Tree connect failed: NT_STATUS_ACCESS_DENIED

Hi,

I recently installed NethServer 7.7.1908 as file server, LDAP, gateway and firewall on my home network.
I created user nico and I found folder correctly created on /var/lib/nethserver/home/nico.
From Win10 I can’t access to my home folder for access denied, tried from smbclient directly on the server return this:

[root@homeserver ~]# smbclient -L homeserver -U nico -m SMB2
Enter WORKGROUP\nico’s password:

    Sharename       Type      Comment
    ---------       ----      -------
    print$          Disk      Printer drivers
    documenti       Disk      Documenti
    IPC$            IPC       IPC Service (NethServer 7.7.1908 final (Samba 4.9.1))

Reconnecting with SMB1 for workgroup listing.

    Server               Comment
    ---------            -------

    Workgroup            Master
    ---------            -------
                         ZYXELSETUP
    WORKGROUP            HOMESERVER

[root@homeserver ~]#

and:

[root@homeserver ~]# smbclient -d 10 -U ‘WORKGROUP\nico’ //homeserver/nico
INFO: Current debug levels:
all: 10
tdb: 10
printdrivers: 10
lanman: 10
smb: 10
rpc_parse: 10
rpc_srv: 10
rpc_cli: 10
passdb: 10
sam: 10
auth: 10
winbind: 10
vfs: 10
idmap: 10
quota: 10
acls: 10
locking: 10
msdfs: 10
dmapi: 10
registry: 10
scavenger: 10
dns: 10
ldb: 10
tevent: 10
auth_audit: 10
auth_json_audit: 10
kerberos: 10
drs_repl: 10
smb2: 10
smb2_credits: 10
dsdb_audit: 10
dsdb_json_audit: 10
dsdb_password_audit: 10
dsdb_password_json_audit: 10
dsdb_transaction_audit: 10
dsdb_transaction_json_audit: 10
dsdb_group_audit: 10
dsdb_group_json_audit: 10
lp_load_ex: refreshing parameters
Initialising global parameters
rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
INFO: Current debug levels:
all: 10
tdb: 10
printdrivers: 10
lanman: 10
smb: 10
rpc_parse: 10
rpc_srv: 10
rpc_cli: 10
passdb: 10
sam: 10
auth: 10
winbind: 10
vfs: 10
idmap: 10
quota: 10
acls: 10
locking: 10
msdfs: 10
dmapi: 10
registry: 10
scavenger: 10
dns: 10
ldb: 10
tevent: 10
auth_audit: 10
auth_json_audit: 10
kerberos: 10
drs_repl: 10
smb2: 10
smb2_credits: 10
dsdb_audit: 10
dsdb_json_audit: 10
dsdb_password_audit: 10
dsdb_password_json_audit: 10
dsdb_transaction_audit: 10
dsdb_transaction_json_audit: 10
dsdb_group_audit: 10
dsdb_group_json_audit: 10
Processing section “[global]”
doing parameter workgroup = WORKGROUP
doing parameter server string = NethServer 7.7.1908 final (Samba %v)
doing parameter security = user
doing parameter netbios name = HOMESERVER
Processing section “[global]”
doing parameter log file = /var/log/samba/log.%m
doing parameter max log size = 50
doing parameter deadtime = 10080
doing parameter netbios aliases =
doing parameter wins server =
doing parameter remote announce =
doing parameter remote browse sync =
doing parameter map to guest = Bad User
doing parameter obey pam restrictions = yes
doing parameter idmap config * : backend = tdb
doing parameter idmap config * : range = 10000-99999
doing parameter inherit owner = no
doing parameter full_audit:prefix = smbauditlog|%T|%u|%I|%S|%U
doing parameter full_audit:success = read write open unlink mkdir rmdir rename chmod
doing parameter full_audit:failure = read write open unlink mkdir rmdir rename chmod
doing parameter full_audit:facility = LOCAL7
doing parameter full_audit:priority = INFO
Processing section “[global]”
pm_process() returned Yes
lp_servicenumber: couldn’t find homes
messaging_dgm_ref: messaging_dgm_init returned Success
messaging_dgm_ref: unique = 2662820513030879136
Registering messaging pointer for type 2 - private_data=(nil)
Registering messaging pointer for type 9 - private_data=(nil)
Registered MSG_REQ_POOL_USAGE
Registering messaging pointer for type 11 - private_data=(nil)
Registering messaging pointer for type 12 - private_data=(nil)
Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED
Registering messaging pointer for type 1 - private_data=(nil)
Registering messaging pointer for type 5 - private_data=(nil)
Registering messaging pointer for type 51 - private_data=(nil)
messaging_init_internal: my id: 1880
lp_load_ex: refreshing parameters
Freeing parametrics:
Initialising global parameters
rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
INFO: Current debug levels:
all: 10
tdb: 10
printdrivers: 10
lanman: 10
smb: 10
rpc_parse: 10
rpc_srv: 10
rpc_cli: 10
passdb: 10
sam: 10
auth: 10
winbind: 10
vfs: 10
idmap: 10
quota: 10
acls: 10
locking: 10
msdfs: 10
dmapi: 10
registry: 10
scavenger: 10
dns: 10
ldb: 10
tevent: 10
auth_audit: 10
auth_json_audit: 10
kerberos: 10
drs_repl: 10
smb2: 10
smb2_credits: 10
dsdb_audit: 10
dsdb_json_audit: 10
dsdb_password_audit: 10
dsdb_password_json_audit: 10
dsdb_transaction_audit: 10
dsdb_transaction_json_audit: 10
dsdb_group_audit: 10
dsdb_group_json_audit: 10
Processing section “[global]”
doing parameter workgroup = WORKGROUP
doing parameter server string = NethServer 7.7.1908 final (Samba %v)
doing parameter security = user
doing parameter netbios name = HOMESERVER
Processing section “[global]”
doing parameter log file = /var/log/samba/log.%m
doing parameter max log size = 50
doing parameter deadtime = 10080
doing parameter netbios aliases =
doing parameter wins server =
doing parameter remote announce =
doing parameter remote browse sync =
doing parameter map to guest = Bad User
doing parameter obey pam restrictions = yes
doing parameter idmap config * : backend = tdb
doing parameter idmap config * : range = 10000-99999
doing parameter inherit owner = no
doing parameter full_audit:prefix = smbauditlog|%T|%u|%I|%S|%U
doing parameter full_audit:success = read write open unlink mkdir rmdir rename chmod
doing parameter full_audit:failure = read write open unlink mkdir rmdir rename chmod
doing parameter full_audit:facility = LOCAL7
doing parameter full_audit:priority = INFO
Processing section “[global]”
pm_process() returned Yes
lp_servicenumber: couldn’t find homes
added interface enp2s0 ip=192.168.2.1 bcast=192.168.2.255 netmask=255.255.255.0
added interface enp3s0 ip=192.168.10.2 bcast=192.168.10.255 netmask=255.255.255.0
Netbios name list:-
my_netbios_names[0]=“HOMESERVER”
Client started (version 4.9.1).
Opening cache file at /var/lib/samba/gencache.tdb
Opening cache file at /var/lib/samba/lock/gencache_notrans.tdb
gencache_set_data_blob: Adding cache entry with key=[AD_SITENAME/DOMAIN/] and timeout=[Thu Jan 1 01:00:00 AM 1970 CET] (-1588788000 seconds in the past)
sitename_fetch: No stored sitename for realm ‘’
internal_resolve_name: looking up homeserver#20 (sitename (null))
name homeserver#20 found.
remove_duplicate_addrs2: looking for duplicate address/port pairs
Connecting to 192.168.2.1 at port 445
Socket options:
SO_KEEPALIVE = 0
SO_REUSEADDR = 0
SO_BROADCAST = 0
TCP_NODELAY = 1
TCP_KEEPCNT = 9
TCP_KEEPIDLE = 7200
TCP_KEEPINTVL = 75
IPTOS_LOWDELAY = 0
IPTOS_THROUGHPUT = 0
SO_REUSEPORT = 0
SO_SNDBUF = 2626560
SO_RCVBUF = 1061296
SO_SNDLOWAT = 1
SO_RCVLOWAT = 1
SO_SNDTIMEO = 0
SO_RCVTIMEO = 0
TCP_QUICKACK = 1
TCP_DEFER_ACCEPT = 0
session request ok
negotiated dialect[SMB3_11] against server[homeserver]
got OID=1.3.6.1.4.1.311.2.2.10
Enter WORKGROUP\nico’s password:
cli_session_setup_spnego_send: Connect to homeserver as nico@WORKGROUP using SPNEGO
GENSEC backend ‘gssapi_spnego’ registered
GENSEC backend ‘gssapi_krb5’ registered
GENSEC backend ‘gssapi_krb5_sasl’ registered
GENSEC backend ‘spnego’ registered
GENSEC backend ‘schannel’ registered
GENSEC backend ‘naclrpc_as_system’ registered
GENSEC backend ‘sasl-EXTERNAL’ registered
GENSEC backend ‘ntlmssp’ registered
GENSEC backend ‘ntlmssp_resume_ccache’ registered
GENSEC backend ‘http_basic’ registered
GENSEC backend ‘http_ntlm’ registered
GENSEC backend ‘http_negotiate’ registered
Starting GENSEC mechanism spnego
Starting GENSEC submechanism ntlmssp
negotiate: struct NEGOTIATE_MESSAGE
Signature : ‘NTLMSSP’
MessageType : NtLmNegotiate (1)
NegotiateFlags : 0x62088215 (1644724757)
1: NTLMSSP_NEGOTIATE_UNICODE
0: NTLMSSP_NEGOTIATE_OEM
1: NTLMSSP_REQUEST_TARGET
1: NTLMSSP_NEGOTIATE_SIGN
0: NTLMSSP_NEGOTIATE_SEAL
0: NTLMSSP_NEGOTIATE_DATAGRAM
0: NTLMSSP_NEGOTIATE_LM_KEY
0: NTLMSSP_NEGOTIATE_NETWARE
1: NTLMSSP_NEGOTIATE_NTLM
0: NTLMSSP_NEGOTIATE_NT_ONLY
0: NTLMSSP_ANONYMOUS
0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
0: NTLMSSP_TARGET_TYPE_DOMAIN
0: NTLMSSP_TARGET_TYPE_SERVER
0: NTLMSSP_TARGET_TYPE_SHARE
1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
0: NTLMSSP_NEGOTIATE_IDENTIFY
0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
0: NTLMSSP_NEGOTIATE_TARGET_INFO
1: NTLMSSP_NEGOTIATE_VERSION
1: NTLMSSP_NEGOTIATE_128
1: NTLMSSP_NEGOTIATE_KEY_EXCH
0: NTLMSSP_NEGOTIATE_56
DomainNameLen : 0x0000 (0)
DomainNameMaxLen : 0x0000 (0)
DomainName : *
DomainName : ‘’
WorkstationLen : 0x0000 (0)
WorkstationMaxLen : 0x0000 (0)
Workstation : *
Workstation : ‘’
