Page 1 of 1
Samba access to BUBBA2 lost
Posted: 22 Mar 2011, 15:41
by wm.bubba
For a long time, I have been mounting BUBBA partitions on my main Linux desktop from my own init.d script. This has been working error free until today, when I encounted a very strange error and after many hours of searching am no nearer to understanding the problem.
I have run the mount command in a console and get the following error:
~> sudo mount -t cifs //192.168.1.3/home/xxxxx /home/BUBBA/private -o username=xxxxx,password=xxxxxxxxxx,uid=1000,gid=100
Unable to find suitable address.
I turned on cifs debugging and the following is copied from dmesg:
[ 1287.489124] /usr/src/packages/BUILD/kernel-pae-2.6.34/linux-2.6.34/fs/cifs/cifsfs.c: Devname: //192.168.1.3/home/xxxxx flags: 64
[ 1287.489171] /usr/src/packages/BUILD/kernel-pae-2.6.34/linux-2.6.34/fs/cifs/connect.c: CIFS VFS: in cifs_mount as Xid: 10 with uid: 0
[ 1287.489179] /usr/src/packages/BUILD/kernel-pae-2.6.34/linux-2.6.34/fs/cifs/connect.c: prefix path /xxxxx
[ 1287.489182] /usr/src/packages/BUILD/kernel-pae-2.6.34/linux-2.6.34/fs/cifs/connect.c: Username: xxxxx
[ 1287.489186] /usr/src/packages/BUILD/kernel-pae-2.6.34/linux-2.6.34/fs/cifs/connect.c: UNC: \\192.168.1.3\home ip: 192.168.1.3
[ 1287.489196] /usr/src/packages/BUILD/kernel-pae-2.6.34/linux-2.6.34/fs/cifs/connect.c: Socket created
[ 1287.489987] /usr/src/packages/BUILD/kernel-pae-2.6.34/linux-2.6.34/fs/cifs/connect.c: Error -111 connecting to server via ipv4
[ 1287.489994] CIFS VFS: Error connecting to socket. Aborting operation
[ 1287.489999] /usr/src/packages/BUILD/kernel-pae-2.6.34/linux-2.6.34/fs/cifs/connect.c: CIFS VFS: leaving cifs_mount (xid = 10) rc = -111
[ 1287.490002] CIFS VFS: cifs_mount failed w/return code = -111
I'm not sure if the problem is on the host PC or on BUBBA. I have rebooted both my PC and BUBBA, but still get the same error.
Any help would be appreciated. Thanks.
Re: Samba access to BUBBA2 lost
Posted: 22 Mar 2011, 18:56
by Cheeseboy
Hi,
My suggestions are limited:
1. Think real hard about what has changed since the problem occurred, then try to reverse it.
2. Use wireshark or similar to find out what is going on.
I had to use option 2 to figure this out:
http://wiki.excito.org/wiki/index.php/M ... hare_on_B3
But then the change was obvious and inreversible...
Re: Samba access to BUBBA2 lost
Posted: 22 Mar 2011, 19:02
by Cheeseboy
Hmm, searching google might also give some new ideas:
cifs error "-111"
Re: Samba access to BUBBA2 lost
Posted: 22 Mar 2011, 19:37
by wm.bubba
Hi,
Thanks for the reply.
Unfortunately, in answer to your first point, nothing has changed, on either my PC or BUBBA - no software installed, no updates done, no settings changed. I have googled cifs error "-111", but again as nothing has changed I can't see where the problem might lie.
I might have time tomorrow to give your second option a try.
Re: Samba access to BUBBA2 lost
Posted: 23 Mar 2011, 14:18
by wm.bubba
I have installed wireshark and run the mount command and captured the traffic, but I have no idea what it means.
Hopefully it will make sense to someone.
