Bu sorun Pardus'un kurumsal ve topluluk dağıtımlarına özel bir hal aldı.
Diğer dağıtımlarda var Windows'larda sorun yok.
İlgili forumlara da yazdım ama hala bir netice yok :(

Özgür Koca
[tankado.com][raspberry-pi.tankado.com]


<http://www.facebook.com/zerostoheroes/>

On Mon, Apr 11, 2016 at 1:33 PM, Özgür KOCA <ozgurk...@gmail.com> wrote:

> *Aşağıdaki yapılandırmaya sahip samba (raspbian) ile ilginç bir sorun
> yaşıyorum. Bir pardus makineden samba paylaşımına giriş yapmak istediğimde
> parolayı doğru girmeme rağmen aşağıdaki debuglardaki gibi bir LOGON FAILURE
> alıyorum:*
>
>
>
> *root@tspardus:/home/ozgur# smbclient -d 3 //10.1.1.1/pi
> <http://10.1.1.1/pi> -U pi*
> lp_load_ex: refreshing parameters
> Initialising global parameters
> params.c:pm_process() - Processing configuration file "/etc/samba/smb.conf"
> Processing section "[global]"
> added interface eth0 ip=10.1.1.123 bcast=10.1.1.255 netmask=255.255.255.0
> Client started (version 4.1.13-Debian).
> Enter pi's password:
> Connecting to 10.1.1.1 at port 445
> Doing spnego session setup (blob length=74)
> got OID=1.3.6.1.4.1.311.2.2.10
> got principal=not_defined_in_RFC4178@please_ignore
> Got challenge flags:
> Got NTLMSSP neg_flags=0x608a8215
> NTLMSSP: Set final flags:
> Got NTLMSSP neg_flags=0x60088215
> NTLMSSP Sign/Seal - Initialising with flags:
> Got NTLMSSP neg_flags=0x60088215
> SPNEGO login failed: Logon failure
> session setup failed: NT_STATUS_LOGON_FAILURE
>
>
>
> *root@tspardus:/home/ozgur# smbclient -d 5 //10.1.1.1/pi
> <http://10.1.1.1/pi> -U pi *
> INFO: Current debug levels:
>   all: 5
>   tdb: 5
>   printdrivers: 5
>   lanman: 5
>   smb: 5
>   rpc_parse: 5
>   rpc_srv: 5
>   rpc_cli: 5
>   passdb: 5
>   sam: 5
>   auth: 5
>   winbind: 5
>   vfs: 5
>   idmap: 5
>   quota: 5
>   acls: 5
>   locking: 5
>   msdfs: 5
>   dmapi: 5
>   registry: 5
>   scavenger: 5
>   dns: 5
>   ldb: 5
> lp_load_ex: refreshing parameters
> Initialising global parameters
> INFO: Current debug levels:
>   all: 5
>   tdb: 5
>   printdrivers: 5
>   lanman: 5
>   smb: 5
>   rpc_parse: 5
>   rpc_srv: 5
>   rpc_cli: 5
>   passdb: 5
>   sam: 5
>   auth: 5
>   winbind: 5
>   vfs: 5
>   idmap: 5
>   quota: 5
>   acls: 5
>   locking: 5
>   msdfs: 5
>   dmapi: 5
>   registry: 5
>   scavenger: 5
>   dns: 5
>   ldb: 5
> params.c:pm_process() - Processing configuration file "/etc/samba/smb.conf"
> Processing section "[global]"
> doing parameter workgroup = WORKGROUP
> doing parameter dns proxy = no
> doing parameter log file = /var/log/samba/log.%m
> doing parameter max log size = 1000
> doing parameter syslog = 0
> doing parameter panic action = /usr/share/samba/panic-action %d
> doing parameter server role = standalone server
> doing parameter passdb backend = tdbsam
> doing parameter obey pam restrictions = yes
> doing parameter unix password sync = no
> doing parameter passwd program = /usr/bin/passwd %u
> doing parameter passwd chat = *Enter\snew\s*\spassword:* %n\n
> *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* .
> doing parameter pam password change = yes
> doing parameter map to guest = bad user
> doing parameter usershare allow guests = yes
> pm_process() returned Yes
> added interface eth0 ip=10.1.1.123 bcast=10.1.1.255 netmask=255.255.255.0
> Netbios name list:-
> my_netbios_names[0]="TSPARDUS"
> Client started (version 4.1.13-Debian).
> Enter pi's password:
> Connecting to 10.1.1.1 at port 445
> Socket options:
>         SO_KEEPALIVE = 0
>         SO_REUSEADDR = 0
>         SO_BROADCAST = 0
>         TCP_NODELAY = 1
>         TCP_KEEPCNT = 9
>         TCP_KEEPIDLE = 7200
>         TCP_KEEPINTVL = 75
>         IPTOS_LOWDELAY = 0
>         IPTOS_THROUGHPUT = 0
>         SO_REUSEPORT = 0
>         SO_SNDBUF = 87040
>         SO_RCVBUF = 372480
>         SO_SNDLOWAT = 1
>         SO_RCVLOWAT = 1
>         SO_SNDTIMEO = 0
>         SO_RCVTIMEO = 0
>         TCP_QUICKACK = 1
>         TCP_DEFER_ACCEPT = 0
>  session request ok
> Doing spnego session setup (blob length=74)
> got OID=1.3.6.1.4.1.311.2.2.10
