Changeset 134 for branches/samba-3.0/docs/manpages/smb.conf.5
- Timestamp:
- May 23, 2008, 6:56:41 AM (17 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
branches/samba-3.0/docs/manpages/smb.conf.5
r44 r134 1 .\"Generated by db2man.xsl. Don't modify this, modify the source. 2 .de Sh \" Subsection 3 .br 4 .if t .Sp 5 .ne 5 6 .PP 7 \fB\\$1\fR 8 .PP 9 .. 10 .de Sp \" Vertical space (when we can't use .PP) 11 .if t .sp .5v 12 .if n .sp 13 .. 14 .de Ip \" List item 15 .br 16 .ie \\n(.$>=3 .ne \\$3 17 .el .ne 3 18 .IP "\\$1" \\$2 19 .. 20 .TH "SMB.CONF" 5 "" "" "" 1 .\" Title: smb.conf 2 .\" Author: 3 .\" Generator: DocBook XSL Stylesheets v1.73.2 <http://docbook.sf.net/> 4 .\" Date: 05/21/2008 5 .\" Manual: File Formats and Conventions 6 .\" Source: Samba 3.0 7 .\" 8 .TH "SMB\.CONF" "5" "05/21/2008" "Samba 3\.0" "File Formats and Conventions" 9 .\" disable hyphenation 10 .nh 11 .\" disable justification (adjust text to left margin only) 12 .ad l 21 13 .SH "NAME" 22 14 smb.conf - The configuration file for the Samba suite … … 24 16 .PP 25 17 The 26 \fIsmb .conf\fR27 file is a configuration file for the Samba suite .28 \fIsmb .conf\fR29 contains runtime configuration information for the Samba programs . The30 \fIsmb .conf\fR18 \fIsmb\.conf\fR 19 file is a configuration file for the Samba suite\. 20 \fIsmb\.conf\fR 21 contains runtime configuration information for the Samba programs\. The 22 \fIsmb\.conf\fR 31 23 file is designed to be configured and administered by the 32 24 \fBswat\fR(8) 33 program . The complete description of the file format and possible parameters held within are here for reference purposes.25 program\. The complete description of the file format and possible parameters held within are here for reference purposes\. 34 26 .SH "FILE FORMAT" 35 27 .PP 36 The file consists of sections and parameters. A section begins with the name of the section in square brackets and continues until the next section begins. Sections contain parameters of the form: 37 38 .sp 39 28 The file consists of sections and parameters\. A section begins with the name of the section in square brackets and continues until the next section begins\. Sections contain parameters of the form: 29 .sp 30 .RS 4 40 31 .nf 41 42 32 \fIname\fR = \fIvalue \fR 43 44 33 .fi 45 46 .PP 47 The file is line -based - that is, each newline-terminated line represents either a comment, a section name or a parameter.48 .PP 49 Section and parameter names are not case sensitive .50 .PP 51 Only the first equals sign in a parameter is significant . Whitespace before or after the first equals sign is discarded. Leading, trailing and internal whitespace in section and parameter names is irrelevant. Leading and trailing whitespace in a parameter value is discarded. Internal whitespace within a parameter value is retained verbatim.52 .PP 53 Any line beginning with a semicolon (\ fB;\fR) or a hash (\fB#\fR) character is ignored, as are lines containing only whitespace.34 .RE 35 .PP 36 The file is line\-based \- that is, each newline\-terminated line represents either a comment, a section name or a parameter\. 37 .PP 38 Section and parameter names are not case sensitive\. 39 .PP 40 Only the first equals sign in a parameter is significant\. Whitespace before or after the first equals sign is discarded\. Leading, trailing and internal whitespace in section and parameter names is irrelevant\. Leading and trailing whitespace in a parameter value is discarded\. Internal whitespace within a parameter value is retained verbatim\. 41 .PP 42 Any line beginning with a semicolon (\(lq;\(rq) or a hash (\(lq#\(rq) character is ignored, as are lines containing only whitespace\. 54 43 .PP 55 44 Any line ending in a 56 \ fB\\\fR57 is continued on the next line in the customary UNIX fashion .58 .PP 59 The values following the equals sign in parameters are all either a string (no quotes needed) or a boolean, which may be given as yes/no, 0/1 or true/false . Case is not significant in boolean values, but is preserved in string values. Some items such as create masks are numeric.45 \(lq\e\(rq 46 is continued on the next line in the customary UNIX fashion\. 47 .PP 48 The values following the equals sign in parameters are all either a string (no quotes needed) or a boolean, which may be given as yes/no, 0/1 or true/false\. Case is not significant in boolean values, but is preserved in string values\. Some items such as create masks are numeric\. 60 49 .SH "SECTION DESCRIPTIONS" 61 50 .PP 62 51 Each section in the configuration file (except for the [global] section) describes a shared resource (known as a 63 \ fBshare\fR). The section name is the name of the shared resource and the parameters within the section define the shares attributes.52 \(lqshare\(rq)\. The section name is the name of the shared resource and the parameters within the section define the shares attributes\. 64 53 .PP 65 54 There are three special sections, [global], [homes] and [printers], which are described under 66 \f Bspecial sections\fR. The following notes apply to ordinary section descriptions.67 .PP 68 A share consists of a directory to which access is being given plus a description of the access rights which are granted to the user of the service . Some housekeeping options are also specifiable.69 .PP 70 Sections are either file share services (used by the client as an extension of their native file systems) or printable services (used by the client to access print services on the host running the server) .55 \fIspecial sections\fR\. The following notes apply to ordinary section descriptions\. 56 .PP 57 A share consists of a directory to which access is being given plus a description of the access rights which are granted to the user of the service\. Some housekeeping options are also specifiable\. 58 .PP 59 Sections are either file share services (used by the client as an extension of their native file systems) or printable services (used by the client to access print services on the host running the server)\. 71 60 .PP 72 61 Sections may be designated 73 \f Bguest\fR74 services, in which case no password is required to access them . A specified UNIX75 \f Bguest account\fR76 is used to define access privileges in this case .77 .PP 78 Sections other than guest services will require a password to access them . The client provides the username. As older clients only provide passwords and not usernames, you may specify a list of usernames to check against the password using the62 \fIguest\fR 63 services, in which case no password is required to access them\. A specified UNIX 64 \fIguest account\fR 65 is used to define access privileges in this case\. 66 .PP 67 Sections other than guest services will require a password to access them\. The client provides the username\. As older clients only provide passwords and not usernames, you may specify a list of usernames to check against the password using the 79 68 user = 80 option in the share definition . For modern clients such as Windows 95/98/ME/NT/2000, this should not be necessary.81 .PP 82 The access rights granted by the server are masked by the access rights granted to the specified or guest UNIX user by the host system . The server does not grant more access than the host system grants.83 .PP 84 The following sample section defines a file space share . The user has write access to the path85 \fI/home/bar\fR . The share is accessed via the share name69 option in the share definition\. For modern clients such as Windows 95/98/ME/NT/2000, this should not be necessary\. 70 .PP 71 The access rights granted by the server are masked by the access rights granted to the specified or guest UNIX user by the host system\. The server does not grant more access than the host system grants\. 72 .PP 73 The following sample section defines a file space share\. The user has write access to the path 74 \fI/home/bar\fR\. The share is accessed via the share name 86 75 foo: 87 88 .sp 89 76 .sp 77 .RS 4 90 78 .nf 91 92 79 \fI[foo]\fR 93 path = /home/bar 94 read only = no 95 80 \fIpath = /home/bar\fR 81 \fIread only = no\fR 96 82 .fi 97 98 .PP 99 The following sample section defines a printable share . The share is read-only, but printable. That is, the only write access permitted is via calls to open, write to and close a spool file. The100 \f Bguest ok\fR83 .RE 84 .PP 85 The following sample section defines a printable share\. The share is read\-only, but printable\. That is, the only write access permitted is via calls to open, write to and close a spool file\. The 86 \fIguest ok\fR 101 87 parameter means access will be permitted as the default guest user (specified elsewhere): 102 103 .sp 104 88 .sp 89 .RS 4 105 90 .nf 106 107 91 \fI[aprinter]\fR 108 path = /usr/spool/public 109 read only = yes 110 printable = yes 111 guest ok = yes 112 92 \fIpath = /usr/spool/public\fR 93 \fIread only = yes\fR 94 \fIprintable = yes\fR 95 \fIguest ok = yes\fR 113 96 .fi 114 97 .RE 98 .sp 115 99 .SH "SPECIAL SECTIONS" 116 100 .SS "The [global] section" 117 101 .PP 118 Parameters in this section apply to the server as a whole, or are defaults for sections that do not specifically define certain items . See the notes under PARAMETERS for more information.102 Parameters in this section apply to the server as a whole, or are defaults for sections that do not specifically define certain items\. See the notes under PARAMETERS for more information\. 119 103 .SS "The [homes] section" 120 104 .PP 121 If a section called [homes] is included in the configuration file, services connecting clients to their home directories can be created on the fly by the server .122 .PP 123 When the connection request is made, the existing sections are scanned . If a match is found, it is used. If no match is found, the requested section name is treated as a username and looked up in the local password file. If the name exists and the correct password has been given, a share is created by cloning the [homes] section.105 If a section called [homes] is included in the configuration file, services connecting clients to their home directories can be created on the fly by the server\. 106 .PP 107 When the connection request is made, the existing sections are scanned\. If a match is found, it is used\. If no match is found, the requested section name is treated as a username and looked up in the local password file\. If the name exists and the correct password has been given, a share is created by cloning the [homes] section\. 124 108 .PP 125 109 Some modifications are then made to the newly created share: 126 .TP 3n 127 \(bu 128 The share name is changed from homes to the located username. 129 .TP 3n 130 \(bu 131 If no path was given, the path is set to the user's home directory. 110 .sp 111 .RS 4 112 .ie n \{\ 113 \h'-04'\(bu\h'+03'\c 114 .\} 115 .el \{\ 116 .sp -1 117 .IP \(bu 2.3 118 .\} 119 The share name is changed from homes to the located username\. 120 .RE 121 .sp 122 .RS 4 123 .ie n \{\ 124 \h'-04'\(bu\h'+03'\c 125 .\} 126 .el \{\ 127 .sp -1 128 .IP \(bu 2.3 129 .\} 130 If no path was given, the path is set to the user\'s home directory\. 131 .sp 132 .RE 132 133 .PP 133 134 If you decide to use a 134 \fBpath =\fR 135 line in your [homes] section, it may be useful to use the %S macro. For example: 136 137 .sp 138 135 \fIpath =\fR 136 line in your [homes] section, it may be useful to use the %S macro\. For example: 137 .sp 138 .RS 4 139 139 .nf 140 141 140 \fBpath = /data/pchome/%S\fR 142 143 141 .fi 144 is useful if you have different home directories for your PCs than for UNIX access. 145 .PP 146 This is a fast and simple way to give a large number of clients access to their home directories with a minimum of fuss. 142 .RE 143 .sp 144 is useful if you have different home directories for your PCs than for UNIX access\. 145 .PP 146 This is a fast and simple way to give a large number of clients access to their home directories with a minimum of fuss\. 147 147 .PP 148 148 A similar process occurs if the requested section name is 149 \fBhomes\fR, except that the share name is not changed to that of the requesting user. This method of using the [homes] section works well if different users share a client PC. 150 .PP 151 The [homes] section can specify all the parameters a normal service section can specify, though some make more sense than others. The following is a typical and suitable [homes] section: 152 153 .sp 154 149 \(lqhomes\(rq, except that the share name is not changed to that of the requesting user\. This method of using the [homes] section works well if different users share a client PC\. 150 .PP 151 The [homes] section can specify all the parameters a normal service section can specify, though some make more sense than others\. The following is a typical and suitable [homes] section: 152 .sp 153 .RS 4 155 154 .nf 156 157 155 \fI[homes]\fR 158 read only = no 159 156 \fIread only = no\fR 160 157 .fi 161 158 .RE 162 159 .PP 163 160 An important point is that if guest access is specified in the [homes] section, all home directories will be visible to all clients 164 \f Bwithout a password\fR. In the very unlikely event that this is actually desirable, it is wise to also specify165 \f Bread only access\fR.161 \fIwithout a password\fR\. In the very unlikely event that this is actually desirable, it is wise to also specify 162 \fIread only access\fR\. 166 163 .PP 167 164 The 168 \f Bbrowseable\fR169 flag for auto home directories will be inherited from the global browseable flag, not the [homes] browseable flag . This is useful as it means setting170 \f Bbrowseable = no\fR171 in the [homes] section will hide the [homes] share but make any auto home directories visible .165 \fIbrowseable\fR 166 flag for auto home directories will be inherited from the global browseable flag, not the [homes] browseable flag\. This is useful as it means setting 167 \fIbrowseable = no\fR 168 in the [homes] section will hide the [homes] share but make any auto home directories visible\. 172 169 .SS "The [printers] section" 173 170 .PP 174 This section works like [homes], but for printers .175 .PP 176 If a [printers] section occurs in the configuration file, users are able to connect to any printer specified in the local host 's printcap file.177 .PP 178 When a connection request is made, the existing sections are scanned . If a match is found, it is used. If no match is found, but a [homes] section exists, it is used as described above. Otherwise, the requested section name is treated as a printer name and the appropriate printcap file is scanned to see if the requested section name is a valid printer share name. If a match is found, a new printer share is created by cloning the [printers] section.171 This section works like [homes], but for printers\. 172 .PP 173 If a [printers] section occurs in the configuration file, users are able to connect to any printer specified in the local host\'s printcap file\. 174 .PP 175 When a connection request is made, the existing sections are scanned\. If a match is found, it is used\. If no match is found, but a [homes] section exists, it is used as described above\. Otherwise, the requested section name is treated as a printer name and the appropriate printcap file is scanned to see if the requested section name is a valid printer share name\. If a match is found, a new printer share is created by cloning the [printers] section\. 179 176 .PP 180 177 A few modifications are then made to the newly created share: 181 .TP 3n 182 \(bu 178 .sp 179 .RS 4 180 .ie n \{\ 181 \h'-04'\(bu\h'+03'\c 182 .\} 183 .el \{\ 184 .sp -1 185 .IP \(bu 2.3 186 .\} 183 187 The share name is set to the located printer name 184 .TP 3n 185 \(bu 188 .RE 189 .sp 190 .RS 4 191 .ie n \{\ 192 \h'-04'\(bu\h'+03'\c 193 .\} 194 .el \{\ 195 .sp -1 196 .IP \(bu 2.3 197 .\} 186 198 If no printer name was given, the printer name is set to the located printer name 187 .TP 3n 188 \(bu 189 If the share does not permit guest access and no username was given, the username is set to the located printer name. 190 .PP 191 The [printers] service MUST be printable - if you specify otherwise, the server will refuse to load the configuration file. 192 .PP 193 Typically the path specified is that of a world-writeable spool directory with the sticky bit set on it. A typical [printers] entry looks like this: 194 195 .sp 196 199 .RE 200 .sp 201 .RS 4 202 .ie n \{\ 203 \h'-04'\(bu\h'+03'\c 204 .\} 205 .el \{\ 206 .sp -1 207 .IP \(bu 2.3 208 .\} 209 If the share does not permit guest access and no username was given, the username is set to the located printer name\. 210 .sp 211 .RE 212 .PP 213 The [printers] service MUST be printable \- if you specify otherwise, the server will refuse to load the configuration file\. 214 .PP 215 Typically the path specified is that of a world\-writeable spool directory with the sticky bit set on it\. A typical [printers] entry looks like this: 216 .sp 217 .RS 4 197 218 .nf 198 199 219 \fI[printers]\fR 200 path = /usr/spool/public 201 guest ok = yes 202 printable = yes 203 220 \fIpath = /usr/spool/public\fR 221 \fIguest ok = yes\fR 222 \fIprintable = yes\fR 204 223 .fi 205 206 .PP 207 All aliases given for a printer in the printcap file are legitimate printer names as far as the server is concerned. If your printing subsystem doesn't work like that, you will have to set up a pseudo-printcap. This is a file consisting of one or more lines like this: 208 209 .sp 210 224 .RE 225 .PP 226 All aliases given for a printer in the printcap file are legitimate printer names as far as the server is concerned\. If your printing subsystem doesn\'t work like that, you will have to set up a pseudo\-printcap\. This is a file consisting of one or more lines like this: 227 .sp 228 .RS 4 211 229 .nf 212 213 alias|alias|alias|alias... 214 230 alias|alias|alias|alias\.\.\. 215 231 .fi 216 217 .PP 218 Each alias should be an acceptable printer name for your printing subsystem . In the [global] section, specify the new file as your printcap. The server will only recognize names found in your pseudo-printcap, which of course can contain whatever aliases you like. The same technique could be used simply to limit access to a subset of your local printers.219 .PP 220 An alias, by the way, is defined as any component of the first entry of a printcap record . Records are separated by newlines, components (if there are more than one) are separated by vertical bar symbols (|).232 .RE 233 .PP 234 Each alias should be an acceptable printer name for your printing subsystem\. In the [global] section, specify the new file as your printcap\. The server will only recognize names found in your pseudo\-printcap, which of course can contain whatever aliases you like\. The same technique could be used simply to limit access to a subset of your local printers\. 235 .PP 236 An alias, by the way, is defined as any component of the first entry of a printcap record\. Records are separated by newlines, components (if there are more than one) are separated by vertical bar symbols (|)\. 221 237 .sp 222 238 .it 1 an-trap … … 224 240 .nr an-break-flag 1 225 241 .br 226 \fBNote\fR 242 Note 227 243 .PP 228 244 On SYSV systems which use lpstat to determine what printers are defined on the system you may be able to use 229 245 printcap name = lpstat 230 to automatically obtain a list of printers . See the246 to automatically obtain a list of printers\. See the 231 247 printcap name 232 option for more details .248 option for more details\. 233 249 .SH "USERSHARES" 234 250 .PP 235 Starting with Samba version 3 .0.23 the capability for non-root users to add, modify, and delete their own share definitions has been added. This capability is called236 \f Busershares\fR237 and is controlled by a set of parameters in the [global] section of the smb .conf. The relevant parameters are :251 Starting with Samba version 3\.0\.23 the capability for non\-root users to add, modify, and delete their own share definitions has been added\. This capability is called 252 \fIusershares\fR 253 and is controlled by a set of parameters in the [global] section of the smb\.conf\. The relevant parameters are : 238 254 .PP 239 255 usershare allow guests 240 .RS 3n241 Controls if usershares can permit guest access .256 .RS 4 257 Controls if usershares can permit guest access\. 242 258 .RE 243 259 .PP 244 260 usershare max shares 245 .RS 3n246 Maximum number of user defined shares allowed .261 .RS 4 262 Maximum number of user defined shares allowed\. 247 263 .RE 248 264 .PP 249 265 usershare owner only 250 .RS 3n251 If set only directories owned by the sharing user can be shared .266 .RS 4 267 If set only directories owned by the sharing user can be shared\. 252 268 .RE 253 269 .PP 254 270 usershare path 255 .RS 3n256 Points to the directory containing the user defined share definitions . The filesystem permissions on this directory control who can create user defined shares.271 .RS 4 272 Points to the directory containing the user defined share definitions\. The filesystem permissions on this directory control who can create user defined shares\. 257 273 .RE 258 274 .PP 259 275 usershare prefix allow list 260 .RS 3n261 Comma -separated list of absolute pathnames restricting what directories can be shared. Only directories below the pathnames in this list are permitted.276 .RS 4 277 Comma\-separated list of absolute pathnames restricting what directories can be shared\. Only directories below the pathnames in this list are permitted\. 262 278 .RE 263 279 .PP 264 280 usershare prefix deny list 265 .RS 3n266 Comma -separated list of absolute pathnames restricting what directories can be shared. Directories below the pathnames in this list are prohibited.281 .RS 4 282 Comma\-separated list of absolute pathnames restricting what directories can be shared\. Directories below the pathnames in this list are prohibited\. 267 283 .RE 268 284 .PP 269 285 usershare template share 270 .RS 3n271 Names a pre -existing share used as a template for creating new usershares. All other share parameters not specified in the user defined share definition are copied from this named share.286 .RS 4 287 Names a pre\-existing share used as a template for creating new usershares\. All other share parameters not specified in the user defined share definition are copied from this named share\. 272 288 .RE 273 289 .PP … … 277 293 .PP 278 294 Become root: 279 295 .sp 296 .RS 4 280 297 .nf 281 282 298 mkdir /usr/local/samba/lib/usershares 283 299 chgrp foo /usr/local/samba/lib/usershares 284 300 chmod 1770 /usr/local/samba/lib/usershares 285 286 301 .fi 302 .RE 287 303 .PP 288 304 Then add the parameters 289 290 .sp 291 305 .sp 306 .RS 4 292 307 .nf 293 294 usershare path = /usr/local/samba/lib/usershares 295 usershare max shares = 10 # (or the desired number of shares) 296 308 \fIusershare path = /usr/local/samba/lib/usershares\fR 309 \fIusershare max shares = 10\fR # (or the desired number of shares) 297 310 .fi 311 .RE 312 .sp 298 313 to the global section of your 299 \fIsmb .conf\fR. Members of the group foo may then manipulate the user defined shares using the following commands.314 \fIsmb\.conf\fR\. Members of the group foo may then manipulate the user defined shares using the following commands\. 300 315 .PP 301 316 net usershare add sharename path [comment] [acl] [guest_ok=[y|n]] 302 .RS 3n303 To create or modify (overwrite) a user defined share .317 .RS 4 318 To create or modify (overwrite) a user defined share\. 304 319 .RE 305 320 .PP 306 321 net usershare delete sharename 307 .RS 3n308 To delete a user defined share .309 .RE 310 .PP 311 net usershare list wildcard -sharename312 .RS 3n313 To list user defined shares .314 .RE 315 .PP 316 net usershare info wildcard -sharename317 .RS 3n318 To print information about user defined shares .322 .RS 4 323 To delete a user defined share\. 324 .RE 325 .PP 326 net usershare list wildcard\-sharename 327 .RS 4 328 To list user defined shares\. 329 .RE 330 .PP 331 net usershare info wildcard\-sharename 332 .RS 4 333 To print information about user defined shares\. 319 334 .RE 320 335 .SH "PARAMETERS" 321 336 .PP 322 Parameters define the specific attributes of sections .323 .PP 324 Some parameters are specific to the [global] section (e .g.,325 \f Bsecurity\fR). Some parameters are usable in all sections (e.g.,326 \f Bcreate mask\fR). All others are permissible only in normal sections. For the purposes of the following descriptions the [homes] and [printers] sections will be considered normal. The letter327 \f BG\fR328 in parentheses indicates that a parameter is specific to the [global] section . The letter329 \f BS\fR330 indicates that a parameter can be specified in a service specific section . All331 \f BS\fR332 parameters can also be specified in the [global] section - in which case they will define the default behavior for all services.333 .PP 334 Parameters are arranged here in alphabetical order - this may not create best bedfellows, but at least you can find them! Where there are synonyms, the preferred synonym is described, others refer to the preferred synonym.337 Parameters define the specific attributes of sections\. 338 .PP 339 Some parameters are specific to the [global] section (e\.g\., 340 \fIsecurity\fR)\. Some parameters are usable in all sections (e\.g\., 341 \fIcreate mask\fR)\. All others are permissible only in normal sections\. For the purposes of the following descriptions the [homes] and [printers] sections will be considered normal\. The letter 342 \fIG\fR 343 in parentheses indicates that a parameter is specific to the [global] section\. The letter 344 \fIS\fR 345 indicates that a parameter can be specified in a service specific section\. All 346 \fIS\fR 347 parameters can also be specified in the [global] section \- in which case they will define the default behavior for all services\. 348 .PP 349 Parameters are arranged here in alphabetical order \- this may not create best bedfellows, but at least you can find them! Where there are synonyms, the preferred synonym is described, others refer to the preferred synonym\. 335 350 .SH "VARIABLE SUBSTITUTIONS" 336 351 .PP 337 Many of the strings that are settable in the config file can take substitutions . For example the option338 \ fBpath = /tmp/%u\fR352 Many of the strings that are settable in the config file can take substitutions\. For example the option 353 \(lqpath = /tmp/%u\(rq 339 354 is interpreted as 340 \ fBpath = /tmp/john\fR341 if the user connected with the username john .342 .PP 343 These substitutions are mostly noted in the descriptions below, but there are some general substitutions which apply whenever they might be relevant . These are:355 \(lqpath = /tmp/john\(rq 356 if the user connected with the username john\. 357 .PP 358 These substitutions are mostly noted in the descriptions below, but there are some general substitutions which apply whenever they might be relevant\. These are: 344 359 .PP 345 360 %U 346 .RS 3n347 session username (the username that the client wanted, not necessarily the same as the one they got) .361 .RS 4 362 session username (the username that the client wanted, not necessarily the same as the one they got)\. 348 363 .RE 349 364 .PP 350 365 %G 351 .RS 3n352 primary group name of %U .366 .RS 4 367 primary group name of %U\. 353 368 .RE 354 369 .PP 355 370 %h 356 .RS 3n357 the Internet hostname that Samba is running on .371 .RS 4 372 the Internet hostname that Samba is running on\. 358 373 .RE 359 374 .PP 360 375 %m 361 .RS 3n362 the NetBIOS name of the client machine (very useful) .363 .sp 364 This parameter is not available when Samba listens on port 445, as clients no longer send this information . If you use this macro in an include statement on a domain that has a Samba domain controller be sure to set in the [global] section365 \fIsmb ports = 139\fR . This will cause Samba to not listen on port 445 and will permit include functionality to function as it did with Samba 2.x.376 .RS 4 377 the NetBIOS name of the client machine (very useful)\. 378 .sp 379 This parameter is not available when Samba listens on port 445, as clients no longer send this information\. If you use this macro in an include statement on a domain that has a Samba domain controller be sure to set in the [global] section 380 \fIsmb ports = 139\fR\. This will cause Samba to not listen on port 445 and will permit include functionality to function as it did with Samba 2\.x\. 366 381 .RE 367 382 .PP 368 383 %L 369 .RS 3n370 the NetBIOS name of the server . This allows you to change your config based on what the client calls you. Your server can have a371 \ fBdual personality\fR.384 .RS 4 385 the NetBIOS name of the server\. This allows you to change your config based on what the client calls you\. Your server can have a 386 \(lqdual personality\(rq\. 372 387 .RE 373 388 .PP 374 389 %M 375 .RS 3n376 the Internet name of the client machine .390 .RS 4 391 the Internet name of the client machine\. 377 392 .RE 378 393 .PP 379 394 %R 380 .RS 3n381 the selected protocol level after protocol negotiation . It can be one of CORE, COREPLUS, LANMAN1, LANMAN2 or NT1.395 .RS 4 396 the selected protocol level after protocol negotiation\. It can be one of CORE, COREPLUS, LANMAN1, LANMAN2 or NT1\. 382 397 .RE 383 398 .PP 384 399 %d 385 .RS 3n386 the process id of the current server process .400 .RS 4 401 the process id of the current server process\. 387 402 .RE 388 403 .PP 389 404 %a 390 .RS 3n391 the architecture of the remote machine. It currently recognizes Samba (\fBSamba\fR), the Linux CIFS file system (\fBCIFSFS\fR), OS/2, (\fBOS2\fR), Windows for Workgroups (\fBWfWg\fR), Windows 9x/ME (\fBWin95\fR), Windows NT (\fBWinNT\fR), Windows 2000 (\fBWin2K\fR), Windows XP (\fBWinXP\fR), and Windows 2003 (\fBWin2K3\fR). Anything else will be known as392 \fBUNKNOWN\fR .405 .RS 4 406 The architecture of the remote machine\. It currently recognizes Samba (\fBSamba\fR), the Linux CIFS file system (\fBCIFSFS\fR), OS/2, (\fBOS2\fR), Windows for Workgroups (\fBWfWg\fR), Windows 9x/ME (\fBWin95\fR), Windows NT (\fBWinNT\fR), Windows 2000 (\fBWin2K\fR), Windows XP (\fBWinXP\fR), Windows XP 64\-bit(\fBWinXP64\fR), Windows 2003 including 2003R2 (\fBWin2K3\fR), and Windows Vista (\fBVista\fR)\. Anything else will be known as 407 \fBUNKNOWN\fR\. 393 408 .RE 394 409 .PP 395 410 %I 396 .RS 3n397 the IP address of the client machine .411 .RS 4 412 the IP address of the client machine\. 398 413 .RE 399 414 .PP 400 415 %i 401 .RS 3n402 the local IP address to which a client connected .416 .RS 4 417 the local IP address to which a client connected\. 403 418 .RE 404 419 .PP 405 420 %T 406 .RS 3n407 the current date and time .421 .RS 4 422 the current date and time\. 408 423 .RE 409 424 .PP 410 425 %D 411 .RS 3n412 name of the domain or workgroup of the current user .426 .RS 4 427 name of the domain or workgroup of the current user\. 413 428 .RE 414 429 .PP 415 430 %w 416 .RS 3n417 the winbind separator .431 .RS 4 432 the winbind separator\. 418 433 .RE 419 434 .PP 420 435 %$(\fIenvvar\fR) 421 .RS 3n436 .RS 4 422 437 the value of the environment variable 423 \fIenvar\fR .438 \fIenvar\fR\. 424 439 .RE 425 440 .PP … … 427 442 .PP 428 443 %S 429 .RS 3n430 the name of the current service, if any .444 .RS 4 445 the name of the current service, if any\. 431 446 .RE 432 447 .PP 433 448 %P 434 .RS 3n435 the root directory of the current service, if any .449 .RS 4 450 the root directory of the current service, if any\. 436 451 .RE 437 452 .PP 438 453 %u 439 .RS 3n440 username of the current service, if any .454 .RS 4 455 username of the current service, if any\. 441 456 .RE 442 457 .PP 443 458 %g 444 .RS 3n445 primary group name of %u .459 .RS 4 460 primary group name of %u\. 446 461 .RE 447 462 .PP 448 463 %H 449 .RS 3n450 the home directory of the user given by %u .464 .RS 4 465 the home directory of the user given by %u\. 451 466 .RE 452 467 .PP 453 468 %N 454 .RS 3n455 the name of your NIS home directory server . This is obtained from your NIS auto.map entry. If you have not compiled Samba with the456 \f B--with-automount\fR457 option, this value will be the same as %L .469 .RS 4 470 the name of your NIS home directory server\. This is obtained from your NIS auto\.map entry\. If you have not compiled Samba with the 471 \fI\-\-with\-automount\fR 472 option, this value will be the same as %L\. 458 473 .RE 459 474 .PP 460 475 %p 461 .RS 3n462 the path of the service 's home directory, obtained from your NIS auto.map entry. The NIS auto.map entry is split up as463 %N:%p .476 .RS 4 477 the path of the service\'s home directory, obtained from your NIS auto\.map entry\. The NIS auto\.map entry is split up as 478 %N:%p\. 464 479 .RE 465 480 .PP 466 481 There are some quite creative things that can be done with these substitutions and other 467 \fIsmb .conf\fR468 options .482 \fIsmb\.conf\fR 483 options\. 469 484 .SH "NAME MANGLING" 470 485 .PP 471 486 Samba supports 472 487 name mangling 473 so that DOS and Windows clients can use files that don 't conform to the 8.3 format. It can also be set to adjust the case of 8.3 format filenames.474 .PP 475 There are several options that control the way mangling is performed, and they are grouped here rather than listed separately . For the defaults look at the output of the testparm program.476 .PP 477 These options can be set separately for each service .488 so that DOS and Windows clients can use files that don\'t conform to the 8\.3 format\. It can also be set to adjust the case of 8\.3 format filenames\. 489 .PP 490 There are several options that control the way mangling is performed, and they are grouped here rather than listed separately\. For the defaults look at the output of the testparm program\. 491 .PP 492 These options can be set separately for each service\. 478 493 .PP 479 494 The options are: 480 495 .PP 481 496 case sensitive = yes/no/auto 482 .RS 3n483 controls whether filenames are case sensitive . If they aren't, Samba must do a filename search and match on passed names. The default setting of auto allows clients that support case sensitive filenames (Linux CIFSVFS and smbclient 3.0.5 and above currently) to tell the Samba server on a per-packet basis that they wish to access the file system in a case-sensitive manner (to support UNIX case sensitive semantics). No Windows or DOS system supports case-sensitive filename so setting this option to auto is that same as setting it to no for them. Default484 \f Bauto\fR.497 .RS 4 498 controls whether filenames are case sensitive\. If they aren\'t, Samba must do a filename search and match on passed names\. The default setting of auto allows clients that support case sensitive filenames (Linux CIFSVFS and smbclient 3\.0\.5 and above currently) to tell the Samba server on a per\-packet basis that they wish to access the file system in a case\-sensitive manner (to support UNIX case sensitive semantics)\. No Windows or DOS system supports case\-sensitive filename so setting this option to auto is that same as setting it to no for them\. Default 499 \fIauto\fR\. 485 500 .RE 486 501 .PP 487 502 default case = upper/lower 488 .RS 3n489 controls what the default case is for new filenames (ie . files that don't currently exist in the filesystem). Default490 \f Blower\fR. IMPORTANT NOTE: This option will be used to modify the case of491 \f Ball\fR503 .RS 4 504 controls what the default case is for new filenames (ie\. files that don\'t currently exist in the filesystem)\. Default 505 \fIlower\fR\. IMPORTANT NOTE: This option will be used to modify the case of 506 \fIall\fR 492 507 incoming client filenames, not just new filenames if the options 493 case sensitive = yes, 494 preserve case = No, 495 short preserve case = No are set. This change is needed as part of the optimisations for directories containing large numbers of files. 508 \fIcase sensitive = yes\fR, 509 \fIpreserve case = No\fR, 510 \fIshort preserve case = No\fR 511 are set\. This change is needed as part of the optimisations for directories containing large numbers of files\. 496 512 .RE 497 513 .PP 498 514 preserve case = yes/no 499 .RS 3n500 controls whether new files (ie . files that don't currently exist in the filesystem) are created with the case that the client passes, or if they are forced to be the515 .RS 4 516 controls whether new files (ie\. files that don\'t currently exist in the filesystem) are created with the case that the client passes, or if they are forced to be the 501 517 default 502 case . Default503 \f Byes\fR.518 case\. Default 519 \fIyes\fR\. 504 520 .RE 505 521 .PP 506 522 short preserve case = yes/no 507 .RS 3n508 controls if new files (ie . files that don't currently exist in the filesystem) which conform to 8.3 syntax, that is all in upper case and of suitable length, are created upper case, or if they are forced to be the523 .RS 4 524 controls if new files (ie\. files that don\'t currently exist in the filesystem) which conform to 8\.3 syntax, that is all in upper case and of suitable length, are created upper case, or if they are forced to be the 509 525 default 510 case . This option can be used with526 case\. This option can be used with 511 527 preserve case = yes 512 to permit long filenames to retain their case, while short names are lowercased . Default513 \f Byes\fR.514 .RE 515 .PP 516 By default, Samba 3 .0 has the same semantics as a Windows NT server, in that it is case insensitive but case preserving. As a special case for directories with large numbers of files, if the case options are set as follows, "case sensitive = yes", "case preserve = no", "short preserve case = no" then the "default case" option will be applied and will modify all filenames sent from the client when accessing this share.528 to permit long filenames to retain their case, while short names are lowercased\. Default 529 \fIyes\fR\. 530 .RE 531 .PP 532 By default, Samba 3\.0 has the same semantics as a Windows NT server, in that it is case insensitive but case preserving\. As a special case for directories with large numbers of files, if the case options are set as follows, "case sensitive = yes", "case preserve = no", "short preserve case = no" then the "default case" option will be applied and will modify all filenames sent from the client when accessing this share\. 517 533 .SH "NOTE ABOUT USERNAME/PASSWORD VALIDATION" 518 534 .PP 519 There are a number of ways in which a user can connect to a service . The server uses the following steps in determining if it will allow a connection to a specified service. If all the steps fail, the connection request is rejected. However, if one of the steps succeeds, the following steps are not checked.535 There are a number of ways in which a user can connect to a service\. The server uses the following steps in determining if it will allow a connection to a specified service\. If all the steps fail, the connection request is rejected\. However, if one of the steps succeeds, the following steps are not checked\. 520 536 .PP 521 537 If the service is marked 522 \fBguest only = yes\fR 523 and the server is running with share-level security (\fBsecurity = share\fR, steps 1 to 5 are skipped. 524 .TP 3n 525 1. 526 If the client has passed a username/password pair and that username/password pair is validated by the UNIX system's password programs, the connection is made as that username. This includes the 527 \\\\server\\service%\fIusername\fR 528 method of passing a username. 529 .TP 3n 530 2. 531 If the client has previously registered a username with the system and now supplies a correct password for that username, the connection is allowed. 532 .TP 3n 533 3. 534 The client's NetBIOS name and any previously used usernames are checked against the supplied password. If they match, the connection is allowed as the corresponding user. 535 .TP 3n 536 4. 537 If the client has previously validated a username/password pair with the server and the client has passed the validation token, that username is used. 538 .TP 3n 539 5. 540 If a 538 \(lqguest only = yes\(rq 539 and the server is running with share\-level security (\(lqsecurity = share\(rq, steps 1 to 5 are skipped\. 540 .sp 541 .RS 4 542 \h'-04' 1.\h'+02'If the client has passed a username/password pair and that username/password pair is validated by the UNIX system\'s password programs, the connection is made as that username\. This includes the 543 \e\eserver\eservice%\fIusername\fR 544 method of passing a username\. 545 .RE 546 .sp 547 .RS 4 548 \h'-04' 2.\h'+02'If the client has previously registered a username with the system and now supplies a correct password for that username, the connection is allowed\. 549 .RE 550 .sp 551 .RS 4 552 \h'-04' 3.\h'+02'The client\'s NetBIOS name and any previously used usernames are checked against the supplied password\. If they match, the connection is allowed as the corresponding user\. 553 .RE 554 .sp 555 .RS 4 556 \h'-04' 4.\h'+02'If the client has previously validated a username/password pair with the server and the client has passed the validation token, that username is used\. 557 .RE 558 .sp 559 .RS 4 560 \h'-04' 5.\h'+02'If a 541 561 user = 542 562 field is given in the 543 \fIsmb .conf\fR544 file for the service and the client has supplied a password, and that password matches (according to the UNIX system 's password checking) with one of the usernames from the563 \fIsmb\.conf\fR 564 file for the service and the client has supplied a password, and that password matches (according to the UNIX system\'s password checking) with one of the usernames from the 545 565 user = 546 566 field, the connection is made as the username in the 547 567 user = 548 line . If one of the usernames in the568 line\. If one of the usernames in the 549 569 user = 550 570 list begins with a 551 @, that name expands to a list of names in the group of the same name. 552 .TP 3n 553 6. 554 If the service is a guest service, a connection is made as the username given in the 571 @, that name expands to a list of names in the group of the same name\. 572 .RE 573 .sp 574 .RS 4 575 \h'-04' 6.\h'+02'If the service is a guest service, a connection is made as the username given in the 555 576 guest account = 556 for the service, irrespective of the supplied password. 577 for the service, irrespective of the supplied password\. 578 .RE 557 579 .SH "EXPLANATION OF EACH PARAMETER" 558 .PP 580 581 559 582 abort shutdown script (G) 560 .RS 3n 583 .PP 584 .RS 4 561 585 This a full path name to a script called by 562 586 \fBsmbd\fR(8) 563 587 that should stop a shutdown procedure issued by the 564 shutdown script.588 \fIshutdown script\fR\. 565 589 .sp 566 590 If the connected user posseses the 567 \fBSeRemoteShutdownPrivilege\fR, right, this command will be run as user .568 .sp 569 Default: 570 \f B\fIabort shutdown script\fR = ""\fR571 .sp 572 Example: 573 \f B\fIabort shutdown script\fR = /sbin/shutdown -c\fR574 .RE 575 .PP 591 \fBSeRemoteShutdownPrivilege\fR, right, this command will be run as user\. 592 .sp 593 Default: 594 \fI\fIabort shutdown script\fR\fR\fI = \fR\fI""\fR\fI \fR 595 .sp 596 Example: 597 \fI\fIabort shutdown script\fR\fR\fI = \fR\fI/sbin/shutdown \-c\fR\fI \fR 598 .RE 599 576 600 acl check permissions (S) 577 .RS 3n 601 .PP 602 .RS 4 578 603 This boolean parameter controls what 579 \fBsmbd\fR(8)does on receiving a protocol request of "open for delete" from a Windows client . If a Windows client doesn't have permissions to delete a file then they expect this to be denied at open time. POSIX systems normally only detect restrictions on delete by actually attempting to delete the file or directory. As Windows clients can (and do) "back out" a delete request by unsetting the "delete on close" bit Samba cannot delete the file immediately on "open for delete" request as we cannot restore such a deleted file. With this parameter set to true (the default) then smbd checks the file system permissions directly on "open for delete" and denies the request without actually deleting the file if the file system permissions would seem to deny it. This is not perfect, as it's possible a user could have deleted a file without Samba being able to check the permissions correctly, but it is close enough to Windows semantics for mostly correct behaviour. Samba will correctly check POSIX ACL semantics in this case.580 .sp 581 If this parameter is set to "false" Samba doesn 't check permissions on "open for delete" and allows the open. If the user doesn't have permission to delete the file this will only be discovered at close time, which is too late for the Windows user tools to display an error message to the user. The symptom of this is files that appear to have been deleted "magically" re-appearing on a Windows explorer refersh. This is an extremely advanced protocol option which should not need to be changed. This parameter was introduced in its final form in 3.0.21, an earlier version with slightly different semantics was introduced in 3.0.20. That older version is not documented here.582 .sp 583 Default: 584 \f B\fIacl check permissions\fR = True\fR585 .RE 586 .PP 604 \fBsmbd\fR(8)does on receiving a protocol request of "open for delete" from a Windows client\. If a Windows client doesn\'t have permissions to delete a file then they expect this to be denied at open time\. POSIX systems normally only detect restrictions on delete by actually attempting to delete the file or directory\. As Windows clients can (and do) "back out" a delete request by unsetting the "delete on close" bit Samba cannot delete the file immediately on "open for delete" request as we cannot restore such a deleted file\. With this parameter set to true (the default) then smbd checks the file system permissions directly on "open for delete" and denies the request without actually deleting the file if the file system permissions would seem to deny it\. This is not perfect, as it\'s possible a user could have deleted a file without Samba being able to check the permissions correctly, but it is close enough to Windows semantics for mostly correct behaviour\. Samba will correctly check POSIX ACL semantics in this case\. 605 .sp 606 If this parameter is set to "false" Samba doesn\'t check permissions on "open for delete" and allows the open\. If the user doesn\'t have permission to delete the file this will only be discovered at close time, which is too late for the Windows user tools to display an error message to the user\. The symptom of this is files that appear to have been deleted "magically" re\-appearing on a Windows explorer refersh\. This is an extremely advanced protocol option which should not need to be changed\. This parameter was introduced in its final form in 3\.0\.21, an earlier version with slightly different semantics was introduced in 3\.0\.20\. That older version is not documented here\. 607 .sp 608 Default: 609 \fI\fIacl check permissions\fR\fR\fI = \fR\fITrue\fR\fI \fR 610 .RE 611 587 612 acl compatibility (S) 588 .RS 3n 589 This parameter specifies what OS ACL semantics should be compatible with. Possible values are 590 \fBwinnt\fR 613 .PP 614 .RS 4 615 This parameter specifies what OS ACL semantics should be compatible with\. Possible values are 616 \fIwinnt\fR 591 617 for Windows NT 4, 592 \f Bwin2k\fR618 \fIwin2k\fR 593 619 for Windows 2000 and above and 594 \f Bauto\fR. If you specify595 \f Bauto\fR, the value for this parameter will be based upon the version of the client. There should be no reason to change this parameter from the default.596 .sp 597 Default: 598 \f B\fIacl compatibility\fR = Auto\fR599 .sp 600 Example: 601 \f B\fIacl compatibility\fR = win2k\fR602 .RE 603 .PP 620 \fIauto\fR\. If you specify 621 \fIauto\fR, the value for this parameter will be based upon the version of the client\. There should be no reason to change this parameter from the default\. 622 .sp 623 Default: 624 \fI\fIacl compatibility\fR\fR\fI = \fR\fIAuto\fR\fI \fR 625 .sp 626 Example: 627 \fI\fIacl compatibility\fR\fR\fI = \fR\fIwin2k\fR\fI \fR 628 .RE 629 604 630 acl group control (S) 605 .RS 3n 606 In a POSIX filesystem, only the owner of a file or directory and the superuser can modify the permissions and ACLs on a file. If this parameter is set, then Samba overrides this restriction, and also allows the 607 \fBprimary group owner\fR 608 of a file or directory to modify the permissions and ACLs on that file. 609 .sp 610 On a Windows server, groups may be the owner of a file or directory - thus allowing anyone in that group to modify the permissions on it. This allows the delegation of security controls on a point in the filesystem to the group owner of a directory and anything below it also owned by that group. This means there are multiple people with permissions to modify ACLs on a file or directory, easing managability. 611 .sp 612 This parameter allows Samba to also permit delegation of the control over a point in the exported directory hierarchy in much the same was as Windows. This allows all members of a UNIX group to control the permissions on a file or directory they have group ownership on. 631 .PP 632 .RS 4 633 In a POSIX filesystem, only the owner of a file or directory and the superuser can modify the permissions and ACLs on a file\. If this parameter is set, then Samba overrides this restriction, and also allows the 634 \fIprimary group owner\fR 635 of a file or directory to modify the permissions and ACLs on that file\. 636 .sp 637 On a Windows server, groups may be the owner of a file or directory \- thus allowing anyone in that group to modify the permissions on it\. This allows the delegation of security controls on a point in the filesystem to the group owner of a directory and anything below it also owned by that group\. This means there are multiple people with permissions to modify ACLs on a file or directory, easing managability\. 638 .sp 639 This parameter allows Samba to also permit delegation of the control over a point in the exported directory hierarchy in much the same way as Windows\. This allows all members of a UNIX group to control the permissions on a file or directory they have group ownership on\. 613 640 .sp 614 641 This parameter is best used with the 615 inherit owner option and also on on a share containing directories with the UNIX 616 \fBsetgid bit\fR 617 bit set on them, which causes new files and directories created within it to inherit the group ownership from the containing directory. 618 .sp 619 This is parameter has been marked deprecated in Samba 3.0.23. The same behavior is now implemented by the 642 \fIinherit owner\fR 643 option and also on on a share containing directories with the UNIX 644 \fIsetgid bit\fR 645 set on them, which causes new files and directories created within it to inherit the group ownership from the containing directory\. 646 .sp 647 This is parameter has been marked deprecated in Samba 3\.0\.23\. The same behavior is now implemented by the 620 648 \fIdos filemode\fR 621 option .622 .sp 623 Default: 624 \f B\fIacl group control\fR = no\fR625 .RE 626 .PP 649 option\. 650 .sp 651 Default: 652 \fI\fIacl group control\fR\fR\fI = \fR\fIno\fR\fI \fR 653 .RE 654 627 655 acl map full control (S) 628 .RS 3n 656 .PP 657 .RS 4 629 658 This boolean parameter controls whether 630 \fBsmbd\fR(8)maps a POSIX ACE entry of "rwx" (read/write/execute), the maximum allowed POSIX permission set, into a Windows ACL of "FULL CONTROL" . If this parameter is set to true any POSIX ACE entry of "rwx" will be returned in a Windows ACL as "FULL CONTROL", is this parameter is set to false any POSIX ACE entry of "rwx" will be returned as the specific Windows ACL bits representing read, write and execute.631 .sp 632 Default: 633 \f B\fIacl map full control\fR = True\fR634 .RE 635 .PP 659 \fBsmbd\fR(8)maps a POSIX ACE entry of "rwx" (read/write/execute), the maximum allowed POSIX permission set, into a Windows ACL of "FULL CONTROL"\. If this parameter is set to true any POSIX ACE entry of "rwx" will be returned in a Windows ACL as "FULL CONTROL", is this parameter is set to false any POSIX ACE entry of "rwx" will be returned as the specific Windows ACL bits representing read, write and execute\. 660 .sp 661 Default: 662 \fI\fIacl map full control\fR\fR\fI = \fR\fITrue\fR\fI \fR 663 .RE 664 636 665 add group script (G) 637 .RS 3n 666 .PP 667 .RS 4 638 668 This is the full pathname to a script that will be run 639 \f BAS ROOT\fR669 \fIAS ROOT\fR 640 670 by 641 671 \fBsmbd\fR(8) 642 when a new group is requested . It will expand any672 when a new group is requested\. It will expand any 643 673 \fI%g\fR 644 to the group name passed . This script is only useful for installations using the Windows NT domain administration tools. The script is free to create a group with an arbitrary name to circumvent unix group name restrictions. In that case the script must print the numeric gid of the created group on stdout.645 .sp 646 Default: 647 \f B\fIadd group script\fR =\fR648 .sp 649 Example: 650 \f B\fIadd group script\fR = /usr/sbin/groupadd %g\fR651 .RE 652 .PP 674 to the group name passed\. This script is only useful for installations using the Windows NT domain administration tools\. The script is free to create a group with an arbitrary name to circumvent unix group name restrictions\. In that case the script must print the numeric gid of the created group on stdout\. 675 .sp 676 Default: 677 \fI\fIadd group script\fR\fR\fI = \fR\fI\fR\fI \fR 678 .sp 679 Example: 680 \fI\fIadd group script\fR\fR\fI = \fR\fI/usr/sbin/groupadd %g\fR\fI \fR 681 .RE 682 653 683 add machine script (G) 654 .RS 3n 684 .PP 685 .RS 4 655 686 This is the full pathname to a script that will be run by 656 687 \fBsmbd\fR(8) 657 when a machine is added to Samba 's domain and a Unix account matching the machine's name appended with a "$" does not already exist.688 when a machine is added to Samba\'s domain and a Unix account matching the machine\'s name appended with a "$" does not already exist\. 658 689 .sp 659 690 This option is very similar to the 660 add user script, and likewise uses the %u substitution for the account name. Do not use the %m substitution.661 .sp 662 Default: 663 \f B\fIadd machine script\fR =\fR664 .sp 665 Example: 666 \f B\fIadd machine script\fR = /usr/sbin/adduser -n -g machines -c Machine -d /var/lib/nobody -s /bin/false %u\fR667 .RE 668 .PP 691 \fIadd user script\fR, and likewise uses the %u substitution for the account name\. Do not use the %m substitution\. 692 .sp 693 Default: 694 \fI\fIadd machine script\fR\fR\fI = \fR\fI\fR\fI \fR 695 .sp 696 Example: 697 \fI\fIadd machine script\fR\fR\fI = \fR\fI/usr/sbin/adduser \-n \-g machines \-c Machine \-d /var/lib/nobody \-s /bin/false %u\fR\fI \fR 698 .RE 699 669 700 add port command (G) 670 .RS 3n 671 Samba 3.0.23 introduces support for adding printer ports remotely using the Windows "Add Standard TCP/IP Port Wizard". This option defines an external program to be executed when smbd receives a request to add a new Port to the system. he script is passed two parameters: 672 .RS 3n 673 .TP 3n 674 \(bu 701 .PP 702 .RS 4 703 Samba 3\.0\.23 introduced support for adding printer ports remotely using the Windows "Add Standard TCP/IP Port Wizard"\. This option defines an external program to be executed when smbd receives a request to add a new Port to the system\. The script is passed two parameters: 704 .sp 705 .RS 4 706 .ie n \{\ 707 \h'-04'\(bu\h'+03'\c 708 .\} 709 .el \{\ 710 .sp -1 711 .IP \(bu 2.3 712 .\} 675 713 \fIport name\fR 676 .TP 3n 677 \(bu 714 .RE 715 .sp 716 .RS 4 717 .ie n \{\ 718 \h'-04'\(bu\h'+03'\c 719 .\} 720 .el \{\ 721 .sp -1 722 .IP \(bu 2.3 723 .\} 678 724 \fIdevice URI\fR 679 . RE680 . IP "" 3n681 The deviceURI is in the for of socket://<hostname>[:<portnumber>] or lpd://<hostname>/<queuename> .682 .sp 683 Default: 684 \f B\fIadd port command\fR =\fR685 .sp 686 Example: 687 \f B\fIadd port command\fR = /etc/samba/scripts/addport.sh\fR688 .RE 689 .PP 725 .sp 726 .RE 727 The deviceURI is in the for of socket://<hostname>[:<portnumber>] or lpd://<hostname>/<queuename>\. 728 .sp 729 Default: 730 \fI\fIadd port command\fR\fR\fI = \fR\fI\fR\fI \fR 731 .sp 732 Example: 733 \fI\fIadd port command\fR\fR\fI = \fR\fI/etc/samba/scripts/addport\.sh\fR\fI \fR 734 .RE 735 690 736 add printer command (G) 691 .RS 3n 692 With the introduction of MS-RPC based printing support for Windows NT/2000 clients in Samba 2.2, The MS Add Printer Wizard (APW) icon is now also available in the "Printers..." folder displayed a share listing. The APW allows for printers to be add remotely to a Samba or Windows NT/2000 print server. 693 .sp 694 For a Samba host this means that the printer must be physically added to the underlying printing system. The 737 .PP 738 .RS 4 739 With the introduction of MS\-RPC based printing support for Windows NT/2000 clients in Samba 2\.2, The MS Add Printer Wizard (APW) icon is now also available in the "Printers\.\.\." folder displayed a share listing\. The APW allows for printers to be add remotely to a Samba or Windows NT/2000 print server\. 740 .sp 741 For a Samba host this means that the printer must be physically added to the underlying printing system\. The 695 742 \fIadd printer command\fR 696 743 defines a script to be run which will perform the necessary operations for adding the printer to the print system and to add the appropriate service definition to the 697 \fIsmb .conf\fR744 \fIsmb\.conf\fR 698 745 file in order that it can be shared by 699 \fBsmbd\fR(8) .746 \fBsmbd\fR(8)\. 700 747 .sp 701 748 The 702 749 \fIaddprinter command\fR 703 750 is automatically invoked with the following parameter (in order): 704 .RS 3n 705 .TP 3n 706 \(bu 751 .sp 752 .RS 4 753 .ie n \{\ 754 \h'-04'\(bu\h'+03'\c 755 .