Windows 10 network discovery doesn't detect Ubuntu servers
![Creative The name of the picture](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO9GURib1T8z7lCwjOGLQaGtrueEthgQ8LO42ZX8cOfTqDK4jvDDpKkLFwf2J49kYCMNW7d4ABih_XCb_2UXdq5fPJDkoyg7-8g_YfRUot-XnaXkNYycsNp7lA5_TW9td0FFpLQ2APzKcZ/s1600/1.jpg)
![Creative The name of the picture](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYQ0N5W1qAOxLP7t7iOM6O6AzbZnkXUy16s7P_CWfOb5UbTQY_aDsc727chyphenhyphen5W4IppVNernMMQeaUFTB_rFzAd95_CDt-tnwN-nBx6JyUp2duGjPaL5-VgNO41AVsA_vu30EJcipdDG409/s400/Clash+Royale+CLAN+TAG%2523URR8PPP.png)
up vote
0
down vote
favorite
Win 10 Network Discovery isn't picking up my Ubuntu servers anymore. It was working up until a few months ago. All my Win10 systems see eachother. My Ubuntu servers can see eachother. But there is no Ubuntu<->Win10 going on.
The truly maddening thing is that I can see the NBT session request/responses on the server side.
I can still access the shares manually, they just don't show up in "Network".
testparm
# testparm -s
Load smb config files from /etc/samba/smb.conf
rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
WARNING: The "syslog" option is deprecated
Processing section "[printers]"
Processing section "[print$]"
Loaded services file OK.
Server role: ROLE_STANDALONE
# Global parameters
[global]
server string = %h server (Samba, Ubuntu)
server role = standalone server
map to guest = Bad User
obey pam restrictions = Yes
pam password change = Yes
passwd program = /usr/bin/passwd %u
passwd chat = *Entersnews*spassword:* %nn *Retypesnews*spassword:* %nn *passwordsupdatedssuccessfully* .
unix password sync = Yes
syslog = 0
log file = /var/log/samba/log.%m
max log size = 1000
dns proxy = No
usershare allow guests = Yes
panic action = /usr/share/samba/panic-action %d
idmap config * : backend = tdb
[printers]
comment = All Printers
path = /var/spool/samba
create mask = 0700
printable = Yes
browseable = No
[print$]
comment = Printer Drivers
path = /var/lib/samba/printers
usershare
# net usershare info myfolder
[myfolder]
path=/myfolder
comment=
usershare_acl=Everyone:F,
guest_ok=y
TCPdump
192.168.1.215 = Windows 10
192.168.1.4 = Ubuntu 16.04
tcpdump -v -n 'port 137 || 138 || 139 || 445 || 5353'
14:44:52.366620 IP (tos 0x0, ttl 128, id 29684, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.215.10025 > 192.168.1.4.139: Flags [S], cksum 0xdf73 (correct), seq 1146332280, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
14:44:52.366661 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.4.139 > 192.168.1.215.10025: Flags [S.], cksum 0x50b2 (correct), seq 3495053119, ack 1146332281, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
14:44:52.368519 IP (tos 0x0, ttl 128, id 29685, offset 0, flags [DF], proto TCP (6), length 112)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0x8b68 (correct), seq 1:73, ack 1, win 256, length 72 NBT Session Packet: Session Request
14:44:52.368564 IP (tos 0x0, ttl 64, id 41745, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.4.139 > 192.168.1.215.10025: Flags [.], cksum 0x0268 (correct), ack 73, win 229, length 0
14:44:52.370587 IP (tos 0x0, ttl 64, id 41746, offset 0, flags [DF], proto TCP (6), length 44)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x805b (correct), seq 1:5, ack 73, win 229, length 4 NBT Session Packet: Session Granted
14:44:52.371766 IP (tos 0x0, ttl 128, id 29688, offset 0, flags [DF], proto TCP (6), length 113)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xcae3 (correct), seq 73:146, ack 5, win 256, length 73 NBT Session Packet: Session Message
14:44:52.375416 IP (tos 0x0, ttl 64, id 41747, offset 0, flags [DF], proto TCP (6), length 246)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0xf320 (correct), seq 5:211, ack 146, win 229, length 206 NBT Session Packet: Session Message
14:44:52.376385 IP (tos 0x0, ttl 128, id 29690, offset 0, flags [DF], proto TCP (6), length 218)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xf64e (correct), seq 146:324, ack 211, win 255, length 178 NBT Session Packet: Session Message
14:44:52.376601 IP (tos 0x0, ttl 64, id 41748, offset 0, flags [DF], proto TCP (6), length 312)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x6e56 (correct), seq 211:483, ack 324, win 237, length 272 NBT Session Packet: Session Message
