LinuxQuestions.org
Help answer threads with 0 replies.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking
User Name
Password
Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.

Notices


Reply
  Search this Thread
Old 09-20-2003, 08:07 PM   #1
timfair
LQ Newbie
 
Registered: Nov 2002
Distribution: RedHat 8
Posts: 14

Rep: Reputation: 0
Samba/Winbind and port 445


Anyone know if there is a way to change winbind to use a different port other than 445. I am running a Samba print server that I would like to join to a Windows 2000 domain. The PDC is a Small Business Server 2000 running in Mixed-Mode and for some reason it does not have port 445 open. What is port 445 used for? and is there any way to configure Samba/Winbind around it?

Here is the output of "winbindd -i -d 3" :

[root@pserver root]# winbindd -i -d 3
winbindd version 2.2.5 started.
Copyright The Samba Team 2000-2001
Initialising global parameters
params.cm_process() - Processing configuration file "/etc/samba/smb.conf"
Processing section "[global]"
Processing section "[homes]"
Processing section "[printers]"
adding IPC service IPC$
adding IPC service ADMIN$
added interface ip=192.168.1.253 bcast=192.168.1.255 nmask=255.255.255.0
added interface ip=192.168.1.253 bcast=192.168.1.255 nmask=255.255.255.0
resolve_lmhosts: Attempting lmhosts lookup for name AIS<0x1b>
resolve_wins: Attempting wins lookup for name AIS<0x1b>
resolve_wins: WINS server == <192.168.1.2>
bind succeeded on port 0
Got a positive name query response from 192.168.1.2 ( 192.168.1.2 )
bind succeeded on port 0
cm_get_dc_name: Returning DC SBS2K (192.168.1.2) for domain AIS
IPC$ connections done anonymously
Connecting to host=SBS2K share=IPC$
Connecting to 192.168.1.2 at port 445
error connecting to 192.168.1.2:445 (Connection refused)
Connecting to 192.168.1.2 at port 139
Added domain AIS (S-1-5-21-583907252-507921405-839522115)
getting trusted domain list


As you can see, the connection to 445 is always rejected.

wbinfo -u yields :
[root@pserver root]# wbinfo -u
Error looking up domain users

and the debug output from winbind shows:
[13354]: list users
IPC$ connections done anonymously
Connecting to host=SBS2K share=IPC$
resolve_lmhosts: Attempting lmhosts lookup for name SBS2K<0x20>
resolve_hosts: Attempting host lookup for name SBS2K<0x20>
Connecting to 192.168.1.2 at port 445
error connecting to 192.168.1.2:445 (Connection refused)
Connecting to 192.168.1.2 at port 139
 
Old 09-21-2003, 05:51 AM   #2
peter_robb
Senior Member
 
Registered: Feb 2002
Location: Szczecin, Poland
Distribution: Gentoo, Debian
Posts: 2,458

Rep: Reputation: 48
It's an alternative Domain service... maybe Active Directory, don't know for sure...

Nothing is wrong with what is happening because you are getting the information from the port 139 service.

Is it causing a problem? If not, then best leave the engineering reasons to the gurus...
 
Old 09-21-2003, 06:32 PM   #3
timfair
LQ Newbie
 
Registered: Nov 2002
Distribution: RedHat 8
Posts: 14

Original Poster
Rep: Reputation: 0
Thanks for the reply ... The problem is that I can't get Samba to authenticate to the domain. It looks as though winbind goes out the PDC on port 139 however it does not connect, and wbinfo -u results in an error. Here is a report from winbind after using "wbinfo -u" with more detail level ... :

