Yanlış ifade etmişim Kurumsal ve Topluluk haricindeki dağıtımlarda sorun
yok demek istemiştim :)

Özgür Koca
[tankado.com][raspberry-pi.tankado.com]


<http://www.facebook.com/zerostoheroes/>

On Tue, Apr 12, 2016 at 4:59 PM, Özgür KOCA <[email protected]> wrote:

> Bu sorun Pardus'un kurumsal ve topluluk dağıtımlarına özel bir hal aldı.
> Diğer dağıtımlarda var Windows'larda sorun yok.
> İlgili forumlara da yazdım ama hala bir netice yok :(
>
> Özgür Koca
> [tankado.com][raspberry-pi.tankado.com]
>
>
> <http://www.facebook.com/zerostoheroes/>
>
> On Mon, Apr 11, 2016 at 1:33 PM, Özgür KOCA <[email protected]> wrote:
>
>> *Aşağıdaki yapılandırmaya sahip samba (raspbian) ile ilginç bir sorun
>> yaşıyorum. Bir pardus makineden samba paylaşımına giriş yapmak istediğimde
>> parolayı doğru girmeme rağmen aşağıdaki debuglardaki gibi bir LOGON FAILURE
>> alıyorum:*
>>
>>
>>
>> *root@tspardus:/home/ozgur# smbclient -d 3 //10.1.1.1/pi
>> <http://10.1.1.1/pi> -U pi*
>> lp_load_ex: refreshing parameters
>> Initialising global parameters
>> params.c:pm_process() - Processing configuration file
>> "/etc/samba/smb.conf"
>> Processing section "[global]"
>> added interface eth0 ip=10.1.1.123 bcast=10.1.1.255 netmask=255.255.255.0
>> Client started (version 4.1.13-Debian).
>> Enter pi's password:
>> Connecting to 10.1.1.1 at port 445
>> Doing spnego session setup (blob length=74)
>> got OID=1.3.6.1.4.1.311.2.2.10
>> got principal=not_defined_in_RFC4178@please_ignore
>> Got challenge flags:
>> Got NTLMSSP neg_flags=0x608a8215
>> NTLMSSP: Set final flags:
>> Got NTLMSSP neg_flags=0x60088215
>> NTLMSSP Sign/Seal - Initialising with flags:
>> Got NTLMSSP neg_flags=0x60088215
>> SPNEGO login failed: Logon failure
>> session setup failed: NT_STATUS_LOGON_FAILURE
>>
>>
>>
>> *root@tspardus:/home/ozgur# smbclient -d 5 //10.1.1.1/pi
>> <http://10.1.1.1/pi> -U pi *
>> INFO: Current debug levels:
>>   all: 5
>>   tdb: 5
>>   printdrivers: 5
>>   lanman: 5
>>   smb: 5
>>   rpc_parse: 5
>>   rpc_srv: 5
>>   rpc_cli: 5
>>   passdb: 5
>>   sam: 5
>>   auth: 5
>>   winbind: 5
>>   vfs: 5
>>   idmap: 5
>>   quota: 5
>>   acls: 5
>>   locking: 5
>>   msdfs: 5
>>   dmapi: 5
>>   registry: 5
>>   scavenger: 5
>>   dns: 5
>>   ldb: 5
>> lp_load_ex: refreshing parameters
>> Initialising global parameters
>> INFO: Current debug levels:
>>   all: 5
>>   tdb: 5
>>   printdrivers: 5
>>   lanman: 5
>>   smb: 5
>>   rpc_parse: 5
>>   rpc_srv: 5
>>   rpc_cli: 5
>>   passdb: 5
>>   sam: 5
>>   auth: 5
>>   winbind: 5
>>   vfs: 5
>>   idmap: 5
>>   quota: 5
>>   acls: 5
>>   locking: 5
>>   msdfs: 5
>>   dmapi: 5
>>   registry: 5
>>   scavenger: 5
>>   dns: 5
>>   ldb: 5
>> params.c:pm_process() - Processing configuration file
>> "/etc/samba/smb.conf"
>> Processing section "[global]"
>> doing parameter workgroup = WORKGROUP
>> doing parameter dns proxy = no
>> doing parameter log file = /var/log/samba/log.%m
>> doing parameter max log size = 1000
>> doing parameter syslog = 0
>> doing parameter panic action = /usr/share/samba/panic-action %d
>> doing parameter server role = standalone server
>> doing parameter passdb backend = tdbsam
>> doing parameter obey pam restrictions = yes
>> doing parameter unix password sync = no
>> doing parameter passwd program = /usr/bin/passwd %u
>> doing parameter passwd chat = *Enter\snew\s*\spassword:* %n\n
>> *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* .
>> doing parameter pam password change = yes
>> doing parameter map to guest = bad user
>> doing parameter usershare allow guests = yes
>> pm_process() returned Yes
>> added interface eth0 ip=10.1.1.123 bcast=10.1.1.255 netmask=255.255.255.0
>> Netbios name list:-
>> my_netbios_names[0]="TSPARDUS"
>> Client started (version 4.1.13-Debian).
>> Enter pi's password:
>> Connecting to 10.1.1.1 at port 445
>> Socket options:
>>         SO_KEEPALIVE = 0
>>         SO_REUSEADDR = 0
>>         SO_BROADCAST = 0
>>         TCP_NODELAY = 1
>>         TCP_KEEPCNT = 9
>>         TCP_KEEPIDLE = 7200
>>         TCP_KEEPINTVL = 75
>>         IPTOS_LOWDELAY = 0
>>         IPTOS_THROUGHPUT = 0
>>         SO_REUSEPORT = 0
>>         SO_SNDBUF = 87040
>>         SO_RCVBUF = 372480
>>         SO_SNDLOWAT = 1
>>         SO_RCVLOWAT = 1
>>         SO_SNDTIMEO = 0
>>         SO_RCVTIMEO = 0
>>         TCP_QUICKACK = 1
