Samba: "mount.cifs" geht nicht mehr, nur noch "smbclient" und "Nautilus"

Yoda

[Linux|FreeBSD] - User
Ich hatte Samba schon seit Ewigkeiten prima am rennen, zuletzt in der Version 3.3 auf einem FreeBSD 8.0...

Und nach einem Update gind auf einem mal kein Zugriff per "mount.cifs", nur noch per "smbclient" und "Nautilus" zugreifen.

Da ich alle Meine Rechner zur selben Zeit aktuallisiert hatte, dachte ich es liegt an den Clienten (Ubuntu-Linux), aber als meine Mediabox (FanTec) das gleiche Problem hatte, war ich mir sicher, dass es an Samba liegt!

Die FanTec habe ich seit Monaten nicht angepackt, die läuft und läuft und läuft...
Das Teil greift über LAN auf die Samba-Freigabe zu und spielt die dort liegenden Filme im Fernseher ab... aber seit dem Update leider nicht mehr.

Ich habe schon ein paar Tage in Googel gesucht, 2008 hatten einige Leute das gleiche Problem, die konnten es aber durch Angabe der Domain fixen...
ich gebe allerdings immer die Domain mit an, sodas es mir nicht geholfen hat.

Jetzt seit Ihr meine letzte Hoffnung!

Gruß
Yoda
 
Als aller erstes hatte ich von "samba33" auf "samba35" (3.5.6) aktuallisiert,
das half aber nix... :-(


Weiß vielleicht jemand was sich in letzter Zeit in Samba "net/sambaXX" geändert hat?


So und nun zu den Details:

Folgendes ist auf der Kommandozeile zu erblicken:

Code:
root@wanderer:~# mount -t cifs //erde/kontor /mnt/ -o sfu,noperm,ro,ip=192.168.9.1,domain=energie,user=kontor,sec=ntlmv2 -v
ip address 192.168.9.1 override specified
ip address specified explicitly
Password: 

mount.cifs kernel mount options: unc=//erde\kontor,ver=1,ro,sfu,noperm,ip=192.168.9.1,domain=energie,user=kontor,sec=ntlmv2,pass=********
mount error(13): Permission denied
Refer to the mount.cifs(8) manual page (e.g. man mount.cifs)

Code:
root@wanderer:~# mount -t cifs //erde/kontor /mnt/ -o sfu,noperm,ro,ip=192.168.9.1,domain=energie,user=kontor -v
ip address 192.168.9.1 override specified
ip address specified explicitly
Password: 

mount.cifs kernel mount options: unc=//erde\kontor,ver=1,ro,sfu,noperm,ip=192.168.9.1,domain=energie,user=kontor,pass=********
mount error(13): Permission denied
Refer to the mount.cifs(8) manual page (e.g. man mount.cifs)


vi /var/log/samba.log.192.168.9.204

so sah es aus, als alles noch ging:

Code:
[2010/10/29 11:45:23,  1] smbd/service.c:make_connection_snum(1134)
  192.168.9.204 (192.168.9.204) connect to service kontor initially as user kontor (uid=2000, gid=3000) (pid 11466)
[2010/10/29 11:45:31,  1] smbd/service.c:close_cnum(1344)
  192.168.9.204 (192.168.9.204) closed connection to service kontor

und so sieht es jetzt aus:

Code:
[2010/11/05 22:31:19.612471,  0] smbd/sesssetup.c:1703(reply_sesssetup_and_X)
  reply_sesssetup_and_X:  Attempted encrypted session setup without negprot denied!
[2010/11/06 11:29:17.466979,  0] smbd/sesssetup.c:1703(reply_sesssetup_and_X)
  reply_sesssetup_and_X:  Attempted encrypted session setup without negprot denied!


vi /var/log/samba/log.wb-BUILTIN

Code:
[2010/11/06 12:07:41.378527,  0] winbindd/winbindd.c:195(winbindd_sig_term_handler)
  Got sig[15] terminate (is_parent=0)
[2010/11/06 12:15:51.123401,  0] winbindd/winbindd.c:195(winbindd_sig_term_handler)
  Got sig[15] terminate (is_parent=0)


vi /var/log/samba/log.wb-ERDE

Code:
[2010/11/06 12:07:41.379401,  0] winbindd/winbindd.c:195(winbindd_sig_term_handler)
  Got sig[15] terminate (is_parent=0)
[2010/11/06 12:15:51.123609,  0] winbindd/winbindd.c:195(winbindd_sig_term_handler)
  Got sig[15] terminate (is_parent=0)
[2010/11/06 12:33:40.131293,  0] winbindd/winbindd.c:195(winbindd_sig_term_handler)
  Got sig[15] terminate (is_parent=0)


vi /var/log/samba/log.winbindd

Code:
[2010/11/06 12:35:08,  0] winbindd/winbindd.c:1105(main)
  winbindd version 3.5.6 started.
  Copyright Andrew Tridgell and the Samba Team 1992-2010
[2010/11/06 12:36:45,  0] winbindd/winbindd.c:1105(main)
  winbindd version 3.5.6 started.
  Copyright Andrew Tridgell and the Samba Team 1992-2010


vi /var/log/samba/log.winbindd-idmap

Code:
[2010/11/06 14:59:53.909758,  0] winbindd/idmap.c:149(smb_register_idmap)
  Idmap module passdb already registered!
[2010/11/06 14:59:53.909768,  0] winbindd/idmap.c:149(smb_register_idmap)
  Idmap module nss already registered!


vi /usr/local/etc/smb.conf

Code:
[global]
        workgroup = ENERGIE
        server string = KONTOR
        interfaces = 192.168.9.1
        guest ok = no
#       guest account = gast
        log file = /var/log/samba.log.%m
#       printcap name = lpstat
        os level = 64
        enable asu support = yes
        preferred master = Yes
        domain master = Yes
        interfaces = 192.168.9.0/24
        hosts allow = 192.168.9., 127.
        #
        security = user
        case sensitive = yes
        unix charset = UTF8
        unix extensions = Yes
        #
        ### Default = 0
        ### Example = 16384
        write cache size = 65536
        aio write size = 65536
        aio read size = 65536
        #
        #wide smbconfoptions = no
        getwd cache = yes
        large readwrite = yes
        strict sync = no
        #
        block size = 8192
        #fstype = Samba
        kernel oplocks = yes
        oplocks = yes
        posix locking = yes
        #
        ### Im UNIX-Netz abschalten
        disable netbios = yes
        wins support = no
        dns proxy = no
        #
        min protocol = NT1
        max protocol = NT1
        encrypt passwords = yes
        passdb backend = smbpasswd
        #max_open_files = 16384
        #sysctl_max = 16384
        #rlimit_max = 16384

[homes]
        available = yes
        locking = yes
        comment = Home Directories
        read only = No
        #acl check permissions = No
        create mask = 0600
        #force create mask = 0600
        directory mask = 0700
        #force directory mask = 0700
        browseable = No
        #vfs objects = zfsacl
        #zfsacl:acesort = dontcare
        #nfs4:mode = special
        valid users = kontor

[printers]
        available = no
        comment = All Printers
        path = /var/tmp
        printable = Yes
        browseable = No

[multimedia]
        available = yes
        locking = yes
        comment = Familie beschreibbar
        path = /home/kontor/persoenlich/multimedia/
        valid users = multimedia
        force group = nutzer
        read only = No
        create mask = 0660
        #force create mask = 0660
        directory mask = 0770
        #force directory mask = 0770
 
such mal nach einem samba Problem, das Kamikaze hier vor kurzem irgendwo beschrieben hat. Vielleicht ist da etwas für dich dabei, es liest sich so ähnlich.

