Hi, Tried to mount a share from windows 2008 R2 on Linux 2.6.19-1.2895.fc6, but have been not successful. Not sure why I'm getting "NBT SessionReject" from the win2008 server. Is there any registry update needed or a newer version of mount.cifs? Please help. Thanks. My version of mount.cifs is 1.10. Not sure if there is a newer version. sec= Security mode. Allowed values are: Â. none attempt to connection as a null user (no name) Â. krb5 Use Kerberos version 5 authentication Â. krb5i Use Kerberos authentication and packet signing Â. ntlm Use NTLM password hashing (default) Â. ntlmi Use NTLM password hashing with signing (if /proc/fs/cifs/PacketSigningEnabled on or if server requires signing also can be the default) Â. ntlmv2 Use NTLMv2 password hashing Â. ntlmv2i Use NTLMv2 password hashing with packet signing [NB This [sec parameter] is under development and expected to be available in cifs kernel module 1.40 and later] # /root/mount.cifs //10.6.65.66/wwwlog$ /mnt/ny4wnwebtp033 -odom=EXT,LiM2,sec=ntlmv2i,port=139 mount error 112 = Host is down # /root/mount.cifs //10.6.65.66/wwwlog$ /mnt/ny4wnwebtp033 -odom=EXT,user=LiM2,sec=krb5,port=139; Password: mount error 112 = Host is down Refer to the mount.cifs(8) manual page (e.g.man mount.cifs) tcpdump host 10.6.65.66 -n -vv tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 16:08:00.714252 IP (tos 0x0, ttl 64, id 4663, offset 0, flags [DF], proto: TCP (6), length: 60) 150.123.157.31.56122 > 10.6.65.66.netbios-ssn: S, cksum 0x1f2f (correct), 1324558118:1324558118(0) win 5840 <mss 1460,sackOK,timestamp 204485905 0,nop,wscale 5> 16:08:00.729388 IP (tos 0x28, ttl 62, id 0, offset 0, flags [DF], proto: TCP (6), length: 60) 10.6.65.66.netbios-ssn > 150.123.157.31.56122: S, cksum 0xc876 (correct), 2392791643:2392791643(0) ack 1324558119 win 5792 <mss 1432,sackOK,timestamp 849574744 204485905,nop,wscale 2> 16:08:00.729396 IP (tos 0x0, ttl 64, id 4664, offset 0, flags [DF], proto: TCP (6), length: 52) 150.123.157.31.56122 > 10.6.65.66.netbios-ssn: ., cksum 0x0cfc (correct), 1:1(0) ack 1 win 183 <nop,nop,timestamp 204485920 849574744> 16:08:00.729466 IP (tos 0x0, ttl 64, id 4665, offset 0, flags [DF], proto: TCP (6), length: 124) 150.123.157.31.56122 > 10.6.65.66.netbios-ssn: P 1:73(72) ack 1 win 183 <nop,nop,timestamp 204485920 849574744> >>> NBT Session Packet NBT Session Request Flags=0x0 Length=68 (0x44) Destination= WARNING: Short packet. Try increasing the snap length 16:08:00.729980 IP (tos 0x28, ttl 62, id 24837, offset 0, flags [DF], proto: TCP (6), length: 52) 10.6.65.66.netbios-ssn > 150.123.157.31.56122: ., cksum 0x07c2 (correct), 1:1(0) ack 73 win 1448 <nop,nop,timestamp 849574745 204485920> 16:08:00.730880 IP (tos 0x0, ttl 64, id 4666, offset 0, flags [DF], proto: TCP (6), length: 134) 150.123.157.31.56122 > 10.6.65.66.netbios-ssn: P 73:155(82) ack 1 win 183 <nop,nop,timestamp 204485922 849574745> >>> NBT Session Packet NBT Session Message Flags=0x0 Length=78 (0x4e) WARNING: Short packet. Try increasing the snap length by 52 SMB PACKET: SMBnegprot (REQUEST) SMB Command = 0x72 Error class = 0x0 Error code = 0 (0x0) Flags1 = 0x0 Flags2 = 0x1 Tree ID = 0 (0x0) Proc ID = WARNING: Short packet. Try increasing the snap length [|SMB] 16:08:00.731379 IP (tos 0x28, ttl 62, id 24839, offset 0, flags [DF], proto: TCP (6), length: 52) 10.6.65.66.netbios-ssn > 150.123.157.31.56122: ., cksum 0x076d (correct), 1:1(0) ack 155 win 1448 <nop,nop,timestamp 849574746 204485922> 16:08:00.740412 IP (tos 0x28, ttl 62, id 24841, offset 0, flags [DF], proto: TCP (6), length: 57) 10.6.65.66.netbios-ssn > 150.123.157.31.56122: P, cksum 0x0255 (correct), 1:6(5) ack 155 win 1448 <nop,nop,timestamp 849574755 204485922> >>> NBT Session Packet NBT SessionReject Flags=0x0 Length=1 (0x1) Reason=0x82 Called name not present 16:08:00.740512 IP (tos 0x0, ttl 64, id 4667, offset 0, flags [DF], proto: TCP (6), length: 52) 150.123.157.31.56122 > 10.6.65.66.netbios-ssn: ., cksum 0x0c47 (correct), 155:155(0) ack 6 win 183 <nop,nop,timestamp 204485931 849574755> 16:08:00.747499 IP (tos 0x28, ttl 62, id 24843, offset 0, flags [DF], proto: TCP (6), length: 52) 10.6.65.66.netbios-ssn > 150.123.157.31.56122: F, cksum 0x074e (correct), 6:6(0) ack 155 win 1448 <nop,nop,timestamp 849574762 204485931> 16:08:00.786870 IP (tos 0x0, ttl 64, id 4668, offset 0, flags [DF], proto: TCP (6), length: 52) 150.123.157.31.56122 > 10.6.65.66.netbios-ssn: ., cksum 0x0c10 (correct), 155:155(0) ack 7 win 183 <nop,nop,timestamp 204485978 849574762> 16:08:00.866869 IP (tos 0x0, ttl 64, id 4669, offset 0, flags [DF], proto: TCP (6), length: 52) 150.123.157.31.56122 > 10.6.65.66.netbios-ssn: R, cksum 0x0bbc (correct), 155:155(0) ack 7 win 183 <nop,nop,timestamp 204486058 849574762> Confidentiality Notice: This email, including attachments, may include non-public, proprietary, confidential or legally privileged information. If you are not an intended recipient or an authorized agent of an intended recipient, you are hereby notified that any dissemination, distribution or copying of the information contained in or transmitted with this e-mail is unauthorized and strictly prohibited. If you have received this email in error, please notify the sender by replying to this message and permanently delete this e-mail, its attachments, and any copies of it immediately. You should not retain, copy or use this e-mail or any attachment for any purpose, nor disclose all or any part of the contents to any other person. Thank you -- To unsubscribe from this list: send the line "unsubscribe linux-cifs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html