>>         TCP_DEFER_ACCEPT = 0
>>  session request ok
>> Doing spnego session setup (blob length=74)
>> got OID=1.3.6.1.4.1.311.2.2.10
>> got principal=not_defined_in_RFC4178@please_ignore
>> Got challenge flags:
>> Got NTLMSSP neg_flags=0x608a8215
>>   NTLMSSP_NEGOTIATE_UNICODE
>>   NTLMSSP_REQUEST_TARGET
>>   NTLMSSP_NEGOTIATE_SIGN
>>   NTLMSSP_NEGOTIATE_NTLM
>>   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
>>   NTLMSSP_NEGOTIATE_NTLM2
>>   NTLMSSP_NEGOTIATE_TARGET_INFO
>>   NTLMSSP_NEGOTIATE_128
>>   NTLMSSP_NEGOTIATE_KEY_EXCH
>> NTLMSSP: Set final flags:
>> Got NTLMSSP neg_flags=0x60088215
>>   NTLMSSP_NEGOTIATE_UNICODE
>>   NTLMSSP_REQUEST_TARGET
>>   NTLMSSP_NEGOTIATE_SIGN
>>   NTLMSSP_NEGOTIATE_NTLM
>>   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
>>   NTLMSSP_NEGOTIATE_NTLM2
>>   NTLMSSP_NEGOTIATE_128
>>   NTLMSSP_NEGOTIATE_KEY_EXCH
>> NTLMSSP Sign/Seal - Initialising with flags:
>> Got NTLMSSP neg_flags=0x60088215
>>   NTLMSSP_NEGOTIATE_UNICODE
>>   NTLMSSP_REQUEST_TARGET
>>   NTLMSSP_NEGOTIATE_SIGN
>>   NTLMSSP_NEGOTIATE_NTLM
>>   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
>>   NTLMSSP_NEGOTIATE_NTLM2
>>   NTLMSSP_NEGOTIATE_128
>>   NTLMSSP_NEGOTIATE_KEY_EXCH
>> SPNEGO login failed: Logon failure
>> session setup failed: NT_STATUS_LOGON_FAILURE
>>
>>
>> *Ağdaki bir windows (7) makineden veya söz konusu samba sunucunun kendi
>> konsolundan sorunsuz giriş yapabiliyorum:*
>>
>> *pi@maket:~ $* smbclient //10.1.1.1/logs -d 2 -U pi
>> added interface eth0 ip=192.168.0.168 bcast=192.168.0.255
>> netmask=255.255.255.0
>> added interface eth0 ip=10.1.1.1 bcast=10.1.1.255 netmask=255.255.255.0
>> added interface wlan0 ip=10.2.2.2 bcast=10.2.2.255 netmask=255.255.255.0
>> Enter pi's password:
>> Domain=[WORKGROUP] OS=[Unix] Server=[Samba 4.1.17-Debian]
>> smb: \>
>>
>>
>>
>> *pi@maket:~ $ testparm*
>> Load smb config files from /etc/samba/smb.conf
>> Processing section "[www]"
>> Processing section "[logs]"
>> Processing section "[pi]"
>> Loaded services file OK.
>> Server role: ROLE_STANDALONE
>> Press enter to see a dump of your service definitions
>>
>> [global]
>>         server string = Maket Samba Server
>>         server role = standalone server
>>         map to guest = Bad User
>>         obey pam restrictions = Yes
>>         pam password change = Yes
>>         passwd program = /usr/bin/passwd %u
>>         passwd chat = *Enter\snew\s*\spassword:* %n\n
>> *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* .
>>         syslog = 10
>>         syslog only = Yes
>>         log file = /var/log/samba/log.%m
>>         max log size = 1000
>>         load printers = No
>>         printcap name = /dev/null
>>         disable spoolss = Yes
>>         dns proxy = No
>>         usershare allow guests = Yes
>>         panic action = /usr/share/samba/panic-action %d
>>         idmap config * : backend = tdb
>>         printing = bsd
>>         print command = lpr -r -P'%p' %s
>>         lpq command = lpq -P'%p'
>>         lprm command = lprm -P'%p' %j
>>
>> [www]
>>         comment = Apache public directory
>>         path = /var/www/html
>>         valid users = pi
>>         force user = root
>>         force group = root
>>         read only = No
>>         create mask = 0777
>>         force create mode = 0777
>>
>> [logs]
>>         comment = System logs
>>         path = /var/log
>>         valid users = pi
>>         force user = root
>>         force group = root
>>         read only = No
>>         create mask = 0711
>>         force create mode = 0722
>>
>> [pi]
>>         comment = Pis home
>>         path = /home/pi
>>         valid users = pi
>>         force user = pi
>>         force group = pi
>>         read only = No
>>
>>
>>
>> *Sorun ne olabilir acaba?*
>>
>>
>> Özgür Koca
>> [tankado.com][raspberry-pi.tankado.com]
>>
>>
>> <http://www.facebook.com/zerostoheroes/>
>>
>
>
_______________________________________________
Linux-sunucu E-Posta Listesi
[email protected]

Liste kurallarını http://liste.linux.org.tr/kurallar.php  bağlantısından 
okuyabilirsiniz;

Bu Listede neden bulunduğunuzu bilmiyorsanız veya artık bu listeden gelen 
e-postaları almak istemiyorsanız aşağıdaki bağlantı adresini kullanarak 1 
dakika içinde üyeliğinizi sonlandırabilirsiniz.
https://liste.linux.org.tr/mailman/listinfo/linux-sunucu

Cevap