> got principal=not_defined_in_RFC4178@please_ignore
> Got challenge flags:
> Got NTLMSSP neg_flags=0x608a8215
>   NTLMSSP_NEGOTIATE_UNICODE
>   NTLMSSP_REQUEST_TARGET
>   NTLMSSP_NEGOTIATE_SIGN
>   NTLMSSP_NEGOTIATE_NTLM
>   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
>   NTLMSSP_NEGOTIATE_NTLM2
>   NTLMSSP_NEGOTIATE_TARGET_INFO
>   NTLMSSP_NEGOTIATE_128
>   NTLMSSP_NEGOTIATE_KEY_EXCH
> NTLMSSP: Set final flags:
> Got NTLMSSP neg_flags=0x60088215
>   NTLMSSP_NEGOTIATE_UNICODE
>   NTLMSSP_REQUEST_TARGET
>   NTLMSSP_NEGOTIATE_SIGN
>   NTLMSSP_NEGOTIATE_NTLM
>   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
>   NTLMSSP_NEGOTIATE_NTLM2
>   NTLMSSP_NEGOTIATE_128
>   NTLMSSP_NEGOTIATE_KEY_EXCH
> NTLMSSP Sign/Seal - Initialising with flags:
> Got NTLMSSP neg_flags=0x60088215
>   NTLMSSP_NEGOTIATE_UNICODE
>   NTLMSSP_REQUEST_TARGET
>   NTLMSSP_NEGOTIATE_SIGN
>   NTLMSSP_NEGOTIATE_NTLM
>   NTLMSSP_NEGOTIATE_ALWAYS_SIGN
>   NTLMSSP_NEGOTIATE_NTLM2
>   NTLMSSP_NEGOTIATE_128
>   NTLMSSP_NEGOTIATE_KEY_EXCH
> SPNEGO login failed: Logon failure
> session setup failed: NT_STATUS_LOGON_FAILURE
>
>
> *Ağdaki bir windows (7) makineden veya söz konusu samba sunucunun kendi
> konsolundan sorunsuz giriş yapabiliyorum:*
>
> *pi@maket:~ $* smbclient //10.1.1.1/logs -d 2 -U pi
> added interface eth0 ip=192.168.0.168 bcast=192.168.0.255
> netmask=255.255.255.0
> added interface eth0 ip=10.1.1.1 bcast=10.1.1.255 netmask=255.255.255.0
> added interface wlan0 ip=10.2.2.2 bcast=10.2.2.255 netmask=255.255.255.0
> Enter pi's password:
> Domain=[WORKGROUP] OS=[Unix] Server=[Samba 4.1.17-Debian]
> smb: \>
>
>
>
> *pi@maket:~ $ testparm*
> Load smb config files from /etc/samba/smb.conf
> Processing section "[www]"
> Processing section "[logs]"
> Processing section "[pi]"
> Loaded services file OK.
> Server role: ROLE_STANDALONE
> Press enter to see a dump of your service definitions
>
> [global]
>         server string = Maket Samba Server
>         server role = standalone server
>         map to guest = Bad User
>         obey pam restrictions = Yes
>         pam password change = Yes
>         passwd program = /usr/bin/passwd %u
>         passwd chat = *Enter\snew\s*\spassword:* %n\n
> *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* .
>         syslog = 10
>         syslog only = Yes
>         log file = /var/log/samba/log.%m
>         max log size = 1000
>         load printers = No
>         printcap name = /dev/null
>         disable spoolss = Yes
>         dns proxy = No
>         usershare allow guests = Yes
>         panic action = /usr/share/samba/panic-action %d
>         idmap config * : backend = tdb
>         printing = bsd
>         print command = lpr -r -P'%p' %s
>         lpq command = lpq -P'%p'
>         lprm command = lprm -P'%p' %j
>
> [www]
>         comment = Apache public directory
>         path = /var/www/html
>         valid users = pi
>         force user = root
>         force group = root
>         read only = No
>         create mask = 0777
>         force create mode = 0777
>
> [logs]
>         comment = System logs
>         path = /var/log
>         valid users = pi
>         force user = root
>         force group = root
>         read only = No
>         create mask = 0711
>         force create mode = 0722
>
> [pi]
>         comment = Pis home
>         path = /home/pi
>         valid users = pi
>         force user = pi
>         force group = pi
>         read only = No
>
>
>
> *Sorun ne olabilir acaba?*
>
>
> Özgür Koca
> [tankado.com][raspberry-pi.tankado.com]
>
>
> <http://www.facebook.com/zerostoheroes/>
>
_______________________________________________
Linux-sunucu E-Posta Listesi
Linux-sunucu@liste.linux.org.tr

Liste kurallarını http://liste.linux.org.tr/kurallar.php  bağlantısından 
okuyabilirsiniz;

Bu Listede neden bulunduğunuzu bilmiyorsanız veya artık bu listeden gelen 
e-postaları almak istemiyorsanız aşağıdaki bağlantı adresini kullanarak 1 
dakika içinde üyeliğinizi sonlandırabilirsiniz.
https://liste.linux.org.tr/mailman/listinfo/linux-sunucu

Cevap