No. Time Source Destination Protocol Info
1205 3.395211000 192.168.1.2 192.168.1.3 TCP 34659 > microsoft-ds [SYN] Seq=0 Win=5808 Len=0 MSS=1452 SACK_PERM=1 TSV=828920 TSER=0 WS=6
Frame 1205: 74 bytes on wire (592 bits), 74 bytes captured (592 bits)
Arrival Time: Jan 1, 2000 16:21:57.702722000 GMT
Epoch Time: 946743717.702722000 seconds
[Time delta from previous captured frame: 0.004938000 seconds]
[Time delta from previous displayed frame: 0.000000000 seconds]
[Time since reference or first frame: 3.395211000 seconds]
Frame Number: 1205
Frame Length: 74 bytes (592 bits)
Capture Length: 74 bytes (592 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: eth:ip:tcp]
[Coloring Rule Name: TCP SYN/FIN]
[Coloring Rule String: tcp.flags & 0x02 || tcp.flags.fin == 1]
Ethernet II, Src: Foxconn_8b:3d:a7 (00:15:58:8b:3d:a7), Dst: ExcitoEl_00:06:11 (00:22:02:00:06:11)
Destination: ExcitoEl_00:06:11 (00:22:02:00:06:11)
Address: ExcitoEl_00:06:11 (00:22:02:00:06:11)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Source: Foxconn_8b:3d:a7 (00:15:58:8b:3d:a7)
Address: Foxconn_8b:3d:a7 (00:15:58:8b:3d:a7)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.2 (192.168.1.2), Dst: 192.168.1.3 (192.168.1.3)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 60
Identification: 0x51bf (20927)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x65a7 [correct]
[Good: True]
[Bad: False]
Source: 192.168.1.2 (192.168.1.2)
Destination: 192.168.1.3 (192.168.1.3)
Transmission Control Protocol, Src Port: 34659 (34659), Dst Port: microsoft-ds (445), Seq: 0, Len: 0
Source port: 34659 (34659)
Destination port: microsoft-ds (445)
[Stream index: 2]
Sequence number: 0 (relative sequence number)
Header length: 40 bytes
Flags: 0x02 (SYN)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...0 .... = Acknowledgement: Not set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..1. = Syn: Set
[Expert Info (Chat/Sequence): Connection establish request (SYN): server port microsoft-ds]
[Message: Connection establish request (SYN): server port microsoft-ds]
[Severity level: Chat]
[Group: Sequence]
.... .... ...0 = Fin: Not set
Window size: 5808
Checksum: 0x8634 [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
Options: (20 bytes)
Maximum segment size: 1452 bytes
TCP SACK Permitted Option: True
Timestamps: TSval 828920, TSecr 0
NOP
Window scale: 6 (multiply by 64)
No. Time Source Destination Protocol Info
1208 3.395599000 192.168.1.3 192.168.1.2 TCP microsoft-ds > 34659 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
Frame 1208: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Arrival Time: Jan 1, 2000 16:21:57.703110000 GMT
Epoch Time: 946743717.703110000 seconds
[Time delta from previous captured frame: 0.000047000 seconds]
[Time delta from previous displayed frame: 0.000388000 seconds]
[Time since reference or first frame: 3.395599000 seconds]
Frame Number: 1208
Frame Length: 60 bytes (480 bits)
Capture Length: 60 bytes (480 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: eth:ip:tcp]
[Coloring Rule Name: TCP RST]
[Coloring Rule String: tcp.flags.reset eq 1]
Ethernet II, Src: ExcitoEl_00:06:11 (00:22:02:00:06:11), Dst: Foxconn_8b:3d:a7 (00:15:58:8b:3d:a7)
Destination: Foxconn_8b:3d:a7 (00:15:58:8b:3d:a7)
Address: Foxconn_8b:3d:a7 (00:15:58:8b:3d:a7)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Source: ExcitoEl_00:06:11 (00:22:02:00:06:11)
Address: ExcitoEl_00:06:11 (00:22:02:00:06:11)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Type: IP (0x0800)
Trailer: 000000000000
Internet Protocol, Src: 192.168.1.3 (192.168.1.3), Dst: 192.168.1.2 (192.168.1.2)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 40
Identification: 0x0000 (0)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0xb77a [correct]