\} 756 .el \{\ 757 .sp -1 758 .IP \(bu 2.3 759 .\} 707 760 \fIprinter name\fR 708 .TP 3n 709 \(bu 761 .RE 762 .sp 763 .RS 4 764 .ie n \{\ 765 \h'-04'\(bu\h'+03'\c 766 .\} 767 .el \{\ 768 .sp -1 769 .IP \(bu 2.3 770 .\} 710 771 \fIshare name\fR 711 .TP 3n 712 \(bu 772 .RE 773 .sp 774 .RS 4 775 .ie n \{\ 776 \h'-04'\(bu\h'+03'\c 777 .\} 778 .el \{\ 779 .sp -1 780 .IP \(bu 2.3 781 .\} 713 782 \fIport name\fR 714 .TP 3n 715 \(bu 783 .RE 784 .sp 785 .RS 4 786 .ie n \{\ 787 \h'-04'\(bu\h'+03'\c 788 .\} 789 .el \{\ 790 .sp -1 791 .IP \(bu 2.3 792 .\} 716 793 \fIdriver name\fR 717 .TP 3n 718 \(bu 794 .RE 795 .sp 796 .RS 4 797 .ie n \{\ 798 \h'-04'\(bu\h'+03'\c 799 .\} 800 .el \{\ 801 .sp -1 802 .IP \(bu 2.3 803 .\} 719 804 \fIlocation\fR 720 .TP 3n 721 \(bu 805 .RE 806 .sp 807 .RS 4 808 .ie n \{\ 809 \h'-04'\(bu\h'+03'\c 810 .\} 811 .el \{\ 812 .sp -1 813 .IP \(bu 2.3 814 .\} 722 815 \fIWindows 9x driver location\fR 723 . RE724 . IP "" 3n725 All parameters are filled in from the PRINTER_INFO_2 structure sent by the Windows NT/2000 client with one exception . The "Windows 9x driver location" parameter is included for backwards compatibility only. The remaining fields in the structure are generated from answers to the APW questions.816 .sp 817 .RE 818 All parameters are filled in from the PRINTER_INFO_2 structure sent by the Windows NT/2000 client with one exception\. The "Windows 9x driver location" parameter is included for backwards compatibility only\. The remaining fields in the structure are generated from answers to the APW questions\. 726 819 .sp 727 820 Once the … … 730 823 smbd 731 824 will reparse the 732 \fI smb .conf\fR733 to determine if the share defined by the APW exists . If the sharename is still invalid, then825 \fI smb\.conf\fR 826 to determine if the share defined by the APW exists\. If the sharename is still invalid, then 734 827 smbd 735 will return an ACCESS_DENIED error to the client .736 .sp 737 The "add printer command" program can output a single line of text, which Samba will set as the port the new printer is connected to . If this line isn't output, Samba won't reload its printer shares.738 .sp 739 Default: 740 \f B\fIadd printer command\fR =\fR741 .sp 742 Example: 743 \f B\fIadd printer command\fR = /usr/bin/addprinter\fR744 .RE 745 .PP 828 will return an ACCESS_DENIED error to the client\. 829 .sp 830 The "add printer command" program can output a single line of text, which Samba will set as the port the new printer is connected to\. If this line isn\'t output, Samba won\'t reload its printer shares\. 831 .sp 832 Default: 833 \fI\fIadd printer command\fR\fR\fI = \fR\fI\fR\fI \fR 834 .sp 835 Example: 836 \fI\fIadd printer command\fR\fR\fI = \fR\fI/usr/bin/addprinter\fR\fI \fR 837 .RE 838 746 839 add share command (G) 747 .RS 3n 748 Samba 2.2.0 introduced the ability to dynamically add and delete shares via the Windows NT 4.0 Server Manager. The 840 .PP 841 .RS 4 842 Samba 2\.2\.0 introduced the ability to dynamically add and delete shares via the Windows NT 4\.0 Server Manager\. The 749 843 \fIadd share command\fR 750 844 is used to define an external program or script which will add a new service definition to 751 \fIsmb .conf\fR. In order to successfully execute the845 \fIsmb\.conf\fR\. In order to successfully execute the 752 846 \fIadd share command\fR, 753 847 smbd 754 requires that the administrator be connected using a root account (i.e. uid == 0). 848 requires that the administrator be connected using a root account (i\.e\. uid == 0)\. 849 .sp 850 If the connected account has 851 SeDiskOperatorPrivilege, scripts defined in 852 \fIchange share\fR 853 parameter are executed as root\. 755 854 .sp 756 855 When executed, … … 758 857 will automatically invoke the 759 858 \fIadd share command\fR 760 with five parameters. 761 .RS 3n 762 .TP 3n 763 \(bu 859 with five parameters\. 860 .sp 861 .RS 4 862 .ie n \{\ 863 \h'-04'\(bu\h'+03'\c 864 .\} 865 .el \{\ 866 .sp -1 867 .IP \(bu 2.3 868 .\} 764 869 \fIconfigFile\fR 765 - the location of the global 766 \fIsmb.conf\fR 767 file. 768 .TP 3n 769 \(bu 870 \- the location of the global 871 \fIsmb\.conf\fR 872 file\. 873 .RE 874 .sp 875 .RS 4 876 .ie n \{\ 877 \h'-04'\(bu\h'+03'\c 878 .\} 879 .el \{\ 880 .sp -1 881 .IP \(bu 2.3 882 .\} 770 883 \fIshareName\fR 771 - the name of the new share. 772 .TP 3n 773 \(bu 884 \- the name of the new share\. 885 .RE 886 .sp 887 .RS 4 888 .ie n \{\ 889 \h'-04'\(bu\h'+03'\c 890 .\} 891 .el \{\ 892 .sp -1 893 .IP \(bu 2.3 894 .\} 774 895 \fIpathName\fR 775 - path to an **existing** directory on disk. 776 .TP 3n 777 \(bu 896 \- path to an **existing** directory on disk\. 897 .RE 898 .sp 899 .RS 4 900 .ie n \{\ 901 \h'-04'\(bu\h'+03'\c 902 .\} 903 .el \{\ 904 .sp -1 905 .IP \(bu 2.3 906 .\} 778 907 \fIcomment\fR 779 - comment string to associate with the new share. 780 .TP 3n 781 \(bu 908 \- comment string to associate with the new share\. 909 .RE 910 .sp 911 .RS 4 912 .ie n \{\ 913 \h'-04'\(bu\h'+03'\c 914 .\} 915 .el \{\ 916 .sp -1 917 .IP \(bu 2.3 918 .\} 782 919 \fImax connections\fR 783 Number of maximum simultaneous connections to this share .784 . RE785 . IP "" 3n786 This parameter is only used for add file shares . To add printer shares, see the787 addprinter command.788 .sp 789 Default: 790 \f B\fIadd share command\fR =\fR791 .sp 792 Example: 793 \f B\fIadd share command\fR = /usr/local/bin/addshare\fR794 .RE 795 .PP 920 Number of maximum simultaneous connections to this share\. 921 .sp 922 .RE 923 This parameter is only used for add file shares\. To add printer shares, see the 924 \fIaddprinter command\fR\. 925 .sp 926 Default: 927 \fI\fIadd share command\fR\fR\fI = \fR\fI\fR\fI \fR 928 .sp 929 Example: 930 \fI\fIadd share command\fR\fR\fI = \fR\fI/usr/local/bin/addshare\fR\fI \fR 931 .RE 932 796 933 add user script (G) 797 .RS 3n 934 .PP 935 .RS 4 798 936 This is the full pathname to a script that will be run 799 \f BAS ROOT\fR937 \fIAS ROOT\fR 800 938 by 801 939 \fBsmbd\fR(8) 802 under special circumstances described below .803 .sp 804 Normally, a Samba server requires that UNIX users are created for all users accessing files on this server . For sites that use Windows NT account databases as their primary user database creating these users and keeping the user list in sync with the Windows NT PDC is an onerous task. This option allows smbd to create the required UNIX users805 \f BON DEMAND\fR806 when a user accesses the Samba server .940 under special circumstances described below\. 941 .sp 942 Normally, a Samba server requires that UNIX users are created for all users accessing files on this server\. For sites that use Windows NT account databases as their primary user database creating these users and keeping the user list in sync with the Windows NT PDC is an onerous task\. This option allows smbd to create the required UNIX users 943 \fION DEMAND\fR 944 when a user accesses the Samba server\. 807 945 .sp 808 946 In order to use this option, 809 947 \fBsmbd\fR(8) 810 948 must 811 \f BNOT\fR949 \fINOT\fR 812 950 be set to 813 security = share and 814 add user script must be set to a full pathname for a script that will create a UNIX user given one argument of 815 \fI%u\fR, which expands into the UNIX user name to create. 951 \fIsecurity = share\fR 952 and 953 \fIadd user script\fR 954 must be set to a full pathname for a script that will create a UNIX user given one argument of 955 \fI%u\fR, which expands into the UNIX user name to create\. 816 956 .sp 817 957 When the Windows user attempts to access the Samba server, at login (session setup in the SMB protocol) time, 818 958 \fBsmbd\fR(8) 819 959 contacts the 820 password server and attempts to authenticate the given user with the given password. If the authentication succeeds then 960 \fIpassword server\fR 961 and attempts to authenticate the given user with the given password\. If the authentication succeeds then 821 962 smbd 822 attempts to find a UNIX user in the UNIX password database to map the Windows user into. If this lookup fails, and 823 add user script is set then 963 attempts to find a UNIX user in the UNIX password database to map the Windows user into\. If this lookup fails, and 964 \fIadd user script\fR 965 is set then 824 966 smbd 825 967 will call the specified script 826 \f BAS ROOT\fR, expanding any968 \fIAS ROOT\fR, expanding any 827 969 \fI%u\fR 828 argument to be the user name to create .970 argument to be the user name to create\. 829 971 .sp 830 972 If this script successfully creates the user then 831 973 smbd 832 will continue on as though the UNIX user already existed . In this way, UNIX users are dynamically created to match existing Windows NT accounts.974 will continue on as though the UNIX user already existed\. In this way, UNIX users are dynamically created to match existing Windows NT accounts\. 833 975 .sp 834 976 See also 835 security,836 password server,837 delete user script.838 .sp 839 Default: 840 \f B\fIadd user script\fR =\fR841 .sp 842 Example: 843 \f B\fIadd user script\fR = /usr/local/samba/bin/add_user %u\fR844 .RE 845 .PP 977 \fIsecurity\fR, 978 \fIpassword server\fR, 979 \fIdelete user script\fR\. 980 .sp 981 Default: 982 \fI\fIadd user script\fR\fR\fI = \fR\fI\fR\fI \fR 983 .sp 984 Example: 985 \fI\fIadd user script\fR\fR\fI = \fR\fI/usr/local/samba/bin/add_user %u\fR\fI \fR 986 .RE 987 846 988 add user to group script (G) 847 .RS 3n 848 Full path to the script that will be called when a user is added to a group using the Windows NT domain administration tools. It will be run by 989 .PP 990 .RS 4 991 Full path to the script that will be called when a user is added to a group using the Windows NT domain administration tools\. It will be run by 849 992 \fBsmbd\fR(8) 850 \f BAS ROOT\fR. Any993 \fIAS ROOT\fR\. Any 851 994 \fI%g\fR 852 995 will be replaced with the group name and any 853 996 \fI%u\fR 854 will be replaced with the user name .997 will be replaced with the user name\. 855 998 .sp 856 999 Note that the 857 1000 adduser 858 command used in the example below does not support the used syntax on all systems .859 .sp 860 Default: 861 \f B\fIadd user to group script\fR =\fR862 .sp 863 Example: 864 \f B\fIadd user to group script\fR = /usr/sbin/adduser %u %g\fR865 .RE 866 .PP 1001 command used in the example below does not support the used syntax on all systems\. 1002 .sp 1003 Default: 1004 \fI\fIadd user to group script\fR\fR\fI = \fR\fI\fR\fI \fR 1005 .sp 1006 Example: 1007 \fI\fIadd user to group script\fR\fR\fI = \fR\fI/usr/sbin/adduser %u %g\fR\fI \fR 1008 .RE 1009 867 1010 admin users (S) 868 .RS 3n 869 This is a list of users who will be granted administrative privileges on the share. This means that they will do all file operations as the super-user (root). 870 .sp 871 You should use this option very carefully, as any user in this list will be able to do anything they like on the share, irrespective of file permissions. 1011 .PP 1012 .RS 4 1013 This is a list of users who will be granted administrative privileges on the share\. This means that they will do all file operations as the super\-user (root)\. 1014 .sp 1015 You should use this option very carefully, as any user in this list will be able to do anything they like on the share, irrespective of file permissions\. 872 1016 .sp 873 1017 This parameter will not work with the 874 security = share in Samba 3.0. This is by design. 875 .sp 876 Default: 877 \fB\fIadmin users\fR = \fR 878 .sp 879 Example: 880 \fB\fIadmin users\fR = jason \fR 881 .RE 882 .PP 1018 \fIsecurity = share\fR 1019 in Samba 3\.0\. This is by design\. 1020 .sp 1021 Default: 1022 \fI\fIadmin users\fR\fR\fI = \fR\fI\fR\fI \fR 1023 .sp 1024 Example: 1025 \fI\fIadmin users\fR\fR\fI = \fR\fIjason\fR\fI \fR 1026 .RE 1027 883 1028 afs share (S) 884 .RS 3n 885 This parameter controls whether special AFS features are enabled for this share. If enabled, it assumes that the directory exported via the 1029 .PP 1030 .RS 4 1031 This parameter controls whether special AFS features are enabled for this share\. If enabled, it assumes that the directory exported via the 886 1032 \fIpath\fR 887 parameter is a local AFS import . The special AFS features include the attempt to hand-craft an AFS token if you enabled --with-fake-kaserver in configure.888 .sp 889 Default: 890 \f B\fIafs share\fR = no\fR891 .RE 892 .PP 1033 parameter is a local AFS import\. The special AFS features include the attempt to hand\-craft an AFS token if you enabled \-\-with\-fake\-kaserver in configure\. 1034 .sp 1035 Default: 1036 \fI\fIafs share\fR\fR\fI = \fR\fIno\fR\fI \fR 1037 .RE 1038 893 1039 afs username map (G) 894 .RS 3n 895 If you are using the fake kaserver AFS feature, you might want to hand-craft the usernames you are creating tokens for. For example this is necessary if you have users from several domain in your AFS Protection Database. One possible scheme to code users as DOMAIN+User as it is done by winbind with the + as a separator. 896 .sp 897 The mapped user name must contain the cell name to log into, so without setting this parameter there will be no token. 898 .sp 899 Default: 900 \fB\fIafs username map\fR = \fR 901 .sp 902 Example: 903 \fB\fIafs username map\fR = %u@afs.samba.org \fR 904 .RE 905 .PP 1040 .PP 1041 .RS 4 1042 If you are using the fake kaserver AFS feature, you might want to hand\-craft the usernames you are creating tokens for\. For example this is necessary if you have users from several domain in your AFS Protection Database\. One possible scheme to code users as DOMAIN+User as it is done by winbind with the + as a separator\. 1043 .sp 1044 The mapped user name must contain the cell name to log into, so without setting this parameter there will be no token\. 1045 .sp 1046 Default: 1047 \fI\fIafs username map\fR\fR\fI = \fR\fI\fR\fI \fR 1048 .sp 1049 Example: 1050 \fI\fIafs username map\fR\fR\fI = \fR\fI%u@afs\.samba\.org\fR\fI \fR 1051 .RE 1052 906 1053 aio read size (S) 907 .RS 3n 908 If Samba has been built with asynchronous I/O support and this integer parameter is set to non-zero value, Samba will read from file asynchronously when size of request is bigger than this value. Note that it happens only for non-chained and non-chaining reads and when not using write cache. 909 .sp 910 Current implementation of asynchronous I/O in Samba 3.0 does support only up to 10 outstanding asynchronous requests, read and write combined. 911 .sp 912 913 914 write cache size 915 aio write size 916 917 Default: 918 \fB\fIaio read size\fR = 0 \fR 919 .sp 920 Example: 921 \fB\fIaio read size\fR = 16384 # Use asynchronous I/O for reads bigger than 16KB request size \fR 922 .RE 923 .PP 1054 .PP 1055 .RS 4 1056 If Samba has been built with asynchronous I/O support and this integer parameter is set to non\-zero value, Samba will read from file asynchronously when size of request is bigger than this value\. Note that it happens only for non\-chained and non\-chaining reads and when not using write cache\. 1057 .sp 1058 Current implementation of asynchronous I/O in Samba 3\.0 does support only up to 10 outstanding asynchronous requests, read and write combined\. 1059 .sp 1060 Related command: 1061 \fIwrite cache size\fR 1062 .sp 1063 Related command: 1064 \fIaio write size\fR 1065 .sp 1066 Default: 1067 \fI\fIaio read size\fR\fR\fI = \fR\fI0\fR\fI \fR 1068 .sp 1069 Example: 1070 \fI\fIaio read size\fR\fR\fI = \fR\fI16384 # Use asynchronous I/O for reads bigger than 16KB request size\fR\fI \fR 1071 .RE 1072 924 1073 aio write size (S) 925 .RS 3n 926 If Samba has been built with asynchronous I/O support and this integer parameter is set to non-zero value, Samba will write to file asynchronously when size of request is bigger than this value. Note that it happens only for non-chained and non-chaining reads and when not using write cache. 927 .sp 928 Current implementation of asynchronous I/O in Samba 3.0 does support only up to 10 outstanding asynchronous requests, read and write combined. 929 .sp 930 931 932 write cache size 933 aio read size 934 935 Default: 936 \fB\fIaio write size\fR = 0 \fR 937 .sp 938 Example: 939 \fB\fIaio write size\fR = 16384 # Use asynchronous I/O for writes bigger than 16KB request size \fR 940 .RE 941 .PP 1074 .PP 1075 .RS 4 1076 If Samba has been built with asynchronous I/O support and this integer parameter is set to non\-zero value, Samba will write to file asynchronously when size of request is bigger than this value\. Note that it happens only for non\-chained and non\-chaining reads and when not using write cache\. 1077 .sp 1078 Current implementation of asynchronous I/O in Samba 3\.0 does support only up to 10 outstanding asynchronous requests, read and write combined\. 1079 .sp 1080 Related command: 1081 \fIwrite cache size\fR 1082 .sp 1083 Related command: 1084 \fIaio read size\fR 1085 .sp 1086 Default: 1087 \fI\fIaio write size\fR\fR\fI = \fR\fI0\fR\fI \fR 1088 .sp 1089 Example: 1090 \fI\fIaio write size\fR\fR\fI = \fR\fI16384 # Use asynchronous I/O for writes bigger than 16KB request size\fR\fI \fR 1091 .RE 1092 942 1093 algorithmic rid base (G) 943 .RS 3n 944 This determines how Samba will use its algorithmic mapping from uids/gid to the RIDs needed to construct NT Security Identifiers. 945 .sp 946 Setting this option to a larger value could be useful to sites transitioning from WinNT and Win2k, as existing user and group rids would otherwise clash with sytem users etc. 947 .sp 948 All UIDs and GIDs must be able to be resolved into SIDs for the correct operation of ACLs on the server. As such the algorithmic mapping can't be 'turned off', but pushing it 'out of the way' should resolve the issues. Users and groups can then be assigned 'low' RIDs in arbitary-rid supporting backends. 949 .sp 950 Default: 951 \fB\fIalgorithmic rid base\fR = 1000 \fR 952 .sp 953 Example: 954 \fB\fIalgorithmic rid base\fR = 100000 \fR 955 .RE 956 .PP 1094 .PP 1095 .RS 4 1096 This determines how Samba will use its algorithmic mapping from uids/gid to the RIDs needed to construct NT Security Identifiers\. 1097 .sp 1098 Setting this option to a larger value could be useful to sites transitioning from WinNT and Win2k, as existing user and group rids would otherwise clash with sytem users etc\. 1099 .sp 1100 All UIDs and GIDs must be able to be resolved into SIDs for the correct operation of ACLs on the server\. As such the algorithmic mapping can\'t be \'turned off\', but pushing it \'out of the way\' should resolve the issues\. Users and groups can then be assigned \'low\' RIDs in arbitrary\-rid supporting backends\. 1101 .sp 1102 Default: 1103 \fI\fIalgorithmic rid base\fR\fR\fI = \fR\fI1000\fR\fI \fR 1104 .sp 1105 Example: 1106 \fI\fIalgorithmic rid base\fR\fR\fI = \fR\fI100000\fR\fI \fR 1107 .RE 1108 957 1109 allocation roundup size (S) 958 .RS 3n 959 This parameter allows an administrator to tune the allocation size reported to Windows clients. The default size of 1Mb generally results in improved Windows client performance. However, rounding the allocation size may cause difficulties for some applications, e.g. MS Visual Studio. If the MS Visual Studio compiler starts to crash with an internal error, set this parameter to zero for this share. 960 .sp 961 The integer parameter specifies the roundup size in bytes. 962 .sp 963 Default: 964 \fB\fIallocation roundup size\fR = 1048576 \fR 965 .sp 966 Example: 967 \fB\fIallocation roundup size\fR = 0 # (to disable roundups) \fR 968 .RE 969 .PP 1110 .PP 1111 .RS 4 1112 This parameter allows an administrator to tune the allocation size reported to Windows clients\. The default size of 1Mb generally results in improved Windows client performance\. However, rounding the allocation size may cause difficulties for some applications, e\.g\. MS Visual Studio\. If the MS Visual Studio compiler starts to crash with an internal error, set this parameter to zero for this share\. 1113 .sp 1114 The integer parameter specifies the roundup size in bytes\. 1115 .sp 1116 Default: 1117 \fI\fIallocation roundup size\fR\fR\fI = \fR\fI1048576\fR\fI \fR 1118 .sp 1119 Example: 1120 \fI\fIallocation roundup size\fR\fR\fI = \fR\fI0 # (to disable roundups)\fR\fI \fR 1121 .RE 1122 970 1123 allow trusted domains (G) 971 .RS 3n 1124 .PP 1125 .RS 4 972 1126 This option only takes effect when the 973 security option is set to 1127 \fIsecurity\fR 1128 option is set to 974 1129 \fBserver\fR, 975 1130 \fBdomain\fR 976 1131 or 977 \fBads\fR . If it is set to no, then attempts to connect to a resource from a domain or workgroup other than the one which smbd is running in will fail, even if that domain is trusted by the remote server doing the authentication.978 .sp 979 This is useful if you only want your Samba server to serve resources to users in the domain it is a member of . As an example, suppose that there are two domains DOMA and DOMB. DOMB is trusted by DOMA, which contains the Samba server. Under normal circumstances, a user with an account in DOMB can then access the resources of a UNIX account with the same account name on the Samba server even if they do not have an account in DOMA. This can make implementing a security boundary difficult.980 .sp 981 Default: 982 \f B\fIallow trusted domains\fR = yes\fR983 .RE 984 .PP 1132 \fBads\fR\. If it is set to no, then attempts to connect to a resource from a domain or workgroup other than the one which smbd is running in will fail, even if that domain is trusted by the remote server doing the authentication\. 1133 .sp 1134 This is useful if you only want your Samba server to serve resources to users in the domain it is a member of\. As an example, suppose that there are two domains DOMA and DOMB\. DOMB is trusted by DOMA, which contains the Samba server\. Under normal circumstances, a user with an account in DOMB can then access the resources of a UNIX account with the same account name on the Samba server even if they do not have an account in DOMA\. This can make implementing a security boundary difficult\. 1135 .sp 1136 Default: 1137 \fI\fIallow trusted domains\fR\fR\fI = \fR\fIyes\fR\fI \fR 1138 .RE 1139 985 1140 announce as (G) 986 .RS 3n 1141 .PP 1142 .RS 4 987 1143 This specifies what type of server 988 1144 \fBnmbd\fR(8) 989 will announce itself as, to a network neighborhood browse list . By default this is set to Windows NT. The valid options are : "NT Server" (which can also be written as "NT"), "NT Workstation", "Win95" or "WfW" meaning Windows NT Server, Windows NT Workstation, Windows 95 and Windows for Workgroups respectively. Do not change this parameter unless you have a specific need to stop Samba appearing as an NT server as this may prevent Samba servers from participating as browser servers correctly.990 .sp 991 Default: 992 \f B\fIannounce as\fR = NT Server\fR993 .sp 994 Example: 995 \f B\fIannounce as\fR = Win95\fR996 .RE 997 .PP 1145 will announce itself as, to a network neighborhood browse list\. By default this is set to Windows NT\. The valid options are : "NT Server" (which can also be written as "NT"), "NT Workstation", "Win95" or "WfW" meaning Windows NT Server, Windows NT Workstation, Windows 95 and Windows for Workgroups respectively\. Do not change this parameter unless you have a specific need to stop Samba appearing as an NT server as this may prevent Samba servers from participating as browser servers correctly\. 1146 .sp 1147 Default: 1148 \fI\fIannounce as\fR\fR\fI = \fR\fINT Server\fR\fI \fR 1149 .sp 1150 Example: 1151 \fI\fIannounce as\fR\fR\fI = \fR\fIWin95\fR\fI \fR 1152 .RE 1153 998 1154 announce version (G) 999 .RS 3n 1000 This specifies the major and minor version numbers that nmbd will use when announcing itself as a server. The default is 4.9. Do not change this parameter unless you have a specific need to set a Samba server to be a downlevel server. 1001 .sp 1002 Default: 1003 \fB\fIannounce version\fR = 4.9 \fR 1004 .sp 1005 Example: 1006 \fB\fIannounce version\fR = 2.0 \fR 1007 .RE 1008 .PP 1155 .PP 1156 .RS 4 1157 This specifies the major and minor version numbers that nmbd will use when announcing itself as a server\. The default is 4\.9\. Do not change this parameter unless you have a specific need to set a Samba server to be a downlevel server\. 1158 .sp 1159 Default: 1160 \fI\fIannounce version\fR\fR\fI = \fR\fI4\.9\fR\fI \fR 1161 .sp 1162 Example: 1163 \fI\fIannounce version\fR\fR\fI = \fR\fI2\.0\fR\fI \fR 1164 .RE 1165 1009 1166 auth methods (G) 1010 .RS 3n 1167 .PP 1168 .RS 4 1011 1169 This option allows the administrator to chose what authentication methods 1012 1170 smbd 1013 will use when authenticating a user . This option defaults to sensible values based on1014 security. This should be considered a developer option and used only in rare circumstances. In the majority (if not all) of production servers, the default setting should be adequate.1015 .sp 1016 Each entry in the list attempts to authenticate the user in turn, until the user authenticates . In practice only one method will ever actually be able to complete the authentication.1171 will use when authenticating a user\. This option defaults to sensible values based on 1172 \fIsecurity\fR\. This should be considered a developer option and used only in rare circumstances\. In the majority (if not all) of production servers, the default setting should be adequate\. 1173 .sp 1174 Each entry in the list attempts to authenticate the user in turn, until the user authenticates\. In practice only one method will ever actually be able to complete the authentication\. 1017 1175 .sp 1018 1176 Possible options include … … 1024 1182 (relay authentication requests for remote users through winbindd), 1025 1183 \fBntdomain\fR 1026 (pre -winbindd method of authentication for remote domain users; deprecated in favour of winbind method),1184 (pre\-winbindd method of authentication for remote domain users; deprecated in favour of winbind method), 1027 1185 \fBtrustdomain\fR 1028 (authenticate trusted users by contacting the remote DC directly from smbd; deprecated in favour of winbind method) .1029 .sp 1030 Default: 1031 \f B\fIauth methods\fR =\fR1032 .sp 1033 Example: 1034 \f B\fIauth methods\fR = guest sam winbind\fR1035 .RE 1036 .PP 1186 (authenticate trusted users by contacting the remote DC directly from smbd; deprecated in favour of winbind method)\. 1187 .sp 1188 Default: 1189 \fI\fIauth methods\fR\fR\fI = \fR\fI\fR\fI \fR 1190 .sp 1191 Example: 1192 \fI\fIauth methods\fR\fR\fI = \fR\fIguest sam winbind\fR\fI \fR 1193 .RE 1194 1037 1195 available (S) 1038 .RS 3n 1039 This parameter lets you "turn off" a service. If 1196 .PP 1197 .RS 4 1198 This parameter lets you "turn off" a service\. If 1040 1199 \fIavailable = no\fR, then 1041 \f BALL\fR1042 attempts to connect to the service will fail . Such failures are logged.1043 .sp 1044 Default: 1045 \f B\fIavailable\fR = yes\fR1046 .RE 1047 .PP 1200 \fIALL\fR 1201 attempts to connect to the service will fail\. Such failures are logged\. 1202 .sp 1203 Default: 1204 \fI\fIavailable\fR\fR\fI = \fR\fIyes\fR\fI \fR 1205 .RE 1206 1048 1207 bind interfaces only (G) 1049 .RS 3n 1050 This global parameter allows the Samba admin to limit what interfaces on a machine will serve SMB requests. It affects file service 1208 .PP 1209 .RS 4 1210 This global parameter allows the Samba admin to limit what interfaces on a machine will serve SMB requests\. It affects file service 1051 1211 \fBsmbd\fR(8) 1052 1212 and name service 1053 1213 \fBnmbd\fR(8) 1054 in a slightly different ways .1214 in a slightly different ways\. 1055 1215 .sp 1056 1216 For name service it causes 1057 1217 nmbd 1058 1218 to bind to ports 137 and 138 on the interfaces listed in the 1059 interfaces parameter. 1219 \fIinterfaces\fR 1220 parameter\. 1060 1221 nmbd 1061 also binds to the "all addresses" interface (0 .0.0.0) on ports 137 and 138 for the purposes of reading broadcast messages. If this option is not set then1222 also binds to the "all addresses" interface (0\.0\.0\.0) on ports 137 and 138 for the purposes of reading broadcast messages\. If this option is not set then 1062 1223 nmbd 1063 will service name requests on all of these sockets. If 1064 bind interfaces only is set then 1224 will service name requests on all of these sockets\. If 1225 \fIbind interfaces only\fR 1226 is set then 1065 1227 nmbd 1066 will check the source address of any packets coming in on the broadcast sockets and discard any that don't match the broadcast addresses of the interfaces in the 1067 interfaces parameter list. As unicast packets are received on the other sockets it allows 1228 will check the source address of any packets coming in on the broadcast sockets and discard any that don\'t match the broadcast addresses of the interfaces in the 1229 \fIinterfaces\fR 1230 parameter list\. As unicast packets are received on the other sockets it allows 1068 1231 nmbd 1069 1232 to refuse to serve names to machines that send packets that arrive through any interfaces not listed in the 1070 interfaces list. IP Source address spoofing does defeat this simple check, however, so it must not be used seriously as a security feature for 1071 nmbd. 1233 \fIinterfaces\fR 1234 list\. IP Source address spoofing does defeat this simple check, however, so it must not be used seriously as a security feature for 1235 nmbd\. 1072 1236 .sp 1073 1237 For file service it causes 1074 1238 \fBsmbd\fR(8) 1075 1239 to bind only to the interface list given in the 1076 interfaces parameter. This restricts the networks that 1240 \fIinterfaces\fR 1241 parameter\. This restricts the networks that 1077 1242 smbd 1078 will serve to packets coming in those interfaces . Note that you should not use this parameter for machines that are serving PPP or other intermittent or non-broadcast network interfaces as it will not cope with non-permanent interfaces.1243 will serve to packets coming in those interfaces\. Note that you should not use this parameter for machines that are serving PPP or other intermittent or non\-broadcast network interfaces as it will not cope with non\-permanent interfaces\. 1079 1244 .sp 1080 1245 If 1081 bind interfaces only is set then unless the network address 1082 \fB127.0.0.1\fR 1246 \fIbind interfaces only\fR 1247 is set then unless the network address 1248 \fI127\.0\.0\.1\fR 1083 1249 is added to the 1084 interfaces parameter list 1250 \fIinterfaces\fR 1251 parameter list 1085 1252 \fBsmbpasswd\fR(8) 1086 1253 and 1087 1254 \fBswat\fR(8) 1088 may not work as expected due to the reasons covered below .1255 may not work as expected due to the reasons covered below\. 1089 1256 .sp 1090 1257 To change a users SMB password, the 1091 1258 smbpasswd 1092 1259 by default connects to the 1093 \fBlocalhost - 127.0.0.1\fR 1094 address as an SMB client to issue the password change request. If 1095 bind interfaces only is set then unless the network address 1096 \fB127.0.0.1\fR 1260 \fIlocalhost \- 127\.0\.0\.1\fR 1261 address as an SMB client to issue the password change request\. If 1262 \fIbind interfaces only\fR 1263 is set then unless the network address 1264 \fI127\.0\.0\.1\fR 1097 1265 is added to the 1098 interfaces parameter list then 1266 \fIinterfaces\fR 1267 parameter list then 1099 1268 smbpasswd 1100 will fail to connect in it 's default mode.1269 will fail to connect in it\'s default mode\. 1101 1270 smbpasswd 1102 1271 can be forced to use the primary IP interface of the local host by using its 1103 1272 \fBsmbpasswd\fR(8) 1104 \fI -r \fR\fI\fIremote machine\fR\fR1273 \fI\-r \fR\fI\fIremote machine\fR\fR 1105 1274 parameter, with 1106 1275 \fIremote machine\fR 1107 set to the IP name of the primary interface of the local host .1276 set to the IP name of the primary interface of the local host\. 1108 1277 .sp 1109 1278 The … … 1114 1283 nmbd 1115 1284 at the address 1116 \f B127.0.0.1\fR1117 to determine if they are running . Not adding1118 \f B127.0.0.1\fR1285 \fI127\.0\.0\.1\fR 1286 to determine if they are running\. Not adding 1287 \fI127\.0\.0\.1\fR 1119 1288 will cause 1120 1289 smbd 1121 1290 and 1122 1291 nmbd 1123 to always show "not running" even if they really are . This can prevent1292 to always show "not running" even if they really are\. This can prevent 1124 1293 swat 1125 1294 from starting/stopping/restarting 1126 1295 smbd 1127 1296 and 1128 nmbd .1129 .sp 1130 Default: 1131 \f B\fIbind interfaces only\fR = no\fR1132 .RE 1133 .PP 1297 nmbd\. 1298 .sp 1299 Default: 1300 \fI\fIbind interfaces only\fR\fR\fI = \fR\fIno\fR\fI \fR 1301 .RE 1302 1134 1303 blocking locks (S) 1135 .RS 3n 1304 .PP 1305 .RS 4 1136 1306 This parameter controls the behavior of 1137 1307 \fBsmbd\fR(8) 1138 when given a request by a client to obtain a byte range lock on a region of an open file, and the request has a time limit associated with it .1139 .sp 1140 If this parameter is set and the lock range requested cannot be immediately satisfied, samba will internally queue the lock request, and periodically attempt to obtain the lock until the timeout period expires .1308 when given a request by a client to obtain a byte range lock on a region of an open file, and the request has a time limit associated with it\. 1309 .sp 1310 If this parameter is set and the lock range requested cannot be immediately satisfied, samba will internally queue the lock request, and periodically attempt to obtain the lock until the timeout period expires\. 1141 1311 .sp 1142 1312 If this parameter is set to 1143 \fBno\fR, then samba will behave as previous versions of Samba would and will fail the lock request immediately if the lock range cannot be obtained .1144 .sp 1145 Default: 1146 \f B\fIblocking locks\fR = yes\fR1147 .RE 1148 .PP 1313 \fBno\fR, then samba will behave as previous versions of Samba would and will fail the lock request immediately if the lock range cannot be obtained\. 1314 .sp 1315 Default: 1316 \fI\fIblocking locks\fR\fR\fI = \fR\fIyes\fR\fI \fR 1317 .RE 1318 1149 1319 block size (S) 1150 .RS 3n 1320 .PP 1321 .RS 4 1151 1322 This parameter controls the behavior of 1152 1323 \fBsmbd\fR(8) 1153 when reporting disk free sizes . By default, this reports a disk block size of 1024 bytes.1154 .sp 1155 Changing this parameter may have some effect on the efficiency of client writes, this is not yet confirmed . This parameter was added to allow advanced administrators to change it (usually to a higher value) and test the effect it has on client write performance without re-compiling the code. As this is an experimental option it may be removed in a future release.1156 .sp 1157 Changing this option does not change the disk free reporting size, just the block size unit reported to the client .1158 .sp 1159 Default: 1160 \f B\fIblock size\fR = 1024\fR1161 .sp 1162 Example: 1163 \f B\fIblock size\fR = 4096\fR1164 .RE 1165 .PP1166 browsable 1167 .RS 3n 1168 This parameter is a synonym for browseable.1169 .RE 1170 .PP 1324 when reporting disk free sizes\. By default, this reports a disk block size of 1024 bytes\. 1325 .sp 1326 Changing this parameter may have some effect on the efficiency of client writes, this is not yet confirmed\. This parameter was added to allow advanced administrators to change it (usually to a higher value) and test the effect it has on client write performance without re\-compiling the code\. As this is an experimental option it may be removed in a future release\. 1327 .sp 1328 Changing this option does not change the disk free reporting size, just the block size unit reported to the client\. 1329 .sp 1330 Default: 1331 \fI\fIblock size\fR\fR\fI = \fR\fI1024\fR\fI \fR 1332 .sp 1333 Example: 1334 \fI\fIblock size\fR\fR\fI = \fR\fI4096\fR\fI \fR 1335 .RE 1336 browsable.PP 1337 .RS 4 1338 This parameter is a synonym for 1339 browseable\. 1340 .RE 1341 1171 1342 browseable (S) 1172 .RS 3n 1173 This controls whether this share is seen in the list of available shares in a net view and in the browse list. 1174 .sp 1175 Default: 1176 \fB\fIbrowseable\fR = yes \fR 1177 .RE 1178 .PP 1343 .PP 1344 .RS 4 1345 This controls whether this share is seen in the list of available shares in a net view and in the browse list\. 1346 .sp 1347 Default: 1348 \fI\fIbrowseable\fR\fR\fI = \fR\fIyes\fR\fI \fR 1349 .RE 1350 1179 1351 browse list (G) 1180 .RS 3n 1352 .PP 1353 .RS 4 1181 1354 This controls whether 1182 1355 \fBsmbd\fR(8) 1183 1356 will serve a browse list to a client doing a 1184 1357 NetServerEnum 1185 call . Normally set to1186 \fByes\fR . You should never need to change this.1187 .sp 1188 Default: 1189 \f B\fIbrowse list\fR = yes\fR1190 .RE 1191 .PP1192 casesignames 1193 .RS 3n 1194 This parameter is a synonym for case sensitive.1195 .RE 1196 .PP 1358 call\. Normally set to 1359 \fByes\fR\. You should never need to change this\. 1360 .sp 1361 Default: 1362 \fI\fIbrowse list\fR\fR\fI = \fR\fIyes\fR\fI \fR 1363 .RE 1364 casesignames.PP 1365 .RS 4 1366 This parameter is a synonym for 1367 case sensitive\. 1368 .RE 1369 1197 1370 case sensitive (S) 1198 .RS 3n 1371 .PP 1372 .RS 4 1199 1373 See the discussion in the section 1200 name mangling.1201 .sp 1202 Default: 1203 \f B\fIcase sensitive\fR = no\fR1204 .RE 1205 .PP 1374 \fIname mangling\fR\. 1375 .sp 1376 Default: 1377 \fI\fIcase sensitive\fR\fR\fI = \fR\fIno\fR\fI \fR 1378 .RE 1379 1206 1380 change notify (S) 1207 .RS 3n 1208 This parameter specifies whether Samba should reply to a client's file change notify requests. 1381 .PP 1382 .RS 4 1383 This parameter specifies whether Samba should reply to a client\'s file change notify requests\. 1209 1384 .sp 1210 1385 You should never need to change this parameter 1211 1386 .sp 1212 1387 Default: 1213 \f B\fIchange notify\fR = no\fR1214 .RE 1215 .PP 1388 \fI\fIchange notify\fR\fR\fI = \fR\fIyes\fR\fI \fR 1389 .RE 1390 1216 1391 change share command (G) 1217 .RS 3n 1218 Samba 2.2.0 introduced the ability to dynamically add and delete shares via the Windows NT 4.0 Server Manager. The 1392 .PP 1393 .RS 4 1394 Samba 2\.2\.0 introduced the ability to dynamically add and delete shares via the Windows NT 4\.0 Server Manager\. The 1219 1395 \fIchange share command\fR 1220 1396 is used to define an external program or script which will modify an existing service definition in 1221 \fIsmb .conf\fR. In order to successfully execute the1397 \fIsmb\.conf\fR\. In order to successfully execute the 1222 1398 \fIchange share command\fR, 1223 1399 smbd 1224 requires that the administrator be connected using a root account (i.e. uid == 0). 1400 requires that the administrator be connected using a root account (i\.e\. uid == 0)\. 1401 .sp 1402 If the connected account has 1403 SeDiskOperatorPrivilege, scripts defined in 1404 \fIchange share\fR 1405 parameter are executed as root\. 1225 1406 .sp 1226 1407 When executed, … … 1228 1409 will automatically invoke the 1229 1410 \fIchange share command\fR 1230 with five parameters. 1231 .RS 3n 1232 .TP 3n 1233 \(bu 1411 with five parameters\. 1412 .sp 1413 .RS 4 1414 .ie n \{\ 1415 \h'-04'\(bu\h'+03'\c 1416 .\} 1417 .el \{\ 1418 .sp -1 1419 .IP \(bu 2.3 1420 .\} 1234 1421 \fIconfigFile\fR 1235 - the location of the global 1236 \fIsmb.conf\fR 1237 file. 1238 .TP 3n 1239 \(bu 1422 \- the location of the global 1423 \fIsmb\.conf\fR 1424 file\. 1425 .RE 1426 .sp 1427 .RS 4 1428 .ie n \{\ 1429 \h'-04'\(bu\h'+03'\c 1430 .\} 1431 .el \{\ 1432 .sp -1 1433 .IP \(bu 2.3 1434 .\} 1240 1435 \fIshareName\fR 1241 - the name of the new share. 1242 .TP 3n 1243 \(bu 1436 \- the name of the new share\. 1437 .RE 1438 .sp 1439 .RS 4 1440 .ie n \{\ 1441 \h'-04'\(bu\h'+03'\c 1442 .\} 1443 .el \{\ 1444 .sp -1 1445 .IP \(bu 2.3 1446 .\} 1244 1447 \fIpathName\fR 1245 - path to an **existing** directory on disk. 1246 .TP 3n 1247 \(bu 1448 \- path to an **existing** directory on disk\. 1449 .RE 1450 .sp 1451 .RS 4 1452 .ie n \{\ 1453 \h'-04'\(bu\h'+03'\c 1454 .\} 1455 .el \{\ 1456 .sp -1 1457 .IP \(bu 2.3 1458 .\} 1248 1459 \fIcomment\fR 1249 - comment string to associate with the new share. 1250 .TP 3n 1251 \(bu 1460 \- comment string to associate with the new share\. 1461 .RE 1462 .sp 1463 .RS 4 1464 .ie n \{\ 1465 \h'-04'\(bu\h'+03'\c 1466 .\} 1467 .el \{\ 1468 .sp -1 1469 .IP \(bu 2.3 1470 .\} 1252 1471 \fImax connections\fR 1253 Number of maximum simultaneous connections to this share .1254 . RE1255 . IP "" 3n1256 This parameter is only used modify existing file shares definitions . To modify printer shares, use the "Printers..." folder as seen when browsing the Samba host.1257 .sp 1258 Default: 1259 \f B\fIchange share command\fR =\fR1260 .sp 1261 Example: 1262 \f B\fIchange share command\fR = /usr/local/bin/addshare\fR1263 .RE 1264 .PP 1472 Number of maximum simultaneous connections to this share\. 1473 .sp 1474 .RE 1475 This parameter is only used modify existing file shares definitions\. To modify printer shares, use the "Printers\.\.\." folder as seen when browsing the Samba host\. 1476 .sp 1477 Default: 1478 \fI\fIchange share command\fR\fR\fI = \fR\fI\fR\fI \fR 1479 .sp 1480 Example: 1481 \fI\fIchange share command\fR\fR\fI = \fR\fI/usr/local/bin/addshare\fR\fI \fR 1482 .RE 1483 1265 1484 check password script (G) 1266 .RS 3n 1267 The name of a program that can be used to check password complexity. The password is sent to the program's standrad input. 1268 .sp 1269 The program must return 0 on good password any other value otherwise. In case the password is considered weak (the program do not return 0) the user will be notified and the password change will fail. 1270 .sp 1271 Note: In the example directory there is a sample program called crackcheck that uses cracklib to checkpassword quality 1272 .sp 1273 . 1274 1275 1276 Default: 1277 \fB\fIcheck password script\fR = Disabled \fR 1278 .sp 1279 Example: 1280 \fB\fIcheck password script\fR = check password script = /usr/local/sbin/crackcheck \fR 1281 .RE 1282 .PP 1485 .PP 1486 .RS 4 1487 The name of a program that can be used to check password complexity\. The password is sent to the program\'s standrad input\. 1488 .sp 1489 The program must return 0 on good password any other value otherwise\. In case the password is considered weak (the program do not return 0) the user will be notified and the password change will fail\. 1490 .sp 1491 Note: In the example directory there is a sample program called crackcheck that uses cracklib to checkpassword quality\. 1492 .sp 1493 Default: 1494 \fI\fIcheck password script\fR\fR\fI = \fR\fIDisabled\fR\fI \fR 1495 .sp 1496 Example: 1497 \fI\fIcheck password script\fR\fR\fI = \fR\fIcheck password script = /usr/local/sbin/crackcheck\fR\fI \fR 1498 .RE 1499 1283 1500 client lanman auth (G) 1284 .RS 3n 1501 .PP 1502 .RS 4 1285 1503 This parameter determines whether or not 1286 1504 \fBsmbclient\fR(8) 1287 and other samba client tools will attempt to authenticate itself to servers using the weaker LANMAN password hash . If disabled, only server which support NT password hashes (e.g. Windows NT/2000, Samba, etc... but not Windows 95/98) will be able to be connected from the Samba client.1288 .sp 1289 The LANMAN encrypted response is easily broken, due to it 's case-insensitive nature, and the choice of algorithm. Clients without Windows 95/98 servers are advised to disable this option.1505 and other samba client tools will attempt to authenticate itself to servers using the weaker LANMAN password hash\. If disabled, only server which support NT password hashes (e\.g\. Windows NT/2000, Samba, etc\.\.\. but not Windows 95/98) will be able to be connected from the Samba client\. 1506 .sp 1507 The LANMAN encrypted response is easily broken, due to it\'s case\-insensitive nature, and the choice of algorithm\. Clients without Windows 95/98 servers are advised to disable this option\. 1290 1508 .sp 1291 1509 Disabling this option will also disable the … … 1295 1513 Likewise, if the 1296 1514 client ntlmv2 auth 1297 parameter is enabled, then only NTLMv2 logins will be attempted .1298 .sp 1299 Default: 1300 \f B\fIclient lanman auth\fR = yes\fR1301 .RE 1302 .PP 1515 parameter is enabled, then only NTLMv2 logins will be attempted\. 1516 .sp 1517 Default: 1518 \fI\fIclient lanman auth\fR\fR\fI = \fR\fIyes\fR\fI \fR 1519 .RE 1520 1303 1521 client ntlmv2 auth (G) 1304 .RS 3n 1522 .PP 1523 .RS 4 1305 1524 This parameter determines whether or not 1306 1525 \fBsmbclient\fR(8) 1307 will attempt to authenticate itself to servers using the NTLMv2 encrypted password response .1308 .sp 1309 If enabled, only an NTLMv2 and LMv2 response (both much more secure than earlier versions) will be sent . Many servers (including NT4 < SP4, Win9x and Samba 2.2) are not compatible with NTLMv2.1526 will attempt to authenticate itself to servers using the NTLMv2 encrypted password response\. 1527 .sp 1528 If enabled, only an NTLMv2 and LMv2 response (both much more secure than earlier versions) will be sent\. Many servers (including NT4 < SP4, Win9x and Samba 2\.2) are not compatible with NTLMv2\. 1310 1529 .sp 1311 1530 Similarly, if enabled, NTLMv1, … … 1313 1532 and 1314 1533 client plaintext auth 1315 authentication will be disabled . This also disables share-level authentication.1534 authentication will be disabled\. This also disables share\-level authentication\. 1316 1535 .sp 1317 1536 If disabled, an NTLM response (and possibly a LANMAN response) will be sent by the client, depending on the value of 1318 client lanman auth .1319 .sp 1320 Note that some sites (particularly those following 'best practice' security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM.1321 .sp 1322 Default: 1323 \f B\fIclient ntlmv2 auth\fR = no\fR1324 .RE 1325 .PP 1537 client lanman auth\. 1538 .sp 1539 Note that some sites (particularly those following \'best practice\' security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM\. 1540 .sp 1541 Default: 1542 \fI\fIclient ntlmv2 auth\fR\fR\fI = \fR\fIno\fR\fI \fR 1543 .RE 1544 1326 1545 client plaintext auth (G) 1327 .RS 3n 1328 Specifies whether a client should send a plaintext password if the server does not support encrypted passwords. 1329 .sp 1330 Default: 1331 \fB\fIclient plaintext auth\fR = yes \fR 1332 .RE 1333 .PP 1546 .PP 1547 .RS 4 1548 Specifies whether a client should send a plaintext password if the server does not support encrypted passwords\. 1549 .sp 1550 Default: 1551 \fI\fIclient plaintext auth\fR\fR\fI = \fR\fIyes\fR\fI \fR 1552 .RE 1553 1334 1554 client schannel (G) 1335 .RS 3n 1336 This controls whether the client offers or even demands the use of the netlogon schannel. 1337 client schannel = no does not offer the schannel, 1338 client schannel = auto offers the schannel but does not enforce it, and 1339 client schannel = yes denies access if the server is not able to speak netlogon schannel. 1340 .sp 1341 Default: 1342 \fB\fIclient schannel\fR = auto \fR 1343 .sp 1344 Example: 1345 \fB\fIclient schannel\fR = yes \fR 1346 .RE 1347 .PP 1555 .PP 1556 .RS 4 1557 This controls whether the client offers or even demands the use of the netlogon schannel\. 1558 \fIclient schannel = no\fR 1559 does not offer the schannel, 1560 \fIclient schannel = auto\fR 1561 offers the schannel but does not enforce it, and 1562 \fIclient schannel = yes\fR 1563 denies access if the server is not able to speak netlogon schannel\. 1564 .sp 1565 Default: 1566 \fI\fIclient schannel\fR\fR\fI = \fR\fIauto\fR\fI \fR 1567 .sp 1568 Example: 1569 \fI\fIclient schannel\fR\fR\fI = \fR\fIyes\fR\fI \fR 1570 .RE 1571 1348 1572 client signing (G) 1349 .RS 3n 1350 This controls whether the client offers or requires the server it talks to to use SMB signing. Possible values are 1351 \fBauto\fR, 1352 \fBmandatory\fR 1573 .PP 1574 .RS 4 1575 This controls whether the client offers or requires the server it talks to to use SMB signing\. Possible values are 1576 \fIauto\fR, 1577 \fImandatory\fR 1353 1578 and 1354 \f Bdisabled\fR.1355 .sp 1356 When set to auto, SMB signing is offered, but not enforced . When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either.1357 .sp 1358 Default: 1359 \f B\fIclient signing\fR = auto\fR1360 .RE 1361 .PP 1579 \fIdisabled\fR\. 1580 .sp 1581 When set to auto, SMB signing is offered, but not enforced\. When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either\. 1582 .sp 1583 Default: 1584 \fI\fIclient signing\fR\fR\fI = \fR\fIauto\fR\fI \fR 1585 .RE 1586 1362 1587 client use spnego (G) 1363 .RS 3n 1364 This variable controls whether Samba clients will try to use Simple and Protected NEGOciation (as specified by rfc2478) with supporting servers (including WindowsXP, Windows2000 and Samba 3.0) to agree upon an authentication mechanism. This enables Kerberos authentication in particular. 1365 .sp 1366 Default: 1367 \fB\fIclient use spnego\fR = yes \fR 1368 .RE 1369 .PP 1588 .PP 1589 .RS 4 1590 This variable controls whether Samba clients will try to use Simple and Protected NEGOciation (as specified by rfc2478) with supporting servers (including WindowsXP, Windows2000 and Samba 3\.0) to agree upon an authentication mechanism\. This enables Kerberos authentication in particular\. 1591 .sp 1592 Default: 1593 \fI\fIclient use spnego\fR\fR\fI = \fR\fIyes\fR\fI \fR 1594 .RE 1595 1370 1596 comment (S) 1371 .RS 3n 1597 .PP 1598 .RS 4 1372 1599 This is a text field that is seen next to a share when a client does a queries the server, either via the network neighborhood or via 1373 1600 net view 1374 to list what shares are available .1601 to list what shares are available\. 1375 1602 .sp 1376 1603 If you want to set the string that is displayed next to the machine name then see the 1377 server string parameter. 1378 .sp 1379 Default: 1380 \fB\fIcomment\fR = # No comment \fR 1381 .sp 1382 Example: 1383 \fB\fIcomment\fR = Fred's Files \fR 1384 .RE 1385 .PP 1604 \fIserver string\fR 1605 parameter\. 1606 .sp 1607 Default: 1608 \fI\fIcomment\fR\fR\fI = \fR\fI # No comment\fR\fI \fR 1609 .sp 1610 Example: 1611 \fI\fIcomment\fR\fR\fI = \fR\fIFred\'s Files\fR\fI \fR 1612 .RE 1613 1386 1614 config file (G) 1387 .RS 3n 1615 .PP 1616 .RS 4 1388 1617 This allows you to override the config file to use, instead of the default (usually 1389 \fIsmb .conf\fR). There is a chicken and egg problem here as this option is set in the config file!1390 .sp 1391 For this reason, if the name of the config file has changed when the parameters are loaded then it will reload them from the new config file .1392 .sp 1393 This option takes the usual substitutions, which can be very useful .1394 .sp 1395 If the config file doesn 't exist then it won't be loaded (allowing you to special case the config files of just a few clients).1396 .sp 1397 \f BNo default\fR1398 .sp 1399 Example: 1400 \f B\fIconfig file\fR = /usr/local/samba/lib/smb.conf.%m\fR1401 .RE 1402 .PP 1618 \fIsmb\.conf\fR)\. There is a chicken and egg problem here as this option is set in the config file! 1619 .sp 1620 For this reason, if the name of the config file has changed when the parameters are loaded then it will reload them from the new config file\. 1621 .sp 1622 This option takes the usual substitutions, which can be very useful\. 1623 .sp 1624 If the config file doesn\'t exist then it won\'t be loaded (allowing you to special case the config files of just a few clients)\. 1625 .sp 1626 \fINo default\fR 1627 .sp 1628 Example: 1629 \fI\fIconfig file\fR\fR\fI = \fR\fI/usr/local/samba/lib/smb\.conf\.%m\fR\fI \fR 1630 .RE 1631 1403 1632 copy (S) 1404 .RS 3n 1405 This parameter allows you to "clone" service entries. The specified service is simply duplicated under the current service's name. Any parameters specified in the current section will override those in the section being copied. 1406 .sp 1407 This feature lets you set up a 'template' service and create similar services easily. Note that the service being copied must occur earlier in the configuration file than the service doing the copying. 1408 .sp 1409 Default: 1410 \fB\fIcopy\fR = \fR 1411 .sp 1412 Example: 1413 \fB\fIcopy\fR = otherservice \fR 1414 .RE 1415 .PP 1416 create mode 1417 .RS 3n 1418 This parameter is a synonym for create mask. 1419 .RE 1420 .PP 1633 .PP 1634 .RS 4 1635 This parameter allows you to "clone" service entries\. The specified service is simply duplicated under the current service\'s name\. Any parameters specified in the current section will override those in the section being copied\. 1636 .sp 1637 This feature lets you set up a \'template\' service and create similar services easily\. Note that the service being copied must occur earlier in the configuration file than the service doing the copying\. 1638 .sp 1639 Default: 1640 \fI\fIcopy\fR\fR\fI = \fR\fI\fR\fI \fR 1641 .sp 1642 Example: 1643 \fI\fIcopy\fR\fR\fI = \fR\fIotherservice\fR\fI \fR 1644 .RE 1645 create mode.PP 1646 .RS 4 1647 This parameter is a synonym for 1648 create mask\. 1649 .RE 1650 1421 1651 create mask (S) 1422 .RS 3n 1423 When a file is created, the necessary permissions are calculated according to the mapping from DOS modes to UNIX permissions, and the resulting UNIX mode is then bit-wise 'AND'ed with this parameter. This parameter may be thought of as a bit-wise MASK for the UNIX modes of a file. Any bit 1424 \fBnot\fR 1425 set here will be removed from the modes set on a file when it is created. 1652 .PP 1653 .RS 4 1654 When a file is created, the necessary permissions are calculated according to the mapping from DOS modes to UNIX permissions, and the resulting UNIX mode is then bit\-wise \'AND\'ed with this parameter\. This parameter may be thought of as a bit\-wise MASK for the UNIX modes of a file\. Any bit 1655 \fInot\fR 1656 set here will be removed from the modes set on a file when it is created\. 1426 1657 .sp 1427 1658 The default value of this parameter removes the … … 1429 1660 and 1430 1661 other 1431 write and execute bits from the UNIX modes. 1432 .sp 1433 Following this Samba will bit-wise 'OR' the UNIX mode created from this parameter with the value of the 1434 force create mode parameter which is set to 000 by default. 1435 .sp 1436 This parameter does not affect directory masks. See the parameter 1437 directory mask for details. 1438 .sp 1439 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors. If the administrator wishes to enforce a mask on access control lists also, they need to set the 1440 security mask. 1441 .sp 1442 Default: 1443 \fB\fIcreate mask\fR = 0744 \fR 1444 .sp 1445 Example: 1446 \fB\fIcreate mask\fR = 0775 \fR 1447 .RE 1448 .PP 1662 write and execute bits from the UNIX modes\. 1663 .sp 1664 Following this Samba will bit\-wise \'OR\' the UNIX mode created from this parameter with the value of the 1665 \fIforce create mode\fR 1666 parameter which is set to 000 by default\. 1667 .sp 1668 This parameter does not affect directory masks\. See the parameter 1669 \fIdirectory mask\fR 1670 for details\. 1671 .sp 1672 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors\. If the administrator wishes to enforce a mask on access control lists also, they need to set the 1673 \fIsecurity mask\fR\. 1674 .sp 1675 Default: 1676 \fI\fIcreate mask\fR\fR\fI = \fR\fI0744\fR\fI \fR 1677 .sp 1678 Example: 1679 \fI\fIcreate mask\fR\fR\fI = \fR\fI0775\fR\fI \fR 1680 .RE 1681 1449 1682 csc policy (S) 1450 .RS 3n 1683 .PP 1684 .RS 4 1451 1685 This stands for 1452 \f Bclient-side caching policy\fR, and specifies how clients capable of offline caching will cache the files in the share. The valid values are: manual, documents, programs, disable.1453 .sp 1454 These values correspond to those used on Windows servers .1686 \fIclient\-side caching policy\fR, and specifies how clients capable of offline caching will cache the files in the share\. The valid values are: manual, documents, programs, disable\. 1687 .sp 1688 These values correspond to those used on Windows servers\. 1455 1689 .sp 1456 1690 For example, shares containing roaming profiles can have offline caching disabled using 1457 csc policy = disable.1458 .sp 1459 Default: 1460 \f B\fIcsc policy\fR = manual\fR1461 .sp 1462 Example: 1463 \f B\fIcsc policy\fR = programs\fR1464 .RE 1465 .PP 1691 \fIcsc policy = disable\fR\. 1692 .sp 1693 Default: 1694 \fI\fIcsc policy\fR\fR\fI = \fR\fImanual\fR\fI \fR 1695 .sp 1696 Example: 1697 \fI\fIcsc policy\fR\fR\fI = \fR\fIprograms\fR\fI \fR 1698 .RE 1699 1466 1700 cups options (S) 1467 .RS 3n 1701 .PP 1702 .RS 4 1468 1703 This parameter is only applicable if 1469 printing is set to 1470 \fBcups\fR. Its value is a free form string of options passed directly to the cups library. 1471 .sp 1472 You can pass any generic print option known to CUPS (as listed in the CUPS "Software Users' Manual"). You can also pass any printer specific option (as listed in "lpoptions -d printername -l") valid for the target queue. 1704 \fIprinting\fR 1705 is set to 1706 \fBcups\fR\. Its value is a free form string of options passed directly to the cups library\. 1707 .sp 1708 You can pass any generic print option known to CUPS (as listed in the CUPS "Software Users\' Manual")\. You can also pass any printer specific option (as listed in "lpoptions \-d printername \-l") valid for the target queue\. Multiple parameters should be space\-delimited name/value pairs according to the PAPI text option ABNF specification\. Collection values ("name={a=\.\.\. b=\.\.\. c=\.\.\.}") are stored with the curley brackets intact\. 1473 1709 .sp 1474 1710 You should set this parameter to … … 1476 1712 if your CUPS server 1477 1713 \fIerror_log\fR 1478 file contains messages such as "Unsupported format 'application/octet-stream'" when printing from a Windows client through Samba. It is no longer necessary to enable system wide raw printing in1479 \fI/etc/cups/mime .