Trying to run rpcclient -k localhost -c dsroledominfo on my oes11 PDC,
I get this:

INFO: Current debug levels:
all: True/10
tdb: False/0
printdrivers: False/0
lanman: False/0
smb: False/0
rpc_parse: False/0
rpc_srv: False/0
rpc_cli: False/0
passdb: False/0
sam: False/0
auth: False/0
winbind: False/0
vfs: False/0
idmap: False/0
quota: False/0
acls: False/0
locking: False/0
msdfs: False/0
dmapi: False/0
registry: False/0
pm_process() returned Yes
lp_servicenumber: couldn't find homes
set_server_role: role = ROLE_DOMAIN_PDC
Attempting to register new charset UCS-2LE
Registered charset UCS-2LE
Attempting to register new charset UTF-16LE
Registered charset UTF-16LE
Attempting to register new charset UCS-2BE
Registered charset UCS-2BE
Attempting to register new charset UTF-16BE
Registered charset UTF-16BE
Attempting to register new charset UTF8
Registered charset UTF8
Attempting to register new charset UTF-8
Registered charset UTF-8
Attempting to register new charset ASCII
Registered charset ASCII
Attempting to register new charset 646
Registered charset 646
Attempting to register new charset ISO-8859-1
Registered charset ISO-8859-1
Attempting to register new charset UCS2-HEX
Registered charset UCS2-HEX
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Connecting to host=localhost
Opening cache file at /var/lib/samba/gencache.tdb
Returning valid cache entry: key = AD_SITENAME/DOMAIN/CCG.NET, value =
Default-First-Site-Name, timeout = Mon Jan 18 20:14:07 2038
sitename_fetch: Returning sitename for CCG.NET:
"Default-First-Site-Name"
internal_resolve_name: looking up localhost#20 (sitename
Default-First-Site-Name)
Returning valid cache entry: key = NBT/LOCALHOST#20, value =
127.0.0.1:0, timeout = Fri Sep 21 13:28:45 2012
name localhost#20 found.
s3_event: Added timed event "tevent_req_timedout": 0x7fe85cfed5d0
s3_event: Added timed event "tevent_req_timedout": 0x7fe85cfedba0
Running timed event "tevent_req_timedout" 0x7fe85cfed5d0
s3_event: Destroying timer event 0x7fe85cfed5d0 "tevent_req_timedout"
s3_event: Added timed event "tevent_req_timedout": 0x7fe85cfed5d0
Connecting to 127.0.0.1 at port 445
s3_event: Added timed event "tevent_req_timedout": 0x7fe85cfee4a0
s3_event: Destroying timer event 0x7fe85cfee4a0 "tevent_req_timedout"
s3_event: Destroying timer event 0x7fe85cfed5d0 "tevent_req_timedout"
Socket options:
SO_KEEPALIVE = 0
SO_REUSEADDR = 0
SO_BROADCAST = 0
TCP_NODELAY = 1
TCP_KEEPCNT = 9
TCP_KEEPIDLE = 7200
TCP_KEEPINTVL = 75
IPTOS_LOWDELAY = 0
IPTOS_THROUGHPUT = 0
SO_SNDBUF = 50844
SO_RCVBUF = 87712
SO_SNDLOWAT = 1
SO_RCVLOWAT = 1
SO_SNDTIMEO = 0
SO_RCVTIMEO = 0
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