14:44:52.377579 IP (tos 0x0, ttl 128, id 29691, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.215.10025 > 192.168.1.4.139: Flags [F.], cksum 0xff70 (correct), seq 324, ack 483, win 254, length 0
14:44:52.380775 IP (tos 0x0, ttl 64, id 41749, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.4.139 > 192.168.1.215.10025: Flags [F.], cksum 0xff80 (correct), seq 483, ack 325, win 237, length 0
14:44:52.381585 IP (tos 0x0, ttl 128, id 29694, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.215.10025 > 192.168.1.4.139: Flags [.], cksum 0xff6f (correct), ack 484, win 254, length 0
14:44:54.359518 IP (tos 0x0, ttl 128, id 17492, offset 0, flags [none], proto UDP (17), length 202)
192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
14:44:54.359541 IP (tos 0x0, ttl 128, id 17493, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:54.359640 IP (tos 0x0, ttl 64, id 23821, offset 0, flags [DF], proto UDP (17), length 210)
192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
14:44:55.068278 IP (tos 0x0, ttl 128, id 17495, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:55.759031 IP (tos 0x0, ttl 128, id 17497, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:57.135012 IP (tos 0x0, ttl 128, id 17504, offset 0, flags [none], proto UDP (17), length 202)
192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
14:44:57.135046 IP (tos 0x0, ttl 128, id 17505, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:57.135157 IP (tos 0x0, ttl 64, id 24435, offset 0, flags [DF], proto UDP (17), length 210)
192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
14:44:57.885119 IP (tos 0x0, ttl 128, id 17507, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:58.638794 IP (tos 0x0, ttl 128, id 17509, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
networking server samba
add a comment |Â
up vote
0
down vote
favorite
Win 10 Network Discovery isn't picking up my Ubuntu servers anymore. It was working up until a few months ago. All my Win10 systems see eachother. My Ubuntu servers can see eachother. But there is no Ubuntu<->Win10 going on.
The truly maddening thing is that I can see the NBT session request/responses on the server side.
I can still access the shares manually, they just don't show up in "Network".
testparm
# testparm -s
Load smb config files from /etc/samba/smb.conf
rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
WARNING: The "syslog" option is deprecated
Processing section "[printers]"
Processing section "[print$]"
Loaded services file OK.
Server role: ROLE_STANDALONE
# Global parameters
[global]
server string = %h server (Samba, Ubuntu)
server role = standalone server
map to guest = Bad User
obey pam restrictions = Yes
pam password change = Yes
passwd program = /usr/bin/passwd %u
passwd chat = *Entersnews*spassword:* %nn *Retypesnews*spassword:* %nn *passwordsupdatedssuccessfully* .
unix password sync = Yes
syslog = 0
log file = /var/log/samba/log.%m
max log size = 1000
dns proxy = No
usershare allow guests = Yes
panic action = /usr/share/samba/panic-action %d
idmap config * : backend = tdb
[printers]
comment = All Printers
path = /var/spool/samba
create mask = 0700
printable = Yes
browseable = No
[print$]
comment = Printer Drivers
path = /var/lib/samba/printers
usershare
# net usershare info myfolder
[myfolder]
path=/myfolder
comment=
usershare_acl=Everyone:F,
guest_ok=y
TCPdump
192.168.1.215 = Windows 10
192.168.1.4 = Ubuntu 16.04
tcpdump -v -n 'port 137 || 138 || 139 || 445 || 5353'
14:44:52.366620 IP (tos 0x0, ttl 128, id 29684, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.215.10025 > 192.168.1.4.139: Flags [S], cksum 0xdf73 (correct), seq 1146332280, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
14:44:52.366661 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.4.139 > 192.168.1.215.10025: Flags [S.], cksum 0x50b2 (correct), seq 3495053119, ack 1146332281, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
14:44:52.368519 IP (tos 0x0, ttl 128, id 29685, offset 0, flags [DF], proto TCP (6), length 112)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0x8b68 (correct), seq 1:73, ack 1, win 256, length 72 NBT Session Packet: Session Request
