<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Alfresco CIFS Kerberos Vista SP1 problem in Alfresco Archive</title>
    <link>https://connect.hyland.com/t5/alfresco-archive/alfresco-cifs-kerberos-vista-sp1-problem/m-p/184693#M137823</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;All,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Here's my setup:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Alfresco Server running on CentOS 5.2, running 3.0 Stable.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Oracle 10gR2 database for Alfresco storage.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2 clients (both 32-bit):&amp;nbsp; 1 running Vista SP1, one running XP SP3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Authentication using Kerberos to Microsoft AD on a Windows 2003 server.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I have been struggling to get Alfresco working with Kerberos.&amp;nbsp; I have kerberos logins working for the WEB UI from both the Vista and XP clients, and I also have Kerberos authentication working for CIFS from XP, but not from Vista.&amp;nbsp; I have enabled all the Kerberos and SMB debugging in log4j.properties.&amp;nbsp; The odd part is that on both XP and Vista it looks like Kerberos successfully authenticates.&amp;nbsp; The only difference is that on XP it then presents me the file share and on Vista it gives me an "unspecified error" (from Windows Explorer) or a "System error 58 has occurred.&amp;nbsp; The specified server cannot perform the requested operation." if I do a net use * \\alfresco_server\alfresco.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Here's the debugging output from catalina.out for a successful CIFS connection on an XP client.&lt;BR /&gt;&lt;/STRONG&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;&lt;BR /&gt;14:33:52,972 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=8, UID=0, PID=65279&lt;BR /&gt;14:33:52,972 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=977,Authenticator=EncType=3,Kvno=-1,Len=176]&lt;BR /&gt;14:33:52,972 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734033014/14274&lt;BR /&gt;object 0: 1239734033014/14274&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 260683064&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 520862752&lt;BR /&gt;14:33:52,974 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:33:52,974 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:33:52,974 User:UserName DEBUG [smb.protocol.auth] Machine account logon, VISTA-CLIENT$, as null logon&lt;BR /&gt;14:33:52,974 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user VISTA-CLIENT$&lt;BR /&gt;14:33:52,976 User:UserName DEBUG [smb.protocol.auth] User&amp;nbsp; logged on&amp;nbsp; (type Null)&lt;BR /&gt;14:33:52,976 User:UserName DEBUG [smb.protocol.auth] Allocated UID=0 for VC=[0:0,[:null,Windows 2002 Service Pack 3 2600,Windows 2002 5.1,10.136.96.10],Tree=0,Searches=0]&lt;BR /&gt;14:33:53,089 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=32, UID=0, PID=65279&lt;BR /&gt;14:33:53,089 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1113,Authenticator=EncType=3,Kvno=-1,Len=168]&lt;BR /&gt;14:33:53,089 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734033014/14276&lt;BR /&gt;object 1: 1239733767000/595&lt;BR /&gt;object 2: 1239733767000/594&lt;BR /&gt;object 0: 1239734033014/14276&lt;BR /&gt;object 1: 1239733767000/595&lt;BR /&gt;object 2: 1239733767000/594&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 263898451&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 706729883&lt;BR /&gt;14:33:53,091 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:33:53,091 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:33:53,092 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName&lt;BR /&gt;14:33:53,094 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on&amp;nbsp; (type Normal)&lt;BR /&gt;14:33:53,094 User:UserName DEBUG [smb.protocol.auth] Allocated UID=1 for VC=[1:1,[UserName@MYDOMAIN.COM:null,Windows 2002 Service Pack 3 2600,Windows 2002 5.1,10.136.96.10],Tree=0,Searches=0]&lt;BR /&gt;14:33:54,112 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=8, UID=0, PID=65279&lt;BR /&gt;14:33:54,112 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1113,Authenticator=EncType=3,Kvno=-1,Len=168]&lt;BR /&gt;14:33:54,112 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734034014/14277&lt;BR /&gt;object 1: 1239734033014/14276&lt;BR /&gt;object 2: 1239733767000/595&lt;BR /&gt;object 3: 1239733767000/594&lt;BR /&gt;object 0: 1239734034014/14277&lt;BR /&gt;object 1: 1239734033014/14276&lt;BR /&gt;object 2: 1239733767000/595&lt;BR /&gt;object 3: 1239733767000/594&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 283090984&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 1045326895&lt;BR /&gt;14:33:54,114 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:33:54,115 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:33:54,116 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName&lt;BR /&gt;14:33:54,118 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on&amp;nbsp; (type Normal)&lt;BR /&gt;14:33:54,118 User:UserName DEBUG [smb.protocol.auth] Allocated UID=0 for VC=[0:0,[UserName@MYDOMAIN.COM:null,Windows 2002 Service Pack 3 2600,Windows 2002 5.1,10.136.96.10],Tree=0,Searches=0]&lt;BR /&gt;14:33:54,138 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=104, UID=0, PID=65279&lt;BR /&gt;14:33:54,138 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=977,Authenticator=EncType=3,Kvno=-1,Len=176]&lt;BR /&gt;14:33:54,138 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734034014/14278&lt;BR /&gt;object 1: 1239734033014/14274&lt;BR /&gt;object 0: 1239734034014/14278&lt;BR /&gt;object 1: 1239734033014/14274&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 282723259&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 529854855&lt;BR /&gt;14:33:54,140 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:33:54,140 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:33:54,140 User:UserName DEBUG [smb.protocol.auth] Machine account logon, VISTA-CLIENT$, as null logon&lt;BR /&gt;14:33:54,140 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user VISTA-CLIENT$&lt;BR /&gt;14:33:54,141 User:UserName DEBUG [smb.protocol.auth] User&amp;nbsp; logged on&amp;nbsp; (type Null)&lt;BR /&gt;14:33:54,142 User:UserName DEBUG [smb.protocol.auth] Allocated UID=1 for VC=[1:1,[:null,Windows 2002 Service Pack 3 2600,Windows 2002 5.1,10.136.96.10],Tree=0,Searches=0]&lt;BR /&gt;&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;BR /&gt;&lt;STRONG&gt;Here's the debugging output from catalina.out for an UNSUCCESSFUL attempt from Vista.&amp;nbsp; Note that it looks like it is saying successful, but Vista comes back with an error anyway.&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;14:41:59,098 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=8, UID=0, PID=65279&lt;BR /&gt;14:41:59,099 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]&lt;BR /&gt;14:41:59,099 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734518000/608&lt;BR /&gt;object 1: 1239734422000/606&lt;BR /&gt;object 2: 1239734422000/605&lt;BR /&gt;object 3: 1239734422000/604&lt;BR /&gt;object 4: 1239734422000/603&lt;BR /&gt;object 5: 1239734422000/602&lt;BR /&gt;object 6: 1239734422000/601&lt;BR /&gt;object 7: 1239734422000/600&lt;BR /&gt;object 8: 1239734422000/599&lt;BR /&gt;object 9: 1239734421000/598&lt;BR /&gt;object 10: 1239734421000/597&lt;BR /&gt;object 0: 1239734518000/608&lt;BR /&gt;object 1: 1239734422000/606&lt;BR /&gt;object 2: 1239734422000/605&lt;BR /&gt;object 3: 1239734422000/604&lt;BR /&gt;object 4: 1239734422000/603&lt;BR /&gt;object 5: 1239734422000/602&lt;BR /&gt;object 6: 1239734422000/601&lt;BR /&gt;object 7: 1239734422000/600&lt;BR /&gt;object 8: 1239734422000/599&lt;BR /&gt;object 9: 1239734421000/598&lt;BR /&gt;object 10: 1239734421000/597&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 902048570&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 787154794&lt;BR /&gt;14:41:59,100 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:41:59,101 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:41:59,102 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName&lt;BR /&gt;14:41:59,104 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on&amp;nbsp; (type Normal)&lt;BR /&gt;14:41:59,104 User:UserName DEBUG [smb.protocol.auth] Allocated UID=0 for VC=[0:0,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]&lt;BR /&gt;14:41:59,106 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=16, UID=0, PID=65279&lt;BR /&gt;14:41:59,106 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]&lt;BR /&gt;14:41:59,106 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734518000/609&lt;BR /&gt;object 1: 1239734518000/608&lt;BR /&gt;object 2: 1239734422000/606&lt;BR /&gt;object 3: 1239734422000/605&lt;BR /&gt;object 4: 1239734422000/604&lt;BR /&gt;object 5: 1239734422000/603&lt;BR /&gt;object 6: 1239734422000/602&lt;BR /&gt;object 7: 1239734422000/601&lt;BR /&gt;object 8: 1239734422000/600&lt;BR /&gt;object 9: 1239734422000/599&lt;BR /&gt;object 10: 1239734421000/598&lt;BR /&gt;object 11: 1239734421000/597&lt;BR /&gt;object 0: 1239734518000/609&lt;BR /&gt;object 1: 1239734518000/608&lt;BR /&gt;object 2: 1239734422000/606&lt;BR /&gt;object 3: 1239734422000/605&lt;BR /&gt;object 4: 1239734422000/604&lt;BR /&gt;object 5: 1239734422000/603&lt;BR /&gt;object 6: 1239734422000/602&lt;BR /&gt;object 7: 1239734422000/601&lt;BR /&gt;object 8: 1239734422000/600&lt;BR /&gt;object 9: 1239734422000/599&lt;BR /&gt;object 10: 1239734421000/598&lt;BR /&gt;object 11: 1239734421000/597&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 902501280&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 807451295&lt;BR /&gt;14:41:59,108 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:41:59,108 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:41:59,110 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName&lt;BR /&gt;14:41:59,111 