{convs,types}\fR.1480 .sp 1481 Default: 1482 \f B\fIcups options\fR = ""\fR1483 .sp 1484 Example: 1485 \f B\fIcups options\fR = "raw,media=a4,job-sheets=secret,secret"\fR1486 .RE 1487 .PP 1714 file contains messages such as "Unsupported format \'application/octet\-stream\'" when printing from a Windows client through Samba\. It is no longer necessary to enable system wide raw printing in 1715 \fI/etc/cups/mime\.{convs,types}\fR\. 1716 .sp 1717 Default: 1718 \fI\fIcups options\fR\fR\fI = \fR\fI""\fR\fI \fR 1719 .sp 1720 Example: 1721 \fI\fIcups options\fR\fR\fI = \fR\fI"raw media=a4"\fR\fI \fR 1722 .RE 1723 1488 1724 cups server (G) 1489 .RS 3n 1725 .PP 1726 .RS 4 1490 1727 This parameter is only applicable if 1491 printing is set to 1492 \fBcups\fR. 1728 \fIprinting\fR 1729 is set to 1730 \fBcups\fR\. 1493 1731 .sp 1494 1732 If set, this option overrides the ServerName option in the CUPS 1495 \fIclient .conf\fR. This is necessary if you have virtual samba servers that connect to different CUPS daemons.1496 .sp 1497 Optionally, a port can be specified by separating the server name and port number with a colon . If no port was specified, the default port for IPP (631) will be used.1498 .sp 1499 Default: 1500 \f B\fIcups server\fR = ""\fR1501 .sp 1502 Example: 1503 \f B\fIcups server\fR = mycupsserver\fR1504 .sp 1505 Example: 1506 \f B\fIcups server\fR = mycupsserver:1631\fR1507 .RE 1508 .PP 1733 \fIclient\.conf\fR\. This is necessary if you have virtual samba servers that connect to different CUPS daemons\. 1734 .sp 1735 Optionally, a port can be specified by separating the server name and port number with a colon\. If no port was specified, the default port for IPP (631) will be used\. 1736 .sp 1737 Default: 1738 \fI\fIcups server\fR\fR\fI = \fR\fI""\fR\fI \fR 1739 .sp 1740 Example: 1741 \fI\fIcups server\fR\fR\fI = \fR\fImycupsserver\fR\fI \fR 1742 .sp 1743 Example: 1744 \fI\fIcups server\fR\fR\fI = \fR\fImycupsserver:1631\fR\fI \fR 1745 .RE 1746 1509 1747 deadtime (G) 1510 .RS 3n 1511 The value of the parameter (a decimal integer) represents the number of minutes of inactivity before a connection is considered dead, and it is disconnected. The deadtime only takes effect if the number of open files is zero. 1512 .sp 1513 This is useful to stop a server's resources being exhausted by a large number of inactive connections. 1514 .sp 1515 Most clients have an auto-reconnect feature when a connection is broken so in most cases this parameter should be transparent to users. 1516 .sp 1517 Using this parameter with a timeout of a few minutes is recommended for most systems. 1518 .sp 1519 A deadtime of zero indicates that no auto-disconnection should be performed. 1520 .sp 1521 Default: 1522 \fB\fIdeadtime\fR = 0 \fR 1523 .sp 1524 Example: 1525 \fB\fIdeadtime\fR = 15 \fR 1526 .RE 1527 .PP 1748 .PP 1749 .RS 4 1750 The value of the parameter (a decimal integer) represents the number of minutes of inactivity before a connection is considered dead, and it is disconnected\. The deadtime only takes effect if the number of open files is zero\. 1751 .sp 1752 This is useful to stop a server\'s resources being exhausted by a large number of inactive connections\. 1753 .sp 1754 Most clients have an auto\-reconnect feature when a connection is broken so in most cases this parameter should be transparent to users\. 1755 .sp 1756 Using this parameter with a timeout of a few minutes is recommended for most systems\. 1757 .sp 1758 A deadtime of zero indicates that no auto\-disconnection should be performed\. 1759 .sp 1760 Default: 1761 \fI\fIdeadtime\fR\fR\fI = \fR\fI0\fR\fI \fR 1762 .sp 1763 Example: 1764 \fI\fIdeadtime\fR\fR\fI = \fR\fI15\fR\fI \fR 1765 .RE 1766 1528 1767 debug hires timestamp (G) 1529 .RS 3n 1530 Sometimes the timestamps in the log messages are needed with a resolution of higher that seconds, this boolean parameter adds microsecond resolution to the timestamp message header when turned on. 1768 .PP 1769 .RS 4 1770 Sometimes the timestamps in the log messages are needed with a resolution of higher that seconds, this boolean parameter adds microsecond resolution to the timestamp message header when turned on\. 1531 1771 .sp 1532 1772 Note that the parameter 1533 debug timestamp must be on for this to have an effect. 1534 .sp 1535 Default: 1536 \fB\fIdebug hires timestamp\fR = no \fR 1537 .RE 1538 .PP 1773 \fIdebug timestamp\fR 1774 must be on for this to have an effect\. 1775 .sp 1776 Default: 1777 \fI\fIdebug hires timestamp\fR\fR\fI = \fR\fIno\fR\fI \fR 1778 .RE 1779 1539 1780 debug pid (G) 1540 .RS 3n 1781 .PP 1782 .RS 4 1541 1783 When using only one log file for more then one forked 1542 \fBsmbd\fR(8) -process there may be hard to follow which process outputs which message. This boolean parameter is adds the process-id to the timestamp message headers in the logfile when turned on.1784 \fBsmbd\fR(8)\-process there may be hard to follow which process outputs which message\. This boolean parameter is adds the process\-id to the timestamp message headers in the logfile when turned on\. 1543 1785 .sp 1544 1786 Note that the parameter 1545 debug timestamp must be on for this to have an effect. 1546 .sp 1547 Default: 1548 \fB\fIdebug pid\fR = no \fR 1549 .RE 1550 .PP 1787 \fIdebug timestamp\fR 1788 must be on for this to have an effect\. 1789 .sp 1790 Default: 1791 \fI\fIdebug pid\fR\fR\fI = \fR\fIno\fR\fI \fR 1792 .RE 1793 1551 1794 debug prefix timestamp (G) 1552 .RS 3n 1795 .PP 1796 .RS 4 1553 1797 With this option enabled, the timestamp message header is prefixed to the debug message without the filename and function information that is included with the 1554 debug timestamp parameter. This gives timestamps to the messages without adding an additional line. 1798 \fIdebug timestamp\fR 1799 parameter\. This gives timestamps to the messages without adding an additional line\. 1555 1800 .sp 1556 1801 Note that this parameter overrides the 1557 debug timestamp parameter. 1558 .sp 1559 Default: 1560 \fB\fIdebug prefix timestamp\fR = no \fR 1561 .RE 1562 .PP 1563 timestamp logs 1564 .RS 3n 1565 This parameter is a synonym for debug timestamp. 1566 .RE 1567 .PP 1802 \fIdebug timestamp\fR 1803 parameter\. 1804 .sp 1805 Default: 1806 \fI\fIdebug prefix timestamp\fR\fR\fI = \fR\fIno\fR\fI \fR 1807 .RE 1808 timestamp logs.PP 1809 .RS 4 1810 This parameter is a synonym for 1811 debug timestamp\. 1812 .RE 1813 1568 1814 debug timestamp (G) 1569 .RS 3n 1570 Samba debug log messages are timestamped by default. If you are running at a high 1571 debug level these timestamps can be distracting. This boolean parameter allows timestamping to be turned off. 1572 .sp 1573 Default: 1574 \fB\fIdebug timestamp\fR = yes \fR 1575 .RE 1576 .PP 1815 .PP 1816 .RS 4 1817 Samba debug log messages are timestamped by default\. If you are running at a high 1818 \fIdebug level\fR 1819 these timestamps can be distracting\. This boolean parameter allows timestamping to be turned off\. 1820 .sp 1821 Default: 1822 \fI\fIdebug timestamp\fR\fR\fI = \fR\fIyes\fR\fI \fR 1823 .RE 1824 1577 1825 debug uid (G) 1578 .RS 3n 1579 Samba is sometimes run as root and sometime run as the connected user, this boolean parameter inserts the current euid, egid, uid and gid to the timestamp message headers in the log file if turned on. 1826 .PP 1827 .RS 4 1828 Samba is sometimes run as root and sometime run as the connected user, this boolean parameter inserts the current euid, egid, uid and gid to the timestamp message headers in the log file if turned on\. 1580 1829 .sp 1581 1830 Note that the parameter 1582 debug timestamp must be on for this to have an effect. 1583 .sp 1584 Default: 1585 \fB\fIdebug uid\fR = no \fR 1586 .RE 1587 .PP 1831 \fIdebug timestamp\fR 1832 must be on for this to have an effect\. 1833 .sp 1834 Default: 1835 \fI\fIdebug uid\fR\fR\fI = \fR\fIno\fR\fI \fR 1836 .RE 1837 1588 1838 default case (S) 1589 .RS 3n 1839 .PP 1840 .RS 4 1590 1841 See the section on 1591 name mangling. Also note the 1592 short preserve case parameter. 1593 .sp 1594 Default: 1595 \fB\fIdefault case\fR = lower \fR 1596 .RE 1597 .PP 1842 \fIname mangling\fR\. Also note the 1843 \fIshort preserve case\fR 1844 parameter\. 1845 .sp 1846 Default: 1847 \fI\fIdefault case\fR\fR\fI = \fR\fIlower\fR\fI \fR 1848 .RE 1849 1598 1850 default devmode (S) 1599 .RS 3n 1851 .PP 1852 .RS 4 1600 1853 This parameter is only applicable to 1601 printable services. When smbd is serving Printer Drivers to Windows NT/2k/XP clients, each printer on the Samba server has a Device Mode which defines things such as paper size and orientation and duplex settings. The device mode can only correctly be generated by the printer driver itself (which can only be executed on a Win32 platform). Because smbd is unable to execute the driver code to generate the device mode, the default behavior is to set this field to NULL. 1602 .sp 1603 Most problems with serving printer drivers to Windows NT/2k/XP clients can be traced to a problem with the generated device mode. Certain drivers will do things such as crashing the client's Explorer.exe with a NULL devmode. However, other printer drivers can cause the client's spooler service (spoolsv.exe) to die if the devmode was not created by the driver itself (i.e. smbd generates a default devmode). 1604 .sp 1605 This parameter should be used with care and tested with the printer driver in question. It is better to leave the device mode to NULL and let the Windows client set the correct values. Because drivers do not do this all the time, setting 1854 \fIprintable\fR 1855 services\. When smbd is serving Printer Drivers to Windows NT/2k/XP clients, each printer on the Samba server has a Device Mode which defines things such as paper size and orientation and duplex settings\. The device mode can only correctly be generated by the printer driver itself (which can only be executed on a Win32 platform)\. Because smbd is unable to execute the driver code to generate the device mode, the default behavior is to set this field to NULL\. 1856 .sp 1857 Most problems with serving printer drivers to Windows NT/2k/XP clients can be traced to a problem with the generated device mode\. Certain drivers will do things such as crashing the client\'s Explorer\.exe with a NULL devmode\. However, other printer drivers can cause the client\'s spooler service (spoolsv\.exe) to die if the devmode was not created by the driver itself (i\.e\. smbd generates a default devmode)\. 1858 .sp 1859 This parameter should be used with care and tested with the printer driver in question\. It is better to leave the device mode to NULL and let the Windows client set the correct values\. Because drivers do not do this all the time, setting 1606 1860 default devmode = yes 1607 will instruct smbd to generate a default one .1861 will instruct smbd to generate a default one\. 1608 1862 .sp 1609 1863 For more information on Windows NT/2k printing and Device Modes, see the 1610 MSDN documentation .1611 .sp 1612 Default: 1613 \f B\fIdefault devmode\fR = yes\fR1614 .RE 1615 .PP1616 default 1617 .RS 3n 1618 This parameter is a synonym for default service.1619 .RE 1620 .PP 1864 MSDN documentation\. 1865 .sp 1866 Default: 1867 \fI\fIdefault devmode\fR\fR\fI = \fR\fIyes\fR\fI \fR 1868 .RE 1869 default.PP 1870 .RS 4 1871 This parameter is a synonym for 1872 default service\. 1873 .RE 1874 1621 1875 default service (G) 1622 .RS 3n 1623 This parameter specifies the name of a service which will be connected to if the service actually requested cannot be found. Note that the square brackets are 1624 \fBNOT\fR 1625 given in the parameter value (see example below). 1626 .sp 1627 There is no default value for this parameter. If this parameter is not given, attempting to connect to a nonexistent service results in an error. 1876 .PP 1877 .RS 4 1878 This parameter specifies the name of a service which will be connected to if the service actually requested cannot be found\. Note that the square brackets are 1879 \fINOT\fR 1880 given in the parameter value (see example below)\. 1881 .sp 1882 There is no default value for this parameter\. If this parameter is not given, attempting to connect to a nonexistent service results in an error\. 1628 1883 .sp 1629 1884 Typically the default service would be a 1630 guest ok, 1631 read-only service. 1885 \fIguest ok\fR, 1886 \fIread\-only\fR 1887 service\. 1632 1888 .sp 1633 1889 Also note that the apparent service name will be changed to equal that of the requested service, this is very useful as it allows you to use macros like 1634 1890 \fI%S\fR 1635 to make a wildcard service .1636 .sp 1637 Note also that any "_" characters in the name of the service used in the default service will get mapped to a "/" . This allows for interesting things.1638 .sp 1639 Default: 1640 \f B\fIdefault service\fR =\fR1641 .sp 1642 Example: 1643 \f B\fIdefault service\fR = pub\fR1644 .RE 1645 .PP 1891 to make a wildcard service\. 1892 .sp 1893 Note also that any "_" characters in the name of the service used in the default service will get mapped to a "/"\. This allows for interesting things\. 1894 .sp 1895 Default: 1896 \fI\fIdefault service\fR\fR\fI = \fR\fI\fR\fI \fR 1897 .sp 1898 Example: 1899 \fI\fIdefault service\fR\fR\fI = \fR\fIpub\fR\fI \fR 1900 .RE 1901 1646 1902 defer sharing violations (G) 1647 .RS 3n 1648 Windows allows specifying how a file will be shared with other processes when it is opened. Sharing violations occur when a file is opened by a different process using options that violate the share settings specified by other processes. This parameter causes smbd to act as a Windows server does, and defer returning a "sharing violation" error message for up to one second, allowing the client to close the file causing the violation in the meantime. 1649 .sp 1650 UNIX by default does not have this behaviour. 1651 .sp 1652 There should be no reason to turn off this parameter, as it is designed to enable Samba to more correctly emulate Windows. 1653 .sp 1654 Default: 1655 \fB\fIdefer sharing violations\fR = True \fR 1656 .RE 1657 .PP 1903 .PP 1904 .RS 4 1905 Windows allows specifying how a file will be shared with other processes when it is opened\. Sharing violations occur when a file is opened by a different process using options that violate the share settings specified by other processes\. This parameter causes smbd to act as a Windows server does, and defer returning a "sharing violation" error message for up to one second, allowing the client to close the file causing the violation in the meantime\. 1906 .sp 1907 UNIX by default does not have this behaviour\. 1908 .sp 1909 There should be no reason to turn off this parameter, as it is designed to enable Samba to more correctly emulate Windows\. 1910 .sp 1911 Default: 1912 \fI\fIdefer sharing violations\fR\fR\fI = \fR\fITrue\fR\fI \fR 1913 .RE 1914 1658 1915 delete group script (G) 1659 .RS 3n 1916 .PP 1917 .RS 4 1660 1918 This is the full pathname to a script that will be run 1661 \f BAS ROOT\fR1919 \fIAS ROOT\fR 1662 1920 \fBsmbd\fR(8) 1663 when a group is requested to be deleted . It will expand any1921 when a group is requested to be deleted\. It will expand any 1664 1922 \fI%g\fR 1665 to the group name passed . This script is only useful for installations using the Windows NT domain administration tools.1666 .sp 1667 Default: 1668 \f B\fIdelete group script\fR =\fR1669 .RE 1670 .PP 1923 to the group name passed\. This script is only useful for installations using the Windows NT domain administration tools\. 1924 .sp 1925 Default: 1926 \fI\fIdelete group script\fR\fR\fI = \fR\fI\fR\fI \fR 1927 .RE 1928 1671 1929 deleteprinter command (G) 1672 .RS 3n 1673 With the introduction of MS-RPC based printer support for Windows NT/2000 clients in Samba 2.2, it is now possible to delete printer at run time by issuing the DeletePrinter() RPC call. 1674 .sp 1675 For a Samba host this means that the printer must be physically deleted from underlying printing system. The 1676 deleteprinter command defines a script to be run which will perform the necessary operations for removing the printer from the print system and from 1677 \fIsmb.conf\fR. 1930 .PP 1931 .RS 4 1932 With the introduction of MS\-RPC based printer support for Windows NT/2000 clients in Samba 2\.2, it is now possible to delete printer at run time by issuing the DeletePrinter() RPC call\. 1933 .sp 1934 For a Samba host this means that the printer must be physically deleted from underlying printing system\. The 1935 \fIdeleteprinter command\fR 1936 defines a script to be run which will perform the necessary operations for removing the printer from the print system and from 1937 \fIsmb\.conf\fR\. 1678 1938 .sp 1679 1939 The 1680 deleteprinter command is automatically called with only one parameter: 1681 printer name. 1940 \fIdeleteprinter command\fR 1941 is automatically called with only one parameter: 1942 \fIprinter name\fR\. 1682 1943 .sp 1683 1944 Once the 1684 deleteprinter command has been executed, 1945 \fIdeleteprinter command\fR 1946 has been executed, 1685 1947 smbd 1686 1948 will reparse the 1687 \fI smb .conf\fR1688 to associated printer no longer exists . If the sharename is still valid, then1949 \fI smb\.conf\fR 1950 to associated printer no longer exists\. If the sharename is still valid, then 1689 1951 smbd 1690 will return an ACCESS_DENIED error to the client .1691 .sp 1692 Default: 1693 \f B\fIdeleteprinter command\fR =\fR1694 .sp 1695 Example: 1696 \f B\fIdeleteprinter command\fR = /usr/bin/removeprinter\fR1697 .RE 1698 .PP 1952 will return an ACCESS_DENIED error to the client\. 1953 .sp 1954 Default: 1955 \fI\fIdeleteprinter command\fR\fR\fI = \fR\fI\fR\fI \fR 1956 .sp 1957 Example: 1958 \fI\fIdeleteprinter command\fR\fR\fI = \fR\fI/usr/bin/removeprinter\fR\fI \fR 1959 .RE 1960 1699 1961 delete readonly (S) 1700 .RS 3n 1701 This parameter allows readonly files to be deleted. This is not normal DOS semantics, but is allowed by UNIX. 1702 .sp 1703 This option may be useful for running applications such as rcs, where UNIX file ownership prevents changing file permissions, and DOS semantics prevent deletion of a read only file. 1704 .sp 1705 Default: 1706 \fB\fIdelete readonly\fR = no \fR 1707 .RE 1708 .PP 1962 .PP 1963 .RS 4 1964 This parameter allows readonly files to be deleted\. This is not normal DOS semantics, but is allowed by UNIX\. 1965 .sp 1966 This option may be useful for running applications such as rcs, where UNIX file ownership prevents changing file permissions, and DOS semantics prevent deletion of a read only file\. 1967 .sp 1968 Default: 1969 \fI\fIdelete readonly\fR\fR\fI = \fR\fIno\fR\fI \fR 1970 .RE 1971 1709 1972 delete share command (G) 1710 .RS 3n 1711 Samba 2.2.0 introduced the ability to dynamically add and delete shares via the Windows NT 4.0 Server Manager. The 1973 .PP 1974 .RS 4 1975 Samba 2\.2\.0 introduced the ability to dynamically add and delete shares via the Windows NT 4\.0 Server Manager\. The 1712 1976 \fIdelete share command\fR 1713 1977 is used to define an external program or script which will remove an existing service definition from 1714 \fIsmb .conf\fR. In order to successfully execute the1978 \fIsmb\.conf\fR\. In order to successfully execute the 1715 1979 \fIdelete share command\fR, 1716 1980 smbd 1717 requires that the administrator be connected using a root account (i.e. uid == 0). 1981 requires that the administrator be connected using a root account (i\.e\. uid == 0)\. 1982 .sp 1983 If the connected account has 1984 SeDiskOperatorPrivilege, scripts defined in 1985 \fIchange share\fR 1986 parameter are executed as root\. 1718 1987 .sp 1719 1988 When executed, … … 1721 1990 will automatically invoke the 1722 1991 \fIdelete share command\fR 1723 with two parameters. 1724 .RS 3n 1725 .TP 3n 1726 \(bu 1992 with two parameters\. 1993 .sp 1994 .RS 4 1995 .ie n \{\ 1996 \h'-04'\(bu\h'+03'\c 1997 .\} 1998 .el \{\ 1999 .sp -1 2000 .IP \(bu 2.3 2001 .\} 1727 2002 \fIconfigFile\fR 1728 - the location of the global 1729 \fIsmb.conf\fR 1730 file. 1731 .TP 3n 1732 \(bu 2003 \- the location of the global 2004 \fIsmb\.conf\fR 2005 file\. 2006 .RE 2007 .sp 2008 .RS 4 2009 .ie n \{\ 2010 \h'-04'\(bu\h'+03'\c 2011 .\} 2012 .el \{\ 2013 .sp -1 2014 .IP \(bu 2.3 2015 .\} 1733 2016 \fIshareName\fR 1734 - the name of the existing service.1735 . RE1736 . IP "" 3n1737 This parameter is only used to remove file shares . To delete printer shares, see the1738 deleteprinter command.1739 .sp 1740 Default: 1741 \f B\fIdelete share command\fR =\fR1742 .sp 1743 Example: 1744 \f B\fIdelete share command\fR = /usr/local/bin/delshare\fR1745 .RE 1746 .PP 2017 \- the name of the existing service\. 2018 .sp 2019 .RE 2020 This parameter is only used to remove file shares\. To delete printer shares, see the 2021 \fIdeleteprinter command\fR\. 2022 .sp 2023 Default: 2024 \fI\fIdelete share command\fR\fR\fI = \fR\fI\fR\fI \fR 2025 .sp 2026 Example: 2027 \fI\fIdelete share command\fR\fR\fI = \fR\fI/usr/local/bin/delshare\fR\fI \fR 2028 .RE 2029 1747 2030 delete user from group script (G) 1748 .RS 3n 1749 Full path to the script that will be called when a user is removed from a group using the Windows NT domain administration tools. It will be run by 2031 .PP 2032 .RS 4 2033 Full path to the script that will be called when a user is removed from a group using the Windows NT domain administration tools\. It will be run by 1750 2034 \fBsmbd\fR(8) 1751 \f BAS ROOT\fR. Any2035 \fIAS ROOT\fR\. Any 1752 2036 \fI%g\fR 1753 2037 will be replaced with the group name and any 1754 2038 \fI%u\fR 1755 will be replaced with the user name .1756 .sp 1757 Default: 1758 \f B\fIdelete user from group script\fR =\fR1759 .sp 1760 Example: 1761 \f B\fIdelete user from group script\fR = /usr/sbin/deluser %u %g\fR1762 .RE 1763 .PP 2039 will be replaced with the user name\. 2040 .sp 2041 Default: 2042 \fI\fIdelete user from group script\fR\fR\fI = \fR\fI\fR\fI \fR 2043 .sp 2044 Example: 2045 \fI\fIdelete user from group script\fR\fR\fI = \fR\fI/usr/sbin/deluser %u %g\fR\fI \fR 2046 .RE 2047 1764 2048 delete user script (G) 1765 .RS 3n 2049 .PP 2050 .RS 4 1766 2051 This is the full pathname to a script that will be run by 1767 2052 \fBsmbd\fR(8) 1768 when managing users with remote RPC (NT) tools .1769 .sp 1770 This script is called when a remote client removes a user from the server, normally using 'User Manager for Domains' or1771 rpcclient .1772 .sp 1773 This script should delete the given UNIX username .1774 .sp 1775 Default: 1776 \f B\fIdelete user script\fR =\fR1777 .sp 1778 Example: 1779 \f B\fIdelete user script\fR = /usr/local/samba/bin/del_user %u\fR1780 .RE 1781 .PP 2053 when managing users with remote RPC (NT) tools\. 2054 .sp 2055 This script is called when a remote client removes a user from the server, normally using \'User Manager for Domains\' or 2056 rpcclient\. 2057 .sp 2058 This script should delete the given UNIX username\. 2059 .sp 2060 Default: 2061 \fI\fIdelete user script\fR\fR\fI = \fR\fI\fR\fI \fR 2062 .sp 2063 Example: 2064 \fI\fIdelete user script\fR\fR\fI = \fR\fI/usr/local/samba/bin/del_user %u\fR\fI \fR 2065 .RE 2066 1782 2067 delete veto files (S) 1783 .RS 3n 2068 .PP 2069 .RS 4 1784 2070 This option is used when Samba is attempting to delete a directory that contains one or more vetoed directories (see the 1785 veto files option). If this option is set to 2071 \fIveto files\fR 2072 option)\. If this option is set to 1786 2073 \fBno\fR 1787 (the default) then if a vetoed directory contains any non -vetoed files or directories then the directory delete will fail. This is usually what you want.2074 (the default) then if a vetoed directory contains any non\-vetoed files or directories then the directory delete will fail\. This is usually what you want\. 1788 2075 .sp 1789 2076 If this option is set to 1790 \fByes\fR, then Samba will attempt to recursively delete any files and directories within the vetoed directory . This can be useful for integration with file serving systems such as NetAtalk which create meta-files within directories you might normally veto DOS/Windows users from seeing (e.g.1791 \fI .AppleDouble\fR)2077 \fByes\fR, then Samba will attempt to recursively delete any files and directories within the vetoed directory\. This can be useful for integration with file serving systems such as NetAtalk which create meta\-files within directories you might normally veto DOS/Windows users from seeing (e\.g\. 2078 \fI\.AppleDouble\fR) 1792 2079 .sp 1793 2080 Setting 1794 delete veto files = yes allows these directories to be transparently deleted when the parent directory is deleted (so long as the user has permissions to do so). 1795 .sp 1796 Default: 1797 \fB\fIdelete veto files\fR = no \fR 1798 .RE 1799 .PP 2081 \fIdelete veto files = yes\fR 2082 allows these directories to be transparently deleted when the parent directory is deleted (so long as the user has permissions to do so)\. 2083 .sp 2084 Default: 2085 \fI\fIdelete veto files\fR\fR\fI = \fR\fIno\fR\fI \fR 2086 .RE 2087 1800 2088 dfree cache time (S) 1801 .RS 3n 2089 .PP 2090 .RS 4 1802 2091 The 1803 2092 \fIdfree cache time\fR 1804 should only be used on systems where a problem occurs with the internal disk space calculations. This has been known to happen with Ultrix, but may occur with other operating systems. The symptom that was seen was an error of "Abort Retry Ignore" at the end of each directory listing. 1805 .sp 1806 This is a new parameter introduced in Samba version 3.0.21. It specifies in seconds the time that smbd will cache the output of a disk free query. If set to zero (the default) no caching is done. This allows a heavily loaded server to prevent rapid spawning of 1807 dfree command scripts increasing the load. 1808 .sp 1809 By default this parameter is zero, meaning no caching will be done. 1810 .sp 1811 \fBNo default\fR 1812 .sp 1813 Example: 1814 \fB\fIdfree cache time\fR = dfree cache time = 60 \fR 1815 .RE 1816 .PP 2093 should only be used on systems where a problem occurs with the internal disk space calculations\. This has been known to happen with Ultrix, but may occur with other operating systems\. The symptom that was seen was an error of "Abort Retry Ignore" at the end of each directory listing\. 2094 .sp 2095 This is a new parameter introduced in Samba version 3\.0\.21\. It specifies in seconds the time that smbd will cache the output of a disk free query\. If set to zero (the default) no caching is done\. This allows a heavily loaded server to prevent rapid spawning of 2096 \fIdfree command\fR 2097 scripts increasing the load\. 2098 .sp 2099 By default this parameter is zero, meaning no caching will be done\. 2100 .sp 2101 \fINo default\fR 2102 .sp 2103 Example: 2104 \fI\fIdfree cache time\fR\fR\fI = \fR\fIdfree cache time = 60\fR\fI \fR 2105 .RE 2106 1817 2107 dfree command (S) 1818 .RS 3n 2108 .PP 2109 .RS 4 1819 2110 The 1820 2111 \fIdfree command\fR 1821 setting should only be used on systems where a problem occurs with the internal disk space calculations. This has been known to happen with Ultrix, but may occur with other operating systems. The symptom that was seen was an error of "Abort Retry Ignore" at the end of each directory listing. 1822 .sp 1823 This setting allows the replacement of the internal routines to calculate the total disk space and amount available with an external routine. The example below gives a possible script that might fulfill this function. 1824 .sp 1825 In Samba version 3.0.21 this parameter has been changed to be a per-share parameter, and in addition the parameter 1826 dfree cache time was added to allow the output of this script to be cached for systems under heavy load. 1827 .sp 1828 The external program will be passed a single parameter indicating a directory in the filesystem being queried. This will typically consist of the string 1829 \fI./\fR. The script should return two integers in ASCII. The first should be the total disk space in blocks, and the second should be the number of available blocks. An optional third return value can give the block size in bytes. The default blocksize is 1024 bytes. 2112 setting should only be used on systems where a problem occurs with the internal disk space calculations\. This has been known to happen with Ultrix, but may occur with other operating systems\. The symptom that was seen was an error of "Abort Retry Ignore" at the end of each directory listing\. 2113 .sp 2114 This setting allows the replacement of the internal routines to calculate the total disk space and amount available with an external routine\. The example below gives a possible script that might fulfill this function\. 2115 .sp 2116 In Samba version 3\.0\.21 this parameter has been changed to be a per\-share parameter, and in addition the parameter 2117 \fIdfree cache time\fR 2118 was added to allow the output of this script to be cached for systems under heavy load\. 2119 .sp 2120 The external program will be passed a single parameter indicating a directory in the filesystem being queried\. This will typically consist of the string 2121 \fI\./\fR\. The script should return two integers in ASCII\. The first should be the total disk space in blocks, and the second should be the number of available blocks\. An optional third return value can give the block size in bytes\. The default blocksize is 1024 bytes\. 1830 2122 .sp 1831 2123 Note: Your script should 1832 \f BNOT\fR2124 \fINOT\fR 1833 2125 be setuid or setgid and should be owned by (and writeable only by) root! 1834 2126 .sp 1835 2127 Where the script dfree (which must be made executable) could be: 1836 1837 .sp 1838 2128 .sp 2129 .RS 4 1839 2130 .nf 1840 2131 1841 2132 #!/bin/sh 1842 df $1 | tail -1 | awk '{print $2" "$4}' 1843 2133 df $1 | tail \-1 | awk \'{print $(NF\-4),$(NF\-2)}\' 1844 2134 .fi 2135 .RE 2136 .sp 1845 2137 or perhaps (on Sys V based systems): 1846 1847 .sp 1848 2138 .sp 2139 .RS 4 1849 2140 .nf 1850 2141 1851 2142 #!/bin/sh 1852 /usr/bin/df -k $1 | tail -1 | awk '{print $3" "$5}' 1853 2143 /usr/bin/df \-k $1 | tail \-1 | awk \'{print $3" "$5}\' 1854 2144 .fi 1855 Note that you may have to replace the command names with full path names on some systems. 1856 .sp 1857 By default internal routines for determining the disk capacity and remaining space will be used. 1858 .sp 1859 \fBNo default\fR 1860 .sp 1861 Example: 1862 \fB\fIdfree command\fR = /usr/local/samba/bin/dfree \fR 1863 .RE 1864 .PP 1865 directory mode 1866 .RS 3n 1867 This parameter is a synonym for directory mask. 1868 .RE 1869 .PP 2145 .RE 2146 .sp 2147 Note that you may have to replace the command names with full path names on some systems\. 2148 .sp 2149 By default internal routines for determining the disk capacity and remaining space will be used\. 2150 .sp 2151 \fINo default\fR 2152 .sp 2153 Example: 2154 \fI\fIdfree command\fR\fR\fI = \fR\fI/usr/local/samba/bin/dfree\fR\fI \fR 2155 .RE 2156 directory mode.PP 2157 .RS 4 2158 This parameter is a synonym for 2159 directory mask\. 2160 .RE 2161 1870 2162 directory mask (S) 1871 .RS 3n 1872 This parameter is the octal modes which are used when converting DOS modes to UNIX modes when creating UNIX directories. 1873 .sp 1874 When a directory is created, the necessary permissions are calculated according to the mapping from DOS modes to UNIX permissions, and the resulting UNIX mode is then bit-wise 'AND'ed with this parameter. This parameter may be thought of as a bit-wise MASK for the UNIX modes of a directory. Any bit 1875 \fBnot\fR 1876 set here will be removed from the modes set on a directory when it is created. 1877 .sp 1878 The default value of this parameter removes the 'group' and 'other' write bits from the UNIX mode, allowing only the user who owns the directory to modify it. 1879 .sp 1880 Following this Samba will bit-wise 'OR' the UNIX mode created from this parameter with the value of the 1881 force directory mode parameter. This parameter is set to 000 by default (i.e. no extra mode bits are added). 1882 .sp 1883 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors. If the administrator wishes to enforce a mask on access control lists also, they need to set the 1884 directory security mask. 1885 .sp 1886 Default: 1887 \fB\fIdirectory mask\fR = 0755 \fR 1888 .sp 1889 Example: 1890 \fB\fIdirectory mask\fR = 0775 \fR 1891 .RE 1892 .PP 2163 .PP 2164 .RS 4 2165 This parameter is the octal modes which are used when converting DOS modes to UNIX modes when creating UNIX directories\. 2166 .sp 2167 When a directory is created, the necessary permissions are calculated according to the mapping from DOS modes to UNIX permissions, and the resulting UNIX mode is then bit\-wise \'AND\'ed with this parameter\. This parameter may be thought of as a bit\-wise MASK for the UNIX modes of a directory\. Any bit 2168 \fInot\fR 2169 set here will be removed from the modes set on a directory when it is created\. 2170 .sp 2171 The default value of this parameter removes the \'group\' and \'other\' write bits from the UNIX mode, allowing only the user who owns the directory to modify it\. 2172 .sp 2173 Following this Samba will bit\-wise \'OR\' the UNIX mode created from this parameter with the value of the 2174 \fIforce directory mode\fR 2175 parameter\. This parameter is set to 000 by default (i\.e\. no extra mode bits are added)\. 2176 .sp 2177 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors\. If the administrator wishes to enforce a mask on access control lists also, they need to set the 2178 \fIdirectory security mask\fR\. 2179 .sp 2180 Default: 2181 \fI\fIdirectory mask\fR\fR\fI = \fR\fI0755\fR\fI \fR 2182 .sp 2183 Example: 2184 \fI\fIdirectory mask\fR\fR\fI = \fR\fI0775\fR\fI \fR 2185 .RE 2186 1893 2187 directory security mask (S) 1894 .RS 3n 1895 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box. 1896 .sp 1897 This parameter is applied as a mask (AND'ed with) to the changed permission bits, thus preventing any bits not in this mask from being modified. Make sure not to mix up this parameter with 1898 force directory security mode, which works similar like this one but uses logical OR instead of AND. Essentially, zero bits in this mask may be treated as a set of bits the user is not allowed to change. 1899 .sp 1900 If not set explicitly this parameter is set to 0777 meaning a user is allowed to modify all the user/group/world permissions on a directory. 1901 .sp 1902 \fBNote\fR 1903 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems. Administrators of most normal systems will probably want to leave it as the default of 1904 \fB0777\fR. 1905 .sp 1906 Default: 1907 \fB\fIdirectory security mask\fR = 0777 \fR 1908 .sp 1909 Example: 1910 \fB\fIdirectory security mask\fR = 0700 \fR 1911 .RE 1912 .PP 2188 .PP 2189 .RS 4 2190 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box\. 2191 .sp 2192 This parameter is applied as a mask (AND\'ed with) to the incoming permission bits, thus resetting any bits not in this mask\. Make sure not to mix up this parameter with 2193 \fIforce directory security mode\fR, which works similar like this one but uses logical OR instead of AND\. Essentially, zero bits in this mask are a set of bits that will always be set to zero\. 2194 .sp 2195 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the file permissions regardless of the previous status of this bits on the file\. 2196 .sp 2197 If not set explicitly this parameter is set to 0777 meaning a user is allowed to set all the user/group/world permissions on a directory\. 2198 .sp 2199 \fINote\fR 2200 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\. Administrators of most normal systems will probably want to leave it as the default of 2201 \fB0777\fR\. 2202 .sp 2203 Default: 2204 \fI\fIdirectory security mask\fR\fR\fI = \fR\fI0777\fR\fI \fR 2205 .sp 2206 Example: 2207 \fI\fIdirectory security mask\fR\fR\fI = \fR\fI0700\fR\fI \fR 2208 .RE 2209 1913 2210 disable netbios (G) 1914 .RS 3n 1915 Enabling this parameter will disable netbios support in Samba. Netbios is the only available form of browsing in all windows versions except for 2000 and XP. 2211 .PP 2212 .RS 4 2213 Enabling this parameter will disable netbios support in Samba\. Netbios is the only available form of browsing in all windows versions except for 2000 and XP\. 1916 2214 .sp 1917 2215 .it 1 an-trap … … 1919 2217 .nr an-break-flag 1 1920 2218 .br 1921 \fBNote\fR 1922 Clients that only support netbios won't be able to see your samba server when netbios support is disabled. 1923 Default: 1924 \fB\fIdisable netbios\fR = no \fR 1925 .RE 1926 .PP 2219 Note 2220 Clients that only support netbios won\'t be able to see your samba server when netbios support is disabled\. 2221 2222 Default: 2223 \fI\fIdisable netbios\fR\fR\fI = \fR\fIno\fR\fI \fR 2224 .RE 2225 1927 2226 disable spoolss (G) 1928 .RS 3n 1929 Enabling this parameter will disable Samba's support for the SPOOLSS set of MS-RPC's and will yield identical behavior as Samba 2.0.x. Windows NT/2000 clients will downgrade to using Lanman style printing commands. Windows 9x/ME will be unaffected by the parameter. However, this will also disable the ability to upload printer drivers to a Samba server via the Windows NT Add Printer Wizard or by using the NT printer properties dialog window. It will also disable the capability of Windows NT/2000 clients to download print drivers from the Samba host upon demand. 1930 \fBBe very careful about enabling this parameter.\fR 1931 .sp 1932 Default: 1933 \fB\fIdisable spoolss\fR = no \fR 1934 .RE 1935 .PP 2227 .PP 2228 .RS 4 2229 Enabling this parameter will disable Samba\'s support for the SPOOLSS set of MS\-RPC\'s and will yield identical behavior as Samba 2\.0\.x\. Windows NT/2000 clients will downgrade to using Lanman style printing commands\. Windows 9x/ME will be unaffected by the parameter\. However, this will also disable the ability to upload printer drivers to a Samba server via the Windows NT Add Printer Wizard or by using the NT printer properties dialog window\. It will also disable the capability of Windows NT/2000 clients to download print drivers from the Samba host upon demand\. 2230 \fIBe very careful about enabling this parameter\.\fR 2231 .sp 2232 Default: 2233 \fI\fIdisable spoolss\fR\fR\fI = \fR\fIno\fR\fI \fR 2234 .RE 2235 1936 2236 display charset (G) 1937 .RS 3n 1938 Specifies the charset that samba will use to print messages to stdout and stderr. The default value is "LOCALE", which means automatically set, depending on the current locale. The value should generally be the same as the value of the parameter 1939 unix charset. 1940 .sp 1941 Default: 1942 \fB\fIdisplay charset\fR = "LOCALE" or "ASCII" (depending on the system) \fR 1943 .sp 1944 Example: 1945 \fB\fIdisplay charset\fR = UTF8 \fR 1946 .RE 1947 .PP 2237 .PP 2238 .RS 4 2239 Specifies the charset that samba will use to print messages to stdout and stderr\. The default value is "LOCALE", which means automatically set, depending on the current locale\. The value should generally be the same as the value of the parameter 2240 \fIunix charset\fR\. 2241 .sp 2242 Default: 2243 \fI\fIdisplay charset\fR\fR\fI = \fR\fI"LOCALE" or "ASCII" (depending on the system)\fR\fI \fR 2244 .sp 2245 Example: 2246 \fI\fIdisplay charset\fR\fR\fI = \fR\fIUTF8\fR\fI \fR 2247 .RE 2248 1948 2249 dmapi support (S) 1949 . RS 3n1950 This parameter specifies whether Samba should use DMAPI to determine whether a file is offline or not. This would typically be used in conjunction with a hierarchical storage system that automatically migrates files to tape. 1951 .sp 1952 Note that Samba infers the status of a file by examining the events that a DMAPI application has registered interest in. This heuristic is satisfactory for a number of hierarchical storage systems, but there may be system for which it will fail. In this case, Samba may erroneously report files to be offline. 1953 .sp 1954 This parameter is only available if a supported DMAPI implementation was found at compilation time. It will only be used if DMAPI is found to enabled on the system at run time. 1955 .sp 1956 1957 .sp 1958 Default: 1959 \f B\fIdmapi support\fR = no\fR1960 .RE 1961 .PP 2250 .PP 2251 .RS 4 2252 This parameter specifies whether Samba should use DMAPI to determine whether a file is offline or not\. This would typically be used in conjunction with a hierarchical storage system that automatically migrates files to tape\. 2253 .sp 2254 Note that Samba infers the status of a file by examining the events that a DMAPI application has registered interest in\. This heuristic is satisfactory for a number of hierarchical storage systems, but there may be system for which it will fail\. In this case, Samba may erroneously report files to be offline\. 2255 .sp 2256 This parameter is only available if a supported DMAPI implementation was found at compilation time\. It will only be used if DMAPI is found to enabled on the system at run time\. 2257 .sp 2258 .sp 2259 Default: 2260 \fI\fIdmapi support\fR\fR\fI = \fR\fIno\fR\fI \fR 2261 .RE 2262 1962 2263 dns proxy (G) 1963 .RS 3n 2264 .PP 2265 .RS 4 1964 2266 Specifies that 1965 2267 \fBnmbd\fR(8) 1966 when acting as a WINS server and finding that a NetBIOS name has not been registered, should treat the NetBIOS name word -for-word as a DNS name and do a lookup with the DNS server for that name on behalf of the name-querying client.1967 .sp 1968 Note that the maximum length for a NetBIOS name is 15 characters, so the DNS name (or DNS alias) can likewise only be 15 characters, maximum .2268 when acting as a WINS server and finding that a NetBIOS name has not been registered, should treat the NetBIOS name word\-for\-word as a DNS name and do a lookup with the DNS server for that name on behalf of the name\-querying client\. 2269 .sp 2270 Note that the maximum length for a NetBIOS name is 15 characters, so the DNS name (or DNS alias) can likewise only be 15 characters, maximum\. 1969 2271 .sp 1970 2272 nmbd 1971 spawns a second copy of itself to do the DNS name lookup requests, as doing a name lookup is a blocking action .1972 .sp 1973 Default: 1974 \f B\fIdns proxy\fR = yes\fR1975 .RE 1976 .PP 2273 spawns a second copy of itself to do the DNS name lookup requests, as doing a name lookup is a blocking action\. 2274 .sp 2275 Default: 2276 \fI\fIdns proxy\fR\fR\fI = \fR\fIyes\fR\fI \fR 2277 .RE 2278 1977 2279 domain logons (G) 1978 .RS 3n 2280 .PP 2281 .RS 4 1979 2282 If set to 1980 2283 \fByes\fR, the Samba server will provide the netlogon service for Windows 9X network logons for the 1981 workgroup it is in. This will also cause the Samba server to act as a domain controller for NT4 style domain services. For more details on setting up this feature see the Domain Control chapter of the Samba HOWTO Collection. 1982 .sp 1983 Default: 1984 \fB\fIdomain logons\fR = no \fR 1985 .RE 1986 .PP 2284 \fIworkgroup\fR 2285 it is in\. This will also cause the Samba server to act as a domain controller for NT4 style domain services\. For more details on setting up this feature see the Domain Control chapter of the Samba HOWTO Collection\. 2286 .sp 2287 Default: 2288 \fI\fIdomain logons\fR\fR\fI = \fR\fIno\fR\fI \fR 2289 .RE 2290 1987 2291 domain master (G) 1988 .RS 3n 2292 .PP 2293 .RS 4 1989 2294 Tell 1990 2295 \fBsmbd\fR(8) 1991 to enable WAN -wide browse list collation. Setting this option causes2296 to enable WAN\-wide browse list collation\. Setting this option causes 1992 2297 nmbd 1993 2298 to claim a special domain specific NetBIOS name that identifies it as a domain master browser for its given 1994 workgroup. Local master browsers in the same 1995 workgroup on broadcast-isolated subnets will give this 2299 \fIworkgroup\fR\. Local master browsers in the same 2300 \fIworkgroup\fR 2301 on broadcast\-isolated subnets will give this 1996 2302 nmbd 1997 2303 their local browse lists, and then ask 1998 2304 \fBsmbd\fR(8) 1999 for a complete copy of the browse list for the whole wide area network . Browser clients will then contact their local master browser, and will receive the domain-wide browse list, instead of just the list for their broadcast-isolated subnet.2305 for a complete copy of the browse list for the whole wide area network\. Browser clients will then contact their local master browser, and will receive the domain\-wide browse list, instead of just the list for their broadcast\-isolated subnet\. 2000 2306 .sp 2001 2307 Note that Windows NT Primary Domain Controllers expect to be able to claim this 2002 workgroup specific special NetBIOS name that identifies them as domain master browsers for that 2003 workgroup by default (i.e. there is no way to prevent a Windows NT PDC from attempting to do this). This means that if this parameter is set and 2308 \fIworkgroup\fR 2309 specific special NetBIOS name that identifies them as domain master browsers for that 2310 \fIworkgroup\fR 2311 by default (i\.e\. there is no way to prevent a Windows NT PDC from attempting to do this)\. This means that if this parameter is set and 2004 2312 nmbd 2005 2313 claims the special name for a 2006 workgroup before a Windows NT PDC is able to do so then cross subnet browsing will behave strangely and may fail. 2314 \fIworkgroup\fR 2315 before a Windows NT PDC is able to do so then cross subnet browsing will behave strangely and may fail\. 2007 2316 .sp 2008 2317 If 2009 domain logons = yes, then the default behavior is to enable the 2010 domain master parameter. If 2011 domain logons is not enabled (the default setting), then neither will 2012 domain master be enabled by default. 2318 \fIdomain logons = yes\fR, then the default behavior is to enable the 2319 \fIdomain master\fR 2320 parameter\. If 2321 \fIdomain logons\fR 2322 is not enabled (the default setting), then neither will 2323 \fIdomain master\fR 2324 be enabled by default\. 2013 2325 .sp 2014 2326 When 2015 domain logons = Yes the default setting for this parameter is Yes, with the result that Samba will be a PDC. If 2016 domain master = No, Samba will function as a BDC. In general, this parameter should be set to 'No' only on a BDC. 2017 .sp 2018 Default: 2019 \fB\fIdomain master\fR = auto \fR 2020 .RE 2021 .PP 2327 \fIdomain logons = Yes\fR 2328 the default setting for this parameter is Yes, with the result that Samba will be a PDC\. If 2329 \fIdomain master = No\fR, Samba will function as a BDC\. In general, this parameter should be set to \'No\' only on a BDC\. 2330 .sp 2331 Default: 2332 \fI\fIdomain master\fR\fR\fI = \fR\fIauto\fR\fI \fR 2333 .RE 2334 2022 2335 dont descend (S) 2023 .RS 3n 2024 There are certain directories on some systems (e.g., the 2336 .PP 2337 .RS 4 2338 There are certain directories on some systems (e\.g\., the 2025 2339 \fI/proc\fR 2026 tree under Linux) that are either not of interest to clients or are infinitely deep (recursive) . This parameter allows you to specify a comma-delimited list of directories that the server should always show as empty.2027 .sp 2028 Note that Samba can be very fussy about the exact format of the "dont descend" entries . For example you may need2029 \fI ./proc\fR2340 tree under Linux) that are either not of interest to clients or are infinitely deep (recursive)\. This parameter allows you to specify a comma\-delimited list of directories that the server should always show as empty\. 2341 .sp 2342 Note that Samba can be very fussy about the exact format of the "dont descend" entries\. For example you may need 2343 \fI \./proc\fR 2030 2344 instead of just 2031 \fI/proc\fR . Experimentation is the best policy :-)2032 .sp 2033 Default: 2034 \f B\fIdont descend\fR =\fR2035 .sp 2036 Example: 2037 \f B\fIdont descend\fR = /proc,/dev\fR2038 .RE 2039 .PP 2345 \fI/proc\fR\. Experimentation is the best policy :\-) 2346 .sp 2347 Default: 2348 \fI\fIdont descend\fR\fR\fI = \fR\fI\fR\fI \fR 2349 .sp 2350 Example: 2351 \fI\fIdont descend\fR\fR\fI = \fR\fI/proc,/dev\fR\fI \fR 2352 .RE 2353 2040 2354 dos charset (G) 2041 .RS 3n 2042 DOS SMB clients assume the server has the same charset as they do. This option specifies which charset Samba should talk to DOS clients. 2043 .sp 2044 The default depends on which charsets you have installed. Samba tries to use charset 850 but falls back to ASCII in case it is not available. Run 2355 .PP 2356 .RS 4 2357 DOS SMB clients assume the server has the same charset as they do\. This option specifies which charset Samba should talk to DOS clients\. 2358 .sp 2359 The default depends on which charsets you have installed\. Samba tries to use charset 850 but falls back to ASCII in case it is not available\. Run 2045 2360 \fBtestparm\fR(1) 2046 to check the default on your system .2047 .sp 2048 \f BNo default\fR2049 .RE 2050 .PP 2361 to check the default on your system\. 2362 .sp 2363 \fINo default\fR 2364 .RE 2365 2051 2366 dos filemode (S) 2052 .RS 3n 2053 The default behavior in Samba is to provide UNIX-like behavior where only the owner of a file/directory is able to change the permissions on it. However, this behavior is often confusing to DOS/Windows users. Enabling this parameter allows a user who has write access to the file (by whatever means) to modify the permissions (including ACL) on it. Note that a user belonging to the group owning the file will not be allowed to change permissions if the group is only granted read access. Ownership of the file/directory may also be changed. 2054 .sp 2055 Default: 2056 \fB\fIdos filemode\fR = no \fR 2057 .RE 2058 .PP 2367 .PP 2368 .RS 4 2369 The default behavior in Samba is to provide UNIX\-like behavior where only the owner of a file/directory is able to change the permissions on it\. However, this behavior is often confusing to DOS/Windows users\. Enabling this parameter allows a user who has write access to the file (by whatever means) to modify the permissions (including ACL) on it\. Note that a user belonging to the group owning the file will not be allowed to change permissions if the group is only granted read access\. Ownership of the file/directory may also be changed\. 2370 .sp 2371 Default: 2372 \fI\fIdos filemode\fR\fR\fI = \fR\fIno\fR\fI \fR 2373 .RE 2374 2059 2375 dos filetime resolution (S) 2060 .RS 3n 2061 Under the DOS and Windows FAT filesystem, the finest granularity on time resolution is two seconds. Setting this parameter for a share causes Samba to round the reported time down to the nearest two second boundary when a query call that requires one second resolution is made to 2062 \fBsmbd\fR(8). 2063 .sp 2064 This option is mainly used as a compatibility option for Visual C++ when used against Samba shares. If oplocks are enabled on a share, Visual C++ uses two different time reading calls to check if a file has changed since it was last read. One of these calls uses a one-second granularity, the other uses a two second granularity. As the two second call rounds any odd second down, then if the file has a timestamp of an odd number of seconds then the two timestamps will not match and Visual C++ will keep reporting the file has changed. Setting this option causes the two timestamps to match, and Visual C++ is happy. 2065 .sp 2066 Default: 2067 \fB\fIdos filetime resolution\fR = no \fR 2068 .RE 2069 .PP 2376 .PP 2377 .RS 4 2378 Under the DOS and Windows FAT filesystem, the finest granularity on time resolution is two seconds\. Setting this parameter for a share causes Samba to round the reported time down to the nearest two second boundary when a query call that requires one second resolution is made to 2379 \fBsmbd\fR(8)\. 2380 .sp 2381 This option is mainly used as a compatibility option for Visual C++ when used against Samba shares\. If oplocks are enabled on a share, Visual C++ uses two different time reading calls to check if a file has changed since it was last read\. One of these calls uses a one\-second granularity, the other uses a two second granularity\. As the two second call rounds any odd second down, then if the file has a timestamp of an odd number of seconds then the two timestamps will not match and Visual C++ will keep reporting the file has changed\. Setting this option causes the two timestamps to match, and Visual C++ is happy\. 2382 .sp 2383 Default: 2384 \fI\fIdos filetime resolution\fR\fR\fI = \fR\fIno\fR\fI \fR 2385 .RE 2386 2070 2387 dos filetimes (S) 2071 .RS 3n 2072 Under DOS and Windows, if a user can write to a file they can change the timestamp on it. Under POSIX semantics, only the owner of the file or root may change the timestamp. By default, Samba runs with POSIX semantics and refuses to change the timestamp on a file if the user 2388 .PP 2389 .RS 4 2390 Under DOS and Windows, if a user can write to a file they can change the timestamp on it\. Under POSIX semantics, only the owner of the file or root may change the timestamp\. By default, Samba runs with POSIX semantics and refuses to change the timestamp on a file if the user 2073 2391 smbd 2074 is acting on behalf of is not the file owner . Setting this option to2392 is acting on behalf of is not the file owner\. Setting this option to 2075 2393 \fB yes\fR 2076 2394 allows DOS semantics and 2077 2395 \fBsmbd\fR(8) 2078 will change the file timestamp as DOS requires . Due to changes in Microsoft Office 2000 and beyond, the default for this parameter has been changed from "no" to "yes" in Samba 3.0.14 and above. Microsoft Excel will display dialog box warnings about the file being changed by another user if this parameter is not set to "yes" and files are being shared between users.2079 .sp 2080 Default: 2081 \f B\fIdos filetimes\fR = yes\fR2082 .RE 2083 .PP 2396 will change the file timestamp as DOS requires\. Due to changes in Microsoft Office 2000 and beyond, the default for this parameter has been changed from "no" to "yes" in Samba 3\.0\.14 and above\. Microsoft Excel will display dialog box warnings about the file being changed by another user if this parameter is not set to "yes" and files are being shared between users\. 2397 .sp 2398 Default: 2399 \fI\fIdos filetimes\fR\fR\fI = \fR\fIyes\fR\fI \fR 2400 .RE 2401 2084 2402 ea support (S) 2085 .RS 3n 2403 .PP 2404 .RS 4 2086 2405 This boolean parameter controls whether 2087 2406 \fBsmbd\fR(8) 2088 will allow clients to attempt to store OS/2 style Extended attributes on a share . In order to enable this parameter the underlying filesystem exported by the share must support extended attributes (such as provided on XFS and EXT3 on Linux, with the correct kernel patches). On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel.2089 .sp 2090 Default: 2091 \f B\fIea support\fR = no\fR2092 .RE 2093 .PP 2407 will allow clients to attempt to store OS/2 style Extended attributes on a share\. In order to enable this parameter the underlying filesystem exported by the share must support extended attributes (such as provided on XFS and EXT3 on Linux, with the correct kernel patches)\. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel\. 2408 .sp 2409 Default: 2410 \fI\fIea support\fR\fR\fI = \fR\fIno\fR\fI \fR 2411 .RE 2412 2094 2413 enable asu support (G) 2095 .RS 3n 2096 Hosts running the "Advanced Server for Unix (ASU)" product require some special accomodations such as creating a builting [ADMIN$] share that only supports IPC connections. The has been the default behavior in smbd for many years. However, certain Microsoft applications such as the Print Migrator tool require that the remote server support an [ADMIN$} file share. Disabling this parameter allows for creating an [ADMIN$] file share in smb.conf. 2097 .sp 2098 Default: 2099 \fB\fIenable asu support\fR = no \fR 2100 .RE 2101 .PP 2414 .PP 2415 .RS 4 2416 Hosts running the "Advanced Server for Unix (ASU)" product require some special accomodations such as creating a builting [ADMIN$] share that only supports IPC connections\. The has been the default behavior in smbd for many years\. However, certain Microsoft applications such as the Print Migrator tool require that the remote server support an [ADMIN$} file share\. Disabling this parameter allows for creating an [ADMIN$] file share in smb\.conf\. 2417 .sp 2418 Default: 2419 \fI\fIenable asu support\fR\fR\fI = \fR\fIno\fR\fI \fR 2420 .RE 2421 2102 2422 enable privileges (G) 2103 .RS 3n 2423 .PP 2424 .RS 4 2104 2425 This parameter controls whether or not smbd will honor privileges assigned to specific SIDs via either 2105 2426 net rpc rights 2106 or one of the Windows user and group manager tools . This parameter is enabled by default. It can be disabled to prevent members of the Domain Admins group from being able to assign privileges to users or groups which can then result in certain smbd operations running as root that would normally run under the context of the connected user.2107 .sp 2108 An example of how privileges can be used is to assign the right to join clients to a Samba controlled domain without providing root access to the server via smbd .2109 .sp 2110 Please read the extended description provided in the Samba HOWTO documentation .2111 .sp 2112 Default: 2113 \f B\fIenable privileges\fR = yes\fR2114 .RE 2115 .PP 2427 or one of the Windows user and group manager tools\. This parameter is enabled by default\. It can be disabled to prevent members of the Domain Admins group from being able to assign privileges to users or groups which can then result in certain smbd operations running as root that would normally run under the context of the connected user\. 2428 .sp 2429 An example of how privileges can be used is to assign the right to join clients to a Samba controlled domain without providing root access to the server via smbd\. 2430 .sp 2431 Please read the extended description provided in the Samba HOWTO documentation\. 2432 .sp 2433 Default: 2434 \fI\fIenable privileges\fR\fR\fI = \fR\fIyes\fR\fI \fR 2435 .RE 2436 2116 2437 encrypt passwords (G) 2117 .RS 3n 2118 This boolean controls whether encrypted passwords will be negotiated with the client. Note that Windows NT 4.0 SP3 and above and also Windows 98 will by default expect encrypted passwords unless a registry entry is changed. To use encrypted passwords in Samba see the chapter "User Database" in the Samba HOWTO Collection. 