smb_pid=17550859-1.
smb_uid=8195
smb_mid=1
smt_wct=10added inte
smb_vwv[0]=0 (0x0)253 bcast=192.168.
smb_vwv[1]=40 (0x28)
smb_vwv[2]=0 (0x0)
resolve_lm
smb_vwv[7]=56 (0x38)osts lookup for name
smb_vwv[8]=0 (0x0)
smb_vwv[9]=0 (0x0)
smb_bcc=41sent: lmho
rpc_check_hdr: rdata->data_size = 40
000000 smb_io_rpc_hdr rpc_hdr host lookup for name SBS2K<0
0000 major : 05
0001 minor : 00ceeded on port 0
0002 pkt_type : 02g a packet of len 50 to
0003 flags : 0337
0004 pack_type0: 10
Received a p
0005 pack_type1: 0092.168.1.2) port 137
0006 pack_type2: 00
0007 pack_type3: 0092.168.1.2(137) header:
0008 frag_len : 0028response=Yes
000a auth_len : 0000
000c call_id : 00000004gs: bcast=No rec_avail=No rec
000010 smb_io_rpc_hdr_resp rpc_h
0016 cancel_ct : 00mb_name=AIS<1c> rr_type
0017 reserved : 00
rpc_api_pipe: len left: 0 smbtrans read: 40 0 char .SBS2K hex 0C534253324B
000018 lsa_io_r_enum_trust_dom
0018 enum_context : ffffffff answers 10 char .D.SBS2K
001c num_domains : 0000000002020
0020 ptr_enum_domains: 00000000
answers 20 char
0024 status: NT_STATUS_NO_MORE_ENTRIES020202020
tdb(unknown): tdb_brlock failed (fd=9) at offset 4 rw_type=1 lck_type=13IS hex 2020202000C400414953202020202020
[17551]: list users
resolve_lmhosts: Attempting lmhosts lookup for name SBS2K<0x20>020201CC40041495320202020
getlmhostsent: lmhost entry: 127

answers
Sending a packet of len 50 to (192.168.1.2) on port 13700534253
Received a packet of len 337 from (192.168.1.2) port 137 .D.A hex 324B2020202020202020202003440041
nmb packet from 192.168.1.2(137) header: id=16908 opcode=Query(0) response=Yesrs 80 char IS .D hex 49532020202020202020202020201D44
header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yesanswers 90 char ...__MSBROWSE__. hex 0001025F5F4D5342524F5753455F5
header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0
answers a0 char ...SBS2K
answers: nmb_name=AIS<1c> rr_type=33 rr_class=1 ttl=0

answers 0 char .SBS2K hex 0C534253
answers 40 char ...AIS hex 2020202020201CC40041495320202020
answers 50 char .D.AIS hex 20202020202020201B44004149532020
cm_get_dc_name: Returning DC SBS2K (192.168.1.2) for
answers 60 char ...SBS hex 202020202020202020201EC400534253$ connections done anonymously
connecting t
answers 70 char 2K .D.A hex 324B20202

Connecting to 192.168.1.2 at port 139
answers a0 char ...SBS2K hex 01C400534253324B2020202020202020
socket option SO_REUSEADDR = 0
so
answers b0 char 0D.INet~Servic hex 2020304400494E65747E536572766963NODELAY = 1
socket option IPTOS_LOWDELAY = 0
answers c0 char es ...IS~SBS2K. hex 657320201CC40049537E534253324B00
socket option SO_SNDBUF = 16384
answers d0 char .......D......L. hex 0000000000000044000007E9ABC34C00t option SO_SNDLOWAT = 1
socket option SO_RCVLO
answers e0 char ................ hex 000000000SNDTIMEO = 0

