ALT Linux Bugzilla
– Attachment 9843 Details for
Bug 41161
При входе не (авто)монтируется сетевая папка на сервере AD
New bug
|
Search
|
[?]
|
Help
Register
|
Log In
[x]
|
Forgot Password
Login:
[x]
|
EN
|
RU
logs.txt
logs.txt (text/plain), 5.06 KB, created by
Vera Blagoveschenskaya
on 2021-10-19 09:38:50 MSK
(
hide
)
Description:
logs.txt
Filename:
MIME Type:
Creator:
Vera Blagoveschenskaya
Created:
2021-10-19 09:38:50 MSK
Size:
5.06 KB
patch
obsolete
> >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain kernel: audit: type=1101 audit(1634624696.269:156): pid=3853 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_sss acct="aduser1@altad.testdoma" exe="/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (pam_mount.c:173): conv->conv(...): Conversation error >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (pam_mount.c:476): warning: could not obtain password interactively either >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (pam_mount.c:173): conv->conv(...): Conversation error >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (pam_mount.c:476): warning: could not obtain password interactively either >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain kernel: CIFS: Attempting to mount \\10.88.8.226\share >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3857]: key description: cifs.spnego;0;0;39010000;ver=0x2;host=10.88.8.226;ip4=10.88.8.226;sec=krb5;uid=0x40a8c053;creduid=0x40a8c053;user=root;pid=0xf0e >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3858]: ver=2 >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3858]: host=10.88.8.226 >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3858]: ip=10.88.8.226 >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3858]: sec=1 >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3858]: uid=1084801107 >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3858]: creduid=1084801107 >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3858]: user=root >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3858]: pid=3854 >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3857]: get_cachename_from_process_env: pathname=/proc/3854/environ >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3857]: get_existing_cc: default ccache is KEYRING:persistent:1084801107:krb_ccache_k4PBNFy >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3857]: handle_krb5_mech: getting service ticket for 10.88.8.226 >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3857]: cifs_krb5_get_req: unable to get credentials for 10.88.8.226 >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3857]: handle_krb5_mech: failed to obtain service ticket (-1765328377) >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3857]: Unable to obtain service ticket >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain cifs.upcall[3857]: Exit status -1765328377 >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (mount.c:68): Messages from underlying mount program: >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (mount.c:68): Messages from underlying mount program: >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (mount.c:72): mount error(126): Required key not available >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (mount.c:72): Refer to the mount.cifs(8) manual page (e.g. man mount.cifs) and kernel log messages (dmesg) >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (pam_mount.c:522): mount of share failed >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (pam_mount.c:173): conv->conv(...): Conversation error >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (pam_mount.c:476): warning: could not obtain password interactively either >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain kernel: CIFS: VFS: Verify user has a krb5 ticket and keyutils is installed >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain kernel: CIFS: VFS: \\10.88.8.226 Send error in SessSetup = -126 >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain kernel: CIFS: VFS: cifs_mount failed w/return code = -126 >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (mount.c:72): mount error(126): Required key not available >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (mount.c:72): Refer to the mount.cifs(8) manual page (e.g. man mount.cifs) and kernel log messages (dmesg) >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (pam_mount.c:522): mount of share failed >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (pam_mount.c:173): conv->conv(...): Conversation error >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3853]: (pam_mount.c:476): warning: could not obtain password interactively either >Ð¾ÐºÑ 19 09:24:56 client-uwsry.freeipa.testdomain systemd[3859]: Invalid user name > > > >$ klist >Ticket cache: KEYRING:persistent:1084801107:krb_ccache_k4PBNFy >Default principal: aduser1@ALTAD.TESTDOMA > >Valid starting Expires Service principal >19.10.2021 09:24:56 19.10.2021 19:24:53 krbtgt/FREEIPA.TESTDOMAIN@ALTAD.TESTDOMA > renew until 20.10.2021 09:24:53 >19.10.2021 09:24:53 19.10.2021 19:24:53 krbtgt/ALTAD.TESTDOMA@ALTAD.TESTDOMA > renew until 20.10.2021 09:24:53 >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 41161
: 9843