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on&amp;nbsp; (type Normal)&lt;BR /&gt;14:41:59,111 User:UserName DEBUG [smb.protocol.auth] Allocated UID=1 for VC=[0:1,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]&lt;BR /&gt;14:41:59,113 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=24, UID=0, PID=65279&lt;BR /&gt;14:41:59,113 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]&lt;BR /&gt;14:41:59,113 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734518000/610&lt;BR /&gt;object 1: 1239734518000/609&lt;BR /&gt;object 2: 1239734518000/608&lt;BR /&gt;object 3: 1239734422000/606&lt;BR /&gt;object 4: 1239734422000/605&lt;BR /&gt;object 5: 1239734422000/604&lt;BR /&gt;object 6: 1239734422000/603&lt;BR /&gt;object 7: 1239734422000/602&lt;BR /&gt;object 8: 1239734422000/601&lt;BR /&gt;object 9: 1239734422000/600&lt;BR /&gt;object 10: 1239734422000/599&lt;BR /&gt;object 11: 1239734421000/598&lt;BR /&gt;object 12: 1239734421000/597&lt;BR /&gt;object 0: 1239734518000/610&lt;BR /&gt;object 1: 1239734518000/609&lt;BR /&gt;object 2: 1239734518000/608&lt;BR /&gt;object 3: 1239734422000/606&lt;BR /&gt;object 4: 1239734422000/605&lt;BR /&gt;object 5: 1239734422000/604&lt;BR /&gt;object 6: 1239734422000/603&lt;BR /&gt;object 7: 1239734422000/602&lt;BR /&gt;object 8: 1239734422000/601&lt;BR /&gt;object 9: 1239734422000/600&lt;BR /&gt;object 10: 1239734422000/599&lt;BR /&gt;object 11: 1239734421000/598&lt;BR /&gt;object 12: 1239734421000/597&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 902456687&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 62868259&lt;BR /&gt;14:41:59,115 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:41:59,115 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:41:59,116 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName&lt;BR /&gt;14:41:59,118 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on&amp;nbsp; (type Normal)&lt;BR /&gt;14:41:59,118 User:UserName DEBUG [smb.protocol.auth] Allocated UID=2 for VC=[0:2,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]&lt;BR /&gt;14:42:00,132 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=32, UID=0, PID=65279&lt;BR /&gt;14:42:00,132 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]&lt;BR /&gt;14:42:00,132 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734519000/611&lt;BR /&gt;object 1: 1239734518000/610&lt;BR /&gt;object 2: 1239734518000/609&lt;BR /&gt;object 3: 1239734518000/608&lt;BR /&gt;object 4: 1239734422000/606&lt;BR /&gt;object 5: 1239734422000/605&lt;BR /&gt;object 6: 1239734422000/604&lt;BR /&gt;object 7: 1239734422000/603&lt;BR /&gt;object 8: 1239734422000/602&lt;BR /&gt;object 9: 1239734422000/601&lt;BR /&gt;object 10: 1239734422000/600&lt;BR /&gt;object 11: 1239734422000/599&lt;BR /&gt;object 12: 1239734421000/598&lt;BR /&gt;object 13: 1239734421000/597&lt;BR /&gt;object 0: 1239734519000/611&lt;BR /&gt;object 1: 1239734518000/610&lt;BR /&gt;object 2: 1239734518000/609&lt;BR /&gt;object 3: 1239734518000/608&lt;BR /&gt;object 4: 1239734422000/606&lt;BR /&gt;object 5: 1239734422000/605&lt;BR /&gt;object 6: 1239734422000/604&lt;BR /&gt;object 7: 1239734422000/603&lt;BR /&gt;object 8: 1239734422000/602&lt;BR /&gt;object 9: 1239734422000/601&lt;BR /&gt;object 10: 1239734422000/600&lt;BR /&gt;object 11: 1239734422000/599&lt;BR /&gt;object 12: 1239734421000/598&lt;BR /&gt;object 13: 1239734421000/597&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 891739601&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 997828725&lt;BR /&gt;14:42:00,134 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:42:00,134 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:42:00,136 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName&lt;BR /&gt;14:42:00,137 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on&amp;nbsp; (type Normal)&lt;BR /&gt;14:42:00,137 User:UserName DEBUG [smb.protocol.auth] Allocated UID=3 for VC=[0:3,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]&lt;BR /&gt;14:42:00,140 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=40, UID=0, PID=65279&lt;BR /&gt;14:42:00,140 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]&lt;BR /&gt;14:42:00,140 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734519000/612&lt;BR /&gt;object 1: 1239734519000/611&lt;BR /&gt;object 2: 1239734518000/610&lt;BR /&gt;object 3: 1239734518000/609&lt;BR /&gt;object 4: 1239734518000/608&lt;BR /&gt;object 5: 1239734422000/606&lt;BR /&gt;object 6: 1239734422000/605&lt;BR /&gt;object 7: 1239734422000/604&lt;BR /&gt;object 8: 1239734422000/603&lt;BR /&gt;object 9: 1239734422000/602&lt;BR /&gt;object 10: 1239734422000/601&lt;BR /&gt;object 11: 1239734422000/600&lt;BR /&gt;object 12: 1239734422000/599&lt;BR /&gt;object 13: 1239734421000/598&lt;BR /&gt;object 14: 1239734421000/597&lt;BR /&gt;object 0: 1239734519000/612&lt;BR /&gt;object 1: 1239734519000/611&lt;BR /&gt;object 2: 1239734518000/610&lt;BR /&gt;object 3: 1239734518000/609&lt;BR /&gt;object 4: 1239734518000/608&lt;BR /&gt;object 5: 1239734422000/606&lt;BR /&gt;object 6: 1239734422000/605&lt;BR /&gt;object 7: 1239734422000/604&lt;BR /&gt;object 8: 1239734422000/603&lt;BR /&gt;object 9: 1239734422000/602&lt;BR /&gt;object 10: 1239734422000/601&lt;BR /&gt;object 11: 1239734422000/600&lt;BR /&gt;object 12: 1239734422000/599&lt;BR /&gt;object 13: 1239734421000/598&lt;BR /&gt;object 14: 1239734421000/597&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 891622721&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 953792882&lt;BR /&gt;14:42:00,142 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:42:00,142 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:42:00,143 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName&lt;BR /&gt;14:42:00,145 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on&amp;nbsp; (type Normal)&lt;BR /&gt;14:42:00,145 User:UserName DEBUG [smb.protocol.auth] Allocated UID=4 for VC=[0:4,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]&lt;BR /&gt;14:42:00,147 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=48, UID=0, PID=65279&lt;BR /&gt;14:42:00,147 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]&lt;BR /&gt;14:42:00,147 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734519000/613&lt;BR /&gt;object 1: 1239734519000/612&lt;BR /&gt;object 2: 1239734519000/611&lt;BR /&gt;object 3: 1239734518000/610&lt;BR /&gt;object 4: 1239734518000/609&lt;BR /&gt;object 5: 1239734518000/608&lt;BR /&gt;object 6: 1239734422000/606&lt;BR /&gt;object 7: 1239734422000/605&lt;BR /&gt;object 8: 1239734422000/604&lt;BR /&gt;object 9: 1239734422000/603&lt;BR /&gt;object 10: 1239734422000/602&lt;BR /&gt;object 11: 1239734422000/601&lt;BR /&gt;object 12: 1239734422000/600&lt;BR /&gt;object 13: 1239734422000/599&lt;BR /&gt;object 14: 1239734421000/598&lt;BR /&gt;object 15: 1239734421000/597&lt;BR /&gt;object 0: 1239734519000/613&lt;BR /&gt;object 1: 1239734519000/612&lt;BR /&gt;object 2: 1239734519000/611&lt;BR /&gt;object 3: 1239734518000/610&lt;BR /&gt;object 4: 1239734518000/609&lt;BR /&gt;object 5: 1239734518000/608&lt;BR /&gt;object 6: 1239734422000/606&lt;BR /&gt;object 7: 1239734422000/605&lt;BR /&gt;object 8: 1239734422000/604&lt;BR /&gt;object 9: 1239734422000/603&lt;BR /&gt;object 10: 1239734422000/602&lt;BR /&gt;object 11: 1239734422000/601&lt;BR /&gt;object 12: 1239734422000/600&lt;BR /&gt;object 13: 1239734422000/599&lt;BR /&gt;object 14: 1239734421000/598&lt;BR /&gt;object 15: 1239734421000/597&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 891553170&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 685705025&lt;BR /&gt;14:42:00,149 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:42:00,149 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:42:00,150 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName&lt;BR /&gt;14:42:00,152 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on&amp;nbsp; (type Normal)&lt;BR /&gt;14:42:00,152 User:UserName DEBUG [smb.protocol.auth] Allocated UID=5 for VC=[0:5,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]&lt;BR /&gt;14:42:00,155 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=56, UID=0, PID=65279&lt;BR /&gt;14:42:00,155 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]&lt;BR /&gt;14:42:00,155 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734519000/614&lt;BR /&gt;object 1: 1239734519000/613&lt;BR /&gt;object 2: 1239734519000/612&lt;BR /&gt;object 3: 1239734519000/611&lt;BR /&gt;object 4: 1239734518000/610&lt;BR /&gt;object 5: 1239734518000/609&lt;BR /&gt;object 6: 1239734518000/608&lt;BR /&gt;object 7: 1239734422000/606&lt;BR /&gt;object 8: 1239734422000/605&lt;BR /&gt;object 9: 1239734422000/604&lt;BR /&gt;object 10: 1239734422000/603&lt;BR /&gt;object 11: 1239734422000/602&lt;BR /&gt;object 12: 1239734422000/601&lt;BR /&gt;object 13: 1239734422000/600&lt;BR /&gt;object 14: 1239734422000/599&lt;BR /&gt;object 15: 1239734421000/598&lt;BR /&gt;object 16: 1239734421000/597&lt;BR /&gt;object 0: 1239734519000/614&lt;BR /&gt;object 1: 1239734519000/613&lt;BR /&gt;object 2: 1239734519000/612&lt;BR /&gt;object 3: 1239734519000/611&lt;BR /&gt;object 4: 1239734518000/610&lt;BR /&gt;object 5: 1239734518000/609&lt;BR /&gt;object 6: 1239734518000/608&lt;BR /&gt;object 7: 1239734422000/606&lt;BR /&gt;object 8: 1239734422000/605&lt;BR /&gt;object 9: 1239734422000/604&lt;BR /&gt;object 10: 1239734422000/603&lt;BR /&gt;object 11: 1239734422000/602&lt;BR /&gt;object 12: 1239734422000/601&lt;BR /&gt;object 13: 1239734422000/600&lt;BR /&gt;object 14: 1239734422000/599&lt;BR /&gt;object 15: 1239734421000/598&lt;BR /&gt;object 16: 1239734421000/597&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 892034346&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 854614359&lt;BR /&gt;14:42:00,157 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:42:00,157 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:42:00,158 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName&lt;BR /&gt;14:42:00,160 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on&amp;nbsp; (type Normal)&lt;BR /&gt;14:42:00,160 User:UserName DEBUG [smb.protocol.auth] Allocated UID=6 for VC=[0:6,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]&lt;BR /&gt;14:42:00,162 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=64, UID=0, PID=65279&lt;BR /&gt;14:42:00,162 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]&lt;BR /&gt;14:42:00,162 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734519000/615&lt;BR /&gt;object 1: 1239734519000/614&lt;BR /&gt;object 2: 1239734519000/613&lt;BR /&gt;object 3: 1239734519000/612&lt;BR /&gt;object 4: 1239734519000/611&lt;BR /&gt;object 5: 1239734518000/610&lt;BR /&gt;object 6: 1239734518000/609&lt;BR /&gt;object 7: 1239734518000/608&lt;BR /&gt;object 8: 1239734422000/606&lt;BR /&gt;object 9: 1239734422000/605&lt;BR /&gt;object 10: 1239734422000/604&lt;BR /&gt;object 11: 1239734422000/603&lt;BR /&gt;object 12: 1239734422000/602&lt;BR /&gt;object 13: 1239734422000/601&lt;BR /&gt;object 14: 1239734422000/600&lt;BR /&gt;object 15: 1239734422000/599&lt;BR /&gt;object 16: 1239734421000/598&lt;BR /&gt;object 17: 1239734421000/597&lt;BR /&gt;object 0: 1239734519000/615&lt;BR /&gt;object 1: 1239734519000/614&lt;BR /&gt;object 2: 1239734519000/613&lt;BR /&gt;object 3: 1239734519000/612&lt;BR /&gt;object 4: 1239734519000/611&lt;BR /&gt;object 5: 1239734518000/610&lt;BR /&gt;object 6: 1239734518000/609&lt;BR /&gt;object 7: 1239734518000/608&lt;BR /&gt;object 8: 1239734422000/606&lt;BR /&gt;object 9: 1239734422000/605&lt;BR /&gt;object 10: 1239734422000/604&lt;BR /&gt;object 11: 1239734422000/603&lt;BR /&gt;object 12: 1239734422000/602&lt;BR /&gt;object 13: 1239734422000/601&lt;BR /&gt;object 14: 1239734422000/600&lt;BR /&gt;object 15: 1239734422000/599&lt;BR /&gt;object 16: 1239734421000/598&lt;BR /&gt;object 17: 1239734421000/597&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 891964814&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 816102127&lt;BR /&gt;14:42:00,164 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:42:00,164 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:42:00,165 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName&lt;BR /&gt;14:42:00,167 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on&amp;nbsp; (type Normal)&lt;BR /&gt;14:42:00,167 User:UserName DEBUG [smb.protocol.auth] Allocated UID=7 for VC=[0:7,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]&lt;BR /&gt;14:42:00,204 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=72, UID=0, PID=65279&lt;BR /&gt;14:42:00,204 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]&lt;BR /&gt;14:42:00,204 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734519000/616&lt;BR /&gt;object 1: 1239734519000/615&lt;BR /&gt;object 2: 1239734519000/614&lt;BR /&gt;object 3: 1239734519000/613&lt;BR /&gt;object 4: 1239734519000/612&lt;BR /&gt;object 5: 1239734519000/611&lt;BR /&gt;object 6: 1239734518000/610&lt;BR /&gt;object 7: 1239734518000/609&lt;BR /&gt;object 8: 1239734518000/608&lt;BR /&gt;object 9: 1239734422000/606&lt;BR /&gt;object 10: 1239734422000/605&lt;BR /&gt;object 11: 1239734422000/604&lt;BR /&gt;object 12: 1239734422000/603&lt;BR /&gt;object 13: 1239734422000/602&lt;BR /&gt;object 14: 1239734422000/601&lt;BR /&gt;object 15: 1239734422000/600&lt;BR /&gt;object 16: 1239734422000/599&lt;BR /&gt;object 17: 1239734421000/598&lt;BR /&gt;object 18: 1239734421000/597&lt;BR /&gt;object 0: 1239734519000/616&lt;BR /&gt;object 1: 1239734519000/615&lt;BR /&gt;object 2: 1239734519000/614&lt;BR /&gt;object 3: 1239734519000/613&lt;BR /&gt;object 4: 1239734519000/612&lt;BR /&gt;object 5: 1239734519000/611&lt;BR /&gt;object 6: 1239734518000/610&lt;BR /&gt;object 7: 1239734518000/609&lt;BR /&gt;object 8: 1239734518000/608&lt;BR /&gt;object 9: 1239734422000/606&lt;BR /&gt;object 10: 1239734422000/605&lt;BR /&gt;object 11: 1239734422000/604&lt;BR /&gt;object 12: 1239734422000/603&lt;BR /&gt;object 13: 1239734422000/602&lt;BR /&gt;object 14: 1239734422000/601&lt;BR /&gt;object 15: 1239734422000/600&lt;BR /&gt;object 16: 1239734422000/599&lt;BR /&gt;object 17: 1239734421000/598&lt;BR /&gt;object 18: 1239734421000/597&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 890474641&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 796334218&lt;BR /&gt;14:42:00,206 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:42:00,206 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:42:00,207 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName&lt;BR /&gt;14:42:00,209 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on&amp;nbsp; (type Normal)&lt;BR /&gt;14:42:00,209 User:UserName DEBUG [smb.protocol.auth] Allocated UID=8 for VC=[0:8,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]&lt;BR /&gt;14:42:00,212 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=80, UID=0, PID=65279&lt;BR /&gt;14:42:00,212 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]&lt;BR /&gt;14:42:00,212 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734519000/617&lt;BR /&gt;object 1: 1239734519000/616&lt;BR /&gt;object 2: 1239734519000/615&lt;BR /&gt;object 3: 1239734519000/614&lt;BR /&gt;object 4: 1239734519000/613&lt;BR /&gt;object 5: 1239734519000/612&lt;BR /&gt;object 6: 1239734519000/611&lt;BR /&gt;object 7: 1239734518000/610&lt;BR /&gt;object 8: 1239734518000/609&lt;BR /&gt;object 9: 1239734518000/608&lt;BR /&gt;object 10: 1239734422000/606&lt;BR /&gt;object 11: 1239734422000/605&lt;BR /&gt;object 12: 1239734422000/604&lt;BR /&gt;object 13: 1239734422000/603&lt;BR /&gt;object 14: 1239734422000/602&lt;BR /&gt;object 15: 1239734422000/601&lt;BR /&gt;object 16: 1239734422000/600&lt;BR /&gt;object 17: 1239734422000/599&lt;BR /&gt;object 18: 1239734421000/598&lt;BR /&gt;object 19: 1239734421000/597&lt;BR /&gt;object 0: 1239734519000/617&lt;BR /&gt;object 1: 1239734519000/616&lt;BR /&gt;object 2: 1239734519000/615&lt;BR /&gt;object 3: 1239734519000/614&lt;BR /&gt;object 4: 1239734519000/613&lt;BR /&gt;object 5: 1239734519000/612&lt;BR /&gt;object 6: 1239734519000/611&lt;BR /&gt;object 7: 1239734518000/610&lt;BR /&gt;object 8: 1239734518000/609&lt;BR /&gt;object 9: 1239734518000/608&lt;BR /&gt;object 10: 1239734422000/606&lt;BR /&gt;object 11: 1239734422000/605&lt;BR /&gt;object 12: 1239734422000/604&lt;BR /&gt;object 13: 1239734422000/603&lt;BR /&gt;object 14: 1239734422000/602&lt;BR /&gt;object 15: 1239734422000/601&lt;BR /&gt;object 16: 1239734422000/600&lt;BR /&gt;object 17: 1239734422000/599&lt;BR /&gt;object 18: 1239734421000/598&lt;BR /&gt;object 19: 1239734421000/597&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 890433677&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 219410625&lt;BR /&gt;14:42:00,214 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:42:00,214 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:42:00,215 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName&lt;BR /&gt;14:42:00,217 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on&amp;nbsp; (type Normal)&lt;BR /&gt;14:42:00,217 User:UserName DEBUG [smb.protocol.auth] Allocated UID=9 for VC=[0:9,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]&lt;BR /&gt;14:42:00,224 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=88, UID=0, PID=65279&lt;BR /&gt;14:42:00,224 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]&lt;BR /&gt;14:42:00,224 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734519000/618&lt;BR /&gt;object 1: 1239734519000/617&lt;BR /&gt;object 2: 1239734519000/616&lt;BR /&gt;object 3: 1239734519000/615&lt;BR /&gt;object 4: 1239734519000/614&lt;BR /&gt;object 5: 1239734519000/613&lt;BR /&gt;object 6: 1239734519000/612&lt;BR /&gt;object 7: 1239734519000/611&lt;BR /&gt;object 8: 1239734518000/610&lt;BR /&gt;object 9: 1239734518000/609&lt;BR /&gt;object 10: 1239734518000/608&lt;BR /&gt;object 11: 1239734422000/606&lt;BR /&gt;object 12: 1239734422000/605&lt;BR /&gt;object 13: 1239734422000/604&lt;BR /&gt;object 14: 1239734422000/603&lt;BR /&gt;object 15: 1239734422000/602&lt;BR /&gt;object 16: 1239734422000/601&lt;BR /&gt;object 17: 1239734422000/600&lt;BR /&gt;object 18: 1239734422000/599&lt;BR /&gt;object 19: 1239734421000/598&lt;BR /&gt;object 20: 1239734421000/597&lt;BR /&gt;object 0: 1239734519000/618&lt;BR /&gt;object 1: 1239734519000/617&lt;BR /&gt;object 2: 1239734519000/616&lt;BR /&gt;object 3: 1239734519000/615&lt;BR /&gt;object 4: 1239734519000/614&lt;BR /&gt;object 5: 1239734519000/613&lt;BR /&gt;object 6: 1239734519000/612&lt;BR /&gt;object 7: 1239734519000/611&lt;BR /&gt;object 8: 1239734518000/610&lt;BR /&gt;object 9: 1239734518000/609&lt;BR /&gt;object 10: 1239734518000/608&lt;BR /&gt;object 11: 1239734422000/606&lt;BR /&gt;object 12: 1239734422000/605&lt;BR /&gt;object 13: 1239734422000/604&lt;BR /&gt;object 14: 1239734422000/603&lt;BR /&gt;object 15: 1239734422000/602&lt;BR /&gt;object 16: 1239734422000/601&lt;BR /&gt;object 17: 1239734422000/600&lt;BR /&gt;object 18: 1239734422000/599&lt;BR /&gt;object 19: 1239734421000/598&lt;BR /&gt;object 20: 1239734421000/597&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 890297143&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 744641020&lt;BR /&gt;14:42:00,226 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:42:00,226 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:42:00,227 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName&lt;BR /&gt;14:42:00,229 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on&amp;nbsp; (type Normal)&lt;BR /&gt;14:42:00,229 User:UserName DEBUG [smb.protocol.auth] Allocated UID=10 for VC=[0:10,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]&lt;BR /&gt;14:42:00,231 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=96, UID=0, PID=65279&lt;BR /&gt;14:42:00,232 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]&lt;BR /&gt;14:42:00,232 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)&lt;BR /&gt;Entered Krb5Context.acceptSecContext with state=STATE_NEW&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Using builtin default etypes for permitted_enctypes&lt;BR /&gt;default etypes for permitted_enctypes: 3 1 23 16 17.