Highlighted
khurni Trusted Contributor.
Trusted Contributor.
99 views

Error reading file -from SMB

OK, I'm using my own userid ("admin" type rights) as the filr proxy user to get past the ACL mapping to principal errors.

 

Filr 3.0 is accessing a NetApp via SMB (worked fine when everything was in our own AD).  Now there's another AD Domain where everything got migrated with SID history.  Windows pc's have no problem.

Anyway, not sure about which debug log level for smbclient, so I'm hopefully using the correct log4jpropeties for debug logging.

When I login to Filr web, I see My Files and it displays all the files/folders properly.  But you can't download/do anything anywhere

If you try to the web browser just gives:

HTTP Status 400 - Unknown file


type Status report

message Unknown file

description The request sent by the client was syntactically incorrect.


Apache Tomcat/7.0.70

 

 

 

The appserver.log shows:

2019-07-15 15:58:04,497 DEBUG [http-apr-8443-exec-3] [com.novell.teaming.fi.connection.impl.ResourceDriverManagerImpl] - Opening session in user mode on ACL resource driver 'acme-home-acme_home' using user account 'kjhurni'
2019-07-15 15:58:04,498 DEBUG [http-apr-8443-exec-3] [com.novell.teaming.fi.connection.famt.common.CommonService] - getStreamFromFAMT: Entered for \\acmesvm.acme.com\acme_home\kjhurni\ad-gpoexport.txt
2019-07-15 15:58:04,643 DEBUG [http-apr-8443-exec-3] [com.novell.teaming.fi.connection.famt.common.CommonService] - GetStreamFromFAMT: Reply from request1 for unc: \\acmesvm.acme.com\acme_home\kjhurni\ad-gpoexport.txt
2019-07-15 15:58:04,643 DEBUG [http-apr-8443-exec-3] [com.novell.teaming.fi.connection.famt.common.CommonService] - 200
2019-07-15 15:58:04,643 DEBUG [http-apr-8443-exec-3] [com.novell.teaming.fi.connection.famt.common.CommonService] - Received owner response from famt is
<effrights-resp><rights>NONE</rights></effrights-resp>

2019-07-15 15:58:04,647 ERROR [http-apr-8443-exec-3] [org.kablink.teaming.servlet.forum.ReadFileController] - Error reading file

 

I'm guessing the issue is the "effective rights" response is "none"?

And what would cause that?

If I use Windows Explorer and do effective rights on myself, I get a list back.

 

 

0 Likes
3 Replies
khurni Trusted Contributor.
Trusted Contributor.

Re: Error reading file -from SMB

Hmm, this one is quite interesting.

I am using the filr service/proxy account to the new AD (via LDAP).

I point to the NetApp where the SID history supposedly is all migrated (well I know it is because Windows works).

I added a new NetFolder server to another Share (non-user Home directory). This share houses "shared" data.

OK, so using the SAME filr proxy user, for both netfolder servers.

I login as "myself", and while I can see directories/files on my Home Directory and the NetFolder server, it won't let me download/do squat.  Keeps saying effrights NONE (famtd)

I login as the "admin" account in Filr, which of course, doesn't exist in AD.

If I recall, it will then use the Filr Proxy User.

THAT works.  It can dowload and do stuff.

So I wonder what would cause it to not be able to work with things?

 

The docs only mention that the filr proxy user needs:

Read

Read & Execute

List Folder Contents

Write

and

Modify

Well, it has those rights and more.

Heck, *I* have those rights and more.

Yet, when I login as myself = no soup.

Login as Admin = working

 

0 Likes
khurni Trusted Contributor.
Trusted Contributor.

Re: Error reading file -from SMB

Finally found a comparable snipped from the famtd logs in debug.

For some reason on the "old" AD, Filr shows "effrights"' as "Contributor", but on the new AD, filr thinks effrights are NONE.

I have no idea *why*.  Perhaps Filr cannot make use of SID HISTORY?