14:44:52.368564 IP (tos 0x0, ttl 64, id 41745, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.4.139 > 192.168.1.215.10025: Flags [.], cksum 0x0268 (correct), ack 73, win 229, length 0
14:44:52.370587 IP (tos 0x0, ttl 64, id 41746, offset 0, flags [DF], proto TCP (6), length 44)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x805b (correct), seq 1:5, ack 73, win 229, length 4 NBT Session Packet: Session Granted
14:44:52.371766 IP (tos 0x0, ttl 128, id 29688, offset 0, flags [DF], proto TCP (6), length 113)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xcae3 (correct), seq 73:146, ack 5, win 256, length 73 NBT Session Packet: Session Message
14:44:52.375416 IP (tos 0x0, ttl 64, id 41747, offset 0, flags [DF], proto TCP (6), length 246)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0xf320 (correct), seq 5:211, ack 146, win 229, length 206 NBT Session Packet: Session Message
14:44:52.376385 IP (tos 0x0, ttl 128, id 29690, offset 0, flags [DF], proto TCP (6), length 218)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xf64e (correct), seq 146:324, ack 211, win 255, length 178 NBT Session Packet: Session Message
14:44:52.376601 IP (tos 0x0, ttl 64, id 41748, offset 0, flags [DF], proto TCP (6), length 312)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x6e56 (correct), seq 211:483, ack 324, win 237, length 272 NBT Session Packet: Session Message
14:44:52.377579 IP (tos 0x0, ttl 128, id 29691, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.215.10025 > 192.168.1.4.139: Flags [F.], cksum 0xff70 (correct), seq 324, ack 483, win 254, length 0
14:44:52.380775 IP (tos 0x0, ttl 64, id 41749, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.4.139 > 192.168.1.215.10025: Flags [F.], cksum 0xff80 (correct), seq 483, ack 325, win 237, length 0
14:44:52.381585 IP (tos 0x0, ttl 128, id 29694, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.215.10025 > 192.168.1.4.139: Flags [.], cksum 0xff6f (correct), ack 484, win 254, length 0
14:44:54.359518 IP (tos 0x0, ttl 128, id 17492, offset 0, flags [none], proto UDP (17), length 202)
192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
14:44:54.359541 IP (tos 0x0, ttl 128, id 17493, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:54.359640 IP (tos 0x0, ttl 64, id 23821, offset 0, flags [DF], proto UDP (17), length 210)
192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
14:44:55.068278 IP (tos 0x0, ttl 128, id 17495, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:55.759031 IP (tos 0x0, ttl 128, id 17497, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:57.135012 IP (tos 0x0, ttl 128, id 17504, offset 0, flags [none], proto UDP (17), length 202)
192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
14:44:57.135046 IP (tos 0x0, ttl 128, id 17505, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:57.135157 IP (tos 0x0, ttl 64, id 24435, offset 0, flags [DF], proto UDP (17), length 210)
192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
14:44:57.885119 IP (tos 0x0, ttl 128, id 17507, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:58.638794 IP (tos 0x0, ttl 128, id 17509, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
networking server samba
add a comment |Â
up vote
0
down vote
favorite
up vote
0
down vote
favorite
Win 10 Network Discovery isn't picking up my Ubuntu servers anymore. It was working up until a few months ago. All my Win10 systems see eachother. My Ubuntu servers can see eachother. But there is no Ubuntu<->Win10 going on.
The truly maddening thing is that I can see the NBT session request/responses on the server side.
I can still access the shares manually, they just don't show up in "Network".
testparm
# testparm -s
Load smb config files from /etc/samba/smb.conf
rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
WARNING: The "syslog" option is deprecated
Processing section "[printers]"
Processing section "[print$]"
Loaded services file OK.
Server role: ROLE_STANDALONE
# Global parameters
[global]
server string = %h server (Samba, Ubuntu)
server role = standalone server
map to guest = Bad User
obey pam restrictions = Yes
pam password change = Yes
passwd program = /usr/bin/passwd %u
passwd chat = *Entersnews*spassword:* %nn *Retypesnews*spassword:* %nn *passwordsupdatedssuccessfully* .