Substituting charset 'UTF-8' for LOCALE
cli_chain_cork: mid=1
handle_incoming_pdu: got mid 1
Doing spnego session setup (blob length=105)
got OID=1.2.840.113554.1.2.2
got OID=1.2.840.48018.1.2.2
got OID=1.3.6.1.4.1.311.2.2.10
got principal=cifs/ccg-ads2.ccg.net@CCG.NET
Doing kerberos session setup
ads_cleanup_expired_creds: Ticket in ccache[FILE:/tmp/krb5cc_0]
expiration Fri, 21 Sep 2012 23:22:55 MDT
ads_krb5_mk_req: Ticket (cifs/ccg-ads2.ccg.net@CCG.NET) in ccache
(FILE:/tmp/krb5cc_0) is valid until: (Fri, 21 Sep 2012 23:22:55 MDT -
1348291375)
ads_krb5_mk_req: server marked as OK to delegate to, building
forwardable TGT
ads_krb5_get_fwd_ticket: krb5_fwd_tgt_creds failed (KDC can't fulfill
requested option)
ads_krb5_get_fwd_ticket failed (KDC can't fulfill requested option)
Got KRB5 session key of length 16
cli_session_setup_blob: Remaining (0) sending (1360) current (1360)
write_socket(4,1446)
write_socket(4,1446) wrote 1446
got smb length of 272
size=272
smb_com=0x73
smb_rcls=0
smb_reh=0
smb_err=0
smb_flg=136
smb_flg2=51205
smb_tid=0
smb_pid=7863
smb_uid=101
smb_mid=2
smt_wct=4
smb_vwv[ 0]= 255 (0xFF)
smb_vwv[ 1]= 0 (0x0)
smb_vwv[ 2]= 0 (0x0)
smb_vwv[ 3]= 153 (0x99)
smb_bcc=229
[0000] A1 81 96 30 81 93 A0 03 0A 01 00 A1 0B 06 09 2A ...0....
........*
[0010] 86 48 82 F7 12 01 02 02 A2 7F 04 7D 60 7B 06 09 .H......
....}`{..
[0020] 2A 86 48 86 F7 12 01 02 02 02 00 6F 6C 30 6A A0 *.H.....
....ol0j.
[0030] 03 02 01 05 A1 03 02 01 0F A2 5E 30 5C A0 03 02 ........
...^0\...
[0040] 01 17 A2 55 04 53 1A 15 B5 8A F1 62 40 42 72 72 ...U.S..
....b@Brr
[0050] 4E 5A 83 40 39 A6 AB A7 30 05 B6 AF FC 98 6A 65 NZ.@9...
0.....je
[0060] B7 A3 46 3C 5F 3C 28 FB BB 6D 0C 2A 66 38 91 76 ..F<_<(.
..m.*f8.v
[0070] DC 68 5F 06 80 3B 2E B9 A4 93 7B C5 C3 A7 11 DB .h_..;..
...{.....
[0080] 04 7D C8 6D 97 86 AB 52 66 46 78 23 02 47 9A 78 .}.m...R
fFx#.G.x
[0090] 17 0B 81 AE 73 05 CF 02 27 55 00 6E 00 69 00 78 ....s...
'U.n.i.x
[00A0] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m
..b.a. .3
[00B0] 00 2E 00 34 00 2E 00 33 00 2D 00 32 00 35 00 30 ...4...3
..-.2.5.0
[00C0] 00 30 00 2D 00 53 00 55 00 53 00 45 00 2D 00 43 .0.-.S.U
..S.E.-.C
[00D0] 00 4F 00 44 00 45 00 31 00 31 00 00 00 43 00 43 .O.D.E.1
..1...C.C
[00E0] 00 47 00 00 00 .G...
size=272
smb_com=0x73
smb_rcls=0
smb_reh=0
smb_err=0
smb_flg=136
smb_flg2=51205
smb_tid=0
smb_pid=7863
smb_uid=101
smb_mid=2
smt_wct=4
smb_vwv[ 0]= 255 (0xFF)
smb_vwv[ 1]= 0 (0x0)
smb_vwv[ 2]= 0 (0x0)
smb_vwv[ 3]= 153 (0x99)
smb_bcc=229
[0000] A1 81 96 30 81 93 A0 03 0A 01 00 A1 0B 06 09 2A ...0....
........*
[0010] 86 48 82 F7 12 01 02 02 A2 7F 04 7D 60 7B 06 09 .H......
....}`{..
[0020] 2A 86 48 86 F7 12 01 02 02 02 00 6F 6C 30 6A A0 *.H.....
....ol0j.
[0030] 03 02 01 05 A1 03 02 01 0F A2 5E 30 5C A0 03 02 ........
...^0\...
[0040] 01 17 A2 55 04 53 1A 15 B5 8A F1 62 40 42 72 72 ...U.S..
....b@Brr
[0050] 4E 5A 83 40 39 A6 AB A7 30 05 B6 AF FC 98 6A 65 NZ.@9...
0.....je
[0060] B7 A3 46 3C 5F 3C 28 FB BB 6D 0C 2A 66 38 91 76 ..F<_<(.
..m.*f8.v
[0070] DC 68 5F 06 80 3B 2E B9 A4 93 7B C5 C3 A7 11 DB .h_..;..
...{.....
[0080] 04 7D C8 6D 97 86 AB 52 66 46 78 23 02 47 9A 78 .}.m...R
fFx#.G.x
[0090] 17 0B 81 AE 73 05 CF 02 27 55 00 6E 00 69 00 78 ....s...
'U.n.i.x
[00A0] 00 00 00 53 00 61 00 6D 00 62 00 61 00 20 00 33 ...S.a.m
..b.a. .3
[00B0] 00 2E 00 34 00 2E 00 33 00 2D 00 32 00 35 00 30 ...4...3
..-.2.5.0
[00C0] 00 30 00 2D 00 53 00 55 00 53 00 45 00 2D 00 43 .0.-.S.U
..S.E.-.C
[00D0] 00 4F 00 44 00 45 00 31 00 31 00 00 00 43 00 43 .O.D.E.1
..1...C.C
[00E0] 00 47 00 00 00 .G...
SMB signing enabled!
cli_simple_set_signing: user_session_key
[0000] 31 79 64 BA 5B 43 AC 16 91 B5 84 1E 41 D7 E2 F8 1yd.[C..
.....A...
cli_simple_set_signing: NULL response_data
simple_packet_signature: sequence number 0
client_sign_outgoing_message: sent SMB signature of
[0000] A4 AD 12 DE 59 26 6F 77 ....Y&ow
store_sequence_for_reply: stored seq = 1 mid = 2
get_sequence_for_reply: found seq = 1 mid = 2
simple_packet_signature: sequence number 1
client_check_incoming_message: seq 1: got good SMB signature of
[0000] DB 85 A3 08 6F F1 C0 A1 ....o...
cli_chain_cork: mid=3
simple_packet_signature: sequence number 2
client_sign_outgoing_message: sent SMB signature of
[0000] AC 33 34 0D 68 38 D7 30 .34.h8.0
store_sequence_for_reply: stored seq = 3 mid = 3
get_sequence_for_reply: found seq = 3 mid = 3
simple_packet_signature: sequence number 3
client_check_incoming_message: seq 3: got good SMB signature of
[0000] 5D 83 7E 54 22 F0 C5 B5 ].~T"...
handle_incoming_pdu: got mid 3
cli_init_creds: user root domain CCG
cli_chain_cork: mid=4
simple_packet_signature: sequence number 4
client_sign_outgoing_message: sent SMB signature of
[0000] 6E DF 9F F2 34 F0 A1 76 n...4..v
store_sequence_for_reply: stored seq = 5 mid = 4
get_sequence_for_reply: found seq = 5 mid = 4
simple_packet_signature: sequence number 5
client_check_incoming_message: seq 5: got good SMB signature of
[0000] 48 80 0A 01 29 84 1A FC H...)...
