Windows 10 network discovery doesn't detect Ubuntu servers

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP








up vote
0
down vote

favorite












Win 10 Network Discovery isn't picking up my Ubuntu servers anymore. It was working up until a few months ago. All my Win10 systems see eachother. My Ubuntu servers can see eachother. But there is no Ubuntu<->Win10 going on.



The truly maddening thing is that I can see the NBT session request/responses on the server side.



I can still access the shares manually, they just don't show up in "Network".



testparm



# testparm -s
Load smb config files from /etc/samba/smb.conf
rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
WARNING: The "syslog" option is deprecated
Processing section "[printers]"
Processing section "[print$]"
Loaded services file OK.
Server role: ROLE_STANDALONE

# Global parameters
[global]
server string = %h server (Samba, Ubuntu)
server role = standalone server
map to guest = Bad User
obey pam restrictions = Yes
pam password change = Yes
passwd program = /usr/bin/passwd %u
passwd chat = *Entersnews*spassword:* %nn *Retypesnews*spassword:* %nn *passwordsupdatedssuccessfully* .
unix password sync = Yes
syslog = 0
log file = /var/log/samba/log.%m
max log size = 1000
dns proxy = No
usershare allow guests = Yes
panic action = /usr/share/samba/panic-action %d
idmap config * : backend = tdb


[printers]
comment = All Printers
path = /var/spool/samba
create mask = 0700
printable = Yes
browseable = No


[print$]
comment = Printer Drivers
path = /var/lib/samba/printers


usershare



# net usershare info myfolder
[myfolder]
path=/myfolder
comment=
usershare_acl=Everyone:F,
guest_ok=y


TCPdump



192.168.1.215 = Windows 10



192.168.1.4 = Ubuntu 16.04



tcpdump -v -n 'port 137 || 138 || 139 || 445 || 5353' 
14:44:52.366620 IP (tos 0x0, ttl 128, id 29684, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.215.10025 > 192.168.1.4.139: Flags [S], cksum 0xdf73 (correct), seq 1146332280, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
14:44:52.366661 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.4.139 > 192.168.1.215.10025: Flags [S.], cksum 0x50b2 (correct), seq 3495053119, ack 1146332281, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
14:44:52.368519 IP (tos 0x0, ttl 128, id 29685, offset 0, flags [DF], proto TCP (6), length 112)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0x8b68 (correct), seq 1:73, ack 1, win 256, length 72 NBT Session Packet: Session Request
14:44:52.368564 IP (tos 0x0, ttl 64, id 41745, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.4.139 > 192.168.1.215.10025: Flags [.], cksum 0x0268 (correct), ack 73, win 229, length 0
14:44:52.370587 IP (tos 0x0, ttl 64, id 41746, offset 0, flags [DF], proto TCP (6), length 44)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x805b (correct), seq 1:5, ack 73, win 229, length 4 NBT Session Packet: Session Granted
14:44:52.371766 IP (tos 0x0, ttl 128, id 29688, offset 0, flags [DF], proto TCP (6), length 113)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xcae3 (correct), seq 73:146, ack 5, win 256, length 73 NBT Session Packet: Session Message
14:44:52.375416 IP (tos 0x0, ttl 64, id 41747, offset 0, flags [DF], proto TCP (6), length 246)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0xf320 (correct), seq 5:211, ack 146, win 229, length 206 NBT Session Packet: Session Message
14:44:52.376385 IP (tos 0x0, ttl 128, id 29690, offset 0, flags [DF], proto TCP (6), length 218)
192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xf64e (correct), seq 146:324, ack 211, win 255, length 178 NBT Session Packet: Session Message
14:44:52.376601 IP (tos 0x0, ttl 64, id 41748, offset 0, flags [DF], proto TCP (6), length 312)
192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x6e56 (correct), seq 211:483, ack 324, win 237, length 272 NBT Session Packet: Session Message
14:44:52.377579 IP (tos 0x0, ttl 128, id 29691, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.215.10025 > 192.168.1.4.139: Flags [F.], cksum 0xff70 (correct), seq 324, ack 483, win 254, length 0
14:44:52.380775 IP (tos 0x0, ttl 64, id 41749, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.4.139 > 192.168.1.215.10025: Flags [F.], cksum 0xff80 (correct), seq 483, ack 325, win 237, length 0
14:44:52.381585 IP (tos 0x0, ttl 128, id 29694, offset 0, flags [DF], proto TCP (6), length 40)
192.168.1.215.10025 > 192.168.1.4.139: Flags [.], cksum 0xff6f (correct), ack 484, win 254, length 0
14:44:54.359518 IP (tos 0x0, ttl 128, id 17492, offset 0, flags [none], proto UDP (17), length 202)
192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
14:44:54.359541 IP (tos 0x0, ttl 128, id 17493, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:54.359640 IP (tos 0x0, ttl 64, id 23821, offset 0, flags [DF], proto UDP (17), length 210)
192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
14:44:55.068278 IP (tos 0x0, ttl 128, id 17495, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:55.759031 IP (tos 0x0, ttl 128, id 17497, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:57.135012 IP (tos 0x0, ttl 128, id 17504, offset 0, flags [none], proto UDP (17), length 202)
192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
14:44:57.135046 IP (tos 0x0, ttl 128, id 17505, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:57.135157 IP (tos 0x0, ttl 64, id 24435, offset 0, flags [DF], proto UDP (17), length 210)
192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
14:44:57.885119 IP (tos 0x0, ttl 128, id 17507, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
14:44:58.638794 IP (tos 0x0, ttl 128, id 17509, offset 0, flags [none], proto UDP (17), length 78)
192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST









share|improve this question

























    up vote
    0
    down vote

    favorite












    Win 10 Network Discovery isn't picking up my Ubuntu servers anymore. It was working up until a few months ago. All my Win10 systems see eachother. My Ubuntu servers can see eachother. But there is no Ubuntu<->Win10 going on.



    The truly maddening thing is that I can see the NBT session request/responses on the server side.



    I can still access the shares manually, they just don't show up in "Network".



    testparm



    # testparm -s
    Load smb config files from /etc/samba/smb.conf
    rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
    WARNING: The "syslog" option is deprecated
    Processing section "[printers]"
    Processing section "[print$]"
    Loaded services file OK.
    Server role: ROLE_STANDALONE

    # Global parameters
    [global]
    server string = %h server (Samba, Ubuntu)
    server role = standalone server
    map to guest = Bad User
    obey pam restrictions = Yes
    pam password change = Yes
    passwd program = /usr/bin/passwd %u
    passwd chat = *Entersnews*spassword:* %nn *Retypesnews*spassword:* %nn *passwordsupdatedssuccessfully* .
    unix password sync = Yes
    syslog = 0
    log file = /var/log/samba/log.%m
    max log size = 1000
    dns proxy = No
    usershare allow guests = Yes
    panic action = /usr/share/samba/panic-action %d
    idmap config * : backend = tdb


    [printers]
    comment = All Printers
    path = /var/spool/samba
    create mask = 0700
    printable = Yes
    browseable = No


    [print$]
    comment = Printer Drivers
    path = /var/lib/samba/printers


    usershare



    # net usershare info myfolder
    [myfolder]
    path=/myfolder
    comment=
    usershare_acl=Everyone:F,
    guest_ok=y


