mount.cifs 1.10 to mount share for windows 2008 R2

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

Tried to mount a share from  windows 2008 R2 on Linux 2.6.19-1.2895.fc6, but have been not successful. 
Not sure why I'm getting "NBT SessionReject" from the win2008 server. Is there any registry update needed or a newer version of mount.cifs?
Please help. Thanks.

My version of mount.cifs is 1.10. Not sure if there is a newer version.
       sec=   Security mode. Allowed values are:

              Â.  none attempt to connection as a null user (no name)

              Â.  krb5 Use Kerberos version 5 authentication

              Â.  krb5i Use Kerberos authentication and packet signing

              Â.  ntlm Use NTLM password hashing (default)

              Â.  ntlmi   Use   NTLM   password   hashing   with   signing  (if
                 /proc/fs/cifs/PacketSigningEnabled on or if  server  requires
                 signing also can be the default)

              Â.  ntlmv2 Use NTLMv2 password hashing

              Â.  ntlmv2i Use NTLMv2 password hashing with packet signing

              [NB This [sec parameter] is under development and expected to be
              available in cifs kernel module 1.40 and later]


# /root/mount.cifs //10.6.65.66/wwwlog$ /mnt/ny4wnwebtp033 -odom=EXT,LiM2,sec=ntlmv2i,port=139
mount error 112 = Host is down
# /root/mount.cifs //10.6.65.66/wwwlog$ /mnt/ny4wnwebtp033 -odom=EXT,user=LiM2,sec=krb5,port=139;
Password:
mount error 112 = Host is down
Refer to the mount.cifs(8) manual page (e.g.man mount.cifs)

tcpdump host 10.6.65.66 -n -vv
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
16:08:00.714252 IP (tos 0x0, ttl  64, id 4663, offset 0, flags [DF], proto: TCP (6), length: 60) 150.123.157.31.56122 > 10.6.65.66.netbios-ssn: S, cksum 0x1f2f (correct), 1324558118:1324558118(0) win 5840 <mss 1460,sackOK,timestamp 204485905 0,nop,wscale 5>
16:08:00.729388 IP (tos 0x28, ttl  62, id 0, offset 0, flags [DF], proto: TCP (6), length: 60) 10.6.65.66.netbios-ssn > 150.123.157.31.56122: S, cksum 0xc876 (correct), 2392791643:2392791643(0) ack 1324558119 win 5792 <mss 1432,sackOK,timestamp 849574744 204485905,nop,wscale 2>
16:08:00.729396 IP (tos 0x0, ttl  64, id 4664, offset 0, flags [DF], proto: TCP (6), length: 52) 150.123.157.31.56122 > 10.6.65.66.netbios-ssn: ., cksum 0x0cfc (correct), 1:1(0) ack 1 win 183 <nop,nop,timestamp 204485920 849574744>
16:08:00.729466 IP (tos 0x0, ttl  64, id 4665, offset 0, flags [DF], proto: TCP (6), length: 124) 150.123.157.31.56122 > 10.6.65.66.netbios-ssn: P 1:73(72) ack 1 win 183 <nop,nop,timestamp 204485920 849574744>
>>> NBT Session Packet
NBT Session Request
Flags=0x0
Length=68 (0x44)
Destination=
WARNING: Short packet. Try increasing the snap length


16:08:00.729980 IP (tos 0x28, ttl  62, id 24837, offset 0, flags [DF], proto: TCP (6), length: 52) 10.6.65.66.netbios-ssn > 150.123.157.31.56122: ., cksum 0x07c2 (correct), 1:1(0) ack 73 win 1448 <nop,nop,timestamp 849574745 204485920>
16:08:00.730880 IP (tos 0x0, ttl  64, id 4666, offset 0, flags [DF], proto: TCP (6), length: 134) 150.123.157.31.56122 > 10.6.65.66.netbios-ssn: P 73:155(82) ack 1 win 183 <nop,nop,timestamp 204485922 849574745>
>>> NBT Session Packet
NBT Session Message
Flags=0x0
Length=78 (0x4e)
WARNING: Short packet. Try increasing the snap length by 52

SMB PACKET: SMBnegprot (REQUEST)
SMB Command   =  0x72
Error class   =  0x0
Error code    =  0 (0x0)
Flags1        =  0x0
Flags2        =  0x1
Tree ID       =  0 (0x0)
Proc ID       =
WARNING: Short packet. Try increasing the snap length
[|SMB]

16:08:00.731379 IP (tos 0x28, ttl  62, id 24839, offset 0, flags [DF], proto: TCP (6), length: 52) 10.6.65.66.netbios-ssn > 150.123.157.31.56122: ., cksum 0x076d (correct), 1:1(0) ack 155 win 1448 <nop,nop,timestamp 849574746 204485922>
16:08:00.740412 IP (tos 0x28, ttl  62, id 24841, offset 0, flags [DF], proto: TCP (6), length: 57) 10.6.65.66.netbios-ssn > 150.123.157.31.56122: P, cksum 0x0255 (correct), 1:6(5) ack 155 win 1448 <nop,nop,timestamp 849574755 204485922>
>>> NBT Session Packet
NBT SessionReject
Flags=0x0
Length=1 (0x1)
Reason=0x82
Called name not present


16:08:00.740512 IP (tos 0x0, ttl  64, id 4667, offset 0, flags [DF], proto: TCP (6), length: 52) 150.123.157.31.56122 > 10.6.65.66.netbios-ssn: ., cksum 0x0c47 (correct), 155:155(0) ack 6 win 183 <nop,nop,timestamp 204485931 849574755>
16:08:00.747499 IP (tos 0x28, ttl  62, id 24843, offset 0, flags [DF], proto: TCP (6), length: 52) 10.6.65.66.netbios-ssn > 150.123.157.31.56122: F, cksum 0x074e (correct), 6:6(0) ack 155 win 1448 <nop,nop,timestamp 849574762 204485931>
16:08:00.786870 IP (tos 0x0, ttl  64, id 4668, offset 0, flags [DF], proto: TCP (6), length: 52) 150.123.157.31.56122 > 10.6.65.66.netbios-ssn: ., cksum 0x0c10 (correct), 155:155(0) ack 7 win 183 <nop,nop,timestamp 204485978 849574762>
16:08:00.866869 IP (tos 0x0, ttl  64, id 4669, offset 0, flags [DF], proto: TCP (6), length: 52) 150.123.157.31.56122 > 10.6.65.66.netbios-ssn: R, cksum 0x0bbc (correct), 155:155(0) ack 7 win 183 <nop,nop,timestamp 204486058 849574762>


Confidentiality Notice:  This email, including attachments, may include non-public, proprietary, confidential or legally privileged information.  If you are not an intended recipient or an authorized agent of an intended recipient, you are hereby notified that any dissemination, distribution or copying of the information contained in or transmitted with this e-mail is unauthorized and strictly prohibited.  If you have received this email in error, please notify the sender by replying to this message and permanently delete this e-mail, its attachments, and any copies of it immediately.  You should not retain, copy or use this e-mail or any attachment for any purpose, nor disclose all or any part of the contents to any other person. Thank you

--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux