04-14-2009 02:55 PM
14:33:52,972 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=8, UID=0, PID=65279
14:33:52,972 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=977,Authenticator=EncType=3,Kvno=-1,Len=176]
14:33:52,972 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734033014/14274
object 0: 1239734033014/14274
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 260683064
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 520862752
14:33:52,974 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:33:52,974 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:33:52,974 User:UserName DEBUG [smb.protocol.auth] Machine account logon, VISTA-CLIENT$, as null logon
14:33:52,974 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user VISTA-CLIENT$
14:33:52,976 User:UserName DEBUG [smb.protocol.auth] User logged on (type Null)
14:33:52,976 User:UserName DEBUG [smb.protocol.auth] Allocated UID=0 for VC=[0:0,[:null,Windows 2002 Service Pack 3 2600,Windows 2002 5.1,10.136.96.10],Tree=0,Searches=0]
14:33:53,089 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=32, UID=0, PID=65279
14:33:53,089 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1113,Authenticator=EncType=3,Kvno=-1,Len=168]
14:33:53,089 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734033014/14276
object 1: 1239733767000/595
object 2: 1239733767000/594
object 0: 1239734033014/14276
object 1: 1239733767000/595
object 2: 1239733767000/594
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 263898451
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 706729883
14:33:53,091 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:33:53,091 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:33:53,092 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName
14:33:53,094 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on (type Normal)
14:33:53,094 User:UserName DEBUG [smb.protocol.auth] Allocated UID=1 for VC=[1:1,[UserName@MYDOMAIN.COM:null,Windows 2002 Service Pack 3 2600,Windows 2002 5.1,10.136.96.10],Tree=0,Searches=0]
14:33:54,112 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=8, UID=0, PID=65279
14:33:54,112 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1113,Authenticator=EncType=3,Kvno=-1,Len=168]
14:33:54,112 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734034014/14277
object 1: 1239734033014/14276
object 2: 1239733767000/595
object 3: 1239733767000/594
object 0: 1239734034014/14277
object 1: 1239734033014/14276
object 2: 1239733767000/595
object 3: 1239733767000/594
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 283090984
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 1045326895
14:33:54,114 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:33:54,115 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:33:54,116 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName
14:33:54,118 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on (type Normal)
14:33:54,118 User:UserName DEBUG [smb.protocol.auth] Allocated UID=0 for VC=[0:0,[UserName@MYDOMAIN.COM:null,Windows 2002 Service Pack 3 2600,Windows 2002 5.1,10.136.96.10],Tree=0,Searches=0]
14:33:54,138 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=104, UID=0, PID=65279
14:33:54,138 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=977,Authenticator=EncType=3,Kvno=-1,Len=176]
14:33:54,138 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734034014/14278
object 1: 1239734033014/14274
object 0: 1239734034014/14278
object 1: 1239734033014/14274
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 282723259
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 529854855
14:33:54,140 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:33:54,140 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:33:54,140 User:UserName DEBUG [smb.protocol.auth] Machine account logon, VISTA-CLIENT$, as null logon
14:33:54,140 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user VISTA-CLIENT$
14:33:54,141 User:UserName DEBUG [smb.protocol.auth] User logged on (type Null)
14:33:54,142 User:UserName DEBUG [smb.protocol.auth] Allocated UID=1 for VC=[1:1,[:null,Windows 2002 Service Pack 3 2600,Windows 2002 5.1,10.136.96.10],Tree=0,Searches=0]
14:41:59,098 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=8, UID=0, PID=65279
14:41:59,099 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]
14:41:59,099 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734518000/608
object 1: 1239734422000/606
object 2: 1239734422000/605
object 3: 1239734422000/604
object 4: 1239734422000/603
object 5: 1239734422000/602
object 6: 1239734422000/601
object 7: 1239734422000/600