Über smbclient und nautilus oder den konqueror mit dem KDE kio, wird nicht gemountet.
Ein direktes spielen von Dateien ist damit nicht möglich(?), jedenfalls nicht bei mir.
Da ist also ein Unterschied und ich glaube, dein Problem liegt an der "mounterei", irgendwas ist da nun wohl anders.
Spontan würde ich auf Client tippen und dort mal die man lesen und so weiter, doch deine Beschreibung deutet ja eher auf den Server, weil der sich verändert hat. Möglicherweise funktioniert das auf deiner (Ubuntu) Client-Seite anders als in FreeBSD normalerweise. Bei FreeBSD heißt das dann auch smbfs und nicht cifs und dazu gibt es noch die /etc/nsmb.conf. Wie gesagt, möglicherweise nicht so bei Ubuntu.

Anyway, du zeigst ja auf Serverseite und da ist dann die Frage: kannst du einen User lokal mounten lassen (also von FreeBSD eine smb Freigabe auf einen mountpoint), so dass also kein Netzwerk und kein fremdes OS dazu beitragen?
Kann sich etwas an deiner smbpasswd geändert haben, Rechte oder Inhalt oder so? Vielleicht ist die bei einem Update betroffen worden, vielleicht musst du die neu anlegen und einlesen lassen. Dann merkst du das, weil es dann auch lokal versagt.
Können sich die Zeichensätze geändert haben und nun vielleicht im Passwort solche Dinge, wie x und y vertauscht sein?

Nur mal so eine spontane Liste mit Eingebungen zum Starten einer Fehlersuche.
 
....

Anyway, du zeigst ja auf Serverseite und da ist dann die Frage: kannst du einen User lokal mounten lassen (also von FreeBSD eine smb Freigabe auf einen mountpoint), so dass also kein Netzwerk und kein fremdes OS dazu beitragen?
Kann sich etwas an deiner smbpasswd geändert haben, Rechte oder Inhalt oder so? Vielleicht ist die bei einem Update betroffen worden, vielleicht musst du die neu anlegen und einlesen lassen. Dann merkst du das, weil es dann auch lokal versagt.
Können sich die Zeichensätze geändert haben und nun vielleicht im Passwort solche Dinge, wie x und y vertauscht sein?

Nur mal so eine spontane Liste mit Eingebungen zum Starten einer Fehlersuche.

Oh, ja richtig, da hab ich garnicht dran gedacht...

Aber die User haben alle das Passwort nocheinmal gesetzt bekommen, da hatte ich auch schon dran gedacht. Die Passwörter sind aber Sonderzeichenfrei, zumindest von den Usern, die ich zum testen verwende.


Code:
vi /etc/fstab

//erde/multimedia   /home/tabmultimedia smbfs    rw,noauto,-N,-I=192.168.9.1   0 0

Code:
[root@erde ~]# mount /home/tabmultimedia
mount_smbfs: unable to open connection: syserr = Authentication error

Jetzt muss ich mal sehen was das für ein Fehler ist...

EDIT:
Code:
[root@erde ~]# mount_smbfs -W ENERGIE -U kontor -I 192.168.9.1 //erde/kontor /mnt/
Password:
mount_smbfs: unable to open connection: syserr = Authentication error
 
Zuletzt bearbeitet:
Das sieht ganz schräg nach UserDB-Problemen aus, deshalb werde ich das Teil komplett deinstallieren und alle restlichen Verzeichnisse löschen, nur die smb.conf behalte ich.
Dann installier ich alles neu, leg die User wieder neu an und probier es nochmal...
 
So, hab net/samba35 jetzt mal komplett neu installiert und die User alle einzeln neu angelegt, hat aber nix gebracht... :-(

Hat einer noch ne Idee?
 
Der dicke Hund ist ja, dass es mit smbclient und anderen Tools immer geht:

Code:
# smbclient -L //erde/ -N

# smbclient -U kontor //erde/kontor

Kann mich hier bitte einer erleuchten?

Gruß
Yoda
 
Jetzt kläre mich mal auf, was mount.cifs ist und von welchem Port das installiert wird.

Edit: Ah, ich sehe gerade deine Clients machen Linux. Da stehe ich auf dem Schlauch.

Was ich empfehlen kann: höre mal mit Wireshark auf dem Interface, das hat einen smb Filter, das heißt du siehst nur das relevante Zeugs. Schau dir einen Connect mit smbclient an, dann sieh dir einen Connect-Versuch von deinem Media-Dingens oder Linux an.

So habe ich Schritt für Schritt meine Probleme identifizieren können und Workarounds gefunden (keine Lösung, ich betrachte das mount_smbfs in FreeBSD als broken by Design oder zumindest nicht richtig dokumentiert).
 
Zuletzt bearbeitet:
....

Was ich empfehlen kann: höre mal mit Wireshark auf dem Interface, das hat einen smb Filter, das heißt du siehst nur das relevante Zeugs. Schau dir einen Connect mit smbclient an, dann sieh dir einen Connect-Versuch von deinem Media-Dingens oder Linux an.
Das ist eine gute Idee, Wireshark ist mir neu, probier ich aber gleich mal aus. ;-)
 
Ist sehr unkompliziert zu bedienen. Du musst es aber mit Rootrechten starten, damit er Zugriff auf die Interfaces hat.
 
Wenn niemand die Abhängigkeiten verhunzt hat, muss X11 ja nur da laufen, wo das Teil angezeigt wird.

Ansonsten gibt es ja noch tcpdump. Ist halt weniger komfortabel.
 
Leider braucht das Ding GTK => X11, auf meinem Server läuft aber kein X11... :-(

So, da ich auf meinem FreeBSD-Server kein X11 habe, hab ich das mal mit "tcpdump" versucht.

Dabei ist mir aufgefallen, das nur bei den funktionierenden smbclient-Verbindungen der Port 139 protokolliert wurde... aber das ist wohl normal...

Ich werde die Logausgaben hier ohne die Einträge mit den Ports 22, 631, 53 und 993 auflisten.

Hier die Details:

Ubuntu-Linux (geht nicht):
Code:
16:00:26.136566 IP 192.168.9.207.43569 > 192.168.9.1.445: Flags [S], seq 846930760, win 5840, options [mss 1460,sackOK,TS val 15760935 ecr 0,nop,wscale 6], length 0
16:00:26.136627 IP 192.168.9.1.445 > 192.168.9.207.43569: Flags [S.], seq 1208160225, ack 846930761, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 3806395687 e
cr 15760935], length 0
16:00:26.137253 IP 192.168.9.207.43569 > 192.168.9.1.445: Flags [.], ack 1, win 92, options [nop,nop,TS val 15760935 ecr 3806395687], length 0
16:00:26.137553 IP 192.168.9.207.43569 > 192.168.9.1.445: Flags [P.], ack 1, win 92, options [nop,nop,TS val 15760935 ecr 3806395687], length 82WARNING: Short packet. Try increasing the snap length by 52
SMB PACKET: SMBnegprot (REQUEST)

16:00:26.160251 IP 192.168.9.1.445 > 192.168.9.207.43569: Flags [P.], ack 83, win 8326, options [nop,nop,TS val 3806395710 ecr 15760935], length 97WARNING: Short packet. Try increasing the snap length by 67
SMB PACKET: SMBnegprot (REPLY)

16:00:26.160919 IP 192.168.9.207.43569 > 192.168.9.1.445: Flags [.], ack 98, win 92, options [nop,nop,TS val 15760941 ecr 3806395710], length 0
16:00:26.161119 IP 192.168.9.207.43569 > 192.168.9.1.445: Flags [P.], ack 98, win 92, options [nop,nop,TS val 15760941 ecr 3806395710], length 268WARNING: Short packet. Try increasing the snap length by 238
SMB PACKET: SMBsesssetupX (REQUEST)

16:00:26.161344 IP 192.168.9.1.445 > 192.168.9.207.43569: Flags [P.], ack 351, win 8326, options [nop,nop,TS val 3806395711 ecr 15760941], length 39WARNING: Short packet. Try increasing the snap length by 9
SMB PACKET: SMBsesssetupX (REPLY)

