A descoberta de rede do Windows 10 não detecta servidores Ubuntu

0

O Win 10 Network Discovery não está mais atendendo aos meus servidores Ubuntu. Foi trabalhando até alguns meses atrás. Todos os meus sistemas Win10 vêem um ao outro. Meus servidores Ubuntu podem ver um ao outro. Mas não há Ubuntu < - > Win10 acontecendo.

A coisa verdadeiramente enlouquecedora é que eu posso ver o pedido de sessão NBT / respostas no lado do servidor.

Ainda posso acessar os compartilhamentos manualmente, eles simplesmente não aparecem em "Rede".

testparm

# testparm -s
Load smb config files from /etc/samba/smb.conf
rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
WARNING: The "syslog" option is deprecated
Processing section "[printers]"
Processing section "[print$]"
Loaded services file OK.
Server role: ROLE_STANDALONE

# Global parameters
[global]
        server string = %h server (Samba, Ubuntu)
        server role = standalone server
        map to guest = Bad User
        obey pam restrictions = Yes
        pam password change = Yes
        passwd program = /usr/bin/passwd %u
        passwd chat = *Enter\snew\s*\spassword:* %n\n *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* .
        unix password sync = Yes
        syslog = 0
        log file = /var/log/samba/log.%m
        max log size = 1000
        dns proxy = No
        usershare allow guests = Yes
        panic action = /usr/share/samba/panic-action %d
        idmap config * : backend = tdb


[printers]
        comment = All Printers
        path = /var/spool/samba
        create mask = 0700
        printable = Yes
        browseable = No


[print$]
        comment = Printer Drivers
        path = /var/lib/samba/printers

usershare

# net usershare info myfolder
[myfolder]
path=/myfolder
comment=
usershare_acl=Everyone:F,
guest_ok=y

TCPdump

192.168.1.215 = Windows 10

192.168.1.4 = Ubuntu 16.04

tcpdump -v -n 'port 137 || 138 || 139 || 445 || 5353'        
14:44:52.366620 IP (tos 0x0, ttl 128, id 29684, offset 0, flags [DF], proto TCP (6), length 52)
        192.168.1.215.10025 > 192.168.1.4.139: Flags [S], cksum 0xdf73 (correct), seq 1146332280, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    14:44:52.366661 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
        192.168.1.4.139 > 192.168.1.215.10025: Flags [S.], cksum 0x50b2 (correct), seq 3495053119, ack 1146332281, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
    14:44:52.368519 IP (tos 0x0, ttl 128, id 29685, offset 0, flags [DF], proto TCP (6), length 112)
        192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0x8b68 (correct), seq 1:73, ack 1, win 256, length 72 NBT Session Packet: Session Request
    14:44:52.368564 IP (tos 0x0, ttl 64, id 41745, offset 0, flags [DF], proto TCP (6), length 40)
        192.168.1.4.139 > 192.168.1.215.10025: Flags [.], cksum 0x0268 (correct), ack 73, win 229, length 0
    14:44:52.370587 IP (tos 0x0, ttl 64, id 41746, offset 0, flags [DF], proto TCP (6), length 44)
        192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x805b (correct), seq 1:5, ack 73, win 229, length 4 NBT Session Packet: Session Granted
    14:44:52.371766 IP (tos 0x0, ttl 128, id 29688, offset 0, flags [DF], proto TCP (6), length 113)
        192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xcae3 (correct), seq 73:146, ack 5, win 256, length 73 NBT Session Packet: Session Message
    14:44:52.375416 IP (tos 0x0, ttl 64, id 41747, offset 0, flags [DF], proto TCP (6), length 246)
        192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0xf320 (correct), seq 5:211, ack 146, win 229, length 206 NBT Session Packet: Session Message
    14:44:52.376385 IP (tos 0x0, ttl 128, id 29690, offset 0, flags [DF], proto TCP (6), length 218)
        192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xf64e (correct), seq 146:324, ack 211, win 255, length 178 NBT Session Packet: Session Message
    14:44:52.376601 IP (tos 0x0, ttl 64, id 41748, offset 0, flags [DF], proto TCP (6), length 312)
        192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x6e56 (correct), seq 211:483, ack 324, win 237, length 272 NBT Session Packet: Session Message
    14:44:52.377579 IP (tos 0x0, ttl 128, id 29691, offset 0, flags [DF], proto TCP (6), length 40)
        192.168.1.215.10025 > 192.168.1.4.139: Flags [F.], cksum 0xff70 (correct), seq 324, ack 483, win 254, length 0
    14:44:52.380775 IP (tos 0x0, ttl 64, id 41749, offset 0, flags [DF], proto TCP (6), length 40)
        192.168.1.4.139 > 192.168.1.215.10025: Flags [F.], cksum 0xff80 (correct), seq 483, ack 325, win 237, length 0
    14:44:52.381585 IP (tos 0x0, ttl 128, id 29694, offset 0, flags [DF], proto TCP (6), length 40)
        192.168.1.215.10025 > 192.168.1.4.139: Flags [.], cksum 0xff6f (correct), ack 484, win 254, length 0
    14:44:54.359518 IP (tos 0x0, ttl 128, id 17492, offset 0, flags [none], proto UDP (17), length 202)
        192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
    14:44:54.359541 IP (tos 0x0, ttl 128, id 17493, offset 0, flags [none], proto UDP (17), length 78)
        192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
    14:44:54.359640 IP (tos 0x0, ttl 64, id 23821, offset 0, flags [DF], proto UDP (17), length 210)
        192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
    14:44:55.068278 IP (tos 0x0, ttl 128, id 17495, offset 0, flags [none], proto UDP (17), length 78)
        192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
    14:44:55.759031 IP (tos 0x0, ttl 128, id 17497, offset 0, flags [none], proto UDP (17), length 78)
        192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
    14:44:57.135012 IP (tos 0x0, ttl 128, id 17504, offset 0, flags [none], proto UDP (17), length 202)
        192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
    14:44:57.135046 IP (tos 0x0, ttl 128, id 17505, offset 0, flags [none], proto UDP (17), length 78)
        192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
    14:44:57.135157 IP (tos 0x0, ttl 64, id 24435, offset 0, flags [DF], proto UDP (17), length 210)
        192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
    14:44:57.885119 IP (tos 0x0, ttl 128, id 17507, offset 0, flags [none], proto UDP (17), length 78)
        192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
    14:44:58.638794 IP (tos 0x0, ttl 128, id 17509, offset 0, flags [none], proto UDP (17), length 78)
        192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
    
por CIAduck 09.04.2018 / 17:58

0 respostas