NOT working logs:

Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]FAMTRequest::on_start_element: head node found
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]FAMTRequest :: on_characters: Key of tag authtype : ntlm
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]FAMTRequest :: on_characters: Key of tag servtype : windows_server
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]FAMTRequest :: on_characters: Key of tag fileopmet : effrights
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]FAMTRequest :: on_characters: Key of tag met : authenticate
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]FAMTRequest :: on_characters: Key of tag netbios : svc
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]FAMTRequest :: on_end_element : Key of tag proxyuserid : SVC\\filr-ad
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]FAMTRequest :: on_characters: Key of tag sid : GkOs3gXhcGg4ia89jqNxww==
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]FAMTRequest:: on_characters: Key of tag srv : dec-home
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]FAMTRequest :: on_end_element : Key of tag udn : kjhurni
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]FAMTRequest :: on_end_element : Key of tag unc : \\dec-home\dec_home\kjhurni\2018payrollcalendarfinal.pdf
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]FAMTRequest :: on_characters: Key of tag workgroup : svc.acme.com
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]FAMTRequest::parseRequest: parseRequest is successful!
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]CIFSUtils::ConvertFDNToUserName: Converted UDN is kjhurni
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]ConvertBackSlashToForward: header->unc = //dec-home/dec_home/kjhurni/2018payrollcalendarfinal.pdf
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]CIFSUtils::url encoded UNC is: //dec-home/dec_home/kjhurni/2018payrollcalendarfinal.pdf
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]FAMTSession::CheckSessionCache setinUse(true) :[sid - GkOs3gXhcGg4ia89jqNxww==]
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]setinUse(true): called
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]FAMTPluginHandler::FAMTPluginHandler: Session Object is reused for type 1
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]FAMTPluginHandler::setRequestBlob: called
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]FAMTPluginHandler::validateRequest: called
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]CIFSOperations::FAMT_GetUserRights:[sid - GkOs3gXhcGg4ia89jqNxww==] called GkOs3gXhcGg4ia89jqNxww==
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]Trustees::Trustees called
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373] CIFSOperations::FAMT_GetUserRights:[sid - GkOs3gXhcGg4ia89jqNxww==] Logged in user kjhurni@svc.acme.com
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]CIFSUtils::FAMT_StripUserName stripped username kjhurni
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList:srcPath : smb://dec-home/dec_home/kjhurni/2018payrollcalendarfinal.pdf
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]famt_cifs_auth_fn_with_ctx: called
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]famt_cifs_auth_fn_with_ctx: pAuData = 0x6bd7c0
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]famt_cifs_auth_fn_with_ctx: called
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]famt_cifs_auth_fn_with_ctx: pAuData = 0x6bd7c0
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList:value : REVISION:1,OWNER:S-1-5-32-544,GROUP:S-1-5-21-976374488-563428744-3473557-513,ACL:S-1-5-21-1141342763-1778295836-3201674781-8472:0/16/0x001f01ff,ACL:S-1-5-21-976374488-563428744-3473557-3355:0/16/0x001301bf,ACL:S-1-5-21-976374488-563428744-3473557-60421:0/16/0x001f01ff,ACL:S-1-5-21-976374488-563428744-3473557-512:0/16/0x001f01ff,ACL:S-1-5-21-976374488-563428744-3473557-66810:0/16/0x001301bf,USERSID:S-1-5-21-1141342763-1778295836-3201674781-634464
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList:objname: S-1-5-21-1141342763-1778295836-3201674781-8472, rights: 0/16/0x001f01ff
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-3355, rights: 0/16/0x001301bf
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-60421, rights: 0/16/0x001f01ff
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-512, rights: 0/16/0x001f01ff
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-66810, rights: 0/16/0x001301bf
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList: user SID: S-1-5-21-1141342763-1778295836-3201674781-634464
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]CIFSOperations::FAMT_GetUserRights:[sid - GkOs3gXhcGg4ia89jqNxww==] Rights for user kjhurni is NONE granular_rights: 0
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]FAMTPluginHandler::sendBlob called
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]Trustees::~Trustees called
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]setinUse(false): called
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]CIFSOperations::processRequest:[sid - GkOs3gXhcGg4ia89jqNxww==] called

 

 

Working logs:

Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]FAMTRequest::on_start_element: head node found
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]FAMTRequest :: on_characters: Key of tag authtype : ntlm
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]FAMTRequest :: on_characters: Key of tag servtype : windows_server
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]FAMTRequest :: on_characters: Key of tag fileopmet : effrights
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]FAMTRequest :: on_characters: Key of tag met : authenticate
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]FAMTRequest :: on_characters: Key of tag netbios : dec
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]FAMTRequest :: on_end_element : Key of tag proxyuserid : dec\\filr-ad
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]FAMTRequest :: on_characters: Key of tag sid : F/tVdmbZFNXUOZNBse+W+w==
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]FAMTRequest:: on_characters: Key of tag srv : dec-home
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]FAMTRequest :: on_end_element : Key of tag udn : kjhurni
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]FAMTRequest :: on_end_element : Key of tag unc : \\dec-home\dec_home\kjhurni\201604_User Guide_Accessing Enterprise VDI with your RSA SecurID Token.pdf
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]FAMTRequest :: on_characters: Key of tag workgroup : old.acme.com
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]FAMTRequest::parseRequest: parseRequest is successful!
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]CIFSUtils::ConvertFDNToUserName: Converted UDN is kjhurni
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]ConvertBackSlashToForward: header->unc = //dec-home/dec_home/kjhurni/201604_User Guide_Accessing Enterprise VDI with your RSA SecurID Token.pdf
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]CIFSUtils::url encoded UNC is: //dec-home/dec_home/kjhurni/201604_User%20Guide_Accessing%20Enterprise%20VDI%20with%20your%20RSA%20SecurID%20Token.pdf
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]FAMTSession::CheckSessionCache setinUse(true) :[sid - F/tVdmbZFNXUOZNBse+W+w==]
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]setinUse(true): called
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]FAMTPluginHandler::FAMTPluginHandler: Session Object is reused for type 1
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]FAMTPluginHandler::setRequestBlob: called
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]FAMTPluginHandler::validateRequest: called
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]CIFSOperations::FAMT_GetUserRights:[sid - F/tVdmbZFNXUOZNBse+W+w==] called F/tVdmbZFNXUOZNBse+W+w==
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]Trustees::Trustees called
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399] CIFSOperations::FAMT_GetUserRights:[sid - F/tVdmbZFNXUOZNBse+W+w==] Logged in user kjhurni@old.acme.com
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]CIFSUtils::FAMT_StripUserName stripped username kjhurni
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList:srcPath : smb://dec-home/dec_home/kjhurni/201604_User%20Guide_Accessing%20Enterprise%20VDI%20with%20your%20RSA%20SecurID%20Token.pdf
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]famt_cifs_auth_fn_with_ctx: called
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]famt_cifs_auth_fn_with_ctx: pAuData = 0x6ad640
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]famt_cifs_auth_fn_with_ctx: called
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]famt_cifs_auth_fn_with_ctx: pAuData = 0x6ad640
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList:value : REVISION:1,OWNER:S-1-5-32-544,GROUP:S-1-5-21-976374488-563428744-3473557-513,ACL:S-1-5-21-1141342763-1778295836-3201674781-8472:0/16/0x001f01ff,ACL:S-1-5-21-976374488-563428744-3473557-3355:0/16/0x001301bf,ACL:S-1-5-21-976374488-563428744-3473557-60421:0/16/0x001f01ff,ACL:S-1-5-21-976374488-563428744-3473557-512:0/16/0x001f01ff,ACL:S-1-5-21-976374488-563428744-3473557-66810:0/16/0x001301bf,USERSID:S-1-5-21-976374488-563428744-3473557-3355
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList:objname: S-1-5-21-1141342763-1778295836-3201674781-8472, rights: 0/16/0x001f01ff
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-3355, rights: 0/16/0x001301bf
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-60421, rights: 0/16/0x001f01ff
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-512, rights: 0/16/0x001f01ff
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-66810, rights: 0/16/0x001301bf
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList: user SID: S-1-5-21-976374488-563428744-3473557-3355
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]CIFSOperations::FAMT_GetUserRights:[sid - F/tVdmbZFNXUOZNBse+W+w==] Rights for user kjhurni is CONTRIBUTOR granular_rights: 1301bf
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]FAMTPluginHandler::sendBlob called
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]Trustees::~Trustees called
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]setinUse(false): called
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]CIFSOperations::processRequest:[sid - F/tVdmbZFNXUOZNBse+W+w==] called

0 Likes
khurni Trusted Contributor.
Trusted Contributor.

Re: Error reading file -from SMB

OK, went through log snippets.

I'm thinking that Filr isn't capable of using/reading the SIDHistory field in AD and that's the problem.  (cant' find any KB about that).

The objectSID changed obviously from old AD to new AD, but the SID history is intact.

I'm conjecturing that this is the reason that famtd is returning effrights of NONE on the new domain and effrights of contributor on the old one.

The new community site is a little painful when trying to post log snippets.