    TCPdump



    192.168.1.215 = Windows 10



    192.168.1.4 = Ubuntu 16.04



    tcpdump -v -n 'port 137 || 138 || 139 || 445 || 5353' 
    14:44:52.366620 IP (tos 0x0, ttl 128, id 29684, offset 0, flags [DF], proto TCP (6), length 52)
    192.168.1.215.10025 > 192.168.1.4.139: Flags [S], cksum 0xdf73 (correct), seq 1146332280, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
    14:44:52.366661 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    192.168.1.4.139 > 192.168.1.215.10025: Flags [S.], cksum 0x50b2 (correct), seq 3495053119, ack 1146332281, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
    14:44:52.368519 IP (tos 0x0, ttl 128, id 29685, offset 0, flags [DF], proto TCP (6), length 112)
    192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0x8b68 (correct), seq 1:73, ack 1, win 256, length 72 NBT Session Packet: Session Request
    14:44:52.368564 IP (tos 0x0, ttl 64, id 41745, offset 0, flags [DF], proto TCP (6), length 40)
    192.168.1.4.139 > 192.168.1.215.10025: Flags [.], cksum 0x0268 (correct), ack 73, win 229, length 0
    14:44:52.370587 IP (tos 0x0, ttl 64, id 41746, offset 0, flags [DF], proto TCP (6), length 44)
    192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x805b (correct), seq 1:5, ack 73, win 229, length 4 NBT Session Packet: Session Granted
    14:44:52.371766 IP (tos 0x0, ttl 128, id 29688, offset 0, flags [DF], proto TCP (6), length 113)
    192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xcae3 (correct), seq 73:146, ack 5, win 256, length 73 NBT Session Packet: Session Message
    14:44:52.375416 IP (tos 0x0, ttl 64, id 41747, offset 0, flags [DF], proto TCP (6), length 246)
    192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0xf320 (correct), seq 5:211, ack 146, win 229, length 206 NBT Session Packet: Session Message
    14:44:52.376385 IP (tos 0x0, ttl 128, id 29690, offset 0, flags [DF], proto TCP (6), length 218)
    192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xf64e (correct), seq 146:324, ack 211, win 255, length 178 NBT Session Packet: Session Message
    14:44:52.376601 IP (tos 0x0, ttl 64, id 41748, offset 0, flags [DF], proto TCP (6), length 312)
    192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x6e56 (correct), seq 211:483, ack 324, win 237, length 272 NBT Session Packet: Session Message
    14:44:52.377579 IP (tos 0x0, ttl 128, id 29691, offset 0, flags [DF], proto TCP (6), length 40)
    192.168.1.215.10025 > 192.168.1.4.139: Flags [F.], cksum 0xff70 (correct), seq 324, ack 483, win 254, length 0
    14:44:52.380775 IP (tos 0x0, ttl 64, id 41749, offset 0, flags [DF], proto TCP (6), length 40)
    192.168.1.4.139 > 192.168.1.215.10025: Flags [F.], cksum 0xff80 (correct), seq 483, ack 325, win 237, length 0
    14:44:52.381585 IP (tos 0x0, ttl 128, id 29694, offset 0, flags [DF], proto TCP (6), length 40)
    192.168.1.215.10025 > 192.168.1.4.139: Flags [.], cksum 0xff6f (correct), ack 484, win 254, length 0
    14:44:54.359518 IP (tos 0x0, ttl 128, id 17492, offset 0, flags [none], proto UDP (17), length 202)
    192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
    14:44:54.359541 IP (tos 0x0, ttl 128, id 17493, offset 0, flags [none], proto UDP (17), length 78)
    192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
    14:44:54.359640 IP (tos 0x0, ttl 64, id 23821, offset 0, flags [DF], proto UDP (17), length 210)
    192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
    14:44:55.068278 IP (tos 0x0, ttl 128, id 17495, offset 0, flags [none], proto UDP (17), length 78)
    192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
    14:44:55.759031 IP (tos 0x0, ttl 128, id 17497, offset 0, flags [none], proto UDP (17), length 78)
    192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
    14:44:57.135012 IP (tos 0x0, ttl 128, id 17504, offset 0, flags [none], proto UDP (17), length 202)
    192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
    14:44:57.135046 IP (tos 0x0, ttl 128, id 17505, offset 0, flags [none], proto UDP (17), length 78)
    192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
    14:44:57.135157 IP (tos 0x0, ttl 64, id 24435, offset 0, flags [DF], proto UDP (17), length 210)
    192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
    14:44:57.885119 IP (tos 0x0, ttl 128, id 17507, offset 0, flags [none], proto UDP (17), length 78)
    192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
    14:44:58.638794 IP (tos 0x0, ttl 128, id 17509, offset 0, flags [none], proto UDP (17), length 78)
    192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST









    share|improve this question























      up vote
      0
      down vote

      favorite









      up vote
      0
      down vote

      favorite











      Win 10 Network Discovery isn't picking up my Ubuntu servers anymore. It was working up until a few months ago. All my Win10 systems see eachother. My Ubuntu servers can see eachother. But there is no Ubuntu<->Win10 going on.



      The truly maddening thing is that I can see the NBT session request/responses on the server side.