smb_bcc=0
size=97
smb_com=0x72
IPC$ connections done anonymouslyb_reh=0
smb_err=0
connecting to SBS2K from pserver with username []\[]d=0
smb_pid=17550
smb_uid=0
Connecting to host=SBS2K share=IPC$
smb_vwv[0]=7 (0x7)
Connecting to 192.168.1.2 at port 445
smb_vwv[2]=
error connecting to 192.168.1.2:445 (Connection refused)
smb_vwv[4]=65 (0x41)
Connecting to 192.168.1.2 at port 139
smb_vwv[6]=256 (0x100)
socket option SO_KEEPALIVE = 0x0)
smb_vwv[
socket option SO_REUSEADDR = 0b_vwv[9]=64768 (0xFD00)
smb_flg=136
smb
socket option SO_SNDTIMEO = 0
smb_pid=17550
socket option SO_RCVTIMEO = 0d=1
smt_wct=17
Sent session request7)
size=0v[1]=1
smb_com=0x0)
smb_rcls=0
smb_v
smb_reh=0(0x100)
smb_err=0
smb_flg=03]=1024 (
smb_flg2=0
smb_tid=0mb_vwv[4]
smb_pid=0
smb_uid=0
smb_vwv
smb_mid=0)
smt_wct=0
smb_vwv[
smb_bcc=0100)
size=97
smb_com=0x72=0 (0x0)
smb_rcls=0
smb_vw
smb_reh=00)
smb_err=0
smb_vwv
smb_flg=13
smb_rcls=0
smb_vwv[7]=0 (0x0)
smb_err=0
smb_vwv[8]=0 (0x0)
smb_fl
smb_vwv[9]=64768 (0xFD00)_tid=0
smb_pid=1
smb_vwv[10]=243 (0xF3)id=8195
sm
smb_vwv[11]=60928 (0xEE00)
smb_vwv[0]=255 (0
smb_vwv[12]=30853 (0x7885)mb_vwv[1]=123 (0x7B)
smb_vwv[13]=39185 (0x9911)0 (0x0)

smb_vwv[14]=50048 (0xC380)23
smb_com=0x73
smb_vwv[15]=61441 (0xF001)
smb_reh=0
smb
smb_vwv[16]=2048 (0x800)36
smb_flg2=4
smb_bcc=28
sm
size=97
smb_com=0x7250
smb_rcls=0=8195
smb_reh=0b_mid=1
smb_e

smb_vwv[3]=1024 (0x400)
smb_tid=43008
smb_vwv[4]=65 (0x41)17550
s
smb_vwv[5]=0 (0x0)
smb_mid=1
smb_vwv[6]=256 (0x100)
smb_vwv[0]=255 (0xFF
smb_vwv[7]=0 (0x0)
smb_vwv[1]=48
smb_vwv[8]=0 (0x0)
smb_vwv[2]
smb_vwv[9]=64768 (0xFD00)
smb_bcc=7
size=
smb_vwv[10]=243 (0xF3)2
smb_rcls
smb_vwv[11]=60928 (0xEE00)
smb_err=0
sm
smb_vwv[12]=30853 (0x7885)g2=49153
smb
smb_vwv[13]=39185 (0x9911)_pid=17550
sm
smb_vwv[14]=50048 (0xC380)mid=1
smt_wct=34
smb_vwv[15]=61441 (0xF001)xFF)

smb_vwv[16]=2048 (0x800)
smb_vw
smb_bcc=280xB00)
size=123
smb_com=0x73=384 (0x180)
smb_rcls=0
smb_flg=136
smb_vwv[16
smb_flg2=49153