unix password sync = Yes
syslog = 0
log file = /var/log/samba/log.%m
max log size = 1000
dns proxy = No
usershare allow guests = Yes
panic action = /usr/share/samba/panic-action %d
idmap config * : backend = tdb
[printers]
comment = All Printers
path = /var/spool/samba
create mask = 0700
printable = Yes
browseable = No
[print$]
comment = Printer Drivers
path = /var/lib/samba/printers
usershare
# net usershare info myfolder
[myfolder]
path=/myfolder
comment=
usershare_acl=Everyone:F,
guest_ok=y
TCPdump
192.168.1.215 = Windows 10
192.168.1.4 = Ubuntu 16.04
tcpdump -v -n 'port 137 || 138 || 139 || 445 || 5353'
14:44:52.366620 IP (tos 0x0, ttl 128, id 29684, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.215.10025 > 192.168.1.4.139: Flags [S], cksum 0xdf73 (correct), seq 1146332280, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
14:44:52.366661 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.4.139 > 192.168.1.215.10025: Flags [S.], cksum 0x50b2 (correct), seq 3495053119, ack 1146332281, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
14:44:52.368519 IP (tos 0x0, ttl 128, id 29685, offset 0, flags [DF], proto TCP (6), length 112)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0x8b68 (correct), seq 1:73, ack 1, win 256, length 72 NBT Session Packet: Session Request
14:44:52.368564 IP (tos 0x0, ttl 64, id 41745, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.4.139 > 192.168.1.215.10025: Flags [.], cksum 0x0268 (correct), ack 73, win 229, length 0
14:44:52.370587 IP (tos 0x0, ttl 64, id 41746, offset 0, flags [DF], proto TCP (6), length 44)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x805b (correct), seq 1:5, ack 73, win 229, length 4 NBT Session Packet: Session Granted
14:44:52.371766 IP (tos 0x0, ttl 128, id 29688, offset 0, flags [DF], proto TCP (6), length 113)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xcae3 (correct), seq 73:146, ack 5, win 256, length 73 NBT Session Packet: Session Message
14:44:52.375416 IP (tos 0x0, ttl 64, id 41747, offset 0, flags [DF], proto TCP (6), length 246)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0xf320 (correct), seq 5:211, ack 146, win 229, length 206 NBT Session Packet: Session Message
14:44:52.376385 IP (tos 0x0, ttl 128, id 29690, offset 0, flags [DF], proto TCP (6), length 218)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xf64e (correct), seq 146:324, ack 211, win 255, length 178 NBT Session Packet: Session Message
14:44:52.376601 IP (tos 0x0, ttl 64, id 41748, offset 0, flags [DF], proto TCP (6), length 312)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x6e56 (correct), seq 211:483, ack 324, win 237, length 272 NBT Session Packet: Session Message
14:44:52.377579 IP (tos 0x0, ttl 128, id 29691, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.215.10025 > 192.168.1.4.139: Flags [F.], cksum 0xff70 (correct), seq 324, ack 483, win 254, length 0
14:44:52.380775 IP (tos 0x0, ttl 64, id 41749, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.4.139 > 192.168.1.215.10025: Flags [F.], cksum 0xff80 (correct), seq 483, ack 325, win 237, length 0
14:44:52.381585 IP (tos 0x0, ttl 128, id 29694, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.215.10025 > 192.168.1.4.139: Flags [.], cksum 0xff6f (correct), ack 484, win 254, length 0
14:44:54.359518 IP (tos 0x0, ttl 128, id 17492, offset 0, flags [none], proto UDP (17), length 202)
192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
14:44:54.359541 IP (tos 0x0, ttl 128, id 17493, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:54.359640 IP (tos 0x0, ttl 64, id 23821, offset 0, flags [DF], proto UDP (17), length 210)
192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
14:44:55.068278 IP (tos 0x0, ttl 128, id 17495, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:55.759031 IP (tos 0x0, ttl 128, id 17497, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:57.135012 IP (tos 0x0, ttl 128, id 17504, offset 0, flags [none], proto UDP (17), length 202)
192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
14:44:57.135046 IP (tos 0x0, ttl 128, id 17505, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:57.135157 IP (tos 0x0, ttl 64, id 24435, offset 0, flags [DF], proto UDP (17), length 210)
192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
14:44:57.885119 IP (tos 0x0, ttl 128, id 17507, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:58.638794 IP (tos 0x0, ttl 128, id 17509, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
networking server samba
Win 10 Network Discovery isn't picking up my Ubuntu servers anymore. It was working up until a few months ago. All my Win10 systems see eachother. My Ubuntu servers can see eachother. But there is no Ubuntu<->Win10 going on.
The truly maddening thing is that I can see the NBT session request/responses on the server side.
I can still access the shares manually, they just don't show up in "Network".
testparm
# testparm -s
Load smb config files from /etc/samba/smb.conf
rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
WARNING: The "syslog" option is deprecated
Processing section "[printers]"
Processing section "[print$]"
Loaded services file OK.