[Good: True]
[Bad: False]
Source: 192.168.1.3 (192.168.1.3)
Destination: 192.168.1.2 (192.168.1.2)
Transmission Control Protocol, Src Port: microsoft-ds (445), Dst Port: 34659 (34659), Seq: 1, Ack: 1, Len: 0
Source port: microsoft-ds (445)
Destination port: 34659 (34659)
[Stream index: 2]
Sequence number: 1 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 20 bytes
Flags: 0x14 (RST, ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgement: Set
.... .... 0... = Push: Not set
.... .... .1.. = Reset: Set
[Expert Info (Chat/Sequence): Connection reset (RST)]
[Message: Connection reset (RST)]
[Severity level: Chat]
[Group: Sequence]
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
Window size: 0
Checksum: 0xaaaf [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1205]
[The RTT to ACK the segment was: 0.000388000 seconds]
No. Time Source Destination Protocol Info
1209 3.395626000 192.168.1.2 192.168.1.3 TCP 45211 > netbios-ssn [SYN] Seq=0 Win=5808 Len=0 MSS=1452 SACK_PERM=1 TSV=828920 TSER=0 WS=6
Frame 1209: 74 bytes on wire (592 bits), 74 bytes captured (592 bits)
Arrival Time: Jan 1, 2000 16:21:57.703137000 GMT
Epoch Time: 946743717.703137000 seconds
[Time delta from previous captured frame: 0.000027000 seconds]
[Time delta from previous displayed frame: 0.000027000 seconds]
[Time since reference or first frame: 3.395626000 seconds]
Frame Number: 1209
Frame Length: 74 bytes (592 bits)
Capture Length: 74 bytes (592 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: eth:ip:tcp]
[Coloring Rule Name: TCP SYN/FIN]
[Coloring Rule String: tcp.flags & 0x02 || tcp.flags.fin == 1]
Ethernet II, Src: Foxconn_8b:3d:a7 (00:15:58:8b:3d:a7), Dst: ExcitoEl_00:06:11 (00:22:02:00:06:11)
Destination: ExcitoEl_00:06:11 (00:22:02:00:06:11)
Address: ExcitoEl_00:06:11 (00:22:02:00:06:11)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Source: Foxconn_8b:3d:a7 (00:15:58:8b:3d:a7)
Address: Foxconn_8b:3d:a7 (00:15:58:8b:3d:a7)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Type: IP (0x0800)
Internet Protocol, Src: 192.168.1.2 (192.168.1.2), Dst: 192.168.1.3 (192.168.1.3)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 60
Identification: 0x51b2 (20914)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0x65b4 [correct]
[Good: True]
[Bad: False]
Source: 192.168.1.2 (192.168.1.2)
Destination: 192.168.1.3 (192.168.1.3)
Transmission Control Protocol, Src Port: 45211 (45211), Dst Port: netbios-ssn (139), Seq: 0, Len: 0
Source port: 45211 (45211)
Destination port: netbios-ssn (139)
[Stream index: 3]
Sequence number: 0 (relative sequence number)
Header length: 40 bytes
Flags: 0x02 (SYN)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...0 .... = Acknowledgement: Not set
.... .... 0... = Push: Not set
.... .... .0.. = Reset: Not set
.... .... ..1. = Syn: Set
[Expert Info (Chat/Sequence): Connection establish request (SYN): server port netbios-ssn]
[Message: Connection establish request (SYN): server port netbios-ssn]
[Severity level: Chat]
[Group: Sequence]
.... .... ...0 = Fin: Not set
Window size: 5808
Checksum: 0x5e2b [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
Options: (20 bytes)
Maximum segment size: 1452 bytes
TCP SACK Permitted Option: True
Timestamps: TSval 828920, TSecr 0
NOP
Window scale: 6 (multiply by 64)
No. Time Source Destination Protocol Info
1210 3.395968000 192.168.1.3 192.168.1.2 TCP netbios-ssn > 45211 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
Frame 1210: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Arrival Time: Jan 1, 2000 16:21:57.703479000 GMT
Epoch Time: 946743717.703479000 seconds
[Time delta from previous captured frame: 0.000342000 seconds]
[Time delta from previous displayed frame: 0.000342000 seconds]