object 8: 1239734422000/599
object 9: 1239734421000/598
object 10: 1239734421000/597
object 0: 1239734518000/608
object 1: 1239734422000/606
object 2: 1239734422000/605
object 3: 1239734422000/604
object 4: 1239734422000/603
object 5: 1239734422000/602
object 6: 1239734422000/601
object 7: 1239734422000/600
object 8: 1239734422000/599
object 9: 1239734421000/598
object 10: 1239734421000/597
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 902048570
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 787154794
14:41:59,100 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:41:59,101 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:41:59,102 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName
14:41:59,104 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on (type Normal)
14:41:59,104 User:UserName DEBUG [smb.protocol.auth] Allocated UID=0 for VC=[0:0,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]
14:41:59,106 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=16, UID=0, PID=65279
14:41:59,106 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]
14:41:59,106 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734518000/609
object 1: 1239734518000/608
object 2: 1239734422000/606
object 3: 1239734422000/605
object 4: 1239734422000/604
object 5: 1239734422000/603
object 6: 1239734422000/602
object 7: 1239734422000/601
object 8: 1239734422000/600
object 9: 1239734422000/599
object 10: 1239734421000/598
object 11: 1239734421000/597
object 0: 1239734518000/609
object 1: 1239734518000/608
object 2: 1239734422000/606
object 3: 1239734422000/605
object 4: 1239734422000/604
object 5: 1239734422000/603
object 6: 1239734422000/602
object 7: 1239734422000/601
object 8: 1239734422000/600
object 9: 1239734422000/599
object 10: 1239734421000/598
object 11: 1239734421000/597
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 902501280
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 807451295
14:41:59,108 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:41:59,108 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:41:59,110 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName
14:41:59,111 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on (type Normal)
14:41:59,111 User:UserName DEBUG [smb.protocol.auth] Allocated UID=1 for VC=[0:1,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]
14:41:59,113 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=24, UID=0, PID=65279
14:41:59,113 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]
14:41:59,113 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734518000/610
object 1: 1239734518000/609
object 2: 1239734518000/608
object 3: 1239734422000/606
object 4: 1239734422000/605
object 5: 1239734422000/604
object 6: 1239734422000/603
object 7: 1239734422000/602
object 8: 1239734422000/601
object 9: 1239734422000/600
object 10: 1239734422000/599
object 11: 1239734421000/598
object 12: 1239734421000/597
object 0: 1239734518000/610
object 1: 1239734518000/609
object 2: 1239734518000/608
object 3: 1239734422000/606
object 4: 1239734422000/605
object 5: 1239734422000/604
object 6: 1239734422000/603
object 7: 1239734422000/602
object 8: 1239734422000/601
object 9: 1239734422000/600
object 10: 1239734422000/599
object 11: 1239734421000/598
object 12: 1239734421000/597
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 902456687
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 62868259
14:41:59,115 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:41:59,115 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:41:59,116 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName
14:41:59,118 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on (type Normal)
14:41:59,118 User:UserName DEBUG [smb.protocol.auth] Allocated UID=2 for VC=[0:2,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]
14:42:00,132 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=32, UID=0, PID=65279
14:42:00,132 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]
14:42:00,132 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734519000/611
object 1: 1239734518000/610
object 2: 1239734518000/609
object 3: 1239734518000/608
object 4: 1239734422000/606
object 5: 1239734422000/605
object 6: 1239734422000/604
object 7: 1239734422000/603
object 8: 1239734422000/602
object 9: 1239734422000/601
object 10: 1239734422000/600
object 11: 1239734422000/599
object 12: 1239734421000/598
object 13: 1239734421000/597
object 0: 1239734519000/611
object 1: 1239734518000/610
object 2: 1239734518000/609
object 3: 1239734518000/608
object 4: 1239734422000/606
object 5: 1239734422000/605