smb_tid=0]=0 (0x0)
smb_pid=17550
smb_vwv
smb_uid=2049
smb_mid=1_vwv[19]=
smt_wct=3
smb_vwv[0]=255 (0xFF)(0x0)
smb_vwv[1]=123 (0x7B)(0x8000)
smb_vwv[2]=0 (0x0)wv[22]=0 (0x0)
smb_bcc=82
smb_v
size=48 (0x0)
smb_com=0x75
smb_vw
smb_rcls=0x10)
smb_reh=0
smb
smb_err=0 (0x0)
smb_flg=136
smb_vw
smb_flg2=49153
smb_tid=38918]=0 (0x0)
smb_pid=17550
smb_vwv[28]
smb_uid=2049
smb_mid=1[29]=0 (0
smt_wct=3
smb_flg=136
smb_flg2=49153Syntax: [000]
smb_tid=38918 12 CD AB EF
smb_pid=175507 89 AB xW
smb_uid=2049
smb_mid=1
smt_wct=34
smb_vwv[0]=255 (0xFF)..#Eg..
smb_vwv[1]=103 (0x67)
smb_vwv[2]=1792 (0x700)
smb_vwv[3]=448 (0x1C0)
Bind Transfe
smb_vwv[4]=0 (0x0)5D 88 8A EB 1C C9
smb_vwv[5]=0 (0x0)10 48 60 .]
smb_vwv[6]=0 (0x0)
smb_vwv[7]=0 (0x0)
smb_vwv[8]=0 (0x0)
[010]
smb_vwv[9]=0 (0x0)
smb_vwv[10]=0 (0x0)
smb_vwv[11]=0 (0x0)
smb_vwv[12]=0 (0x0)dr hdr
smb_vwv[13]=0 (0x0)0 major : 05
smb_vwv[14]=0 (0x0)
0001 minor
smb_vwv[20]=0 (0x0)
smb_vwv[21]=32768 (0x8000)

smb_vwv[22]=0 (0x0)8
smb_vwv[23]=0 (0x0)h_len : 0000
smb_vwv[24]=16 (0x10) 000c call_id : 00
smb_vwv[25]=0 (0x0)
000
smb_vwv[26]=0 (0x0)b
smb_vwv[27]=0 (0x0)max_tsize: 1630
smb_vwv[28]=0 (0x0)
0012 m
smb_vwv[29]=0 (0x0)
smb_vwv[30]=0 (0x0)oc_gid: 00000000
smb_vwv[31]=512 (0x200)
0018 num_elem
smb_vwv[32]=65280 (0xFF00)
001
smb_vwv[33]=5 (0x5)
smb_bcc=0 001e n
Bind RPC Pipe[c007]: \PIPE\samr
0020 data :
Bind Abstract Syntax: [000] 78 57 34 12 34 12 CD AB EF 00 01 23 45 67 89 AC xW
0026 data : abcd

0001 minor : 00
smb_reh=0
0002 pkt_type : 0bsmb_flg=8
smb_
0003 flags : 00
smb_tid=43008
0004 pack_type0: 10
smb_uid=8195
0005 pack_type1: 00
smt_wct=16
0006 pack_type2: 00
smb_vwv
0007 pack_type3: 00
smb_vwv[2]=0
0008 frag_len : 0048b_vwv[3]=72 (0x48)
000a auth_len : 0000 (0x0)

000c call_i
size=124
smb_com
0024 data : 12340
smb_reh=0
0026 data : abcd_flg=136
smb_fl
0028 data : ef 00 01 23 45 67 89 ac
smb_pid=17550
smb_uid=8195
0030 version: 00000001mt_wct=10
smb_vwv[0]
0034 data : 8a885d04vwv[1]=68 (0x44)
0038 data : 1ceb
smb_vwv[3
003a data : 11c9
smb_vwv[4]=56 (0x38)
003c data : 9f e8 08 00 2b 10 48 60
smb_vwv[6]=68 (0x44)
0044 version: 000

smb_flg=136
smb_tid=38918flg2=49153
smb_pid=17550b_tid=43008
smb_uid=2049mb_pid=17550
smb_mid=1
smb_u
smt_wct=16
s
smb_vwv[0]=0 (0x0)mt_wct=10
smb_vwv[1]=72 (0x48)
sm
smb_vwv[2]=0 (0x0)
smb_vwv[3]=72 (0x48)
sm
smb_vwv[4]=0 (0x0)
sm
smb_vwv[5]=0 (0x0)
smb_vwv[6]=0 (0x0))
smb_vwv[7]=0 (0x0)44)
smb_vwv[8]=0 (0x0) (0x38)
smb_vwv[9]=0 (0x0)]=0 (0x0)
smb_vwv[10]=82 (0x52) (0x0)
smb_vwv[11]=72 (0x48)
rpc_check_hdr: rda
smb_vwv[12]=82 (0x52)
smb_vwv[13]=2 (0x2)mb_io_rpc_hdr rpc_h
smb_vwv[14]=38 (0x26)
0000 ma
smb_vwv[15]=49159 (0xC007)
0001 minor
smb_bcc=87
size=124 0002
smb_com=
smb_vwv[3]=0 (0x0)001
smb_vwv[4]=56 (0x38)i_pipe: len left: 0
smb_vwv[5]=0 (0x0)
smb_vwv[6]=68 (0x44)
rpc_pipe_bind: rp
smb_vwv[7]=56 (0x38)K.
smb_vwv[8]=0 (0x0)
000010 smb_io_
smb_vwv[9]=0 (0x0)

