sasl-EXTERNAL' registered GENSEC backend 'ntlmssp' registered GENSEC backend 'ntlmssp_resume_ccache' registered GENSEC backend 'http_basic' registered GENSEC backend 'http_ntlm' registered GENSEC backend 'http_negotiate' registered GENSEC backend 'krb5' registered GENSEC backend 'fake_gssapi_krb5' registered Starting GENSEC mechanism spnego Starting GENSEC submechanism gse_krb5 smb_gss_krb5_import_cred ccache[MEMORY:cliconnect] failed with [ Miscellaneous failure (see text): unknown mech-code 2 for mech 1 2 840 113554 1 2 2] -the caller may retry after a kinit. Failed to start GENSEC client mech gse_krb5: NT_STATUS_INTERNAL_ERROR Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x55cc66933e60]: subreq: 0x55cc66907a40 gensec_update_send: spnego[0x55cc6692e1d0]: subreq: 0x55cc66933410 gensec_update_done: ntlmssp[0x55cc66933e60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55cc66907a40/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x55cc66907bf0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x55cc6692e1d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55cc66933410/../../auth/gensec/spnego.c:1630]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x55cc669335c0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2115] Got challenge flags: Got NTLMSSP neg_flags=0x628a8215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_SERVER NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH short string '', sent with NULL termination despite NOTERM flag in IDL challenge: struct CHALLENGE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmChallenge (0x2) TargetNameLen : 0x0016 (22) TargetNameMaxLen : 0x0016 (22) TargetName : * TargetName : 'DISKSTATION' NegotiateFlags : 0x628a8215 (1653244437) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 1: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 1: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 ServerChallenge : 45be990c09d3b3f1 Reserved : 0000000000000000 TargetInfoLen : 0x0064 (100) TargetInfoMaxLen : 0x0064 (100) TargetInfo : * TargetInfo: struct AV_PAIR_LIST count : 0x00000006 (6) pair: ARRAY(6) pair: struct AV_PAIR AvId : MsvAvNbDomainName (0x2) AvLen : 0x0016 (22) Value : union ntlmssp_AvValue(case 0x2) AvNbDomainName : 'DISKSTATION' pair: struct AV_PAIR AvId : MsvAvNbComputerName (0x1) AvLen : 0x0016 (22) Value : union ntlmssp_AvValue(case 0x1) AvNbComputerName : 'DISKSTATION' pair: struct AV_PAIR AvId : MsvAvDnsDomainName (0x4) AvLen : 0x0002 (2) [ 0.022](3025)/(log_kio_smb) unknown: QUrl("smb://Alexandre@diskstation.local/photo/") Value : union ntlmssp_AvValue(case 0x4) AvDnsDomainName : '' pair: struct AV_PAIR AvId : MsvAvDnsComputerName (0x3) [ 0.022](3025)/(log_kio_smb) unknown: updateCache "/photo" AvLen : 0x0016 (22) Value : union ntlmssp_AvValue(case 0x3) AvDnsComputerName : 'diskstation' pair: struct AV_PAIR AvId : MsvAvTimestamp (0x7) AvLen : 0x0008 (8) Value : union ntlmssp_AvValue(case 0x7) smbc_stat(smb://Alexandre@diskstation.local/photo) AvTimestamp : jeu. avril 8 19:42:37 2021 CEST pair: struct AV_PAIR AvId : MsvAvEOL (0x0) AvLen : 0x0000 (0) Value : union ntlmssp_AvValue(case 0x0) [ 0.022](3025)/(log_kio_smb) unknown: auth_smbc_get_dat: set user= Alexandre , workgroup= WORKGROUP server= diskstation.local , share= photo Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1) ProductBuild : 0x0000 (0) Reserved : 000000 NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF) short string '', sent with NULL termination despite NOTERM flag in IDL [ 0.022](3025)/(log_kio_smb) unknown: updateCache "/photo" [ 0.022](3025)/(log_kio_smb) unknown: libsmb-auth-callback URL: QUrl("smb://diskstation.local/photo") short string '', sent with NULL termination despite NOTERM flag in IDL authenticate: struct AUTHENTICATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmAuthenticate (3) LmChallengeResponseLen : 0x0018 (24) LmChallengeResponseMaxLen: 0x0018 (24) LmChallengeResponse : * LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case 24) v1: struct LM_RESPONSE Response : 000000000000000000000000000000000000000000000000 NtChallengeResponseLen : 0x0110 (272) NtChallengeResponseMaxLen: 0x0110 (272) NtChallengeResponse : * NtChallengeResponse : union ntlmssp_NTLM_RESPONSE_with_len(case 272) v2: struct NTLMv2_RESPONSE Response : 8603f961ee8d8288a86dea31407d01f4 Challenge: struct NTLMv2_CLIENT_CHALLENGE RespType : 0x01 (1) HiRespType : 0x01 (1) Reserved1 : 0x0000 (0) Reserved2 : 0x00000000 (0) TimeStamp : jeu. avril 8 19:42:37 2021 CEST ChallengeFromClient : 3b022726c87861e1 Reserved3 : 0x00000000 (0) AvPairs: struct AV_PAIR_LIST count : 0x0000000a (10) pair: ARRAY(10) pair: struct AV_PAIR AvId : MsvAvNbDomainName (0x2) AvLen : 0x0016 (22) Value : union ntlmssp_AvValue(case 0x2) AvNbDomainName : 'DISKSTATION' pair: struct AV_PAIR AvId : MsvAvNbComputerName (0x1) AvLen : 0x0016 (22) Value : union ntlmssp_AvValue(case 0x1) AvNbComputerName : 'DISKSTATION' pair: struct AV_PAIR AvId : MsvAvDnsDomainName (0x4) AvLen : 0x0002 (2) Value : union ntlmssp_AvValue(case 0x4) AvDnsDomainName : '' pair: struct AV_PAIR AvId : MsvAvDnsComputerName (0x3) AvLen : 0x0016 (22) Value : union ntlmssp_AvValue(case 0x3) AvDnsComputerName : 'diskstation' pair: struct AV_PAIR AvId : MsvAvTimestamp (0x7) AvLen : 0x0008 (8) Value : union ntlmssp_AvValue(case 0x7) AvTimestamp : jeu. avril 8 19:42:37 2021 CEST pair: struct AV_PAIR AvId : MsvAvFlags (0x6) AvLen : 0x0004 (4) Value : union ntlmssp_AvValue(case 0x6) AvFlags : 0x00000002 (2) 0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT 1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE 0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE pair: struct AV_PAIR AvId : MsvAvSingleHost (0x8) AvLen : 0x0030 (48) Value : union ntlmssp_AvValue(case 0x8) AvSingleHost: struct ntlmssp_SingleHostData Size : 0x00000030 (48) Z4 : 0x00000000 (0) token_info: struct LSAP_TOKEN_INFO_INTEGRITY Flags : 0x00000000 (0) TokenIL : 0x00000000 (0) MachineId : 7b5019682259e41f952597ac73ed1a27e63d3dcf3014d612c0ccfd6572fd9b43 remaining : DATA_BLOB length=0 pair: struct AV_PAIR AvId : MsvChannelBindings (0xA) AvLen : 0x0010 (16) Value : union ntlmssp_AvValue(case 0xA) ChannelBindings : 00000000000000000000000000000000 pair: struct AV_PAIR AvId : MsvAvTargetName (0x9) AvLen : 0x002c (44) Value : union ntlmssp_AvValue(case 0x9) AvTargetName : 'cifs/diskstation.local' pair: struct AV_PAIR AvId : MsvAvEOL (0x0) AvLen : 0x0000 (0) Value : union ntlmssp_AvValue(case 0x0) DomainNameLen : 0x0012 (18) DomainNameMaxLen : 0x0012 (18) DomainName : * DomainName : 'WORKGROUP' UserNameLen : 0x0012 (18) UserNameMaxLen : 0x0012 (18) UserName : * UserName : 'Alexandre' WorkstationLen : 0x0012 (18) WorkstationMaxLen : 0x0012 (18) Workstation : * Workstation : 'ALEXANDRE' EncryptedRandomSessionKeyLen: 0x0010 (16) EncryptedRandomSessionKeyMaxLen: 0x0010 (16) EncryptedRandomSessionKey: * EncryptedRandomSessionKey: DATA_BLOB length=16 [0000] A3 BE 70 01 A2 62 2B 64 D9 D1 66 AE 56 C3 DE BF ..p..b+d ..f.V... NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x55cc66933e60]: subreq: 0x55cc66928c50 gensec_update_send: spnego[0x55cc6692e1d0]: subreq: 0x55cc66937990 gensec_update_done: ntlmssp[0x55cc66933e60]: NT_STATUS_OK tevent_req[0x55cc66928c50/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x55cc66928e00)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x55cc6692e1d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55cc66937990/../../auth/gensec/spnego.c:1630]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x55cc66937b40)] timer[(nil)] finish[../../auth/gensec/spnego.c:2115] [ 0.024](3025)/(log_kio_smb) unknown: got password through cache "Alexandre" SMBC_server: server_n=[diskstation.local] server=[diskstation.local] -> server_n=[diskstation.local] server=[diskstation.local] Opening cache file at /run/samba/gencache.tdb tdb(/run/samba/gencache.tdb): tdb_open_ex: could not open file /run/samba/gencache.tdb: Permission non accordée Opening /run/samba/gencache.tdb failed: Permission non accordée sitename_fetch: No stored sitename for realm '' internal_resolve_name: looking up diskstation.local#20 (sitename (null)) Opening cache file at /run/samba/gencache.tdb tdb(/run/samba/gencache.tdb): tdb_open_ex: could not open file /run/samba/gencache.tdb: Permission non accordée Opening /run/samba/gencache.tdb failed: Permission non accordée no entry for diskstation.local#20 found. resolve_hosts: Attempting host lookup for name diskstation.local<0x20> remove_duplicate_addrs2: looking for duplicate address/port pairs namecache_store: storing 1 address for diskstation.local#20: 192.168.1.15 Opening cache file at /run/samba/gencache.tdb tdb(/run/samba/gencache.tdb): tdb_open_ex: could not open file /run/samba/gencache.tdb: Permission non accordée Opening /run/samba/gencache.tdb failed: Permission non accordée internal_resolve_name: returning 1 addresses: 192.168.1.15:0 Connecting to 192.168.1.15 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 131072 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x55cc6692e1d0]: subreq: 0x55cc66937990 gensec_update_done: spnego[0x55cc6692e1d0]: NT_STATUS_OK tevent_req[0x55cc66937990/../../auth/gensec/spnego.c:1630]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x55cc66937b40)] timer[(nil)] finish[../../auth/gensec/spnego.c:2115] session setup ok signed SMB2 message cli_session_creds_prepare_krb5: Doing kinit for Alexandre@WORKGROUP to access diskstation.local kerberos_kinit_password_ext: as Alexandre@WORKGROUP using [MEMORY:cliconnect] as ccache and config [(null)] Kinit for Alexandre@WORKGROUP to access diskstation.local failed: Cannot contact any KDC for requested realm cli_session_setup_spnego_send: Connect to diskstation.local as Alexandre@WORKGROUP using SPNEGO GENSEC backend 'gssapi_spnego' registered GENSEC backend 'gssapi_krb5' registered GENSEC backend 'gssapi_krb5_sasl' registered GENSEC backend 'spnego' registered GENSEC backend 'schannel' registered GENSEC backend 'naclrpc_as_system' registered GENSEC backend 'sasl-EXTERNAL' registered GENSEC backend 