2119 .sp 2120 MS Windows clients that expect Microsoft encrypted passwords and that do not have plain text password support enabled will be able to connect only to a Samba server that has encrypted password support enabled and for which the user accounts have a valid encrypted password. Refer to the smbpasswd command man page for information regarding the creation of encrypted passwords for user accounts. 2121 .sp 2122 The use of plain text passwords is NOT advised as support for this feature is no longer maintained in Microsoft Windows products. If you want to use plain text passwords you must set this parameter to no. 2438 .PP 2439 .RS 4 2440 This boolean controls whether encrypted passwords will be negotiated with the client\. Note that Windows NT 4\.0 SP3 and above and also Windows 98 will by default expect encrypted passwords unless a registry entry is changed\. To use encrypted passwords in Samba see the chapter "User Database" in the Samba HOWTO Collection\. 2441 .sp 2442 MS Windows clients that expect Microsoft encrypted passwords and that do not have plain text password support enabled will be able to connect only to a Samba server that has encrypted password support enabled and for which the user accounts have a valid encrypted password\. Refer to the smbpasswd command man page for information regarding the creation of encrypted passwords for user accounts\. 2443 .sp 2444 The use of plain text passwords is NOT advised as support for this feature is no longer maintained in Microsoft Windows products\. If you want to use plain text passwords you must set this parameter to no\. 2123 2445 .sp 2124 2446 In order for encrypted passwords to work correctly … … 2129 2451 \fBsmbpasswd\fR(8) 2130 2452 program for information on how to set up and maintain this file), or set the 2131 security = [server|domain|ads] parameter which causes 2453 \fIsecurity = [server|domain|ads]\fR 2454 parameter which causes 2132 2455 smbd 2133 to authenticate against another server .2134 .sp 2135 Default: 2136 \f B\fIencrypt passwords\fR = yes\fR2137 .RE 2138 .PP 2456 to authenticate against another server\. 2457 .sp 2458 Default: 2459 \fI\fIencrypt passwords\fR\fR\fI = \fR\fIyes\fR\fI \fR 2460 .RE 2461 2139 2462 enhanced browsing (G) 2140 .RS 3n 2141 This option enables a couple of enhancements to cross-subnet browse propagation that have been added in Samba but which are not standard in Microsoft implementations. 2142 .sp 2143 The first enhancement to browse propagation consists of a regular wildcard query to a Samba WINS server for all Domain Master Browsers, followed by a browse synchronization with each of the returned DMBs. The second enhancement consists of a regular randomised browse synchronization with all currently known DMBs. 2144 .sp 2145 You may wish to disable this option if you have a problem with empty workgroups not disappearing from browse lists. Due to the restrictions of the browse protocols these enhancements can cause a empty workgroup to stay around forever which can be annoying. 2146 .sp 2147 In general you should leave this option enabled as it makes cross-subnet browse propagation much more reliable. 2148 .sp 2149 Default: 2150 \fB\fIenhanced browsing\fR = yes \fR 2151 .RE 2152 .PP 2463 .PP 2464 .RS 4 2465 This option enables a couple of enhancements to cross\-subnet browse propagation that have been added in Samba but which are not standard in Microsoft implementations\. 2466 .sp 2467 The first enhancement to browse propagation consists of a regular wildcard query to a Samba WINS server for all Domain Master Browsers, followed by a browse synchronization with each of the returned DMBs\. The second enhancement consists of a regular randomised browse synchronization with all currently known DMBs\. 2468 .sp 2469 You may wish to disable this option if you have a problem with empty workgroups not disappearing from browse lists\. Due to the restrictions of the browse protocols these enhancements can cause a empty workgroup to stay around forever which can be annoying\. 2470 .sp 2471 In general you should leave this option enabled as it makes cross\-subnet browse propagation much more reliable\. 2472 .sp 2473 Default: 2474 \fI\fIenhanced browsing\fR\fR\fI = \fR\fIyes\fR\fI \fR 2475 .RE 2476 2153 2477 enumports command (G) 2154 .RS 3n 2155 The concept of a "port" is fairly foreign to UNIX hosts. Under Windows NT/2000 print servers, a port is associated with a port monitor and generally takes the form of a local port (i.e. LPT1:, COM1:, FILE:) or a remote port (i.e. LPD Port Monitor, etc...). By default, Samba has only one port defined--\fB"Samba Printer Port"\fR. Under Windows NT/2000, all printers must have a valid port name. If you wish to have a list of ports displayed (smbd 2478 .PP 2479 .RS 4 2480 The concept of a "port" is fairly foreign to UNIX hosts\. Under Windows NT/2000 print servers, a port is associated with a port monitor and generally takes the form of a local port (i\.e\. LPT1:, COM1:, FILE:) or a remote port (i\.e\. LPD Port Monitor, etc\.\.\.)\. By default, Samba has only one port defined\-\-\fB"Samba Printer Port"\fR\. Under Windows NT/2000, all printers must have a valid port name\. If you wish to have a list of ports displayed (smbd 2156 2481 does not use a port name for anything) other than the default 2157 2482 \fB"Samba Printer Port"\fR, you can define 2158 2483 \fIenumports command\fR 2159 to point to a program which should generate a list of ports, one per line, to standard output . This listing will then be used in response to the level 1 and 2 EnumPorts() RPC.2160 .sp 2161 Default: 2162 \f B\fIenumports command\fR =\fR2163 .sp 2164 Example: 2165 \f B\fIenumports command\fR = /usr/bin/listports\fR2166 .RE 2167 .PP 2484 to point to a program which should generate a list of ports, one per line, to standard output\. This listing will then be used in response to the level 1 and 2 EnumPorts() RPC\. 2485 .sp 2486 Default: 2487 \fI\fIenumports command\fR\fR\fI = \fR\fI\fR\fI \fR 2488 .sp 2489 Example: 2490 \fI\fIenumports command\fR\fR\fI = \fR\fI/usr/bin/listports\fR\fI \fR 2491 .RE 2492 2168 2493 eventlog list (G) 2169 .RS 3n 2170 This option defines a list of log names that Samba will report to the Microsoft EventViewer utility. The listed eventlogs will be associated with tdb file on disk in the 2171 \fI$(lockdir)/eventlog\fR. 2494 .PP 2495 .RS 4 2496 This option defines a list of log names that Samba will report to the Microsoft EventViewer utility\. The listed eventlogs will be associated with tdb file on disk in the 2497 \fI$(lockdir)/eventlog\fR\. 2172 2498 .sp 2173 2499 The administrator must use an external process to parse the normal Unix logs such as 2174 2500 \fI/var/log/messages\fR 2175 and write then entries to the eventlog tdb files . Refer to the eventlogadm(8) utility for how to write eventlog entries.2176 .sp 2177 Default: 2178 \f B\fIeventlog list\fR =\fR2179 .sp 2180 Example: 2181 \f B\fIeventlog list\fR = Security Application Syslog Apache\fR2182 .RE 2183 .PP 2501 and write then entries to the eventlog tdb files\. Refer to the eventlogadm(8) utility for how to write eventlog entries\. 2502 .sp 2503 Default: 2504 \fI\fIeventlog list\fR\fR\fI = \fR\fI\fR\fI \fR 2505 .sp 2506 Example: 2507 \fI\fIeventlog list\fR\fR\fI = \fR\fISecurity Application Syslog Apache\fR\fI \fR 2508 .RE 2509 2184 2510 fake directory create times (S) 2185 .RS 3n 2186 NTFS and Windows VFAT file systems keep a create time for all files and directories. This is not the same as the ctime - status change time - that Unix keeps, so Samba by default reports the earliest of the various times Unix does keep. Setting this parameter for a share causes Samba to always report midnight 1-1-1980 as the create time for directories. 2187 .sp 2188 This option is mainly used as a compatibility option for Visual C++ when used against Samba shares. Visual C++ generated makefiles have the object directory as a dependency for each object file, and a make rule to create the directory. Also, when NMAKE compares timestamps it uses the creation time when examining a directory. Thus the object directory will be created if it does not exist, but once it does exist it will always have an earlier timestamp than the object files it contains. 2189 .sp 2190 However, Unix time semantics mean that the create time reported by Samba will be updated whenever a file is created or or deleted in the directory. NMAKE finds all object files in the object directory. The timestamp of the last one built is then compared to the timestamp of the object directory. If the directory's timestamp if newer, then all object files will be rebuilt. Enabling this option ensures directories always predate their contents and an NMAKE build will proceed as expected. 2191 .sp 2192 Default: 2193 \fB\fIfake directory create times\fR = no \fR 2194 .RE 2195 .PP 2511 .PP 2512 .RS 4 2513 NTFS and Windows VFAT file systems keep a create time for all files and directories\. This is not the same as the ctime \- status change time \- that Unix keeps, so Samba by default reports the earliest of the various times Unix does keep\. Setting this parameter for a share causes Samba to always report midnight 1\-1\-1980 as the create time for directories\. 2514 .sp 2515 This option is mainly used as a compatibility option for Visual C++ when used against Samba shares\. Visual C++ generated makefiles have the object directory as a dependency for each object file, and a make rule to create the directory\. Also, when NMAKE compares timestamps it uses the creation time when examining a directory\. Thus the object directory will be created if it does not exist, but once it does exist it will always have an earlier timestamp than the object files it contains\. 2516 .sp 2517 However, Unix time semantics mean that the create time reported by Samba will be updated whenever a file is created or or deleted in the directory\. NMAKE finds all object files in the object directory\. The timestamp of the last one built is then compared to the timestamp of the object directory\. If the directory\'s timestamp if newer, then all object files will be rebuilt\. Enabling this option ensures directories always predate their contents and an NMAKE build will proceed as expected\. 2518 .sp 2519 Default: 2520 \fI\fIfake directory create times\fR\fR\fI = \fR\fIno\fR\fI \fR 2521 .RE 2522 2196 2523 fake oplocks (S) 2197 .RS 3n 2198 Oplocks are the way that SMB clients get permission from a server to locally cache file operations. If a server grants an oplock (opportunistic lock) then the client is free to assume that it is the only one accessing the file and it will aggressively cache file data. With some oplock types the client may even cache file open/close operations. This can give enormous performance benefits. 2524 .PP 2525 .RS 4 2526 Oplocks are the way that SMB clients get permission from a server to locally cache file operations\. If a server grants an oplock (opportunistic lock) then the client is free to assume that it is the only one accessing the file and it will aggressively cache file data\. With some oplock types the client may even cache file open/close operations\. This can give enormous performance benefits\. 2199 2527 .sp 2200 2528 When you set 2201 2529 fake oplocks = yes, 2202 2530 \fBsmbd\fR(8) 2203 will always grant oplock requests no matter how many clients are using the file .2531 will always grant oplock requests no matter how many clients are using the file\. 2204 2532 .sp 2205 2533 It is generally much better to use the real 2206 oplocks support rather than this parameter. 2207 .sp 2208 If you enable this option on all read-only shares or shares that you know will only be accessed from one client at a time such as physically read-only media like CDROMs, you will see a big performance improvement on many operations. If you enable this option on shares where multiple clients may be accessing the files read-write at the same time you can get data corruption. Use this option carefully! 2209 .sp 2210 Default: 2211 \fB\fIfake oplocks\fR = no \fR 2212 .RE 2213 .PP 2534 \fIoplocks\fR 2535 support rather than this parameter\. 2536 .sp 2537 If you enable this option on all read\-only shares or shares that you know will only be accessed from one client at a time such as physically read\-only media like CDROMs, you will see a big performance improvement on many operations\. If you enable this option on shares where multiple clients may be accessing the files read\-write at the same time you can get data corruption\. Use this option carefully! 2538 .sp 2539 Default: 2540 \fI\fIfake oplocks\fR\fR\fI = \fR\fIno\fR\fI \fR 2541 .RE 2542 2214 2543 follow symlinks (S) 2215 .RS 3n 2544 .PP 2545 .RS 4 2216 2546 This parameter allows the Samba administrator to stop 2217 2547 \fBsmbd\fR(8) 2218 from following symbolic links in a particular share . Setting this parameter to2548 from following symbolic links in a particular share\. Setting this parameter to 2219 2549 \fBno\fR 2220 prevents any file or directory that is a symbolic link from being followed (the user will get an error) . This option is very useful to stop users from adding a symbolic link to2550 prevents any file or directory that is a symbolic link from being followed (the user will get an error)\. This option is very useful to stop users from adding a symbolic link to 2221 2551 \fI/etc/passwd\fR 2222 in their home directory for instance . However it will slow filename lookups down slightly.2223 .sp 2224 This option is enabled (i .e.2552 in their home directory for instance\. However it will slow filename lookups down slightly\. 2553 .sp 2554 This option is enabled (i\.e\. 2225 2555 smbd 2226 will follow symbolic links) by default .2227 .sp 2228 Default: 2229 \f B\fIfollow symlinks\fR = yes\fR2230 .RE 2231 .PP 2556 will follow symbolic links) by default\. 2557 .sp 2558 Default: 2559 \fI\fIfollow symlinks\fR\fR\fI = \fR\fIyes\fR\fI \fR 2560 .RE 2561 2232 2562 force create mode (S) 2233 .RS 3n 2563 .PP 2564 .RS 4 2234 2565 This parameter specifies a set of UNIX mode bit permissions that will 2235 \f Balways\fR2236 be set on a file created by Samba . This is done by bitwise 'OR'ing these bits onto the mode bits of a file that is being created or having its permissions changed. The default for this parameter is (in octal) 000. The modes in this parameter are bitwise 'OR'ed onto the file mode after the mask set in the2566 \fIalways\fR 2567 be set on a file created by Samba\. This is done by bitwise \'OR\'ing these bits onto the mode bits of a file that is being created or having its permissions changed\. The default for this parameter is (in octal) 000\. The modes in this parameter are bitwise \'OR\'ed onto the file mode after the mask set in the 2237 2568 \fIcreate mask\fR 2238 parameter is applied .2239 .sp 2240 The example below would force all created files to have read and execute permissions set for 'group' and 'other' as well as the read/write/execute bits set for the 'user'.2241 .sp 2242 Default: 2243 \f B\fIforce create mode\fR = 000\fR2244 .sp 2245 Example: 2246 \f B\fIforce create mode\fR = 0755\fR2247 .RE 2248 .PP 2569 parameter is applied\. 2570 .sp 2571 The example below would force all created files to have read and execute permissions set for \'group\' and \'other\' as well as the read/write/execute bits set for the \'user\'\. 2572 .sp 2573 Default: 2574 \fI\fIforce create mode\fR\fR\fI = \fR\fI000\fR\fI \fR 2575 .sp 2576 Example: 2577 \fI\fIforce create mode\fR\fR\fI = \fR\fI0755\fR\fI \fR 2578 .RE 2579 2249 2580 force directory mode (S) 2250 .RS 3n 2581 .PP 2582 .RS 4 2251 2583 This parameter specifies a set of UNIX mode bit permissions that will 2252 \f Balways\fR2253 be set on a directory created by Samba . This is done by bitwise 'OR'ing these bits onto the mode bits of a directory that is being created. The default for this parameter is (in octal) 0000 which will not add any extra permission bits to a created directory. This operation is done after the mode mask in the parameter2584 \fIalways\fR 2585 be set on a directory created by Samba\. This is done by bitwise \'OR\'ing these bits onto the mode bits of a directory that is being created\. The default for this parameter is (in octal) 0000 which will not add any extra permission bits to a created directory\. This operation is done after the mode mask in the parameter 2254 2586 \fIdirectory mask\fR 2255 is applied .2256 .sp 2257 The example below would force all created directories to have read and execute permissions set for 'group' and 'other' as well as the read/write/execute bits set for the 'user'.2258 .sp 2259 Default: 2260 \f B\fIforce directory mode\fR = 000\fR2261 .sp 2262 Example: 2263 \f B\fIforce directory mode\fR = 0755\fR2264 .RE 2265 .PP 2587 is applied\. 2588 .sp 2589 The example below would force all created directories to have read and execute permissions set for \'group\' and \'other\' as well as the read/write/execute bits set for the \'user\'\. 2590 .sp 2591 Default: 2592 \fI\fIforce directory mode\fR\fR\fI = \fR\fI000\fR\fI \fR 2593 .sp 2594 Example: 2595 \fI\fIforce directory mode\fR\fR\fI = \fR\fI0755\fR\fI \fR 2596 .RE 2597 2266 2598 force directory security mode (S) 2267 .RS 3n 2268 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box. 2269 .sp 2270 This parameter is applied as a mask (OR'ed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on. Make sure not to mix up this parameter with 2271 directory security mask, which works in a similar manner to this one, but uses a logical AND instead of an OR. 2272 .sp 2273 Essentially, this mask may be treated as a set of bits that, when modifying security on a directory, to will enable (1) any flags that are off (0) but which the mask has set to on (1). 2274 .sp 2275 If not set explicitly this parameter is 0000, which allows a user to modify all the user/group/world permissions on a directory without restrictions. 2599 .PP 2600 .RS 4 2601 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box\. 2602 .sp 2603 This parameter is applied as a mask (OR\'ed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on\. Make sure not to mix up this parameter with 2604 \fIdirectory security mask\fR, which works in a similar manner to this one, but uses a logical AND instead of an OR\. 2605 .sp 2606 Essentially, this mask may be treated as a set of bits that, when modifying security on a directory, to will enable (1) any flags that are off (0) but which the mask has set to on (1)\. 2607 .sp 2608 If not set explicitly this parameter is 0000, which allows a user to modify all the user/group/world permissions on a directory without restrictions\. 2276 2609 .sp 2277 2610 .it 1 an-trap … … 2279 2612 .nr an-break-flag 1 2280 2613 .br 2281 \fBNote\fR 2282 Users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems. Administrators of most normal systems will probably want to leave it set as 0000. 2283 Default: 2284 \fB\fIforce directory security mode\fR = 0 \fR 2285 .sp 2286 Example: 2287 \fB\fIforce directory security mode\fR = 700 \fR 2288 .RE 2289 .PP 2290 group 2291 .RS 3n 2292 This parameter is a synonym for force group. 2293 .RE 2294 .PP 2614 Note 2615 Users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\. Administrators of most normal systems will probably want to leave it set as 0000\. 2616 2617 Default: 2618 \fI\fIforce directory security mode\fR\fR\fI = \fR\fI0\fR\fI \fR 2619 .sp 2620 Example: 2621 \fI\fIforce directory security mode\fR\fR\fI = \fR\fI700\fR\fI \fR 2622 .RE 2623 group.PP 2624 .RS 4 2625 This parameter is a synonym for 2626 force group\. 2627 .RE 2628 2295 2629 force group (S) 2296 .RS 3n 2297 This specifies a UNIX group name that will be assigned as the default primary group for all users connecting to this service. This is useful for sharing files by ensuring that all access to files on service will use the named group for their permissions checking. Thus, by assigning permissions for this group to the files and directories within this service the Samba administrator can restrict or allow sharing of these files. 2298 .sp 2299 In Samba 2.0.5 and above this parameter has extended functionality in the following way. If the group name listed here has a '+' character prepended to it then the current user accessing the share only has the primary group default assigned to this group if they are already assigned as a member of that group. This allows an administrator to decide that only users who are already in a particular group will create files with group ownership set to that group. This gives a finer granularity of ownership assignment. For example, the setting 2630 .PP 2631 .RS 4 2632 This specifies a UNIX group name that will be assigned as the default primary group for all users connecting to this service\. This is useful for sharing files by ensuring that all access to files on service will use the named group for their permissions checking\. Thus, by assigning permissions for this group to the files and directories within this service the Samba administrator can restrict or allow sharing of these files\. 2633 .sp 2634 In Samba 2\.0\.5 and above this parameter has extended functionality in the following way\. If the group name listed here has a \'+\' character prepended to it then the current user accessing the share only has the primary group default assigned to this group if they are already assigned as a member of that group\. This allows an administrator to decide that only users who are already in a particular group will create files with group ownership set to that group\. This gives a finer granularity of ownership assignment\. For example, the setting 2300 2635 \fIforce group = +sys\fR 2301 means that only users who are already in group sys will have their default primary group assigned to sys when accessing this Samba share . All other users will retain their ordinary primary group.2636 means that only users who are already in group sys will have their default primary group assigned to sys when accessing this Samba share\. All other users will retain their ordinary primary group\. 2302 2637 .sp 2303 2638 If the 2304 force user parameter is also set the group specified in 2639 \fIforce user\fR 2640 parameter is also set the group specified in 2305 2641 \fIforce group\fR 2306 2642 will override the primary group set in 2307 \fIforce user\fR .2308 .sp 2309 Default: 2310 \f B\fIforce group\fR =\fR2311 .sp 2312 Example: 2313 \f B\fIforce group\fR = agroup\fR2314 .RE 2315 .PP 2643 \fIforce user\fR\. 2644 .sp 2645 Default: 2646 \fI\fIforce group\fR\fR\fI = \fR\fI\fR\fI \fR 2647 .sp 2648 Example: 2649 \fI\fIforce group\fR\fR\fI = \fR\fIagroup\fR\fI \fR 2650 .RE 2651 2316 2652 force printername (S) 2317 .RS 3n 2653 .PP 2654 .RS 4 2318 2655 When printing from Windows NT (or later), each printer in 2319 \fIsmb .conf\fR2320 has two associated names which can be used by the client . The first is the sharename (or shortname) defined in smb.conf. This is the only printername available for use by Windows 9x clients. The second name associated with a printer can be seen when browsing to the "Printers" (or "Printers and Faxes") folder on the Samba server. This is referred to simply as the printername (not to be confused with the2656 \fIsmb\.conf\fR 2657 has two associated names which can be used by the client\. The first is the sharename (or shortname) defined in smb\.conf\. This is the only printername available for use by Windows 9x clients\. The second name associated with a printer can be seen when browsing to the "Printers" (or "Printers and Faxes") folder on the Samba server\. This is referred to simply as the printername (not to be confused with the 2321 2658 \fIprinter name\fR 2322 option) .2323 .sp 2324 When assigning a new driver to a printer on a remote Windows compatible print server such as Samba, the Windows client will rename the printer to match the driver name just uploaded . This can result in confusion for users when multiple printers are bound to the same driver. To prevent Samba from allowing the printer's printername to differ from the sharename defined in smb.conf, set2325 \fIforce printername = yes\fR .2326 .sp 2327 Be aware that enabling this parameter may affect migrating printers from a Windows server to Samba since Windows has no way to force the sharename and printername to match .2328 .sp 2329 It is recommended that this parameter 's value not be changed once the printer is in use by clients as this could cause a user not be able to delete printer connections from their local Printers folder.2330 .sp 2331 Default: 2332 \f B\fIforce printername\fR = no\fR2333 .RE 2334 .PP 2659 option)\. 2660 .sp 2661 When assigning a new driver to a printer on a remote Windows compatible print server such as Samba, the Windows client will rename the printer to match the driver name just uploaded\. This can result in confusion for users when multiple printers are bound to the same driver\. To prevent Samba from allowing the printer\'s printername to differ from the sharename defined in smb\.conf, set 2662 \fIforce printername = yes\fR\. 2663 .sp 2664 Be aware that enabling this parameter may affect migrating printers from a Windows server to Samba since Windows has no way to force the sharename and printername to match\. 2665 .sp 2666 It is recommended that this parameter\'s value not be changed once the printer is in use by clients as this could cause a user not be able to delete printer connections from their local Printers folder\. 2667 .sp 2668 Default: 2669 \fI\fIforce printername\fR\fR\fI = \fR\fIno\fR\fI \fR 2670 .RE 2671 2335 2672 force security mode (S) 2336 .RS 3n 2337 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box. 2338 .sp 2339 This parameter is applied as a mask (OR'ed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on. Make sure not to mix up this parameter with 2340 security mask, which works similar like this one but uses logical AND instead of OR. 2341 .sp 2342 Essentially, one bits in this mask may be treated as a set of bits that, when modifying security on a file, the user has always set to be on. 2343 .sp 2344 If not set explicitly this parameter is set to 0, and allows a user to modify all the user/group/world permissions on a file, with no restrictions. 2345 .sp 2346 \fB Note\fR 2347 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems. Administrators of most normal systems will probably want to leave this set to 0000. 2348 .sp 2349 Default: 2350 \fB\fIforce security mode\fR = 0 \fR 2351 .sp 2352 Example: 2353 \fB\fIforce security mode\fR = 700 \fR 2354 .RE 2355 .PP 2673 .PP 2674 .RS 4 2675 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box\. 2676 .sp 2677 This parameter is applied as a mask (OR\'ed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on\. Make sure not to mix up this parameter with 2678 \fIsecurity mask\fR, which works similar like this one but uses logical AND instead of OR\. 2679 .sp 2680 Essentially, one bits in this mask may be treated as a set of bits that, when modifying security on a file, the user has always set to be on\. 2681 .sp 2682 If not set explicitly this parameter is set to 0, and allows a user to modify all the user/group/world permissions on a file, with no restrictions\. 2683 .sp 2684 \fI Note\fR 2685 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\. Administrators of most normal systems will probably want to leave this set to 0000\. 2686 .sp 2687 Default: 2688 \fI\fIforce security mode\fR\fR\fI = \fR\fI0\fR\fI \fR 2689 .sp 2690 Example: 2691 \fI\fIforce security mode\fR\fR\fI = \fR\fI700\fR\fI \fR 2692 .RE 2693 2356 2694 force unknown acl user (S) 2357 .RS 3n 2358 If this parameter is set, a Windows NT ACL that contains an unknown SID (security descriptor, or representation of a user or group id) as the owner or group owner of the file will be silently mapped into the current UNIX uid or gid of the currently connected user. 2359 .sp 2360 This is designed to allow Windows NT clients to copy files and folders containing ACLs that were created locally on the client machine and contain users local to that machine only (no domain users) to be copied to a Samba server (usually with XCOPY /O) and have the unknown userid and groupid of the file owner map to the current connected user. This can only be fixed correctly when winbindd allows arbitrary mapping from any Windows NT SID to a UNIX uid or gid. 2361 .sp 2362 Try using this parameter when XCOPY /O gives an ACCESS_DENIED error. 2363 .sp 2364 Default: 2365 \fB\fIforce unknown acl user\fR = no \fR 2366 .RE 2367 .PP 2695 .PP 2696 .RS 4 2697 If this parameter is set, a Windows NT ACL that contains an unknown SID (security descriptor, or representation of a user or group id) as the owner or group owner of the file will be silently mapped into the current UNIX uid or gid of the currently connected user\. 2698 .sp 2699 This is designed to allow Windows NT clients to copy files and folders containing ACLs that were created locally on the client machine and contain users local to that machine only (no domain users) to be copied to a Samba server (usually with XCOPY /O) and have the unknown userid and groupid of the file owner map to the current connected user\. This can only be fixed correctly when winbindd allows arbitrary mapping from any Windows NT SID to a UNIX uid or gid\. 2700 .sp 2701 Try using this parameter when XCOPY /O gives an ACCESS_DENIED error\. 2702 .sp 2703 Default: 2704 \fI\fIforce unknown acl user\fR\fR\fI = \fR\fIno\fR\fI \fR 2705 .RE 2706 2368 2707 force user (S) 2369 .RS 3n 2370 This specifies a UNIX user name that will be assigned as the default user for all users connecting to this service. This is useful for sharing files. You should also use it carefully as using it incorrectly can cause security problems. 2371 .sp 2372 This user name only gets used once a connection is established. Thus clients still need to connect as a valid user and supply a valid password. Once connected, all file operations will be performed as the "forced user", no matter what username the client connected as. This can be very useful. 2373 .sp 2374 In Samba 2.0.5 and above this parameter also causes the primary group of the forced user to be used as the primary group for all file activity. Prior to 2.0.5 the primary group was left as the primary group of the connecting user (this was a bug). 2375 .sp 2376 Default: 2377 \fB\fIforce user\fR = \fR 2378 .sp 2379 Example: 2380 \fB\fIforce user\fR = auser \fR 2381 .RE 2382 .PP 2708 .PP 2709 .RS 4 2710 This specifies a UNIX user name that will be assigned as the default user for all users connecting to this service\. This is useful for sharing files\. You should also use it carefully as using it incorrectly can cause security problems\. 2711 .sp 2712 This user name only gets used once a connection is established\. Thus clients still need to connect as a valid user and supply a valid password\. Once connected, all file operations will be performed as the "forced user", no matter what username the client connected as\. This can be very useful\. 2713 .sp 2714 In Samba 2\.0\.5 and above this parameter also causes the primary group of the forced user to be used as the primary group for all file activity\. Prior to 2\.0\.5 the primary group was left as the primary group of the connecting user (this was a bug)\. 2715 .sp 2716 Default: 2717 \fI\fIforce user\fR\fR\fI = \fR\fI\fR\fI \fR 2718 .sp 2719 Example: 2720 \fI\fIforce user\fR\fR\fI = \fR\fIauser\fR\fI \fR 2721 .RE 2722 2383 2723 fstype (S) 2384 .RS 3n 2724 .PP 2725 .RS 4 2385 2726 This parameter allows the administrator to configure the string that specifies the type of filesystem a share is using that is reported by 2386 2727 \fBsmbd\fR(8) 2387 when a client queries the filesystem type for a share . The default type is2728 when a client queries the filesystem type for a share\. The default type is 2388 2729 \fBNTFS\fR 2389 2730 for compatibility with Windows NT but this can be changed to other strings such as … … 2391 2732 or 2392 2733 \fBFAT\fR 2393 if required .2394 .sp 2395 Default: 2396 \f B\fIfstype\fR = NTFS\fR2397 .sp 2398 Example: 2399 \f B\fIfstype\fR = Samba\fR2400 .RE 2401 .PP 2734 if required\. 2735 .sp 2736 Default: 2737 \fI\fIfstype\fR\fR\fI = \fR\fINTFS\fR\fI \fR 2738 .sp 2739 Example: 2740 \fI\fIfstype\fR\fR\fI = \fR\fISamba\fR\fI \fR 2741 .RE 2742 2402 2743 get quota command (G) 2403 .RS 3n 2744 .PP 2745 .RS 4 2404 2746 The 2405 2747 get quota command 2406 should only be used whenever there is no operating system API available from the OS that samba can use .2748 should only be used whenever there is no operating system API available from the OS that samba can use\. 2407 2749 .sp 2408 2750 This option is only available with 2409 ./configure --with-sys-quotas. Or on linux when2410 ./configure --with-quotas2411 was used and a working quota api was found in the system .2412 .sp 2413 This parameter should specify the path to a script that queries the quota information for the specified user/group for the partition that the specified directory is on .2751 \./configure \-\-with\-sys\-quotas\. Or on linux when 2752 \./configure \-\-with\-quotas 2753 was used and a working quota api was found in the system\. 2754 .sp 2755 This parameter should specify the path to a script that queries the quota information for the specified user/group for the partition that the specified directory is on\. 2414 2756 .sp 2415 2757 Such a script should take 3 arguments: 2416 .RS 3n 2417 .TP 3n 2418 \(bu 2758 .sp 2759 .RS 4 2760 .ie n \{\ 2761 \h'-04'\(bu\h'+03'\c 2762 .\} 2763 .el \{\ 2764 .sp -1 2765 .IP \(bu 2.3 2766 .\} 2419 2767 directory 2420 .TP 3n 2421 \(bu 2768 .RE 2769 .sp 2770 .RS 4 2771 .ie n \{\ 2772 \h'-04'\(bu\h'+03'\c 2773 .\} 2774 .el \{\ 2775 .sp -1 2776 .IP \(bu 2.3 2777 .\} 2422 2778 type of query 2423 .TP 3n 2424 \(bu 2779 .RE 2780 .sp 2781 .RS 4 2782 .ie n \{\ 2783 \h'-04'\(bu\h'+03'\c 2784 .\} 2785 .el \{\ 2786 .sp -1 2787 .IP \(bu 2.3 2788 .\} 2425 2789 uid of user or gid of group 2426 . RE2427 . IP "" 3n2790 .sp 2791 .RE 2428 2792 The type of query can be one of : 2429 .RS 3n 2430 .TP 3n 2431 \(bu 2432 1 - user quotas 2433 .TP 3n 2434 \(bu 2435 2 - user default quotas (uid = -1) 2436 .TP 3n 2437 \(bu 2438 3 - group quotas 2439 .TP 3n 2440 \(bu 2441 4 - group default quotas (gid = -1) 2442 .RE 2443 .IP "" 3n 2444 This script should print one line as output with spaces between the arguments. The arguments are: 2445 .RS 3n 2446 .TP 3n 2447 \(bu 2448 Arg 1 - quota flags (0 = no quotas, 1 = quotas enabled, 2 = quotas enabled and enforced) 2449 .TP 3n 2450 \(bu 2451 Arg 2 - number of currently used blocks 2452 .TP 3n 2453 \(bu 2454 Arg 3 - the softlimit number of blocks 2455 .TP 3n 2456 \(bu 2457 Arg 4 - the hardlimit number of blocks 2458 .TP 3n 2459 \(bu 2460 Arg 5 - currently used number of inodes 2461 .TP 3n 2462 \(bu 2463 Arg 6 - the softlimit number of inodes 2464 .TP 3n 2465 \(bu 2466 Arg 7 - the hardlimit number of inodes 2467 .TP 3n 2468 \(bu 2469 Arg 8(optional) - the number of bytes in a block(default is 1024) 2470 .RE 2471 .IP "" 3n 2472 Default: 2473 \fB\fIget quota command\fR = \fR 2474 .sp 2475 Example: 2476 \fB\fIget quota command\fR = /usr/local/sbin/query_quota \fR 2477 .RE 2478 .PP 2793 .sp 2794 .RS 4 2795 .ie n \{\ 2796 \h'-04'\(bu\h'+03'\c 2797 .\} 2798 .el \{\ 2799 .sp -1 2800 .IP \(bu 2.3 2801 .\} 2802 1 \- user quotas 2803 .RE 2804 .sp 2805 .RS 4 2806 .ie n \{\ 2807 \h'-04'\(bu\h'+03'\c 2808 .\} 2809 .el \{\ 2810 .sp -1 2811 .IP \(bu 2.3 2812 .\} 2813 2 \- user default quotas (uid = \-1) 2814 .RE 2815 .sp 2816 .RS 4 2817 .ie n \{\ 2818 \h'-04'\(bu\h'+03'\c 2819 .\} 2820 .el \{\ 2821 .sp -1 2822 .IP \(bu 2.3 2823 .\} 2824 3 \- group quotas 2825 .RE 2826 .sp 2827 .RS 4 2828 .ie n \{\ 2829 \h'-04'\(bu\h'+03'\c 2830 .\} 2831 .el \{\ 2832 .sp -1 2833 .IP \(bu 2.3 2834 .\} 2835 4 \- group default quotas (gid = \-1) 2836 .sp 2837 .RE 2838 This script should print one line as output with spaces between the arguments\. The arguments are: 2839 .sp 2840 .RS 4 2841 .ie n \{\ 2842 \h'-04'\(bu\h'+03'\c 2843 .\} 2844 .el \{\ 2845 .sp -1 2846 .IP \(bu 2.3 2847 .\} 2848 Arg 1 \- quota flags (0 = no quotas, 1 = quotas enabled, 2 = quotas enabled and enforced) 2849 .RE 2850 .sp 2851 .RS 4 2852 .ie n \{\ 2853 \h'-04'\(bu\h'+03'\c 2854 .\} 2855 .el \{\ 2856 .sp -1 2857 .IP \(bu 2.3 2858 .\} 2859 Arg 2 \- number of currently used blocks 2860 .RE 2861 .sp 2862 .RS 4 2863 .ie n \{\ 2864 \h'-04'\(bu\h'+03'\c 2865 .\} 2866 .el \{\ 2867 .sp -1 2868 .IP \(bu 2.3 2869 .\} 2870 Arg 3 \- the softlimit number of blocks 2871 .RE 2872 .sp 2873 .RS 4 2874 .ie n \{\ 2875 \h'-04'\(bu\h'+03'\c 2876 .\} 2877 .el \{\ 2878 .sp -1 2879 .IP \(bu 2.3 2880 .\} 2881 Arg 4 \- the hardlimit number of blocks 2882 .RE 2883 .sp 2884 .RS 4 2885 .ie n \{\ 2886 \h'-04'\(bu\h'+03'\c 2887 .\} 2888 .el \{\ 2889 .sp -1 2890 .IP \(bu 2.3 2891 .\} 2892 Arg 5 \- currently used number of inodes 2893 .RE 2894 .sp 2895 .RS 4 2896 .ie n \{\ 2897 \h'-04'\(bu\h'+03'\c 2898 .\} 2899 .el \{\ 2900 .sp -1 2901 .IP \(bu 2.3 2902 .\} 2903 Arg 6 \- the softlimit number of inodes 2904 .RE 2905 .sp 2906 .RS 4 2907 .ie n \{\ 2908 \h'-04'\(bu\h'+03'\c 2909 .\} 2910 .el \{\ 2911 .sp -1 2912 .IP \(bu 2.3 2913 .\} 2914 Arg 7 \- the hardlimit number of inodes 2915 .RE 2916 .sp 2917 .RS 4 2918 .ie n \{\ 2919 \h'-04'\(bu\h'+03'\c 2920 .\} 2921 .el \{\ 2922 .sp -1 2923 .IP \(bu 2.3 2924 .\} 2925 Arg 8(optional) \- the number of bytes in a block(default is 1024) 2926 .sp 2927 .RE 2928 Default: 2929 \fI\fIget quota command\fR\fR\fI = \fR\fI\fR\fI \fR 2930 .sp 2931 Example: 2932 \fI\fIget quota command\fR\fR\fI = \fR\fI/usr/local/sbin/query_quota\fR\fI \fR 2933 .RE 2934 2479 2935 getwd cache (G) 2480 .RS 3n 2481 This is a tuning option. When this is enabled a caching algorithm will be used to reduce the time taken for getwd() calls. This can have a significant impact on performance, especially when the 2482 wide smbconfoptions parameter is set to 2483 \fBno\fR. 2484 .sp 2485 Default: 2486 \fB\fIgetwd cache\fR = yes \fR 2487 .RE 2488 .PP 2936 .PP 2937 .RS 4 2938 This is a tuning option\. When this is enabled a caching algorithm will be used to reduce the time taken for getwd() calls\. This can have a significant impact on performance, especially when the 2939 \fIwide smbconfoptions\fR 2940 parameter is set to 2941 \fBno\fR\. 2942 .sp 2943 Default: 2944 \fI\fIgetwd cache\fR\fR\fI = \fR\fIyes\fR\fI \fR 2945 .RE 2946 2489 2947 guest account (G) 2490 .RS 3n 2948 .PP 2949 .RS 4 2491 2950 This is a username which will be used for access to services which are specified as 2492 guest ok (see below). Whatever privileges this user has will be available to any client connecting to the guest service. This user must exist in the password file, but does not require a valid login. The user account "ftp" is often a good choice for this parameter. 2493 .sp 2494 On some systems the default guest account "nobody" may not be able to print. Use another account in this case. You should test this by trying to log in as your guest user (perhaps by using the 2495 su - 2951 \fIguest ok\fR 2952 (see below)\. Whatever privileges this user has will be available to any client connecting to the guest service\. This user must exist in the password file, but does not require a valid login\. The user account "ftp" is often a good choice for this parameter\. 2953 .sp 2954 On some systems the default guest account "nobody" may not be able to print\. Use another account in this case\. You should test this by trying to log in as your guest user (perhaps by using the 2955 su \- 2496 2956 command) and trying to print using the system print command such as 2497 2957 lpr(1) 2498 2958 or 2499 lp(1) .2500 .sp 2501 This parameter does not accept % macros, because many parts of the system require this value to be constant for correct operation .2502 .sp 2503 Default: 2504 \f B\fIguest account\fR = nobody # default can be changed at compile-time\fR2505 .sp 2506 Example: 2507 \f B\fIguest account\fR = ftp\fR2508 .RE 2509 .PP2510 public 2511 .RS 3n 2512 This parameter is a synonym for guest ok.2513 .RE 2514 .PP 2959 lp(1)\. 2960 .sp 2961 This parameter does not accept % macros, because many parts of the system require this value to be constant for correct operation\. 2962 .sp 2963 Default: 2964 \fI\fIguest account\fR\fR\fI = \fR\fInobody # default can be changed at compile\-time\fR\fI \fR 2965 .sp 2966 Example: 2967 \fI\fIguest account\fR\fR\fI = \fR\fIftp\fR\fI \fR 2968 .RE 2969 public.PP 2970 .RS 4 2971 This parameter is a synonym for 2972 guest ok\. 2973 .RE 2974 2515 2975 guest ok (S) 2516 .RS 3n 2976 .PP 2977 .RS 4 2517 2978 If this parameter is 2518 2979 \fByes\fR 2519 for a service, then no password is required to connect to the service . Privileges will be those of the2520 guest account.2980 for a service, then no password is required to connect to the service\. Privileges will be those of the 2981 \fIguest account\fR\. 2521 2982 .sp 2522 2983 This paramater nullifies the benifits of setting 2523 restrict anonymous = 2 2984 \fIrestrict anonymous = 2\fR 2524 2985 .sp 2525 2986 See the section below on 2526 security for more information about this option. 2527 .sp 2528 Default: 2529 \fB\fIguest ok\fR = no \fR 2530 .RE 2531 .PP 2532 only guest 2533 .RS 3n 2534 This parameter is a synonym for guest only. 2535 .RE 2536 .PP 2987 \fIsecurity\fR 2988 for more information about this option\. 2989 .sp 2990 Default: 2991 \fI\fIguest ok\fR\fR\fI = \fR\fIno\fR\fI \fR 2992 .RE 2993 only guest.PP 2994 .RS 4 2995 This parameter is a synonym for 2996 guest only\. 2997 .RE 2998 2537 2999 guest only (S) 2538 .RS 3n 3000 .PP 3001 .RS 4 2539 3002 If this parameter is 2540 3003 \fByes\fR 2541 for a service, then only guest connections to the service are permitted. This parameter will have no effect if 2542 guest ok is not set for the service. 3004 for a service, then only guest connections to the service are permitted\. This parameter will have no effect if 3005 \fIguest ok\fR 3006 is not set for the service\. 2543 3007 .sp 2544 3008 See the section below on 2545 security for more information about this option. 2546 .sp 2547 Default: 2548 \fB\fIguest only\fR = no \fR 2549 .RE 2550 .PP 3009 \fIsecurity\fR 3010 for more information about this option\. 3011 .sp 3012 Default: 3013 \fI\fIguest only\fR\fR\fI = \fR\fIno\fR\fI \fR 3014 .RE 3015 2551 3016 hide dot files (S) 2552 .RS 3n 2553 This is a boolean parameter that controls whether files starting with a dot appear as hidden files. 2554 .sp 2555 Default: 2556 \fB\fIhide dot files\fR = yes \fR 2557 .RE 2558 .PP 3017 .PP 3018 .RS 4 3019 This is a boolean parameter that controls whether files starting with a dot appear as hidden files\. 3020 .sp 3021 Default: 3022 \fI\fIhide dot files\fR\fR\fI = \fR\fIyes\fR\fI \fR 3023 .RE 3024 2559 3025 hide files (S) 2560 .RS 3n 2561 This is a list of files or directories that are not visible but are accessible. The DOS 'hidden' attribute is applied to any files or directories that match. 2562 .sp 2563 Each entry in the list must be separated by a '/', which allows spaces to be included in the entry. '*' and '?' can be used to specify multiple files or directories as in DOS wildcards. 2564 .sp 2565 Each entry must be a Unix path, not a DOS path and must not include the Unix directory separator '/'. 2566 .sp 2567 Note that the case sensitivity option is applicable in hiding files. 2568 .sp 2569 Setting this parameter will affect the performance of Samba, as it will be forced to check all files and directories for a match as they are scanned. 3026 .PP 3027 .RS 4 3028 This is a list of files or directories that are not visible but are accessible\. The DOS \'hidden\' attribute is applied to any files or directories that match\. 3029 .sp 3030 Each entry in the list must be separated by a \'/\', which allows spaces to be included in the entry\. \'*\' and \'?\' can be used to specify multiple files or directories as in DOS wildcards\. 3031 .sp 3032 Each entry must be a Unix path, not a DOS path and must not include the Unix directory separator \'/\'\. 3033 .sp 3034 Note that the case sensitivity option is applicable in hiding files\. 3035 .sp 3036 Setting this parameter will affect the performance of Samba, as it will be forced to check all files and directories for a match as they are scanned\. 2570 3037 .sp 2571 3038 The example shown above is based on files that the Macintosh SMB client (DAVE) available from 2572 3039 Thursby 2573 creates for internal use, and also still hides all files beginning with a dot .3040 creates for internal use, and also still hides all files beginning with a dot\. 2574 3041 .sp 2575 3042 An example of us of this parameter is: 2576 2577 .sp 2578 3043 .sp 3044 .RS 4 2579 3045 .nf 2580 2581 hide files = /.*/DesktopFolderDB/TrashFor%m/resource.frk/ 2582 3046 hide files = /\.*/DesktopFolderDB/TrashFor%m/resource\.frk/ 2583 3047 .fi 2584 2585 .sp 2586 Default: 2587 \fB\fIhide files\fR = # no file are hidden \fR 2588 .RE 2589 .PP 3048 .RE 3049 .sp 3050 .sp 3051 Default: 3052 \fI\fIhide files\fR\fR\fI = \fR\fI # no file are hidden\fR\fI \fR 3053 .RE 3054 2590 3055 hide special files (S) 2591 .RS 3n 2592 This parameter prevents clients from seeing special files such as sockets, devices and fifo's in directory listings. 2593 .sp 2594 Default: 2595 \fB\fIhide special files\fR = no \fR 2596 .RE 2597 .PP 3056 .PP 3057 .RS 4 3058 This parameter prevents clients from seeing special files such as sockets, devices and fifo\'s in directory listings\. 3059 .sp 3060 Default: 3061 \fI\fIhide special files\fR\fR\fI = \fR\fIno\fR\fI \fR 3062 .RE 3063 2598 3064 hide unreadable (S) 2599 .RS 3n 2600 This parameter prevents clients from seeing the existance of files that cannot be read. Defaults to off. 2601 .sp 2602 Default: 2603 \fB\fIhide unreadable\fR = no \fR 2604 .RE 2605 .PP 3065 .PP 3066 .RS 4 3067 This parameter prevents clients from seeing the existance of files that cannot be read\. Defaults to off\. 3068 .sp 3069 Default: 3070 \fI\fIhide unreadable\fR\fR\fI = \fR\fIno\fR\fI \fR 3071 .RE 3072 2606 3073 hide unwriteable files (S) 2607 .RS 3n 2608 This parameter prevents clients from seeing the existance of files that cannot be written to. Defaults to off. Note that unwriteable directories are shown as usual. 2609 .sp 2610 Default: 2611 \fB\fIhide unwriteable files\fR = no \fR 2612 .RE 2613 .PP 3074 .PP 3075 .RS 4 3076 This parameter prevents clients from seeing the existance of files that cannot be written to\. Defaults to off\. Note that unwriteable directories are shown as usual\. 3077 .sp 3078 Default: 3079 \fI\fIhide unwriteable files\fR\fR\fI = \fR\fIno\fR\fI \fR 3080 .RE 3081 2614 3082 homedir map (G) 2615 .RS 3n 3083 .PP 3084 .RS 4 2616 3085 If 2617 nis homedir is 3086 \fInis homedir\fR 3087 is 2618 3088 \fByes\fR, and 2619 3089 \fBsmbd\fR(8) 2620 3090 is also acting as a Win95/98 2621 3091 \fIlogon server\fR 2622 then this parameter specifies the NIS (or YP) map from which the server for the user's home directory should be extracted. At present, only the Sun auto.home map format is understood. The form of the map is: 2623 2624 .sp 2625 3092 then this parameter specifies the NIS (or YP) map from which the server for the user\'s home directory should be extracted\. At present, only the Sun auto\.home map format is understood\. The form of the map is: 3093 .sp 3094 .RS 4 2626 3095 .nf 2627 2628 3096 username server:/some/file/system 2629 2630 3097 .fi 2631 and the program will extract the servername from before the first ':'. There should probably be a better parsing system that copes with different map formats and also Amd (another automounter) maps. 3098 .RE 3099 .sp 3100 and the program will extract the servername from before the first \':\'\. There should probably be a better parsing system that copes with different map formats and also Amd (another automounter) maps\. 2632 3101 .sp 2633 3102 .it 1 an-trap … … 2635 3104 .nr an-break-flag 1 2636 3105 .br 2637 \fBNote\fR 2638 A working NIS client is required on the system for this option to work. 2639 Default: 2640 \fB\fIhomedir map\fR = \fR 2641 .sp 2642 Example: 2643 \fB\fIhomedir map\fR = amd.homedir \fR 2644 .RE 2645 .PP 3106 Note 3107 A working NIS client is required on the system for this option to work\. 3108 3109 Default: 3110 \fI\fIhomedir map\fR\fR\fI = \fR\fI\fR\fI \fR 3111 .sp 3112 Example: 3113 \fI\fIhomedir map\fR\fR\fI = \fR\fIamd\.homedir\fR\fI \fR 3114 .RE 3115 2646 3116 host msdfs (G) 2647 .RS 3n 3117 .PP 3118 .RS 4 2648 3119 If set to 2649 \fByes\fR, Samba will act as a Dfs server, and allow Dfs -aware clients to browse Dfs trees hosted on the server.3120 \fByes\fR, Samba will act as a Dfs server, and allow Dfs\-aware clients to browse Dfs trees hosted on the server\. 2650 3121 .sp 2651 3122 See also the 2652 msdfs root share level parameter. For more information on setting up a Dfs tree on Samba, refer to the MSFDS chapter in the book Samba3-HOWTO. 2653 .sp 2654 Default: 2655 \fB\fIhost msdfs\fR = yes \fR 2656 .RE 2657 .PP 3123 \fImsdfs root\fR 3124 share level parameter\. For more information on setting up a Dfs tree on Samba, refer to the MSFDS chapter in the book Samba3\-HOWTO\. 3125 .sp 3126 Default: 3127 \fI\fIhost msdfs\fR\fR\fI = \fR\fIyes\fR\fI \fR 3128 .RE 3129 2658 3130 hostname lookups (G) 2659 .RS 3n 2660 Specifies whether samba should use (expensive) hostname lookups or use the ip addresses instead. An example place where hostname lookups are currently used is when checking the 3131 .PP 3132 .RS 4 3133 Specifies whether samba should use (expensive) hostname lookups or use the ip addresses instead\. An example place where hostname lookups are currently used is when checking the 2661 3134 hosts deny 2662 3135 and 2663 hosts allow .2664 .sp 2665 Default: 2666 \f B\fIhostname lookups\fR = no\fR2667 .sp 2668 Example: 2669 \f B\fIhostname lookups\fR = yes\fR2670 .RE 2671 .PP2672 allow hosts 2673 .RS 3n 2674 This parameter is a synonym for hosts allow.2675 .RE 2676 .PP 3136 hosts allow\. 3137 .sp 3138 Default: 3139 \fI\fIhostname lookups\fR\fR\fI = \fR\fIno\fR\fI \fR 3140 .sp 3141 Example: 3142 \fI\fIhostname lookups\fR\fR\fI = \fR\fIyes\fR\fI \fR 3143 .RE 3144 allow hosts.PP 3145 .RS 4 3146 This parameter is a synonym for 3147 hosts allow\. 3148 .RE 3149 2677 3150 hosts allow (S) 2678 .RS 3n 3151 .PP 3152 .RS 4 2679 3153 A synonym for this parameter is 2680 allow hosts. 2681 .sp 2682 This parameter is a comma, space, or tab delimited set of hosts which are permitted to access a service. 2683 .sp 2684 If specified in the [global] section then it will apply to all services, regardless of whether the individual service has a different setting. 2685 .sp 2686 You can specify the hosts by name or IP number. For example, you could restrict access to only the hosts on a Class C subnet with something like 2687 allow hosts = 150.203.5.. The full syntax of the list is described in the man page 2688 \fIhosts_access(5)\fR. Note that this man page may not be present on your system, so a brief description will be given here also. 2689 .sp 2690 Note that the localhost address 127.0.0.1 will always be allowed access unless specifically denied by a 2691 hosts deny option. 2692 .sp 2693 You can also specify hosts by network/netmask pairs and by netgroup names if your system supports netgroups. The 2694 \fBEXCEPT\fR 2695 keyword can also be used to limit a wildcard list. The following examples may provide some help: 2696 .sp 2697 Example 1: allow all IPs in 150.203.*.*; except one 2698 .sp 2699 hosts allow = 150.203. EXCEPT 150.203.6.66 3154 \fIallow hosts\fR\. 3155 .sp 3156 This parameter is a comma, space, or tab delimited set of hosts which are permitted to access a service\. 3157 .sp 3158 If specified in the [global] section then it will apply to all services, regardless of whether the individual service has a different setting\. 3159 .sp 3160 You can specify the hosts by name or IP number\. For example, you could restrict access to only the hosts on a Class C subnet with something like 3161 allow hosts = 150\.203\.5\.\. The full syntax of the list is described in the man page 3162 \fIhosts_access(5)\fR\. Note that this man page may not be present on your system, so a brief description will be given here also\. 3163 .sp 3164 Note that the localhost address 127\.0\.0\.1 will always be allowed access unless specifically denied by a 3165 \fIhosts deny\fR 3166 option\. 3167 .sp 3168 You can also specify hosts by network/netmask pairs and by netgroup names if your system supports netgroups\. The 3169 \fIEXCEPT\fR 3170 keyword can also be used to limit a wildcard list\. The following examples may provide some help: 3171 .sp 3172 Example 1: allow all IPs in 150\.203\.*\.*; except one 3173 .sp 3174 hosts allow = 150\.203\. EXCEPT 150\.203\.6\.66 2700 3175 .sp 2701 3176 Example 2: allow hosts that match the given network/netmask 2702 3177 .sp 2703 hosts allow = 150 .203.15.0/255.255.255.03178 hosts allow = 150\.203\.15\.0/255\.255\.255\.0 2704 3179 .sp 2705 3180 Example 3: allow a couple of hosts … … 2717 3192 .nr an-break-flag 1 2718 3193 .br 2719 \fBNote\fR 2720 Note that access still requires suitable user-level passwords. 3194 Note 3195 Note that access still requires suitable user\-level passwords\. 3196 2721 3197 See 2722 3198 \fBtestparm\fR(1) 2723 for a way of testing your host access to see if it does what you expect .2724 .sp 2725 Default: 2726 \f B\fIhosts allow\fR = # none (i.e., all hosts permitted access)\fR2727 .sp 2728 Example: 2729 \f B\fIhosts allow\fR = 150.203.5. myhost.mynet.edu.au\fR2730 .RE 2731 .PP2732 deny hosts 2733 .RS 3n 2734 This parameter is a synonym for hosts deny.2735 .RE 2736 .PP 3199 for a way of testing your host access to see if it does what you expect\. 3200 .sp 3201 Default: 3202 \fI\fIhosts allow\fR\fR\fI = \fR\fI # none (i\.e\., all hosts permitted access)\fR\fI \fR 3203 .sp 3204 Example: 3205 \fI\fIhosts allow\fR\fR\fI = \fR\fI150\.203\.5\. myhost\.mynet\.edu\.au\fR\fI \fR 3206 .RE 3207 deny hosts.PP 3208 .RS 4 3209 This parameter is a synonym for 3210 hosts deny\. 3211 .RE 3212 2737 3213 hosts deny (S) 2738 .RS 3n 3214 .PP 3215 .RS 4 2739 3216 The opposite of 2740 3217 \fIhosts allow\fR 2741 - hosts listed here are2742 \f BNOT\fR2743 permitted access to services unless the specific services have their own lists to override this one . Where the lists conflict, the3218 \- hosts listed here are 3219 \fINOT\fR 3220 permitted access to services unless the specific services have their own lists to override this one\. Where the lists conflict, the 2744 3221 \fIallow\fR 2745 list takes precedence .3222 list takes precedence\. 2746 3223 .sp 2747 3224 In the event that it is necessary to deny all by default, use the keyword ALL (or the netmask 2748 0.0.0.0/0) and then explicitly specify to the 2749 hosts allow = hosts allow parameter those hosts that should be permitted access. 2750 .sp 2751 Default: 2752 \fB\fIhosts deny\fR = # none (i.e., no hosts specifically excluded) \fR 2753 .sp 2754 Example: 2755 \fB\fIhosts deny\fR = 150.203.4. badhost.mynet.edu.au \fR 2756 .RE 2757 .PP 3225 0\.0\.0\.0/0) and then explicitly specify to the 3226 \fIhosts allow = hosts allow\fR 3227 parameter those hosts that should be permitted access\. 3228 .sp 3229 Default: 3230 \fI\fIhosts deny\fR\fR\fI = \fR\fI # none (i\.e\., no hosts specifically excluded)\fR\fI \fR 3231 .sp 3232 Example: 3233 \fI\fIhosts deny\fR\fR\fI = \fR\fI150\.203\.4\. badhost\.mynet\.edu\.au\fR\fI \fR 3234 .RE 3235 2758 3236 idmap alloc backend (G) 2759 .RS 3n 2760 The idmap alloc backend provides a plugin interface for Winbind to use when allocating Unix uids/gids for Windows SIDs. This option is to be used in conjunction with the 2761 idmap domains parameter and refers to the name of the idmap module which will provide the id allocation functionality. Please refer to the man page for each idmap plugin to determine whether or not the module implements the allocation feature. The most common plugins are the tdb (\fBidmap_tdb\fR(8)) and ldap (\fBidmap_ldap\fR(8)) libraries. 3237 .PP 3238 .RS 4 3239 The idmap alloc backend provides a plugin interface for Winbind to use when allocating Unix uids/gids for Windows SIDs\. This option is to be used in conjunction with the 3240 \fIidmap domains\fR 3241 parameter and refers to the name of the idmap module which will provide the id allocation functionality\. Please refer to the man page for each idmap plugin to determine whether or not the module implements the allocation feature\. The most common plugins are the tdb (\fBidmap_tdb\fR(8)) and ldap (\fBidmap_ldap\fR(8)) libraries\. 2762 3242 .sp 2763 3243 Also refer to the 2764 idmap alloc config option. 2765 .sp 2766 \fBNo default\fR 2767 .sp 2768 Example: 2769 \fB\fIidmap alloc backend\fR = tdb \fR 2770 .RE 2771 .PP 3244 \fIidmap alloc config\fR 3245 option\. 3246 .sp 3247 \fINo default\fR 3248 .sp 3249 Example: 3250 \fI\fIidmap alloc backend\fR\fR\fI = \fR\fItdb\fR\fI \fR 3251 .RE 3252 2772 3253 idmap alloc config (G) 2773 .RS 3n 3254 .PP 3255 .RS 4 2774 3256 The idmap alloc config prefix provides a means of managing settings for the backend defined by the 2775 idmap alloc backend parameter. Refer to the man page for each idmap plugin regarding specific configuration details. 2776 .sp 2777 \fBNo default\fR 2778 .RE 2779 .PP 3257 \fIidmap alloc backend\fR 3258 parameter\. Refer to the man page for each idmap plugin regarding specific configuration details\. 