Uploaded image for project: 'Service Packs and Hot Fixes'
  1. Service Packs and Hot Fixes
  2. MNT-7178

CIFS(SMB) will not bound to port 138 with Java socket based code under Linux and Mac OS X.

    Details

    • Type: Service Pack Request
    • Status: Closed
    • Resolution: Not a bug
    • Affects Version/s: 3.2
    • Fix Version/s: 4.0
    • Component/s: JLAN
    • Labels:
      None
    • Environment:
      MAC OSX
      RHEL
    • Bug Priority:
      Category 2
    • ACT Numbers:

      15024-17210

      Description

      CIFS(SMB) will not bound to port 138 with Java socket based code under Linux and Mac OS X.

      I captured the packet by TCPdump, which shows port 137 and 139 work, but not for port 138, as a result of this, SMB won't broadcast host HostAnnouncement(computer names) within a segment, thus browse list does not show the alfresco's host name.

          1. Captured packets from the Alfresco host to Mount host by TCPdump###

      sh-3.2# tcpdump -n dst 10.0.120.150

      tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
      listening on en0, link-type EN10MB (Ethernet), capture size 65535 bytes

      <!-- Port 137 works -->
      16:49:44.040237 IP 10.0.120.10.137 > 10.0.120.150.137: NBT UDP PACKET(137): QUERY; POSITIVE; RESPONSE; UNICAST

      <!-- Port 139 works-->
      16:57:57.287472 ARP, Reply 10.0.120.10 is-at 00:25:00:f9:63:96, length 28
      16:57:57.620420 IP 10.0.120.10.49495 > 10.0.120.150.139: Flags [S], seq 21838089, win 65535, options [mss 1460,nop,wscale 3,nop,nop,TS val 936067103 ecr 0,sackOK,eol], length 0
      16:57:57.620678 IP 10.0.120.10.49495 > 10.0.120.150.139: Flags [.], ack 3587094192, win 65535, options [nop,nop,TS val 936067103 ecr 0], length 0
      16:57:57.630873 IP 10.0.120.10.49495 > 10.0.120.150.139: Flags [P.], seq 0:72, ack 1, win 65535, options [nop,nop,TS val 936067103 ecr 0], length 72 NBT Session Packet: Session Request
      16:57:57.631168 IP 10.0.120.10.49495 > 10.0.120.150.139: Flags [.], ack 7, win 65535, options [nop,nop,TS val 936067103 ecr 1026374], length 0
      16:57:57.631375 IP 10.0.120.10.49495 > 10.0.120.150.139: Flags [F.], seq 72, ack 7, win 65535, options [nop,nop,TS val 936067103 ecr 1026374], length 0
      16:57:57.631552 IP 10.0.120.10.49496 > 10.0.120.150.139: Flags [S], seq 2612361747, win 65535, options [mss 1460,nop,wscale 3,nop,nop,TS val 936067103 ecr 0,sackOK,eol], length 0
      16:57:57.631706 IP 10.0.120.10.49496 > 10.0.120.150.139: Flags [.], ack 42224123, win 65535, options [nop,nop,TS val 936067103 ecr 0], length 0
      16:57:57.641705 IP 10.0.120.10.49496 > 10.0.120.150.139: Flags [P.], seq 0:72, ack 1, win 65535, options [nop,nop,TS val 936067104 ecr 0], length 72 NBT Session Packet: Session Request
      16:57:57.642001 IP 10.0.120.10.49496 > 10.0.120.150.139: Flags [.], ack 7, win 65535, options [nop,nop,TS val 936067104 ecr 1026374], length 0
      16:57:57.642122 IP 10.0.120.10.49496 > 10.0.120.150.139: Flags [F.], seq 72, ack 7, win 65535, options [nop,nop,TS val 936067104 ecr 1026374], length 0
      16:57:57.642513 IP 10.0.120.10.49497 > 10.0.120.150.139: Flags [S], seq 3939431200, win 65535, options [mss 1460,nop,wscale 3,nop,nop,TS val 936067104 ecr 0,sackOK,eol], length 0
      16:57:57.642657 IP 10.0.120.10.49497 > 10.0.120.150.139: Flags [.], ack 3724553678, win 65535, options [nop,nop,TS val 936067104 ecr 0], length 0
      16:57:57.652770 IP 10.0.120.10.49497 > 10.0.120.150.139: Flags [P.], seq 0:72, ack 1, win 65535, options [nop,nop,TS val 936067104 ecr 0], length 72 NBT Session Packet: Session Request
      16:57:57.653310 IP 10.0.120.10.49497 > 10.0.120.150.139: Flags [.], ack 7, win 65535, options [nop,nop,TS val 936067104 ecr 1026374], length 0
      16:57:57.653389 IP 10.0.120.10.49497 > 10.0.120.150.139: Flags [F.], seq 72, ack 7, win 65535, options [nop,nop,TS val 936067104 ecr 1026374], length 0
      16:58:27.058703 IP 10.0.120.10.139 > 10.0.120.150.1815: Flags [.], ack 626854275, win 65535, length 0
      16:58:27.065899 IP 10.0.120.10.139 > 10.0.120.150.1815: Flags [P.], seq 0:104, ack 1, win 65535, length 104 NBT Session Packet: Session Message
      16:58:27.066492 IP 10.0.120.10.139 > 10.0.120.150.1815: Flags [.], ack 91, win 65535, length 0
      16:58:27.100509 IP 10.0.120.10.139 > 10.0.120.150.1815: Flags [P.], seq 104:1072, ack 91, win 65535, length 968 NBT Session Packet: Session Message
      16:58:27.113479 IP 10.0.120.10.139 > 10.0.120.150.1815: Flags [.], ack 195, win 65535, length 0
      16:58:27.118946 IP 10.0.120.10.139 > 10.0.120.150.1815: Flags [P.], seq 1072:1111, ack 195, win 65535, length 39 NBT Session Packet: Session Message
      16:58:27.119712 IP 10.0.120.10.139 > 10.0.120.150.1815: Flags [.], ack 299, win 65535, length 0
      16:58:27.136714 IP 10.0.120.10.139 > 10.0.120.150.1815: Flags [P.], seq 1111:1150, ack 299, win 65535, length 39 NBT Session Packet: Session Message
      16:58:27.151097 IP 10.0.120.10.139 > 10.0.120.150.1815: Flags [.], ack 379, win 65535, length 0
      16:58:27.154667 IP 10.0.120.10.139 > 10.0.120.150.1815: Flags [P.], seq 1150:1254, ack 379, win 65535, length 104 NBT Session Packet: Session Message
      16:58:45.248639 ARP, Reply 10.0.120.14 is-at 00:23:6c:8c:73:c2, length 28
      16:58:45.262122 IP 10.0.120.14.57944 > 10.0.120.150.137: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST

        Attachments

          Structure

            Activity

              People

              • Assignee:
                closedissues Closed Issues
                Reporter:
                kkono Kazuyuki Kono
              • Votes:
                0 Vote for this issue
                Watchers:
                0 Start watching this issue

                Dates

                • Created:
                  Updated:
                  Resolved:

                  Structure Helper Panel