handle_incoming_pdu: got mid 4
Bind RPC Pipe: host localhost auth_type 0, auth_level 0
000000 smb_io_rpc_hdr hdr
0000 major : 05
0001 minor : 00
0002 pkt_type : 0b
0003 flags : 03
0004 pack_type0: 10
0005 pack_type1: 00
0006 pack_type2: 00
0007 pack_type3: 00
0008 frag_len : 0048
000a auth_len : 0000
000c call_id : 00000001
000010 smb_io_rpc_hdr_rb
000010 smb_io_rpc_hdr_bba
0010 max_tsize: 10b8
0012 max_rsize: 10b8
0014 assoc_gid: 00000000
0018 num_contexts: 01
001c context_id : 0000
001e num_transfer_syntaxes: 01
00001f smb_io_rpc_iface
000020 smb_io_uuid uuid
0020 data : 12345778
0024 data : 1234
0026 data : abcd
0028 data : ef 00
002a data : 01 23 45 67 89 ab
0030 version: 00000000
000034 smb_io_rpc_iface
000034 smb_io_uuid uuid
0034 data : 8a885d04
0038 data : 1ceb
003a data : 11c9
003c data : 9f e8
003e data : 08 00 2b 10 48 60
0044 version: 00000002
rpc_api_pipe: host localhost
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0,
data_total=72, this_data=72, max_data=4280, param_offset=82,
param_disp=0, data_disp=0
cli_chain_cork: mid=5
simple_packet_signature: sequence number 6
client_sign_outgoing_message: sent SMB signature of
[0000] C8 C9 3D 32 44 AC DB A1 ..=2D...
store_sequence_for_reply: stored seq = 7 mid = 5
get_sequence_for_reply: found seq = 7 mid = 5
simple_packet_signature: sequence number 7
client_check_incoming_message: seq 7: got good SMB signature of
[0000] A8 EB 9C 88 55 01 6E 53 ....U.nS
handle_incoming_pdu: got mid 5
get_sequence_for_reply: found seq = 7 mid = 5
000000 smb_io_rpc_hdr rpc_hdr
0000 major : 05
0001 minor : 00
0002 pkt_type : 0c
0003 flags : 03
0004 pack_type0: 10
0005 pack_type1: 00
0006 pack_type2: 00
0007 pack_type3: 00
0008 frag_len : 0048
000a auth_len : 0000
000c call_id : 00000001
s3_event: Added timed event "async_trigger": 0x7fe85cfeba70
Running timed event "async_trigger" 0x7fe85cfeba70
s3_event: Destroying timer event 0x7fe85cfeba70 "async_trigger"
rpc_api_pipe: got frag len of 72 at offset 0: NT_STATUS_OK
rpc_api_pipe: host localhost returned 72 bytes.
000000 smb_io_rpc_hdr hdr
0000 major : 05
0001 minor : 00
0002 pkt_type : 0c
0003 flags : 03
0004 pack_type0: 10
0005 pack_type1: 00
0006 pack_type2: 00
0007 pack_type3: 00
0008 frag_len : 0048
000a auth_len : 0000
000c call_id : 00000001
000010 smb_io_rpc_hdr_ba
000010 smb_io_rpc_hdr_bba
0010 max_tsize: 1000
0012 max_rsize: 1000
0014 assoc_gid: 0006902a
000018 smb_io_rpc_addr_str
0018 len: 0010
001a str: \PIPE\np\lsarpc.
00002a smb_io_rpc_results
002c num_results: 01
0030 result : 0000
0032 reason : 0000
000034 smb_io_rpc_iface
000034 smb_io_uuid uuid
0034 data : 8a885d04
0038 data : 1ceb
003a data : 11c9
003c data : 9f e8
003e data : 08 00 2b 10 48 60
0044 version: 00000002
check_bind_response: accepted!
cli_rpc_pipe_open_noauth: opened pipe \lsarpc to machine localhost and
bound anonymously.