'ntlmssp' registered GENSEC backend 'ntlmssp_resume_ccache' registered GENSEC backend 'http_basic' registered GENSEC backend 'http_ntlm' registered GENSEC backend 'http_negotiate' registered GENSEC backend 'krb5' registered GENSEC backend 'fake_gssapi_krb5' registered Starting GENSEC mechanism spnego Starting GENSEC submechanism gse_krb5 smb_gss_krb5_import_cred ccache[MEMORY:cliconnect] failed with [ Miscellaneous failure (see text): unknown mech-code 2 for mech 1 2 840 113554 1 2 2] -the caller may retry after a kinit. Failed to start GENSEC client mech gse_krb5: NT_STATUS_INTERNAL_ERROR Starting GENSEC submechanism ntlmssp negotiate: struct NEGOTIATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmNegotiate (1) NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 DomainNameLen : 0x0000 (0) DomainNameMaxLen : 0x0000 (0) DomainName : * DomainName : '' WorkstationLen : 0x0000 (0) WorkstationMaxLen : 0x0000 (0) Workstation : * Workstation : '' Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) gensec_update_send: ntlmssp[0x5579c2640540]: subreq: 0x5579c2614a40 gensec_update_send: spnego[0x5579c263a860]: subreq: 0x5579c263faf0 gensec_update_done: ntlmssp[0x5579c2640540]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c2614a40/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c2614bf0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215] gensec_update_done: spnego[0x5579c263a860]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c263faf0/../../auth/gensec/spnego.c:1630]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c263fca0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2115] map_errno_from_nt_status: 32 bit codes: code=c000020c [ 0.204](3021)/(log_kio_smb) unknown: open "smb://Alexandre@diskstation.local/photo" url-type: 3 dirfd: -1 errNum: 103 [ 0.204](3021)/(log_kio_smb) unknown: Discovery finished. [ 0.204](3021)/(log_kio_smb) unknown: reporting generic error: 103 [ 0.204](3021)/(log_kio_smb) unknown: errNum 103 Got challenge flags: Got NTLMSSP neg_flags=0x628a8215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_SERVER NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH short string '', sent with NULL termination despite NOTERM flag in IDL challenge: struct CHALLENGE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmChallenge (0x2) TargetNameLen : 0x0016 (22) TargetNameMaxLen : 0x0016 (22) TargetName : * TargetName : 'DISKSTATION' NegotiateFlags : 0x628a8215 (1653244437) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 1: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 1: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 ServerChallenge : be11b3e3b5f8da50 Reserved : 0000000000000000 TargetInfoLen : 0x0064 (100) TargetInfoMaxLen : 0x0064 (100) TargetInfo : * TargetInfo: struct AV_PAIR_LIST count : 0x00000006 (6) pair: ARRAY(6) pair: struct AV_PAIR AvId : MsvAvNbDomainName (0x2) AvLen : 0x0016 (22) Value : union ntlmssp_AvValue(case 0x2) AvNbDomainName : 'DISKSTATION' pair: struct AV_PAIR AvId : MsvAvNbComputerName (0x1) AvLen : 0x0016 (22) Value : union ntlmssp_AvValue(case 0x1) AvNbComputerName : 'DISKSTATION' pair: struct AV_PAIR AvId : MsvAvDnsDomainName (0x4) AvLen : 0x0002 (2) Value : union ntlmssp_AvValue(case 0x4) AvDnsDomainName : '' pair: struct AV_PAIR AvId : MsvAvDnsComputerName (0x3) AvLen : 0x0016 (22) Value : union ntlmssp_AvValue(case 