ich habe mal das Log-Level am samba hoch gesetzt. Beim Versuch com Scanner auf das Share zu schreieben finde ich dort:
sesssetupX:name=[peka.lan]\[scanner]@[192.168.100.31]
attempting to make a user_info for scanner (scanner)
making strings for scanner's user_info struct
making blobs for scanner's user_info struct
made a user_info for scanner (scanner)
auth_check_password_send: Checking password for unmapped user [peka.lan]\[scanner]@[192.168.100.31]
auth_check_password_send: user is: [peka.lan]\[scanner]@[192.168.100.31]
expr: (&(sAMAccountName=scanner)(objectclass=user))
dn: <GUID=f860e742-673c-4c7b-8981-66aea0a0a5bc>;<SID=S-1-5-21-629818648-978642449-4272356126-1135>;CN=scanner,CN=Users,DC=peka,DC=lan
sAMAccountName: scanner
userPrincipalName: scanner@PEKA.LAN
ntlm_password_check: NTLMv1 passwords NOT PERMITTED for user scanner
ntlm_password_check: Lanman passwords NOT PERMITTED for user scanner
ntlm_password_check: LM password and LMv2 failed for user scanner, and NT MD4 password in LM field not permitted
Not updating badPwdCount on CN=scanner,CN=Users,DC=peka,DC=lan after wrong password
auth_check_password_recv: sam authentication for user [peka.lan\scanner] FAILED with error NT_STATUS_WRONG_PASSWORD, authoritative=1
Auth: [SMB,bare-NTLM] user [peka.lan]\[scanner] at [So, 26 Aug 2018 09:30:58.027226 CEST] with [NTLMv1] status [NT_STATUS_WRONG_PASSWORD] workstation [192.168.100.31] remote host [ipv4:192.168.100.31:35742] mapped to [peka.lan]\[scanner]. local host [ipv4:192.168.100.11:445]
JSON Authentication: {"timestamp": "2018-08-26T09:30:58.027303+0200", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 0}, "status": "NT_STATUS_WRONG_PASSWORD", "localAddress": "ipv4:192.168.100.11:445", "remoteAddress": "ipv4:192.168.100.31:35742", "serviceDescription": "SMB", "authDescription": "bare-NTLM", "clientDomain": "peka.lan", "clientAccount": "scanner", "workstation": "192.168.100.31", "becameAccount": null, "becameDomain": null, "becameSid": "(NULL SID)", "mappedAccount": "scanner", "mappedDomain": "peka.lan", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": "(NULL SID)", "passwordType": "NTLMv1"}}
Wirklich schalu werde ich daraus jedoch nicht.