smb_bcc=69max_tsize:
size=124
smb_com=0x25

smb_rcls=0ize: 10b8
smb_reh=0
smb_err=0 00
smb_flg=136: 0000c978
smb_flg2=49153
smb_tid=389188 len: 000c
smb_pid=17550

smb_uid=2049PIPE\lsass.
smb_mid=1
smt_wct=10 00
smb_vwv[0]=0 (0x0)
smb_vwv[1]=68 (0x44)c result : 0000
smb_vwv[2]=0 (0x0)

smb_vwv[9]=0 (0x0) e8 08 00 2b 10 48
smb_bcc=69
rpc_check_hdr: rdata->data_size = 68040 version: 00000002
000000 smb_io_rpc_hdr rpc_hdr server pipe_name found: \PIP
0000 major : 05
0001 minor : 00: accepted!
0002 pkt_type : 0col: attr:0 da:33554432
0003 flags : 03
init_lsa_obj_a
0004 pack_type0: 10000 lsa_io_q_open_pol
0005 pack_type1: 00 0000 ptr : 000
0006 pack_type2: 00
0004 sys
0007 pack_type3: 00

0008 frag_len : 0044018
000a auth_len : 0000 ptr_root_dir: 00000000
000c call_id : 00000005
0010 ptr_obj_name
rpc_api_pipe: len left: 0 smbtra

001a str: \PIPE\lsass.
create_rpc_request:
0028 num_results: 01
002c result : 0000c_hdr hdr
002e reason : 0000
0001
0030 data : 8a885d04
0002 pkt_type : 00
0034 data : 1ceb 0003 flags : 03
0036 data : 11c9pack_type0: 10
0038 data : 9f e8 08 00 2b 10 48 60
0006 pack_type2: 00
0040 version: 00000002pe3: 00
bind_rpc_pipe: server pipe_name found: \PIPE\lsass
000a auth_len : 0000
0004 uni_max_len: 00000006
0016 opnum : 0006
0008 undoc : 00000000d:26 fnum:800b
000c uni_str_len: 00000006=0x25
smb_rcls=0
0010 buffer : S.B.S.2.K...
smb_flg=8
smb_flg2=49153
001c access_mask: 02000000
smb_pid=17550
create_rpc_request: opnum: 0x39 data_len: 0x38
smt_wct=16
smb_vwv[0]=0 (0x0)
000000 smb_io_rpc_hdr hdr=60 (0x3C)
0000 major : 05
smb_
0001 minor : 00
smb_vwv[4]
0002 pkt_type : 00
smb_vwv[5]=0 (0x0)
0003 flags : 03[6]=0 (0x0)
0004 pack_type0: 10)
smb
0005 pack_type1: 00
smb_vwv[9]=0
0006 pack_type2: 00smb_vwv[10]=82
smb_flg2=49153
0016 opnum : 0039
smb_pid=17550
rpc_api_pipe: cmd:26 fnum:c007
smb_mid=1
smt
size=138
smb_com=0x25 (0x0)
smb_rcls=0
smb_vwv[
smb_reh=00)
smb_err=0
smb_v
smb_flg=8x0)
smb_flg2=49153b_vwv[3]=0 (0x
smb_tid=38918
smb_vw
smb_pid=17550
smb_uid=2049wv[5]=0 (0x0
smb_mid=1
smt_wct=16=48 (0x30)
smb_vwv[0]=0 (0x0)
smb_vwv[7]=56 (0
smb_vwv[1]=56 (0x38)
smb_vwv[8]=0 (0x
smb_vwv[2]=0 (0x0)
smb_vwv[9]=0 (0x
smb_vwv[3]=56 (0x38)smb_bcc=49
smb_vwv[4]=0 (0x0)mb_com=0x25
smb_vwv[5]=0 (0x0)
smb_reh=0
smb_vwv[6]=0 (0=0