lsa_OpenPolicy: struct lsa_OpenPolicy
in: struct lsa_OpenPolicy
system_name : *
system_name : 0x005c (92)
attr : *
attr: struct lsa_ObjectAttribute
len : 0x00000018 (24)
root_dir : NULL
object_name : NULL
attributes : 0x00000000 (0)
sec_desc : NULL
sec_qos : *
sec_qos: struct lsa_QosInfo
len : 0x0000000c (12)
impersonation_level : 0x0002 (2)
context_mode : 0x01 (1)
effective_only : 0x00 (0)
access_mask : 0x02000000 (33554432)
0: LSA_POLICY_VIEW_LOCAL_INFORMATION
0: LSA_POLICY_VIEW_AUDIT_INFORMATION
0: LSA_POLICY_GET_PRIVATE_INFORMATION
0: LSA_POLICY_TRUST_ADMIN
0: LSA_POLICY_CREATE_ACCOUNT
0: LSA_POLICY_CREATE_SECRET
0: LSA_POLICY_CREATE_PRIVILEGE
0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS
0: LSA_POLICY_SET_AUDIT_REQUIREMENTS
0: LSA_POLICY_AUDIT_LOG_ADMIN
0: LSA_POLICY_SERVER_ADMIN
0: LSA_POLICY_LOOKUP_NAMES
0: LSA_POLICY_NOTIFICATION
000000 smb_io_rpc_hdr hdr
0000 major : 05
0001 minor : 00
0002 pkt_type : 00
0003 flags : 03
0004 pack_type0: 10
0005 pack_type1: 00
0006 pack_type2: 00
0007 pack_type3: 00
0008 frag_len : 0044
000a auth_len : 0000
000c call_id : 00000002
000010 smb_io_rpc_hdr_req hdr_req
0010 alloc_hint: 0000002c
0014 context_id: 0000
0016 opnum : 0006
rpc_api_pipe: host localhost
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0,
data_total=68, this_data=68, max_data=4096, param_offset=82,
param_disp=0, data_disp=0
cli_chain_cork: mid=6
simple_packet_signature: sequence number 8
client_sign_outgoing_message: sent SMB signature of
[0000] 9E 42 AC 95 19 32 EF D1 .B...2..
store_sequence_for_reply: stored seq = 9 mid = 6
get_sequence_for_reply: found seq = 9 mid = 6
simple_packet_signature: sequence number 9
client_check_incoming_message: seq 9: got good SMB signature of
[0000] 77 C0 FE 5F 84 42 B8 82 w.._.B..
handle_incoming_pdu: got mid 6
get_sequence_for_reply: found seq = 9 mid = 6
000000 smb_io_rpc_hdr rpc_hdr
0000 major : 05
0001 minor : 00
0002 pkt_type : 02
0003 flags : 03
0004 pack_type0: 10
0005 pack_type1: 00
0006 pack_type2: 00
0007 pack_type3: 00
0008 frag_len : 0030
000a auth_len : 0000
000c call_id : 00000002
s3_event: Added timed event "async_trigger": 0x7fe85cfeef30
Running timed event "async_trigger" 0x7fe85cfeef30
s3_event: Destroying timer event 0x7fe85cfeef30 "async_trigger"
000010 smb_io_rpc_hdr_resp rpc_hdr_resp
0010 alloc_hint: 00000018
0014 context_id: 0000
0016 cancel_ct : 00
0017 reserved : 00
cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0
rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK
rpc_api_pipe: host localhost returned 48 bytes.