Version: struct ntlmssp_VERSION
ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
ProductBuild : 0x0000 (0)
Reserved: ARRAY(3)
[0] : 0x00 (0)
[1] : 0x00 (0)
[2] : 0x00 (0)
NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
gensec_update_send: ntlmssp[0x560f976988f0]: subreq: 0x560f97698f70
gensec_update_send: spnego[0x560f97697190]: subreq: 0x560f97697f10
gensec_update_done: ntlmssp[0x560f976988f0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x560f97698f70/…/auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x560f97699120)] timer[(nil)] finish[…/auth/ntlmssp/ntlmssp.c:215]
gensec_update_done: spnego[0x560f97697190]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x560f97697f10/…/auth/gensec/spnego.c:1610]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x560f976980c0)] timer[(nil)] finish[…/auth/gensec/spnego.c:2094]
Got challenge flags:
Got NTLMSSP neg_flags=0x628a8215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_TARGET_TYPE_SERVER
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_TARGET_INFO
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
challenge: struct CHALLENGE_MESSAGE
Signature : ‘NTLMSSP’
MessageType : NtLmChallenge (0x2)
TargetNameLen : 0x0014 (20)
TargetNameMaxLen : 0x0014 (20)
TargetName : *
TargetName : ‘HOMESERVER’
NegotiateFlags : 0x628a8215 (1653244437)
1: NTLMSSP_NEGOTIATE_UNICODE
0: NTLMSSP_NEGOTIATE_OEM
1: NTLMSSP_REQUEST_TARGET
1: NTLMSSP_NEGOTIATE_SIGN
0: NTLMSSP_NEGOTIATE_SEAL
0: NTLMSSP_NEGOTIATE_DATAGRAM
0: NTLMSSP_NEGOTIATE_LM_KEY
0: NTLMSSP_NEGOTIATE_NETWARE
1: NTLMSSP_NEGOTIATE_NTLM
0: NTLMSSP_NEGOTIATE_NT_ONLY
0: NTLMSSP_ANONYMOUS
0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
0: NTLMSSP_TARGET_TYPE_DOMAIN
1: NTLMSSP_TARGET_TYPE_SERVER
0: NTLMSSP_TARGET_TYPE_SHARE
1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
0: NTLMSSP_NEGOTIATE_IDENTIFY
0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
1: NTLMSSP_NEGOTIATE_TARGET_INFO
1: NTLMSSP_NEGOTIATE_VERSION
1: NTLMSSP_NEGOTIATE_128
1: NTLMSSP_NEGOTIATE_KEY_EXCH
0: NTLMSSP_NEGOTIATE_56
ServerChallenge : 831be1a8a38bd3ce
Reserved : 0000000000000000
TargetInfoLen : 0x008a (138)
TargetInfoMaxLen : 0x008a (138)
TargetInfo : *
TargetInfo: struct AV_PAIR_LIST
count : 0x00000006 (6)
pair: ARRAY(6)
pair: struct AV_PAIR
AvId : MsvAvNbDomainName (0x2)
AvLen : 0x0014 (20)
Value : union ntlmssp_AvValue(case 0x2)
AvNbDomainName : ‘HOMESERVER’
pair: struct AV_PAIR
AvId : MsvAvNbComputerName (0x1)
AvLen : 0x0014 (20)
Value : union ntlmssp_AvValue(case 0x1)
AvNbComputerName : ‘HOMESERVER’
pair: struct AV_PAIR
AvId : MsvAvDnsDomainName (0x4)
AvLen : 0x0016 (22)
Value : union ntlmssp_AvValue(case 0x4)
AvDnsDomainName : ‘adventum.it’
pair: struct AV_PAIR
AvId : MsvAvDnsComputerName (0x3)
AvLen : 0x002c (44)
Value : union ntlmssp_AvValue(case 0x3)
AvDnsComputerName : ‘homeserver.adventum.it’
pair: struct AV_PAIR
AvId : MsvAvTimestamp (0x7)
AvLen : 0x0008 (8)
Value : union ntlmssp_AvValue(case 0x7)