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; Config reset default kdc MYDOMAIN.COM&lt;BR /&gt;object 0: 1239734519000/619&lt;BR /&gt;object 1: 1239734519000/618&lt;BR /&gt;object 2: 1239734519000/617&lt;BR /&gt;object 3: 1239734519000/616&lt;BR /&gt;object 4: 1239734519000/615&lt;BR /&gt;object 5: 1239734519000/614&lt;BR /&gt;object 6: 1239734519000/613&lt;BR /&gt;object 7: 1239734519000/612&lt;BR /&gt;object 8: 1239734519000/611&lt;BR /&gt;object 9: 1239734518000/610&lt;BR /&gt;object 10: 1239734518000/609&lt;BR /&gt;object 11: 1239734518000/608&lt;BR /&gt;object 12: 1239734422000/606&lt;BR /&gt;object 13: 1239734422000/605&lt;BR /&gt;object 14: 1239734422000/604&lt;BR /&gt;object 15: 1239734422000/603&lt;BR /&gt;object 16: 1239734422000/602&lt;BR /&gt;object 17: 1239734422000/601&lt;BR /&gt;object 18: 1239734422000/600&lt;BR /&gt;object 19: 1239734422000/599&lt;BR /&gt;object 20: 1239734421000/598&lt;BR /&gt;object 21: 1239734421000/597&lt;BR /&gt;object 0: 1239734519000/619&lt;BR /&gt;object 1: 1239734519000/618&lt;BR /&gt;object 2: 1239734519000/617&lt;BR /&gt;object 3: 1239734519000/616&lt;BR /&gt;object 4: 1239734519000/615&lt;BR /&gt;object 5: 1239734519000/614&lt;BR /&gt;object 6: 1239734519000/613&lt;BR /&gt;object 7: 1239734519000/612&lt;BR /&gt;object 8: 1239734519000/611&lt;BR /&gt;object 9: 1239734518000/610&lt;BR /&gt;object 10: 1239734518000/609&lt;BR /&gt;object 11: 1239734518000/608&lt;BR /&gt;object 12: 1239734422000/606&lt;BR /&gt;object 13: 1239734422000/605&lt;BR /&gt;object 14: 1239734422000/604&lt;BR /&gt;object 15: 1239734422000/603&lt;BR /&gt;object 16: 1239734422000/602&lt;BR /&gt;object 17: 1239734422000/601&lt;BR /&gt;object 18: 1239734422000/600&lt;BR /&gt;object 19: 1239734422000/599&lt;BR /&gt;object 20: 1239734421000/598&lt;BR /&gt;object 21: 1239734421000/597&lt;BR /&gt;replay cache found.&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; KrbApReq: authenticate succeed.&lt;BR /&gt;Krb5Context setting peerSeqNumber to: 890761035&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;Krb5Context setting mySeqNumber to: 294385874&lt;BR /&gt;14:42:00,233 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;&amp;gt;&amp;gt;&amp;gt; EType: sun.security.krb5.internal.crypto.DesCbcMd5EType&lt;BR /&gt;14:42:00,234 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey&lt;BR /&gt;14:42:00,235 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName&lt;BR /&gt;14:42:00,236 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on&amp;nbsp; (type Normal)&lt;BR /&gt;14:42:00,236 User:UserName DEBUG [smb.protocol.auth] Allocated UID=11 for VC=[0:11,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]&lt;BR /&gt;&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;BR /&gt;&lt;SPAN&gt;Note that, although it is MUCH longer output for the single attempt, the results look similar (note the "Logged on using Kerberos, user UserName" in both the Vista and XP output above).&amp;nbsp; Also, on Vista a "klist tickets" illustrates that a ticket WAS granted successfully:&lt;/SPAN&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;&lt;BR /&gt;C:\Program Files\Resource Kit&amp;gt;klist tickets&lt;BR /&gt;&lt;BR /&gt;Cached Tickets: (2)&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Server: krbtgt/MYDOMAIN.COM@MYDOMAIN.COM&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; End Time: 4/15/2009 0:41:55&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Renew Time: 4/21/2009 14:41:55&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Server: cifs/alfresco-server.mydomain.com@MYDOMAIN.COM&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; KerbTicket Encryption Type: Kerberos DES-CBC-MD5&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; End Time: 4/15/2009 0:41:55&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Renew Time: 4/21/2009 14:41:55&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;BR /&gt;&lt;SPAN&gt;However, the result on Vista is an error box containing this: &lt;/SPAN&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;&lt;BR /&gt;Network Error&lt;BR /&gt;Windows cannot access \\alfresco-server.mydomain.com\alfresco&lt;BR /&gt;Check the spelling of the name. Otherwise, there might be a problem with your network.&amp;nbsp; To try to identify and resolve network problems, click Diagnose.&lt;BR /&gt;&lt;BR /&gt;Details:&lt;BR /&gt;Error code: 0x80004005&lt;BR /&gt;Unspecified Error&lt;BR /&gt;&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;BR /&gt;&lt;SPAN&gt;Also, if I try from the command prompt by issuing a "net use * \\alfresco-server.mydomain.com\alfresco" I get the following:&lt;/SPAN&gt;&lt;BR /&gt;&lt;PRE class="language-none line-numbers"&gt;&lt;CODE&gt;&lt;BR /&gt;System error 58 has occurred.&lt;BR /&gt;&lt;BR /&gt;The specified server cannot perform the requested operation.