3259 .sp 3260 \fINo default\fR 3261 .RE 3262 2780 3263 idmap backend (G) 2781 .RS 3n 2782 The idmap backend provides a plugin interface for Winbind to use varying backends to store SID/uid/gid mapping tables. This option is mutually exclusive with the newer and more flexible 2783 idmap domains parameter. The main difference between the "idmap backend" and the "idmap domains" is that the former only allows on backend for all domains while the latter supports configuring backends on a per domain basis. 2784 .sp 2785 Examples of SID/uid/gid backends include tdb (\fBidmap_tdb\fR(8)), ldap (\fBidmap_ldap\fR(8)), rid (\fBidmap_rid\fR(8)), and ad (\fBidmap_tdb\fR(8)). 2786 .sp 2787 Default: 2788 \fB\fIidmap backend\fR = tdb \fR 2789 .RE 2790 .PP 3264 .PP 3265 .RS 4 3266 The idmap backend provides a plugin interface for Winbind to use varying backends to store SID/uid/gid mapping tables\. This option is mutually exclusive with the newer and more flexible 3267 \fIidmap domains\fR 3268 parameter\. The main difference between the "idmap backend" and the "idmap domains" is that the former only allows on backend for all domains while the latter supports configuring backends on a per domain basis\. 3269 .sp 3270 Examples of SID/uid/gid backends include tdb (\fBidmap_tdb\fR(8)), ldap (\fBidmap_ldap\fR(8)), rid (\fBidmap_rid\fR(8)), and ad (\fBidmap_tdb\fR(8))\. 3271 .sp 3272 Default: 3273 \fI\fIidmap backend\fR\fR\fI = \fR\fItdb\fR\fI \fR 3274 .RE 3275 2791 3276 idmap cache time (G) 2792 .RS 3n 2793 This parameter specifies the number of seconds that Winbind's idmap interface will cache positive SID/uid/gid query results. 2794 .sp 2795 Default: 2796 \fB\fIidmap cache time\fR = 900 \fR 2797 .RE 2798 .PP 3277 .PP 3278 .RS 4 3279 This parameter specifies the number of seconds that Winbind\'s idmap interface will cache positive SID/uid/gid query results\. 3280 .sp 3281 Default: 3282 \fI\fIidmap cache time\fR\fR\fI = \fR\fI900\fR\fI \fR 3283 .RE 3284 2799 3285 idmap config (G) 2800 .RS 3n 3286 .PP 3287 .RS 4 2801 3288 The idmap config prefix provides a means of managing each domain defined by the 2802 idmap domains option using Samba's parameteric option support. The idmap config prefix should be followed by the name of the domain, a colon, and a setting specific to the chosen backend. There are three options available for all domains: 2803 2804 .RS 3n 3289 \fIidmap domains\fR 3290 option using Samba\'s parameteric option support\. The idmap config prefix should be followed by the name of the domain, a colon, and a setting specific to the chosen backend\. There are three options available for all domains: 2805 3291 .PP 2806 3292 backend = backend_name 2807 .RS 3n2808 Specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain .3293 .RS 4 3294 Specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\. 2809 3295 .RE 2810 3296 .PP 2811 3297 default = [yes|no] 2812 .RS 3n2813 The default domain/backend will be used for searching for users and groups not belonging to one of the explicitly listed domains (matched by comparing the account SID and the domain SID) .3298 .RS 4 3299 The default domain/backend will be used for searching for users and groups not belonging to one of the explicitly listed domains (matched by comparing the account SID and the domain SID)\. 2814 3300 .RE 2815 3301 .PP 2816 3302 readonly = [yes|no] 2817 .RS 3n3303 .RS 4 2818 3304 Mark the domain as readonly which means that no attempts to allocate a uid or gid (by the 2819 idmap alloc backend) for any user or group in that domain will be attempted. 2820 .RE 2821 .RE 2822 .IP "" 3n 3305 \fIidmap alloc backend\fR) for any user or group in that domain will be attempted\. 3306 .RE 3307 .sp 2823 3308 The following example illustrates how to configure the 2824 3309 \fBidmap_ad\fR(8) 2825 3310 for the CORP domain and the 2826 3311 \fBidmap_tdb\fR(8) 2827 backend for all other domains. The TRUSTEDDOMAINS string is simply a key used to reference the "idmap config" settings and does not represent the actual name of a domain. 2828 3312 backend for all other domains\. The TRUSTEDDOMAINS string is simply a key used to reference the "idmap config" settings and does not represent the actual name of a domain\. 3313 .sp 3314 .RS 4 2829 3315 .nf 2830 2831 3316 idmap domains = CORP TRUSTEDDOMAINS 2832 3317 … … 2836 3321 idmap config TRUSTEDDOMAINS:backend = tdb 2837 3322 idmap config TRUSTEDDOMAINS:default = yes 2838 idmap config TRUSTEDDOMAINS:range = 1000 - 99993323 idmap config TRUSTEDDOMAINS:range = 1000 \- 9999 2839 3324 2840 3325 .fi 2841 \fBNo default\fR 2842 .RE 2843 .PP 3326 .RE 3327 \fINo default\fR 3328 .RE 3329 2844 3330 idmap domains (G) 2845 .RS 3n 2846 The idmap domains option defines a list of Windows domains which will each have a separately configured backend for managing Winbind's SID/uid/gid tables. This parameter is mutually exclusive with the older 2847 idmap backend option. 2848 .sp 2849 Values consist of the short domain name for Winbind's primary or collection of trusted domains. You may also use an arbitrary string to represent a catchall domain backend for any domain not explicitly listed. 3331 .PP 3332 .RS 4 3333 The idmap domains option defines a list of Windows domains which will each have a separately configured backend for managing Winbind\'s SID/uid/gid tables\. This parameter is mutually exclusive with the older 3334 \fIidmap backend\fR 3335 option\. 3336 .sp 3337 Values consist of the short domain name for Winbind\'s primary or collection of trusted domains\. You may also use an arbitrary string to represent a catchall domain backend for any domain not explicitly listed\. 2850 3338 .sp 2851 3339 Refer to the 2852 idmap config for details about managing the SID/uid/gid backend for each domain. 2853 .sp 2854 \fBNo default\fR 2855 .sp 2856 Example: 2857 \fB\fIidmap domains\fR = default AD CORP \fR 2858 .RE 2859 .PP 2860 winbind gid 2861 .RS 3n 2862 This parameter is a synonym for idmap gid. 2863 .RE 2864 .PP 3340 \fIidmap config\fR 3341 for details about managing the SID/uid/gid backend for each domain\. 3342 .sp 3343 \fINo default\fR 3344 .sp 3345 Example: 3346 \fI\fIidmap domains\fR\fR\fI = \fR\fIdefault AD CORP\fR\fI \fR 3347 .RE 3348 winbind gid.PP 3349 .RS 4 3350 This parameter is a synonym for 3351 idmap gid\. 3352 .RE 3353 2865 3354 idmap gid (G) 2866 .RS 3n 2867 The idmap gid parameter specifies the range of group ids that are allocated for the purpose of mapping UNX groups to NT group SIDs. This range of group ids should have no existing local or NIS groups within it as strange conflicts can occur otherwise. 3355 .PP 3356 .RS 4 3357 The idmap gid parameter specifies the range of group ids that are allocated for the purpose of mapping UNX groups to NT group SIDs\. This range of group ids should have no existing local or NIS groups within it as strange conflicts can occur otherwise\. 2868 3358 .sp 2869 3359 See also the 2870 idmap backend, 2871 idmap domains, and 2872 idmap config options. 2873 .sp 2874 Default: 2875 \fB\fIidmap gid\fR = \fR 2876 .sp 2877 Example: 2878 \fB\fIidmap gid\fR = 10000-20000 \fR 2879 .RE 2880 .PP 3360 \fIidmap backend\fR, 3361 \fIidmap domains\fR, and 3362 \fIidmap config\fR 3363 options\. 3364 .sp 3365 Default: 3366 \fI\fIidmap gid\fR\fR\fI = \fR\fI\fR\fI \fR 3367 .sp 3368 Example: 3369 \fI\fIidmap gid\fR\fR\fI = \fR\fI10000\-20000\fR\fI \fR 3370 .RE 3371 2881 3372 idmap negative cache time (G) 2882 .RS 3n 2883 This parameter specifies the number of seconds that Winbind's idmap interface will cache negative SID/uid/gid query results. 2884 .sp 2885 Default: 2886 \fB\fIidmap negative cache time\fR = 120 \fR 2887 .RE 2888 .PP 2889 winbind uid 2890 .RS 3n 2891 This parameter is a synonym for idmap uid. 2892 .RE 2893 .PP 3373 .PP 3374 .RS 4 3375 This parameter specifies the number of seconds that Winbind\'s idmap interface will cache negative SID/uid/gid query results\. 3376 .sp 3377 Default: 3378 \fI\fIidmap negative cache time\fR\fR\fI = \fR\fI120\fR\fI \fR 3379 .RE 3380 winbind uid.PP 3381 .RS 4 3382 This parameter is a synonym for 3383 idmap uid\. 3384 .RE 3385 2894 3386 idmap uid (G) 2895 .RS 3n 2896 The idmap uid parameter specifies the range of user ids that are allocated for use in mapping UNIX users to NT user SIDs. This range of ids should have no existing local or NIS users within it as strange conflicts can occur otherwise. 3387 .PP 3388 .RS 4 3389 The idmap uid parameter specifies the range of user ids that are allocated for use in mapping UNIX users to NT user SIDs\. This range of ids should have no existing local or NIS users within it as strange conflicts can occur otherwise\. 2897 3390 .sp 2898 3391 See also the 2899 idmap backend, 2900 idmap domains, and 2901 idmap config options. 2902 .sp 2903 Default: 2904 \fB\fIidmap uid\fR = \fR 2905 .sp 2906 Example: 2907 \fB\fIidmap uid\fR = 10000-20000 \fR 2908 .RE 2909 .PP 3392 \fIidmap backend\fR, 3393 \fIidmap domains\fR, and 3394 \fIidmap config\fR 3395 options\. 3396 .sp 3397 Default: 3398 \fI\fIidmap uid\fR\fR\fI = \fR\fI\fR\fI \fR 3399 .sp 3400 Example: 3401 \fI\fIidmap uid\fR\fR\fI = \fR\fI10000\-20000\fR\fI \fR 3402 .RE 3403 2910 3404 include (G) 2911 .RS 3n 2912 This allows you to include one config file inside another. The file is included literally, as though typed in place. 3405 .PP 3406 .RS 4 3407 This allows you to include one config file inside another\. The file is included literally, as though typed in place\. 2913 3408 .sp 2914 3409 It takes the standard substitutions, except … … 2916 3411 \fI%P\fR 2917 3412 and 2918 \fI%S\fR .2919 .sp 2920 Default: 2921 \f B\fIinclude\fR =\fR2922 .sp 2923 Example: 2924 \f B\fIinclude\fR = /usr/local/samba/lib/admin_smb.conf\fR2925 .RE 2926 .PP 3413 \fI%S\fR\. 3414 .sp 3415 Default: 3416 \fI\fIinclude\fR\fR\fI = \fR\fI\fR\fI \fR 3417 .sp 3418 Example: 3419 \fI\fIinclude\fR\fR\fI = \fR\fI/usr/local/samba/lib/admin_smb\.conf\fR\fI \fR 3420 .RE 3421 2927 3422 inherit acls (S) 2928 .RS 3n 2929 This parameter can be used to ensure that if default acls exist on parent directories, they are always honored when creating a new file or subdirectory in these parent directories. The default behavior is to use the unix mode specified when creating the directory. Enabling this option sets the unix mode to 0777, thus guaranteeing that default directory acls are propagated. 2930 .sp 2931 Default: 2932 \fB\fIinherit acls\fR = no \fR 2933 .RE 2934 .PP 3423 .PP 3424 .RS 4 3425 This parameter can be used to ensure that if default acls exist on parent directories, they are always honored when creating a new file or subdirectory in these parent directories\. The default behavior is to use the unix mode specified when creating the directory\. Enabling this option sets the unix mode to 0777, thus guaranteeing that default directory acls are propagated\. 3426 .sp 3427 Default: 3428 \fI\fIinherit acls\fR\fR\fI = \fR\fIno\fR\fI \fR 3429 .RE 3430 2935 3431 inherit owner (S) 2936 .RS 3n 2937 The ownership of new files and directories is normally governed by effective uid of the connected user. This option allows the Samba administrator to specify that the ownership for new files and directories should be controlled by the ownership of the parent directory. 2938 .sp 2939 Common scenarios where this behavior is useful is in implementing drop-boxes where users can create and edit files but not delete them and to ensure that newly create files in a user's roaming profile directory are actually owner by the user. 2940 .sp 2941 Default: 2942 \fB\fIinherit owner\fR = no \fR 2943 .RE 2944 .PP 3432 .PP 3433 .RS 4 3434 The ownership of new files and directories is normally governed by effective uid of the connected user\. This option allows the Samba administrator to specify that the ownership for new files and directories should be controlled by the ownership of the parent directory\. 3435 .sp 3436 Common scenarios where this behavior is useful is in implementing drop\-boxes where users can create and edit files but not delete them and to ensure that newly create files in a user\'s roaming profile directory are actually owner by the user\. 3437 .sp 3438 Default: 3439 \fI\fIinherit owner\fR\fR\fI = \fR\fIno\fR\fI \fR 3440 .RE 3441 2945 3442 inherit permissions (S) 2946 .RS 3n 3443 .PP 3444 .RS 4 2947 3445 The permissions on new files and directories are normally governed by 2948 create mask, 2949 directory mask, 2950 force create mode and 2951 force directory mode but the boolean inherit permissions parameter overrides this. 2952 .sp 2953 New directories inherit the mode of the parent directory, including bits such as setgid. 2954 .sp 2955 New files inherit their read/write bits from the parent directory. Their execute bits continue to be determined by 2956 map archive, 2957 map hidden and 2958 map system as usual. 3446 \fIcreate mask\fR, 3447 \fIdirectory mask\fR, 3448 \fIforce create mode\fR 3449 and 3450 \fIforce directory mode\fR 3451 but the boolean inherit permissions parameter overrides this\. 3452 .sp 3453 New directories inherit the mode of the parent directory, including bits such as setgid\. 3454 .sp 3455 New files inherit their read/write bits from the parent directory\. Their execute bits continue to be determined by 3456 \fImap archive\fR, 3457 \fImap hidden\fR 3458 and 3459 \fImap system\fR 3460 as usual\. 2959 3461 .sp 2960 3462 Note that the setuid bit is 2961 \f Bnever\fR2962 set via inheritance (the code explicitly prohibits this) .2963 .sp 2964 This can be particularly useful on large systems with many users, perhaps several thousand, to allow a single [homes] share to be used flexibly by each user .2965 .sp 2966 Default: 2967 \f B\fIinherit permissions\fR = no\fR2968 .RE 2969 .PP 3463 \fInever\fR 3464 set via inheritance (the code explicitly prohibits this)\. 3465 .sp 3466 This can be particularly useful on large systems with many users, perhaps several thousand, to allow a single [homes] share to be used flexibly by each user\. 3467 .sp 3468 Default: 3469 \fI\fIinherit permissions\fR\fR\fI = \fR\fIno\fR\fI \fR 3470 .RE 3471 2970 3472 interfaces (G) 2971 .RS 3n 2972 This option allows you to override the default network interfaces list that Samba will use for browsing, name registration and other NBT traffic. By default Samba will query the kernel for the list of all active interfaces and use any interfaces except 127.0.0.1 that are broadcast capable. 2973 .sp 2974 The option takes a list of interface strings. Each string can be in any of the following forms: 2975 .RS 3n 2976 .TP 3n 2977 \(bu 2978 a network interface name (such as eth0). This may include shell-like wildcards so eth* will match any interface starting with the substring "eth" 2979 .TP 3n 2980 \(bu 2981 an IP address. In this case the netmask is determined from the list of interfaces obtained from the kernel 2982 .TP 3n 2983 \(bu 2984 an IP/mask pair. 2985 .TP 3n 2986 \(bu 2987 a broadcast/mask pair. 2988 .RE 2989 .IP "" 3n 2990 The "mask" parameters can either be a bit length (such as 24 for a C class network) or a full netmask in dotted decimal form. 2991 .sp 2992 The "IP" parameters above can either be a full dotted decimal IP address or a hostname which will be looked up via the OS's normal hostname resolution mechanisms. 2993 .sp 2994 By default Samba enables all active interfaces that are broadcast capable except the loopback adaptor (IP address 127.0.0.1). 2995 .sp 2996 The example below configures three network interfaces corresponding to the eth0 device and IP addresses 192.168.2.10 and 192.168.3.10. The netmasks of the latter two interfaces would be set to 255.255.255.0. 2997 .sp 2998 Default: 2999 \fB\fIinterfaces\fR = \fR 3000 .sp 3001 Example: 3002 \fB\fIinterfaces\fR = eth0 192.168.2.10/24 192.168.3.10/255.255.255.0 \fR 3003 .RE 3004 .PP 3473 .PP 3474 .RS 4 3475 This option allows you to override the default network interfaces list that Samba will use for browsing, name registration and other NBT traffic\. By default Samba will query the kernel for the list of all active interfaces and use any interfaces except 127\.0\.0\.1 that are broadcast capable\. 3476 .sp 3477 The option takes a list of interface strings\. Each string can be in any of the following forms: 3478 .sp 3479 .RS 4 3480 .ie n \{\ 3481 \h'-04'\(bu\h'+03'\c 3482 .\} 3483 .el \{\ 3484 .sp -1 3485 .IP \(bu 2.3 3486 .\} 3487 a network interface name (such as eth0)\. This may include shell\-like wildcards so eth* will match any interface starting with the substring "eth" 3488 .RE 3489 .sp 3490 .RS 4 3491 .ie n \{\ 3492 \h'-04'\(bu\h'+03'\c 3493 .\} 3494 .el \{\ 3495 .sp -1 3496 .IP \(bu 2.3 3497 .\} 3498 an IP address\. In this case the netmask is determined from the list of interfaces obtained from the kernel 3499 .RE 3500 .sp 3501 .RS 4 3502 .ie n \{\ 3503 \h'-04'\(bu\h'+03'\c 3504 .\} 3505 .el \{\ 3506 .sp -1 3507 .IP \(bu 2.3 3508 .\} 3509 an IP/mask pair\. 3510 .RE 3511 .sp 3512 .RS 4 3513 .ie n \{\ 3514 \h'-04'\(bu\h'+03'\c 3515 .\} 3516 .el \{\ 3517 .sp -1 3518 .IP \(bu 2.3 3519 .\} 3520 a broadcast/mask pair\. 3521 .sp 3522 .RE 3523 The "mask" parameters can either be a bit length (such as 24 for a C class network) or a full netmask in dotted decimal form\. 3524 .sp 3525 The "IP" parameters above can either be a full dotted decimal IP address or a hostname which will be looked up via the OS\'s normal hostname resolution mechanisms\. 3526 .sp 3527 By default Samba enables all active interfaces that are broadcast capable except the loopback adaptor (IP address 127\.0\.0\.1)\. 3528 .sp 3529 The example below configures three network interfaces corresponding to the eth0 device and IP addresses 192\.168\.2\.10 and 192\.168\.3\.10\. The netmasks of the latter two interfaces would be set to 255\.255\.255\.0\. 3530 .sp 3531 Default: 3532 \fI\fIinterfaces\fR\fR\fI = \fR\fI\fR\fI \fR 3533 .sp 3534 Example: 3535 \fI\fIinterfaces\fR\fR\fI = \fR\fIeth0 192\.168\.2\.10/24 192\.168\.3\.10/255\.255\.255\.0\fR\fI \fR 3536 .RE 3537 3005 3538 invalid users (S) 3006 .RS 3n 3007 This is a list of users that should not be allowed to login to this service. This is really a 3008 \fBparanoid\fR 3009 check to absolutely ensure an improper setting does not breach your security. 3010 .sp 3011 A name starting with a '@' is interpreted as an NIS netgroup first (if your system supports NIS), and then as a UNIX group if the name was not found in the NIS netgroup database. 3012 .sp 3013 A name starting with '+' is interpreted only by looking in the UNIX group database via the NSS getgrnam() interface. A name starting with '&' is interpreted only by looking in the NIS netgroup database (this requires NIS to be working on your system). The characters '+' and '&' may be used at the start of the name in either order so the value 3539 .PP 3540 .RS 4 3541 This is a list of users that should not be allowed to login to this service\. This is really a 3542 \fIparanoid\fR 3543 check to absolutely ensure an improper setting does not breach your security\. 3544 .sp 3545 A name starting with a \'@\' is interpreted as an NIS netgroup first (if your system supports NIS), and then as a UNIX group if the name was not found in the NIS netgroup database\. 3546 .sp 3547 A name starting with \'+\' is interpreted only by looking in the UNIX group database via the NSS getgrnam() interface\. A name starting with \'&\' is interpreted only by looking in the NIS netgroup database (this requires NIS to be working on your system)\. The characters \'+\' and \'&\' may be used at the start of the name in either order so the value 3014 3548 \fI+&group\fR 3015 3549 means check the UNIX group database, followed by the NIS netgroup database, and the value 3016 3550 \fI&+group\fR 3017 means check the NIS netgroup database, followed by the UNIX group database (the same as the '@' prefix).3551 means check the NIS netgroup database, followed by the UNIX group database (the same as the \'@\' prefix)\. 3018 3552 .sp 3019 3553 The current servicename is substituted for 3020 \fI%S\fR . This is useful in the [homes] section.3021 .sp 3022 Default: 3023 \f B\fIinvalid users\fR = # no invalid users\fR3024 .sp 3025 Example: 3026 \f B\fIinvalid users\fR = root fred admin @wheel\fR3027 .RE 3028 .PP 3554 \fI%S\fR\. This is useful in the [homes] section\. 3555 .sp 3556 Default: 3557 \fI\fIinvalid users\fR\fR\fI = \fR\fI # no invalid users\fR\fI \fR 3558 .sp 3559 Example: 3560 \fI\fIinvalid users\fR\fR\fI = \fR\fIroot fred admin @wheel\fR\fI \fR 3561 .RE 3562 3029 3563 iprint server (G) 3030 .RS 3n 3564 .PP 3565 .RS 4 3031 3566 This parameter is only applicable if 3032 printing is set to 3033 \fBiprint\fR. 3567 \fIprinting\fR 3568 is set to 3569 \fBiprint\fR\. 3034 3570 .sp 3035 3571 If set, this option overrides the ServerName option in the CUPS 3036 \fIclient .conf\fR. This is necessary if you have virtual samba servers that connect to different CUPS daemons.3037 .sp 3038 Default: 3039 \f B\fIiprint server\fR = ""\fR3040 .sp 3041 Example: 3042 \f B\fIiprint server\fR = MYCUPSSERVER\fR3043 .RE 3044 .PP 3572 \fIclient\.conf\fR\. This is necessary if you have virtual samba servers that connect to different CUPS daemons\. 3573 .sp 3574 Default: 3575 \fI\fIiprint server\fR\fR\fI = \fR\fI""\fR\fI \fR 3576 .sp 3577 Example: 3578 \fI\fIiprint server\fR\fR\fI = \fR\fIMYCUPSSERVER\fR\fI \fR 3579 .RE 3580 3045 3581 keepalive (G) 3046 .RS 3n 3582 .PP 3583 .RS 4 3047 3584 The value of the parameter (an integer) represents the number of seconds between 3048 3585 \fIkeepalive\fR 3049 packets . If this parameter is zero, no keepalive packets will be sent. Keepalive packets, if sent, allow the server to tell whether a client is still present and responding.3050 .sp 3051 Keepalives should, in general, not be needed if the socket has the SO_KEEPALIVE attribute set on it by default . (see3052 socket options). Basically you should only use this option if you strike difficulties.3053 .sp 3054 Default: 3055 \f B\fIkeepalive\fR = 300\fR3056 .sp 3057 Example: 3058 \f B\fIkeepalive\fR = 600\fR3059 .RE 3060 .PP 3586 packets\. If this parameter is zero, no keepalive packets will be sent\. Keepalive packets, if sent, allow the server to tell whether a client is still present and responding\. 3587 .sp 3588 Keepalives should, in general, not be needed if the socket has the SO_KEEPALIVE attribute set on it by default\. (see 3589 \fIsocket options\fR)\. Basically you should only use this option if you strike difficulties\. 3590 .sp 3591 Default: 3592 \fI\fIkeepalive\fR\fR\fI = \fR\fI300\fR\fI \fR 3593 .sp 3594 Example: 3595 \fI\fIkeepalive\fR\fR\fI = \fR\fI600\fR\fI \fR 3596 .RE 3597 3061 3598 kernel change notify (S) 3062 .RS 3n 3063 This parameter specifies whether Samba should ask the kernel for change notifications in directories so that SMB clients can refresh whenever the data on the server changes. 3064 .sp 3065 This parameter is only used when your kernel supports change notification to user programs using the inotify interface. 3066 .sp 3067 Default: 3068 \fB\fIkernel change notify\fR = yes \fR 3069 .RE 3070 .PP 3599 .PP 3600 .RS 4 3601 This parameter specifies whether Samba should ask the kernel for change notifications in directories so that SMB clients can refresh whenever the data on the server changes\. 3602 .sp 3603 This parameter is only used when your kernel supports change notification to user programs using the inotify interface\. 3604 .sp 3605 Default: 3606 \fI\fIkernel change notify\fR\fR\fI = \fR\fIyes\fR\fI \fR 3607 .RE 3608 3071 3609 kernel oplocks (G) 3072 .RS 3n 3610 .PP 3611 .RS 4 3073 3612 For UNIXes that support kernel based 3074 oplocks (currently only IRIX and the Linux 2.4 kernel), this parameter allows the use of them to be turned on or off. 3613 \fIoplocks\fR 3614 (currently only IRIX and the Linux 2\.4 kernel), this parameter allows the use of them to be turned on or off\. 3075 3615 .sp 3076 3616 Kernel oplocks support allows Samba … … 3078 3618 to be broken whenever a local UNIX process or NFS operation accesses a file that 3079 3619 \fBsmbd\fR(8) 3080 has oplocked . This allows complete data consistency between SMB/CIFS, NFS and local file access (and is a3081 \f Bvery\fR3082 cool feature : -).3620 has oplocked\. This allows complete data consistency between SMB/CIFS, NFS and local file access (and is a 3621 \fIvery\fR 3622 cool feature :\-)\. 3083 3623 .sp 3084 3624 This parameter defaults to 3085 \fBon\fR, but is translated to a no -op on systems that no not have the necessary kernel support. You should never need to touch this parameter.3086 .sp 3087 Default: 3088 \f B\fIkernel oplocks\fR = yes\fR3089 .RE 3090 .PP 3625 \fBon\fR, but is translated to a no\-op on systems that no not have the necessary kernel support\. You should never need to touch this parameter\. 3626 .sp 3627 Default: 3628 \fI\fIkernel oplocks\fR\fR\fI = \fR\fIyes\fR\fI \fR 3629 .RE 3630 3091 3631 lanman auth (G) 3092 .RS 3n 3632 .PP 3633 .RS 4 3093 3634 This parameter determines whether or not 3094 3635 \fBsmbd\fR(8) 3095 will attempt to authenticate users or permit password changes using the LANMAN password hash . If disabled, only clients which support NT password hashes (e.g. Windows NT/2000 clients, smbclient, but not Windows 95/98 or the MS DOS network client) will be able to connect to the Samba host.3096 .sp 3097 The LANMAN encrypted response is easily broken, due to it 's case-insensitive nature, and the choice of algorithm. Servers without Windows 95/98/ME or MS DOS clients are advised to disable this option.3636 will attempt to authenticate users or permit password changes using the LANMAN password hash\. If disabled, only clients which support NT password hashes (e\.g\. Windows NT/2000 clients, smbclient, but not Windows 95/98 or the MS DOS network client) will be able to connect to the Samba host\. 3637 .sp 3638 The LANMAN encrypted response is easily broken, due to it\'s case\-insensitive nature, and the choice of algorithm\. Servers without Windows 95/98/ME or MS DOS clients are advised to disable this option\. 3098 3639 .sp 3099 3640 Unlike the 3100 3641 encrypt passwords 3101 option, this parameter cannot alter client behaviour, and the LANMAN response will still be sent over the network . See the3642 option, this parameter cannot alter client behaviour, and the LANMAN response will still be sent over the network\. See the 3102 3643 client lanman auth 3103 to disable this for Samba 's clients (such as smbclient)3644 to disable this for Samba\'s clients (such as smbclient) 3104 3645 .sp 3105 3646 If this option, and 3106 3647 ntlm auth 3107 are both disabled, then only NTLMv2 logins will be permited . Not all clients support NTLMv2, and most will require special configuration to use it.3108 .sp 3109 Default: 3110 \f B\fIlanman auth\fR = yes\fR3111 .RE 3112 .PP 3648 are both disabled, then only NTLMv2 logins will be permited\. Not all clients support NTLMv2, and most will require special configuration to use it\. 3649 .sp 3650 Default: 3651 \fI\fIlanman auth\fR\fR\fI = \fR\fIyes\fR\fI \fR 3652 .RE 3653 3113 3654 large readwrite (G) 3114 .RS 3n 3655 .PP 3656 .RS 4 3115 3657 This parameter determines whether or not 3116 3658 \fBsmbd\fR(8) 3117 supports the new 64k streaming read and write varient SMB requests introduced with Windows 2000 . Note that due to Windows 2000 client redirector bugs this requires Samba to be running on a 64-bit capable operating system such as IRIX, Solaris or a Linux 2.4 kernel. Can improve performance by 10% with Windows 2000 clients. Defaults to on. Not as tested as some other Samba code paths.3118 .sp 3119 Default: 3120 \f B\fIlarge readwrite\fR = yes\fR3121 .RE 3122 .PP 3659 supports the new 64k streaming read and write varient SMB requests introduced with Windows 2000\. Note that due to Windows 2000 client redirector bugs this requires Samba to be running on a 64\-bit capable operating system such as IRIX, Solaris or a Linux 2\.4 kernel\. Can improve performance by 10% with Windows 2000 clients\. Defaults to on\. Not as tested as some other Samba code paths\. 3660 .sp 3661 Default: 3662 \fI\fIlarge readwrite\fR\fR\fI = \fR\fIyes\fR\fI \fR 3663 .RE 3664 3123 3665 ldap admin dn (G) 3124 .RS 3n 3666 .PP 3667 .RS 4 3125 3668 The 3126 ldap admin dn defines the Distinguished Name (DN) name used by Samba to contact the ldap server when retreiving user account information. The 3127 ldap admin dn is used in conjunction with the admin dn password stored in the 3128 \fIprivate/secrets.tdb\fR 3129 file. See the 3669 \fIldap admin dn\fR 3670 defines the Distinguished Name (DN) name used by Samba to contact the ldap server when retreiving user account information\. The 3671 \fIldap admin dn\fR 3672 is used in conjunction with the admin dn password stored in the 3673 \fIprivate/secrets\.tdb\fR 3674 file\. See the 3130 3675 \fBsmbpasswd\fR(8) 3131 man page for more information on how to accomplish this .3676 man page for more information on how to accomplish this\. 3132 3677 .sp 3133 3678 The 3134 ldap admin dn requires a fully specified DN. The 3135 ldap suffix is not appended to the 3136 ldap admin dn. 3137 .sp 3138 \fBNo default\fR 3139 .RE 3140 .PP 3679 \fIldap admin dn\fR 3680 requires a fully specified DN\. The 3681 \fIldap suffix\fR 3682 is not appended to the 3683 \fIldap admin dn\fR\. 3684 .sp 3685 \fINo default\fR 3686 .RE 3687 3141 3688 ldap delete dn (G) 3142 .RS 3n 3143 This parameter specifies whether a delete operation in the ldapsam deletes the complete entry or only the attributes specific to Samba. 3144 .sp 3145 Default: 3146 \fB\fIldap delete dn\fR = no \fR 3147 .RE 3148 .PP 3689 .PP 3690 .RS 4 3691 This parameter specifies whether a delete operation in the ldapsam deletes the complete entry or only the attributes specific to Samba\. 3692 .sp 3693 Default: 3694 \fI\fIldap delete dn\fR\fR\fI = \fR\fIno\fR\fI \fR 3695 .RE 3696 3149 3697 ldap group suffix (G) 3150 .RS 3n 3151 This parameter specifies the suffix that is used for groups when these are added to the LDAP directory. If this parameter is unset, the value of 3152 ldap suffix will be used instead. The suffix string is pre-pended to the 3153 ldap suffix string so use a partial DN. 3154 .sp 3155 Default: 3156 \fB\fIldap group suffix\fR = \fR 3157 .sp 3158 Example: 3159 \fB\fIldap group suffix\fR = ou=Groups \fR 3160 .RE 3161 .PP 3698 .PP 3699 .RS 4 3700 This parameter specifies the suffix that is used for groups when these are added to the LDAP directory\. If this parameter is unset, the value of 3701 \fIldap suffix\fR 3702 will be used instead\. The suffix string is pre\-pended to the 3703 \fIldap suffix\fR 3704 string so use a partial DN\. 3705 .sp 3706 Default: 3707 \fI\fIldap group suffix\fR\fR\fI = \fR\fI\fR\fI \fR 3708 .sp 3709 Example: 3710 \fI\fIldap group suffix\fR\fR\fI = \fR\fIou=Groups\fR\fI \fR 3711 .RE 3712 3162 3713 ldap idmap suffix (G) 3163 .RS 3n 3164 This parameters specifies the suffix that is used when storing idmap mappings. If this parameter is unset, the value of 3165 ldap suffix will be used instead. The suffix string is pre-pended to the 3166 ldap suffix string so use a partial DN. 3167 .sp 3168 Default: 3169 \fB\fIldap idmap suffix\fR = \fR 3170 .sp 3171 Example: 3172 \fB\fIldap idmap suffix\fR = ou=Idmap \fR 3173 .RE 3174 .PP 3714 .PP 3715 .RS 4 3716 This parameters specifies the suffix that is used when storing idmap mappings\. If this parameter is unset, the value of 3717 \fIldap suffix\fR 3718 will be used instead\. The suffix string is pre\-pended to the 3719 \fIldap suffix\fR 3720 string so use a partial DN\. 3721 .sp 3722 Default: 3723 \fI\fIldap idmap suffix\fR\fR\fI = \fR\fI\fR\fI \fR 3724 .sp 3725 Example: 3726 \fI\fIldap idmap suffix\fR\fR\fI = \fR\fIou=Idmap\fR\fI \fR 3727 .RE 3728 3175 3729 ldap machine suffix (G) 3176 .RS 3n 3177 It specifies where machines should be added to the ldap tree. If this parameter is unset, the value of 3178 ldap suffix will be used instead. The suffix string is pre-pended to the 3179 ldap suffix string so use a partial DN. 3180 .sp 3181 Default: 3182 \fB\fIldap machine suffix\fR = \fR 3183 .sp 3184 Example: 3185 \fB\fIldap machine suffix\fR = ou=Computers \fR 3186 .RE 3187 .PP 3730 .PP 3731 .RS 4 3732 It specifies where machines should be added to the ldap tree\. If this parameter is unset, the value of 3733 \fIldap suffix\fR 3734 will be used instead\. The suffix string is pre\-pended to the 3735 \fIldap suffix\fR 3736 string so use a partial DN\. 3737 .sp 3738 Default: 3739 \fI\fIldap machine suffix\fR\fR\fI = \fR\fI\fR\fI \fR 3740 .sp 3741 Example: 3742 \fI\fIldap machine suffix\fR\fR\fI = \fR\fIou=Computers\fR\fI \fR 3743 .RE 3744 3188 3745 ldap passwd sync (G) 3189 .RS 3n 3190 This option is used to define whether or not Samba should sync the LDAP password with the NT and LM hashes for normal accounts (NOT for workstation, server or domain trusts) on a password change via SAMBA. 3746 .PP 3747 .RS 4 3748 This option is used to define whether or not Samba should sync the LDAP password with the NT and LM hashes for normal accounts (NOT for workstation, server or domain trusts) on a password change via SAMBA\. 3191 3749 .sp 3192 3750 The 3193 ldap passwd sync can be set to one of three values: 3194 .RS 3n 3195 .TP 3n 3196 \(bu 3751 \fIldap passwd sync\fR 3752 can be set to one of three values: 3753 .sp 3754 .RS 4 3755 .ie n \{\ 3756 \h'-04'\(bu\h'+03'\c 3757 .\} 3758 .el \{\ 3759 .sp -1 3760 .IP \(bu 2.3 3761 .\} 3197 3762 \fIYes\fR 3198 = Try to update the LDAP, NT and LM passwords and update the pwdLastSet time. 3199 .TP 3n 3200 \(bu 3763 = Try to update the LDAP, NT and LM passwords and update the pwdLastSet time\. 3764 .RE 3765 .sp 3766 .RS 4 3767 .ie n \{\ 3768 \h'-04'\(bu\h'+03'\c 3769 .\} 3770 .el \{\ 3771 .sp -1 3772 .IP \(bu 2.3 3773 .\} 3201 3774 \fINo\fR 3202 = Update NT and LM passwords and update the pwdLastSet time. 3203 .TP 3n 3204 \(bu 3775 = Update NT and LM passwords and update the pwdLastSet time\. 3776 .RE 3777 .sp 3778 .RS 4 3779 .ie n \{\ 3780 \h'-04'\(bu\h'+03'\c 3781 .\} 3782 .el \{\ 3783 .sp -1 3784 .IP \(bu 2.3 3785 .\} 3205 3786 \fIOnly\fR 3206 = Only update the LDAP password and let the LDAP server do the rest .3207 . RE3208 . IP "" 3n3209 Default: 3210 \f B\fIldap passwd sync\fR = no\fR3211 .RE 3212 .PP 3787 = Only update the LDAP password and let the LDAP server do the rest\. 3788 .sp 3789 .RE 3790 Default: 3791 \fI\fIldap passwd sync\fR\fR\fI = \fR\fIno\fR\fI \fR 3792 .RE 3793 3213 3794 ldap replication sleep (G) 3214 .RS 3n 3215 When Samba is asked to write to a read-only LDAP replica, we are redirected to talk to the read-write master server. This server then replicates our changes back to the 'local' server, however the replication might take some seconds, especially over slow links. Certain client activities, particularly domain joins, can become confused by the 'success' that does not immediately change the LDAP back-end's data. 3216 .sp 3217 This option simply causes Samba to wait a short time, to allow the LDAP server to catch up. If you have a particularly high-latency network, you may wish to time the LDAP replication with a network sniffer, and increase this value accordingly. Be aware that no checking is performed that the data has actually replicated. 3218 .sp 3219 The value is specified in milliseconds, the maximum value is 5000 (5 seconds). 3220 .sp 3221 Default: 3222 \fB\fIldap replication sleep\fR = 1000 \fR 3223 .RE 3224 .PP 3795 .PP 3796 .RS 4 3797 When Samba is asked to write to a read\-only LDAP replica, we are redirected to talk to the read\-write master server\. This server then replicates our changes back to the \'local\' server, however the replication might take some seconds, especially over slow links\. Certain client activities, particularly domain joins, can become confused by the \'success\' that does not immediately change the LDAP back\-end\'s data\. 3798 .sp 3799 This option simply causes Samba to wait a short time, to allow the LDAP server to catch up\. If you have a particularly high\-latency network, you may wish to time the LDAP replication with a network sniffer, and increase this value accordingly\. Be aware that no checking is performed that the data has actually replicated\. 3800 .sp 3801 The value is specified in milliseconds, the maximum value is 5000 (5 seconds)\. 3802 .sp 3803 Default: 3804 \fI\fIldap replication sleep\fR\fR\fI = \fR\fI1000\fR\fI \fR 3805 .RE 3806 3225 3807 ldapsam:editposix (G) 3226 .RS 3n 3227 Editposix is an option that leverages ldapsam:trusted to make it simpler to manage a domain controller eliminating the need to set up custom scripts to add and manage the posix users and groups. This option will instead directly manipulate the ldap tree to create, remove and modify user and group entries. This option also requires a running winbindd as it is used to allocate new uids/gids on user/group creation. The allocation range must be therefore configured. 3228 .sp 3229 To use this option, a basic ldap tree must be provided and the ldap suffix parameters must be properly configured. On virgin servers the default users and groups (Administrator, Guest, Domain Users, Domain Admins, Domain Guests) can be precreated with the command 3230 net sam provision. To run this command the ldap server must be running, Winindd must be running and the smb.conf ldap options must be properly configured. The typical ldap setup used with the 3231 ldapsam:trusted = yes option is usually sufficient to use 3232 ldapsam:editposix = yes as well. 3808 .PP 3809 .RS 4 3810 Editposix is an option that leverages ldapsam:trusted to make it simpler to manage a domain controller eliminating the need to set up custom scripts to add and manage the posix users and groups\. This option will instead directly manipulate the ldap tree to create, remove and modify user and group entries\. This option also requires a running winbindd as it is used to allocate new uids/gids on user/group creation\. The allocation range must be therefore configured\. 3811 .sp 3812 To use this option, a basic ldap tree must be provided and the ldap suffix parameters must be properly configured\. On virgin servers the default users and groups (Administrator, Guest, Domain Users, Domain Admins, Domain Guests) can be precreated with the command 3813 net sam provision\. To run this command the ldap server must be running, Winindd must be running and the smb\.conf ldap options must be properly configured\. The typical ldap setup used with the 3814 \fIldapsam:trusted = yes\fR 3815 option is usually sufficient to use 3816 \fIldapsam:editposix = yes\fR 3817 as well\. 3233 3818 .sp 3234 3819 An example configuration can be the following: 3235 3236 .sp 3237 3820 .sp 3821 .RS 4 3238 3822 .nf 3239 3240 3823 encrypt passwords = true 3241 3824 passdb backend = ldapsam … … 3254 3837 idmap backend = ldap:"ldap://localhost" 3255 3838 3256 idmap uid = 5000 -500003257 idmap gid = 5000 -500003839 idmap uid = 5000\-50000 3840 idmap gid = 5000\-50000 3258 3841 3259 3842 .fi 3843 .RE 3844 .sp 3260 3845 This configuration assume the ldap server have been loaded with a base tree like described in the following ldif: 3261 3262 .sp 3263 3846 .sp 3847 .RS 4 3264 3848 .nf 3265 3266 3849 dn: dc=samba,dc=org 3267 3850 objectClass: top 3268 3851 objectClass: dcObject 3269 3852 objectClass: organization 3270 o: samba .org3853 o: samba\.org 3271 3854 dc: samba 3272 3855 … … 3299 3882 3300 3883 .fi 3301 3302 .sp 3303 Default: 3304 \fB\fIldapsam:editposix\fR = no \fR 3305 .RE 3306 .PP 3884 .RE 3885 .sp 3886 .sp 3887 Default: 3888 \fI\fIldapsam:editposix\fR\fR\fI = \fR\fIno\fR\fI \fR 3889 .RE 3890 3307 3891 ldapsam:trusted (G) 3308 .RS 3n 3309 By default, Samba as a Domain Controller with an LDAP backend needs to use the Unix-style NSS subsystem to access user and group information. Due to the way Unix stores user information in /etc/passwd and /etc/group this inevitably leads to inefficiencies. One important question a user needs to know is the list of groups he is member of. The plain UNIX model involves a complete enumeration of the file /etc/group and its NSS counterparts in LDAP. UNIX has optimized functions to enumerate group membership. Sadly, other functions that are used to deal with user and group attributes lack such optimization. 3892 .PP 3893 .RS 4 3894 By default, Samba as a Domain Controller with an LDAP backend needs to use the Unix\-style NSS subsystem to access user and group information\. Due to the way Unix stores user information in /etc/passwd and /etc/group this inevitably leads to inefficiencies\. One important question a user needs to know is the list of groups he is member of\. The plain UNIX model involves a complete enumeration of the file /etc/group and its NSS counterparts in LDAP\. UNIX has optimized functions to enumerate group membership\. Sadly, other functions that are used to deal with user and group attributes lack such optimization\. 3310 3895 .sp 3311 3896 To make Samba scale well in large environments, the 3312 ldapsam:trusted = yes option assumes that the complete user and group database that is relevant to Samba is stored in LDAP with the standard posixAccount/posixGroup attributes. It further assumes that the Samba auxiliary object classes are stored together with the POSIX data in the same LDAP object. If these assumptions are met, 3313 ldapsam:trusted = yes can be activated and Samba can bypass the NSS system to query user group memberships. Optimized LDAP queries can greatly speed up domain logon and administration tasks. Depending on the size of the LDAP database a factor of 100 or more for common queries is easily achieved. 3314 .sp 3315 Default: 3316 \fB\fIldapsam:trusted\fR = no \fR 3317 .RE 3318 .PP 3897 \fIldapsam:trusted = yes\fR 3898 option assumes that the complete user and group database that is relevant to Samba is stored in LDAP with the standard posixAccount/posixGroup attributes\. It further assumes that the Samba auxiliary object classes are stored together with the POSIX data in the same LDAP object\. If these assumptions are met, 3899 \fIldapsam:trusted = yes\fR 3900 can be activated and Samba can bypass the NSS system to query user group memberships\. Optimized LDAP queries can greatly speed up domain logon and administration tasks\. Depending on the size of the LDAP database a factor of 100 or more for common queries is easily achieved\. 3901 .sp 3902 Default: 3903 \fI\fIldapsam:trusted\fR\fR\fI = \fR\fIno\fR\fI \fR 3904 .RE 3905 3319 3906 ldap ssl (G) 3320 .RS 3n 3907 .PP 3908 .RS 4 3321 3909 This option is used to define whether or not Samba should use SSL when connecting to the ldap server This is 3322 \f BNOT\fR3323 related to Samba 's previous SSL support which was enabled by specifying the3324 --with-ssl3910 \fINOT\fR 3911 related to Samba\'s previous SSL support which was enabled by specifying the 3912 \-\-with\-ssl 3325 3913 option to the 3326 3914 \fIconfigure\fR 3327 script .3915 script\. 3328 3916 .sp 3329 3917 The 3330 ldap ssl can be set to one of three values: 3331 .RS 3n 3332 .TP 3n 3333 \(bu 3918 \fIldap ssl\fR 3919 can be set to one of three values: 3920 .sp 3921 .RS 4 3922 .ie n \{\ 3923 \h'-04'\(bu\h'+03'\c 3924 .\} 3925 .el \{\ 3926 .sp -1 3927 .IP \(bu 2.3 3928 .\} 3334 3929 \fIOff\fR 3335 = Never use SSL when querying the directory. 3336 .TP 3n 3337 \(bu 3930 = Never use SSL when querying the directory\. 3931 .RE 3932 .sp 3933 .RS 4 3934 .ie n \{\ 3935 \h'-04'\(bu\h'+03'\c 3936 .\} 3937 .el \{\ 3938 .sp -1 3939 .IP \(bu 2.3 3940 .\} 3338 3941 \fIStart_tls\fR 3339 = Use the LDAPv3 StartTLS extended operation (RFC2830) for communicating with the directory server. 3340 .TP 3n 3341 \(bu 3942 = Use the LDAPv3 StartTLS extended operation (RFC2830) for communicating with the directory server\. 3943 .RE 3944 .sp 3945 .RS 4 3946 .ie n \{\ 3947 \h'-04'\(bu\h'+03'\c 3948 .\} 3949 .el \{\ 3950 .sp -1 3951 .IP \(bu 2.3 3952 .\} 3342 3953 \fIOn\fR 3343 3954 = Use SSL on the ldaps port when contacting the 3344 \fIldap server\fR . Only available when the backwards-compatiblity3345 --with-ldapsam3346 option is specified to configure . See3347 passdb backend 3348 .3349 . RE3350 . IP "" 3n3351 Default: 3352 \f B\fIldap ssl\fR = start_tls\fR3353 .RE 3354 .PP 3955 \fIldap server\fR\. Only available when the backwards\-compatiblity 3956 \-\-with\-ldapsam 3957 option is specified to configure\. See 3958 \fIpassdb backend\fR 3959 \. 3960 .sp 3961 .RE 3962 Default: 3963 \fI\fIldap ssl\fR\fR\fI = \fR\fIstart_tls\fR\fI \fR 3964 .RE 3965 3355 3966 ldap suffix (G) 3356 .RS 3n 3357 Specifies the base for all ldap suffixes and for storing the sambaDomain object. 3967 .PP 3968 .RS 4 3969 Specifies the base for all ldap suffixes and for storing the sambaDomain object\. 3358 3970 .sp 3359 3971 The ldap suffix will be appended to the values specified for the 3360 ldap user suffix,3361 ldap group suffix,3362 ldap machine suffix, and the3363 ldap idmap suffix. Each of these should be given only a DN relative to the3364 ldap suffix.3365 .sp 3366 Default: 3367 \f B\fIldap suffix\fR =\fR3368 .sp 3369 Example: 3370 \f B\fIldap suffix\fR = dc=samba,dc=org\fR3371 .RE 3372 .PP 3972 \fIldap user suffix\fR, 3973 \fIldap group suffix\fR, 3974 \fIldap machine suffix\fR, and the 3975 \fIldap idmap suffix\fR\. Each of these should be given only a DN relative to the 3976 \fIldap suffix\fR\. 3977 .sp 3978 Default: 3979 \fI\fIldap suffix\fR\fR\fI = \fR\fI\fR\fI \fR 3980 .sp 3981 Example: 3982 \fI\fIldap suffix\fR\fR\fI = \fR\fIdc=samba,dc=org\fR\fI \fR 3983 .RE 3984 3373 3985 ldap timeout (G) 3374 .RS 3n 3375 When Samba connects to an ldap server that servermay be down or unreachable. To prevent Samba from hanging whilst waiting for the connection this parameter specifies in seconds how long Samba should wait before failing the connect. The default is to only wait fifteen seconds for the ldap server to respond to the connect request. 3376 .sp 3377 Default: 3378 \fB\fIldap timeout\fR = 15 \fR 3379 .RE 3380 .PP 3986 .PP 3987 .RS 4 3988 When Samba connects to an ldap server that servermay be down or unreachable\. To prevent Samba from hanging whilst waiting for the connection this parameter specifies in seconds how long Samba should wait before failing the connect\. The default is to only wait fifteen seconds for the ldap server to respond to the connect request\. 3989 .sp 3990 Default: 3991 \fI\fIldap timeout\fR\fR\fI = \fR\fI15\fR\fI \fR 3992 .RE 3993 3381 3994 ldap user suffix (G) 3382 .RS 3n 3383 This parameter specifies where users are added to the tree. If this parameter is unset, the value of 3384 ldap suffix will be used instead. The suffix string is pre-pended to the 3385 ldap suffix string so use a partial DN. 3386 .sp 3387 Default: 3388 \fB\fIldap user suffix\fR = \fR 3389 .sp 3390 Example: 3391 \fB\fIldap user suffix\fR = ou=people \fR 3392 .RE 3393 .PP 3995 .PP 3996 .RS 4 3997 This parameter specifies where users are added to the tree\. If this parameter is unset, the value of 3998 \fIldap suffix\fR 3999 will be used instead\. The suffix string is pre\-pended to the 4000 \fIldap suffix\fR 4001 string so use a partial DN\. 4002 .sp 4003 Default: 4004 \fI\fIldap user suffix\fR\fR\fI = \fR\fI\fR\fI \fR 4005 .sp 4006 Example: 4007 \fI\fIldap user suffix\fR\fR\fI = \fR\fIou=people\fR\fI \fR 4008 .RE 4009 3394 4010 level2 oplocks (S) 3395 .RS 3n 3396 This parameter controls whether Samba supports level2 (read-only) oplocks on a share. 3397 .sp 3398 Level2, or read-only oplocks allow Windows NT clients that have an oplock on a file to downgrade from a read-write oplock to a read-only oplock once a second client opens the file (instead of releasing all oplocks on a second open, as in traditional, exclusive oplocks). This allows all openers of the file that support level2 oplocks to cache the file for read-ahead only (ie. they may not cache writes or lock requests) and increases performance for many accesses of files that are not commonly written (such as application .EXE files). 3399 .sp 3400 Once one of the clients which have a read-only oplock writes to the file all clients are notified (no reply is needed or waited for) and told to break their oplocks to "none" and delete any read-ahead caches. 3401 .sp 3402 It is recommended that this parameter be turned on to speed access to shared executables. 3403 .sp 3404 For more discussions on level2 oplocks see the CIFS spec. 4011 .PP 4012 .RS 4 4013 This parameter controls whether Samba supports level2 (read\-only) oplocks on a share\. 4014 .sp 4015 Level2, or read\-only oplocks allow Windows NT clients that have an oplock on a file to downgrade from a read\-write oplock to a read\-only oplock once a second client opens the file (instead of releasing all oplocks on a second open, as in traditional, exclusive oplocks)\. This allows all openers of the file that support level2 oplocks to cache the file for read\-ahead only (ie\. they may not cache writes or lock requests) and increases performance for many accesses of files that are not commonly written (such as application \.EXE files)\. 4016 .sp 4017 Once one of the clients which have a read\-only oplock writes to the file all clients are notified (no reply is needed or waited for) and told to break their oplocks to "none" and delete any read\-ahead caches\. 4018 .sp 4019 It is recommended that this parameter be turned on to speed access to shared executables\. 4020 .sp 4021 For more discussions on level2 oplocks see the CIFS spec\. 3405 4022 .sp 3406 4023 Currently, if 3407 kernel oplocks are supported then level2 oplocks are not granted (even if this parameter is set to 3408 \fByes\fR). Note also, the 3409 oplocks parameter must be set to 4024 \fIkernel oplocks\fR 4025 are supported then level2 oplocks are not granted (even if this parameter is set to 4026 \fByes\fR)\. Note also, the 4027 \fIoplocks\fR 4028 parameter must be set to 3410 4029 \fByes\fR 3411 on this share in order for this parameter to have any effect .3412 .sp 3413 Default: 3414 \f B\fIlevel2 oplocks\fR = yes\fR3415 .RE 3416 .PP 4030 on this share in order for this parameter to have any effect\. 4031 .sp 4032 Default: 4033 \fI\fIlevel2 oplocks\fR\fR\fI = \fR\fIyes\fR\fI \fR 4034 .RE 4035 3417 4036 lm announce (G) 3418 .RS 3n 4037 .PP 4038 .RS 4 3419 4039 This parameter determines if 3420 4040 \fBnmbd\fR(8) 3421 will produce Lanman announce broadcasts that are needed by OS/2 clients in order for them to see the Samba server in their browse list . This parameter can have three values,4041 will produce Lanman announce broadcasts that are needed by OS/2 clients in order for them to see the Samba server in their browse list\. This parameter can have three values, 3422 4042 \fByes\fR, 3423 4043 \fBno\fR, or 3424 \fBauto\fR . The default is3425 \fBauto\fR . If set to4044 \fBauto\fR\. The default is 4045 \fBauto\fR\. If set to 3426 4046 \fBno\fR 3427 Samba will never produce these broadcasts . If set to4047 Samba will never produce these broadcasts\. If set to 3428 4048 \fByes\fR 3429 4049 Samba will produce Lanman announce broadcasts at a frequency set by the parameter 3430 lm interval. If set to4050 \fIlm interval\fR\. If set to 3431 4051 \fBauto\fR 3432 Samba will not send Lanman announce broadcasts by default but will listen for them . If it hears such a broadcast on the wire it will then start sending them at a frequency set by the parameter3433 lm interval.3434 .sp 3435 Default: 3436 \f B\fIlm announce\fR = auto\fR3437 .sp 3438 Example: 3439 \f B\fIlm announce\fR = yes\fR3440 .RE 3441 .PP 4052 Samba will not send Lanman announce broadcasts by default but will listen for them\. If it hears such a broadcast on the wire it will then start sending them at a frequency set by the parameter 4053 \fIlm interval\fR\. 4054 .sp 4055 Default: 4056 \fI\fIlm announce\fR\fR\fI = \fR\fIauto\fR\fI \fR 4057 .sp 4058 Example: 4059 \fI\fIlm announce\fR\fR\fI = \fR\fIyes\fR\fI \fR 4060 .RE 4061 3442 4062 lm interval (G) 3443 .RS 3n 4063 .PP 4064 .RS 4 3444 4065 If Samba is set to produce Lanman announce broadcasts needed by OS/2 clients (see the 3445 lm announce parameter) then this parameter defines the frequency in seconds with which they will be made. If this is set to zero then no Lanman announcements will be made despite the setting of the 3446 lm announce parameter. 3447 .sp 3448 Default: 3449 \fB\fIlm interval\fR = 60 \fR 3450 .sp 3451 Example: 3452 \fB\fIlm interval\fR = 120 \fR 3453 .RE 3454 .PP 4066 \fIlm announce\fR 4067 parameter) then this parameter defines the frequency in seconds with which they will be made\. If this is set to zero then no Lanman announcements will be made despite the setting of the 4068 \fIlm announce\fR 4069 parameter\. 4070 .sp 4071 Default: 4072 \fI\fIlm interval\fR\fR\fI = \fR\fI60\fR\fI \fR 4073 .sp 4074 Example: 4075 \fI\fIlm interval\fR\fR\fI = \fR\fI120\fR\fI \fR 4076 .RE 4077 3455 4078 load printers (G) 3456 .RS 3n 3457 A boolean variable that controls whether all printers in the printcap will be loaded for browsing by default. See the 3458 printers section for more details. 3459 .sp 3460 Default: 3461 \fB\fIload printers\fR = yes \fR 3462 .RE 3463 .PP 4079 .PP 4080 .RS 4 4081 A boolean variable that controls whether all printers in the printcap will be loaded for browsing by default\. See the 4082 \fIprinters\fR 4083 section for more details\. 4084 .sp 4085 Default: 4086 \fI\fIload printers\fR\fR\fI = \fR\fIyes\fR\fI \fR 4087 .RE 4088 3464 4089 local master (G) 3465 .RS 3n 4090 .PP 4091 .RS 4 3466 4092 This option allows 3467 4093 \fBnmbd\fR(8) 3468 to try and become a local master browser on a subnet . If set to4094 to try and become a local master browser on a subnet\. If set to 3469 4095 \fBno\fR 3470 4096 then 3471 4097 nmbd 3472 will not attempt to become a local master browser on a subnet and will also lose in all browsing elections . By default this value is set to3473 \fByes\fR . Setting this value to4098 will not attempt to become a local master browser on a subnet and will also lose in all browsing elections\. By default this value is set to 4099 \fByes\fR\. Setting this value to 3474 4100 \fByes\fR 3475 doesn 't mean that Samba will3476 \f Bbecome\fR4101 doesn\'t mean that Samba will 4102 \fIbecome\fR 3477 4103 the local master browser on a subnet, just that 3478 4104 nmbd 3479 4105 will 3480 \f Bparticipate\fR3481 in elections for local master browser .4106 \fIparticipate\fR 4107 in elections for local master browser\. 3482 4108 .sp 3483 4109 Setting this value to … … 3485 4111 will cause 3486 4112 nmbd 3487 \f Bnever\fR3488 to become a local master browser .3489 .sp 3490 Default: 3491 \f B\fIlocal master\fR = yes\fR3492 .RE 3493 .PP3494 lock dir 3495 .RS 3n 3496 This parameter is a synonym for lock directory.3497 .RE 3498 .PP 4113 \fInever\fR 4114 to become a local master browser\. 4115 .sp 4116 Default: 4117 \fI\fIlocal master\fR\fR\fI = \fR\fIyes\fR\fI \fR 4118 .RE 4119 lock dir.PP 4120 .RS 4 4121 This parameter is a synonym for 4122 lock directory\. 4123 .RE 4124 3499 4125 lock directory (G) 3500 .RS 3n 3501 This option specifies the directory where lock files will be placed. The lock files are used to implement the 3502 max connections option. 3503 .sp 3504 Default: 3505 \fB\fIlock directory\fR = ${prefix}/var/locks \fR 3506 .sp 3507 Example: 3508 \fB\fIlock directory\fR = /var/run/samba/locks \fR 3509 .RE 3510 .PP 4126 .PP 4127 .RS 4 4128 This option specifies the directory where lock files will be placed\. The lock files are used to implement the 4129 \fImax connections\fR 4130 option\. 4131 .sp 4132 Default: 4133 \fI\fIlock directory\fR\fR\fI = \fR\fI${prefix}/var/locks\fR\fI \fR 4134 .sp 4135 Example: 4136 \fI\fIlock directory\fR\fR\fI = \fR\fI/var/run/samba/locks\fR\fI \fR 4137 .RE 4138 3511 4139 locking (S) 3512 .RS 3n 3513 This controls whether or not locking will be performed by the server in response to lock requests from the client. 4140 .PP 4141 .RS 4 4142 This controls whether or not locking will be performed by the server in response to lock requests from the client\. 3514 4143 .sp 3515 4144 If 3516 locking = no, all lock and unlock requests will appear to succeed and all lock queries will report that the file in question is available for locking .4145 locking = no, all lock and unlock requests will appear to succeed and all lock queries will report that the file in question is available for locking\. 3517 4146 .sp 3518 4147 If 3519 locking = yes, real locking will be performed by the server .4148 locking = yes, real locking will be performed by the server\. 3520 4149 .sp 3521 4150 This option 3522 \f Bmay\fR3523 be useful for read -only filesystems which3524 \f Bmay\fR4151 \fImay\fR 4152 be useful for read\-only filesystems which 4153 \fImay\fR 3525 4154 not need locking (such as CDROM drives), although setting this parameter of 3526 4155 \fBno\fR 3527 is not really recommended even in this case .3528 .sp 3529 Be careful about disabling locking either globally or in a specific service, as lack of locking may result in data corruption . You should never need to set this parameter.3530 .sp 3531 \f BNo default\fR3532 .RE 3533 .PP 4156 is not really recommended even in this case\. 4157 .sp 4158 Be careful about disabling locking either globally or in a specific service, as lack of locking may result in data corruption\. You should never need to set this parameter\. 4159 .sp 4160 \fINo default\fR 4161 .RE 4162 3534 4163 lock spin count (G) 3535 .RS 3n 3536 This parameter has been made inoperative in Samba 3.0.24. The functionality it contolled is now controlled by the parameter 3537 lock spin time. 3538 .sp 3539 Default: 3540 \fB\fIlock spin count\fR = 0 \fR 3541 .RE 3542 .PP 4164 .PP 4165 .RS 4 4166 This parameter has been made inoperative in Samba 3\.0\.24\. The functionality it contolled is now controlled by the parameter 4167 \fIlock spin time\fR\. 