      I can still access the shares manually, they just don't show up in "Network".



      testparm



      # testparm -s
      Load smb config files from /etc/samba/smb.conf
      rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
      WARNING: The "syslog" option is deprecated
      Processing section "[printers]"
      Processing section "[print$]"
      Loaded services file OK.
      Server role: ROLE_STANDALONE

      # Global parameters
      [global]
      server string = %h server (Samba, Ubuntu)
      server role = standalone server
      map to guest = Bad User
      obey pam restrictions = Yes
      pam password change = Yes
      passwd program = /usr/bin/passwd %u
      passwd chat = *Entersnews*spassword:* %nn *Retypesnews*spassword:* %nn *passwordsupdatedssuccessfully* .
      unix password sync = Yes
      syslog = 0
      log file = /var/log/samba/log.%m
      max log size = 1000
      dns proxy = No
      usershare allow guests = Yes
      panic action = /usr/share/samba/panic-action %d
      idmap config * : backend = tdb


      [printers]
      comment = All Printers
      path = /var/spool/samba
      create mask = 0700
      printable = Yes
      browseable = No


      [print$]
      comment = Printer Drivers
      path = /var/lib/samba/printers


      usershare



      # net usershare info myfolder
      [myfolder]
      path=/myfolder
      comment=
      usershare_acl=Everyone:F,
      guest_ok=y


      TCPdump



      192.168.1.215 = Windows 10



      192.168.1.4 = Ubuntu 16.04



      tcpdump -v -n 'port 137 || 138 || 139 || 445 || 5353' 
      14:44:52.366620 IP (tos 0x0, ttl 128, id 29684, offset 0, flags [DF], proto TCP (6), length 52)
      192.168.1.215.10025 > 192.168.1.4.139: Flags [S], cksum 0xdf73 (correct), seq 1146332280, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
      14:44:52.366661 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
      192.168.1.4.139 > 192.168.1.215.10025: Flags [S.], cksum 0x50b2 (correct), seq 3495053119, ack 1146332281, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
      14:44:52.368519 IP (tos 0x0, ttl 128, id 29685, offset 0, flags [DF], proto TCP (6), length 112)
      192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0x8b68 (correct), seq 1:73, ack 1, win 256, length 72 NBT Session Packet: Session Request
      14:44:52.368564 IP (tos 0x0, ttl 64, id 41745, offset 0, flags [DF], proto TCP (6), length 40)
      192.168.1.4.139 > 192.168.1.215.10025: Flags [.], cksum 0x0268 (correct), ack 73, win 229, length 0
      14:44:52.370587 IP (tos 0x0, ttl 64, id 41746, offset 0, flags [DF], proto TCP (6), length 44)
      192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x805b (correct), seq 1:5, ack 73, win 229, length 4 NBT Session Packet: Session Granted
      14:44:52.371766 IP (tos 0x0, ttl 128, id 29688, offset 0, flags [DF], proto TCP (6), length 113)
      192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xcae3 (correct), seq 73:146, ack 5, win 256, length 73 NBT Session Packet: Session Message
      14:44:52.375416 IP (tos 0x0, ttl 64, id 41747, offset 0, flags [DF], proto TCP (6), length 246)
      192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0xf320 (correct), seq 5:211, ack 146, win 229, length 206 NBT Session Packet: Session Message
      14:44:52.376385 IP (tos 0x0, ttl 128, id 29690, offset 0, flags [DF], proto TCP (6), length 218)
      192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xf64e (correct), seq 146:324, ack 211, win 255, length 178 NBT Session Packet: Session Message
      14:44:52.376601 IP (tos 0x0, ttl 64, id 41748, offset 0, flags [DF], proto TCP (6), length 312)
      192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x6e56 (correct), seq 211:483, ack 324, win 237, length 272 NBT Session Packet: Session Message
      14:44:52.377579 IP (tos 0x0, ttl 128, id 29691, offset 0, flags [DF], proto TCP (6), length 40)
      192.168.1.215.10025 > 192.168.1.4.139: Flags [F.], cksum 0xff70 (correct), seq 324, ack 483, win 254, length 0
      14:44:52.380775 IP (tos 0x0, ttl 64, id 41749, offset 0, flags [DF], proto TCP (6), length 40)
      192.168.1.4.139 > 192.168.1.215.10025: Flags [F.], cksum 0xff80 (correct), seq 483, ack 325, win 237, length 0
      14:44:52.381585 IP (tos 0x0, ttl 128, id 29694, offset 0, flags [DF], proto TCP (6), length 40)
      192.168.1.215.10025 > 192.168.1.4.139: Flags [.], cksum 0xff6f (correct), ack 484, win 254, length 0
      14:44:54.359518 IP (tos 0x0, ttl 128, id 17492, offset 0, flags [none], proto UDP (17), length 202)
      192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
      14:44:54.359541 IP (tos 0x0, ttl 128, id 17493, offset 0, flags [none], proto UDP (17), length 78)
      192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
      14:44:54.359640 IP (tos 0x0, ttl 64, id 23821, offset 0, flags [DF], proto UDP (17), length 210)
      192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
      14:44:55.068278 IP (tos 0x0, ttl 128, id 17495, offset 0, flags [none], proto UDP (17), length 78)
      192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
      14:44:55.759031 IP (tos 0x0, ttl 128, id 17497, offset 0, flags [none], proto UDP (17), length 78)
      192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
      14:44:57.135012 IP (tos 0x0, ttl 128, id 17504, offset 0, flags [none], proto UDP (17), length 202)
      192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
      14:44:57.135046 IP (tos 0x0, ttl 128, id 17505, offset 0, flags [none], proto UDP (17), length 78)
      192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
      14:44:57.135157 IP (tos 0x0, ttl 64, id 24435, offset 0, flags [DF], proto UDP (17), length 210)
      192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
      14:44:57.885119 IP (tos 0x0, ttl 128, id 17507, offset 0, flags [none], proto UDP (17), length 78)
      192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
      14:44:58.638794 IP (tos 0x0, ttl 128, id 17509, offset 0, flags [none], proto UDP (17), length 78)
      192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST









      share|improve this question













      Win 10 Network Discovery isn't picking up my Ubuntu servers anymore. It was working up until a few months ago. All my Win10 systems see eachother. My Ubuntu servers can see eachother. But there is no Ubuntu<->Win10 going on.



      The truly maddening thing is that I can see the NBT session request/responses on the server side.



      I can still access the shares manually, they just don't show up in "Network".



      testparm



      # testparm -s
      Load smb config files from /etc/samba/smb.conf
      rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384)
      WARNING: The "syslog" option is deprecated
      Processing section "[printers]"
      Processing section "[print$]"
      Loaded services file OK.
      Server role: ROLE_STANDALONE

      # Global parameters
      [global]
      server string = %h server (Samba, Ubuntu)
      server role = standalone server
      map to guest = Bad User
      obey pam restrictions = Yes
      pam password change = Yes
      passwd program = /usr/bin/passwd %u
      passwd chat = *Entersnews*spassword:* %nn *Retypesnews*spassword:* %nn *passwordsupdatedssuccessfully* .
      unix password sync = Yes
      syslog = 0
      log file = /var/log/samba/log.%m
      max log size = 1000
      dns proxy = No
      usershare allow guests = Yes
      panic action = /usr/share/samba/panic-action %d
      idmap config * : backend = tdb


      [printers]
      comment = All Printers
      path = /var/spool/samba
      create mask = 0700
      printable = Yes
      browseable = No


      [print$]
      comment = Printer Drivers
      path = /var/lib/samba/printers


      usershare



      # net usershare info myfolder
      [myfolder]
      path=/myfolder
      comment=
      usershare_acl=Everyone:F,
      guest_ok=y