16:00:26.200463 IP 192.168.9.207.43569 > 192.168.9.1.445: Flags [.], ack 137, win 92, options [nop,nop,TS val 15760951 ecr 3806395711], length 0
16:00:26.291233 IP 192.168.9.207.43569 > 192.168.9.1.445: Flags [F.], seq 351, ack 137, win 92, options [nop,nop,TS val 15760974 ecr 3806395711], length 0
16:00:26.291259 IP 192.168.9.1.445 > 192.168.9.207.43569: Flags [.], ack 352, win 8326, options [nop,nop,TS val 3806395841 ecr 15760974], length 0
16:00:26.292469 IP 192.168.9.1.445 > 192.168.9.207.43569: Flags [F.], seq 137, ack 352, win 8326, options [nop,nop,TS val 3806395842 ecr 15760974], length 0
16:00:26.293030 IP 192.168.9.207.43569 > 192.168.9.1.445: Flags [.], ack 138, win 92, options [nop,nop,TS val 15760974 ecr 3806395842], length 0
16:00:28.992777 IP 192.168.9.207.43570 > 192.168.9.1.445: Flags [S], seq 890533442, win 5840, options [mss 1460,sackOK,TS val 15761649 ecr 0,nop,wscale 6], length 0
16:00:28.992826 IP 192.168.9.1.445 > 192.168.9.207.43570: Flags [S.], seq 56703078, ack 890533443, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 2470809046 ecr 15761649], length 0
16:00:28.993470 IP 192.168.9.207.43570 > 192.168.9.1.445: Flags [.], ack 1, win 92, options [nop,nop,TS val 15761649 ecr 2470809046], length 0
16:00:28.993770 IP 192.168.9.207.43570 > 192.168.9.1.445: Flags [P.], ack 1, win 92, options [nop,nop,TS val 15761649 ecr 2470809046], length 82WARNING: Short packet. Try increasing the snap length by 52
SMB PACKET: SMBnegprot (REQUEST)

16:00:29.001903 IP 192.168.9.1.445 > 192.168.9.207.43570: Flags [P.], ack 83, win 8326, options [nop,nop,TS val 2470809055 ecr 15761649], length 97WARNING: Short packet. Try increasing the snap length by 67
SMB PACKET: SMBnegprot (REPLY)

16:00:29.002757 IP 192.168.9.207.43570 > 192.168.9.1.445: Flags [.], ack 98, win 92, options [nop,nop,TS val 15761651 ecr 2470809055], length 0
16:00:29.003056 IP 192.168.9.207.43570 > 192.168.9.1.445: Flags [P.], ack 98, win 92, options [nop,nop,TS val 15761651 ecr 2470809055], length 268WARNING: Short packet. Try increasing the snap length by 238
SMB PACKET: SMBsesssetupX (REQUEST)

16:00:29.003276 IP 192.168.9.1.445 > 192.168.9.207.43570: Flags [P.], ack 351, win 8326, options [nop,nop,TS val 2470809057 ecr 15761651], length 39WARNING: Short packet. Try increasing the snap length by 9
SMB PACKET: SMBsesssetupX (REPLY)

16:00:29.043209 IP 192.168.9.207.43570 > 192.168.9.1.445: Flags [.], ack 137, win 92, options [nop,nop,TS val 15761662 ecr 2470809057], length 0
16:00:29.135172 IP 192.168.9.207.43570 > 192.168.9.1.445: Flags [F.], seq 351, ack 137, win 92, options [nop,nop,TS val 15761685 ecr 2470809057], length 0
16:00:29.135204 IP 192.168.9.1.445 > 192.168.9.207.43570: Flags [.], ack 352, win 8326, options [nop,nop,TS val 2470809188 ecr 15761685], length 0
16:00:29.136453 IP 192.168.9.1.445 > 192.168.9.207.43570: Flags [F.], seq 137, ack 352, win 8326, options [nop,nop,TS val 2470809190 ecr 15761685], length 0
16:00:29.137065 IP 192.168.9.207.43570 > 192.168.9.1.445: Flags [.], ack 138, win 92, options [nop,nop,TS val 15761685 ecr 2470809190], length 0


FreeBSD (geht nicht):
Code:
15:58:24.328793 IP 192.168.9.1.138 > 192.168.9.255.138: NBT UDP PACKET(138)
15:58:24.328807 IP 192.168.9.1.138 > 192.168.9.255.138: NBT UDP PACKET(138)
15:58:24.328830 IP 192.168.9.1.138 > 192.168.9.255.138: NBT UDP PACKET(138)
15:58:24.328837 IP 192.168.9.1.138 > 192.168.9.255.138: NBT UDP PACKET(138)
15:58:33.921583 IP 192.168.9.254.2345 > 192.168.9.1.14013: Flags [S], seq 139397163, win 5840, options [mss 1460,sackOK,TS val 455328925 ecr 0,nop,wscale 1], length 0
15:58:33.921616 IP 192.168.9.1.14013 > 192.168.9.254.2345: Flags [R.], seq 0, ack 139397164, win 0, length 0
15:58:38.011529 IP 192.168.9.207.49870 > 192.168.9.1.445: Flags [S], seq 3431525492, win 5840, options [mss 1460,sackOK,TS val 15733904 ecr 0,nop,wscale 6], length 0
15:58:38.011567 IP 192.168.9.1.445 > 192.168.9.207.49870: Flags [S.], seq 3059024613, ack 3431525493, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 1835576226 ecr 15733904], length 0
15:58:38.012227 IP 192.168.9.207.49870 > 192.168.9.1.445: Flags [.], ack 1, win 92, options [nop,nop,TS val 15733904 ecr 1835576226], length 0
15:58:38.012428 IP 192.168.9.207.49870 > 192.168.9.1.445: Flags [P.], ack 1, win 92, options [nop,nop,TS val 15733904 ecr 1835576226], length 82WARNING: Short packet. Try increasing the snap length by 52
SMB PACKET: SMBnegprot (REQUEST)

15:58:38.021753 IP 192.168.9.1.445 > 192.168.9.207.49870: Flags [P.], ack 83, win 8326, options [nop,nop,TS val 1835576236 ecr 15733904], length 97WARNING: Short packet. Try increasing the snap length by 67
SMB PACKET: SMBnegprot (REPLY)

15:58:38.022913 IP 192.168.9.207.49870 > 192.168.9.1.445: Flags [.], ack 98, win 92, options [nop,nop,TS val 15733906 ecr 1835576236], length 0
15:58:38.023212 IP 192.168.9.207.49870 > 192.168.9.1.445: Flags [P.], ack 98, win 92, options [nop,nop,TS val 15733907 ecr 1835576236], length 260WARNING: Short packet. Try increasing the snap length by 230
SMB PACKET: SMBsesssetupX (REQUEST)

15:58:38.023438 IP 192.168.9.1.445 > 192.168.9.207.49870: Flags [P.], ack 343, win 8326, options [nop,nop,TS val 1835576238 ecr 15733907], length 39WARNING: Short packet. Try increasing the snap length by 9
SMB PACKET: SMBsesssetupX (REPLY)

15:58:38.063155 IP 192.168.9.207.49870 > 192.168.9.1.445: Flags [.], ack 137, win 92, options [nop,nop,TS val 15733917 ecr 1835576238], length 0
15:58:38.155224 IP 192.168.9.207.49870 > 192.168.9.1.445: Flags [F.], seq 343, ack 137, win 92, options [nop,nop,TS val 15733940 ecr 1835576238], length 0
15:58:38.155254 IP 192.168.9.1.445 > 192.168.9.207.49870: Flags [.], ack 344, win 8326, options [nop,nop,TS val 1835576369 ecr 15733940], length 0
15:58:38.156511 IP 192.168.9.1.445 > 192.168.9.207.49870: Flags [F.], seq 137, ack 344, win 8326, options [nop,nop,TS val 1835576371 ecr 15733940], length 0
15:58:38.159419 IP 192.168.9.207.49870 > 192.168.9.1.445: Flags [.], ack 138, win 92, options [nop,nop,TS val 15733941 ecr 1835576371], length 0
15:58:38.920332 ARP, Request who-has 192.168.9.1 tell 192.168.9.254, length 46
15:58:38.920349 ARP, Reply 192.168.9.1 is-at 00:00:5a:9f:3d:31, length 28
15:58:39.159668 IP 192.168.9.1.37080 > 192.168.9.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
15:58:39.159690 IP 192.168.9.1.37080 > 192.168.9.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST


Ubuntu-Linux mit smbclient (geht):
Code:
16:06:36.100852 IP 192.168.9.254.2405 > 192.168.9.1.14013: Flags [S], seq 648422047, win 5840, options [mss 1460,sackOK,TS val 455377141 ecr 0,nop,wscale 1], length 0
16:06:36.100875 IP 192.168.9.1.14013 > 192.168.9.254.2405: Flags [R.], seq 0, ack 648422048, win 0, length 0
16:06:38.973840 ARP, Request who-has 192.168.9.253 tell 192.168.9.204, length 46
16:06:38.975137 ARP, Request who-has 192.168.9.204 tell 192.168.9.253, length 46
16:06:41.096813 ARP, Request who-has 192.168.9.1 tell 192.168.9.254, length 46
16:06:41.096830 ARP, Reply 192.168.9.1 is-at 00:00:5a:9f:3d:31, length 28
16:06:42.389660 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [S], seq 2443120721, win 5840, options [mss 1460,sackOK,TS val 15854998 ecr 0,nop,wscale 6], length 0
16:06:42.389708 IP 192.168.9.1.445 > 192.168.9.207.39474: Flags [S.], seq 1822980196, ack 2443120722, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 3875831676 ecr 15854998], length 0
16:06:42.390355 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [.], ack 1, win 92, options [nop,nop,TS val 15854998 ecr 3875831676], length 0
16:06:42.395251 IP 192.168.9.207.38008 > 192.168.9.1.139: Flags [S], seq 2444970085, win 5840, options [mss 1460,sackOK,TS val 15855000 ecr 0,nop,wscale 6], length 0
16:06:42.395292 IP 192.168.9.1.139 > 192.168.9.207.38008: Flags [S.], seq 3917203048, ack 2444970086, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 3211061922 ecr 15855000], length 0
16:06:42.395848 IP 192.168.9.207.38008 > 192.168.9.1.139: Flags [R], seq 2444970086, win 0, length 0
16:06:42.396147 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [P.], ack 1, win 92, options [nop,nop,TS val 15855000 ecr 3875831676], length 194WARNING: Short packet. Try increasing the snap length by 164
SMB PACKET: SMBnegprot (REQUEST)

16:06:42.404095 IP 192.168.9.1.445 > 192.168.9.207.39474: Flags [P.], ack 195, win 8326, options [nop,nop,TS val 3875831690 ecr 15855000], length 131WARNING: Short packet. Try increasing the snap length by 101
SMB PACKET: SMBnegprot (REPLY)

16:06:42.404735 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [.], ack 132, win 108, options [nop,nop,TS val 15855002 ecr 3875831690], length 0
16:06:42.405035 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [P.], ack 132, win 108, options [nop,nop,TS val 15855002 ecr 3875831690], length 166WARNING: Short packet. Try increasing the snap length by 136
SMB PACKET: SMBsesssetupX (REQUEST)

16:06:42.405571 IP 192.168.9.1.445 > 192.168.9.207.39474: Flags [P.], ack 361, win 8326, options [nop,nop,TS val 3875831692 ecr 15855002], length 268WARNING: Short packet. Try increasing the snap length by 238
SMB PACKET: SMBsesssetupX (REPLY)

16:06:42.406533 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [P.], ack 400, win 125, options [nop,nop,TS val 15855002 ecr 3875831692], length 264WARNING: Short packet. Try increasing the snap length by 234
SMB PACKET: SMBsesssetupX (REQUEST)

16:06:42.406962 IP 192.168.9.1.445 > 192.168.9.207.39474: Flags [P.], ack 625, win 8326, options [nop,nop,TS val 3875831693 ecr 15855002], length 39WARNING: Short packet. Try increasing the snap length by 9
SMB PACKET: SMBsesssetupX (REPLY)

16:06:42.407631 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [P.], ack 439, win 125, options [nop,nop,TS val 15855003 ecr 3875831693], length 92WARNING: Short packet. Try increasing the snap length by 62
SMB PACKET: SMBsesssetupX (REQUEST)

16:06:42.417283 IP 192.168.9.1.445 > 192.168.9.207.39474: Flags [P.], ack 717, win 8326, options [nop,nop,TS val 3875831704 ecr 15855003], length 96WARNING: Short packet. Try increasing the snap length by 66
SMB PACKET: SMBsesssetupX (REPLY)

16:06:42.421913 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [P.], ack 535, win 125, options [nop,nop,TS val 15855006 ecr 3875831704], length 78WARNING: Short packet. Try increasing the snap length by 48
SMB PACKET: SMBtconX (REQUEST)

16:06:42.423481 IP 192.168.9.1.445 > 192.168.9.207.39474: Flags [P.], ack 795, win 8326, options [nop,nop,TS val 3875831710 ecr 15855006], length 60WARNING: Short packet. Try increasing the snap length by 30
SMB PACKET: SMBtconX (REPLY)

16:06:42.424209 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [P.], ack 595, win 125, options [nop,nop,TS val 15855007 ecr 3875831710], length 106WARNING: Short packet. Try increasing the snap length by 76
SMB PACKET: SMBntcreateX (REQUEST)

16:06:42.424974 IP 192.168.9.1.445 > 192.168.9.207.39474: Flags [P.], ack 901, win 8326, options [nop,nop,TS val 3875831711 ecr 15855007], length 107WARNING: Short packet. Try increasing the snap length by 77
SMB PACKET: SMBntcreateX (REPLY)

16:06:42.426005 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [P.], ack 702, win 125, options [nop,nop,TS val 15855007 ecr 3875831711], length 158WARNING: Short packet. Try increasing the snap length by 128
SMB PACKET: SMBtrans (REQUEST)

16:06:42.426193 IP 192.168.9.1.445 > 192.168.9.207.39474: Flags [P.], ack 1059, win 8326, options [nop,nop,TS val 3875831713 ecr 15855007], length 128WARNING: Short packet. Try increasing the snap length by 98
SMB PACKET: SMBtrans (REPLY)

16:06:42.426903 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [P.], ack 830, win 142, options [nop,nop,TS val 15855007 ecr 3875831713], length 170WARNING: Short packet. Try increasing the snap length by 140
SMB PACKET: SMBtrans (REQUEST)

16:06:42.427382 IP 192.168.9.1.445 > 192.168.9.207.39474: Flags [.], ack 1229, win 8326, options [nop,nop,TS val 3875831714 ecr 15855007], length 1448WARNING: Packet is continued in later TCP segments
SMB PACKET: SMBtrans (REPLY)

16:06:42.427392 IP 192.168.9.1.445 > 192.168.9.207.39474: Flags [P.], ack 1229, win 8326, options [nop,nop,TS val 3875831714 ecr 15855007], length 128SMB-over-TCP packet:(raw data or continuation?)