[Time since reference or first frame: 3.395968000 seconds]
Frame Number: 1210
Frame Length: 60 bytes (480 bits)
Capture Length: 60 bytes (480 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: eth:ip:tcp]
[Coloring Rule Name: TCP RST]
[Coloring Rule String: tcp.flags.reset eq 1]
Ethernet II, Src: ExcitoEl_00:06:11 (00:22:02:00:06:11), Dst: Foxconn_8b:3d:a7 (00:15:58:8b:3d:a7)
Destination: Foxconn_8b:3d:a7 (00:15:58:8b:3d:a7)
Address: Foxconn_8b:3d:a7 (00:15:58:8b:3d:a7)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Source: ExcitoEl_00:06:11 (00:22:02:00:06:11)
Address: ExcitoEl_00:06:11 (00:22:02:00:06:11)
.... ...0 .... .... .... .... = IG bit: Individual address (unicast)
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
Type: IP (0x0800)
Trailer: 000000000000
Internet Protocol, Src: 192.168.1.3 (192.168.1.3), Dst: 192.168.1.2 (192.168.1.2)
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
0000 00.. = Differentiated Services Codepoint: Default (0x00)
.... ..0. = ECN-Capable Transport (ECT): 0
.... ...0 = ECN-CE: 0
Total Length: 40
Identification: 0x0000 (0)
Flags: 0x02 (Don't Fragment)
0... .... = Reserved bit: Not set
.1.. .... = Don't fragment: Set
..0. .... = More fragments: Not set
Fragment offset: 0
Time to live: 64
Protocol: TCP (6)
Header checksum: 0xb77a [correct]
[Good: True]
[Bad: False]
Source: 192.168.1.3 (192.168.1.3)
Destination: 192.168.1.2 (192.168.1.2)
Transmission Control Protocol, Src Port: netbios-ssn (139), Dst Port: 45211 (45211), Seq: 1, Ack: 1, Len: 0
Source port: netbios-ssn (139)
Destination port: 45211 (45211)
[Stream index: 3]
Sequence number: 1 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 20 bytes
Flags: 0x14 (RST, ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgement: Set
.... .... 0... = Push: Not set
.... .... .1.. = Reset: Set
[Expert Info (Chat/Sequence): Connection reset (RST)]
[Message: Connection reset (RST)]
[Severity level: Chat]
[Group: Sequence]
.... .... ..0. = Syn: Not set
.... .... ...0 = Fin: Not set
Window size: 0
Checksum: 0x82a6 [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
[SEQ/ACK analysis]
[This is an ACK to the segment in frame: 1209]
[The RTT to ACK the segment was: 0.000342000 seconds]
Re: Samba access to BUBBA2 lost
Posted: 23 Mar 2011, 14:37
by Ubi
can you mount bubba partitions from bubba?
what does nmblookup do?
what does smbclient -L do?
Re: Samba access to BUBBA2 lost
Posted: 23 Mar 2011, 14:39
by Cheeseboy
Hi,
Analysing TCP traffic is an onerous undertaking.
Using the text interface is not going to help. And none of us are going to do it for you without charging you for our hours (or at least no me).
I suggest you make wireshark filter out any but the interesting traffic. You can do this with command line arguments, but I think last time I did it, I found it easier to just catch everything and do the filtering when analysing the output.
Make it save the output to a pcap file (I think it is -w).
Then install Wireshark on your Windows or Linux machine where you will have the GUI. You can then load your Bubba capture file there, and have a proper analysing environment.
Then you can identify the first request frame, and then it has tools that will let you only follow that "conversation" between the two computers. It will highlight different protocols in different colours, generally making your life easier.
HTH,
Cheeseboy
Re: Samba access to BUBBA2 lost
Posted: 23 Mar 2011, 18:13
by wm.bubba
Thanks for your help.
Whilst scratching my head, I thought I'd stop and restart samba on Bubba. Well. anything is worth a try! Surprisingly I can mount my partitions again.
I'm still at a loss to explain what happened, l but happy now everything is working again.