object 6: 1239734422000/604
object 7: 1239734422000/603
object 8: 1239734422000/602
object 9: 1239734422000/601
object 10: 1239734422000/600
object 11: 1239734422000/599
object 12: 1239734421000/598
object 13: 1239734421000/597
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 891739601
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 997828725
14:42:00,134 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:42:00,134 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:42:00,136 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName
14:42:00,137 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on (type Normal)
14:42:00,137 User:UserName DEBUG [smb.protocol.auth] Allocated UID=3 for VC=[0:3,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]
14:42:00,140 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=40, UID=0, PID=65279
14:42:00,140 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]
14:42:00,140 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734519000/612
object 1: 1239734519000/611
object 2: 1239734518000/610
object 3: 1239734518000/609
object 4: 1239734518000/608
object 5: 1239734422000/606
object 6: 1239734422000/605
object 7: 1239734422000/604
object 8: 1239734422000/603
object 9: 1239734422000/602
object 10: 1239734422000/601
object 11: 1239734422000/600
object 12: 1239734422000/599
object 13: 1239734421000/598
object 14: 1239734421000/597
object 0: 1239734519000/612
object 1: 1239734519000/611
object 2: 1239734518000/610
object 3: 1239734518000/609
object 4: 1239734518000/608
object 5: 1239734422000/606
object 6: 1239734422000/605
object 7: 1239734422000/604
object 8: 1239734422000/603
object 9: 1239734422000/602
object 10: 1239734422000/601
object 11: 1239734422000/600
object 12: 1239734422000/599
object 13: 1239734421000/598
object 14: 1239734421000/597
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 891622721
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 953792882
14:42:00,142 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:42:00,142 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:42:00,143 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName
14:42:00,145 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on (type Normal)
14:42:00,145 User:UserName DEBUG [smb.protocol.auth] Allocated UID=4 for VC=[0:4,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]
14:42:00,147 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=48, UID=0, PID=65279
14:42:00,147 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]
14:42:00,147 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734519000/613
object 1: 1239734519000/612
object 2: 1239734519000/611
object 3: 1239734518000/610
object 4: 1239734518000/609
object 5: 1239734518000/608
object 6: 1239734422000/606
object 7: 1239734422000/605
object 8: 1239734422000/604
object 9: 1239734422000/603
object 10: 1239734422000/602
object 11: 1239734422000/601
object 12: 1239734422000/600
object 13: 1239734422000/599
object 14: 1239734421000/598
object 15: 1239734421000/597
object 0: 1239734519000/613
object 1: 1239734519000/612
object 2: 1239734519000/611
object 3: 1239734518000/610
object 4: 1239734518000/609
object 5: 1239734518000/608
object 6: 1239734422000/606
object 7: 1239734422000/605
object 8: 1239734422000/604
object 9: 1239734422000/603
object 10: 1239734422000/602
object 11: 1239734422000/601
object 12: 1239734422000/600
object 13: 1239734422000/599
object 14: 1239734421000/598
object 15: 1239734421000/597
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 891553170
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 685705025
14:42:00,149 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:42:00,149 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:42:00,150 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName
14:42:00,152 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on (type Normal)
14:42:00,152 User:UserName DEBUG [smb.protocol.auth] Allocated UID=5 for VC=[0:5,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]
14:42:00,155 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=56, UID=0, PID=65279
14:42:00,155 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]
14:42:00,155 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734519000/614
object 1: 1239734519000/613
object 2: 1239734519000/612
object 3: 1239734519000/611
object 4: 1239734518000/610
object 5: 1239734518000/609
object 6: 1239734518000/608
object 7: 1239734422000/606
object 8: 1239734422000/605
object 9: 1239734422000/604
object 10: 1239734422000/603
object 11: 1239734422000/602
object 12: 1239734422000/601
object 13: 1239734422000/600