lsa_OpenPolicy: struct lsa_OpenPolicy
out: struct lsa_OpenPolicy
handle : *
handle: struct policy_handle
handle_type : 0x00000000 (0)
uuid :
20ee34d0-0422-11e2-86d5-005056896f14
result : NT_STATUS_OK
lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy
in: struct lsa_QueryInfoPolicy
handle : *
handle: struct policy_handle
handle_type : 0x00000000 (0)
uuid :
20ee34d0-0422-11e2-86d5-005056896f14
level : LSA_POLICY_INFO_ACCOUNT_DOMAIN
(5)
000000 smb_io_rpc_hdr hdr
0000 major : 05
0001 minor : 00
0002 pkt_type : 00
0003 flags : 03
0004 pack_type0: 10
0005 pack_type1: 00
0006 pack_type2: 00
0007 pack_type3: 00
0008 frag_len : 002e
000a auth_len : 0000
000c call_id : 00000003
000010 smb_io_rpc_hdr_req hdr_req
0010 alloc_hint: 00000016
0014 context_id: 0000
0016 opnum : 0007
rpc_api_pipe: host localhost
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0,
data_total=46, this_data=46, max_data=4096, param_offset=82,
param_disp=0, data_disp=0
cli_chain_cork: mid=7
simple_packet_signature: sequence number 10
client_sign_outgoing_message: sent SMB signature of
[0000] CE F1 81 51 4E FC 6E 24 ...QN.n$
store_sequence_for_reply: stored seq = 11 mid = 7
get_sequence_for_reply: found seq = 11 mid = 7
simple_packet_signature: sequence number 11
client_check_incoming_message: seq 11: got good SMB signature of
[0000] 21 B8 C5 79 36 B9 1F B0 !..y6...
handle_incoming_pdu: got mid 7
get_sequence_for_reply: found seq = 11 mid = 7
000000 smb_io_rpc_hdr rpc_hdr
0000 major : 05
0001 minor : 00
0002 pkt_type : 02
0003 flags : 03
0004 pack_type0: 10
0005 pack_type1: 00
0006 pack_type2: 00
0007 pack_type3: 00
0008 frag_len : 0060
000a auth_len : 0000
000c call_id : 00000003
s3_event: Added timed event "async_trigger": 0x7fe85cfeefb0
Running timed event "async_trigger" 0x7fe85cfeefb0
s3_event: Destroying timer event 0x7fe85cfeefb0 "async_trigger"
000010 smb_io_rpc_hdr_resp rpc_hdr_resp
0010 alloc_hint: 00000048
0014 context_id: 0000
0016 cancel_ct : 00
0017 reserved : 00
cli_pipe_validate_current_pdu: got pdu len 96, data_len 72, ss_len 0
rpc_api_pipe: got frag len of 96 at offset 0: NT_STATUS_OK
rpc_api_pipe: host localhost returned 144 bytes.
lsa_QueryInfoPolicy: struct lsa_QueryInfoPolicy
out: struct lsa_QueryInfoPolicy
info : *
info : *
info : union
lsa_PolicyInformation(case 5)
account_domain: struct lsa_DomainInfo
name: struct lsa_StringLarge
length : 0x0006 (6)
size : 0x0008 (8)
string : *
string : 'CCG'
sid : *
sid :
S-1-5-21-906795094-1342208956-299889277
result : NT_STATUS_OK
lsa_Close: struct lsa_Close
in: struct lsa_Close
handle : *
handle: struct policy_handle
handle_type : 0x00000000 (0)
uuid :
20ee34d0-0422-11e2-86d5-005056896f14
000000 smb_io_rpc_hdr hdr
0000 major : 05
0001 minor : 00
0002 pkt_type : 00
0003 flags : 03
0004 pack_type0: 10
0005 pack_type1: 00
0006 pack_type2: 00
0007 pack_type3: 00
0008 frag_len : 002c
000a auth_len : 0000
000c call_id : 00000004
000010 smb_io_rpc_hdr_req hdr_req
0010 alloc_hint: 00000014
0014 context_id: 0000
0016 opnum : 0000
rpc_api_pipe: host localhost
num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0,
data_total=44, this_data=44, max_data=4096, param_offset=82,
param_disp=0, data_disp=0
cli_chain_cork: mid=8
simple_packet_signature: sequence number 12
client_sign_outgoing_message: sent SMB signature of
[0000] 4D 2B 54 7F 4D AB 28 DA M+T.M.(.