Server role: ROLE_STANDALONE
# Global parameters
[global]
server string = %h server (Samba, Ubuntu)
server role = standalone server
map to guest = Bad User
obey pam restrictions = Yes
pam password change = Yes
passwd program = /usr/bin/passwd %u
passwd chat = *Entersnews*spassword:* %nn *Retypesnews*spassword:* %nn *passwordsupdatedssuccessfully* .
unix password sync = Yes
syslog = 0
log file = /var/log/samba/log.%m
max log size = 1000
dns proxy = No
usershare allow guests = Yes
panic action = /usr/share/samba/panic-action %d
idmap config * : backend = tdb
[printers]
comment = All Printers
path = /var/spool/samba
create mask = 0700
printable = Yes
browseable = No
[print$]
comment = Printer Drivers
path = /var/lib/samba/printers
usershare
# net usershare info myfolder
[myfolder]
path=/myfolder
comment=
usershare_acl=Everyone:F,
guest_ok=y
TCPdump
192.168.1.215 = Windows 10
192.168.1.4 = Ubuntu 16.04
tcpdump -v -n 'port 137 || 138 || 139 || 445 || 5353'
14:44:52.366620 IP (tos 0x0, ttl 128, id 29684, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.215.10025 > 192.168.1.4.139: Flags [S], cksum 0xdf73 (correct), seq 1146332280, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
14:44:52.366661 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.4.139 > 192.168.1.215.10025: Flags [S.], cksum 0x50b2 (correct), seq 3495053119, ack 1146332281, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
14:44:52.368519 IP (tos 0x0, ttl 128, id 29685, offset 0, flags [DF], proto TCP (6), length 112)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0x8b68 (correct), seq 1:73, ack 1, win 256, length 72 NBT Session Packet: Session Request
14:44:52.368564 IP (tos 0x0, ttl 64, id 41745, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.4.139 > 192.168.1.215.10025: Flags [.], cksum 0x0268 (correct), ack 73, win 229, length 0
14:44:52.370587 IP (tos 0x0, ttl 64, id 41746, offset 0, flags [DF], proto TCP (6), length 44)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x805b (correct), seq 1:5, ack 73, win 229, length 4 NBT Session Packet: Session Granted
14:44:52.371766 IP (tos 0x0, ttl 128, id 29688, offset 0, flags [DF], proto TCP (6), length 113)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xcae3 (correct), seq 73:146, ack 5, win 256, length 73 NBT Session Packet: Session Message
14:44:52.375416 IP (tos 0x0, ttl 64, id 41747, offset 0, flags [DF], proto TCP (6), length 246)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0xf320 (correct), seq 5:211, ack 146, win 229, length 206 NBT Session Packet: Session Message
14:44:52.376385 IP (tos 0x0, ttl 128, id 29690, offset 0, flags [DF], proto TCP (6), length 218)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xf64e (correct), seq 146:324, ack 211, win 255, length 178 NBT Session Packet: Session Message
14:44:52.376601 IP (tos 0x0, ttl 64, id 41748, offset 0, flags [DF], proto TCP (6), length 312)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x6e56 (correct), seq 211:483, ack 324, win 237, length 272 NBT Session Packet: Session Message
14:44:52.377579 IP (tos 0x0, ttl 128, id 29691, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.215.10025 > 192.168.1.4.139: Flags [F.], cksum 0xff70 (correct), seq 324, ack 483, win 254, length 0
14:44:52.380775 IP (tos 0x0, ttl 64, id 41749, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.4.139 > 192.168.1.215.10025: Flags [F.], cksum 0xff80 (correct), seq 483, ack 325, win 237, length 0
14:44:52.381585 IP (tos 0x0, ttl 128, id 29694, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.215.10025 > 192.168.1.4.139: Flags [.], cksum 0xff6f (correct), ack 484, win 254, length 0
14:44:54.359518 IP (tos 0x0, ttl 128, id 17492, offset 0, flags [none], proto UDP (17), length 202)
192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
14:44:54.359541 IP (tos 0x0, ttl 128, id 17493, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:54.359640 IP (tos 0x0, ttl 64, id 23821, offset 0, flags [DF], proto UDP (17), length 210)
192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
14:44:55.068278 IP (tos 0x0, ttl 128, id 17495, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:55.759031 IP (tos 0x0, ttl 128, id 17497, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:57.135012 IP (tos 0x0, ttl 128, id 17504, offset 0, flags [none], proto UDP (17), length 202)
192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
14:44:57.135046 IP (tos 0x0, ttl 128, id 17505, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:57.135157 IP (tos 0x0, ttl 64, id 24435, offset 0, flags [DF], proto UDP (17), length 210)
192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
14:44:57.885119 IP (tos 0x0, ttl 128, id 17507, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:58.638794 IP (tos 0x0, ttl 128, id 17509, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
networking server samba
networking server samba
asked Apr 9 at 15:58
CIAduck
11
11
add a comment |Â
add a comment |Â
active
oldest
votes
active
oldest
votes
active
oldest
votes
active
oldest
votes
active
oldest
votes
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1023381%2fwindows-10-network-discovery-doesnt-detect-ubuntu-servers%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password