object 14: 1239734422000/599
object 15: 1239734421000/598
object 16: 1239734421000/597
object 0: 1239734519000/614
object 1: 1239734519000/613
object 2: 1239734519000/612
object 3: 1239734519000/611
object 4: 1239734518000/610
object 5: 1239734518000/609
object 6: 1239734518000/608
object 7: 1239734422000/606
object 8: 1239734422000/605
object 9: 1239734422000/604
object 10: 1239734422000/603
object 11: 1239734422000/602
object 12: 1239734422000/601
object 13: 1239734422000/600
object 14: 1239734422000/599
object 15: 1239734421000/598
object 16: 1239734421000/597
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 892034346
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 854614359
14:42:00,157 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:42:00,157 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:42:00,158 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName
14:42:00,160 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on (type Normal)
14:42:00,160 User:UserName DEBUG [smb.protocol.auth] Allocated UID=6 for VC=[0:6,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]
14:42:00,162 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=64, UID=0, PID=65279
14:42:00,162 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]
14:42:00,162 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734519000/615
object 1: 1239734519000/614
object 2: 1239734519000/613
object 3: 1239734519000/612
object 4: 1239734519000/611
object 5: 1239734518000/610
object 6: 1239734518000/609
object 7: 1239734518000/608
object 8: 1239734422000/606
object 9: 1239734422000/605
object 10: 1239734422000/604
object 11: 1239734422000/603
object 12: 1239734422000/602
object 13: 1239734422000/601
object 14: 1239734422000/600
object 15: 1239734422000/599
object 16: 1239734421000/598
object 17: 1239734421000/597
object 0: 1239734519000/615
object 1: 1239734519000/614
object 2: 1239734519000/613
object 3: 1239734519000/612
object 4: 1239734519000/611
object 5: 1239734518000/610
object 6: 1239734518000/609
object 7: 1239734518000/608
object 8: 1239734422000/606
object 9: 1239734422000/605
object 10: 1239734422000/604
object 11: 1239734422000/603
object 12: 1239734422000/602
object 13: 1239734422000/601
object 14: 1239734422000/600
object 15: 1239734422000/599
object 16: 1239734421000/598
object 17: 1239734421000/597
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 891964814
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 816102127
14:42:00,164 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:42:00,164 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:42:00,165 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName
14:42:00,167 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on (type Normal)
14:42:00,167 User:UserName DEBUG [smb.protocol.auth] Allocated UID=7 for VC=[0:7,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]
14:42:00,204 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=72, UID=0, PID=65279
14:42:00,204 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]
14:42:00,204 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734519000/616
object 1: 1239734519000/615
object 2: 1239734519000/614
object 3: 1239734519000/613
object 4: 1239734519000/612
object 5: 1239734519000/611
object 6: 1239734518000/610
object 7: 1239734518000/609
object 8: 1239734518000/608
object 9: 1239734422000/606
object 10: 1239734422000/605
object 11: 1239734422000/604
object 12: 1239734422000/603
object 13: 1239734422000/602
object 14: 1239734422000/601
object 15: 1239734422000/600
object 16: 1239734422000/599
object 17: 1239734421000/598
object 18: 1239734421000/597
object 0: 1239734519000/616
object 1: 1239734519000/615
object 2: 1239734519000/614
object 3: 1239734519000/613
object 4: 1239734519000/612
object 5: 1239734519000/611
object 6: 1239734518000/610
object 7: 1239734518000/609
object 8: 1239734518000/608
object 9: 1239734422000/606
object 10: 1239734422000/605
object 11: 1239734422000/604
object 12: 1239734422000/603
object 13: 1239734422000/602
object 14: 1239734422000/601
object 15: 1239734422000/600
object 16: 1239734422000/599
object 17: 1239734421000/598
object 18: 1239734421000/597
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 890474641
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 796334218
14:42:00,206 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:42:00,206 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:42:00,207 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName
14:42:00,209 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on (type Normal)