16:06:42.428401 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [.], ack 2406, win 232, options [nop,nop,TS val 15855008 ecr 3875831714], length 0
16:06:42.428799 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [P.], ack 2406, win 232, options [nop,nop,TS val 15855008 ecr 3875831714], length 45WARNING: Short packet. Try increasing the snap length by 15
SMB PACKET: SMBclose (REQUEST)

16:06:42.428866 IP 192.168.9.1.445 > 192.168.9.207.39474: Flags [P.], ack 1274, win 8326, options [nop,nop,TS val 3875831715 ecr 15855008], length 39WARNING: Short packet. Try increasing the snap length by 9
SMB PACKET: SMBclose (REPLY)

16:06:42.429899 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [P.], ack 2445, win 232, options [nop,nop,TS val 15855008 ecr 3875831715], length 39WARNING: Short packet. Try increasing the snap length by 9
SMB PACKET: SMBtdis (REQUEST)

16:06:42.430122 IP 192.168.9.1.445 > 192.168.9.207.39474: Flags [P.], ack 1313, win 8326, options [nop,nop,TS val 3875831716 ecr 15855008], length 39WARNING: Short packet. Try increasing the snap length by 9
SMB PACKET: SMBtdis (REPLY)

16:06:42.430698 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [F.], seq 1313, ack 2484, win 232, options [nop,nop,TS val 15855008 ecr 3875831716], length 0
16:06:42.430728 IP 192.168.9.1.445 > 192.168.9.207.39474: Flags [.], ack 1314, win 8326, options [nop,nop,TS val 3875831717 ecr 15855008], length 0
16:06:42.431097 IP 192.168.9.207.38009 > 192.168.9.1.139: Flags [S], seq 2446750886, win 5840, options [mss 1460,sackOK,TS val 15855008 ecr 0,nop,wscale 6], length 0
16:06:42.431125 IP 192.168.9.1.139 > 192.168.9.207.38009: Flags [S.], seq 1418907493, ack 2446750887, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 3308764478 ecr 15855008], length 0
16:06:42.431697 IP 192.168.9.207.38009 > 192.168.9.1.139: Flags [.], ack 1, win 92, options [nop,nop,TS val 15855009 ecr 3308764478], length 0
16:06:42.431896 IP 192.168.9.207.38009 > 192.168.9.1.139: Flags [P.], ack 1, win 92, options [nop,nop,TS val 15855009 ecr 3308764478], length 72 NBT Session Packet: Session Request
16:06:42.446711 IP 192.168.9.1.445 > 192.168.9.207.39474: Flags [F.], seq 2484, ack 1314, win 8326, options [nop,nop,TS val 3875831733 ecr 15855008], length 0
16:06:42.446716 IP 192.168.9.1.139 > 192.168.9.207.38009: Flags [P.], ack 73, win 8326, options [nop,nop,TS val 3308764494 ecr 15855009], length 4 NBT Session Packet: Session Granted
16:06:42.447377 IP 192.168.9.207.39474 > 192.168.9.1.445: Flags [.], ack 2485, win 232, options [nop,nop,TS val 15855013 ecr 3875831733], length 0
16:06:42.447674 IP 192.168.9.207.38009 > 192.168.9.1.139: Flags [.], ack 5, win 92, options [nop,nop,TS val 15855013 ecr 3308764494], length 0
16:06:42.447873 IP 192.168.9.207.38009 > 192.168.9.1.139: Flags [P.], ack 5, win 92, options [nop,nop,TS val 15855013 ecr 3308764494], length 194 NBT Session Packet: Session Message
16:06:42.448424 IP 192.168.9.1.139 > 192.168.9.207.38009: Flags [P.], ack 267, win 8326, options [nop,nop,TS val 3308764496 ecr 15855013], length 131 NBT Session Packet: Session Message
16:06:42.449172 IP 192.168.9.207.38009 > 192.168.9.1.139: Flags [P.], ack 136, win 108, options [nop,nop,TS val 15855013 ecr 3308764496], length 166 NBT Session Packet: Session Message
16:06:42.449910 IP 192.168.9.1.139 > 192.168.9.207.38009: Flags [P.], ack 433, win 8326, options [nop,nop,TS val 3308764497 ecr 15855013], length 268 NBT Session Packet: Session Message
16:06:42.450869 IP 192.168.9.207.38009 > 192.168.9.1.139: Flags [P.], ack 404, win 125, options [nop,nop,TS val 15855013 ecr 3308764497], length 264 NBT Session Packet: Session Message
16:06:42.451313 IP 192.168.9.1.139 > 192.168.9.207.38009: Flags [P.], ack 697, win 8326, options [nop,nop,TS val 3308764499 ecr 15855013], length 39 NBT Session Packet: Session Message
16:06:42.451967 IP 192.168.9.207.38009 > 192.168.9.1.139: Flags [P.], ack 443, win 125, options [nop,nop,TS val 15855014 ecr 3308764499], length 92 NBT Session Packet: Session Message
16:06:42.452993 IP 192.168.9.1.139 > 192.168.9.207.38009: Flags [P.], ack 789, win 8326, options [nop,nop,TS val 3308764500 ecr 15855014], length 96 NBT Session Packet: Session Message
16:06:42.453665 IP 192.168.9.207.38009 > 192.168.9.1.139: Flags [P.], ack 539, win 125, options [nop,nop,TS val 15855014 ecr 3308764500], length 78 NBT Session Packet: Session Message
16:06:42.455208 IP 192.168.9.1.139 > 192.168.9.207.38009: Flags [P.], ack 867, win 8326, options [nop,nop,TS val 3308764502 ecr 15855014], length 60 NBT Session Packet: Session Message
16:06:42.456161 IP 192.168.9.207.38009 > 192.168.9.1.139: Flags [P.], ack 599, win 125, options [nop,nop,TS val 15855015 ecr 3308764502], length 128 NBT Session Packet: Session Message
16:06:42.456515 IP 192.168.9.1.139 > 192.168.9.207.38009: Flags [P.], ack 995, win 8326, options [nop,nop,TS val 3308764504 ecr 15855015], length 101 NBT Session Packet: Session Message
16:06:42.457160 IP 192.168.9.207.38009 > 192.168.9.1.139: Flags [P.], ack 700, win 125, options [nop,nop,TS val 15855015 ecr 3308764504], length 128 NBT Session Packet: Session Message
16:06:42.457313 IP 192.168.9.1.139 > 192.168.9.207.38009: Flags [P.], ack 1123, win 8326, options [nop,nop,TS val 3308764505 ecr 15855015], length 134 NBT Session Packet: Session Message
16:06:42.457959 IP 192.168.9.207.38009 > 192.168.9.1.139: Flags [P.], ack 834, win 142, options [nop,nop,TS val 15855015 ecr 3308764505], length 39 NBT Session Packet: Session Message
16:06:42.458174 IP 192.168.9.1.139 > 192.168.9.207.38009: Flags [P.], ack 1162, win 8326, options [nop,nop,TS val 3308764505 ecr 15855015], length 39 NBT Session Packet: Session Message
16:06:42.458758 IP 192.168.9.207.38009 > 192.168.9.1.139: Flags [F.], seq 1162, ack 873, win 142, options [nop,nop,TS val 15855015 ecr 3308764505], length 0
16:06:42.458781 IP 192.168.9.1.139 > 192.168.9.207.38009: Flags [.], ack 1163, win 8326, options [nop,nop,TS val 3308764506 ecr 15855015], length 0
16:06:42.459896 IP 192.168.9.1.139 > 192.168.9.207.38009: Flags [F.], seq 873, ack 1163, win 8326, options [nop,nop,TS val 3308764507 ecr 15855015], length 0
16:06:42.460954 IP 192.168.9.207.38009 > 192.168.9.1.139: Flags [.], ack 874, win 142, options [nop,nop,TS val 15855016 ecr 3308764507], length 0
16:06:42.863581 IP 192.168.9.204.42850 > 192.168.9.1.3128: Flags [S], seq 4268607302, win 4380, options [mss 1460,sackOK,TS val 4777780 ecr 0,nop,wscale 6], length 0
16:06:42.863626 IP 192.168.9.1.3128 > 192.168.9.204.42850: Flags [S.], seq 827832685, ack 4268607303, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 629356830 ecr 4777780], length 0
16:06:42.864577 IP 192.168.9.204.42850 > 192.168.9.1.3128: Flags [.], ack 1, win 69, options [nop,nop,TS val 4777780 ecr 629356830], length 0
16:06:42.864978 IP 192.168.9.204.42850 > 192.168.9.1.3128: Flags [P.], ack 1, win 69, options [nop,nop,TS val 4777780 ecr 629356830], length 409
16:06:42.865272 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [S], seq 1631907105, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 98912709 ecr 0], length 0