0x3) AvDnsComputerName : 'diskstation' pair: struct AV_PAIR AvId : MsvAvTimestamp (0x7) AvLen : 0x0008 (8) Value : union ntlmssp_AvValue(case 0x7) AvTimestamp : jeu. avril 8 19:42:37 2021 CEST pair: struct AV_PAIR AvId : MsvAvEOL (0x0) AvLen : 0x0000 (0) Value : union ntlmssp_AvValue(case 0x0) Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1) ProductBuild : 0x0000 (0) Reserved : 000000 NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF) short string '', sent with NULL termination despite NOTERM flag in IDL short string '', sent with NULL termination despite NOTERM flag in IDL authenticate: struct AUTHENTICATE_MESSAGE Signature : 'NTLMSSP' MessageType : NtLmAuthenticate (3) LmChallengeResponseLen : 0x0018 (24) LmChallengeResponseMaxLen: 0x0018 (24) LmChallengeResponse : * LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case 24) v1: struct LM_RESPONSE Response : 000000000000000000000000000000000000000000000000 NtChallengeResponseLen : 0x0110 (272) NtChallengeResponseMaxLen: 0x0110 (272) NtChallengeResponse : * NtChallengeResponse : union ntlmssp_NTLM_RESPONSE_with_len(case 272) v2: struct NTLMv2_RESPONSE Response : 6197d522b76448e406ede53b9aa95592 Challenge: struct NTLMv2_CLIENT_CHALLENGE RespType : 0x01 (1) HiRespType : 0x01 (1) Reserved1 : 0x0000 (0) Reserved2 : 0x00000000 (0) TimeStamp : jeu. avril 8 19:42:37 2021 CEST ChallengeFromClient : f6debd6ec1ee5816 Reserved3 : 0x00000000 (0) AvPairs: struct AV_PAIR_LIST count : 0x0000000a (10) pair: ARRAY(10) pair: struct AV_PAIR AvId : MsvAvNbDomainName (0x2) AvLen : 0x0016 (22) Value : union ntlmssp_AvValue(case 0x2) AvNbDomainName : 'DISKSTATION' pair: struct AV_PAIR AvId : MsvAvNbComputerName (0x1) AvLen : 0x0016 (22) Value : union ntlmssp_AvValue(case 0x1) AvNbComputerName : 'DISKSTATION' pair: struct AV_PAIR AvId : MsvAvDnsDomainName (0x4) AvLen : 0x0002 (2) Value : union ntlmssp_AvValue(case 0x4) AvDnsDomainName : '' pair: struct AV_PAIR AvId : MsvAvDnsComputerName (0x3) AvLen : 0x0016 (22) Value : union ntlmssp_AvValue(case 0x3) AvDnsComputerName : 'diskstation' pair: struct AV_PAIR AvId : MsvAvTimestamp (0x7) AvLen : 0x0008 (8) Value : union ntlmssp_AvValue(case 0x7) AvTimestamp : jeu. avril 8 19:42:37 2021 CEST pair: struct AV_PAIR AvId : MsvAvFlags (0x6) AvLen : 0x0004 (4) Value : union ntlmssp_AvValue(case 0x6) AvFlags : 0x00000002 (2) 0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT 1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE 0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE pair: struct AV_PAIR AvId : MsvAvSingleHost (0x8) AvLen : 0x0030 (48) Value : union ntlmssp_AvValue(case 0x8) AvSingleHost: struct ntlmssp_SingleHostData Size : 0x00000030 (48) Z4 : 0x00000000 (0) token_info: struct LSAP_TOKEN_INFO_INTEGRITY Flags : 0x00000000 (0) TokenIL : 0x00000000 (0) MachineId : dc770842728622d9fd9271ebc506e6a7157d1a50915da87fa61aca6f8a98b34e remaining : DATA_BLOB length=0 pair: struct AV_PAIR AvId : MsvChannelBindings (0xA) AvLen : 0x0010 (16) Value : union ntlmssp_AvValue(case 0xA) ChannelBindings : 00000000000000000000000000000000 pair: struct AV_PAIR AvId : MsvAvTargetName (0x9) AvLen : 0x002c (44) Value : union ntlmssp_AvValue(case 0x9) AvTargetName : 'cifs/diskstation.local' pair: struct AV_PAIR AvId : MsvAvEOL (0x0) AvLen : 0x0000 (0) Value : union ntlmssp_AvValue(case 0x0) DomainNameLen : 0x0012 (18) DomainNameMaxLen : 0x0012 (18) DomainName : * DomainName : 'WORKGROUP' UserNameLen : 0x0012 (18) UserNameMaxLen : 0x0012 (18) UserName : * UserName : 'Alexandre' WorkstationLen : 0x0012 (18) WorkstationMaxLen : 0x0012 (18) Workstation : * Workstation : 'ALEXANDRE' EncryptedRandomSessionKeyLen: 0x0010 (16) EncryptedRandomSessionKeyMaxLen: 0x0010 (16) EncryptedRandomSessionKey: * EncryptedRandomSessionKey: DATA_BLOB length=16 [0000] 59 89 55 B9 50 56 2F 18 55 F9 5F 0E 23 74 F5 67 Y.U.PV/. U._.#t.g NegotiateFlags : 0x62088215 (1644724757) 1: NTLMSSP_NEGOTIATE_UNICODE 0: NTLMSSP_NEGOTIATE_OEM 1: NTLMSSP_REQUEST_TARGET 1: NTLMSSP_NEGOTIATE_SIGN 0: NTLMSSP_NEGOTIATE_SEAL 0: NTLMSSP_NEGOTIATE_DATAGRAM 0: NTLMSSP_NEGOTIATE_LM_KEY 0: NTLMSSP_NEGOTIATE_NETWARE 1: NTLMSSP_NEGOTIATE_NTLM 0: NTLMSSP_NEGOTIATE_NT_ONLY 0: NTLMSSP_ANONYMOUS 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN 0: NTLMSSP_TARGET_TYPE_DOMAIN 0: NTLMSSP_TARGET_TYPE_SERVER 0: NTLMSSP_TARGET_TYPE_SHARE 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY 0: NTLMSSP_NEGOTIATE_IDENTIFY 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY 0: NTLMSSP_NEGOTIATE_TARGET_INFO 1: NTLMSSP_NEGOTIATE_VERSION 1: NTLMSSP_NEGOTIATE_128 1: NTLMSSP_NEGOTIATE_KEY_EXCH 0: NTLMSSP_NEGOTIATE_56 Version: struct ntlmssp_VERSION ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) ProductBuild : 0x0000 (0) Reserved: ARRAY(3) [0] : 0x00 (0) [1] : 0x00 (0) [2] : 0x00 (0) NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: ntlmssp[0x5579c2640540]: subreq: 0x5579c26352a0 gensec_update_send: spnego[0x5579c263a860]: subreq: 0x5579c2644170 gensec_update_done: ntlmssp[0x5579c2640540]: NT_STATUS_OK tevent_req[0x5579c26352a0/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5579c2635450)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:222] gensec_update_done: spnego[0x5579c263a860]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5579c2644170/../../auth/gensec/spnego.c:1630]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c2644320)] timer[(nil)] finish[../../auth/gensec/spnego.c:2115] ntlmssp_check_packet: NTLMSSP signature OK ! NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH gensec_update_send: spnego[0x5579c263a860]: subreq: 0x5579c2644170 gensec_update_done: spnego[0x5579c263a860]: NT_STATUS_OK tevent_req[0x5579c2644170/../../auth/gensec/spnego.c:1630]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5579c2644320)] timer[(nil)] finish[../../auth/gensec/spnego.c:2115] session setup ok signed SMB2 message signed SMB2 message tconx ok Case sensitive: True Server connect ok: //diskstation.local/photo: 0x5579c2641d90 SMBC_getatr: sending qpathinfo parsed path: fname='smb://Alexandre@diskstation.local/photo' server='diskstation.local' share='photo' path='' options='' SMBC_check_options(): server='diskstation.local' share='photo' path='' options='' [ 0.399](3025)/(log_kio_smb) unknown: QUrl("smb://Alexandre@diskstation.local/photo/") [ 0.399](3025)/(log_kio_smb) unknown: updateCache "/photo" smbc_stat(smb://Alexandre@diskstation.local/photo) SMBC_getatr: sending qpathinfo parsed path: fname='smb://Alexandre@diskstation.local/photo' server='diskstation.local' share='photo' path='' options='' SMBC_check_options(): server='diskstation.local' share='photo' path='' options='' -- You are receiving this mail because: You are watching all bug changes.