4168 .sp 4169 Default: 4170 \fI\fIlock spin count\fR\fR\fI = \fR\fI0\fR\fI \fR 4171 .RE 4172 3543 4173 lock spin time (G) 3544 .RS 3n 3545 The time in microseconds that smbd should keep waiting to see if a failed lock request can be granted. This parameter has changed in default value from Samba 3.0.23 from 10 to 200. The associated 3546 lock spin count parameter is no longer used in Samba 3.0.24. You should not need to change the value of this parameter. 3547 .sp 3548 Default: 3549 \fB\fIlock spin time\fR = 200 \fR 3550 .RE 3551 .PP 4174 .PP 4175 .RS 4 4176 The time in microseconds that smbd should keep waiting to see if a failed lock request can be granted\. This parameter has changed in default value from Samba 3\.0\.23 from 10 to 200\. The associated 4177 \fIlock spin count\fR 4178 parameter is no longer used in Samba 3\.0\.24\. You should not need to change the value of this parameter\. 4179 .sp 4180 Default: 4181 \fI\fIlock spin time\fR\fR\fI = \fR\fI200\fR\fI \fR 4182 .RE 4183 3552 4184 log file (G) 3553 .RS 3n 3554 This option allows you to override the name of the Samba log file (also known as the debug file). 3555 .sp 3556 This option takes the standard substitutions, allowing you to have separate log files for each user or machine. 3557 .sp 3558 \fBNo default\fR 3559 .sp 3560 Example: 3561 \fB\fIlog file\fR = /usr/local/samba/var/log.%m \fR 3562 .RE 3563 .PP 3564 debuglevel 3565 .RS 3n 3566 This parameter is a synonym for log level. 3567 .RE 3568 .PP 4185 .PP 4186 .RS 4 4187 This option allows you to override the name of the Samba log file (also known as the debug file)\. 4188 .sp 4189 This option takes the standard substitutions, allowing you to have separate log files for each user or machine\. 4190 .sp 4191 \fINo default\fR 4192 .sp 4193 Example: 4194 \fI\fIlog file\fR\fR\fI = \fR\fI/usr/local/samba/var/log\.%m\fR\fI \fR 4195 .RE 4196 debuglevel.PP 4197 .RS 4 4198 This parameter is a synonym for 4199 log level\. 4200 .RE 4201 3569 4202 log level (G) 3570 .RS 3n 4203 .PP 4204 .RS 4 3571 4205 The value of the parameter (a astring) allows the debug level (logging level) to be specified in the 3572 \fIsmb.conf\fR 3573 file. This parameter has been extended since the 2.2.x series, now it allow to specify the debug level for multiple debug classes. This is to give greater flexibility in the configuration of the system. 3574 .sp 3575 The default will be the log level specified on the command line or level zero if none was specified. 3576 .sp 3577 \fBNo default\fR 3578 .sp 3579 Example: 3580 \fB\fIlog level\fR = 3 passdb:5 auth:10 winbind:2 \fR 3581 .RE 3582 .PP 4206 \fIsmb\.conf\fR 4207 file\. 4208 .sp 4209 This parameter has been extended since the 2\.2\.x series, now it allows to specify the debug level for multiple debug classes\. This is to give greater flexibility in the configuration of the system\. The following debug classes are currently implemented: 4210 .sp 4211 .RS 4 4212 .ie n \{\ 4213 \h'-04'\(bu\h'+03'\c 4214 .\} 4215 .el \{\ 4216 .sp -1 4217 .IP \(bu 2.3 4218 .\} 4219 \fIall\fR 4220 .RE 4221 .sp 4222 .RS 4 4223 .ie n \{\ 4224 \h'-04'\(bu\h'+03'\c 4225 .\} 4226 .el \{\ 4227 .sp -1 4228 .IP \(bu 2.3 4229 .\} 4230 \fItdb\fR 4231 .RE 4232 .sp 4233 .RS 4 4234 .ie n \{\ 4235 \h'-04'\(bu\h'+03'\c 4236 .\} 4237 .el \{\ 4238 .sp -1 4239 .IP \(bu 2.3 4240 .\} 4241 \fIprintdrivers\fR 4242 .RE 4243 .sp 4244 .RS 4 4245 .ie n \{\ 4246 \h'-04'\(bu\h'+03'\c 4247 .\} 4248 .el \{\ 4249 .sp -1 4250 .IP \(bu 2.3 4251 .\} 4252 \fIlanman\fR 4253 .RE 4254 .sp 4255 .RS 4 4256 .ie n \{\ 4257 \h'-04'\(bu\h'+03'\c 4258 .\} 4259 .el \{\ 4260 .sp -1 4261 .IP \(bu 2.3 4262 .\} 4263 \fIsmb\fR 4264 .RE 4265 .sp 4266 .RS 4 4267 .ie n \{\ 4268 \h'-04'\(bu\h'+03'\c 4269 .\} 4270 .el \{\ 4271 .sp -1 4272 .IP \(bu 2.3 4273 .\} 4274 \fIrpc_parse\fR 4275 .RE 4276 .sp 4277 .RS 4 4278 .ie n \{\ 4279 \h'-04'\(bu\h'+03'\c 4280 .\} 4281 .el \{\ 4282 .sp -1 4283 .IP \(bu 2.3 4284 .\} 4285 \fIrpc_srv\fR 4286 .RE 4287 .sp 4288 .RS 4 4289 .ie n \{\ 4290 \h'-04'\(bu\h'+03'\c 4291 .\} 4292 .el \{\ 4293 .sp -1 4294 .IP \(bu 2.3 4295 .\} 4296 \fIrpc_cli\fR 4297 .RE 4298 .sp 4299 .RS 4 4300 .ie n \{\ 4301 \h'-04'\(bu\h'+03'\c 4302 .\} 4303 .el \{\ 4304 .sp -1 4305 .IP \(bu 2.3 4306 .\} 4307 \fIpassdb\fR 4308 .RE 4309 .sp 4310 .RS 4 4311 .ie n \{\ 4312 \h'-04'\(bu\h'+03'\c 4313 .\} 4314 .el \{\ 4315 .sp -1 4316 .IP \(bu 2.3 4317 .\} 4318 \fIsam\fR 4319 .RE 4320 .sp 4321 .RS 4 4322 .ie n \{\ 4323 \h'-04'\(bu\h'+03'\c 4324 .\} 4325 .el \{\ 4326 .sp -1 4327 .IP \(bu 2.3 4328 .\} 4329 \fIauth\fR 4330 .RE 4331 .sp 4332 .RS 4 4333 .ie n \{\ 4334 \h'-04'\(bu\h'+03'\c 4335 .\} 4336 .el \{\ 4337 .sp -1 4338 .IP \(bu 2.3 4339 .\} 4340 \fIwinbind\fR 4341 .RE 4342 .sp 4343 .RS 4 4344 .ie n \{\ 4345 \h'-04'\(bu\h'+03'\c 4346 .\} 4347 .el \{\ 4348 .sp -1 4349 .IP \(bu 2.3 4350 .\} 4351 \fIvfs\fR 4352 .RE 4353 .sp 4354 .RS 4 4355 .ie n \{\ 4356 \h'-04'\(bu\h'+03'\c 4357 .\} 4358 .el \{\ 4359 .sp -1 4360 .IP \(bu 2.3 4361 .\} 4362 \fIidmap\fR 4363 .RE 4364 .sp 4365 .RS 4 4366 .ie n \{\ 4367 \h'-04'\(bu\h'+03'\c 4368 .\} 4369 .el \{\ 4370 .sp -1 4371 .IP \(bu 2.3 4372 .\} 4373 \fIquota\fR 4374 .RE 4375 .sp 4376 .RS 4 4377 .ie n \{\ 4378 \h'-04'\(bu\h'+03'\c 4379 .\} 4380 .el \{\ 4381 .sp -1 4382 .IP \(bu 2.3 4383 .\} 4384 \fIacls\fR 4385 .RE 4386 .sp 4387 .RS 4 4388 .ie n \{\ 4389 \h'-04'\(bu\h'+03'\c 4390 .\} 4391 .el \{\ 4392 .sp -1 4393 .IP \(bu 2.3 4394 .\} 4395 \fIlocking\fR 4396 .RE 4397 .sp 4398 .RS 4 4399 .ie n \{\ 4400 \h'-04'\(bu\h'+03'\c 4401 .\} 4402 .el \{\ 4403 .sp -1 4404 .IP \(bu 2.3 4405 .\} 4406 \fImsdfs\fR 4407 .RE 4408 .sp 4409 .RS 4 4410 .ie n \{\ 4411 \h'-04'\(bu\h'+03'\c 4412 .\} 4413 .el \{\ 4414 .sp -1 4415 .IP \(bu 2.3 4416 .\} 4417 \fIdmapi\fR 4418 .RE 4419 .sp 4420 .RS 4 4421 .ie n \{\ 4422 \h'-04'\(bu\h'+03'\c 4423 .\} 4424 .el \{\ 4425 .sp -1 4426 .IP \(bu 2.3 4427 .\} 4428 \fIregistry\fR 4429 .sp 4430 .RE 4431 Default: 4432 \fI\fIlog level\fR\fR\fI = \fR\fI0\fR\fI \fR 4433 .sp 4434 Example: 4435 \fI\fIlog level\fR\fR\fI = \fR\fI3 passdb:5 auth:10 winbind:2\fR\fI \fR 4436 .RE 4437 3583 4438 logon drive (G) 3584 .RS 3n 4439 .PP 4440 .RS 4 3585 4441 This parameter specifies the local path to which the home directory will be connected (see 3586 logon home) and is only used by NT Workstations.3587 .sp 3588 Note that this option is only useful if Samba is set up as a logon server .3589 .sp 3590 Default: 3591 \f B\fIlogon drive\fR =\fR3592 .sp 3593 Example: 3594 \f B\fIlogon drive\fR = h:\fR3595 .RE 3596 .PP 4442 \fIlogon home\fR) and is only used by NT Workstations\. 4443 .sp 4444 Note that this option is only useful if Samba is set up as a logon server\. 4445 .sp 4446 Default: 4447 \fI\fIlogon drive\fR\fR\fI = \fR\fI\fR\fI \fR 4448 .sp 4449 Example: 4450 \fI\fIlogon drive\fR\fR\fI = \fR\fIh:\fR\fI \fR 4451 .RE 4452 3597 4453 logon home (G) 3598 .RS 3n 3599 This parameter specifies the home directory location when a Win95/98 or NT Workstation logs into a Samba PDC. It allows you to do 3600 .sp 3601 3602 C:\>\fBNET USE H: /HOME\fR 3603 .sp 3604 from a command prompt, for example. 3605 .sp 3606 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine. 3607 .sp 3608 This parameter can be used with Win9X workstations to ensure that roaming profiles are stored in a subdirectory of the user's home directory. This is done in the following way: 3609 .sp 3610 3611 logon home = \\\\%N\\%U\\profile 3612 .sp 3613 This tells Samba to return the above string, with substitutions made when a client requests the info, generally in a NetUserGetInfo request. Win9X clients truncate the info to \\server\share when a user does 4454 .PP 4455 .RS 4 4456 This parameter specifies the home directory location when a Win95/98 or NT Workstation logs into a Samba PDC\. It allows you to do 4457 .sp 4458 4459 C:\e>\fBNET USE H: /HOME\fR 4460 .sp 4461 from a command prompt, for example\. 4462 .sp 4463 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\. 4464 .sp 4465 This parameter can be used with Win9X workstations to ensure that roaming profiles are stored in a subdirectory of the user\'s home directory\. This is done in the following way: 4466 .sp 4467 4468 logon home = \e\e%N\e%U\eprofile 4469 .sp 4470 This tells Samba to return the above string, with substitutions made when a client requests the info, generally in a NetUserGetInfo request\. Win9X clients truncate the info to \e\eserver\eshare when a user does 3614 4471 net use /home 3615 but use the whole string when dealing with profiles .4472 but use the whole string when dealing with profiles\. 3616 4473 .sp 3617 4474 Note that in prior versions of Samba, the 3618 logon path was returned rather than 3619 \fIlogon home\fR. This broke 4475 \fIlogon path\fR 4476 was returned rather than 4477 \fIlogon home\fR\. This broke 3620 4478 net use /home 3621 but allowed profiles outside the home directory . The current implementation is correct, and can be used for profiles if you use the above trick.4479 but allowed profiles outside the home directory\. The current implementation is correct, and can be used for profiles if you use the above trick\. 3622 4480 .sp 3623 4481 Disable this feature by setting 3624 logon home = "" - using the empty string. 3625 .sp 3626 This option is only useful if Samba is set up as a logon server. 3627 .sp 3628 Default: 3629 \fB\fIlogon home\fR = \\\\%N\\%U \fR 3630 .sp 3631 Example: 3632 \fB\fIlogon home\fR = \\\\remote_smb_server\\%U \fR 3633 .RE 3634 .PP 4482 \fIlogon home = ""\fR 4483 \- using the empty string\. 4484 .sp 4485 This option is only useful if Samba is set up as a logon server\. 4486 .sp 4487 Default: 4488 \fI\fIlogon home\fR\fR\fI = \fR\fI\e\e%N\e%U\fR\fI \fR 4489 .sp 4490 Example: 4491 \fI\fIlogon home\fR\fR\fI = \fR\fI\e\eremote_smb_server\e%U\fR\fI \fR 4492 .RE 4493 3635 4494 logon path (G) 3636 .RS 3n 3637 This parameter specifies the directory where roaming profiles (Desktop, NTuser.dat, etc) are stored. Contrary to previous versions of these manual pages, it has nothing to do with Win 9X roaming profiles. To find out how to handle roaming profiles for Win 9X system, see the 3638 logon home parameter. 3639 .sp 3640 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine. It also specifies the directory from which the "Application Data", 4495 .PP 4496 .RS 4 4497 This parameter specifies the directory where roaming profiles (Desktop, NTuser\.dat, etc) are stored\. Contrary to previous versions of these manual pages, it has nothing to do with Win 9X roaming profiles\. To find out how to handle roaming profiles for Win 9X system, see the 4498 \fIlogon home\fR 4499 parameter\. 4500 .sp 4501 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\. It also specifies the directory from which the "Application Data", 3641 4502 \fIdesktop\fR, 3642 4503 \fIstart menu\fR, 3643 4504 \fInetwork neighborhood\fR, 3644 4505 \fIprograms\fR 3645 and other folders, and their contents, are loaded and displayed on your Windows NT client .3646 .sp 3647 The share and the path must be readable by the user for the preferences and directories to be loaded onto the Windows NT client . The share must be writeable when the user logs in for the first time, in order that the Windows NT client can create the NTuser.dat and other directories. Thereafter, the directories and any of the contents can, if required, be made read-only. It is not advisable that the NTuser.dat file be made read-only - rename it to NTuser.man to achieve the desired effect (a3648 \f BMAN\fRdatory profile).3649 .sp 3650 Windows clients can sometimes maintain a connection to the [homes] share, even though there is no user logged in . Therefore, it is vital that the logon path does not include a reference to the homes share (i.e. setting this parameter to \\%N\homes\profile_path will cause problems).3651 .sp 3652 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine .4506 and other folders, and their contents, are loaded and displayed on your Windows NT client\. 4507 .sp 4508 The share and the path must be readable by the user for the preferences and directories to be loaded onto the Windows NT client\. The share must be writeable when the user logs in for the first time, in order that the Windows NT client can create the NTuser\.dat and other directories\. Thereafter, the directories and any of the contents can, if required, be made read\-only\. It is not advisable that the NTuser\.dat file be made read\-only \- rename it to NTuser\.man to achieve the desired effect (a 4509 \fIMAN\fRdatory profile)\. 4510 .sp 4511 Windows clients can sometimes maintain a connection to the [homes] share, even though there is no user logged in\. Therefore, it is vital that the logon path does not include a reference to the homes share (i\.e\. setting this parameter to \e\e%N\ehomes\eprofile_path will cause problems)\. 4512 .sp 4513 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\. 3653 4514 .sp 3654 4515 .it 1 an-trap … … 3656 4517 .nr an-break-flag 1 3657 4518 .br 3658 \fBWarning\fR 3659 Do not quote the value. Setting this as 3660 \fB\\%N\profile\%U\fR 3661 will break profile handling. Where the tdbsam or ldapsam passdb backend is used, at the time the user account is created the value configured for this parameter is written to the passdb backend and that value will over-ride the parameter value present in the smb.conf file. Any error present in the passdb backend account record must be editted using the appropriate tool (pdbedit on the command-line, or any other locally provided system tool). 3662 Note that this option is only useful if Samba is set up as a domain controller. 3663 .sp 3664 Disable the use of roaming profiles by setting the value of this parameter to the empty string. For example, 3665 logon path = "". Take note that even if the default setting in the smb.conf file is the empty string, any value specified in the user account settings in the passdb backend will over-ride the effect of setting this parameter to null. Disabling of all roaming profile use requires that the user account settings must also be blank. 4519 Warning 4520 Do not quote the value\. Setting this as 4521 \(lq\e\e%N\eprofile\e%U\(rq 4522 will break profile handling\. Where the tdbsam or ldapsam passdb backend is used, at the time the user account is created the value configured for this parameter is written to the passdb backend and that value will over\-ride the parameter value present in the smb\.conf file\. Any error present in the passdb backend account record must be editted using the appropriate tool (pdbedit on the command\-line, or any other locally provided system tool)\. 4523 4524 Note that this option is only useful if Samba is set up as a domain controller\. 4525 .sp 4526 Disable the use of roaming profiles by setting the value of this parameter to the empty string\. For example, 4527 \fIlogon path = ""\fR\. Take note that even if the default setting in the smb\.conf file is the empty string, any value specified in the user account settings in the passdb backend will over\-ride the effect of setting this parameter to null\. Disabling of all roaming profile use requires that the user account settings must also be blank\. 3666 4528 .sp 3667 4529 An example of use is: 3668 3669 .sp 3670 4530 .sp 4531 .RS 4 3671 4532 .nf 3672 3673 logon path = \\PROFILESERVER\PROFILE\%U 3674 4533 logon path = \e\ePROFILESERVER\ePROFILE\e%U 3675 4534 .fi 3676 3677 .sp 3678 Default: 3679 \fB\fIlogon path\fR = \\\\%N\\%U\\profile \fR 3680 .RE 3681 .PP 4535 .RE 4536 .sp 4537 .sp 4538 Default: 4539 \fI\fIlogon path\fR\fR\fI = \fR\fI\e\e%N\e%U\eprofile\fR\fI \fR 4540 .RE 4541 3682 4542 logon script (G) 3683 .RS 3n 3684 This parameter specifies the batch file (\fI.bat\fR) or NT command file (\fI.cmd\fR) to be downloaded and run on a machine when a user successfully logs in. The file must contain the DOS style CR/LF line endings. Using a DOS-style editor to create the file is recommended. 4543 .PP 4544 .RS 4 4545 This parameter specifies the batch file (\fI\.bat\fR) or NT command file (\fI\.cmd\fR) to be downloaded and run on a machine when a user successfully logs in\. The file must contain the DOS style CR/LF line endings\. Using a DOS\-style editor to create the file is recommended\. 3685 4546 .sp 3686 4547 The script must be a relative path to the 3687 4548 \fI[netlogon]\fR 3688 service. If the [netlogon] service specifies a 3689 path of 4549 service\. If the [netlogon] service specifies a 4550 \fIpath\fR 4551 of 3690 4552 \fI/usr/local/samba/netlogon\fR, and 3691 logon script = STARTUP.BAT, then the file that will be downloaded is: 3692 3693 .sp 3694 4553 \fIlogon script = STARTUP\.BAT\fR, then the file that will be downloaded is: 4554 .sp 4555 .RS 4 3695 4556 .nf 3696 3697 /usr/local/samba/netlogon/STARTUP.BAT 3698 4557 /usr/local/samba/netlogon/STARTUP\.BAT 3699 4558 .fi 3700 3701 .sp 3702 The contents of the batch file are entirely your choice. A suggested command would be to add 3703 NET TIME \\\\SERVER /SET /YES, to force every machine to synchronize clocks with the same time server. Another use would be to add 3704 NET USE U: \\\\SERVER\\UTILS 4559 .RE 4560 .sp 4561 .sp 4562 The contents of the batch file are entirely your choice\. A suggested command would be to add 4563 NET TIME \e\eSERVER /SET /YES, to force every machine to synchronize clocks with the same time server\. Another use would be to add 4564 NET USE U: \e\eSERVER\eUTILS 3705 4565 for commonly used utilities, or 3706 3707 .sp 3708 4566 .sp 4567 .RS 4 3709 4568 .nf 3710 3711 \fBNET USE Q: \\SERVER\ISO9001_QA\fR 3712 4569 \fBNET USE Q: \e\eSERVER\eISO9001_QA\fR 3713 4570 .fi 3714 for example. 3715 .sp 3716 Note that it is particularly important not to allow write access to the [netlogon] share, or to grant users write permission on the batch files in a secure environment, as this would allow the batch files to be arbitrarily modified and security to be breached. 3717 .sp 3718 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine. 3719 .sp 3720 This option is only useful if Samba is set up as a logon server. 3721 .sp 3722 Default: 3723 \fB\fIlogon script\fR = \fR 3724 .sp 3725 Example: 3726 \fB\fIlogon script\fR = scripts\\%U.bat \fR 3727 .RE 3728 .PP 4571 .RE 4572 .sp 4573 for example\. 4574 .sp 4575 Note that it is particularly important not to allow write access to the [netlogon] share, or to grant users write permission on the batch files in a secure environment, as this would allow the batch files to be arbitrarily modified and security to be breached\. 4576 .sp 4577 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\. 4578 .sp 4579 This option is only useful if Samba is set up as a logon server\. 4580 .sp 4581 Default: 4582 \fI\fIlogon script\fR\fR\fI = \fR\fI\fR\fI \fR 4583 .sp 4584 Example: 4585 \fI\fIlogon script\fR\fR\fI = \fR\fIscripts\e%U\.bat\fR\fI \fR 4586 .RE 4587 3729 4588 lppause command (S) 3730 .RS 3n 3731 This parameter specifies the command to be executed on the server host in order to stop printing or spooling a specific print job. 3732 .sp 3733 This command should be a program or script which takes a printer name and job number to pause the print job. One way of implementing this is by using job priorities, where jobs having a too low priority won't be sent to the printer. 4589 .PP 4590 .RS 4 4591 This parameter specifies the command to be executed on the server host in order to stop printing or spooling a specific print job\. 4592 .sp 4593 This command should be a program or script which takes a printer name and job number to pause the print job\. One way of implementing this is by using job priorities, where jobs having a too low priority won\'t be sent to the printer\. 3734 4594 .sp 3735 4595 If a 3736 4596 \fI%p\fR 3737 is given then the printer name is put in its place . A4597 is given then the printer name is put in its place\. A 3738 4598 \fI%j\fR 3739 is replaced with the job number (an integer) . On HPUX (see4599 is replaced with the job number (an integer)\. On HPUX (see 3740 4600 \fIprinting=hpux \fR), if the 3741 \fI -p%p\fR3742 option is added to the lpq command, the job will show up with the correct status, i .e. if the job priority is lower than the set fence priority it will have the PAUSED status, whereas if the priority is equal or higher it will have the SPOOLED or PRINTING status.3743 .sp 3744 Note that it is good practice to include the absolute path in the lppause command as the PATH may not be available to the server .3745 .sp 3746 Default: 3747 \f B\fIlppause command\fR = # Currently no default value is given to this string, unless the value of the printing parameter is \\fBSYSV\\fR, in which case the default is : lp -i %p-%j -H hold or if the value of the \\fIprinting\\fR parameter is \\fBSOFTQ\\fR, then the default is: qstat -s -j%j -h.\fR3748 .sp 3749 Example: 3750 \f B\fIlppause command\fR = /usr/bin/lpalt %p-%j -p0\fR3751 .RE 3752 .PP 4601 \fI\-p%p\fR 4602 option is added to the lpq command, the job will show up with the correct status, i\.e\. if the job priority is lower than the set fence priority it will have the PAUSED status, whereas if the priority is equal or higher it will have the SPOOLED or PRINTING status\. 4603 .sp 4604 Note that it is good practice to include the absolute path in the lppause command as the PATH may not be available to the server\. 4605 .sp 4606 Default: 4607 \fI\fIlppause command\fR\fR\fI = \fR\fI # Currently no default value is given to this string, unless the value of the \fIprinting\fR parameter is \fBSYSV\fR, in which case the default is : lp \-i %p\-%j \-H hold or if the value of the \fIprinting\fR parameter is \fBSOFTQ\fR, then the default is: qstat \-s \-j%j \-h\. \fR\fI \fR 4608 .sp 4609 Example: 4610 \fI\fIlppause command\fR\fR\fI = \fR\fI/usr/bin/lpalt %p\-%j \-p0\fR\fI \fR 4611 .RE 4612 3753 4613 lpq cache time (G) 3754 .RS 3n 4614 .PP 4615 .RS 4 3755 4616 This controls how long lpq info will be cached for to prevent the 3756 4617 lpq 3757 command being called too often . A separate cache is kept for each variation of the4618 command being called too often\. A separate cache is kept for each variation of the 3758 4619 lpq 3759 4620 command used by the system, so if you use different 3760 4621 lpq 3761 commands for different users then they won 't share cache information.4622 commands for different users then they won\'t share cache information\. 3762 4623 .sp 3763 4624 The cache files are stored in 3764 \fI/tmp/lpq .xxxx\fR4625 \fI/tmp/lpq\.xxxx\fR 3765 4626 where xxxx is a hash of the 3766 4627 lpq 3767 command in use .4628 command in use\. 3768 4629 .sp 3769 4630 The default is 30 seconds, meaning that the cached results of a previous identical 3770 4631 lpq 3771 command will be used if the cached data is less than 30 seconds old . A large value may be advisable if your4632 command will be used if the cached data is less than 30 seconds old\. A large value may be advisable if your 3772 4633 lpq 3773 command is very slow .3774 .sp 3775 A value of 0 will disable caching completely .3776 .sp 3777 Default: 3778 \f B\fIlpq cache time\fR = 30\fR3779 .sp 3780 Example: 3781 \f B\fIlpq cache time\fR = 10\fR3782 .RE 3783 .PP 4634 command is very slow\. 4635 .sp 4636 A value of 0 will disable caching completely\. 4637 .sp 4638 Default: 4639 \fI\fIlpq cache time\fR\fR\fI = \fR\fI30\fR\fI \fR 4640 .sp 4641 Example: 4642 \fI\fIlpq cache time\fR\fR\fI = \fR\fI10\fR\fI \fR 4643 .RE 4644 3784 4645 lpq command (S) 3785 .RS 3n 4646 .PP 4647 .RS 4 3786 4648 This parameter specifies the command to be executed on the server host in order to obtain 3787 lpq -style printer status information.3788 .sp 3789 This command should be a program or script which takes a printer name as its only parameter and outputs printer status information .3790 .sp 3791 Currently nine styles of printer status information are supported; BSD, AIX, LPRNG, PLP, SYSV, HPUX, QNX, CUPS, and SOFTQ . This covers most UNIX systems. You control which type is expected using the4649 lpq\-style printer status information\. 4650 .sp 4651 This command should be a program or script which takes a printer name as its only parameter and outputs printer status information\. 4652 .sp 4653 Currently nine styles of printer status information are supported; BSD, AIX, LPRNG, PLP, SYSV, HPUX, QNX, CUPS, and SOFTQ\. This covers most UNIX systems\. You control which type is expected using the 3792 4654 \fIprinting =\fR 3793 option .3794 .sp 3795 Some clients (notably Windows for Workgroups) may not correctly send the connection number for the printer they are requesting status information about . To get around this, the server reports on the first printer service connected to by the client. This only happens if the connection number sent is invalid.4655 option\. 4656 .sp 4657 Some clients (notably Windows for Workgroups) may not correctly send the connection number for the printer they are requesting status information about\. To get around this, the server reports on the first printer service connected to by the client\. This only happens if the connection number sent is invalid\. 3796 4658 .sp 3797 4659 If a 3798 4660 \fI%p\fR 3799 is given then the printer name is put in its place . Otherwise it is placed at the end of the command.4661 is given then the printer name is put in its place\. Otherwise it is placed at the end of the command\. 3800 4662 .sp 3801 4663 Note that it is good practice to include the absolute path in the … … 3803 4665 as the 3804 4666 \fB$PATH \fR 3805 may not be available to the server . When compiled with the CUPS libraries, no4667 may not be available to the server\. When compiled with the CUPS libraries, no 3806 4668 \fIlpq command\fR 3807 is needed because smbd will make a library call to obtain the print queue listing .3808 .sp 3809 Default: 3810 \f B\fIlpq command\fR =\fR3811 .sp 3812 Example: 3813 \f B\fIlpq command\fR = /usr/bin/lpq -P%p\fR3814 .RE 3815 .PP 4669 is needed because smbd will make a library call to obtain the print queue listing\. 4670 .sp 4671 Default: 4672 \fI\fIlpq command\fR\fR\fI = \fR\fI\fR\fI \fR 4673 .sp 4674 Example: 4675 \fI\fIlpq command\fR\fR\fI = \fR\fI/usr/bin/lpq \-P%p\fR\fI \fR 4676 .RE 4677 3816 4678 lpresume command (S) 3817 .RS 3n 3818 This parameter specifies the command to be executed on the server host in order to restart or continue printing or spooling a specific print job. 3819 .sp 3820 This command should be a program or script which takes a printer name and job number to resume the print job. See also the 3821 lppause command parameter. 4679 .PP 4680 .RS 4 4681 This parameter specifies the command to be executed on the server host in order to restart or continue printing or spooling a specific print job\. 4682 .sp 4683 This command should be a program or script which takes a printer name and job number to resume the print job\. See also the 4684 \fIlppause command\fR 4685 parameter\. 3822 4686 .sp 3823 4687 If a 3824 4688 \fI%p\fR 3825 is given then the printer name is put in its place . A4689 is given then the printer name is put in its place\. A 3826 4690 \fI%j\fR 3827 is replaced with the job number (an integer) .4691 is replaced with the job number (an integer)\. 3828 4692 .sp 3829 4693 Note that it is good practice to include the absolute path in the 3830 4694 \fIlpresume command\fR 3831 as the PATH may not be available to the server .4695 as the PATH may not be available to the server\. 3832 4696 .sp 3833 4697 See also the 3834 printing parameter. 4698 \fIprinting\fR 4699 parameter\. 3835 4700 .sp 3836 4701 Default: Currently no default value is given to this string, unless the value of the 3837 4702 \fIprinting\fR 3838 4703 parameter is 3839 \fBSYSV\fR, in which case the default is 3840 .sp 3841 lp -i %p-%j-H resume4704 \fBSYSV\fR, in which case the default is: 4705 .sp 4706 lp \-i %p\-%j \-H resume 3842 4707 .sp 3843 4708 or if the value of the … … 3846 4711 \fBSOFTQ\fR, then the default is: 3847 4712 .sp 3848 qstat -s -j%j -r 3849 .sp 3850 Default: 3851 \fB\fIlpresume command\fR = lpresume command = /usr/bin/lpalt %p-%j -p2 \fR 3852 .RE 3853 .PP 4713 qstat \-s \-j%j \-r 4714 .sp 4715 \fINo default\fR 4716 .sp 4717 Example: 4718 \fI\fIlpresume command\fR\fR\fI = \fR\fI/usr/bin/lpalt %p\-%j \-p2\fR\fI \fR 4719 .RE 4720 3854 4721 lprm command (S) 3855 .RS 3n 3856 This parameter specifies the command to be executed on the server host in order to delete a print job. 3857 .sp 3858 This command should be a program or script which takes a printer name and job number, and deletes the print job. 4722 .PP 4723 .RS 4 4724 This parameter specifies the command to be executed on the server host in order to delete a print job\. 4725 .sp 4726 This command should be a program or script which takes a printer name and job number, and deletes the print job\. 3859 4727 .sp 3860 4728 If a 3861 4729 \fI%p\fR 3862 is given then the printer name is put in its place . A4730 is given then the printer name is put in its place\. A 3863 4731 \fI%j\fR 3864 is replaced with the job number (an integer) .4732 is replaced with the job number (an integer)\. 3865 4733 .sp 3866 4734 Note that it is good practice to include the absolute path in the 3867 4735 \fIlprm command\fR 3868 as the PATH may not be available to the server .4736 as the PATH may not be available to the server\. 3869 4737 .sp 3870 4738 Examples of use are: 3871 3872 .sp 3873 4739 .sp 4740 .RS 4 3874 4741 .nf 3875 3876 lprm command = /usr/bin/lprm -P%p %j 4742 lprm command = /usr/bin/lprm \-P%p %j 3877 4743 3878 4744 or 3879 4745 3880 lprm command = /usr/bin/cancel %p-%j 3881 4746 lprm command = /usr/bin/cancel %p\-%j 3882 4747 .fi 3883 3884 .sp 3885 Default: 3886 \fB\fIlprm command\fR = determined by printing parameter \fR 3887 .RE 3888 .PP 4748 .RE 4749 .sp 4750 .sp 4751 Default: 4752 \fI\fIlprm command\fR\fR\fI = \fR\fI determined by printing parameter\fR\fI \fR 4753 .RE 4754 3889 4755 machine password timeout (G) 3890 .RS 3n 4756 .PP 4757 .RS 4 3891 4758 If a Samba server is a member of a Windows NT Domain (see the 3892 security = domain parameter) then periodically a running smbd process will try and change the MACHINE ACCOUNT PASSWORD stored in the TDB called 3893 \fIprivate/secrets.tdb \fR. This parameter specifies how often this password will be changed, in seconds. The default is one week (expressed in seconds), the same as a Windows NT Domain member server. 4759 \fIsecurity = domain\fR 4760 parameter) then periodically a running smbd process will try and change the MACHINE ACCOUNT PASSWORD stored in the TDB called 4761 \fIprivate/secrets\.tdb \fR\. This parameter specifies how often this password will be changed, in seconds\. The default is one week (expressed in seconds), the same as a Windows NT Domain member server\. 3894 4762 .sp 3895 4763 See also 3896 4764 \fBsmbpasswd\fR(8), and the 3897 security = domain parameter. 3898 .sp 3899 Default: 3900 \fB\fImachine password timeout\fR = 604800 \fR 3901 .RE 3902 .PP 4765 \fIsecurity = domain\fR 4766 parameter\. 4767 .sp 4768 Default: 4769 \fI\fImachine password timeout\fR\fR\fI = \fR\fI604800\fR\fI \fR 4770 .RE 4771 3903 4772 magic output (S) 3904 .RS 3n 4773 .PP 4774 .RS 4 3905 4775 This parameter specifies the name of a file which will contain output created by a magic script (see the 3906 magic script parameter below). 4776 \fImagic script\fR 4777 parameter below)\. 3907 4778 .sp 3908 4779 .it 1 an-trap … … 3910 4781 .nr an-break-flag 1 3911 4782 .br 3912 \fBWarning\fR 4783 Warning 3913 4784 If two clients use the same 3914 4785 \fImagic script \fR 3915 in the same directory the output file content is undefined. 3916 Default: 3917 \fB\fImagic output\fR = <magic script name>.out \fR 3918 .sp 3919 Example: 3920 \fB\fImagic output\fR = myfile.txt \fR 3921 .RE 3922 .PP 4786 in the same directory the output file content is undefined\. 4787 4788 Default: 4789 \fI\fImagic output\fR\fR\fI = \fR\fI<magic script name>\.out\fR\fI \fR 4790 .sp 4791 Example: 4792 \fI\fImagic output\fR\fR\fI = \fR\fImyfile\.txt\fR\fI \fR 4793 .RE 4794 3923 4795 magic script (S) 3924 .RS 3n 3925 This parameter specifies the name of a file which, if opened, will be executed by the server when the file is closed. This allows a UNIX script to be sent to the Samba host and executed on behalf of the connected user. 3926 .sp 3927 Scripts executed in this way will be deleted upon completion assuming that the user has the appropriate level of privilege and the file permissions allow the deletion. 4796 .PP 4797 .RS 4 4798 This parameter specifies the name of a file which, if opened, will be executed by the server when the file is closed\. This allows a UNIX script to be sent to the Samba host and executed on behalf of the connected user\. 4799 .sp 4800 Scripts executed in this way will be deleted upon completion assuming that the user has the appropriate level of privilege and the file permissions allow the deletion\. 3928 4801 .sp 3929 4802 If the script generates output, output will be sent to the file specified by the 3930 magic output parameter (see above). 3931 .sp 3932 Note that some shells are unable to interpret scripts containing CR/LF instead of CR as the end-of-line marker. Magic scripts must be executable 3933 \fBas is\fR 3934 on the host, which for some hosts and some shells will require filtering at the DOS end. 4803 \fImagic output\fR 4804 parameter (see above)\. 4805 .sp 4806 Note that some shells are unable to interpret scripts containing CR/LF instead of CR as the end\-of\-line marker\. Magic scripts must be executable 4807 \fIas is\fR 4808 on the host, which for some hosts and some shells will require filtering at the DOS end\. 3935 4809 .sp 3936 4810 Magic scripts are 3937 \f BEXPERIMENTAL\fR4811 \fIEXPERIMENTAL\fR 3938 4812 and should 3939 \f BNOT\fR3940 be relied upon .3941 .sp 3942 Default: 3943 \f B\fImagic script\fR =\fR3944 .sp 3945 Example: 3946 \f B\fImagic script\fR = user.csh\fR3947 .RE 3948 .PP 4813 \fINOT\fR 4814 be relied upon\. 4815 .sp 4816 Default: 4817 \fI\fImagic script\fR\fR\fI = \fR\fI\fR\fI \fR 4818 .sp 4819 Example: 4820 \fI\fImagic script\fR\fR\fI = \fR\fIuser\.csh\fR\fI \fR 4821 .RE 4822 3949 4823 mangled map (S) 3950 .RS 3n 3951 This is for those who want to directly map UNIX file names which cannot be represented on Windows/DOS. The mangling of names is not always what is needed. In particular you may have documents with file extensions that differ between DOS and UNIX. For example, under UNIX it is common to use 3952 \fI.html\fR 4824 .PP 4825 .RS 4 4826 This is for those who want to directly map UNIX file names which cannot be represented on Windows/DOS\. The mangling of names is not always what is needed\. In particular you may have documents with file extensions that differ between DOS and UNIX\. For example, under UNIX it is common to use 4827 \fI\.html\fR 3953 4828 for HTML files, whereas under Windows/DOS 3954 \fI .htm\fR3955 is more commonly used .4829 \fI\.htm\fR 4830 is more commonly used\. 3956 4831 .sp 3957 4832 So to map … … 3962 4837 .sp 3963 4838 3964 mangled map = (*.html *.htm).4839 \fImangled map = (*\.html *\.htm)\fR\. 3965 4840 .sp 3966 4841 One very useful case is to remove the annoying 3967 4842 \fI;1\fR 3968 off the ends of filenames on some CDROMs (only visible under some UNIXes) . To do this use a map of (*;1 *;).3969 .sp 3970 Default: 3971 \f B\fImangled map\fR = # no mangled map\fR3972 .sp 3973 Example: 3974 \f B\fImangled map\fR = (*;1 *;)\fR3975 .RE 3976 .PP 4843 off the ends of filenames on some CDROMs (only visible under some UNIXes)\. To do this use a map of (*;1 *;)\. 4844 .sp 4845 Default: 4846 \fI\fImangled map\fR\fR\fI = \fR\fI # no mangled map\fR\fI \fR 4847 .sp 4848 Example: 4849 \fI\fImangled map\fR\fR\fI = \fR\fI(*;1 *;)\fR\fI \fR 4850 .RE 4851 3977 4852 mangled names (S) 3978 .RS 3n 3979 This controls whether non-DOS names under UNIX should be mapped to DOS-compatible names ("mangled") and made visible, or whether non-DOS names should simply be ignored. 4853 .PP 4854 .RS 4 4855 This controls whether non\-DOS names under UNIX should be mapped to DOS\-compatible names ("mangled") and made visible, or whether non\-DOS names should simply be ignored\. 3980 4856 .sp 3981 4857 See the section on 3982 name mangling for details on how to control the mangling process. 4858 \fIname mangling\fR 4859 for details on how to control the mangling process\. 3983 4860 .sp 3984 4861 If mangling is used then the mangling algorithm is as follows: 3985 .RS 3n 3986 .TP 3n 3987 \(bu 3988 The first (up to) five alphanumeric characters before the rightmost dot of the filename are preserved, forced to upper case, and appear as the first (up to) five characters of the mangled name. 3989 .TP 3n 3990 \(bu 3991 A tilde "~" is appended to the first part of the mangled name, followed by a two-character unique sequence, based on the original root name (i.e., the original filename minus its final extension). The final extension is included in the hash calculation only if it contains any upper case characters or is longer than three characters. 4862 .sp 4863 .RS 4 4864 .ie n \{\ 4865 \h'-04'\(bu\h'+03'\c 4866 .\} 4867 .el \{\ 4868 .sp -1 4869 .IP \(bu 2.3 4870 .\} 4871 The first (up to) five alphanumeric characters before the rightmost dot of the filename are preserved, forced to upper case, and appear as the first (up to) five characters of the mangled name\. 4872 .RE 4873 .sp 4874 .RS 4 4875 .ie n \{\ 4876 \h'-04'\(bu\h'+03'\c 4877 .\} 4878 .el \{\ 4879 .sp -1 4880 .IP \(bu 2.3 4881 .\} 4882 A tilde "~" is appended to the first part of the mangled name, followed by a two\-character unique sequence, based on the original root name (i\.e\., the original filename minus its final extension)\. The final extension is included in the hash calculation only if it contains any upper case characters or is longer than three characters\. 3992 4883 .sp 3993 4884 Note that the character to use may be specified using the 3994 mangling char option, if you don't like '~'. 3995 .TP 3n 3996 \(bu 3997 Files whose UNIX name begins with a dot will be presented as DOS hidden files. The mangled name will be created as for other filenames, but with the leading dot removed and "___" as its extension regardless of actual original extension (that's three underscores). 3998 .RE 3999 .IP "" 3n 4000 The two-digit hash value consists of upper case alphanumeric characters. 4001 .sp 4002 This algorithm can cause name collisions only if files in a directory share the same first five alphanumeric characters. The probability of such a clash is 1/1300. 4003 .sp 4004 The name mangling (if enabled) allows a file to be copied between UNIX directories from Windows/DOS while retaining the long UNIX filename. UNIX files can be renamed to a new extension from Windows/DOS and will retain the same basename. Mangled names do not change between sessions. 4005 .sp 4006 Default: 4007 \fB\fImangled names\fR = yes \fR 4008 .RE 4009 .PP 4885 \fImangling char\fR 4886 option, if you don\'t like \'~\'\. 4887 .RE 4888 .sp 4889 .RS 4 4890 .ie n \{\ 4891 \h'-04'\(bu\h'+03'\c 4892 .\} 4893 .el \{\ 4894 .sp -1 4895 .IP \(bu 2.3 4896 .\} 4897 Files whose UNIX name begins with a dot will be presented as DOS hidden files\. The mangled name will be created as for other filenames, but with the leading dot removed and "___" as its extension regardless of actual original extension (that\'s three underscores)\. 4898 .sp 4899 .RE 4900 The two\-digit hash value consists of upper case alphanumeric characters\. 4901 .sp 4902 This algorithm can cause name collisions only if files in a directory share the same first five alphanumeric characters\. The probability of such a clash is 1/1300\. 4903 .sp 4904 The name mangling (if enabled) allows a file to be copied between UNIX directories from Windows/DOS while retaining the long UNIX filename\. UNIX files can be renamed to a new extension from Windows/DOS and will retain the same basename\. Mangled names do not change between sessions\. 4905 .sp 4906 Default: 4907 \fI\fImangled names\fR\fR\fI = \fR\fIyes\fR\fI \fR 4908 .RE 4909 4010 4910 mangle prefix (G) 4011 .RS 3n 4012 controls the number of prefix characters from the original name used when generating the mangled names. A larger value will give a weaker hash and therefore more name collisions. The minimum value is 1 and the maximum value is 6. 4013 .sp 4014 mangle prefix is effective only when mangling method is hash2. 4015 .sp 4016 Default: 4017 \fB\fImangle prefix\fR = 1 \fR 4018 .sp 4019 Example: 4020 \fB\fImangle prefix\fR = 4 \fR 4021 .RE 4022 .PP 4911 .PP 4912 .RS 4 4913 controls the number of prefix characters from the original name used when generating the mangled names\. A larger value will give a weaker hash and therefore more name collisions\. The minimum value is 1 and the maximum value is 6\. 4914 .sp 4915 mangle prefix is effective only when mangling method is hash2\. 4916 .sp 4917 Default: 4918 \fI\fImangle prefix\fR\fR\fI = \fR\fI1\fR\fI \fR 4919 .sp 4920 Example: 4921 \fI\fImangle prefix\fR\fR\fI = \fR\fI4\fR\fI \fR 4922 .RE 4923 4023 4924 mangling char (S) 4024 .RS 3n 4925 .PP 4926 .RS 4 4025 4927 This controls what character is used as the 4026 \f Bmagic\fR4928 \fImagic\fR 4027 4929 character in 4028 name mangling. The default is a '~' but this may interfere with some software. Use this option to set it to whatever you prefer. This is effective only when mangling method is hash.4029 .sp 4030 Default: 4031 \f B\fImangling char\fR = ~\fR4032 .sp 4033 Example: 4034 \f B\fImangling char\fR = ^\fR4035 .RE 4036 .PP 4930 \fIname mangling\fR\. The default is a \'~\' but this may interfere with some software\. Use this option to set it to whatever you prefer\. This is effective only when mangling method is hash\. 4931 .sp 4932 Default: 4933 \fI\fImangling char\fR\fR\fI = \fR\fI~\fR\fI \fR 4934 .sp 4935 Example: 4936 \fI\fImangling char\fR\fR\fI = \fR\fI^\fR\fI \fR 4937 .RE 4938 4037 4939 mangling method (G) 4038 .RS 3n 4039 controls the algorithm used for the generating the mangled names. Can take two different values, "hash" and "hash2". "hash" is the algorithm that was used used in Samba for many years and was the default in Samba 2.2.x "hash2" is now the default and is newer and considered a better algorithm (generates less collisions) in the names. Many Win32 applications store the mangled names and so changing to algorithms must not be done lightly as these applications may break unless reinstalled. 4040 .sp 4041 Default: 4042 \fB\fImangling method\fR = hash2 \fR 4043 .sp 4044 Example: 4045 \fB\fImangling method\fR = hash \fR 4046 .RE 4047 .PP 4940 .PP 4941 .RS 4 4942 controls the algorithm used for the generating the mangled names\. Can take two different values, "hash" and "hash2"\. "hash" is the algorithm that was used used in Samba for many years and was the default in Samba 2\.2\.x "hash2" is now the default and is newer and considered a better algorithm (generates less collisions) in the names\. Many Win32 applications store the mangled names and so changing to algorithms must not be done lightly as these applications may break unless reinstalled\. 4943 .sp 4944 Default: 4945 \fI\fImangling method\fR\fR\fI = \fR\fIhash2\fR\fI \fR 4946 .sp 4947 Example: 4948 \fI\fImangling method\fR\fR\fI = \fR\fIhash\fR\fI \fR 4949 .RE 4950 4048 4951 map acl inherit (S) 4049 .RS 3n 4952 .PP 4953 .RS 4 4050 4954 This boolean parameter controls whether 4051 4955 \fBsmbd\fR(8) 4052 will attempt to map the 'inherit' and 'protected' access control entry flags stored in Windows ACLs into an extended attribute called user.SAMBA_PAI. This parameter only takes effect if Samba is being run on a platform that supports extended attributes (Linux and IRIX so far) and allows the Windows 2000 ACL editor to correctly use inheritance with the Samba POSIX ACL mapping code.4053 .sp 4054 Default: 4055 \f B\fImap acl inherit\fR = no\fR4056 .RE 4057 .PP 4956 will attempt to map the \'inherit\' and \'protected\' access control entry flags stored in Windows ACLs into an extended attribute called user\.SAMBA_PAI\. This parameter only takes effect if Samba is being run on a platform that supports extended attributes (Linux and IRIX so far) and allows the Windows 2000 ACL editor to correctly use inheritance with the Samba POSIX ACL mapping code\. 4957 .sp 4958 Default: 4959 \fI\fImap acl inherit\fR\fR\fI = \fR\fIno\fR\fI \fR 4960 .RE 4961 4058 4962 map archive (S) 4059 .RS 3n 4060 This controls whether the DOS archive attribute should be mapped to the UNIX owner execute bit. The DOS archive bit is set when a file has been modified since its last backup. One motivation for this option is to keep Samba/your PC from making any file it touches from becoming executable under UNIX. This can be quite annoying for shared source code, documents, etc... 4963 .PP 4964 .RS 4 4965 This controls whether the DOS archive attribute should be mapped to the UNIX owner execute bit\. The DOS archive bit is set when a file has been modified since its last backup\. One motivation for this option is to keep Samba/your PC from making any file it touches from becoming executable under UNIX\. This can be quite annoying for shared source code, documents, etc\.\.\. 4061 4966 .sp 4062 4967 Note that this requires the 4063 create mask parameter to be set such that owner execute bit is not masked out (i.e. it must include 100). See the parameter 4064 create mask for details. 4065 .sp 4066 Default: 4067 \fB\fImap archive\fR = yes \fR 4068 .RE 4069 .PP 4968 \fIcreate mask\fR 4969 parameter to be set such that owner execute bit is not masked out (i\.e\. it must include 100)\. See the parameter 4970 \fIcreate mask\fR 4971 for details\. 4972 .sp 4973 Default: 4974 \fI\fImap archive\fR\fR\fI = \fR\fIyes\fR\fI \fR 4975 .RE 4976 4070 4977 map hidden (S) 4071 .RS 3n 4072 This controls whether DOS style hidden files should be mapped to the UNIX world execute bit. 4978 .PP 4979 .RS 4 4980 This controls whether DOS style hidden files should be mapped to the UNIX world execute bit\. 4073 4981 .sp 4074 4982 Note that this requires the 4075 create mask to be set such that the world execute bit is not masked out (i.e. it must include 001). See the parameter 4076 create mask for details. 4077 .sp 4078 \fBNo default\fR 4079 .RE 4080 .PP 4983 \fIcreate mask\fR 4984 to be set such that the world execute bit is not masked out (i\.e\. it must include 001)\. See the parameter 4985 \fIcreate mask\fR 4986 for details\. 4987 .sp 4988 \fINo default\fR 4989 .RE 4990 4081 4991 map read only (S) 4082 .RS 3n 4083 This controls how the DOS read only attribute should be mapped from a UNIX filesystem. 4992 .PP 4993 .RS 4 4994 This controls how the DOS read only attribute should be mapped from a UNIX filesystem\. 4084 4995 .sp 4085 4996 This parameter can take three different values, which tell 4086 4997 \fBsmbd\fR(8) 4087 4998 how to display the read only attribute on files, where either 4088 store dos attributes is set to 4089 \fBNo\fR, or no extended attribute is present. If 4090 store dos attributes is set to 4999 \fIstore dos attributes\fR 5000 is set to 5001 \fBNo\fR, or no extended attribute is present\. If 5002 \fIstore dos attributes\fR 5003 is set to 4091 5004 \fByes\fR 4092 5005 then this parameter is 4093 \f Bignored\fR. This is a new parameter introduced in Samba version 3.0.21.5006 \fIignored\fR\. This is a new parameter introduced in Samba version 3\.0\.21\. 4094 5007 .sp 4095 5008 The three settings are : 4096 .RS 3n 4097 .TP 3n 4098 \(bu 5009 .sp 5010 .RS 4 5011 .ie n \{\ 5012 \h'-04'\(bu\h'+03'\c 5013 .\} 5014 .el \{\ 5015 .sp -1 5016 .IP \(bu 2.3 5017 .\} 4099 5018 4100 5019 \fBYes\fR 4101 - The read only DOS attribute is mapped to the inverse of the user or owner write bit in the unix permission mode set. If the owner write bit is not set, the read only attribute is reported as being set on the file. 4102 .TP 3n 4103 \(bu 5020 \- The read only DOS attribute is mapped to the inverse of the user or owner write bit in the unix permission mode set\. If the owner write bit is not set, the read only attribute is reported as being set on the file\. 5021 .RE 5022 .sp 5023 .RS 4 5024 .ie n \{\ 5025 \h'-04'\(bu\h'+03'\c 5026 .\} 5027 .el \{\ 5028 .sp -1 5029 .IP \(bu 2.3 5030 .\} 4104 5031 4105 5032 \fBPermissions\fR 4106 - The read only DOS attribute is mapped to the effective permissions of the connecting user, as evaluated by5033 \- The read only DOS attribute is mapped to the effective permissions of the connecting user, as evaluated by 4107 5034 \fBsmbd\fR(8) 4108 by reading the unix permissions and POSIX ACL (if present). If the connecting user does not have permission to modify the file, the read only attribute is reported as being set on the file. 4109 .TP 3n 4110 \(bu 5035 by reading the unix permissions and POSIX ACL (if present)\. If the connecting user does not have permission to modify the file, the read only attribute is reported as being set on the file\. 5036 .RE 5037 .sp 5038 .RS 4 5039 .ie n \{\ 5040 \h'-04'\(bu\h'+03'\c 5041 .\} 5042 .el \{\ 5043 .sp -1 5044 .IP \(bu 2.3 5045 .\} 4111 5046 4112 5047 \fBNo\fR 4113 - The read only DOS attribute is unaffected by permissions, and can only be set by the 4114 store dos attributes method. This may be useful for exporting mounted CDs. 4115 .RE 4116 .IP "" 3n 4117 Default: 4118 \fB\fImap read only\fR = yes \fR 4119 .RE 4120 .PP 5048 \- The read only DOS attribute is unaffected by permissions, and can only be set by the 5049 \fIstore dos attributes\fR 5050 method\. This may be useful for exporting mounted CDs\. 5051 .sp 5052 .RE 5053 Default: 5054 \fI\fImap read only\fR\fR\fI = \fR\fIyes\fR\fI \fR 5055 .RE 5056 4121 5057 map system (S) 4122 .RS 3n 4123 This controls whether DOS style system files should be mapped to the UNIX group execute bit. 5058 .PP 5059 .RS 4 5060 This controls whether DOS style system files should be mapped to the UNIX group execute bit\. 4124 5061 .sp 4125 5062 Note that this requires the 4126 create mask to be set such that the group execute bit is not masked out (i.e. it must include 010). See the parameter 4127 create mask for details. 4128 .sp 4129 Default: 4130 \fB\fImap system\fR = no \fR 4131 .RE 4132 .PP 5063 \fIcreate mask\fR 5064 to be set such that the group execute bit is not masked out (i\.e\. it must include 010)\. See the parameter 5065 \fIcreate mask\fR 5066 for details\. 5067 .sp 5068 Default: 5069 \fI\fImap system\fR\fR\fI = \fR\fIno\fR\fI \fR 5070 .RE 5071 4133 5072 map to guest (G) 4134 .RS 3n 5073 .PP 5074 .RS 4 4135 5075 This parameter is only useful in 4136 SECURITY = security modes other than 5076 \fISECURITY = security\fR 5077 modes other than 4137 5078 \fIsecurity = share\fR 4138 5079 and 4139 5080 \fIsecurity = server\fR 4140 - i.e.5081 \- i\.e\. 4141 5082 \fBuser\fR, and 4142 \fBdomain\fR .5083 \fBdomain\fR\. 4143 5084 .sp 4144 5085 This parameter can take four different values, which tell 4145 5086 \fBsmbd\fR(8) 4146 what to do with user login requests that don 't match a valid UNIX user in some way.5087 what to do with user login requests that don\'t match a valid UNIX user in some way\. 4147 5088 .sp 4148 5089 The four settings are : 4149 .RS 3n 4150 .TP 3n 4151 \(bu 5090 .sp 5091 .RS 4 5092 .ie n \{\ 5093 \h'-04'\(bu\h'+03'\c 5094 .\} 5095 .el \{\ 5096 .sp -1 5097 .IP \(bu 2.3 5098 .\} 4152 5099 \fBNever\fR 4153 - Means user login requests with an invalid password are rejected. This is the default. 4154 .TP 3n 4155 \(bu 5100 \- Means user login requests with an invalid password are rejected\. This is the default\. 5101 .RE 5102 .sp 5103 .RS 4 5104 .ie n \{\ 5105 \h'-04'\(bu\h'+03'\c 5106 .\} 5107 .el \{\ 5108 .sp -1 5109 .IP \(bu 2.3 5110 .\} 4156 5111 \fBBad User\fR 4157 - Means user logins with an invalid password are rejected, unless the username does not exist, in which case it is treated as a guest login and mapped into the 4158 guest account. 4159 .TP 3n 4160 \(bu 5112 \- Means user logins with an invalid password are rejected, unless the username does not exist, in which case it is treated as a guest login and mapped into the 5113 \fIguest account\fR\. 5114 .RE 5115 .sp 5116 .RS 4 5117 .ie n \{\ 5118 \h'-04'\(bu\h'+03'\c 5119 .\} 5120 .el \{\ 5121 .sp -1 5122 .IP \(bu 2.3 5123 .\} 4161 5124 \fBBad Password\fR 4162 - Means user logins with an invalid password are treated as a guest login and mapped into the4163 guest account. Note that this can cause problems as it means that any user incorrectly typing their password will be silently logged on as "guest" - and will not know the reason they cannot access files they think they should - there will have been no message given to them that they got their password wrong. Helpdesk services will4164 \f Bhate\fR5125 \- Means user logins with an invalid password are treated as a guest login and mapped into the 5126 \fIguest account\fR\. Note that this can cause problems as it means that any user incorrectly typing their password will be silently logged on as "guest" \- and will not know the reason they cannot access files they think they should \- there will have been no message given to them that they got their password wrong\. Helpdesk services will 5127 \fIhate\fR 4165 5128 you if you set the 4166 5129 \fImap to guest\fR 4167 parameter this way :-). 4168 .TP 3n 4169 \(bu 5130 parameter this way :\-)\. 5131 .RE 5132 .sp 5133 .RS 4 5134 .ie n \{\ 5135 \h'-04'\(bu\h'+03'\c 5136 .\} 5137 .el \{\ 5138 .sp -1 5139 .IP \(bu 2.3 5140 .\} 4170 5141 \fBBad Uid\fR 4171 - Is only applicable when Samba is configured in some type of domain mode security (security = {domain|ads}) and means that user logins which are successfully authenticated but which have no valid Unix user account (and smbd is unable to create one) should be mapped to the defined guest account. This was the default behavior of Samba 2.x releases. Note that if a member server is running winbindd, this option should never be required because the nss_winbind library will export the Windows domain users and groups to the underlying OS via the Name Service Switch interface.4172 . RE4173 . IP "" 3n5142 \- Is only applicable when Samba is configured in some type of domain mode security (security = {domain|ads}) and means that user logins which are successfully authenticated but which have no valid Unix user account (and smbd is unable to create one) should be mapped to the defined guest account\. This was the default behavior of Samba 2\.x releases\. Note that if a member server is running winbindd, this option should never be required because the nss_winbind library will export the Windows domain users and groups to the underlying OS via the Name Service Switch interface\. 5143 .sp 5144 .RE 4174 5145 Note that this parameter is needed to set up "Guest" share services when using 4175 5146 \fIsecurity\fR 4176 modes other than share and server . This is because in these modes the name of the resource being requested is4177 \f Bnot\fR4178 sent to the server until after the server has successfully authenticated the client so the server cannot make authentication decisions at the correct time (connection to the share) for "Guest" shares . This parameter is not useful with5147 modes other than share and server\. This is because in these modes the name of the resource being requested is 5148 \fInot\fR 5149 sent to the server until after the server has successfully authenticated the client so the server cannot make authentication decisions at the correct time (connection to the share) for "Guest" shares\. This parameter is not useful with 4179 5150 \fIsecurity = server\fR 4180 as in this security mode no information is returned about whether a user logon failed due to a bad username or bad password, the same error is returned from a modern server in both cases .4181 .sp 4182 For people familiar with the older Samba releases, this parameter maps to the old compile -time setting of the5151 as in this security mode no information is returned about whether a user logon failed due to a bad username or bad password, the same error is returned from a modern server in both cases\. 5152 .sp 5153 For people familiar with the older Samba releases, this parameter maps to the old compile\-time setting of the 4183 5154 \fB GUEST_SESSSETUP\fR 4184 value in local .h.4185 .sp 4186 Default: 4187 \f B\fImap to guest\fR = Never\fR4188 .sp 4189 Example: 4190 \f B\fImap to guest\fR = Bad User\fR4191 .RE 4192 .PP 5155 value in local\.h\. 5156 .sp 5157 Default: 5158 \fI\fImap to guest\fR\fR\fI = \fR\fINever\fR\fI \fR 5159 .sp 5160 Example: 5161 \fI\fImap to guest\fR\fR\fI = \fR\fIBad User\fR\fI \fR 5162 .RE 5163 4193 5164 max connections (S) 4194 .RS 3n 4195 This option allows the number of simultaneous connections to a service to be limited. If 5165 .PP 5166 .RS 4 5167 This option allows the number of simultaneous connections to a service to be limited\. If 4196 5168 \fImax connections\fR 4197 is greater than 0 then connections will be refused if this number of connections to the service are already open. A value of zero mean an unlimited number of connections may be made. 4198 .sp 4199 Record lock files are used to implement this feature. The lock files will be stored in the directory specified by the 4200 lock directory option. 4201 .sp 4202 Default: 4203 \fB\fImax connections\fR = 0 \fR 4204 .sp 4205 Example: 4206 \fB\fImax connections\fR = 10 \fR 4207 .RE 4208 .PP 5169 is greater than 0 then connections will be refused if this number of connections to the service are already open\. A value of zero mean an unlimited number of connections may be made\. 5170 .sp 5171 Record lock files are used to implement this feature\. The lock files will be stored in the directory specified by the 5172 \fIlock directory\fR 5173 option\. 