&lt;BR /&gt;&lt;SPAN class="line-numbers-rows"&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;SPAN&gt;‍&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;BR /&gt;&lt;SPAN&gt;I am happy to provide further details to assist in troubleshooting this, but at this point I'm out of ideas. Also, I have tried the workaround stated here, but it didn't work either:&lt;/SPAN&gt;&lt;BR /&gt;&lt;A href="http://www.stacken.kth.se/lists/heimdal-discuss/2007-10/msg00018.html" rel="nofollow noopener noreferrer"&gt;http://www.stacken.kth.se/lists/heimdal-discuss/2007-10/msg00018.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I am also happy to share details about how I got it working this far if anyone needs help getting to the point where you're stuck where I am…=)&amp;nbsp; Also, I have disabled NTLM using &amp;lt;disableNTLM/&amp;gt; in the kerberos &amp;lt;authenticator&amp;gt; section, to remove that as a possible source of confusion.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thanks!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Dave&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 14 Apr 2009 18:55:18 GMT</pubDate>
    <dc:creator>davetbo</dc:creator>
    <dc:date>2009-04-14T18:55:18Z</dc:date>
    <item>
      <title>Alfresco CIFS Kerberos Vista SP1 problem</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/alfresco-cifs-kerberos-vista-sp1-problem/m-p/184693#M137823</link>
      <description>All,Here's my setup:Alfresco Server running on CentOS 5.2, running 3.0 Stable.Oracle 10gR2 database for Alfresco storage.2 clients (both 32-bit):&amp;nbsp; 1 running Vista SP1, one running XP SP3Authentication using Kerberos to Microsoft AD on a Windows 2003 server.I have been struggling to get Alfresco work</description>
      <pubDate>Tue, 14 Apr 2009 18:55:18 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/alfresco-cifs-kerberos-vista-sp1-problem/m-p/184693#M137823</guid>
      <dc:creator>davetbo</dc:creator>
      <dc:date>2009-04-14T18:55:18Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco CIFS Kerberos Vista SP1 problem</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/alfresco-cifs-kerberos-vista-sp1-problem/m-p/184694#M137824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;One difference between the XP and Vista debugging info above is in the lines beginning with "[smb.protocol.auth] Allocated UID="…&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The XP ones have operating system information in them ("Windows 2002 Service Pack 3 2600") and the Vista ones just have blank fields.&amp;nbsp; Might that be a hint as to the trouble here?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Dave&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Apr 2009 16:40:49 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/alfresco-cifs-kerberos-vista-sp1-problem/m-p/184694#M137824</guid>
      <dc:creator>davetbo</dc:creator>
      <dc:date>2009-04-16T16:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco CIFS Kerberos Vista SP1 problem</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/alfresco-cifs-kerberos-vista-sp1-problem/m-p/184695#M137825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;I am in pretty much the same boat.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Alfresco is running on a Centos box, Kerberos auth and SSO works for HTTP, WebDAV and CIFS.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;A Windows 2003 client can use CIFS to see \\ALFRESCO\Alfresco (actual server name changed), but a Vista or 2008 client cannot.&amp;nbsp; I can see in the catalina.out log that the Vista/2008 client gets a successful kerberos auth and login, but it doesn't finish connecting to the share.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Given that it is getting a successful kerberos auth and login and a 2003 client can see the shares, I am at a loss as to what I can change/configure on the Alfresco server to allow the Vista/2008 clients to also see the shares.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Help ?!&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Aug 2009 04:55:30 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/alfresco-cifs-kerberos-vista-sp1-problem/m-p/184695#M137825</guid>
      <dc:creator>kprice</dc:creator>
      <dc:date>2009-08-25T04:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: Alfresco CIFS Kerberos Vista SP1 problem</title>
      <link>https://connect.hyland.com/t5/alfresco-archive/alfresco-cifs-kerberos-vista-sp1-problem/m-p/184696#M137826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Further possible clues:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;2003 client connects it's workstation MACHINE$ account to IPC before connecting the user, 2008 client doesn't.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2003 client creates 1 VC (Virtual Circuit), 2008 client tries to create 10 VCs&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Maybe it's a SMBv2 issue ?&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Aug 2009 03:10:47 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-archive/alfresco-cifs-kerberos-vista-sp1-problem/m-p/184696#M137826</guid>
      <dc:creator>kprice</dc:creator>
      <dc:date>2009-08-26T03:10:47Z</dc:date>
    </item>
  </channel>
</rss>

