Bonjour,
Comme je n'ai pas trouvé de support efficace sur les sites de raspbian, je me permets de poster ici sachant que raspbian c'est presque debian et que ma question est plutôt générale. Si vous estimez que ma question n'a pas sa place ici, faites-le moi savoir.
Je voudrais savoir comment debugger la commande suivante exécutée sur un Raspberry muni de Raspian (février 2019):
sudo mount -v -t cifs //192.168.1.41/partage /mnt/test -o username=pi,password=pi
mount error(115): Operation in progress
[ 1841.201731] CIFS VFS: Error connecting to socket. Aborting operation.
[ 1841.201750] CIFS VFS: cifs_mount failed w/return code = -115
La machine 192.168.1.41 est une windows 7. J'ai crée un dossier partagé et un user (appelé pi) ayant des droits r/w
Je peux pinger depuis les 2 machines
J'ai installé bien sûr cifs-utils
J'ai même installé Samba
merci d'avance pour les tuyaux
[Edit 1] Je rajoute un tcpdump vers 1.41 effectué durant le mount
sudo tcpdump -vv dst 192.168.1.41 > test.txt
15:04:05.908521 IP (tos 0x0, ttl 64, id 12668, offset 0, flags [DF], proto TCP (6), length 60)
192.168.1.61.53962 > 192.168.1.41.microsoft-ds: Flags [S], cksum 0x83e5 (incorrect -> 0xec3a), seq 1585314924, win 29200, options [mss 1460,sackOK,TS val 3216340694 ecr 0,nop,wscale 7], length 0
15:04:06.946501 IP (tos 0x0, ttl 64, id 12669, offset 0, flags [DF], proto TCP (6), length 60)
192.168.1.61.53962 > 192.168.1.41.microsoft-ds: Flags [S], cksum 0x83e5 (incorrect -> 0xe82c), seq 1585314924, win 29200, options [mss 1460,sackOK,TS val 3216341732 ecr 0,nop,wscale 7], length 0
15:04:09.026510 IP (tos 0x0, ttl 64, id 12670, offset 0, flags [DF], proto TCP (6), length 60)
192.168.1.61.53962 > 192.168.1.41.microsoft-ds: Flags [S], cksum 0x83e5 (incorrect -> 0xe00c), seq 1585314924, win 29200, options [mss 1460,sackOK,TS val 3216343812 ecr 0,nop,wscale 7], length 0
15:04:10.946505 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.41 tell 192.168.1.61, length 28
15:04:10.946845 IP (tos 0x0, ttl 64, id 35082, offset 0, flags [DF], proto TCP (6), length 60)
192.168.1.61.56056 > 192.168.1.41.netbios-ssn: Flags [S], cksum 0x83e5 (incorrect -> 0x226f), seq 3288942082, win 29200, options [mss 1460,sackOK,TS val 3216345732 ecr 0,nop,wscale 7], length 0
15:04:11.986512 IP (tos 0x0, ttl 64, id 35083, offset 0, flags [DF], proto TCP (6), length 60)
192.168.1.61.56056 > 192.168.1.41.netbios-ssn: Flags [S], cksum 0x83e5 (incorrect -> 0x1e5f), seq 3288942082, win 29200, options [mss 1460,sackOK,TS val 3216346772 ecr 0,nop,wscale 7], length 0
15:04:14.066508 IP (tos 0x0, ttl 64, id 35084, offset 0, flags [DF], proto TCP (6), length 60)
192.168.1.61.56056 > 192.168.1.41.netbios-ssn: Flags [S], cksum 0x83e5 (incorrect -> 0x163f), seq 3288942082, win 29200, options [mss 1460,sackOK,TS val 3216348852 ecr 0,nop,wscale 7], length 0
[Edit 2]
sudo tcpdump -vv -n -i eth0 src 192.168.1.61 and dst 192.168.1.41 > test.txt
15:28:55.935088 IP (tos 0x0, ttl 64, id 45163, offset 0, flags [DF], proto TCP (6), length 60)
192.168.1.61.53978 > 192.168.1.41.445: Flags [S], cksum 0x83e5 (incorrect -> 0x0ad1), seq 3695747953, win 29200, options [mss 1460,sackOK,TS val 3217830729 ecr 0,nop,wscale 7], length 0
15:28:56.946498 IP (tos 0x0, ttl 64, id 45164, offset 0, flags [DF], proto TCP (6), length 60)
192.168.1.61.53978 > 192.168.1.41.445: Flags [S], cksum 0x83e5 (incorrect -> 0x06dd), seq 3695747953, win 29200, options [mss 1460,sackOK,TS val 3217831741 ecr 0,nop,wscale 7], length 0
15:28:59.026501 IP (tos 0x0, ttl 64, id 45165, offset 0, flags [DF], proto TCP (6), length 60)
192.168.1.61.53978 > 192.168.1.41.445: Flags [S], cksum 0x83e5 (incorrect -> 0xfebc), seq 3695747953, win 29200, options [mss 1460,sackOK,TS val 3217833821 ecr 0,nop,wscale 7], length 0
15:29:00.946495 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.41 tell 192.168.1.61, length 28
15:29:00.946794 IP (tos 0x0, ttl 64, id 49594, offset 0, flags [DF], proto TCP (6), length 60)
192.168.1.61.56072 > 192.168.1.41.139: Flags [S], cksum 0x83e5 (incorrect -> 0x5238), seq 1226364074, win 29200, options [mss 1460,sackOK,TS val 3217835741 ecr 0,nop,wscale 7], length 0
15:29:01.986504 IP (tos 0x0, ttl 64, id 49595, offset 0, flags [DF], proto TCP (6), length 60)
192.168.1.61.56072 > 192.168.1.41.139: Flags [S], cksum 0x83e5 (incorrect -> 0x4e28), seq 1226364074, win 29200, options [mss 1460,sackOK,TS val 3217836781 ecr 0,nop,wscale 7], length 0
15:29:04.066502 IP (tos 0x0, ttl 64, id 49596, offset 0, flags [DF], proto TCP (6), length 60)
192.168.1.61.56072 > 192.168.1.41.139: Flags [S], cksum 0x83e5 (incorrect -> 0x4608), seq 1226364074, win 29200, options [mss 1460,sackOK,TS val 3217838861 ecr 0,nop,wscale 7], length 0
Dernière modification par bertaudmarc (09-04-2019 23:43:28)