5174 .sp 5175 Default: 5176 \fI\fImax connections\fR\fR\fI = \fR\fI0\fR\fI \fR 5177 .sp 5178 Example: 5179 \fI\fImax connections\fR\fR\fI = \fR\fI10\fR\fI \fR 5180 .RE 5181 4209 5182 max disk size (G) 4210 .RS 3n 4211 This option allows you to put an upper limit on the apparent size of disks. If you set this option to 100 then all shares will appear to be not larger than 100 MB in size. 4212 .sp 4213 Note that this option does not limit the amount of data you can put on the disk. In the above case you could still store much more than 100 MB on the disk, but if a client ever asks for the amount of free disk space or the total disk size then the result will be bounded by the amount specified in 4214 \fImax disk size\fR. 4215 .sp 4216 This option is primarily useful to work around bugs in some pieces of software that can't handle very large disks, particularly disks over 1GB in size. 5183 .PP 5184 .RS 4 5185 This option allows you to put an upper limit on the apparent size of disks\. If you set this option to 100 then all shares will appear to be not larger than 100 MB in size\. 5186 .sp 5187 Note that this option does not limit the amount of data you can put on the disk\. In the above case you could still store much more than 100 MB on the disk, but if a client ever asks for the amount of free disk space or the total disk size then the result will be bounded by the amount specified in 5188 \fImax disk size\fR\. 5189 .sp 5190 This option is primarily useful to work around bugs in some pieces of software that can\'t handle very large disks, particularly disks over 1GB in size\. 4217 5191 .sp 4218 5192 A 4219 5193 \fImax disk size\fR 4220 of 0 means no limit .4221 .sp 4222 Default: 4223 \f B\fImax disk size\fR = 0\fR4224 .sp 4225 Example: 4226 \f B\fImax disk size\fR = 1000\fR4227 .RE 4228 .PP 5194 of 0 means no limit\. 5195 .sp 5196 Default: 5197 \fI\fImax disk size\fR\fR\fI = \fR\fI0\fR\fI \fR 5198 .sp 5199 Example: 5200 \fI\fImax disk size\fR\fR\fI = \fR\fI1000\fR\fI \fR 5201 .RE 5202 4229 5203 max log size (G) 4230 .RS 3n 4231 This option (an integer in kilobytes) specifies the max size the log file should grow to. Samba periodically checks the size and if it is exceeded it will rename the file, adding a 4232 \fI.old\fR 4233 extension. 4234 .sp 4235 A size of 0 means no limit. 4236 .sp 4237 Default: 4238 \fB\fImax log size\fR = 5000 \fR 4239 .sp 4240 Example: 4241 \fB\fImax log size\fR = 1000 \fR 4242 .RE 4243 .PP 5204 .PP 5205 .RS 4 5206 This option (an integer in kilobytes) specifies the max size the log file should grow to\. Samba periodically checks the size and if it is exceeded it will rename the file, adding a 5207 \fI\.old\fR 5208 extension\. 5209 .sp 5210 A size of 0 means no limit\. 5211 .sp 5212 Default: 5213 \fI\fImax log size\fR\fR\fI = \fR\fI5000\fR\fI \fR 5214 .sp 5215 Example: 5216 \fI\fImax log size\fR\fR\fI = \fR\fI1000\fR\fI \fR 5217 .RE 5218 4244 5219 max mux (G) 4245 .RS 3n 4246 This option controls the maximum number of outstanding simultaneous SMB operations that Samba tells the client it will allow. You should never need to set this parameter. 4247 .sp 4248 Default: 4249 \fB\fImax mux\fR = 50 \fR 4250 .RE 4251 .PP 5220 .PP 5221 .RS 4 5222 This option controls the maximum number of outstanding simultaneous SMB operations that Samba tells the client it will allow\. You should never need to set this parameter\. 5223 .sp 5224 Default: 5225 \fI\fImax mux\fR\fR\fI = \fR\fI50\fR\fI \fR 5226 .RE 5227 4252 5228 max open files (G) 4253 .RS 3n 5229 .PP 5230 .RS 4 4254 5231 This parameter limits the maximum number of open files that one 4255 5232 \fBsmbd\fR(8) 4256 file serving process may have open for a client at any one time . The default for this parameter is set very high (10,000) as Samba uses only one bit per unopened file.4257 .sp 4258 The limit of the number of open files is usually set by the UNIX per -process file descriptor limit rather than this parameter so you should never need to touch this parameter.4259 .sp 4260 Default: 4261 \f B\fImax open files\fR = 10000\fR4262 .RE 4263 .PP 5233 file serving process may have open for a client at any one time\. The default for this parameter is set very high (10,000) as Samba uses only one bit per unopened file\. 5234 .sp 5235 The limit of the number of open files is usually set by the UNIX per\-process file descriptor limit rather than this parameter so you should never need to touch this parameter\. 5236 .sp 5237 Default: 5238 \fI\fImax open files\fR\fR\fI = \fR\fI10000\fR\fI \fR 5239 .RE 5240 4264 5241 max print jobs (S) 4265 .RS 3n 4266 This parameter limits the maximum number of jobs allowable in a Samba printer queue at any given moment. If this number is exceeded, 5242 .PP 5243 .RS 4 5244 This parameter limits the maximum number of jobs allowable in a Samba printer queue at any given moment\. If this number is exceeded, 4267 5245 \fBsmbd\fR(8) 4268 will remote "Out of Space" to the client .4269 .sp 4270 Default: 4271 \f B\fImax print jobs\fR = 1000\fR4272 .sp 4273 Example: 4274 \f B\fImax print jobs\fR = 5000\fR4275 .RE 4276 .PP4277 protocol 4278 .RS 3n 4279 This parameter is a synonym for max protocol.4280 .RE 4281 .PP 5246 will remote "Out of Space" to the client\. 5247 .sp 5248 Default: 5249 \fI\fImax print jobs\fR\fR\fI = \fR\fI1000\fR\fI \fR 5250 .sp 5251 Example: 5252 \fI\fImax print jobs\fR\fR\fI = \fR\fI5000\fR\fI \fR 5253 .RE 5254 protocol.PP 5255 .RS 4 5256 This parameter is a synonym for 5257 max protocol\. 5258 .RE 5259 4282 5260 max protocol (G) 4283 .RS 3n 4284 The value of the parameter (a string) is the highest protocol level that will be supported by the server. 5261 .PP 5262 .RS 4 5263 The value of the parameter (a string) is the highest protocol level that will be supported by the server\. 4285 5264 .sp 4286 5265 Possible values are : 4287 .RS 3n 4288 .TP 3n 4289 \(bu 4290 \fBCORE\fR: Earliest version. No concept of user names. 4291 .TP 3n 4292 \(bu 4293 \fBCOREPLUS\fR: Slight improvements on CORE for efficiency. 4294 .TP 3n 4295 \(bu 5266 .sp 5267 .RS 4 5268 .ie n \{\ 5269 \h'-04'\(bu\h'+03'\c 5270 .\} 5271 .el \{\ 5272 .sp -1 5273 .IP \(bu 2.3 5274 .\} 5275 \fBCORE\fR: Earliest version\. No concept of user names\. 5276 .RE 5277 .sp 5278 .RS 4 5279 .ie n \{\ 5280 \h'-04'\(bu\h'+03'\c 5281 .\} 5282 .el \{\ 5283 .sp -1 5284 .IP \(bu 2.3 5285 .\} 5286 \fBCOREPLUS\fR: Slight improvements on CORE for efficiency\. 5287 .RE 5288 .sp 5289 .RS 4 5290 .ie n \{\ 5291 \h'-04'\(bu\h'+03'\c 5292 .\} 5293 .el \{\ 5294 .sp -1 5295 .IP \(bu 2.3 5296 .\} 4296 5297 \fBLANMAN1\fR: First 4297 \fB modern\fR 4298 version of the protocol. Long filename support. 4299 .TP 3n 4300 \(bu 4301 \fBLANMAN2\fR: Updates to Lanman1 protocol. 4302 .TP 3n 4303 \(bu 4304 \fBNT1\fR: Current up to date version of the protocol. Used by Windows NT. Known as CIFS. 4305 .RE 4306 .IP "" 3n 4307 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol. 4308 .sp 4309 Default: 4310 \fB\fImax protocol\fR = NT1 \fR 4311 .sp 4312 Example: 4313 \fB\fImax protocol\fR = LANMAN1 \fR 4314 .RE 4315 .PP 5298 \fI modern\fR 5299 version of the protocol\. Long filename support\. 5300 .RE 5301 .sp 5302 .RS 4 5303 .ie n \{\ 5304 \h'-04'\(bu\h'+03'\c 5305 .\} 5306 .el \{\ 5307 .sp -1 5308 .IP \(bu 2.3 5309 .\} 5310 \fBLANMAN2\fR: Updates to Lanman1 protocol\. 5311 .RE 5312 .sp 5313 .RS 4 5314 .ie n \{\ 5315 \h'-04'\(bu\h'+03'\c 5316 .\} 5317 .el \{\ 5318 .sp -1 5319 .IP \(bu 2.3 5320 .\} 5321 \fBNT1\fR: Current up to date version of the protocol\. Used by Windows NT\. Known as CIFS\. 5322 .sp 5323 .RE 5324 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\. 5325 .sp 5326 Default: 5327 \fI\fImax protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR 5328 .sp 5329 Example: 5330 \fI\fImax protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR 5331 .RE 5332 4316 5333 max reported print jobs (S) 4317 .RS 3n 4318 This parameter limits the maximum number of jobs displayed in a port monitor for Samba printer queue at any given moment. If this number is exceeded, the excess jobs will not be shown. A value of zero means there is no limit on the number of print jobs reported. 4319 .sp 4320 Default: 4321 \fB\fImax reported print jobs\fR = 0 \fR 4322 .sp 4323 Example: 4324 \fB\fImax reported print jobs\fR = 1000 \fR 4325 .RE 4326 .PP 5334 .PP 5335 .RS 4 5336 This parameter limits the maximum number of jobs displayed in a port monitor for Samba printer queue at any given moment\. If this number is exceeded, the excess jobs will not be shown\. A value of zero means there is no limit on the number of print jobs reported\. 5337 .sp 5338 Default: 5339 \fI\fImax reported print jobs\fR\fR\fI = \fR\fI0\fR\fI \fR 5340 .sp 5341 Example: 5342 \fI\fImax reported print jobs\fR\fR\fI = \fR\fI1000\fR\fI \fR 5343 .RE 5344 4327 5345 max smbd processes (G) 4328 .RS 3n 5346 .PP 5347 .RS 4 4329 5348 This parameter limits the maximum number of 4330 5349 \fBsmbd\fR(8) 4331 processes concurrently running on a system and is intended as a stopgap to prevent degrading service to clients in the event that the server has insufficient resources to handle more than this number of connections . Remember that under normal operating conditions, each user will have an5350 processes concurrently running on a system and is intended as a stopgap to prevent degrading service to clients in the event that the server has insufficient resources to handle more than this number of connections\. Remember that under normal operating conditions, each user will have an 4332 5351 \fBsmbd\fR(8) 4333 associated with him or her to handle connections to all shares from a given host .4334 .sp 4335 Default: 4336 \f B\fImax smbd processes\fR = 0\fR4337 .sp 4338 Example: 4339 \f B\fImax smbd processes\fR = 1000\fR4340 .RE 4341 .PP 5352 associated with him or her to handle connections to all shares from a given host\. 5353 .sp 5354 Default: 5355 \fI\fImax smbd processes\fR\fR\fI = \fR\fI0\fR\fI \fR 5356 .sp 5357 Example: 5358 \fI\fImax smbd processes\fR\fR\fI = \fR\fI1000\fR\fI \fR 5359 .RE 5360 4342 5361 max stat cache size (G) 4343 .RS 3n 5362 .PP 5363 .RS 4 4344 5364 This parameter limits the size in memory of any 4345 5365 \fIstat cache\fR 4346 being used to speed up case insensitive name mappings . This parameter is the number of kilobyte (1024) units the stat cache can use. A value of zero means unlimited which is not advised aѕ it can use a lot of memory. You should not need to change this parameter.4347 .sp 4348 Default: 4349 \f B\fImax stat cache size\fR = 1024\fR4350 .sp 4351 Example: 4352 \f B\fImax stat cache size\fR = 100\fR4353 .RE 4354 .PP 5366 being used to speed up case insensitive name mappings\. It represents the number of kilobyte (1024) units the stat cache can use\. A value of zero, meaning unlimited, is not advisable due to increased memory useage\. You should not need to change this parameter\. 5367 .sp 5368 Default: 5369 \fI\fImax stat cache size\fR\fR\fI = \fR\fI256\fR\fI \fR 5370 .sp 5371 Example: 5372 \fI\fImax stat cache size\fR\fR\fI = \fR\fI100\fR\fI \fR 5373 .RE 5374 4355 5375 max ttl (G) 4356 .RS 3n 5376 .PP 5377 .RS 4 4357 5378 This option tells 4358 5379 \fBnmbd\fR(8) 4359 what the default 'time to live' of NetBIOS names should be (in seconds) when5380 what the default \'time to live\' of NetBIOS names should be (in seconds) when 4360 5381 nmbd 4361 is requesting a name using either a broadcast packet or from a WINS server . You should never need to change this parameter. The default is 3 days.4362 .sp 4363 Default: 4364 \f B\fImax ttl\fR = 259200\fR4365 .RE 4366 .PP 5382 is requesting a name using either a broadcast packet or from a WINS server\. You should never need to change this parameter\. The default is 3 days\. 5383 .sp 5384 Default: 5385 \fI\fImax ttl\fR\fR\fI = \fR\fI259200\fR\fI \fR 5386 .RE 5387 4367 5388 max wins ttl (G) 4368 .RS 3n 5389 .PP 5390 .RS 4 4369 5391 This option tells 4370 5392 \fBsmbd\fR(8) 4371 when acting as a WINS server ( wins support = yes) what the maximum 'time to live' of NetBIOS names that5393 when acting as a WINS server (\fIwins support = yes\fR) what the maximum \'time to live\' of NetBIOS names that 4372 5394 nmbd 4373 will grant will be (in seconds) . You should never need to change this parameter. The default is 6 days (518400 seconds).4374 .sp 4375 Default: 4376 \f B\fImax wins ttl\fR = 518400\fR4377 .RE 4378 .PP 5395 will grant will be (in seconds)\. You should never need to change this parameter\. The default is 6 days (518400 seconds)\. 5396 .sp 5397 Default: 5398 \fI\fImax wins ttl\fR\fR\fI = \fR\fI518400\fR\fI \fR 5399 .RE 5400 4379 5401 max xmit (G) 4380 .RS 3n 4381 This option controls the maximum packet size that will be negotiated by Samba. The default is 16644, which matches the behavior of Windows 2000. A value below 2048 is likely to cause problems. You should never need to change this parameter from its default value. 4382 .sp 4383 Default: 4384 \fB\fImax xmit\fR = 16644 \fR 4385 .sp 4386 Example: 4387 \fB\fImax xmit\fR = 8192 \fR 4388 .RE 4389 .PP 5402 .PP 5403 .RS 4 5404 This option controls the maximum packet size that will be negotiated by Samba\. The default is 16644, which matches the behavior of Windows 2000\. A value below 2048 is likely to cause problems\. You should never need to change this parameter from its default value\. 5405 .sp 5406 Default: 5407 \fI\fImax xmit\fR\fR\fI = \fR\fI16644\fR\fI \fR 5408 .sp 5409 Example: 5410 \fI\fImax xmit\fR\fR\fI = \fR\fI8192\fR\fI \fR 5411 .RE 5412 4390 5413 message command (G) 4391 .RS 3n 4392 This specifies what command to run when the server receives a WinPopup style message. 4393 .sp 4394 This would normally be a command that would deliver the message somehow. How this is to be done is up to your imagination. 5414 .PP 5415 .RS 4 5416 This specifies what command to run when the server receives a WinPopup style message\. 5417 .sp 5418 This would normally be a command that would deliver the message somehow\. How this is to be done is up to your imagination\. 4395 5419 .sp 4396 5420 An example is: 4397 4398 .sp 4399 5421 .sp 5422 .RS 4 4400 5423 .nf 4401 4402 message command = csh -c 'xedit %s;rm %s' & 4403 5424 message command = csh \-c \'xedit %s;rm %s\' & 4404 5425 .fi 4405 5426 .RE 5427 .sp 4406 5428 .sp 4407 5429 This delivers the message using 4408 xedit, then removes it afterwards .4409 \f BNOTE THAT IT IS VERY IMPORTANT THAT THIS COMMAND RETURN IMMEDIATELY\fR. That's why I have the '&' on the end. If it doesn't return immediately then your PCs may freeze when sending messages (they should recover after 30 seconds, hopefully).4410 .sp 4411 All messages are delivered as the global guest user . The command takes the standard substitutions, although5430 xedit, then removes it afterwards\. 5431 \fINOTE THAT IT IS VERY IMPORTANT THAT THIS COMMAND RETURN IMMEDIATELY\fR\. That\'s why I have the \'&\' on the end\. If it doesn\'t return immediately then your PCs may freeze when sending messages (they should recover after 30 seconds, hopefully)\. 5432 .sp 5433 All messages are delivered as the global guest user\. The command takes the standard substitutions, although 4412 5434 \fI %u\fR 4413 won't work (\fI%U\fR 4414 may be better in this case). 4415 .sp 4416 Apart from the standard substitutions, some additional ones apply. In particular: 4417 .RS 3n 4418 .TP 3n 4419 \(bu 5435 won\'t work (\fI%U\fR 5436 may be better in this case)\. 5437 .sp 5438 Apart from the standard substitutions, some additional ones apply\. In particular: 5439 .sp 5440 .RS 4 5441 .ie n \{\ 5442 \h'-04'\(bu\h'+03'\c 5443 .\} 5444 .el \{\ 5445 .sp -1 5446 .IP \(bu 2.3 5447 .\} 4420 5448 \fI%s\fR 4421 = the filename containing the message. 4422 .TP 3n 4423 \(bu 5449 = the filename containing the message\. 5450 .RE 5451 .sp 5452 .RS 4 5453 .ie n \{\ 5454 \h'-04'\(bu\h'+03'\c 5455 .\} 5456 .el \{\ 5457 .sp -1 5458 .IP \(bu 2.3 5459 .\} 4424 5460 \fI%t\fR 4425 = the destination that the message was sent to (probably the server name). 4426 .TP 3n 4427 \(bu 5461 = the destination that the message was sent to (probably the server name)\. 5462 .RE 5463 .sp 5464 .RS 4 5465 .ie n \{\ 5466 \h'-04'\(bu\h'+03'\c 5467 .\} 5468 .el \{\ 5469 .sp -1 5470 .IP \(bu 2.3 5471 .\} 4428 5472 \fI%f\fR 4429 = who the message is from. 4430 .RE 4431 .IP "" 3n 4432 You could make this command send mail, or whatever else takes your fancy. Please let us know of any really interesting ideas you have. 4433 .sp 4434 Here's a way of sending the messages as mail to root: 4435 4436 .sp 4437 5473 = who the message is from\. 5474 .sp 5475 .RE 5476 You could make this command send mail, or whatever else takes your fancy\. Please let us know of any really interesting ideas you have\. 5477 .sp 5478 Here\'s a way of sending the messages as mail to root: 5479 .sp 5480 .RS 4 4438 5481 .nf 4439 4440 message command = /bin/mail -s 'message from %f on %m' root < %s; rm %s 4441 5482 message command = /bin/mail \-s \'message from %f on %m\' root < %s; rm %s 4442 5483 .fi 4443 4444 .sp 4445 If you don't have a message command then the message won't be delivered and Samba will tell the sender there was an error. Unfortunately WfWg totally ignores the error code and carries on regardless, saying that the message was delivered. 5484 .RE 5485 .sp 5486 .sp 5487 If you don\'t have a message command then the message won\'t be delivered and Samba will tell the sender there was an error\. Unfortunately WfWg totally ignores the error code and carries on regardless, saying that the message was delivered\. 4446 5488 .sp 4447 5489 If you want to silently delete it then try: 4448 4449 .sp 4450 5490 .sp 5491 .RS 4 4451 5492 .nf 4452 4453 5493 message command = rm %s 4454 4455 5494 .fi 4456 4457 .sp 4458 Default: 4459 \fB\fImessage command\fR = \fR 4460 .sp 4461 Example: 4462 \fB\fImessage command\fR = csh -c 'xedit %s; rm %s' & \fR 4463 .RE 4464 .PP 5495 .RE 5496 .sp 5497 .sp 5498 Default: 5499 \fI\fImessage command\fR\fR\fI = \fR\fI\fR\fI \fR 5500 .sp 5501 Example: 5502 \fI\fImessage command\fR\fR\fI = \fR\fIcsh \-c \'xedit %s; rm %s\' &\fR\fI \fR 5503 .RE 5504 4465 5505 min print space (S) 4466 .RS 3n 4467 This sets the minimum amount of free disk space that must be available before a user will be able to spool a print job. It is specified in kilobytes. The default is 0, which means a user can always spool a print job. 4468 .sp 4469 Default: 4470 \fB\fImin print space\fR = 0 \fR 4471 .sp 4472 Example: 4473 \fB\fImin print space\fR = 2000 \fR 4474 .RE 4475 .PP 5506 .PP 5507 .RS 4 5508 This sets the minimum amount of free disk space that must be available before a user will be able to spool a print job\. It is specified in kilobytes\. The default is 0, which means a user can always spool a print job\. 5509 .sp 5510 Default: 5511 \fI\fImin print space\fR\fR\fI = \fR\fI0\fR\fI \fR 5512 .sp 5513 Example: 5514 \fI\fImin print space\fR\fR\fI = \fR\fI2000\fR\fI \fR 5515 .RE 5516 4476 5517 min protocol (G) 4477 .RS 3n 4478 The value of the parameter (a string) is the lowest SMB protocol dialect than Samba will support. Please refer to the 4479 max protocol parameter for a list of valid protocol names and a brief description of each. You may also wish to refer to the C source code in 4480 \fIsource/smbd/negprot.c\fR 4481 for a listing of known protocol dialects supported by clients. 5518 .PP 5519 .RS 4 5520 The value of the parameter (a string) is the lowest SMB protocol dialect than Samba will support\. Please refer to the 5521 \fImax protocol\fR 5522 parameter for a list of valid protocol names and a brief description of each\. You may also wish to refer to the C source code in 5523 \fIsource/smbd/negprot\.c\fR 5524 for a listing of known protocol dialects supported by clients\. 4482 5525 .sp 4483 5526 If you are viewing this parameter as a security measure, you should also refer to the 4484 lanman auth parameter. Otherwise, you should never need to change this parameter. 4485 .sp 4486 Default: 4487 \fB\fImin protocol\fR = CORE \fR 4488 .sp 4489 Example: 4490 \fB\fImin protocol\fR = NT1 \fR 4491 .RE 4492 .PP 5527 \fIlanman auth\fR 5528 parameter\. Otherwise, you should never need to change this parameter\. 5529 .sp 5530 Default: 5531 \fI\fImin protocol\fR\fR\fI = \fR\fICORE\fR\fI \fR 5532 .sp 5533 Example: 5534 \fI\fImin protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR 5535 .RE 5536 4493 5537 min wins ttl (G) 4494 .RS 3n 5538 .PP 5539 .RS 4 4495 5540 This option tells 4496 5541 \fBnmbd\fR(8) 4497 when acting as a WINS server ( wins support = yes) what the minimum 'time to live' of NetBIOS names that5542 when acting as a WINS server (\fIwins support = yes\fR) what the minimum \'time to live\' of NetBIOS names that 4498 5543 nmbd 4499 will grant will be (in seconds) . You should never need to change this parameter. The default is 6 hours (21600 seconds).4500 .sp 4501 Default: 4502 \f B\fImin wins ttl\fR = 21600\fR4503 .RE 4504 .PP 5544 will grant will be (in seconds)\. You should never need to change this parameter\. The default is 6 hours (21600 seconds)\. 5545 .sp 5546 Default: 5547 \fI\fImin wins ttl\fR\fR\fI = \fR\fI21600\fR\fI \fR 5548 .RE 5549 4505 5550 msdfs proxy (S) 4506 .RS 3n 4507 This parameter indicates that the share is a stand-in for another CIFS share whose location is specified by the value of the parameter. When clients attempt to connect to this share, they are redirected to the proxied share using the SMB-Dfs protocol. 4508 .sp 4509 Only Dfs roots can act as proxy shares. Take a look at the 4510 msdfs root and 4511 host msdfs options to find out how to set up a Dfs root share. 4512 .sp 4513 \fBNo default\fR 4514 .sp 4515 Example: 4516 \fB\fImsdfs proxy\fR = \\\\otherserver\\someshare \fR 4517 .RE 4518 .PP 5551 .PP 5552 .RS 4 5553 This parameter indicates that the share is a stand\-in for another CIFS share whose location is specified by the value of the parameter\. When clients attempt to connect to this share, they are redirected to the proxied share using the SMB\-Dfs protocol\. 5554 .sp 5555 Only Dfs roots can act as proxy shares\. Take a look at the 5556 \fImsdfs root\fR 5557 and 5558 \fIhost msdfs\fR 5559 options to find out how to set up a Dfs root share\. 5560 .sp 5561 \fINo default\fR 5562 .sp 5563 Example: 5564 \fI\fImsdfs proxy\fR\fR\fI = \fR\fI\eotherserver\esomeshare\fR\fI \fR 5565 .RE 5566 4519 5567 msdfs root (S) 4520 .RS 3n 5568 .PP 5569 .RS 4 4521 5570 If set to 4522 \fByes\fR, Samba treats the share as a Dfs root and allows clients to browse the distributed file system tree rooted at the share directory . Dfs links are specified in the share directory by symbolic links of the form4523 \fImsdfs:serverA\ \shareA,serverB\\shareB\fR4524 and so on . For more information on setting up a Dfs tree on Samba, refer to the MSDFS chapter in the Samba3-HOWTO book.4525 .sp 4526 Default: 4527 \f B\fImsdfs root\fR = no\fR4528 .RE 4529 .PP 5571 \fByes\fR, Samba treats the share as a Dfs root and allows clients to browse the distributed file system tree rooted at the share directory\. Dfs links are specified in the share directory by symbolic links of the form 5572 \fImsdfs:serverA\e\eshareA,serverB\e\eshareB\fR 5573 and so on\. For more information on setting up a Dfs tree on Samba, refer to the MSDFS chapter in the Samba3\-HOWTO book\. 5574 .sp 5575 Default: 5576 \fI\fImsdfs root\fR\fR\fI = \fR\fIno\fR\fI \fR 5577 .RE 5578 4530 5579 name cache timeout (G) 4531 .RS 3n 4532 Specifies the number of seconds it takes before entries in samba's hostname resolve cache time out. If the timeout is set to 0. the caching is disabled. 4533 .sp 4534 Default: 4535 \fB\fIname cache timeout\fR = 660 \fR 4536 .sp 4537 Example: 4538 \fB\fIname cache timeout\fR = 0 \fR 4539 .RE 4540 .PP 5580 .PP 5581 .RS 4 5582 Specifies the number of seconds it takes before entries in samba\'s hostname resolve cache time out\. If the timeout is set to 0\. the caching is disabled\. 5583 .sp 5584 Default: 5585 \fI\fIname cache timeout\fR\fR\fI = \fR\fI660\fR\fI \fR 5586 .sp 5587 Example: 5588 \fI\fIname cache timeout\fR\fR\fI = \fR\fI0\fR\fI \fR 5589 .RE 5590 4541 5591 name resolve order (G) 4542 .RS 3n 4543 This option is used by the programs in the Samba suite to determine what naming services to use and in what order to resolve host names to IP addresses. Its main purpose to is to control how netbios name resolution is performed. The option takes a space separated string of name resolution options. 4544 .sp 4545 The options are: "lmhosts", "host", "wins" and "bcast". They cause names to be resolved as follows: 4546 .RS 3n 4547 .TP 3n 4548 \(bu 5592 .PP 5593 .RS 4 5594 This option is used by the programs in the Samba suite to determine what naming services to use and in what order to resolve host names to IP addresses\. Its main purpose to is to control how netbios name resolution is performed\. The option takes a space separated string of name resolution options\. 5595 .sp 5596 The options are: "lmhosts", "host", "wins" and "bcast"\. They cause names to be resolved as follows: 5597 .sp 5598 .RS 4 5599 .ie n \{\ 5600 \h'-04'\(bu\h'+03'\c 5601 .\} 5602 .el \{\ 5603 .sp -1 5604 .IP \(bu 2.3 5605 .\} 4549 5606 4550 5607 \fBlmhosts\fR 4551 : Lookup an IP address in the Samba lmhosts file. If the line in lmhosts has no name type attached to the NetBIOS name (see the manpage for lmhosts for details) then any name type matches for lookup. 4552 .TP 3n 4553 \(bu 5608 : Lookup an IP address in the Samba lmhosts file\. If the line in lmhosts has no name type attached to the NetBIOS name (see the manpage for lmhosts for details) then any name type matches for lookup\. 5609 .RE 5610 .sp 5611 .RS 4 5612 .ie n \{\ 5613 \h'-04'\(bu\h'+03'\c 5614 .\} 5615 .el \{\ 5616 .sp -1 5617 .IP \(bu 2.3 5618 .\} 4554 5619 4555 5620 \fBhost\fR 4556 5621 : Do a standard host name to IP address resolution, using the system 4557 \fI/etc/hosts \fR, NIS, or DNS lookups. This method of name resolution is operating system depended for instance on IRIX or Solaris this may be controlled by the 4558 \fI/etc/nsswitch.conf\fR 4559 file. Note that this method is used only if the NetBIOS name type being queried is the 0x20 (server) name type or 0x1c (domain controllers). The latter case is only useful for active directory domains and results in a DNS query for the SRV RR entry matching _ldap._tcp.domain. 4560 .TP 3n 4561 \(bu 5622 \fI/etc/hosts \fR, NIS, or DNS lookups\. This method of name resolution is operating system depended for instance on IRIX or Solaris this may be controlled by the 5623 \fI/etc/nsswitch\.conf\fR 5624 file\. Note that this method is used only if the NetBIOS name type being queried is the 0x20 (server) name type or 0x1c (domain controllers)\. The latter case is only useful for active directory domains and results in a DNS query for the SRV RR entry matching _ldap\._tcp\.domain\. 5625 .RE 5626 .sp 5627 .RS 4 5628 .ie n \{\ 5629 \h'-04'\(bu\h'+03'\c 5630 .\} 5631 .el \{\ 5632 .sp -1 5633 .IP \(bu 2.3 5634 .\} 4562 5635 \fBwins\fR 4563 5636 : Query a name with the IP address listed in the 4564 WINSSERVER parameter. If no WINS server has been specified this method will be ignored. 4565 .TP 3n 4566 \(bu 5637 \fIWINSSERVER\fR 5638 parameter\. If no WINS server has been specified this method will be ignored\. 5639 .RE 5640 .sp 5641 .RS 4 5642 .ie n \{\ 5643 \h'-04'\(bu\h'+03'\c 5644 .\} 5645 .el \{\ 5646 .sp -1 5647 .IP \(bu 2.3 5648 .\} 4567 5649 \fBbcast\fR 4568 5650 : Do a broadcast on each of the known local interfaces listed in the 4569 interfaces parameter. This is the least reliable of the name resolution methods as it depends on the target host being on a locally connected subnet. 4570 .RE 4571 .IP "" 3n 4572 The example below will cause the local lmhosts file to be examined first, followed by a broadcast attempt, followed by a normal system hostname lookup. 5651 \fIinterfaces\fR 5652 parameter\. This is the least reliable of the name resolution methods as it depends on the target host being on a locally connected subnet\. 5653 .sp 5654 .RE 5655 The example below will cause the local lmhosts file to be examined first, followed by a broadcast attempt, followed by a normal system hostname lookup\. 4573 5656 .sp 4574 5657 When Samba is functioning in ADS security mode (security = ads) it is advised to use following settings for … … 4577 5660 name resolve order = wins bcast 4578 5661 .sp 4579 DC lookups will still be done via DNS, but fallbacks to netbios names will not inundate your DNS servers with needless querys for DOMAIN<0x1c> lookups .4580 .sp 4581 Default: 4582 \f B\fIname resolve order\fR = lmhosts host wins bcast\fR4583 .sp 4584 Example: 4585 \f B\fIname resolve order\fR = lmhosts bcast host\fR4586 .RE 4587 .PP 5662 DC lookups will still be done via DNS, but fallbacks to netbios names will not inundate your DNS servers with needless querys for DOMAIN<0x1c> lookups\. 5663 .sp 5664 Default: 5665 \fI\fIname resolve order\fR\fR\fI = \fR\fIlmhosts host wins bcast\fR\fI \fR 5666 .sp 5667 Example: 5668 \fI\fIname resolve order\fR\fR\fI = \fR\fIlmhosts bcast host\fR\fI \fR 5669 .RE 5670 4588 5671 netbios aliases (G) 4589 .RS 3n 4590 This is a list of NetBIOS names that nmbd will advertise as additional names by which the Samba server is known. This allows one machine to appear in browse lists under multiple names. If a machine is acting as a browse server or logon server none of these names will be advertised as either browse server or logon servers, only the primary name of the machine will be advertised with these capabilities. 4591 .sp 4592 Default: 4593 \fB\fInetbios aliases\fR = # empty string (no additional names) \fR 4594 .sp 4595 Example: 4596 \fB\fInetbios aliases\fR = TEST TEST1 TEST2 \fR 4597 .RE 4598 .PP 5672 .PP 5673 .RS 4 5674 This is a list of NetBIOS names that nmbd will advertise as additional names by which the Samba server is known\. This allows one machine to appear in browse lists under multiple names\. If a machine is acting as a browse server or logon server none of these names will be advertised as either browse server or logon servers, only the primary name of the machine will be advertised with these capabilities\. 5675 .sp 5676 Default: 5677 \fI\fInetbios aliases\fR\fR\fI = \fR\fI # empty string (no additional names)\fR\fI \fR 5678 .sp 5679 Example: 5680 \fI\fInetbios aliases\fR\fR\fI = \fR\fITEST TEST1 TEST2\fR\fI \fR 5681 .RE 5682 4599 5683 netbios name (G) 4600 .RS 3n 4601 This sets the NetBIOS name by which a Samba server is known. By default it is the same as the first component of the host's DNS name. If a machine is a browse server or logon server this name (or the first component of the hosts DNS name) will be the name that these services are advertised under. 4602 .sp 4603 There is a bug in Samba-3 that breaks operation of browsing and access to shares if the netbios name is set to the literal name 4604 PIPE. To avoid this problem, do not name your Samba-3 server 4605 PIPE. 4606 .sp 4607 Default: 4608 \fB\fInetbios name\fR = # machine DNS name \fR 4609 .sp 4610 Example: 4611 \fB\fInetbios name\fR = MYNAME \fR 4612 .RE 4613 .PP 5684 .PP 5685 .RS 4 5686 This sets the NetBIOS name by which a Samba server is known\. By default it is the same as the first component of the host\'s DNS name\. If a machine is a browse server or logon server this name (or the first component of the hosts DNS name) will be the name that these services are advertised under\. 5687 .sp 5688 There is a bug in Samba\-3 that breaks operation of browsing and access to shares if the netbios name is set to the literal name 5689 PIPE\. To avoid this problem, do not name your Samba\-3 server 5690 PIPE\. 5691 .sp 5692 Default: 5693 \fI\fInetbios name\fR\fR\fI = \fR\fI # machine DNS name\fR\fI \fR 5694 .sp 5695 Example: 5696 \fI\fInetbios name\fR\fR\fI = \fR\fIMYNAME\fR\fI \fR 5697 .RE 5698 4614 5699 netbios scope (G) 4615 .RS 3n 4616 This sets the NetBIOS scope that Samba will operate under. This should not be set unless every machine on your LAN also sets this value. 4617 .sp 4618 Default: 4619 \fB\fInetbios scope\fR = \fR 4620 .RE 4621 .PP 5700 .PP 5701 .RS 4 5702 This sets the NetBIOS scope that Samba will operate under\. This should not be set unless every machine on your LAN also sets this value\. 5703 .sp 5704 Default: 5705 \fI\fInetbios scope\fR\fR\fI = \fR\fI\fR\fI \fR 5706 .RE 5707 4622 5708 nis homedir (G) 4623 .RS 3n 4624 Get the home share server from a NIS map. For UNIX systems that use an automounter, the user's home directory will often be mounted on a workstation on demand from a remote server. 4625 .sp 4626 When the Samba logon server is not the actual home directory server, but is mounting the home directories via NFS then two network hops would be required to access the users home directory if the logon server told the client to use itself as the SMB server for home directories (one over SMB and one over NFS). This can be very slow. 4627 .sp 4628 This option allows Samba to return the home share as being on a different server to the logon server and as long as a Samba daemon is running on the home directory server, it will be mounted on the Samba client directly from the directory server. When Samba is returning the home share to the client, it will consult the NIS map specified in 4629 homedir map and return the server listed there. 4630 .sp 4631 Note that for this option to work there must be a working NIS system and the Samba server with this option must also be a logon server. 4632 .sp 4633 Default: 4634 \fB\fInis homedir\fR = no \fR 4635 .RE 4636 .PP 5709 .PP 5710 .RS 4 5711 Get the home share server from a NIS map\. For UNIX systems that use an automounter, the user\'s home directory will often be mounted on a workstation on demand from a remote server\. 5712 .sp 5713 When the Samba logon server is not the actual home directory server, but is mounting the home directories via NFS then two network hops would be required to access the users home directory if the logon server told the client to use itself as the SMB server for home directories (one over SMB and one over NFS)\. This can be very slow\. 5714 .sp 5715 This option allows Samba to return the home share as being on a different server to the logon server and as long as a Samba daemon is running on the home directory server, it will be mounted on the Samba client directly from the directory server\. When Samba is returning the home share to the client, it will consult the NIS map specified in 5716 \fIhomedir map\fR 5717 and return the server listed there\. 5718 .sp 5719 Note that for this option to work there must be a working NIS system and the Samba server with this option must also be a logon server\. 5720 .sp 5721 Default: 5722 \fI\fInis homedir\fR\fR\fI = \fR\fIno\fR\fI \fR 5723 .RE 5724 4637 5725 nt acl support (S) 4638 .RS 3n 5726 .PP 5727 .RS 4 4639 5728 This boolean parameter controls whether 4640 5729 \fBsmbd\fR(8) 4641 will attempt to map UNIX permissions into Windows NT access control lists . The UNIX permissions considered are the the traditional UNIX owner and group permissions, as well as POSIX ACLs set on any files or directories. This parameter was formally a global parameter in releases prior to 2.2.2.4642 .sp 4643 Default: 4644 \f B\fInt acl support\fR = yes\fR4645 .RE 4646 .PP 5730 will attempt to map UNIX permissions into Windows NT access control lists\. The UNIX permissions considered are the the traditional UNIX owner and group permissions, as well as POSIX ACLs set on any files or directories\. This parameter was formally a global parameter in releases prior to 2\.2\.2\. 5731 .sp 5732 Default: 5733 \fI\fInt acl support\fR\fR\fI = \fR\fIyes\fR\fI \fR 5734 .RE 5735 4647 5736 ntlm auth (G) 4648 .RS 3n 5737 .PP 5738 .RS 4 4649 5739 This parameter determines whether or not 4650 5740 \fBsmbd\fR(8) 4651 will attempt to authenticate users using the NTLM encrypted password response . If disabled, either the lanman password hash or an NTLMv2 response will need to be sent by the client.5741 will attempt to authenticate users using the NTLM encrypted password response\. If disabled, either the lanman password hash or an NTLMv2 response will need to be sent by the client\. 4652 5742 .sp 4653 5743 If this option, and 4654 5744 lanman auth 4655 are both disabled, then only NTLMv2 logins will be permited . Not all clients support NTLMv2, and most will require special configuration to us it.4656 .sp 4657 Default: 4658 \f B\fIntlm auth\fR = yes\fR4659 .RE 4660 .PP 5745 are both disabled, then only NTLMv2 logins will be permited\. Not all clients support NTLMv2, and most will require special configuration to us it\. 5746 .sp 5747 Default: 5748 \fI\fIntlm auth\fR\fR\fI = \fR\fIyes\fR\fI \fR 5749 .RE 5750 4661 5751 nt pipe support (G) 4662 .RS 3n 5752 .PP 5753 .RS 4 4663 5754 This boolean parameter controls whether 4664 5755 \fBsmbd\fR(8) 4665 5756 will allow Windows NT clients to connect to the NT SMB specific 4666 5757 \fBIPC$\fR 4667 pipes . This is a developer debugging option and can be left alone.4668 .sp 4669 Default: 4670 \f B\fInt pipe support\fR = yes\fR4671 .RE 4672 .PP 5758 pipes\. This is a developer debugging option and can be left alone\. 5759 .sp 5760 Default: 5761 \fI\fInt pipe support\fR\fR\fI = \fR\fIyes\fR\fI \fR 5762 .RE 5763 4673 5764 nt status support (G) 4674 .RS 3n 5765 .PP 5766 .RS 4 4675 5767 This boolean parameter controls whether 4676 5768 \fBsmbd\fR(8) 4677 will negotiate NT specific status support with Windows NT/2k/XP clients . This is a developer debugging option and should be left alone. If this option is set to5769 will negotiate NT specific status support with Windows NT/2k/XP clients\. This is a developer debugging option and should be left alone\. If this option is set to 4678 5770 \fBno\fR 4679 then Samba offers exactly the same DOS error codes that versions prior to Samba 2 .2.3 reported.4680 .sp 4681 You should not need to ever disable this parameter .4682 .sp 4683 Default: 4684 \f B\fInt status support\fR = yes\fR4685 .RE 4686 .PP 5771 then Samba offers exactly the same DOS error codes that versions prior to Samba 2\.2\.3 reported\. 5772 .sp 5773 You should not need to ever disable this parameter\. 5774 .sp 5775 Default: 5776 \fI\fInt status support\fR\fR\fI = \fR\fIyes\fR\fI \fR 5777 .RE 5778 4687 5779 null passwords (G) 4688 .RS 3n 4689 Allow or disallow client access to accounts that have null passwords. 5780 .PP 5781 .RS 4 5782 Allow or disallow client access to accounts that have null passwords\. 4690 5783 .sp 4691 5784 See also 4692 \fBsmbpasswd\fR(5) .4693 .sp 4694 Default: 4695 \f B\fInull passwords\fR = no\fR4696 .RE 4697 .PP 5785 \fBsmbpasswd\fR(5)\. 5786 .sp 5787 Default: 5788 \fI\fInull passwords\fR\fR\fI = \fR\fIno\fR\fI \fR 5789 .RE 5790 4698 5791 obey pam restrictions (G) 4699 .RS 3n 4700 When Samba 3.0 is configured to enable PAM support (i.e. --with-pam), this parameter will control whether or not Samba should obey PAM's account and session management directives. The default behavior is to use PAM for clear text authentication only and to ignore any account or session management. Note that Samba always ignores PAM for authentication in the case of 4701 encrypt passwords = yes. The reason is that PAM modules cannot support the challenge/response authentication mechanism needed in the presence of SMB password encryption. 4702 .sp 4703 Default: 4704 \fB\fIobey pam restrictions\fR = no \fR 4705 .RE 4706 .PP 5792 .PP 5793 .RS 4 5794 When Samba 3\.0 is configured to enable PAM support (i\.e\. \-\-with\-pam), this parameter will control whether or not Samba should obey PAM\'s account and session management directives\. The default behavior is to use PAM for clear text authentication only and to ignore any account or session management\. Note that Samba always ignores PAM for authentication in the case of 5795 \fIencrypt passwords = yes\fR\. The reason is that PAM modules cannot support the challenge/response authentication mechanism needed in the presence of SMB password encryption\. 5796 .sp 5797 Default: 5798 \fI\fIobey pam restrictions\fR\fR\fI = \fR\fIno\fR\fI \fR 5799 .RE 5800 4707 5801 only user (S) 4708 .RS 3n 5802 .PP 5803 .RS 4 4709 5804 This is a boolean option that controls whether connections with usernames not in the 4710 5805 \fIuser\fR 4711 list will be allowed . By default this option is disabled so that a client can supply a username to be used by the server. Enabling this parameter will force the server to only use the login names from the5806 list will be allowed\. By default this option is disabled so that a client can supply a username to be used by the server\. Enabling this parameter will force the server to only use the login names from the 4712 5807 \fIuser\fR 4713 5808 list and is only really useful in 4714 security = share level security. 4715 .sp 4716 Note that this also means Samba won't try to deduce usernames from the service name. This can be annoying for the [homes] section. To get around this you could use 5809 \fIsecurity = share\fR 5810 level security\. 5811 .sp 5812 Note that this also means Samba won\'t try to deduce usernames from the service name\. This can be annoying for the [homes] section\. To get around this you could use 4717 5813 user = %S 4718 5814 which means your 4719 5815 \fIuser\fR 4720 list will be just the service name, which for home directories is the name of the user .4721 .sp 4722 Default: 4723 \f B\fIonly user\fR = no\fR4724 .RE 4725 .PP 5816 list will be just the service name, which for home directories is the name of the user\. 5817 .sp 5818 Default: 5819 \fI\fIonly user\fR\fR\fI = \fR\fIno\fR\fI \fR 5820 .RE 5821 4726 5822 open files database hash size (G) 4727 .RS 3n 4728 This parameter was added in Samba 3.0.23. This is an internal tuning parameter that sets the hash size of the tdb used for the open file databases. The presence of this parameter allows tuning of the system for very large (thousands of concurrent users) Samba setups. The default setting of this parameter should be sufficient for most normal environments. It is advised not to change this parameter unless advised to by a Samba Team member. 4729 .sp 4730 Default: 4731 \fB\fIopen files database hash size\fR = 10007 \fR 4732 .sp 4733 Example: 4734 \fB\fIopen files database hash size\fR = 1338457 \fR 4735 .RE 4736 .PP 5823 .PP 5824 .RS 4 5825 This parameter was added in Samba 3\.0\.23\. This is an internal tuning parameter that sets the hash size of the tdb used for the open file databases\. The presence of this parameter allows tuning of the system for very large (thousands of concurrent users) Samba setups\. The default setting of this parameter should be sufficient for most normal environments\. It is advised not to change this parameter unless advised to by a Samba Team member\. 5826 .sp 5827 Default: 5828 \fI\fIopen files database hash size\fR\fR\fI = \fR\fI10007\fR\fI \fR 5829 .sp 5830 Example: 5831 \fI\fIopen files database hash size\fR\fR\fI = \fR\fI1338457\fR\fI \fR 5832 .RE 5833 4737 5834 oplock break wait time (G) 4738 .RS 3n 4739 This is a tuning parameter added due to bugs in both Windows 9x and WinNT. If Samba responds to a client too quickly when that client issues an SMB that can cause an oplock break request, then the network client can fail and not respond to the break request. This tuning parameter (which is set in milliseconds) is the amount of time Samba will wait before sending an oplock break request to such (broken) clients. 5835 .PP 5836 .RS 4 5837 This is a tuning parameter added due to bugs in both Windows 9x and WinNT\. If Samba responds to a client too quickly when that client issues an SMB that can cause an oplock break request, then the network client can fail and not respond to the break request\. This tuning parameter (which is set in milliseconds) is the amount of time Samba will wait before sending an oplock break request to such (broken) clients\. 4740 5838 .sp 4741 5839 .it 1 an-trap … … 4743 5841 .nr an-break-flag 1 4744 5842 .br 4745 \fBWarning\fR 4746 DO NOT CHANGE THIS PARAMETER UNLESS YOU HAVE READ AND UNDERSTOOD THE SAMBA OPLOCK CODE. 4747 Default: 4748 \fB\fIoplock break wait time\fR = 0 \fR 4749 .RE 4750 .PP 5843 Warning 5844 DO NOT CHANGE THIS PARAMETER UNLESS YOU HAVE READ AND UNDERSTOOD THE SAMBA OPLOCK CODE\. 5845 5846 Default: 5847 \fI\fIoplock break wait time\fR\fR\fI = \fR\fI0\fR\fI \fR 5848 .RE 5849 4751 5850 oplock contention limit (S) 4752 .RS 3n 5851 .PP 5852 .RS 4 4753 5853 This is a 4754 \f Bvery\fR5854 \fIvery\fR 4755 5855 advanced 4756 5856 \fBsmbd\fR(8) 4757 tuning option to improve the efficiency of the granting of oplocks under multiple client contention for the same file .5857 tuning option to improve the efficiency of the granting of oplocks under multiple client contention for the same file\. 4758 5858 .sp 4759 5859 In brief it specifies a number, which causes 4760 \fBsmbd\fR(8)not to grant an oplock even when requested if the approximate number of clients contending for an oplock on the same file goes over this limit . This causes5860 \fBsmbd\fR(8)not to grant an oplock even when requested if the approximate number of clients contending for an oplock on the same file goes over this limit\. This causes 4761 5861 smbd 4762 to behave in a similar way to Windows NT .5862 to behave in a similar way to Windows NT\. 4763 5863 .sp 4764 5864 .it 1 an-trap … … 4766 5866 .nr an-break-flag 1 4767 5867 .br 4768 \fBWarning\fR 4769 DO NOT CHANGE THIS PARAMETER UNLESS YOU HAVE READ AND UNDERSTOOD THE SAMBA OPLOCK CODE. 4770 Default: 4771 \fB\fIoplock contention limit\fR = 2 \fR 4772 .RE 4773 .PP 5868 Warning 5869 DO NOT CHANGE THIS PARAMETER UNLESS YOU HAVE READ AND UNDERSTOOD THE SAMBA OPLOCK CODE\. 5870 5871 Default: 5872 \fI\fIoplock contention limit\fR\fR\fI = \fR\fI2\fR\fI \fR 5873 .RE 5874 4774 5875 oplocks (S) 4775 .RS 3n 5876 .PP 5877 .RS 4 4776 5878 This boolean option tells 4777 5879 smbd 4778 whether to issue oplocks (opportunistic locks) to file open requests on this share . The oplock code can dramatically (approx. 30% or more) improve the speed of access to files on Samba servers. It allows the clients to aggressively cache files locally and you may want to disable this option for unreliable network environments (it is turned on by default in Windows NT Servers). For more information see the file4779 \fISpeed .txt\fR5880 whether to issue oplocks (opportunistic locks) to file open requests on this share\. The oplock code can dramatically (approx\. 30% or more) improve the speed of access to files on Samba servers\. It allows the clients to aggressively cache files locally and you may want to disable this option for unreliable network environments (it is turned on by default in Windows NT Servers)\. For more information see the file 5881 \fISpeed\.txt\fR 4780 5882 in the Samba 4781 5883 \fIdocs/\fR 4782 directory. 4783 .sp 4784 Oplocks may be selectively turned off on certain files with a share. See the 4785 veto oplock files parameter. On some systems oplocks are recognized by the underlying operating system. This allows data synchronization between all access to oplocked files, whether it be via Samba or NFS or a local UNIX process. See the 4786 kernel oplocks parameter for details. 4787 .sp 4788 Default: 4789 \fB\fIoplocks\fR = yes \fR 4790 .RE 4791 .PP 5884 directory\. 5885 .sp 5886 Oplocks may be selectively turned off on certain files with a share\. See the 5887 \fIveto oplock files\fR 5888 parameter\. On some systems oplocks are recognized by the underlying operating system\. This allows data synchronization between all access to oplocked files, whether it be via Samba or NFS or a local UNIX process\. See the 5889 \fIkernel oplocks\fR 5890 parameter for details\. 5891 .sp 5892 Default: 5893 \fI\fIoplocks\fR\fR\fI = \fR\fIyes\fR\fI \fR 5894 .RE 5895 4792 5896 os2 driver map (G) 4793 .RS 3n 4794 The parameter is used to define the absolute path to a file containing a mapping of Windows NT printer driver names to OS/2 printer driver names. The format is: 4795 .sp 4796 <nt driver name> = <os2 driver name>.<device name> 5897 .PP 5898 .RS 4 5899 The parameter is used to define the absolute path to a file containing a mapping of Windows NT printer driver names to OS/2 printer driver names\. The format is: 5900 .sp 5901 <nt driver name> = <os2 driver name>\.<device name> 4797 5902 .sp 4798 5903 For example, a valid entry using the HP LaserJet 5 printer driver would appear as 4799 HP LaserJet 5L = LASERJET .HP LaserJet 5L.4800 .sp 4801 The need for the file is due to the printer driver namespace problem described in the chapter on Classical Printing in the Samba3 -HOWTO book. For more details on OS/2 clients, please refer to chapter on other clients in the Samba3-HOWTO book.4802 .sp 4803 Default: 4804 \f B\fIos2 driver map\fR =\fR4805 .RE 4806 .PP 5904 HP LaserJet 5L = LASERJET\.HP LaserJet 5L\. 5905 .sp 5906 The need for the file is due to the printer driver namespace problem described in the chapter on Classical Printing in the Samba3\-HOWTO book\. For more details on OS/2 clients, please refer to chapter on other clients in the Samba3\-HOWTO book\. 5907 .sp 5908 Default: 5909 \fI\fIos2 driver map\fR\fR\fI = \fR\fI\fR\fI \fR 5910 .RE 5911 4807 5912 os level (G) 4808 .RS 3n 4809 This integer value controls what level Samba advertises itself as for browse elections. The value of this parameter determines whether 5913 .PP 5914 .RS 4 5915 This integer value controls what level Samba advertises itself as for browse elections\. The value of this parameter determines whether 4810 5916 \fBnmbd\fR(8) 4811 5917 has a chance of becoming a local master browser for the 4812 workgroup in the local broadcast area. 4813 .sp 4814 \fB Note :\fRBy default, Samba will win a local master browsing election over all Microsoft operating systems except a Windows NT 4.0/2000 Domain Controller. This means that a misconfigured Samba host can effectively isolate a subnet for browsing purposes. This parameter is largely auto-configured in the Samba-3 release series and it is seldom necessary to manually over-ride the default setting. Please refer to chapter 9 of the Samba-3 HOWTO document for further information regarding the use of this parameter. 4815 .sp 4816 Default: 4817 \fB\fIos level\fR = 20 \fR 4818 .sp 4819 Example: 4820 \fB\fIos level\fR = 65 \fR 4821 .RE 4822 .PP 5918 \fIworkgroup\fR 5919 in the local broadcast area\. 5920 .sp 5921 \fI Note:\fR 5922 By default, Samba will win a local master browsing election over all Microsoft operating systems except a Windows NT 4\.0/2000 Domain Controller\. This means that a misconfigured Samba host can effectively isolate a subnet for browsing purposes\. This parameter is largely auto\-configured in the Samba\-3 release series and it is seldom necessary to manually override the default setting\. Please refer to chapter 9 of the Samba\-3 HOWTO document for further information regarding the use of this parameter\. 5923 \fINote:\fR 5924 The maximum value for this parameter is 255\. If you use higher values, counting will start at 0! 5925 .sp 5926 Default: 5927 \fI\fIos level\fR\fR\fI = \fR\fI20\fR\fI \fR 5928 .sp 5929 Example: 5930 \fI\fIos level\fR\fR\fI = \fR\fI65\fR\fI \fR 5931 .RE 5932 4823 5933 pam password change (G) 4824 .RS 3n 4825 With the addition of better PAM support in Samba 2.2, this parameter, it is possible to use PAM's password change control flag for Samba. If enabled, then PAM will be used for password changes when requested by an SMB client instead of the program listed in 4826 passwd program. It should be possible to enable this without changing your 4827 passwd chat parameter for most setups. 4828 .sp 4829 Default: 4830 \fB\fIpam password change\fR = no \fR 4831 .RE 4832 .PP 5934 .PP 5935 .RS 4 5936 With the addition of better PAM support in Samba 2\.2, this parameter, it is possible to use PAM\'s password change control flag for Samba\. If enabled, then PAM will be used for password changes when requested by an SMB client instead of the program listed in 5937 \fIpasswd program\fR\. It should be possible to enable this without changing your 5938 \fIpasswd chat\fR 5939 parameter for most setups\. 5940 .sp 5941 Default: 5942 \fI\fIpam password change\fR\fR\fI = \fR\fIno\fR\fI \fR 5943 .RE 5944 4833 5945 panic action (G) 4834 .RS 3n 5946 .PP 5947 .RS 4 4835 5948 This is a Samba developer option that allows a system command to be called when either 4836 5949 \fBsmbd\fR(8) 4837 5950 or 4838 \fB smbd\fR(8)4839 crashes . This is usually used to draw attention to the fact that a problem occurred.4840 .sp 4841 Default: 4842 \f B\fIpanic action\fR =\fR4843 .sp 4844 Example: 4845 \f B\fIpanic action\fR = "/bin/sleep 90000"\fR4846 .RE 4847 .PP 5951 \fBnmbd\fR(8) 5952 crashes\. This is usually used to draw attention to the fact that a problem occurred\. 5953 .sp 5954 Default: 5955 \fI\fIpanic action\fR\fR\fI = \fR\fI\fR\fI \fR 5956 .sp 5957 Example: 5958 \fI\fIpanic action\fR\fR\fI = \fR\fI"/bin/sleep 90000"\fR\fI \fR 5959 .RE 5960 4848 5961 paranoid server security (G) 4849 .RS 3n 4850 Some version of NT 4.x allow non-guest users with a bad passowrd. When this option is enabled, samba will not use a broken NT 4.x server as password server, but instead complain to the logs and exit. 4851 .sp 4852 Disabling this option prevents Samba from making this check, which involves deliberatly attempting a bad logon to the remote server. 4853 .sp 4854 Default: 4855 \fB\fIparanoid server security\fR = yes \fR 4856 .RE 4857 .PP 5962 .PP 5963 .RS 4 5964 Some version of NT 4\.x allow non\-guest users with a bad passowrd\. When this option is enabled, samba will not use a broken NT 4\.x server as password server, but instead complain to the logs and exit\. 5965 .sp 5966 Disabling this option prevents Samba from making this check, which involves deliberatly attempting a bad logon to the remote server\. 5967 .sp 5968 Default: 5969 \fI\fIparanoid server security\fR\fR\fI = \fR\fIyes\fR\fI \fR 5970 .RE 5971 4858 5972 passdb backend (G) 4859 .RS 3n 4860 This option allows the administrator to chose which backend will be used for storing user and possibly group information. This allows you to swap between dfferent storage mechanisms without recompile. 4861 .sp 4862 The parameter value is divided into two parts, the backend's name, and a 'location' string that has meaning only to that particular backed. These are separated by a : character. 5973 .PP 5974 .RS 4 5975 This option allows the administrator to chose which backend will be used for storing user and possibly group information\. This allows you to swap between different storage mechanisms without recompile\. 5976 .sp 5977 The parameter value is divided into two parts, the backend\'s name, and a \'location\' string that has meaning only to that particular backed\. These are separated by a : character\. 4863 5978 .sp 4864 5979 Available backends can include: 4865 .RS 3n 4866 .TP 3n 4867 \(bu 5980 .sp 5981 .RS 4 5982 .ie n \{\ 5983 \h'-04'\(bu\h'+03'\c 5984 .\} 5985 .el \{\ 5986 .sp -1 5987 .IP \(bu 2.3 5988 .\} 4868 5989 smbpasswd 4869 - The default smbpasswd backend. Takes a path to the smbpasswd file as an optional argument. 4870 .TP 3n 4871 \(bu 5990 \- The default smbpasswd backend\. Takes a path to the smbpasswd file as an optional argument\. 5991 .RE 5992 .sp 5993 .RS 4 5994 .ie n \{\ 5995 \h'-04'\(bu\h'+03'\c 5996 .\} 5997 .el \{\ 5998 .sp -1 5999 .IP \(bu 2.3 6000 .\} 4872 6001 tdbsam 4873 - The TDB based password storage backend. Takes a path to the TDB as an optional argument (defaults to passdb.tdb in the 4874 private dir directory. 4875 .TP 3n 4876 \(bu 6002 \- The TDB based password storage backend\. Takes a path to the TDB as an optional argument (defaults to passdb\.tdb in the 6003 \fIprivate dir\fR 6004 directory\. 6005 .RE 6006 .sp 6007 .RS 4 6008 .ie n \{\ 6009 \h'-04'\(bu\h'+03'\c 6010 .\} 6011 .el \{\ 6012 .sp -1 6013 .IP \(bu 2.3 6014 .\} 4877 6015 ldapsam 4878 - The LDAP based passdb backend. Takes an LDAP URL as an optional argument (defaults to6016 \- The LDAP based passdb backend\. Takes an LDAP URL as an optional argument (defaults to 4879 6017 ldap://localhost) 4880 6018 .sp 4881 LDAP connections should be secured where possible . This may be done using either Start-TLS (see4882 ldap ssl) or by specifying6019 LDAP connections should be secured where possible\. This may be done using either Start\-TLS (see 6020 \fIldap ssl\fR) or by specifying 4883 6021 \fIldaps://\fR 4884 in the URL argument. 4885 .sp 4886 Multiple servers may also be specified in double-quotes, if your LDAP libraries supports the LDAP URL notation. (OpenLDAP does). 4887 .RE 4888 .IP "" 3n 4889 6022 in the URL argument\. 6023 .sp 6024 Multiple servers may also be specified in double\-quotes\. Whether multiple servers are supported or not and the exact syntax depends on the LDAP library you use\. 6025 .sp 6026 .RE 4890 6027 4891 6028 Examples of use are: 4892 6029 .sp 6030 .RS 4 4893 6031 .nf 4894 4895 passdb backend = tdbsam:/etc/samba/private/passdb.tdb 4896 4897 or 4898 4899 passdb backend = ldapsam:"ldap://ldap-1.example.com ldap://ldap-2.example.com" 4900 6032 passdb backend = tdbsam:/etc/samba/private/passdb\.tdb 6033 6034 or multi server LDAP URL with OpenLDAP library: 6035 6036 passdb backend = ldapsam:"ldap://ldap\-1\.example\.com ldap://ldap\-2\.example\.com" 6037 6038 or multi server LDAP URL with Netscape based LDAP library: 6039 6040 passdb backend = ldapsam:"ldap://ldap\-1\.example\.com ldap\-2\.example\.com" 4901 6041 .fi 4902 Default: 4903 \fB\fIpassdb backend\fR = smbpasswd \fR 4904 .RE 4905 .PP 6042 .RE 6043 Default: 6044 \fI\fIpassdb backend\fR\fR\fI = \fR\fIsmbpasswd\fR\fI \fR 6045 .RE 6046 4906 6047 passdb expand explicit (G) 4907 .RS 3n 4908 This parameter controls whether Samba substitutes %-macros in the passdb fields if they are explicitly set. We used to expand macros here, but this turned out to be a bug because the Windows client can expand a variable %G_osver% in which %G would have been substituted by the user's primary group. 