 

not working/new AD:

Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList:srcPath : smb://dec-home/dec_home/kjhurni/2018payrollcalendarfinal.pdf
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]famt_cifs_auth_fn_with_ctx: called
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]famt_cifs_auth_fn_with_ctx: pAuData = 0x6bd7c0
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]famt_cifs_auth_fn_with_ctx: called
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]famt_cifs_auth_fn_with_ctx: pAuData = 0x6bd7c0
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList:value : REVISION:1,OWNER:S-1-5-32-544,GROUP:S-1-5-21-976374488-563428744-3473557-513,ACL:S-1-5-21-1141342763-1778295836-3201674781-8472:0/16/0x001f01ff,ACL:S-1-5-21-976374488-563428744-3473557-3355:0/16/0x001301bf,ACL:S-1-5-21-976374488-563428744-3473557-60421:0/16/0x001f01ff,ACL:S-1-5-21-976374488-563428744-3473557-512:0/16/0x001f01ff,ACL:S-1-5-21-976374488-563428744-3473557-66810:0/16/0x001301bf,USERSID:S-1-5-21-1141342763-1778295836-3201674781-634464
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList:objname: S-1-5-21-1141342763-1778295836-3201674781-8472, rights: 0/16/0x001f01ff
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-3355, rights: 0/16/0x001301bf
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-60421, rights: 0/16/0x001f01ff
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-512, rights: 0/16/0x001f01ff
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-66810, rights: 0/16/0x001301bf
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]Trustees::PopulateTrusteeList: user SID: S-1-5-21-1141342763-1778295836-3201674781-634464
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]CIFSOperations::FAMT_GetUserRights:[sid - GkOs3gXhcGg4ia89jqNxww==] Rights for user kjhurni is NONE granular_rights: 0
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]FAMTPluginHandler::sendBlob called
Jul 15 16:56:32 filr-ad famtd[2727]: INFO:[LWP:3373]Trustees::~Trustees called
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]setinUse(false): called
Jul 15 16:56:32 filr-ad famtd[2727]: DEBUG:[LWP:3373]CIFSOperations::processRequest:[sid - GkOs3gXhcGg4ia89jqNxww==] called

 

working/old AD:

Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList:srcPath : smb://dec-home/dec_home/kjhurni/201604_User%20Guide_Accessing%20Enterprise%20VDI%20with%20your%20RSA%20SecurID%20Token.pdf
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]famt_cifs_auth_fn_with_ctx: called
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]famt_cifs_auth_fn_with_ctx: pAuData = 0x6ad640
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]famt_cifs_auth_fn_with_ctx: called
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]famt_cifs_auth_fn_with_ctx: pAuData = 0x6ad640
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList:value : REVISION:1,OWNER:S-1-5-32-544,GROUP:S-1-5-21-976374488-563428744-3473557-513,ACL:S-1-5-21-1141342763-1778295836-3201674781-8472:0/16/0x001f01ff,ACL:S-1-5-21-976374488-563428744-3473557-3355:0/16/0x001301bf,ACL:S-1-5-21-976374488-563428744-3473557-60421:0/16/0x001f01ff,ACL:S-1-5-21-976374488-563428744-3473557-512:0/16/0x001f01ff,ACL:S-1-5-21-976374488-563428744-3473557-66810:0/16/0x001301bf,USERSID:S-1-5-21-976374488-563428744-3473557-3355
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList:objname: S-1-5-21-1141342763-1778295836-3201674781-8472, rights: 0/16/0x001f01ff
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-3355, rights: 0/16/0x001301bf
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-60421, rights: 0/16/0x001f01ff
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-512, rights: 0/16/0x001f01ff
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList:objname: S-1-5-21-976374488-563428744-3473557-66810, rights: 0/16/0x001301bf
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]Trustees::PopulateTrusteeList: user SID: S-1-5-21-976374488-563428744-3473557-3355
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]CIFSOperations::FAMT_GetUserRights:[sid - F/tVdmbZFNXUOZNBse+W+w==] Rights for user kjhurni is CONTRIBUTOR granular_rights: 1301bf
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]FAMTPluginHandler::sendBlob called
Jul 15 16:28:50 filr-ad famtd[3248]: INFO:[LWP:3399]Trustees::~Trustees called
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]setinUse(false): called
Jul 15 16:28:50 filr-ad famtd[3248]: DEBUG:[LWP:3399]CIFSOperations::processRequest:[sid - F/tVdmbZFNXUOZNBse+W+w==] called

0 Likes
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.