AvTimestamp : Wed May 6 08:00:02 PM 2020 CEST
pair: struct AV_PAIR
AvId : MsvAvEOL (0x0)
AvLen : 0x0000 (0)
Value : union ntlmssp_AvValue(case 0x0)
Version: struct ntlmssp_VERSION
ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6)
ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1)
ProductBuild : 0x0000 (0)
Reserved : 000000
NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF)
authenticate: struct AUTHENTICATE_MESSAGE
Signature : ‘NTLMSSP’
MessageType : NtLmAuthenticate (3)
LmChallengeResponseLen : 0x0018 (24)
LmChallengeResponseMaxLen: 0x0018 (24)
LmChallengeResponse : *
LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case 24)
v1: struct LM_RESPONSE
Response : 000000000000000000000000000000000000000000000000
NtChallengeResponseLen : 0x0128 (296)
NtChallengeResponseMaxLen: 0x0128 (296)
NtChallengeResponse : *
NtChallengeResponse : union ntlmssp_NTLM_RESPONSE_with_len(case 296)
v2: struct NTLMv2_RESPONSE
Response : a7115e7f4975c5dc0e318a03e761f36d
Challenge: struct NTLMv2_CLIENT_CHALLENGE
RespType : 0x01 (1)
HiRespType : 0x01 (1)
Reserved1 : 0x0000 (0)
Reserved2 : 0x00000000 (0)
TimeStamp : Wed May 6 08:00:02 PM 2020 CEST
ChallengeFromClient : 625dd422f75adf3b
Reserved3 : 0x00000000 (0)
AvPairs: struct AV_PAIR_LIST
count : 0x0000000a (10)
pair: ARRAY(10)
pair: struct AV_PAIR
AvId : MsvAvNbDomainName (0x2)
AvLen : 0x0014 (20)
Value : union ntlmssp_AvValue(case 0x2)
AvNbDomainName : ‘HOMESERVER’
pair: struct AV_PAIR
AvId : MsvAvNbComputerName (0x1)
AvLen : 0x0014 (20)
Value : union ntlmssp_AvValue(case 0x1)
AvNbComputerName : ‘HOMESERVER’
pair: struct AV_PAIR
AvId : MsvAvDnsDomainName (0x4)
AvLen : 0x0016 (22)
Value : union ntlmssp_AvValue(case 0x4)
AvDnsDomainName : ‘adventum.it’
pair: struct AV_PAIR
AvId : MsvAvDnsComputerName (0x3)
AvLen : 0x002c (44)
Value : union ntlmssp_AvValue(case 0x3)
AvDnsComputerName : ‘homeserver.adventum.it’
pair: struct AV_PAIR
AvId : MsvAvTimestamp (0x7)
AvLen : 0x0008 (8)
Value : union ntlmssp_AvValue(case 0x7)
AvTimestamp : Wed May 6 08:00:02 PM 2020 CEST
pair: struct AV_PAIR
AvId : MsvAvFlags (0x6)
AvLen : 0x0004 (4)
Value : union ntlmssp_AvValue(case 0x6)
AvFlags : 0x00000002 (2)
0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT
1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE
0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE
pair: struct AV_PAIR
AvId : MsvAvSingleHost (0x8)
AvLen : 0x0030 (48)
Value : union ntlmssp_AvValue(case 0x8)
AvSingleHost: struct ntlmssp_SingleHostData
Size : 0x00000030 (48)
Z4 : 0x00000000 (0)
token_info: struct LSAP_TOKEN_INFO_INTEGRITY
Flags : 0x00000000 (0)
TokenIL : 0x00000000 (0)
MachineId : fe49b74acda6f07c065f3626f75ff84615ee5689602f2d313528eec0037ac429
remaining : DATA_BLOB length=0
pair: struct AV_PAIR
AvId : MsvChannelBindings (0xA)
AvLen : 0x0010 (16)
Value : union ntlmssp_AvValue(case 0xA)
ChannelBindings : 00000000000000000000000000000000
pair: struct AV_PAIR
AvId : MsvAvTargetName (0x9)
AvLen : 0x001e (30)
Value : union ntlmssp_AvValue(case 0x9)
AvTargetName : ‘cifs/homeserver’
pair: struct AV_PAIR
AvId : MsvAvEOL (0x0)
AvLen : 0x0000 (0)
Value : union ntlmssp_AvValue(case 0x0)
DomainNameLen : 0x0012 (18)
DomainNameMaxLen : 0x0012 (18)
DomainName : *
DomainName : ‘WORKGROUP’
UserNameLen : 0x0008 (8)
UserNameMaxLen : 0x0008 (8)
UserName : *
UserName : ‘nico’
WorkstationLen : 0x0014 (20)
WorkstationMaxLen : 0x0014 (20)
Workstation : *
Workstation : ‘HOMESERVER’
EncryptedRandomSessionKeyLen: 0x0010 (16)
EncryptedRandomSessionKeyMaxLen: 0x0010 (16)
EncryptedRandomSessionKey: *
EncryptedRandomSessionKey: DATA_BLOB length=16
[0000] 18 43 A4 31 DE BD C7 81 41 74 36 AE 56 69 82 56 .C.1… At6.Vi.V
NegotiateFlags : 0x62088215 (1644724757)
1: NTLMSSP_NEGOTIATE_UNICODE
0: NTLMSSP_NEGOTIATE_OEM
1: NTLMSSP_REQUEST_TARGET
1: NTLMSSP_NEGOTIATE_SIGN
0: NTLMSSP_NEGOTIATE_SEAL
0: NTLMSSP_NEGOTIATE_DATAGRAM
0: NTLMSSP_NEGOTIATE_LM_KEY
0: NTLMSSP_NEGOTIATE_NETWARE
1: NTLMSSP_NEGOTIATE_NTLM
0: NTLMSSP_NEGOTIATE_NT_ONLY
0: NTLMSSP_ANONYMOUS
0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
0: NTLMSSP_TARGET_TYPE_DOMAIN
0: NTLMSSP_TARGET_TYPE_SERVER
0: NTLMSSP_TARGET_TYPE_SHARE
1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
0: NTLMSSP_NEGOTIATE_IDENTIFY
0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
0: NTLMSSP_NEGOTIATE_TARGET_INFO
1: NTLMSSP_NEGOTIATE_VERSION
1: NTLMSSP_NEGOTIATE_128
1: NTLMSSP_NEGOTIATE_KEY_EXCH
0: NTLMSSP_NEGOTIATE_56
Version: struct ntlmssp_VERSION
ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
ProductBuild : 0x0000 (0)
Reserved: ARRAY(3)
[0] : 0x00 (0)
[1] : 0x00 (0)
[2] : 0x00 (0)
NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
NTLMSSP: Set final flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
NTLMSSP Sign/Seal - Initialising with flags:
Got NTLMSSP neg_flags=0x62088215
NTLMSSP_NEGOTIATE_UNICODE
NTLMSSP_REQUEST_TARGET
NTLMSSP_NEGOTIATE_SIGN
NTLMSSP_NEGOTIATE_NTLM
NTLMSSP_NEGOTIATE_ALWAYS_SIGN
NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
NTLMSSP_NEGOTIATE_VERSION
NTLMSSP_NEGOTIATE_128
NTLMSSP_NEGOTIATE_KEY_EXCH
gensec_update_send: ntlmssp[0x560f976988f0]: subreq: 0x560f976aa780
gensec_update_send: spnego[0x560f97697190]: subreq: 0x560f97697bc0
gensec_update_done: ntlmssp[0x560f976988f0]: NT_STATUS_OK tevent_req[0x560f976aa780/…/auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x560f976aa930)] timer[(nil)] finish[…/auth/ntlmssp/ntlmssp.c:222]
gensec_update_done: spnego[0x560f97697190]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x560f97697bc0/…/auth/gensec/spnego.c:1610]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x560f97697d70)] timer[(nil)] finish[…/auth/gensec/spnego.c:2094]
session setup ok
tree connect failed: NT_STATUS_ACCESS_DENIED
[root@homeserver ~]#

Thanks for your help

Did you try to install SMBv1 on your Windows 10 computer?

Hi Michael,

W10 SMBv1 client already in use