>
> Here you go... it could be the net shutdown command failing perhaps?
My initial reaction was yes, but a bad exit status from DumpPostUserCmd
will only cause the backup to be considered bad
if $Conf{UserCmdCheckStatus} is non-zero. If it were, there should be an
error message saying so. Can you check the value
of $Conf{UserCmdCheckStatus}? Also, are there any error messages in the
client's LOG file?
I'd recommend temporarily removing $Conf{DumpPostUserCmd}, and also
reducing the smbclient debug level ("-d 5") to 1 ("-d 1")
in $Conf{SmbClientFullCmd} and $Conf{SmbClientIncrCmd}.
Craig
On Fri, Oct 19, 2018 at 2:16 AM Paul Littlefield <[email protected]> wrote:
> On 18/10/2018 16:56, Craig Barratt wrote:
> > It seems the XferLOG file is very short. Can you just send the whole
> thing please?
>
> Here you go... it could be the net shutdown command failing perhaps?
>
>
> Running: /usr/bin/smbclient \\\\192.168.0.101\\BackupPC-Test -U XXXXXX -E
> -d 5 -c tarmode\ full -Tc -
> full backup started for share BackupPC-Test
> Xfer PIDs are now 2075,2074
> INFO: Current debug levels:
> all: 5
> tdb: 5
> printdrivers: 5
> lanman: 5
> smb: 5
> rpc_parse: 5
> rpc_srv: 5
> rpc_cli: 5
> passdb: 5
> sam: 5
> auth: 5
> winbind: 5
> vfs: 5
> idmap: 5
> quota: 5
> acls: 5
> locking: 5
> msdfs: 5
> dmapi: 5
> registry: 5
> scavenger: 5
> dns: 5
> ldb: 5
> tevent: 5
> tar:1667 DUMP:t->to_process = 1
> tar:1668 DUMP:t->mode.operation = TAR_CREATE
> tar:1669 DUMP:t->mode.selection = TAR_INCLUDE
> tar:1670 DUMP:t->mode.blocksize = 20
> tar:1671 DUMP:t->mode.hidden = 1
> tar:1672 DUMP:t->mode.system = 1
> tar:1673 DUMP:t->mode.incremental = 0
> tar:1674 DUMP:t->mode.reset = 0
> tar:1675 DUMP:t->mode.dry = 0
> tar:1676 DUMP:t->mode.verbose = 0
> tar:1677 DUMP:t->total_size = 0
> tar:1678 DUMP:t->tar_path = -
> tar:1679 DUMP:t->path_list_size = 0
> tar:1685 DUMP:t->path_list @ (nil) (0 elem)
> lp_load_ex: refreshing parameters
> Initialising global parameters
> rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
> INFO: Current debug levels:
> all: 5
> tdb: 5
> printdrivers: 5
> lanman: 5
> smb: 5
> rpc_parse: 5
> rpc_srv: 5
> rpc_cli: 5
> passdb: 5
> sam: 5
> auth: 5
> winbind: 5
> vfs: 5
> idmap: 5
> quota: 5
> acls: 5
> locking: 5
> msdfs: 5
> dmapi: 5
> registry: 5
> scavenger: 5
> dns: 5
> ldb: 5
> tevent: 5
> Processing section "[global]"
> doing parameter workgroup = XXXXXX
> doing parameter server string = Samba Server %v
> doing parameter netbios name = SERVER1
> doing parameter map to guest = Bad User
> doing parameter passdb backend = smbpasswd
> doing parameter username map = /etc/samba/smbusers
> doing parameter log file = /var/log/samba/log.%m
> doing parameter max log size = 50
> doing parameter name resolve order = wins lmhosts bcast host
> doing parameter time server = Yes
> doing parameter load printers = No
> doing parameter printcap name = /etc/printcap
> doing parameter printing = bsd
> doing parameter preferred master = Yes
> doing parameter domain master = No
> doing parameter dns proxy = No
> doing parameter wins support = Yes
> doing parameter idmap config * : backend = tdb
> doing parameter hosts allow = 172.20.0., 192.168.2., 192.168.1.,
> 192.168.0., 127.
> pm_process() returned Yes
> added interface eno1 ip=192.168.0.1 bcast=192.168.0.255
> netmask=255.255.255.0
> Netbios name list:-
> my_netbios_names[0]="SERVER1"
> Client started (version 4.3.11-Ubuntu).
> Connecting to 192.168.0.101 at port 445
> Socket options:
> SO_KEEPALIVE = 0
> SO_REUSEADDR = 0
> SO_BROADCAST = 0
> TCP_NODELAY = 1
> TCP_KEEPCNT = 9
> TCP_KEEPIDLE = 7200
> TCP_KEEPINTVL = 75
> IPTOS_LOWDELAY = 0
> IPTOS_THROUGHPUT = 0
> SO_REUSEPORT = 0
> SO_SNDBUF = 87040
> SO_RCVBUF = 372480
> SO_SNDLOWAT = 1
> SO_RCVLOWAT = 1
> SO_SNDTIMEO = 0
> SO_RCVTIMEO = 0
> TCP_QUICKACK = 1
> TCP_DEFER_ACCEPT = 0
> session request ok
> Doing spnego session setup (blob length=277)
> got OID=1.3.6.1.4.1.311.2.2.30
> got OID=1.3.6.1.4.1.311.2.2.10
> got principal=<null>
> GENSEC backend 'gssapi_spnego' registered
> GENSEC backend 'gssapi_krb5' registered
> GENSEC backend 'gssapi_krb5_sasl' registered
> GENSEC backend 'spnego' registered
> GENSEC backend 'schannel' registered
> GENSEC backend 'naclrpc_as_system' registered
> GENSEC backend 'sasl-EXTERNAL' registered
> GENSEC backend 'ntlmssp' registered
> GENSEC backend 'ntlmssp_resume_ccache' registered
> GENSEC backend 'http_basic' registered
> GENSEC backend 'http_ntlm' registered
> GENSEC backend 'krb5' registered
> GENSEC backend 'fake_gssapi_krb5' registered
> Starting GENSEC mechanism spnego
> Starting GENSEC submechanism ntlmssp
> Got challenge flags:
> Got NTLMSSP neg_flags=0x628a8215
> NTLMSSP_NEGOTIATE_UNICODE
> NTLMSSP_REQUEST_TARGET
> NTLMSSP_NEGOTIATE_SIGN
> NTLMSSP_NEGOTIATE_NTLM
> NTLMSSP_NEGOTIATE_ALWAYS_SIGN
> NTLMSSP_TARGET_TYPE_SERVER
> NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
> NTLMSSP_NEGOTIATE_TARGET_INFO
> NTLMSSP_NEGOTIATE_VERSION
> NTLMSSP_NEGOTIATE_128
> NTLMSSP_NEGOTIATE_KEY_EXCH
> NTLMSSP: Set final flags:
> Got NTLMSSP neg_flags=0x62088215
> NTLMSSP_NEGOTIATE_UNICODE
> NTLMSSP_REQUEST_TARGET
> NTLMSSP_NEGOTIATE_SIGN
> NTLMSSP_NEGOTIATE_NTLM
> NTLMSSP_NEGOTIATE_ALWAYS_SIGN
> NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
> NTLMSSP_NEGOTIATE_VERSION
> NTLMSSP_NEGOTIATE_128
> NTLMSSP_NEGOTIATE_KEY_EXCH
> NTLMSSP Sign/Seal - Initialising with flags:
> Got NTLMSSP neg_flags=0x62088215
> NTLMSSP_NEGOTIATE_UNICODE
> NTLMSSP_REQUEST_TARGET
> NTLMSSP_NEGOTIATE_SIGN
> NTLMSSP_NEGOTIATE_NTLM
> NTLMSSP_NEGOTIATE_ALWAYS_SIGN
> NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
> NTLMSSP_NEGOTIATE_VERSION
> NTLMSSP_NEGOTIATE_128
> NTLMSSP_NEGOTIATE_KEY_EXCH
> NTLMSSP Sign/Seal - Initialising with flags:
> Got NTLMSSP neg_flags=0x62088215
> NTLMSSP_NEGOTIATE_UNICODE
> NTLMSSP_REQUEST_TARGET
> NTLMSSP_NEGOTIATE_SIGN
> NTLMSSP_NEGOTIATE_NTLM
> NTLMSSP_NEGOTIATE_ALWAYS_SIGN
> NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
> NTLMSSP_NEGOTIATE_VERSION
> NTLMSSP_NEGOTIATE_128
> NTLMSSP_NEGOTIATE_KEY_EXCH
> Domain=[XXXXXX] OS=[Windows 7 Home Premium 7601 Service Pack 1]
> Server=[Windows 7 Home Premium 6.1]
> session setup ok
> tconx ok
> tar:316 tarmode is now full, system, hidden, noreset, quiet
> tar:702 tar_process do_list with mask: \\*
> tar:899 +++ \Test.txt
> tar:712 Total bytes received: 63
> tar:632 tar_process done, err = 0
> pool 644 0/0 63 Test.txt
> tarExtract: Done: 0 errors, 1 filesExist, 63 sizeExist, 63 sizeExistComp,
> 1 filesTotal, 63 sizeTotal
> Executing DumpPostUserCmd: /usr/bin/net rpc shutdown -W XXXXXX -I
> 192.168.0.101 -U Administrator%xxxxxxxxxxx
> Could not connect to server 192.168.0.101
> The username or password was not correct.
> Connection failed: NT_STATUS_LOGON_FAILURE
> Could not connect to server 192.168.0.101
> The username or password was not correct.
> Connection failed: NT_STATUS_LOGON_FAILURE
> Got fatal error during xfer (tar:632 tar_process done, err = 0)
> Backup aborted (tar:632 tar_process done, err = 0)
> Saving this as a partial backup, replacing the prior one (got 1 and 0
> files versus 0)
>
>
>
>
>
>
> --
>
> Paul Littlefield
>
> Telephone: 07801 125705
> Email: [email protected]
> Wiki: http://wiki.indie-it.com/wiki/Special:AllPages
> LinkedIn: https://www.linkedin.com/in/paullittlefield
>
> Paul Littlefield is environmentally responsible. Please consider the
> environment before printing this email. This email and any attachment is
> intended for the named addressee only, or person authorised to receive it
> on their behalf. The content should be treated as confidential and the
> recipient may not disclose this message or any attachment to anyone else
> without authorisation. If this transmission is received in error please
> notify the sender immediately and delete this message from your email
> system. All electronic transmissions to and from me are recorded and may be
> monitored. Finally, the recipient should check this email and any
> attachments for viruses. Paul Littlefield accepts no liability for any
> damage caused by any virus transmitted by this email.
>
> Ubuntu 18.04.1 LTS (x86_64)
>
>
_______________________________________________
BackupPC-users mailing list
[email protected]
List: https://lists.sourceforge.net/lists/listinfo/backuppc-users
Wiki: http://backuppc.wiki.sourceforge.net
Project: http://backuppc.sourceforge.net/