smb_flg=136
smb_flg2=491530x0)
smb_tid=38918cc=49
smb_pid=17550dr: rdata->da
smb_uid=2049
smb_mid=1
smt_wct=10 smb_io_rp
smb_vwv[0]=0 (0x0)
smb_vwv[1]=48 (0x30) : 05
smb_vwv[2]=0 (0x0)1 minor : 00
smb_vwv[3]=0 (0x0)
0002 pkt_ty
smb_vwv[4]=56 (0x38)
0003
smb_vwv[5]=0 (0x0)
smb_vwv[6]=48 (0x30) 10
smb_vwv[7]=56 (0x38)type1: 00
smb_vwv[8]=0 (0x0)06 pack_ty
smb_reh=0 timfair
smb_err=0 000c
smb_flg=13600000002ogi
smb_flg2=491531:39:00 fro
00
smb_tid=38918c_hdr_resp rp
smb_pid=17550
smb_uid=2049fair@pser

smb_mid=1oc_hint:
smt_wct=10
smb_vwv[0]=0 (0x0) 0014 context_id:
smb_vwv[1]=48 (0x30) -d 4
0016 c
smb_vwv[2]=0 (0x0)
winbindd vers

smb_vwv[3]=0 (0x0): 00
smb_vwv[4]=56 (0x38)e: len left: 0 smbtr
smb_vwv[5]=0 (0x0)
smb_vwv[6]=48 (0x30)0018 lsa_io_r_open_p
smb_vwv[7]=56 (0x38)
par
0002 pkt_type : 02
0003 flags : 03
0004 pack_type0: 10
0005 pack_type1: 00
0006 pack_type2: 00
0007 pack_type3: 00
0008 frag_len : 0030
000a auth_len : 0000
000c call_id : 00000006
000010 smb_io_rpc_hdr_resp rpc_hdr_resp
0010 alloc_hint: 00000018
0014 context_id: 0000
0016 cancel_ct : 00
0017 reserved : 00
rpc_api_pipe: len left: 0 smbtrans read: 48
000018 samr_io_r_connect
0018 data1: 00000000
001c data2: 00000000
0020 data3: 0000
0022 data4: 0000
0024 data5: 00 00 00 00 00 00 00 00
002c status: NT_STATUS_ACCESS_DENIED
read failed on sock 11, pid 17551: EOF
 
Old 09-22-2003, 04:36 AM   #4
peter_robb
Senior Member
 
Registered: Feb 2002
Location: Szczecin, Poland
Distribution: Gentoo, Debian
Posts: 2,458

Rep: Reputation: 48
Ok, it's not something I have done before...
 
Old 10-30-2009, 07:38 AM   #5
wi2k
LQ Newbie
 
Registered: Oct 2009
Posts: 1

Rep: Reputation: 0
did anyone find solution how to work samba in active directory whithout 445 port?
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Samba and Winbind bkesting Linux - Networking 0 11-18-2004 03:12 PM
Port 445 floppywhopper Linux - Security 3 10-24-2004 01:52 AM
samba with winbind kaasi Linux - Newbie 1 10-26-2003 02:43 PM
Samba 3 & port 445 Anibal Slackware 0 10-24-2003 12:22 PM
Winbind, Samba, NT acb67 Linux - Networking 2 07-22-2003 03:45 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking

All times are GMT -5. The time now is 08:43 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration