Hello,
I have a new external site which will be doing all imaging processes for us... SiteK. I have installed a Distribution point at this site KSTSCCMDP01.
I am testing the deployment of an image as I was doing previously in the office... I saw i n the smsts.log some access to old DPs.. VRPSCCMDP01 & VRPSCCMDP02. I have checked the boundaries of the new DP they are correct.
Resolving content for driver "Intel(R) 6th Generation Core Processor Family Platform I/O SATA AHCI Controller" OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
SMSTSPersistContent=''. The content 70FEBC51-A8DA-4000-AC1E-661AB7EA6C89 will be persisted OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Setting URL = https://VRPSCCMMS03.ad, Ports = 80,443, CRL = false OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Setting Server Certificates. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Setting Authenticator. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Site code: UCP OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
MP server: https://VRPSCCMMS03.ad OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Getting local network information. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
DHCP entry points already initialized. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Begin checking Alternate Network Configuration OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
spNamespace.Open(sNamespacePath), HRESULT=8004100e (..\CcmIPUtil.cpp,1113) OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Finished checking Alternate Network Configuration OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Adapter {84897092-7ED2-436C-90B4-1DF4C435A232} is DHCP enabled. Checking quarantine status. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Content location request (BGR): OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Package : 70FEBC51-A8DA-4000-AC1E-661AB7EA6C89.1 OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Client : GUID:4f6ece12-3aa3-495c-8a4d-284b71060e55 OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Current BG : true OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Neighbor BG : true OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Fallback to site default BG: true OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Peers allowed: 0 OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Internet : false OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Sending RequestBGRContentLocations for 70FEBC51-A8DA-4000-AC1E-661AB7EA6C89 OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Setting the authenticator. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
CLibSMSMessageWinHttpTransport::Send: WinHttpOpenRequest - URL: VRPSCCMMS03.ad:443 CCM_POST /ccm_system_AltAuth/request OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
SSL - using authenticator in request. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
In SSL, but with no client cert OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
In SSL, but with no media cert OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Request was successful. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
::DecompressBuffer(65536) OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Decompression (zlib) succeeded: original size 369, uncompressed size 1004. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Location Reply:
<![CDATA[<ContentLocationReply SchemaVersion="1.00" BGRVersion="1"><BoundaryGroups BoundaryGroupListRetrieveTime="2019-04-25T20:50:19.217"><BoundaryGroup GroupID="16777231" GroupGUID="0c9c4be8-35b0-4d74-bb84-c889159b121c" GroupFlag="0"/><BoundaryGroup GroupID="16777218" GroupGUID="4BC25ED7-EB27-4671-B8A8-682B713C12DB"/></BoundaryGroups><ContentInfo/><Sites><Site><MPSite SiteCode="UCP" MasterSiteCode="UCP" SiteLocality="FALLBACK"/><LocationRecords/></Site></Sites><RelatedContentIDs/></ContentLocationReply>]]> OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Processing 0 locations. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
No static content server. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
(LocationsList.size() + slistHttpPaths.size() + slistSMBPaths.size()) > 0, HRESULT=80040102 (..\resolvesource.cpp,2841) OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
GetBGRContentLocationsEx ( pszContentID, L"SMSUpdate", (LONG) dwContentVersion, sSiteCode, sMPServer, &oHttpTransport, sClientID, 0, mapNetworkAccess, 1, 1, 0, TS::Environment::SharedEnvironment.getValue(TS::EnvironmentVar::IsClientOnInternet).compare_no_case(L"true")==0?1:0, slstSMBPaths, slstHttpPaths, slstMulticastPaths, dwPackageFlags, sHash, dwHashAlgID ), HRESULT=80040102 (..\resolvesource.cpp,4297) OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
TS::Utility::ResolveSource( pContent->getContentId(), wcstoul(pContent->getContentVersion(), 0, 10), pContent->getContentHash(), wcstoul(pContent->getContentHashVersion(), 0, 10), sSource ), HRESULT=80040102 (onlinedrivercatalog.cpp,665) OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
pDriverCatalog->resolveSource( pDriver->getContent(), sSource ), HRESULT=80040102 (driverinstaller.cpp,802) OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Failed to resolve content for driver "Intel(R) 6th Generation Core Processor Family Platform I/O SATA AHCI Controller". Code 0x80040102 OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Unsuccessful in finding a suitable device driver for device 'USB Input Device'. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Unsuccessful in finding a suitable device driver for device 'PCI standard RAM Controller'. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Ranking compatible drivers for PCI Device OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