16:06:42.941769 IP 81.171.114.69.5869 > 192.168.9.1.38787: Flags [S.], seq 894331227, ack 1631907106, win 5840, options [mss 1452], length 0
16:06:42.941806 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [.], ack 1, win 65535, length 0
16:06:42.941913 IP 192.168.9.1 > 81.171.114.69: ICMP echo request, id 15721, seq 11008, length 65
16:06:42.941987 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [P.], ack 1, win 65535, length 479
16:06:42.964221 IP 192.168.9.1.3128 > 192.168.9.204.42850: Flags [.], ack 410, win 8326, options [nop,nop,TS val 629356931 ecr 4777780], length 0
16:06:43.021154 IP 81.171.114.69 > 192.168.9.1: ICMP echo reply, id 15721, seq 11008, length 65
16:06:43.370033 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [P.], ack 1, win 65535, length 479
16:06:43.867147 IP 192.168.9.204.36945 > 192.168.9.1.3128: Flags [S], seq 5358883, win 2920, options [mss 1460,sackOK,TS val 4778031 ecr 0,nop,wscale 6], length 0
16:06:43.867174 IP 192.168.9.1.3128 > 192.168.9.204.36945: Flags [S.], seq 975325025, ack 5358884, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 3928032338 ecr 4778031], length 0
16:06:43.868342 IP 192.168.9.204.36945 > 192.168.9.1.3128: Flags [.], ack 1, win 46, options [nop,nop,TS val 4778031 ecr 3928032338], length 0
16:06:43.868643 IP 192.168.9.204.36945 > 192.168.9.1.3128: Flags [P.], ack 1, win 46, options [nop,nop,TS val 4778031 ecr 3928032338], length 278
16:06:43.868830 IP 192.168.9.1.57974 > 81.171.114.69.5869: Flags [S], seq 1902225624, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 98913710 ecr 0], length 0
16:06:43.968222 IP 192.168.9.1.3128 > 192.168.9.204.36945: Flags [.], ack 279, win 8326, options [nop,nop,TS val 3928032439 ecr 4778031], length 0
16:06:44.027339 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [P.], ack 1, win 65535, length 479
16:06:45.141561 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [P.], ack 1, win 65535, length 479
16:06:46.874018 IP 192.168.9.1.57974 > 81.171.114.69.5869: Flags [S], seq 1902225624, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 98916710 ecr 0], length 0
16:06:47.169622 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [P.], ack 1, win 65535, length 479
16:06:50.080416 IP 192.168.9.1.57974 > 81.171.114.69.5869: Flags [S], seq 1902225624, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 98919910 ecr 0], length 0
16:06:51.025288 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [P.], ack 1, win 65535, length 479
16:06:53.286795 IP 192.168.9.1.57974 > 81.171.114.69.5869: Flags [S], seq 1902225624, win 65535, options [mss 1460,sackOK,eol], length 0
16:06:53.673235 IP 192.168.9.207.2178067828 > 192.168.9.1.2049: 180 getattr [|nfs]
16:06:53.673401 IP 192.168.9.1.2049 > 192.168.9.207.2178067828: reply ok 116 getattr [|nfs]
16:06:53.674024 IP 192.168.9.207.931 > 192.168.9.1.2049: Flags [.], ack 1639172779, win 996, options [nop,nop,TS val 15857819 ecr 2521082248], length 0
16:06:53.682015 IP 192.168.9.207.2194845044 > 192.168.9.1.2049: 180 getattr [|nfs]
16:06:53.682083 IP 192.168.9.1.2049 > 192.168.9.207.2194845044: reply ok 116 getattr [|nfs]
16:06:53.686008 IP 192.168.9.207.2211622260 > 192.168.9.1.2049: 180 getattr [|nfs]
16:06:53.686575 IP 192.168.9.1.2049 > 192.168.9.207.2211622260: reply ok 212 getattr [|nfs]
16:06:53.727253 IP 192.168.9.207.931 > 192.168.9.1.2049: Flags [.], ack 337, win 996, options [nop,nop,TS val 15857833 ecr 2521082261], length 0
16:06:56.493193 IP 192.168.9.1.57974 > 81.171.114.69.5869: Flags [S], seq 1902225624, win 65535, options [mss 1460,sackOK,eol], length 0
16:06:56.558904 IP 81.171.114.69.5869 > 192.168.9.1.57974: Flags [S.], seq 1748703493, ack 1902225625, win 5840, options [mss 1452], length 0
16:06:56.558970 IP 192.168.9.1.57974 > 81.171.114.69.5869: Flags [.], ack 1, win 65535, length 0
16:06:56.559140 IP 192.168.9.1.57974 > 81.171.114.69.5869: Flags [P.], ack 1, win 65535, length 348
16:06:56.708611 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [P.], ack 1, win 65535, length 479
16:06:59.764701 IP 192.168.9.1.57974 > 81.171.114.69.5869: Flags [P.], ack 1, win 65535, length 348
16:06:59.847803 IP 81.171.114.69.5869 > 192.168.9.1.57974: Flags [.], ack 349, win 6432, length 0
16:06:59.847847 IP 192.168.9.1.57974 > 81.171.114.69.5869: Flags [.], ack 1, win 65535, length 0
16:06:59.861079 IP 81.171.114.69.5869 > 192.168.9.1.57974: Flags [P.], ack 349, win 6432, length 135
16:06:59.861130 IP 192.168.9.1.57974 > 81.171.114.69.5869: Flags [.], ack 136, win 65535, length 0
16:06:59.861293 IP 192.168.9.1.3128 > 192.168.9.204.36945: Flags [P.], ack 279, win 8326, options [nop,nop,TS val 3928048300 ecr 4778031], length 123
16:06:59.861322 IP 192.168.9.1.3128 > 192.168.9.204.36945: Flags [P.], ack 279, win 8326, options [nop,nop,TS val 3928048300 ecr 4778031], length 116
16:06:59.862277 IP 192.168.9.204.36945 > 192.168.9.1.3128: Flags [.], ack 124, win 45, options [nop,nop,TS val 4782030 ecr 3928048300], length 0
16:06:59.862477 IP 192.168.9.204.36945 > 192.168.9.1.3128: Flags [.], ack 240, win 44, options [nop,nop,TS val 4782030 ecr 3928048300], length 0
16:06:59.863176 IP 81.171.114.69.5869 > 192.168.9.1.57974: Flags [F.], seq 136, ack 349, win 6432, length 0
16:06:59.863197 IP 192.168.9.1.57974 > 81.171.114.69.5869: Flags [.], ack 137, win 65535, length 0
16:06:59.863325 IP 192.168.9.1.3128 > 192.168.9.204.36945: Flags [F.], seq 240, ack 279, win 8326, options [nop,nop,TS val 3928048302 ecr 4782030], length 0
16:06:59.863420 IP 192.168.9.1.57974 > 81.171.114.69.5869: Flags [F.], seq 349, ack 137, win 65535, length 0
16:06:59.863429 IP 192.168.9.1.57974 > 81.171.114.69.5869: Flags [F.], seq 349, ack 137, win 65535, length 0
16:06:59.864075 IP 192.168.9.204.36945 > 192.168.9.1.3128: Flags [F.], seq 279, ack 241, win 46, options [nop,nop,TS val 4782030 ecr 3928048302], length 0
16:06:59.864101 IP 192.168.9.1.3128 > 192.168.9.204.36945: Flags [.], ack 280, win 8325, options [nop,nop,TS val 3928048303 ecr 4782030], length 0
16:06:59.934674 IP 81.171.114.69.5869 > 192.168.9.1.57974: Flags [.], ack 350, win 6432, length 0
16:06:59.941065 IP 81.171.114.69.5869 > 192.168.9.1.57974: Flags [.], ack 350, win 6432, length 0
16:06:59.941077 IP 192.168.9.1.57974 > 81.171.114.69.5869: Flags [R], seq 1902225974, win 0, length 0
16:07:00.612208 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [S], seq 2728144883, win 5840, options [mss 1460,sackOK,TS val 15859554 ecr 0,nop,wscale 6], length 0
16:07:00.612246 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [S.], seq 306813414, ack 2728144884, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 2332188070 ecr 15859554], length 0
16:07:00.612904 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [.], ack 1, win 92, options [nop,nop,TS val 15859554 ecr 2332188070], length 0
16:07:00.614302 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [P.], ack 1, win 92, options [nop,nop,TS val 15859554 ecr 2332188070], length 194WARNING: Short packet. Try increasing the snap length by 164
SMB PACKET: SMBnegprot (REQUEST)