14:42:00,209 User:UserName DEBUG [smb.protocol.auth] Allocated UID=8 for VC=[0:8,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]
14:42:00,212 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=80, UID=0, PID=65279
14:42:00,212 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]
14:42:00,212 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734519000/617
object 1: 1239734519000/616
object 2: 1239734519000/615
object 3: 1239734519000/614
object 4: 1239734519000/613
object 5: 1239734519000/612
object 6: 1239734519000/611
object 7: 1239734518000/610
object 8: 1239734518000/609
object 9: 1239734518000/608
object 10: 1239734422000/606
object 11: 1239734422000/605
object 12: 1239734422000/604
object 13: 1239734422000/603
object 14: 1239734422000/602
object 15: 1239734422000/601
object 16: 1239734422000/600
object 17: 1239734422000/599
object 18: 1239734421000/598
object 19: 1239734421000/597
object 0: 1239734519000/617
object 1: 1239734519000/616
object 2: 1239734519000/615
object 3: 1239734519000/614
object 4: 1239734519000/613
object 5: 1239734519000/612
object 6: 1239734519000/611
object 7: 1239734518000/610
object 8: 1239734518000/609
object 9: 1239734518000/608
object 10: 1239734422000/606
object 11: 1239734422000/605
object 12: 1239734422000/604
object 13: 1239734422000/603
object 14: 1239734422000/602
object 15: 1239734422000/601
object 16: 1239734422000/600
object 17: 1239734422000/599
object 18: 1239734421000/598
object 19: 1239734421000/597
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 890433677
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 219410625
14:42:00,214 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:42:00,214 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:42:00,215 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName
14:42:00,217 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on (type Normal)
14:42:00,217 User:UserName DEBUG [smb.protocol.auth] Allocated UID=9 for VC=[0:9,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]
14:42:00,224 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=88, UID=0, PID=65279
14:42:00,224 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]
14:42:00,224 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734519000/618
object 1: 1239734519000/617
object 2: 1239734519000/616
object 3: 1239734519000/615
object 4: 1239734519000/614
object 5: 1239734519000/613
object 6: 1239734519000/612
object 7: 1239734519000/611
object 8: 1239734518000/610
object 9: 1239734518000/609
object 10: 1239734518000/608
object 11: 1239734422000/606
object 12: 1239734422000/605
object 13: 1239734422000/604
object 14: 1239734422000/603
object 15: 1239734422000/602
object 16: 1239734422000/601
object 17: 1239734422000/600
object 18: 1239734422000/599
object 19: 1239734421000/598
object 20: 1239734421000/597
object 0: 1239734519000/618
object 1: 1239734519000/617
object 2: 1239734519000/616
object 3: 1239734519000/615
object 4: 1239734519000/614
object 5: 1239734519000/613
object 6: 1239734519000/612
object 7: 1239734519000/611
object 8: 1239734518000/610
object 9: 1239734518000/609
object 10: 1239734518000/608
object 11: 1239734422000/606
object 12: 1239734422000/605
object 13: 1239734422000/604
object 14: 1239734422000/603
object 15: 1239734422000/602
object 16: 1239734422000/601
object 17: 1239734422000/600
object 18: 1239734422000/599
object 19: 1239734421000/598
object 20: 1239734421000/597
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 890297143
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 744641020
14:42:00,226 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:42:00,226 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:42:00,227 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName
14:42:00,229 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on (type Normal)
14:42:00,229 User:UserName DEBUG [smb.protocol.auth] Allocated UID=10 for VC=[0:10,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]
14:42:00,231 User:UserName DEBUG [smb.protocol.auth] NT Session setup SPNEGO, MID=96, UID=0, PID=65279
14:42:00,232 User:UserName DEBUG [smb.protocol.auth] Kerberos AP-REQ - [AP-REQ:APOptions=MutualAuth ,Ticket=Len=1201,Authenticator=EncType=3,Kvno=-1,Len=216]
14:42:00,232 User:UserName DEBUG [smb.protocol.auth] Kerberos mutual auth required, parsing AP-REQ
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Found key for cifs/alfresco-server.mydomain.com@MYDOMAIN.COM(3)
Entered Krb5Context.acceptSecContext with state=STATE_NEW
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Using builtin default etypes for permitted_enctypes
default etypes for permitted_enctypes: 3 1 23 16 17.