SCOPEID_67BB9074-421B-4166-A053-A8090F9523EF/DRIVER_AE7FAAC6F8540FFCCBB6475684407B06C0E104AC_1B9BC8A3CE73A46CBE20A31E887F9F4BE8A2D6559D2DE10E37433F85BBE806D6 (SMS Driver Rank = 0x2001) OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Driver "Intel(R) LPC Controller/eSPI Controller - A300" has already been installed. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Unsuccessful in finding a suitable device driver for device 'Trusted Platform Module 2.0'. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Ranking compatible drivers for PCI Serial Port OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
SCOPEID_67BB9074-421B-4166-A053-A8090F9523EF/DRIVER_32E6B4A1639E17E8EC215E1731A1D35A55D55611_5D0874485F543BBCDB7F1249EF7B8DDB934C075AED0B042023463A8611EE9597 (SMS Driver Rank = 0x0003) OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Preparing to install driver "Intel(R) Active Management Technology - SOL". OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Resolving content for driver "Intel(R) Active Management Technology - SOL" OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
SMSTSPersistContent=''. The content C94FF778-9C33-449F-ACD9-AF152DFDEC21 will be persisted OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Setting URL = https://VRPSCCMMS03.ad, Ports = 80,443, CRL = false OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Setting Server Certificates. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Setting Authenticator. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Site code: UCP OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
MP server: https://VRPSCCMMS03.ad OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Getting local network information. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
DHCP entry points already initialized. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Begin checking Alternate Network Configuration OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
spNamespace.Open(sNamespacePath), HRESULT=8004100e (..\CcmIPUtil.cpp,1113) OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Finished checking Alternate Network Configuration OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Adapter {84897092-7ED2-436C-90B4-1DF4C435A232} is DHCP enabled. Checking quarantine status. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Content location request (BGR): OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Package : C94FF778-9C33-449F-ACD9-AF152DFDEC21.1 OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Client : GUID:4f6ece12-3aa3-495c-8a4d-284b71060e55 OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Current BG : true OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Neighbor BG : true OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Fallback to site default BG: true OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Peers allowed: 0 OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Internet : false OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Sending RequestBGRContentLocations for C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Setting the authenticator. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
CLibSMSMessageWinHttpTransport::Send: WinHttpOpenRequest - URL: VRPSCCMMS03.ad:443 CCM_POST /ccm_system_AltAuth/request OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
SSL - using authenticator in request. OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
In SSL, but with no client cert OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
In SSL, but with no media cert OSDDriverClient 4/25/2019 1:50:26 PM 2156 (0x086C)
Request was successful. OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C)
::DecompressBuffer(65536) OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C)
Decompression (zlib) succeeded: original size 1116, uncompressed size 6644. OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C)Location Reply:<![CDATA[<ContentLocationReply SchemaVersion="1.00" BGRVersion="1" ContentFlags="0" HashAlgorithm="32780" AlgorithmPreference="4" Hash="5D0874485F543BBCDB7F1249EF7B8DDB934C075AED0B042023463A8611EE9597" ExcludeFileListHash="" RelatedContentID=""><BoundaryGroups BoundaryGroupListRetrieveTime="2019-04-25T20:50:19.670"><BoundaryGroup GroupID="16777231" GroupGUID="0c9c4be8-35b0-4d74-bb84-c889159b121c" GroupFlag="0"/><BoundaryGroup GroupID="16777218" GroupGUID="4BC25ED7-EB27-4671-B8A8-682B713C12DB"/></BoundaryGroups><ContentInfo PackageFlags="16777216" DeploymentFlags="9223373136366928882"><ContentHashValues><Hash Algorithm="32780" HashString="5D0874485F543BBCDB7F1249EF7B8DDB934C075AED0B042023463A8611EE9597" HashPreference="4"/></ContentHashValues></ContentInfo><Sites><Site><MPSite SiteCode="UCP" MasterSiteCode="UCP" SiteLocality="LOCAL" IISPreferedPort="80" IISSSLPreferedPort="443"/><LocationRecords><LocationRecord LocalityEx="BOUNDARYGROUP" DPFallbackIn="PT0M"><URL Name="http://VRPSCCMDP01.ad/SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21" Signature="http://VRPSCCMDP01.ad/SMS_DP_SMSSIG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21.1.tar" Capability="0"/><URL Name="https://VRPSCCMDP01.ad/CCMTOKENAUTH_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21" Signature="https://VRPSCCMDP01.ad/CCMTOKENAUTH_SMS_DP_SMSSIG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21.1.tar" Capability="1024"/><URL Name="http://VRPSCCMDP01.ad/NOCERT_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21" Signature="http://VRPSCCMDP01.ad/NOCERT_SMS_DP_SMSSIG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21.1.tar" Capability="63"/><ADSite Name="RRH"/><IPSubnets><IPSubnet Address="10.6.195.0"/><IPSubnet Address=""/></IPSubnets><Metric Value=""/><Version>8790</Version><Capabilities SchemaVersion="1.0"><Property Name="SSL" Version="1"/><Property Name="SSLState" Value="63"/></Capabilities><ServerRemoteName>VRPSCCMDP01.ad</ServerRemoteName><DPType>SERVER</DPType><Windows Trust="0"/></LocationRecord><LocationRecord LocalityEx="BOUNDARYGROUP" DPFallbackIn="PT0M"><URL Name="http://VRPSCCMDP02.ad/SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21" Signature="http://VRPSCCMDP02.ad/SMS_DP_SMSSIG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21.1.tar" Capability="0"/><URL Name="https://VRPSCCMDP02.ad/CCMTOKENAUTH_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21" Signature="https://VRPSCCMDP02.ad/CCMTOKENAUTH_SMS_DP_SMSSIG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21.1.tar" Capability="1024"/><URL Name="http://VRPSCCMDP02.ad/NOCERT_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21" Signature="http://VRPSCCMDP02.ad/NOCERT_SMS_DP_SMSSIG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21.1.tar" Capability="63"/><ADSite Name="RRH"/><IPSubnets><IPSubnet Address="10.6.195.0"/><IPSubnet Address=""/></IPSubnets><Metric Value=""/><Version>8790</Version><Capabilities SchemaVersion="1.0"><Property Name="SSL" Version="1"/><Property Name="SSLState" Value="63"/></Capabilities><ServerRemoteName>VRPSCCMDP02.ad</ServerRemoteName><DPType>SERVER</DPType><Windows Trust="0"/></LocationRecord></LocationRecords></Site></Sites><RelatedContentIDs/></ContentLocationReply>]]> OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) MCS server: OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Found location: http://VRPSCCMDP01.ad/SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Found location: https://VRPSCCMDP01.ad/CCMTOKENAUTH_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Found location: http://VRPSCCMDP01.ad/NOCERT_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Boundary group type =256, delay: 0 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) DPTokenAuthCapable=0, IsSuperPeer=0 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) MCS server: OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Found location: http://VRPSCCMDP02.ad/SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Found location: https://VRPSCCMDP02.ad/CCMTOKENAUTH_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Found location: http://VRPSCCMDP02.ad/NOCERT_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Boundary group type =256, delay: 0 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) DPTokenAuthCapable=0, IsSuperPeer=0 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Processing 2 locations. OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Processing current boundary group location: OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Flags: 01000000 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) URLs : 2 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) SMB : OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) MCS : OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Adding URL location item 2 00000000 2 000002ad 00000000 https://VRPSCCMDP01.ad/CCMTOKENAUTH_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Adding URL location item 2 00000000 3 000000c5 00000000 https://VRPSCCMDP01.ad/NOCERT_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Processing current boundary group location: OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Flags: 01000000 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) URLs : 2 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) SMB : OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) MCS : OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Adding URL location item 2 00000000 2 000000d9 00000001 https://VRPSCCMDP02.ad/CCMTOKENAUTH_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Adding URL location item 2 00000000 3 00000060 00000001 https://VRPSCCMDP02.ad/NOCERT_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) No static content server. OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Prioritized locations: OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) https://VRPSCCMDP02.ad/CCMTOKENAUTH_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) https://VRPSCCMDP01.ad/CCMTOKENAUTH_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) https://VRPSCCMDP02.ad/NOCERT_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) https://VRPSCCMDP01.ad/NOCERT_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) HTTP content location: https://VRPSCCMDP02.ad/CCMTOKENAUTH_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) HTTP content location: https://VRPSCCMDP01.ad/CCMTOKENAUTH_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) HTTP content location: https://VRPSCCMDP02.ad/NOCERT_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) HTTP content location: https://VRPSCCMDP01.ad/NOCERT_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Locations: Multicast = 0, HTTP = 4, SMB = 0. OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Package Flags: 0x01000000 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Multicast is not enabled for the package. OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Trying https://VRPSCCMDP02.ad/CCMTOKENAUTH_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21. OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) GetDirectoryListing() entered OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Initializing HTTP transport. OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Setting URL = https://VRPSCCMDP02.ad/CCMTOKENAUTH_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21. OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Address=https://VRPSCCMDP02.ad, Scheme=https, Object=/CCMTOKENAUTH_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21, Port=443. OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Using DP auth token for DAV resource request OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) Setting Media Certificate. OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) WinHttp credentials set OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) CLibSMSMessageWinHttpTransport::Send: WinHttpOpenRequest - URL: VRPSCCMDP02.ad:443 PROPFIND /CCMTOKENAUTH_SMS_DP_SMSPKG$/C94FF778-9C33-449F-ACD9-AF152DFDEC21 OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) SSL - using auth token in request. OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C) In SSL, but with no client cert OSDDriverClient 4/25/2019 1:50:27 PM 2156 (0x086C)
Why does the old DPs are the one responding?
Thanks,
Dom
Security / System Center Configuration Manager Current Branch / SQL