16:07:00.627326 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [P.], ack 195, win 8326, options [nop,nop,TS val 2332188085 ecr 15859554], length 131WARNING: Short packet. Try increasing the snap length by 101
SMB PACKET: SMBnegprot (REPLY)

16:07:00.628482 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [.], ack 132, win 108, options [nop,nop,TS val 15859558 ecr 2332188085], length 0
16:07:00.628881 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [P.], ack 132, win 108, options [nop,nop,TS val 15859558 ecr 2332188085], length 166WARNING: Short packet. Try increasing the snap length by 136
SMB PACKET: SMBsesssetupX (REQUEST)

16:07:00.629393 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [P.], ack 361, win 8326, options [nop,nop,TS val 2332188087 ecr 15859558], length 268WARNING: Short packet. Try increasing the snap length by 238
SMB PACKET: SMBsesssetupX (REPLY)

16:07:00.630578 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [P.], ack 400, win 125, options [nop,nop,TS val 15859558 ecr 2332188087], length 268WARNING: Short packet. Try increasing the snap length by 238
SMB PACKET: SMBsesssetupX (REQUEST)

16:07:00.649198 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [P.], ack 629, win 8326, options [nop,nop,TS val 2332188107 ecr 15859558], length 106WARNING: Short packet. Try increasing the snap length by 76
SMB PACKET: SMBsesssetupX (REPLY)

16:07:00.650058 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [P.], ack 506, win 125, options [nop,nop,TS val 15859563 ecr 2332188107], length 76WARNING: Short packet. Try increasing the snap length by 46
SMB PACKET: SMBtconX (REQUEST)

16:07:00.651943 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [P.], ack 705, win 8326, options [nop,nop,TS val 2332188110 ecr 15859563], length 60WARNING: Short packet. Try increasing the snap length by 30
SMB PACKET: SMBtconX (REPLY)

16:07:00.652647 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [P.], ack 566, win 125, options [nop,nop,TS val 15859564 ecr 2332188110], length 100WARNING: Short packet. Try increasing the snap length by 70
SMB PACKET: SMBtrans2 (REQUEST)

16:07:00.652801 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [P.], ack 805, win 8326, options [nop,nop,TS val 2332188111 ecr 15859564], length 39WARNING: Short packet. Try increasing the snap length by 9
SMB PACKET: SMBtrans2 (REPLY)

16:07:00.653446 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [P.], ack 605, win 125, options [nop,nop,TS val 15859564 ecr 2332188111], length 39WARNING: Short packet. Try increasing the snap length by 9
SMB PACKET: SMBtdis (REQUEST)

16:07:00.653669 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [P.], ack 844, win 8326, options [nop,nop,TS val 2332188112 ecr 15859564], length 39WARNING: Short packet. Try increasing the snap length by 9
SMB PACKET: SMBtdis (REPLY)

16:07:00.654345 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [P.], ack 644, win 125, options [nop,nop,TS val 15859564 ecr 2332188112], length 82WARNING: Short packet. Try increasing the snap length by 52
SMB PACKET: SMBtconX (REQUEST)

16:07:00.683015 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [P.], ack 926, win 8326, options [nop,nop,TS val 2332188141 ecr 15859564], length 68WARNING: Short packet. Try increasing the snap length by 38
SMB PACKET: SMBtconX (REPLY)

16:07:00.684702 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [P.], ack 712, win 125, options [nop,nop,TS val 15859572 ecr 2332188141], length 57WARNING: Short packet. Try increasing the snap length by 27
SMB PACKET: SMBecho (REQUEST)

16:07:00.684795 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [P.], ack 983, win 8326, options [nop,nop,TS val 2332188143 ecr 15859572], length 57WARNING: Short packet. Try increasing the snap length by 27
SMB PACKET: SMBecho (REPLY)

16:07:00.723248 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [.], ack 769, win 125, options [nop,nop,TS val 15859582 ecr 2332188143], length 0
16:07:03.687513 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [P.], ack 769, win 125, options [nop,nop,TS val 15860323 ecr 2332188143], length 90WARNING: Short packet. Try increasing the snap length by 60
SMB PACKET: SMBtrans2 (REQUEST)

16:07:03.713453 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [.], ack 1073, win 8326, options [nop,nop,TS val 2332191165 ecr 15860323], length 1448WARNING: Packet is continued in later TCP segments
SMB PACKET: SMBtrans2 (REPLY)

16:07:03.714572 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [.], ack 2217, win 170, options [nop,nop,TS val 15860329 ecr 2332191165], length 0
16:07:03.714603 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [.], ack 1073, win 8326, options [nop,nop,TS val 2332191167 ecr 15860329], length 1448SMB-over-TCP packet:(raw data or continuation?)

16:07:03.714612 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [.], ack 1073, win 8326, options [nop,nop,TS val 2332191167 ecr 15860329], length 1448SMB-over-TCP packet:(raw data or continuation?)

16:07:03.715669 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [.], ack 3665, win 216, options [nop,nop,TS val 15860330 ecr 2332191167], length 0
16:07:03.715685 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [.], ack 1073, win 8326, options [nop,nop,TS val 2332191168 ecr 15860330], length 1448SMB-over-TCP packet:(raw data or continuation?)

16:07:03.715693 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [P.], ack 1073, win 8326, options [nop,nop,TS val 2332191168 ecr 15860330], length 636SMB-over-TCP packet:(raw data or continuation?)

16:07:03.716367 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [.], ack 5113, win 261, options [nop,nop,TS val 15860330 ecr 2332191167], length 0
16:07:03.716767 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [.], ack 6561, win 306, options [nop,nop,TS val 15860330 ecr 2332191168], length 0
16:07:03.717066 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [.], ack 7197, win 351, options [nop,nop,TS val 15860330 ecr 2332191168], length 0
16:07:03.722458 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [P.], ack 7197, win 351, options [nop,nop,TS val 15860331 ecr 2332191168], length 39WARNING: Short packet. Try increasing the snap length by 9
SMB PACKET: SMBdskattr (REQUEST)

16:07:03.722760 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [P.], ack 1112, win 8326, options [nop,nop,TS val 2332191175 ecr 15860331], length 49WARNING: Short packet. Try increasing the snap length by 19
SMB PACKET: SMBdskattr (REPLY)

16:07:03.763202 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [.], ack 7246, win 351, options [nop,nop,TS val 15860342 ecr 2332191175], length 0
16:07:05.026305 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [P.], ack 7246, win 351, options [nop,nop,TS val 15860657 ecr 2332191175], length 57WARNING: Short packet. Try increasing the snap length by 27
SMB PACKET: SMBecho (REQUEST)

16:07:05.026451 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [P.], ack 1169, win 8326, options [nop,nop,TS val 2332192476 ecr 15860657], length 57WARNING: Short packet. Try increasing the snap length by 27
SMB PACKET: SMBecho (REPLY)

16:07:05.031787 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [.], ack 7303, win 351, options [nop,nop,TS val 15860659 ecr 2332192476], length 0
16:07:06.401032 IP 192.168.9.254.2409 > 192.168.9.1.14013: Flags [S], seq 684614640, win 5840, options [mss 1460,sackOK,TS val 455380171 ecr 0,nop,wscale 1], length 0
16:07:06.401056 IP 192.168.9.1.14013 > 192.168.9.254.2409: Flags [R.], seq 0, ack 684614641, win 0, length 0
16:07:06.743442 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [P.], ack 7303, win 351, options [nop,nop,TS val 15861087 ecr 2332192476], length 39WARNING: Short packet. Try increasing the snap length by 9
SMB PACKET: SMBtdis (REQUEST)

16:07:06.743949 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [P.], ack 1208, win 8326, options [nop,nop,TS val 2332194190 ecr 15861087], length 39WARNING: Short packet. Try increasing the snap length by 9
SMB PACKET: SMBtdis (REPLY)

16:07:06.744538 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [.], ack 7342, win 351, options [nop,nop,TS val 15861087 ecr 2332194190], length 0
16:07:06.744837 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [F.], seq 1208, ack 7342, win 351, options [nop,nop,TS val 15861087 ecr 2332194190], length 0
16:07:06.744863 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [.], ack 1209, win 8326, options [nop,nop,TS val 2332194191 ecr 15861087], length 0
16:07:06.752080 IP 192.168.9.1.445 > 192.168.9.207.39481: Flags [F.], seq 7342, ack 1209, win 8326, options [nop,nop,TS val 2332194198 ecr 15861087], length 0
16:07:06.752729 IP 192.168.9.207.39481 > 192.168.9.1.445: Flags [.], ack 7343, win 351, options [nop,nop,TS val 15861089 ecr 2332194198], length 0
16:07:07.874872 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [P.], ack 1, win 65535, length 479
16:07:07.969787 IP 81.171.114.69.5869 > 192.168.9.1.38787: Flags [.], ack 480, win 6432, length 0
16:07:07.969808 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [.], ack 1, win 65535, length 0
16:07:08.010929 IP 81.171.114.69.5869 > 192.168.9.1.38787: Flags [P.], ack 480, win 6432, length 102
16:07:08.010997 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [.], ack 103, win 65535, length 0
16:07:08.011201 IP 192.168.9.1.3128 > 192.168.9.204.42850: Flags [P.], ack 410, win 8326, options [nop,nop,TS val 629381928 ecr 4777780], length 123
16:07:08.011231 IP 192.168.9.1.3128 > 192.168.9.204.42850: Flags [P.], ack 410, win 8326, options [nop,nop,TS val 629381928 ecr 4777780], length 83
16:07:08.012526 IP 192.168.9.204.42850 > 192.168.9.1.3128: Flags [.], ack 124, win 68, options [nop,nop,TS val 4784067 ecr 629381928], length 0
16:07:08.012724 IP 192.168.9.204.42850 > 192.168.9.1.3128: Flags [.], ack 207, win 67, options [nop,nop,TS val 4784068 ecr 629381928], length 0
16:07:08.013723 IP 81.171.114.69.5869 > 192.168.9.1.38787: Flags [F.], seq 103, ack 480, win 6432, length 0
16:07:08.013744 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [.], ack 104, win 65535, length 0
16:07:08.013866 IP 192.168.9.1.3128 > 192.168.9.204.42850: Flags [F.], seq 207, ack 410, win 8326, options [nop,nop,TS val 629381930 ecr 4784068], length 0
16:07:08.013979 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [F.], seq 480, ack 104, win 65535, length 0
16:07:08.013988 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [F.], seq 480, ack 104, win 65535, length 0
16:07:08.014722 IP 192.168.9.204.42850 > 192.168.9.1.3128: Flags [F.], seq 410, ack 208, win 67, options [nop,nop,TS val 4784068 ecr 629381930], length 0
16:07:08.014745 IP 192.168.9.1.3128 > 192.168.9.204.42850: Flags [.], ack 411, win 8325, options [nop,nop,TS val 629381931 ecr 4784068], length 0
16:07:08.092013 IP 81.171.114.69.5869 > 192.168.9.1.38787: Flags [.], ack 481, win 6432, length 0
16:07:08.098103 IP 81.171.114.69.5869 > 192.168.9.1.38787: Flags [.], ack 481, win 6432, length 0
16:07:08.098115 IP 192.168.9.1.38787 > 81.171.114.69.5869: Flags [R], seq 1631907586, win 0, length 0
16:07:10.011373 IP 192.168.9.207.39485 > 192.168.9.1.445: Flags [S], seq 2871445335, win 5840, options [mss 1460,sackOK,TS val 15861904 ecr 0,nop,wscale 6], length 0
16:07:10.011420 IP 192.168.9.1.445 > 192.168.9.207.39485: Flags [S.], seq 1707277416, ack 2871445336, win 65535, options [mss 1460,nop,wscale 3,sackOK,TS val 3424186273 ecr 15861904], length 0
16:07:10.012067 IP 192.168.9.207.39485 > 192.168.9.1.445: Flags [.], ack 1, win 92, options [nop,nop,TS val 15861904 ecr 3424186273], length 0
16:07:10.012269 IP 192.168.9.207.39485 > 192.168.9.1.445: Flags [P.], ack 1, win 92, options [nop,nop,TS val 15861904 ecr 3424186273], length 82WARNING: Short packet. Try increasing the snap length by 52
SMB PACKET: SMBnegprot (REQUEST)

16:07:10.024389 IP 192.168.9.1.445 > 192.168.9.207.39485: Flags [P.], ack 83, win 8326, options [nop,nop,TS val 3424186286 ecr 15861904], length 97WARNING: Short packet. Try increasing the snap length by 67
SMB PACKET: SMBnegprot (REPLY)

16:07:10.025049 IP 192.168.9.207.39485 > 192.168.9.1.445: Flags [.], ack 98, win 92, options [nop,nop,TS val 15861907 ecr 3424186286], length 0
16:07:10.025347 IP 192.168.9.207.39485 > 192.168.9.1.445: Flags [P.], ack 98, win 92, options [nop,nop,TS val 15861907 ecr 3424186286], length 260WARNING: Short packet. Try increasing the snap length by 230
SMB PACKET: SMBsesssetupX (REQUEST)

16:07:10.025576 IP 192.168.9.1.445 > 192.168.9.207.39485: Flags [P.], ack 343, win 8326, options [nop,nop,TS val 3424186287 ecr 15861907], length 39WARNING: Short packet. Try increasing the snap length by 9
SMB PACKET: SMBsesssetupX (REPLY)

16:07:10.063195 IP 192.168.9.207.39485 > 192.168.9.1.445: Flags [.], ack 137, win 92, options [nop,nop,TS val 15861917 ecr 3424186287], length 0
16:07:10.155263 IP 192.168.9.207.39485 > 192.168.9.1.445: Flags [F.], seq 343, ack 137, win 92, options [nop,nop,TS val 15861940 ecr 3424186287], length 0
16:07:10.155289 IP 192.168.9.1.445 > 192.168.9.207.39485: Flags [.], ack 344, win 8326, options [nop,nop,TS val 3424186416 ecr 15861940], length 0
16:07:10.156516 IP 192.168.9.1.445 > 192.168.9.207.39485: Flags [F.], seq 137, ack 344, win 8326, options [nop,nop,TS val 3424186418 ecr 15861940], length 0
16:07:10.157060 IP 192.168.9.207.39485 > 192.168.9.1.445: Flags [.], ack 138, win 92, options [nop,nop,TS val 15861940 ecr 3424186418], length 0
16:07:13.007994 ARP, Request who-has 192.168.9.1 tell 192.168.9.254, length 46
16:07:13.008013 ARP, Reply 192.168.9.1 is-at 00:00:5a:9f:3d:31, length 28

Ich hoffe, dass damit jemand etwas anfangen kann.

Gruß
Yoda
 
Das ist eine gute Idee, Wireshark ist mir neu, probier ich aber gleich mal aus. ;-)

das war mal etherreal, heißt nun anders. Vielleicht kennst du das noch. Ist wirklich empfehlenswert und einfacher zu bedienen, trotzdem umfangreicher als tcpdump.

Aber das nur nebenher, weil ich auch zunächst sehr verwirrt war, als ich etherreal nicht finden konnte.
 
Zurück
Oben