Yanlış ifade etmişim Kurumsal ve Topluluk haricindeki dağıtımlarda sorun yok demek istemiştim :)
Özgür Koca [tankado.com][raspberry-pi.tankado.com] <http://www.facebook.com/zerostoheroes/> On Tue, Apr 12, 2016 at 4:59 PM, Özgür KOCA <[email protected]> wrote: > Bu sorun Pardus'un kurumsal ve topluluk dağıtımlarına özel bir hal aldı. > Diğer dağıtımlarda var Windows'larda sorun yok. > İlgili forumlara da yazdım ama hala bir netice yok :( > > Özgür Koca > [tankado.com][raspberry-pi.tankado.com] > > > <http://www.facebook.com/zerostoheroes/> > > On Mon, Apr 11, 2016 at 1:33 PM, Özgür KOCA <[email protected]> wrote: > >> *Aşağıdaki yapılandırmaya sahip samba (raspbian) ile ilginç bir sorun >> yaşıyorum. Bir pardus makineden samba paylaşımına giriş yapmak istediğimde >> parolayı doğru girmeme rağmen aşağıdaki debuglardaki gibi bir LOGON FAILURE >> alıyorum:* >> >> >> >> *root@tspardus:/home/ozgur# smbclient -d 3 //10.1.1.1/pi >> <http://10.1.1.1/pi> -U pi* >> lp_load_ex: refreshing parameters >> Initialising global parameters >> params.c:pm_process() - Processing configuration file >> "/etc/samba/smb.conf" >> Processing section "[global]" >> added interface eth0 ip=10.1.1.123 bcast=10.1.1.255 netmask=255.255.255.0 >> Client started (version 4.1.13-Debian). >> Enter pi's password: >> Connecting to 10.1.1.1 at port 445 >> Doing spnego session setup (blob length=74) >> got OID=1.3.6.1.4.1.311.2.2.10 >> got principal=not_defined_in_RFC4178@please_ignore >> Got challenge flags: >> Got NTLMSSP neg_flags=0x608a8215 >> NTLMSSP: Set final flags: >> Got NTLMSSP neg_flags=0x60088215 >> NTLMSSP Sign/Seal - Initialising with flags: >> Got NTLMSSP neg_flags=0x60088215 >> SPNEGO login failed: Logon failure >> session setup failed: NT_STATUS_LOGON_FAILURE >> >> >> >> *root@tspardus:/home/ozgur# smbclient -d 5 //10.1.1.1/pi >> <http://10.1.1.1/pi> -U pi * >> INFO: Current debug levels: >> all: 5 >> tdb: 5 >> printdrivers: 5 >> lanman: 5 >> smb: 5 >> rpc_parse: 5 >> rpc_srv: 5 >> rpc_cli: 5 >> passdb: 5 >> sam: 5 >> auth: 5 >> winbind: 5 >> vfs: 5 >> idmap: 5 >> quota: 5 >> acls: 5 >> locking: 5 >> msdfs: 5 >> dmapi: 5 >> registry: 5 >> scavenger: 5 >> dns: 5 >> ldb: 5 >> lp_load_ex: refreshing parameters >> Initialising global parameters >> INFO: Current debug levels: >> all: 5 >> tdb: 5 >> printdrivers: 5 >> lanman: 5 >> smb: 5 >> rpc_parse: 5 >> rpc_srv: 5 >> rpc_cli: 5 >> passdb: 5 >> sam: 5 >> auth: 5 >> winbind: 5 >> vfs: 5 >> idmap: 5 >> quota: 5 >> acls: 5 >> locking: 5 >> msdfs: 5 >> dmapi: 5 >> registry: 5 >> scavenger: 5 >> dns: 5 >> ldb: 5 >> params.c:pm_process() - Processing configuration file >> "/etc/samba/smb.conf" >> Processing section "[global]" >> doing parameter workgroup = WORKGROUP >> doing parameter dns proxy = no >> doing parameter log file = /var/log/samba/log.%m >> doing parameter max log size = 1000 >> doing parameter syslog = 0 >> doing parameter panic action = /usr/share/samba/panic-action %d >> doing parameter server role = standalone server >> doing parameter passdb backend = tdbsam >> doing parameter obey pam restrictions = yes >> doing parameter unix password sync = no >> doing parameter passwd program = /usr/bin/passwd %u >> doing parameter passwd chat = *Enter\snew\s*\spassword:* %n\n >> *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* . >> doing parameter pam password change = yes >> doing parameter map to guest = bad user >> doing parameter usershare allow guests = yes >> pm_process() returned Yes >> added interface eth0 ip=10.1.1.123 bcast=10.1.1.255 netmask=255.255.255.0 >> Netbios name list:- >> my_netbios_names[0]="TSPARDUS" >> Client started (version 4.1.13-Debian). >> Enter pi's password: >> Connecting to 10.1.1.1 at port 445 >> Socket options: >> SO_KEEPALIVE = 0 >> SO_REUSEADDR = 0 >> SO_BROADCAST = 0 >> TCP_NODELAY = 1 >> TCP_KEEPCNT = 9 >> TCP_KEEPIDLE = 7200 >> TCP_KEEPINTVL = 75 >> IPTOS_LOWDELAY = 0 >> IPTOS_THROUGHPUT = 0 >> SO_REUSEPORT = 0 >> SO_SNDBUF = 87040 >> SO_RCVBUF = 372480 >> SO_SNDLOWAT = 1 >> SO_RCVLOWAT = 1 >> SO_SNDTIMEO = 0 >> SO_RCVTIMEO = 0 >> TCP_QUICKACK = 1 >> TCP_DEFER_ACCEPT = 0 >> session request ok >> Doing spnego session setup (blob length=74) >> got OID=1.3.6.1.4.1.311.2.2.10 >> got principal=not_defined_in_RFC4178@please_ignore >> Got challenge flags: >> Got NTLMSSP neg_flags=0x608a8215 >> NTLMSSP_NEGOTIATE_UNICODE >> NTLMSSP_REQUEST_TARGET >> NTLMSSP_NEGOTIATE_SIGN >> NTLMSSP_NEGOTIATE_NTLM >> NTLMSSP_NEGOTIATE_ALWAYS_SIGN >> NTLMSSP_NEGOTIATE_NTLM2 >> NTLMSSP_NEGOTIATE_TARGET_INFO >> NTLMSSP_NEGOTIATE_128 >> NTLMSSP_NEGOTIATE_KEY_EXCH >> NTLMSSP: Set final flags: >> Got NTLMSSP neg_flags=0x60088215 >> NTLMSSP_NEGOTIATE_UNICODE >> NTLMSSP_REQUEST_TARGET >> NTLMSSP_NEGOTIATE_SIGN >> NTLMSSP_NEGOTIATE_NTLM >> NTLMSSP_NEGOTIATE_ALWAYS_SIGN >> NTLMSSP_NEGOTIATE_NTLM2 >> NTLMSSP_NEGOTIATE_128 >> NTLMSSP_NEGOTIATE_KEY_EXCH >> NTLMSSP Sign/Seal - Initialising with flags: >> Got NTLMSSP neg_flags=0x60088215 >> NTLMSSP_NEGOTIATE_UNICODE >> NTLMSSP_REQUEST_TARGET >> NTLMSSP_NEGOTIATE_SIGN >> NTLMSSP_NEGOTIATE_NTLM >> NTLMSSP_NEGOTIATE_ALWAYS_SIGN >> NTLMSSP_NEGOTIATE_NTLM2 >> NTLMSSP_NEGOTIATE_128 >> NTLMSSP_NEGOTIATE_KEY_EXCH >> SPNEGO login failed: Logon failure >> session setup failed: NT_STATUS_LOGON_FAILURE >> >> >> *Ağdaki bir windows (7) makineden veya söz konusu samba sunucunun kendi >> konsolundan sorunsuz giriş yapabiliyorum:* >> >> *pi@maket:~ $* smbclient //10.1.1.1/logs -d 2 -U pi >> added interface eth0 ip=192.168.0.168 bcast=192.168.0.255 >> netmask=255.255.255.0 >> added interface eth0 ip=10.1.1.1 bcast=10.1.1.255 netmask=255.255.255.0 >> added interface wlan0 ip=10.2.2.2 bcast=10.2.2.255 netmask=255.255.255.0 >> Enter pi's password: >> Domain=[WORKGROUP] OS=[Unix] Server=[Samba 4.1.17-Debian] >> smb: \> >> >> >> >> *pi@maket:~ $ testparm* >> Load smb config files from /etc/samba/smb.conf >> Processing section "[www]" >> Processing section "[logs]" >> Processing section "[pi]" >> Loaded services file OK. >> Server role: ROLE_STANDALONE >> Press enter to see a dump of your service definitions >> >> [global] >> server string = Maket Samba Server >> server role = standalone server >> map to guest = Bad User >> obey pam restrictions = Yes >> pam password change = Yes >> passwd program = /usr/bin/passwd %u >> passwd chat = *Enter\snew\s*\spassword:* %n\n >> *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* . >> syslog = 10 >> syslog only = Yes >> log file = /var/log/samba/log.%m >> max log size = 1000 >> load printers = No >> printcap name = /dev/null >> disable spoolss = Yes >> dns proxy = No >> usershare allow guests = Yes >> panic action = /usr/share/samba/panic-action %d >> idmap config * : backend = tdb >> printing = bsd >> print command = lpr -r -P'%p' %s >> lpq command = lpq -P'%p' >> lprm command = lprm -P'%p' %j >> >> [www] >> comment = Apache public directory >> path = /var/www/html >> valid users = pi >> force user = root >> force group = root >> read only = No >> create mask = 0777 >> force create mode = 0777 >> >> [logs] >> comment = System logs >> path = /var/log >> valid users = pi >> force user = root >> force group = root >> read only = No >> create mask = 0711 >> force create mode = 0722 >> >> [pi] >> comment = Pis home >> path = /home/pi >> valid users = pi >> force user = pi >> force group = pi >> read only = No >> >> >> >> *Sorun ne olabilir acaba?* >> >> >> Özgür Koca >> [tankado.com][raspberry-pi.tankado.com] >> >> >> <http://www.facebook.com/zerostoheroes/> >> > >
_______________________________________________ Linux-sunucu E-Posta Listesi [email protected] Liste kurallarını http://liste.linux.org.tr/kurallar.php bağlantısından okuyabilirsiniz; Bu Listede neden bulunduğunuzu bilmiyorsanız veya artık bu listeden gelen e-postaları almak istemiyorsanız aşağıdaki bağlantı adresini kullanarak 1 dakika içinde üyeliğinizi sonlandırabilirsiniz. https://liste.linux.org.tr/mailman/listinfo/linux-sunucu