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> Config reset default kdc MYDOMAIN.COM
object 0: 1239734519000/619
object 1: 1239734519000/618
object 2: 1239734519000/617
object 3: 1239734519000/616
object 4: 1239734519000/615
object 5: 1239734519000/614
object 6: 1239734519000/613
object 7: 1239734519000/612
object 8: 1239734519000/611
object 9: 1239734518000/610
object 10: 1239734518000/609
object 11: 1239734518000/608
object 12: 1239734422000/606
object 13: 1239734422000/605
object 14: 1239734422000/604
object 15: 1239734422000/603
object 16: 1239734422000/602
object 17: 1239734422000/601
object 18: 1239734422000/600
object 19: 1239734422000/599
object 20: 1239734421000/598
object 21: 1239734421000/597
object 0: 1239734519000/619
object 1: 1239734519000/618
object 2: 1239734519000/617
object 3: 1239734519000/616
object 4: 1239734519000/615
object 5: 1239734519000/614
object 6: 1239734519000/613
object 7: 1239734519000/612
object 8: 1239734519000/611
object 9: 1239734518000/610
object 10: 1239734518000/609
object 11: 1239734518000/608
object 12: 1239734422000/606
object 13: 1239734422000/605
object 14: 1239734422000/604
object 15: 1239734422000/603
object 16: 1239734422000/602
object 17: 1239734422000/601
object 18: 1239734422000/600
object 19: 1239734422000/599
object 20: 1239734421000/598
object 21: 1239734421000/597
replay cache found.
>>> KrbApReq: authenticate succeed.
Krb5Context setting peerSeqNumber to: 890761035
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
Krb5Context setting mySeqNumber to: 294385874
14:42:00,233 User:UserName DEBUG [smb.protocol.auth] Using OID MS Kerberos5 for NegTokenTarg
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
>>> EType: sun.security.krb5.internal.crypto.DesCbcMd5EType
14:42:00,234 User:UserName DEBUG [smb.protocol.auth] Created NegTokenTarg using updated AP-REP, added subkey
14:42:00,235 User:UserName DEBUG [smb.protocol.auth] Logged on using Kerberos, user UserName
14:42:00,236 User:UserName DEBUG [smb.protocol.auth] User UserName@MYDOMAIN.COM logged on (type Normal)
14:42:00,236 User:UserName DEBUG [smb.protocol.auth] Allocated UID=11 for VC=[0:11,[UserName@MYDOMAIN.COM:null,,,10.136.96.39],Tree=0,Searches=0]
C:\Program Files\Resource Kit>klist tickets
Cached Tickets: (2)
Server: krbtgt/MYDOMAIN.COM@MYDOMAIN.COM
KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
End Time: 4/15/2009 0:41:55
Renew Time: 4/21/2009 14:41:55
Server: cifs/alfresco-server.mydomain.com@MYDOMAIN.COM
KerbTicket Encryption Type: Kerberos DES-CBC-MD5
End Time: 4/15/2009 0:41:55
Renew Time: 4/21/2009 14:41:55
Network Error
Windows cannot access \\alfresco-server.mydomain.com\alfresco
Check the spelling of the name. Otherwise, there might be a problem with your network. To try to identify and resolve network problems, click Diagnose.
Details:
Error code: 0x80004005
Unspecified Error
System error 58 has occurred.
The specified server cannot perform the requested operation.
04-16-2009 12:40 PM
08-25-2009 12:55 AM
08-25-2009 11:10 PM
Tags
Find what you came for
We want to make your experience in Hyland Connect as valuable as possible, so we put together some helpful links.