store_sequence_for_reply: stored seq = 13 mid = 8
get_sequence_for_reply: found seq = 13 mid = 8
simple_packet_signature: sequence number 13
client_check_incoming_message: seq 13: got good SMB signature of
[0000] 94 24 D9 CE D0 12 84 3E .$.....>
handle_incoming_pdu: got mid 8
get_sequence_for_reply: found seq = 13 mid = 8
000000 smb_io_rpc_hdr rpc_hdr
0000 major : 05
0001 minor : 00
0002 pkt_type : 02
0003 flags : 03
0004 pack_type0: 10
0005 pack_type1: 00
0006 pack_type2: 00
0007 pack_type3: 00
0008 frag_len : 0030
000a auth_len : 0000
000c call_id : 00000004
s3_event: Added timed event "async_trigger": 0x7fe85cfeb540
Running timed event "async_trigger" 0x7fe85cfeb540
s3_event: Destroying timer event 0x7fe85cfeb540 "async_trigger"
000010 smb_io_rpc_hdr_resp rpc_hdr_resp
0010 alloc_hint: 00000018
0014 context_id: 0000
0016 cancel_ct : 00
0017 reserved : 00
cli_pipe_validate_current_pdu: got pdu len 48, data_len 24, ss_len 0
rpc_api_pipe: got frag len of 48 at offset 0: NT_STATUS_OK
rpc_api_pipe: host localhost returned 48 bytes.
lsa_Close: struct lsa_Close
out: struct lsa_Close
handle : *
handle: struct policy_handle
handle_type : 0x00000000 (0)
uuid :
00000000-0000-0000-0000-000000000000
result : NT_STATUS_OK
cli_chain_cork: mid=9
simple_packet_signature: sequence number 14
client_sign_outgoing_message: sent SMB signature of
[0000] 0F 7F 04 EB 9F 23 F7 8C .....#..
store_sequence_for_reply: stored seq = 15 mid = 9
get_sequence_for_reply: found seq = 15 mid = 9
simple_packet_signature: sequence number 15
client_check_incoming_message: seq 15: got good SMB signature of
[0000] 25 A9 C3 D4 8A C4 4D 6A %.....Mj
handle_incoming_pdu: got mid 9
rpc_pipe_destructor: closed \lsarpc
cli_chain_cork: mid=10
simple_packet_signature: sequence number 16
client_sign_outgoing_message: sent SMB signature of
[0000] CF 69 6D 3F EC 6E 57 60 .im?.nW`
store_sequence_for_reply: stored seq = 17 mid = 10
get_sequence_for_reply: found seq = 17 mid = 10
simple_packet_signature: sequence number 17
client_check_incoming_message: seq 17: got good SMB signature of
[0000] C4 12 67 60 EF 0D B6 E8 ..g`....
handle_incoming_pdu: got mid 10
Bind RPC Pipe: host localhost auth_type 0, auth_level 0
000000 smb_io_rpc_hdr hdr
0000 major : 05
0001 minor : 00
0002 pkt_type : 0b
0003 flags : 03
0004 pack_type0: 10
0005 pack_type1: 00
0006 pack_type2: 00
0007 pack_type3: 00
0008 frag_len : 0048
000a auth_len : 0000
000c call_id : 00000005
000010 smb_io_rpc_hdr_rb
000010 smb_io_rpc_hdr_bba
0010 max_tsize: 10b8
0012 max_rsize: 10b8
0014 assoc_gid: 00000000
0018 num_contexts: 01
001c context_id : 0000
001e num_transfer_syntaxes: 01
00001f smb_io_rpc_iface
000020 smb_io_uuid uuid
0020 data : 3919286a
0024 data : b10c
0026 data : 11d0
0028 data : 9b a8


That's only part of the output, not the 'normal' output the
documentation says.

Suggestions?

--
Stevo