      TCPdump



      192.168.1.215 = Windows 10



      192.168.1.4 = Ubuntu 16.04



      tcpdump -v -n 'port 137 || 138 || 139 || 445 || 5353' 
      14:44:52.366620 IP (tos 0x0, ttl 128, id 29684, offset 0, flags [DF], proto TCP (6), length 52)
      192.168.1.215.10025 > 192.168.1.4.139: Flags [S], cksum 0xdf73 (correct), seq 1146332280, win 64240, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
      14:44:52.366661 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
      192.168.1.4.139 > 192.168.1.215.10025: Flags [S.], cksum 0x50b2 (correct), seq 3495053119, ack 1146332281, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
      14:44:52.368519 IP (tos 0x0, ttl 128, id 29685, offset 0, flags [DF], proto TCP (6), length 112)
      192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0x8b68 (correct), seq 1:73, ack 1, win 256, length 72 NBT Session Packet: Session Request
      14:44:52.368564 IP (tos 0x0, ttl 64, id 41745, offset 0, flags [DF], proto TCP (6), length 40)
      192.168.1.4.139 > 192.168.1.215.10025: Flags [.], cksum 0x0268 (correct), ack 73, win 229, length 0
      14:44:52.370587 IP (tos 0x0, ttl 64, id 41746, offset 0, flags [DF], proto TCP (6), length 44)
      192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x805b (correct), seq 1:5, ack 73, win 229, length 4 NBT Session Packet: Session Granted
      14:44:52.371766 IP (tos 0x0, ttl 128, id 29688, offset 0, flags [DF], proto TCP (6), length 113)
      192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xcae3 (correct), seq 73:146, ack 5, win 256, length 73 NBT Session Packet: Session Message
      14:44:52.375416 IP (tos 0x0, ttl 64, id 41747, offset 0, flags [DF], proto TCP (6), length 246)
      192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0xf320 (correct), seq 5:211, ack 146, win 229, length 206 NBT Session Packet: Session Message
      14:44:52.376385 IP (tos 0x0, ttl 128, id 29690, offset 0, flags [DF], proto TCP (6), length 218)
      192.168.1.215.10025 > 192.168.1.4.139: Flags [P.], cksum 0xf64e (correct), seq 146:324, ack 211, win 255, length 178 NBT Session Packet: Session Message
      14:44:52.376601 IP (tos 0x0, ttl 64, id 41748, offset 0, flags [DF], proto TCP (6), length 312)
      192.168.1.4.139 > 192.168.1.215.10025: Flags [P.], cksum 0x6e56 (correct), seq 211:483, ack 324, win 237, length 272 NBT Session Packet: Session Message
      14:44:52.377579 IP (tos 0x0, ttl 128, id 29691, offset 0, flags [DF], proto TCP (6), length 40)
      192.168.1.215.10025 > 192.168.1.4.139: Flags [F.], cksum 0xff70 (correct), seq 324, ack 483, win 254, length 0
      14:44:52.380775 IP (tos 0x0, ttl 64, id 41749, offset 0, flags [DF], proto TCP (6), length 40)
      192.168.1.4.139 > 192.168.1.215.10025: Flags [F.], cksum 0xff80 (correct), seq 483, ack 325, win 237, length 0
      14:44:52.381585 IP (tos 0x0, ttl 128, id 29694, offset 0, flags [DF], proto TCP (6), length 40)
      192.168.1.215.10025 > 192.168.1.4.139: Flags [.], cksum 0xff6f (correct), ack 484, win 254, length 0
      14:44:54.359518 IP (tos 0x0, ttl 128, id 17492, offset 0, flags [none], proto UDP (17), length 202)
      192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
      14:44:54.359541 IP (tos 0x0, ttl 128, id 17493, offset 0, flags [none], proto UDP (17), length 78)
      192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
      14:44:54.359640 IP (tos 0x0, ttl 64, id 23821, offset 0, flags [DF], proto UDP (17), length 210)
      192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
      14:44:55.068278 IP (tos 0x0, ttl 128, id 17495, offset 0, flags [none], proto UDP (17), length 78)
      192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
      14:44:55.759031 IP (tos 0x0, ttl 128, id 17497, offset 0, flags [none], proto UDP (17), length 78)
      192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
      14:44:57.135012 IP (tos 0x0, ttl 128, id 17504, offset 0, flags [none], proto UDP (17), length 202)
      192.168.1.215.138 > 192.168.1.255.138: NBT UDP PACKET(138)
      14:44:57.135046 IP (tos 0x0, ttl 128, id 17505, offset 0, flags [none], proto UDP (17), length 78)
      192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
      14:44:57.135157 IP (tos 0x0, ttl 64, id 24435, offset 0, flags [DF], proto UDP (17), length 210)
      192.168.1.4.138 > 192.168.1.215.138: NBT UDP PACKET(138)
      14:44:57.885119 IP (tos 0x0, ttl 128, id 17507, offset 0, flags [none], proto UDP (17), length 78)
      192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
      14:44:58.638794 IP (tos 0x0, ttl 128, id 17509, offset 0, flags [none], proto UDP (17), length 78)
      192.168.1.215.137 > 192.168.1.255.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST






      networking server samba






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Apr 9 at 15:58









      CIAduck

      11




      11

























          active

          oldest

          votes











          Your Answer







          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "89"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          convertImagesToLinks: true,
          noModals: false,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













           

          draft saved


          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1023381%2fwindows-10-network-discovery-doesnt-detect-ubuntu-servers%23new-answer', 'question_page');

          );

          Post as a guest



































          active

          oldest

          votes













          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes















           

          draft saved


          draft discarded















































           


          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1023381%2fwindows-10-network-discovery-doesnt-detect-ubuntu-servers%23new-answer', 'question_page');

          );

          Post as a guest













































































          Popular posts from this blog

          pylint3 and pip3 broken

          Missing snmpget and snmpwalk

          How to enroll fingerprints to Ubuntu 17.10 with VFS491