4909 .sp 4910 Default: 4911 \fB\fIpassdb expand explicit\fR = no \fR 4912 .RE 4913 .PP 4914 passwd chat (G) 4915 .RS 3n 4916 This string controls the 4917 \fB"chat"\fR 4918 conversation that takes places between 4919 \fBsmbd\fR(8) 4920 and the local password changing program to change the user's password. The string describes a sequence of response-receive pairs that 4921 \fBsmbd\fR(8) 4922 uses to determine what to send to the 4923 passwd program and what to expect back. If the expected output is not received then the password is not changed. 4924 .sp 4925 This chat sequence is often quite site specific, depending on what local methods are used for password control (such as NIS etc). 4926 .sp 4927 Note that this parameter only is only used if the 4928 unix password sync parameter is set to 4929 \fByes\fR. This sequence is then called 4930 \fBAS ROOT\fR 4931 when the SMB password in the smbpasswd file is being changed, without access to the old password cleartext. This means that root must be able to reset the user's password without knowing the text of the previous password. In the presence of NIS/YP, this means that the 4932 passwd program must be executed on the NIS master. 4933 .sp 4934 The string can contain the macro 4935 \fI%n\fR 4936 which is substituted for the new password. The chat sequence can also contain the standard macros \n, \r, \t and \s to give line-feed, carriage-return, tab and space. The chat sequence string can also contain a '*' which matches any sequence of characters. Double quotes can be used to collect strings with spaces in them into a single string. 4937 .sp 4938 If the send string in any part of the chat sequence is a full stop ".", then no string is sent. Similarly, if the expect string is a full stop then no string is expected. 4939 .sp 4940 If the 4941 pam password change parameter is set to 4942 \fByes\fR, the chat pairs may be matched in any order, and success is determined by the PAM result, not any particular output. The \n macro is ignored for PAM conversions. 4943 .sp 4944 Default: 4945 \fB\fIpasswd chat\fR = *new*password* %n\\n*new*password* %n\\n *changed* \fR 4946 .sp 4947 Example: 4948 \fB\fIpasswd chat\fR = "*Enter OLD password*" %o\\n "*Enter NEW password*" %n\\n "*Reenter NEW password*" %n\\n "*Password changed*" \fR 4949 .RE 4950 .PP 6048 .PP 6049 .RS 4 6050 This parameter controls whether Samba substitutes %\-macros in the passdb fields if they are explicitly set\. We used to expand macros here, but this turned out to be a bug because the Windows client can expand a variable %G_osver% in which %G would have been substituted by the user\'s primary group\. 6051 .sp 6052 Default: 6053 \fI\fIpassdb expand explicit\fR\fR\fI = \fR\fIno\fR\fI \fR 6054 .RE 6055 4951 6056 passwd chat debug (G) 4952 .RS 3n 6057 .PP 6058 .RS 4 4953 6059 This boolean specifies if the passwd chat script parameter is run in 4954 \f Bdebug\fR4955 mode . In this mode the strings passed to and received from the passwd chat are printed in the6060 \fIdebug\fR 6061 mode\. In this mode the strings passed to and received from the passwd chat are printed in the 4956 6062 \fBsmbd\fR(8) 4957 6063 log with a 4958 debug level of 100. This is a dangerous option as it will allow plaintext passwords to be seen in the 6064 \fIdebug level\fR 6065 of 100\. This is a dangerous option as it will allow plaintext passwords to be seen in the 4959 6066 smbd 4960 log . It is available to help Samba admins debug their6067 log\. It is available to help Samba admins debug their 4961 6068 \fIpasswd chat\fR 4962 6069 scripts when calling the 4963 6070 \fIpasswd program\fR 4964 and should be turned off after this has been done. This option has no effect if the 4965 pam password change paramter is set. This parameter is off by default. 4966 .sp 4967 Default: 4968 \fB\fIpasswd chat debug\fR = no \fR 4969 .RE 4970 .PP 6071 and should be turned off after this has been done\. This option has no effect if the 6072 \fIpam password change\fR 6073 parameter is set\. This parameter is off by default\. 6074 .sp 6075 Default: 6076 \fI\fIpasswd chat debug\fR\fR\fI = \fR\fIno\fR\fI \fR 6077 .RE 6078 4971 6079 passwd chat timeout (G) 4972 .RS 3n 4973 This integer specifies the number of seconds smbd will wait for an initial answer from a passwd chat script being run. Once the initial answer is received the subsequent answers must be received in one tenth of this time. The default it two seconds. 4974 .sp 4975 Default: 4976 \fB\fIpasswd chat timeout\fR = 2 \fR 4977 .RE 4978 .PP 6080 .PP 6081 .RS 4 6082 This integer specifies the number of seconds smbd will wait for an initial answer from a passwd chat script being run\. Once the initial answer is received the subsequent answers must be received in one tenth of this time\. The default it two seconds\. 6083 .sp 6084 Default: 6085 \fI\fIpasswd chat timeout\fR\fR\fI = \fR\fI2\fR\fI \fR 6086 .RE 6087 6088 passwd chat (G) 6089 .PP 6090 .RS 4 6091 This string controls the 6092 \fI"chat"\fR 6093 conversation that takes places between 6094 \fBsmbd\fR(8) 6095 and the local password changing program to change the user\'s password\. The string describes a sequence of response\-receive pairs that 6096 \fBsmbd\fR(8) 6097 uses to determine what to send to the 6098 \fIpasswd program\fR 6099 and what to expect back\. If the expected output is not received then the password is not changed\. 6100 .sp 6101 This chat sequence is often quite site specific, depending on what local methods are used for password control (such as NIS etc)\. 6102 .sp 6103 Note that this parameter only is only used if the 6104 \fIunix password sync\fR 6105 parameter is set to 6106 \fByes\fR\. This sequence is then called 6107 \fIAS ROOT\fR 6108 when the SMB password in the smbpasswd file is being changed, without access to the old password cleartext\. This means that root must be able to reset the user\'s password without knowing the text of the previous password\. In the presence of NIS/YP, this means that the 6109 \fIpasswd program\fR 6110 must be executed on the NIS master\. 6111 .sp 6112 The string can contain the macro 6113 \fI%n\fR 6114 which is substituted for the new password\. The old passsword (\fI%o\fR) is only available when 6115 \fIencrypt passwords\fR 6116 has been disabled\. The chat sequence can also contain the standard macros \en, \er, \et and \es to give line\-feed, carriage\-return, tab and space\. The chat sequence string can also contain a \'*\' which matches any sequence of characters\. Double quotes can be used to collect strings with spaces in them into a single string\. 6117 .sp 6118 If the send string in any part of the chat sequence is a full stop "\.", then no string is sent\. Similarly, if the expect string is a full stop then no string is expected\. 6119 .sp 6120 If the 6121 \fIpam password change\fR 6122 parameter is set to 6123 \fByes\fR, the chat pairs may be matched in any order, and success is determined by the PAM result, not any particular output\. The \en macro is ignored for PAM conversions\. 6124 .sp 6125 Default: 6126 \fI\fIpasswd chat\fR\fR\fI = \fR\fI*new*password* %n\en*new*password* %n\en *changed*\fR\fI \fR 6127 .sp 6128 Example: 6129 \fI\fIpasswd chat\fR\fR\fI = \fR\fI"*Enter NEW password*" %n\en "*Reenter NEW password*" %n\en "*Password changed*"\fR\fI \fR 6130 .RE 6131 4979 6132 passwd program (G) 4980 .RS 3n 4981 The name of a program that can be used to set UNIX user passwords. Any occurrences of 6133 .PP 6134 .RS 4 6135 The name of a program that can be used to set UNIX user passwords\. Any occurrences of 4982 6136 \fI%u\fR 4983 will be replaced with the user name . The user name is checked for existence before calling the password changing program.6137 will be replaced with the user name\. The user name is checked for existence before calling the password changing program\. 4984 6138 .sp 4985 6139 Also note that many passwd programs insist in 4986 \f Breasonable \fR4987 passwords, such as a minimum length, or the inclusion of mixed case chars and digits . This can pose a problem as some clients (such as Windows for Workgroups) uppercase the password before sending it.4988 .sp 4989 \f BNote\fR6140 \fIreasonable \fR 6141 passwords, such as a minimum length, or the inclusion of mixed case chars and digits\. This can pose a problem as some clients (such as Windows for Workgroups) uppercase the password before sending it\. 6142 .sp 6143 \fINote\fR 4990 6144 that if the 4991 6145 \fIunix password sync\fR … … 4993 6147 \fByes \fR 4994 6148 then this program is called 4995 \f BAS ROOT\fR4996 before the SMB password in the smbpasswd file is changed . If this UNIX password change fails, then6149 \fIAS ROOT\fR 6150 before the SMB password in the smbpasswd file is changed\. If this UNIX password change fails, then 4997 6151 smbd 4998 will fail to change the SMB password also (this is by design) .6152 will fail to change the SMB password also (this is by design)\. 4999 6153 .sp 5000 6154 If the 5001 6155 \fIunix password sync\fR 5002 6156 parameter is set this parameter 5003 \f BMUST USE ABSOLUTE PATHS\fR6157 \fIMUST USE ABSOLUTE PATHS\fR 5004 6158 for 5005 \f BALL\fR5006 programs called, and must be examined for security implications . Note that by default6159 \fIALL\fR 6160 programs called, and must be examined for security implications\. Note that by default 5007 6161 \fIunix password sync\fR 5008 6162 is set to 5009 \fBno\fR .5010 .sp 5011 Default: 5012 \f B\fIpasswd program\fR =\fR5013 .sp 5014 Example: 5015 \f B\fIpasswd program\fR = /bin/passwd %u\fR5016 .RE 5017 .PP 6163 \fBno\fR\. 6164 .sp 6165 Default: 6166 \fI\fIpasswd program\fR\fR\fI = \fR\fI\fR\fI \fR 6167 .sp 6168 Example: 6169 \fI\fIpasswd program\fR\fR\fI = \fR\fI/bin/passwd %u\fR\fI \fR 6170 .RE 6171 5018 6172 password level (G) 5019 .RS 3n 5020 Some client/server combinations have difficulty with mixed-case passwords. One offending client is Windows for Workgroups, which for some reason forces passwords to upper case when using the LANMAN1 protocol, but leaves them alone when using COREPLUS! Another problem child is the Windows 95/98 family of operating systems. These clients upper case clear text passwords even when NT LM 0.12 selected by the protocol negotiation request/response. 5021 .sp 5022 This parameter defines the maximum number of characters that may be upper case in passwords. 5023 .sp 5024 For example, say the password given was "FRED". If 6173 .PP 6174 .RS 4 6175 Some client/server combinations have difficulty with mixed\-case passwords\. One offending client is Windows for Workgroups, which for some reason forces passwords to upper case when using the LANMAN1 protocol, but leaves them alone when using COREPLUS! Another problem child is the Windows 95/98 family of operating systems\. These clients upper case clear text passwords even when NT LM 0\.12 selected by the protocol negotiation request/response\. 6176 .sp 6177 This parameter defines the maximum number of characters that may be upper case in passwords\. 6178 .sp 6179 For example, say the password given was "FRED"\. If 5025 6180 \fI password level\fR 5026 6181 is set to 1, the following combinations would be tried if "FRED" failed: … … 5032 6187 was set to 2, the following combinations would also be tried: 5033 6188 .sp 5034 "FRed", "FrEd", "FreD", "fREd", "fReD", "frED", ..5035 .sp 5036 And so on .5037 .sp 5038 The higher value this parameter is set to the more likely it is that a mixed case password will be matched against a single case password . However, you should be aware that use of this parameter reduces security and increases the time taken to process a new connection.5039 .sp 5040 A value of zero will cause only two attempts to be made - the password as is and the password in all-lower case.5041 .sp 5042 This parameter is used only when using plain -text passwords. It is not at all used when encrypted passwords as in use (that is the default since samba-3.0.0). Use this only when5043 encrypt passwords = No.5044 .sp 5045 Default: 5046 \f B\fIpassword level\fR = 0\fR5047 .sp 5048 Example: 5049 \f B\fIpassword level\fR = 4\fR5050 .RE 5051 .PP 6189 "FRed", "FrEd", "FreD", "fREd", "fReD", "frED", \.\. 6190 .sp 6191 And so on\. 6192 .sp 6193 The higher value this parameter is set to the more likely it is that a mixed case password will be matched against a single case password\. However, you should be aware that use of this parameter reduces security and increases the time taken to process a new connection\. 6194 .sp 6195 A value of zero will cause only two attempts to be made \- the password as is and the password in all\-lower case\. 6196 .sp 6197 This parameter is used only when using plain\-text passwords\. It is not at all used when encrypted passwords as in use (that is the default since samba\-3\.0\.0)\. Use this only when 6198 \fIencrypt passwords = No\fR\. 6199 .sp 6200 Default: 6201 \fI\fIpassword level\fR\fR\fI = \fR\fI0\fR\fI \fR 6202 .sp 6203 Example: 6204 \fI\fIpassword level\fR\fR\fI = \fR\fI4\fR\fI \fR 6205 .RE 6206 5052 6207 password server (G) 5053 .RS 3n 6208 .PP 6209 .RS 4 5054 6210 By specifying the name of another SMB server or Active Directory domain controller with this option, and using 5055 6211 security = [ads|domain|server] 5056 it is possible to get Samba to to do all its username/password validation using a specific remote server .5057 .sp 5058 This option sets the name or IP address of the password server to use . New syntax has been added to support defining the port to use when connecting to the server the case of an ADS realm. To define a port other than the default LDAP port of 389, add the port number using a colon after the name or IP address (e.g. 192.168.1.100:389). If you do not specify a port, Samba will use the standard LDAP port of tcp/389. Note that port numbers have no effect on password servers for Windows NT 4.0 domains or netbios connections.6212 it is possible to get Samba to to do all its username/password validation using a specific remote server\. 6213 .sp 6214 This option sets the name or IP address of the password server to use\. New syntax has been added to support defining the port to use when connecting to the server the case of an ADS realm\. To define a port other than the default LDAP port of 389, add the port number using a colon after the name or IP address (e\.g\. 192\.168\.1\.100:389)\. If you do not specify a port, Samba will use the standard LDAP port of tcp/389\. Note that port numbers have no effect on password servers for Windows NT 4\.0 domains or netbios connections\. 5059 6215 .sp 5060 6216 If parameter is a name, it is looked up using the parameter 5061 name resolve order and so may resolved by any method and order described in that parameter. 5062 .sp 5063 The password server must be a machine capable of using the "LM1.2X002" or the "NT LM 0.12" protocol, and it must be in user level security mode. 6217 \fIname resolve order\fR 6218 and so may resolved by any method and order described in that parameter\. 6219 .sp 6220 The password server must be a machine capable of using the "LM1\.2X002" or the "NT LM 0\.12" protocol, and it must be in user level security mode\. 5064 6221 .sp 5065 6222 .it 1 an-trap … … 5067 6224 .nr an-break-flag 1 5068 6225 .br 5069 \fBNote\fR 5070 Using a password server means your UNIX box (running Samba) is only as secure as your password server. 5071 \fBDO NOT CHOOSE A PASSWORD SERVER THAT YOU DON'T COMPLETELY TRUST\fR. 5072 Never point a Samba server at itself for password serving. This will cause a loop and could lock up your Samba server! 6226 Note 6227 Using a password server means your UNIX box (running Samba) is only as secure as your password server\. 6228 \fIDO NOT CHOOSE A PASSWORD SERVER THAT YOU DON\'T COMPLETELY TRUST\fR\. 6229 6230 Never point a Samba server at itself for password serving\. This will cause a loop and could lock up your Samba server! 5073 6231 .sp 5074 6232 The name of the password server takes the standard substitutions, but probably the only useful one is 5075 \fI%m \fR, which means the Samba server will use the incoming client as the password server . If you use this then you better trust your clients, and you had better restrict them with hosts allow!6233 \fI%m \fR, which means the Samba server will use the incoming client as the password server\. If you use this then you better trust your clients, and you had better restrict them with hosts allow! 5076 6234 .sp 5077 6235 If the … … 5080 6238 \fBdomain\fR 5081 6239 or 5082 \fBads\fR, then the list of machines in this option must be a list of Primary or Backup Domain controllers for the Domain or the character '*', as the Samba server is effectively in that domain, and will use cryptographically authenticated RPC calls to authenticate the user logging on. The advantage of using6240 \fBads\fR, then the list of machines in this option must be a list of Primary or Backup Domain controllers for the Domain or the character \'*\', as the Samba server is effectively in that domain, and will use cryptographically authenticated RPC calls to authenticate the user logging on\. The advantage of using 5083 6241 security = domain 5084 6242 is that if you list several hosts in the … … 5086 6244 option then 5087 6245 smbd 5088 will try each in turn till it finds one that responds . This is useful in case your primary server goes down.6246 will try each in turn till it finds one that responds\. This is useful in case your primary server goes down\. 5089 6247 .sp 5090 6248 If the 5091 6249 \fIpassword server\fR 5092 option is set to the character '*', then Samba will attempt to auto-locate the Primary or Backup Domain controllers to authenticate against by doing a query for the name6250 option is set to the character \'*\', then Samba will attempt to auto\-locate the Primary or Backup Domain controllers to authenticate against by doing a query for the name 5093 6251 \fBWORKGROUP<1C>\fR 5094 and then contacting each server returned in the list of IP addresses from the name resolution source .5095 .sp 5096 If the list of servers contains both names/IP 's and the '*' character, the list is treated as a list of preferred domain controllers, but an auto lookup of all remaining DC's will be added to the list as well. Samba will not attempt to optimize this list by locating the closest DC.6252 and then contacting each server returned in the list of IP addresses from the name resolution source\. 6253 .sp 6254 If the list of servers contains both names/IP\'s and the \'*\' character, the list is treated as a list of preferred domain controllers, but an auto lookup of all remaining DC\'s will be added to the list as well\. Samba will not attempt to optimize this list by locating the closest DC\. 5097 6255 .sp 5098 6256 If the … … 5101 6259 \fBserver\fR, then there are different restrictions that 5102 6260 security = domain 5103 doesn't suffer from: 5104 .RS 3n 5105 .TP 3n 5106 \(bu 6261 doesn\'t suffer from: 6262 .sp 6263 .RS 4 6264 .ie n \{\ 6265 \h'-04'\(bu\h'+03'\c 6266 .\} 6267 .el \{\ 6268 .sp -1 6269 .IP \(bu 2.3 6270 .\} 5107 6271 You may list several password servers in the 5108 6272 \fIpassword server\fR … … 5110 6274 smbd 5111 6275 makes a connection to a password server, and then the password server fails, no more users will be able to be authenticated from this 5112 smbd . This is a restriction of the SMB/CIFS protocol when in6276 smbd\. This is a restriction of the SMB/CIFS protocol when in 5113 6277 security = server 5114 mode and cannot be fixed in Samba. 5115 .TP 3n 5116 \(bu 6278 mode and cannot be fixed in Samba\. 6279 .RE 6280 .sp 6281 .RS 4 6282 .ie n \{\ 6283 \h'-04'\(bu\h'+03'\c 6284 .\} 6285 .el \{\ 6286 .sp -1 6287 .IP \(bu 2.3 6288 .\} 5117 6289 If you are using a Windows NT server as your password server then you will have to ensure that your users are able to login from the Samba server, as when in 5118 6290 security = server 5119 mode the network logon will appear to come from there rather than from the users workstation .5120 . RE5121 . IP "" 3n5122 Default: 5123 \f B\fIpassword server\fR =\fR5124 .sp 5125 Example: 5126 \f B\fIpassword server\fR = NT-PDC, NT-BDC1, NT-BDC2, *\fR5127 .sp 5128 Example: 5129 \f B\fIpassword server\fR = windc.mydomain.com:389 192.168.1.101 *\fR5130 .sp 5131 Example: 5132 \f B\fIpassword server\fR = *\fR5133 .RE 5134 .PP5135 directory 5136 .RS 3n 5137 This parameter is a synonym for path.5138 .RE 5139 .PP 6291 mode the network logon will appear to come from there rather than from the users workstation\. 6292 .sp 6293 .RE 6294 Default: 6295 \fI\fIpassword server\fR\fR\fI = \fR\fI\fR\fI \fR 6296 .sp 6297 Example: 6298 \fI\fIpassword server\fR\fR\fI = \fR\fINT\-PDC, NT\-BDC1, NT\-BDC2, *\fR\fI \fR 6299 .sp 6300 Example: 6301 \fI\fIpassword server\fR\fR\fI = \fR\fIwindc\.mydomain\.com:389 192\.168\.1\.101 *\fR\fI \fR 6302 .sp 6303 Example: 6304 \fI\fIpassword server\fR\fR\fI = \fR\fI*\fR\fI \fR 6305 .RE 6306 directory.PP 6307 .RS 4 6308 This parameter is a synonym for 6309 path\. 6310 .RE 6311 5140 6312 path (S) 5141 .RS 3n 5142 This parameter specifies a directory to which the user of the service is to be given access. In the case of printable services, this is where print data will spool prior to being submitted to the host for printing. 5143 .sp 5144 For a printable service offering guest access, the service should be readonly and the path should be world-writeable and have the sticky bit set. This is not mandatory of course, but you probably won't get the results you expect if you do otherwise. 6313 .PP 6314 .RS 4 6315 This parameter specifies a directory to which the user of the service is to be given access\. In the case of printable services, this is where print data will spool prior to being submitted to the host for printing\. 6316 .sp 6317 For a printable service offering guest access, the service should be readonly and the path should be world\-writeable and have the sticky bit set\. This is not mandatory of course, but you probably won\'t get the results you expect if you do otherwise\. 5145 6318 .sp 5146 6319 Any occurrences of 5147 6320 \fI%u\fR 5148 in the path will be replaced with the UNIX username that the client is using on this connection . Any occurrences of6321 in the path will be replaced with the UNIX username that the client is using on this connection\. Any occurrences of 5149 6322 \fI%m\fR 5150 will be replaced by the NetBIOS name of the machine they are connecting from . These replacements are very useful for setting up pseudo home directories for users.6323 will be replaced by the NetBIOS name of the machine they are connecting from\. These replacements are very useful for setting up pseudo home directories for users\. 5151 6324 .sp 5152 6325 Note that this path will be based on 5153 root dir if one was specified. 5154 .sp 5155 Default: 5156 \fB\fIpath\fR = \fR 5157 .sp 5158 Example: 5159 \fB\fIpath\fR = /home/fred \fR 5160 .RE 5161 .PP 6326 \fIroot dir\fR 6327 if one was specified\. 6328 .sp 6329 Default: 6330 \fI\fIpath\fR\fR\fI = \fR\fI\fR\fI \fR 6331 .sp 6332 Example: 6333 \fI\fIpath\fR\fR\fI = \fR\fI/home/fred\fR\fI \fR 6334 .RE 6335 5162 6336 pid directory (G) 5163 .RS 3n 5164 This option specifies the directory where pid files will be placed. 5165 .sp 5166 Default: 5167 \fB\fIpid directory\fR = ${prefix}/var/locks \fR 5168 .sp 5169 Example: 5170 \fB\fIpid directory\fR = pid directory = /var/run/ \fR 5171 .RE 5172 .PP 6337 .PP 6338 .RS 4 6339 This option specifies the directory where pid files will be placed\. 6340 .sp 6341 Default: 6342 \fI\fIpid directory\fR\fR\fI = \fR\fI${prefix}/var/locks\fR\fI \fR 6343 .sp 6344 Example: 6345 \fI\fIpid directory\fR\fR\fI = \fR\fIpid directory = /var/run/\fR\fI \fR 6346 .RE 6347 5173 6348 posix locking (S) 5174 .RS 3n 6349 .PP 6350 .RS 4 5175 6351 The 5176 6352 \fBsmbd\fR(8) 5177 daemon maintains an database of file locks obtained by SMB clients . The default behavior is to map this internal database to POSIX locks. This means that file locks obtained by SMB clients are consistent with those seen by POSIX compliant applications accessing the files via a non-SMB method (e.g. NFS or local file access). You should never need to disable this parameter.5178 .sp 5179 Default: 5180 \f B\fIposix locking\fR = yes\fR5181 .RE 5182 .PP 6353 daemon maintains an database of file locks obtained by SMB clients\. The default behavior is to map this internal database to POSIX locks\. This means that file locks obtained by SMB clients are consistent with those seen by POSIX compliant applications accessing the files via a non\-SMB method (e\.g\. NFS or local file access)\. You should never need to disable this parameter\. 6354 .sp 6355 Default: 6356 \fI\fIposix locking\fR\fR\fI = \fR\fIyes\fR\fI \fR 6357 .RE 6358 5183 6359 postexec (S) 5184 .RS 3n 5185 This option specifies a command to be run whenever the service is disconnected. It takes the usual substitutions. The command may be run as the root on some systems. 6360 .PP 6361 .RS 4 6362 This option specifies a command to be run whenever the service is disconnected\. It takes the usual substitutions\. The command may be run as the root on some systems\. 5186 6363 .sp 5187 6364 An interesting example may be to unmount server resources: … … 5190 6367 .sp 5191 6368 Default: 5192 \fB\fIpostexec\fR = \fR 5193 .sp 5194 Example: 5195 \fB\fIpostexec\fR = echo \\"%u disconnected from %S from %m (%I)\\" >> /tmp/log \fR 5196 .RE 5197 .PP 5198 exec 5199 .RS 3n 5200 This parameter is a synonym for preexec. 5201 .RE 5202 .PP 6369 \fI\fIpostexec\fR\fR\fI = \fR\fI\fR\fI \fR 6370 .sp 6371 Example: 6372 \fI\fIpostexec\fR\fR\fI = \fR\fIecho \e"%u disconnected from %S from %m (%I)\e" >> /tmp/log\fR\fI \fR 6373 .RE 6374 6375 preexec close (S) 6376 .PP 6377 .RS 4 6378 This boolean option controls whether a non\-zero return code from 6379 \fIpreexec\fR 6380 should close the service being connected to\. 6381 .sp 6382 Default: 6383 \fI\fIpreexec close\fR\fR\fI = \fR\fIno\fR\fI \fR 6384 .RE 6385 exec.PP 6386 .RS 4 6387 This parameter is a synonym for 6388 preexec\. 6389 .RE 6390 5203 6391 preexec (S) 5204 .RS 3n 5205 This option specifies a command to be run whenever the service is connected to. It takes the usual substitutions. 5206 .sp 5207 An interesting example is to send the users a welcome message every time they log in. Maybe a message of the day? Here is an example: 5208 .sp 5209 5210 preexec = csh -c 'echo \\"Welcome to %S!\\" | /usr/local/samba/bin/smbclient -M %m -I %I' & 5211 .sp 5212 Of course, this could get annoying after a while :-) 6392 .PP 6393 .RS 4 6394 This option specifies a command to be run whenever the service is connected to\. It takes the usual substitutions\. 6395 .sp 6396 An interesting example is to send the users a welcome message every time they log in\. Maybe a message of the day? Here is an example: 6397 .sp 6398 6399 preexec = csh \-c \'echo \e"Welcome to %S!\e" | /usr/local/samba/bin/smbclient \-M %m \-I %I\' & 6400 .sp 6401 Of course, this could get annoying after a while :\-) 5213 6402 .sp 5214 6403 See also 5215 preexec close and 5216 postexec. 5217 .sp 5218 Default: 5219 \fB\fIpreexec\fR = \fR 5220 .sp 5221 Example: 5222 \fB\fIpreexec\fR = echo \\"%u connected to %S from %m (%I)\\" >> /tmp/log \fR 5223 .RE 5224 .PP 5225 preexec close (S) 5226 .RS 3n 5227 This boolean option controls whether a non-zero return code from 5228 preexec should close the service being connected to. 5229 .sp 5230 Default: 5231 \fB\fIpreexec close\fR = no \fR 5232 .RE 5233 .PP 5234 prefered master 5235 .RS 3n 5236 This parameter is a synonym for preferred master. 5237 .RE 5238 .PP 6404 \fIpreexec close\fR 6405 and 6406 \fIpostexec\fR\. 6407 .sp 6408 Default: 6409 \fI\fIpreexec\fR\fR\fI = \fR\fI\fR\fI \fR 6410 .sp 6411 Example: 6412 \fI\fIpreexec\fR\fR\fI = \fR\fIecho \e"%u connected to %S from %m (%I)\e" >> /tmp/log\fR\fI \fR 6413 .RE 6414 prefered master.PP 6415 .RS 4 6416 This parameter is a synonym for 6417 preferred master\. 6418 .RE 6419 5239 6420 preferred master (G) 5240 .RS 3n 6421 .PP 6422 .RS 4 5241 6423 This boolean parameter controls if 5242 6424 \fBnmbd\fR(8) 5243 is a preferred master browser for its workgroup .6425 is a preferred master browser for its workgroup\. 5244 6426 .sp 5245 6427 If this is set to 5246 6428 \fByes\fR, on startup, 5247 6429 nmbd 5248 will force an election, and it will have a slight advantage in winning the election . It is recommended that this parameter is used in conjunction with5249 domain master = yes, so that6430 will force an election, and it will have a slight advantage in winning the election\. It is recommended that this parameter is used in conjunction with 6431 \fIdomain master = yes\fR, so that 5250 6432 nmbd 5251 can guarantee becoming a domain master. 5252 .sp 5253 Use this option with caution, because if there are several hosts (whether Samba servers, Windows 95 or NT) that are preferred master browsers on the same subnet, they will each periodically and continuously attempt to become the local master browser. This will result in unnecessary broadcast traffic and reduced browsing capabilities. 5254 .sp 5255 Default: 5256 \fB\fIpreferred master\fR = auto \fR 5257 .RE 5258 .PP 5259 auto services 5260 .RS 3n 5261 This parameter is a synonym for preload. 5262 .RE 5263 .PP 6433 can guarantee becoming a domain master\. 6434 .sp 6435 Use this option with caution, because if there are several hosts (whether Samba servers, Windows 95 or NT) that are preferred master browsers on the same subnet, they will each periodically and continuously attempt to become the local master browser\. This will result in unnecessary broadcast traffic and reduced browsing capabilities\. 6436 .sp 6437 Default: 6438 \fI\fIpreferred master\fR\fR\fI = \fR\fIauto\fR\fI \fR 6439 .RE 6440 6441 preload modules (G) 6442 .PP 6443 .RS 4 6444 This is a list of paths to modules that should be loaded into smbd before a client connects\. This improves the speed of smbd when reacting to new connections somewhat\. 6445 .sp 6446 Default: 6447 \fI\fIpreload modules\fR\fR\fI = \fR\fI\fR\fI \fR 6448 .sp 6449 Example: 6450 \fI\fIpreload modules\fR\fR\fI = \fR\fI/usr/lib/samba/passdb/mysql\.so\fR\fI \fR 6451 .RE 6452 auto services.PP 6453 .RS 4 6454 This parameter is a synonym for 6455 preload\. 6456 .RE 6457 5264 6458 preload (G) 5265 .RS 3n 5266 This is a list of services that you want to be automatically added to the browse lists. This is most useful for homes and printers services that would otherwise not be visible. 6459 .PP 6460 .RS 4 6461 This is a list of services that you want to be automatically added to the browse lists\. This is most useful for homes and printers services that would otherwise not be visible\. 5267 6462 .sp 5268 6463 Note that if you just want all printers in your printcap file loaded then the 5269 load printers option is easier. 5270 .sp 5271 Default: 5272 \fB\fIpreload\fR = \fR 5273 .sp 5274 Example: 5275 \fB\fIpreload\fR = fred lp colorlp \fR 5276 .RE 5277 .PP 5278 preload modules (G) 5279 .RS 3n 5280 This is a list of paths to modules that should be loaded into smbd before a client connects. This improves the speed of smbd when reacting to new connections somewhat. 5281 .sp 5282 Default: 5283 \fB\fIpreload modules\fR = \fR 5284 .sp 5285 Example: 5286 \fB\fIpreload modules\fR = /usr/lib/samba/passdb/mysql.so \fR 5287 .RE 5288 .PP 6464 \fIload printers\fR 6465 option is easier\. 6466 .sp 6467 Default: 6468 \fI\fIpreload\fR\fR\fI = \fR\fI\fR\fI \fR 6469 .sp 6470 Example: 6471 \fI\fIpreload\fR\fR\fI = \fR\fIfred lp colorlp\fR\fI \fR 6472 .RE 6473 5289 6474 preserve case (S) 5290 .RS 3n 6475 .PP 6476 .RS 4 5291 6477 This controls if new filenames are created with the case that the client passes, or if they are forced to be the 5292 default case.6478 \fIdefault case\fR\. 5293 6479 .sp 5294 6480 See the section on 5295 6481 NAME MANGLING 5296 for a fuller discussion .5297 .sp 5298 Default: 5299 \f B\fIpreserve case\fR = yes\fR5300 .RE 5301 .PP5302 print ok 5303 .RS 3n 5304 This parameter is a synonym for printable.5305 .RE 5306 .PP 6482 for a fuller discussion\. 6483 .sp 6484 Default: 6485 \fI\fIpreserve case\fR\fR\fI = \fR\fIyes\fR\fI \fR 6486 .RE 6487 print ok.PP 6488 .RS 4 6489 This parameter is a synonym for 6490 printable\. 6491 .RE 6492 5307 6493 printable (S) 5308 .RS 3n 6494 .PP 6495 .RS 4 5309 6496 If this parameter is 5310 \fByes\fR, then clients may open, write to and submit spool files on the directory specified for the service. 5311 .sp 5312 Note that a printable service will ALWAYS allow writing to the service path (user privileges permitting) via the spooling of print data. The 5313 read only parameter controls only non-printing access to the resource. 5314 .sp 5315 Default: 5316 \fB\fIprintable\fR = no \fR 5317 .RE 5318 .PP 6497 \fByes\fR, then clients may open, write to and submit spool files on the directory specified for the service\. 6498 .sp 6499 Note that a printable service will ALWAYS allow writing to the service path (user privileges permitting) via the spooling of print data\. The 6500 \fIread only\fR 6501 parameter controls only non\-printing access to the resource\. 6502 .sp 6503 Default: 6504 \fI\fIprintable\fR\fR\fI = \fR\fIno\fR\fI \fR 6505 .RE 6506 5319 6507 printcap cache time (G) 5320 .RS 3n 5321 This option specifies the number of seconds before the printing subsystem is again asked for the known printers. If the value is greater than 60 the initial waiting time is set to 60 seconds to allow an earlier first rescan of the printing subsystem. 5322 .sp 5323 Setting this parameter to 0 disables any rescanning for new or removed printers after the initial startup. 5324 .sp 5325 Default: 5326 \fB\fIprintcap cache time\fR = 750 \fR 5327 .sp 5328 Example: 5329 \fB\fIprintcap cache time\fR = 600 \fR 5330 .RE 5331 .PP 5332 printcap 5333 .RS 3n 5334 This parameter is a synonym for printcap name. 5335 .RE 5336 .PP 6508 .PP 6509 .RS 4 6510 This option specifies the number of seconds before the printing subsystem is again asked for the known printers\. If the value is greater than 60 the initial waiting time is set to 60 seconds to allow an earlier first rescan of the printing subsystem\. 6511 .sp 6512 Setting this parameter to 0 disables any rescanning for new or removed printers after the initial startup\. 6513 .sp 6514 Default: 6515 \fI\fIprintcap cache time\fR\fR\fI = \fR\fI750\fR\fI \fR 6516 .sp 6517 Example: 6518 \fI\fIprintcap cache time\fR\fR\fI = \fR\fI600\fR\fI \fR 6519 .RE 6520 printcap.PP 6521 .RS 4 6522 This parameter is a synonym for 6523 printcap name\. 6524 .RE 6525 5337 6526 printcap name (S) 5338 .RS 3n 5339 This parameter may be used to override the compiled-in default printcap name used by the server (usually 5340 \fI /etc/printcap\fR). See the discussion of the 6527 .PP 6528 .RS 4 6529 This parameter may be used to override the compiled\-in default printcap name used by the server (usually 6530 \fI /etc/printcap\fR)\. See the discussion of the 5341 6531 [printers] 5342 section above for reasons why you might want to do this .6532 section above for reasons why you might want to do this\. 5343 6533 .sp 5344 6534 To use the CUPS printing interface set 5345 printcap name = cups. This should be supplemented by an addtional setting 5346 printing = cups in the [global] section. 6535 printcap name = cups\. This should be supplemented by an addtional setting 6536 \fIprinting = cups\fR 6537 in the [global] section\. 5347 6538 printcap name = cups 5348 will use the "dummy" printcap created by CUPS, as specified in your CUPS configuration file .6539 will use the "dummy" printcap created by CUPS, as specified in your CUPS configuration file\. 5349 6540 .sp 5350 6541 On System V systems that use … … 5352 6543 to list available printers you can use 5353 6544 printcap name = lpstat 5354 to automatically obtain lists of available printers . This is the default for systems that define SYSV at configure time in Samba (this includes most System V based systems). If6545 to automatically obtain lists of available printers\. This is the default for systems that define SYSV at configure time in Samba (this includes most System V based systems)\. If 5355 6546 \fI printcap name\fR 5356 6547 is set to 5357 6548 lpstat 5358 6549 on these systems then Samba will launch 5359 lpstat -v5360 and attempt to parse the output to obtain a printer list .6550 lpstat \-v 6551 and attempt to parse the output to obtain a printer list\. 5361 6552 .sp 5362 6553 A minimal printcap file would look something like this: 5363 5364 .sp 5365 6554 .sp 6555 .RS 4 5366 6556 .nf 5367 5368 6557 print1|My Printer 1 5369 6558 print2|My Printer 2 … … 5371 6560 print4|My Printer 4 5372 6561 print5|My Printer 5 5373 5374 6562 .fi 5375 where the '|' separates aliases of a printer. The fact that the second alias has a space in it gives a hint to Samba that it's a comment. 6563 .RE 6564 .sp 6565 where the \'|\' separates aliases of a printer\. The fact that the second alias has a space in it gives a hint to Samba that it\'s a comment\. 5376 6566 .sp 5377 6567 .it 1 an-trap … … 5379 6569 .nr an-break-flag 1 5380 6570 .br 5381 \fBNote\fR 6571 Note 5382 6572 Under AIX the default printcap name is 5383 \fI/etc/qconfig\fR . Samba will assume the file is in AIX6573 \fI/etc/qconfig\fR\. Samba will assume the file is in AIX 5384 6574 \fIqconfig\fR 5385 6575 format if the string 5386 6576 \fIqconfig\fR 5387 appears in the printcap filename. 5388 Default: 5389 \fB\fIprintcap name\fR = /etc/printcap \fR 5390 .sp 5391 Example: 5392 \fB\fIprintcap name\fR = /etc/myprintcap \fR 5393 .RE 5394 .PP 6577 appears in the printcap filename\. 6578 6579 Default: 6580 \fI\fIprintcap name\fR\fR\fI = \fR\fI/etc/printcap\fR\fI \fR 6581 .sp 6582 Example: 6583 \fI\fIprintcap name\fR\fR\fI = \fR\fI/etc/myprintcap\fR\fI \fR 6584 .RE 6585 5395 6586 print command (S) 5396 .RS 3n 6587 .PP 6588 .RS 4 5397 6589 After a print job has finished spooling to a service, this command will be used via a 5398 6590 system() 5399 call to process the spool file . Typically the command specified will submit the spool file to the host's printing subsystem, but there is no requirement that this be the case. The server will not remove the spool file, so whatever command you specify should remove the spool file when it has been processed, otherwise you will need to manually remove old spool files.5400 .sp 5401 The print command is simply a text string . It will be used verbatim after macro substitutions have been made:5402 .sp 5403 %s, %f - the path to the spool file name5404 .sp 5405 %p - the appropriate printer name5406 .sp 5407 %J - the job name as transmitted by the client.5408 .sp 5409 %c - The number of printed pages of the spooled job (if known).5410 .sp 5411 %z - the size of the spooled print job (in bytes)6591 call to process the spool file\. Typically the command specified will submit the spool file to the host\'s printing subsystem, but there is no requirement that this be the case\. The server will not remove the spool file, so whatever command you specify should remove the spool file when it has been processed, otherwise you will need to manually remove old spool files\. 6592 .sp 6593 The print command is simply a text string\. It will be used verbatim after macro substitutions have been made: 6594 .sp 6595 %s, %f \- the path to the spool file name 6596 .sp 6597 %p \- the appropriate printer name 6598 .sp 6599 %J \- the job name as transmitted by the client\. 6600 .sp 6601 %c \- The number of printed pages of the spooled job (if known)\. 6602 .sp 6603 %z \- the size of the spooled print job (in bytes) 5412 6604 .sp 5413 6605 The print command 5414 \f BMUST\fR6606 \fIMUST\fR 5415 6607 contain at least one occurrence of 5416 6608 \fI%s\fR 5417 6609 or 5418 6610 \fI%f \fR 5419 - the6611 \- the 5420 6612 \fI%p\fR 5421 is optional . At the time a job is submitted, if no printer name is supplied the6613 is optional\. At the time a job is submitted, if no printer name is supplied the 5422 6614 \fI%p \fR 5423 will be silently removed from the printer command .5424 .sp 5425 If specified in the [global] section, the print command given will be used for any printable service that does not have its own print command specified .5426 .sp 5427 If there is neither a specified print command for a printable service nor a global print command, spool files will be created but not processed and (most importantly) not removed .6615 will be silently removed from the printer command\. 6616 .sp 6617 If specified in the [global] section, the print command given will be used for any printable service that does not have its own print command specified\. 6618 .sp 6619 If there is neither a specified print command for a printable service nor a global print command, spool files will be created but not processed and (most importantly) not removed\. 5428 6620 .sp 5429 6621 Note that printing may fail on some UNIXes from the 5430 6622 \fBnobody\fR 5431 account. If this happens then create an alternative guest account that can print and set the 5432 guest account in the [global] section. 5433 .sp 5434 You can form quite complex print commands by realizing that they are just passed to a shell. For example the following will log a print job, print the file, then remove it. Note that ';' is the usual separator for command in shell scripts. 5435 .sp 5436 print command = echo Printing %s >> /tmp/print.log; lpr -P %p %s; rm %s 5437 .sp 5438 You may have to vary this command considerably depending on how you normally print files on your system. The default for the parameter varies depending on the setting of the 5439 printing parameter. 6623 account\. If this happens then create an alternative guest account that can print and set the 6624 \fIguest account\fR 6625 in the [global] section\. 6626 .sp 6627 You can form quite complex print commands by realizing that they are just passed to a shell\. For example the following will log a print job, print the file, then remove it\. Note that \';\' is the usual separator for command in shell scripts\. 6628 .sp 6629 print command = echo Printing %s >> /tmp/print\.log; lpr \-P %p %s; rm %s 6630 .sp 6631 You may have to vary this command considerably depending on how you normally print files on your system\. The default for the parameter varies depending on the setting of the 6632 \fIprinting\fR 6633 parameter\. 5440 6634 .sp 5441 6635 Default: For 5442 6636 printing = BSD, AIX, QNX, LPRNG or PLP : 5443 6637 .sp 5444 print command = lpr -r-P%p %s6638 print command = lpr \-r \-P%p %s 5445 6639 .sp 5446 6640 For 5447 6641 printing = SYSV or HPUX : 5448 6642 .sp 5449 print command = lp -c-d%p %s; rm %s6643 print command = lp \-c \-d%p %s; rm %s 5450 6644 .sp 5451 6645 For 5452 6646 printing = SOFTQ : 5453 6647 .sp 5454 print command = lp -d%p-s %s; rm %s6648 print command = lp \-d%p \-s %s; rm %s 5455 6649 .sp 5456 6650 For printing = CUPS : If SAMBA is compiled against libcups, then 5457 printcap = cups uses the CUPS API to submit jobs, etc. Otherwise it maps to the System V commands with the -oraw option for printing, i.e. it uses 5458 lp -c -d%p -oraw; rm %s. With 5459 printing = cups, and if SAMBA is compiled against libcups, any manually set print command will be ignored. 5460 .sp 5461 \fBNo default\fR 5462 .sp 5463 Example: 5464 \fB\fIprint command\fR = /usr/local/samba/bin/myprintscript %p %s \fR 5465 .RE 5466 .PP 6651 \fIprintcap = cups\fR 6652 uses the CUPS API to submit jobs, etc\. Otherwise it maps to the System V commands with the \-oraw option for printing, i\.e\. it uses 6653 lp \-c \-d%p \-oraw; rm %s\. With 6654 printing = cups, and if SAMBA is compiled against libcups, any manually set print command will be ignored\. 6655 .sp 6656 \fINo default\fR 6657 .sp 6658 Example: 6659 \fI\fIprint command\fR\fR\fI = \fR\fI/usr/local/samba/bin/myprintscript %p %s\fR\fI \fR 6660 .RE 6661 5467 6662 printer admin (S) 5468 .RS 3n 5469 This lists users who can do anything to printers via the remote administration interfaces offered by MS-RPC (usually using a NT workstation). This parameter can be set per-share or globally. Note: The root user always has admin rights. Use caution with use in the global stanza as this can cause side effects. 5470 .sp 5471 This parameter has been marked deprecated in favor of using the SePrintOperatorPrivilege and individual print security descriptors. It will be removed in a future release. 5472 .sp 5473 Default: 5474 \fB\fIprinter admin\fR = \fR 5475 .sp 5476 Example: 5477 \fB\fIprinter admin\fR = admin, @staff \fR 5478 .RE 5479 .PP 5480 printer 5481 .RS 3n 5482 This parameter is a synonym for printer name. 5483 .RE 5484 .PP 6663 .PP 6664 .RS 4 6665 This lists users who can do anything to printers via the remote administration interfaces offered by MS\-RPC (usually using a NT workstation)\. This parameter can be set per\-share or globally\. Note: The root user always has admin rights\. Use caution with use in the global stanza as this can cause side effects\. 6666 .sp 6667 This parameter has been marked deprecated in favor of using the SePrintOperatorPrivilege and individual print security descriptors\. It will be removed in a future release\. 6668 .sp 6669 Default: 6670 \fI\fIprinter admin\fR\fR\fI = \fR\fI\fR\fI \fR 6671 .sp 6672 Example: 6673 \fI\fIprinter admin\fR\fR\fI = \fR\fIadmin, @staff\fR\fI \fR 6674 .RE 6675 printer.PP 6676 .RS 4 6677 This parameter is a synonym for 6678 printer name\. 6679 .RE 6680 5485 6681 printer name (S) 5486 .RS 3n 5487 This parameter specifies the name of the printer to which print jobs spooled through a printable service will be sent. 5488 .sp 5489 If specified in the [global] section, the printer name given will be used for any printable service that does not have its own printer name specified. 6682 .PP 6683 .RS 4 6684 This parameter specifies the name of the printer to which print jobs spooled through a printable service will be sent\. 6685 .sp 6686 If specified in the [global] section, the printer name given will be used for any printable service that does not have its own printer name specified\. 5490 6687 .sp 5491 6688 The default value of the 5492 printer name may be 6689 \fIprinter name\fR 6690 may be 5493 6691 lp 5494 on many systems .5495 .sp 5496 Default: 5497 \f B\fIprinter name\fR = none\fR5498 .sp 5499 Example: 5500 \f B\fIprinter name\fR = laserwriter\fR5501 .RE 5502 .PP 6692 on many systems\. 6693 .sp 6694 Default: 6695 \fI\fIprinter name\fR\fR\fI = \fR\fInone\fR\fI \fR 6696 .sp 6697 Example: 6698 \fI\fIprinter name\fR\fR\fI = \fR\fIlaserwriter\fR\fI \fR 6699 .RE 6700 5503 6701 printing (S) 5504 .RS 3n 5505 This parameters controls how printer status information is interpreted on your system. It also affects the default values for the 6702 .PP 6703 .RS 4 6704 This parameters controls how printer status information is interpreted on your system\. It also affects the default values for the 5506 6705 \fIprint command\fR, 5507 6706 \fIlpq command\fR, … … 5509 6708 \fIlpresume command\fR, and 5510 6709 \fIlprm command\fR 5511 if specified in the [global] section .5512 .sp 5513 Currently nine printing styles are supported . They are6710 if specified in the [global] section\. 6711 .sp 6712 Currently nine printing styles are supported\. They are 5514 6713 \fBBSD\fR, 5515 6714 \fBAIX\fR, … … 5520 6719 \fBQNX\fR, 5521 6720 \fBSOFTQ\fR, and 5522 \fBCUPS\fR .6721 \fBCUPS\fR\. 5523 6722 .sp 5524 6723 To see what the defaults are for the other print commands when using the various options use the 5525 6724 \fBtestparm\fR(1) 5526 program .5527 .sp 5528 This option can be set on a per printer basis . Please be aware however, that you must place any of the various printing commands (e.g. print command, lpq command, etc...) after defining the value for the6725 program\. 6726 .sp 6727 This option can be set on a per printer basis\. Please be aware however, that you must place any of the various printing commands (e\.g\. print command, lpq command, etc\.\.\.) after defining the value for the 5529 6728 \fIprinting\fR 5530 option since it will reset the printing commands to default values .6729 option since it will reset the printing commands to default values\. 5531 6730 .sp 5532 6731 See also the discussion in the 5533 6732 [printers] 5534 section .5535 .sp 5536 \f BNo default\fR5537 .RE 5538 .PP 6733 section\. 6734 .sp 6735 \fINo default\fR 6736 .RE 6737 5539 6738 printjob username (S) 5540 .RS 3n 5541 This parameter specifies which user information will be passed to the printing system. Usually, the username is sent, but in some cases, e.g. the domain prefix is useful, too. 5542 .sp 5543 Default: 5544 \fB\fIprintjob username\fR = %U \fR 5545 .sp 5546 Example: 5547 \fB\fIprintjob username\fR = %D\\%U \fR 5548 .RE 5549 .PP 6739 .PP 6740 .RS 4 6741 This parameter specifies which user information will be passed to the printing system\. Usually, the username is sent, but in some cases, e\.g\. the domain prefix is useful, too\. 6742 .sp 6743 Default: 6744 \fI\fIprintjob username\fR\fR\fI = \fR\fI%U\fR\fI \fR 6745 .sp 6746 Example: 6747 \fI\fIprintjob username\fR\fR\fI = \fR\fI%D\e%U\fR\fI \fR 6748 .RE 6749 5550 6750 private dir (G) 5551 .RS 3n 6751 .PP 6752 .RS 4 5552 6753 This parameters defines the directory smbd will use for storing such files as 5553 6754 \fIsmbpasswd\fR 5554 6755 and 5555 \fIsecrets .tdb\fR.5556 .sp 5557 Default: 5558 \f B\fIprivate dir\fR = ${prefix}/private\fR5559 .RE 5560 .PP 6756 \fIsecrets\.tdb\fR\. 6757 .sp 6758 Default: 6759 \fI\fIprivate dir\fR\fR\fI = \fR\fI${prefix}/private\fR\fI \fR 6760 .RE 6761 5561 6762 profile acls (S) 5562 .RS 3n 5563 This boolean parameter was added to fix the problems that people have been having with storing user profiles on Samba shares from Windows 2000 or Windows XP clients. New versions of Windows 2000 or Windows XP service packs do security ACL checking on the owner and ability to write of the profile directory stored on a local workstation when copied from a Samba share. 5564 .sp 5565 When not in domain mode with winbindd then the security info copied onto the local workstation has no meaning to the logged in user (SID) on that workstation so the profile storing fails. Adding this parameter onto a share used for profile storage changes two things about the returned Windows ACL. Firstly it changes the owner and group owner of all reported files and directories to be BUILTIN\\Administrators, BUILTIN\\Users respectively (SIDs S-1-5-32-544, S-1-5-32-545). Secondly it adds an ACE entry of "Full Control" to the SID BUILTIN\\Users to every returned ACL. This will allow any Windows 2000 or XP workstation user to access the profile. 5566 .sp 5567 Note that if you have multiple users logging on to a workstation then in order to prevent them from being able to access each others profiles you must remove the "Bypass traverse checking" advanced user right. This will prevent access to other users profile directories as the top level profile directory (named after the user) is created by the workstation profile code and has an ACL restricting entry to the directory tree to the owning user. 5568 .sp 5569 Default: 5570 \fB\fIprofile acls\fR = no \fR 5571 .RE 5572 .PP 6763 .PP 6764 .RS 4 6765 This boolean parameter was added to fix the problems that people have been having with storing user profiles on Samba shares from Windows 2000 or Windows XP clients\. New versions of Windows 2000 or Windows XP service packs do security ACL checking on the owner and ability to write of the profile directory stored on a local workstation when copied from a Samba share\. 6766 .sp 6767 When not in domain mode with winbindd then the security info copied onto the local workstation has no meaning to the logged in user (SID) on that workstation so the profile storing fails\. Adding this parameter onto a share used for profile storage changes two things about the returned Windows ACL\. Firstly it changes the owner and group owner of all reported files and directories to be BUILTIN\e\eAdministrators, BUILTIN\e\eUsers respectively (SIDs S\-1\-5\-32\-544, S\-1\-5\-32\-545)\. Secondly it adds an ACE entry of "Full Control" to the SID BUILTIN\e\eUsers to every returned ACL\. This will allow any Windows 2000 or XP workstation user to access the profile\. 6768 .sp 6769 Note that if you have multiple users logging on to a workstation then in order to prevent them from being able to access each others profiles you must remove the "Bypass traverse checking" advanced user right\. This will prevent access to other users profile directories as the top level profile directory (named after the user) is created by the workstation profile code and has an ACL restricting entry to the directory tree to the owning user\. 6770 .sp 6771 Default: 6772 \fI\fIprofile acls\fR\fR\fI = \fR\fIno\fR\fI \fR 6773 .RE 6774 5573 6775 queuepause command (S) 5574 .RS 3n 5575 This parameter specifies the command to be executed on the server host in order to pause the printer queue. 5576 .sp 5577 This command should be a program or script which takes a printer name as its only parameter and stops the printer queue, such that no longer jobs are submitted to the printer. 5578 .sp 5579 This command is not supported by Windows for Workgroups, but can be issued from the Printers window under Windows 95 and NT. 6776 .PP 6777 .RS 4 6778 This parameter specifies the command to be executed on the server host in order to pause the printer queue\. 6779 .sp 6780 This command should be a program or script which takes a printer name as its only parameter and stops the printer queue, such that no longer jobs are submitted to the printer\. 6781 .sp 6782 This command is not supported by Windows for Workgroups, but can be issued from the Printers window under Windows 95 and NT\. 5580 6783 .sp 5581 6784 If a 5582 6785 \fI%p\fR 5583 is given then the printer name is put in its place . Otherwise it is placed at the end of the command.5584 .sp 5585 Note that it is good practice to include the absolute path in the command as the PATH may not be available to the server .5586 .sp 5587 \f BNo default\fR5588 .sp 5589 Example: 5590 \f B\fIqueuepause command\fR = disable %p\fR5591 .RE 5592 .PP 6786 is given then the printer name is put in its place\. Otherwise it is placed at the end of the command\. 6787 .sp 6788 Note that it is good practice to include the absolute path in the command as the PATH may not be available to the server\. 6789 .sp 6790 \fINo default\fR 6791 .sp 6792 Example: 6793 \fI\fIqueuepause command\fR\fR\fI = \fR\fIdisable %p\fR\fI \fR 6794 .RE 6795 5593 6796 queueresume command (S) 5594 .RS 3n 5595 This parameter specifies the command to be executed on the server host in order to resume the printer queue. It is the command to undo the behavior that is caused by the previous parameter (queuepause command). 5596 .sp 5597 This command should be a program or script which takes a printer name as its only parameter and resumes the printer queue, such that queued jobs are resubmitted to the printer. 5598 .sp 5599 This command is not supported by Windows for Workgroups, but can be issued from the Printers window under Windows 95 and NT. 6797 .PP 6798 .RS 4 6799 This parameter specifies the command to be executed on the server host in order to resume the printer queue\. It is the command to undo the behavior that is caused by the previous parameter (\fIqueuepause command\fR)\. 6800 .sp 6801 This command should be a program or script which takes a printer name as its only parameter and resumes the printer queue, such that queued jobs are resubmitted to the printer\. 6802 .sp 6803 This command is not supported by Windows for Workgroups, but can be issued from the Printers window under Windows 95 and NT\. 5600 6804 .sp 5601 6805 If a 5602 6806 \fI%p\fR 5603 is given then the printer name is put in its place . Otherwise it is placed at the end of the command.5604 .sp 5605 Note that it is good practice to include the absolute path in the command as the PATH may not be available to the server .5606 .sp 5607 Default: 5608 \f B\fIqueueresume command\fR =\fR5609 .sp 5610 Example: 5611 \f B\fIqueueresume command\fR = enable %p\fR5612 .RE 5613 .PP 6807 is given then the printer name is put in its place\. Otherwise it is placed at the end of the command\. 6808 .sp 6809 Note that it is good practice to include the absolute path in the command as the PATH may not be available to the server\. 6810 .sp 6811 Default: 6812 \fI\fIqueueresume command\fR\fR\fI = \fR\fI\fR\fI \fR 6813 .sp 6814 Example: 6815 \fI\fIqueueresume command\fR\fR\fI = \fR\fIenable %p\fR\fI \fR 6816 .RE 6817 5614 6818 read bmpx (G) 5615 .RS 3n 6819 .PP 6820 .RS 4 5616 6821 This boolean parameter controls whether 5617 6822 \fBsmbd\fR(8) 5618 will support the "Read Block Multiplex" SMB . This is now rarely used and defaults to5619 \fBno\fR . You should never need to set this parameter.5620 .sp 5621 Default: 5622 \f B\fIread bmpx\fR = no\fR5623 .RE 5624 .PP 6823 will support the "Read Block Multiplex" SMB\. This is now rarely used and defaults to 6824 \fBno\fR\. You should never need to set this parameter\. 6825 .sp 6826 Default: 6827 \fI\fIread bmpx\fR\fR\fI = \fR\fIno\fR\fI \fR 6828 .RE 6829 5625 6830 read list (S) 5626 .RS 3n 5627 This is a list of users that are given read-only access to a service. If the connecting user is in this list then they will not be given write access, no matter what the 5628 read only option is set to. The list can include group names using the syntax described in the 5629 invalid users parameter. 6831 .PP 6832 .RS 4 6833 This is a list of users that are given read\-only access to a service\. If the connecting user is in this list then they will not be given write access, no matter what the 6834 \fIread only\fR 6835 option is set to\. The list can include group names using the syntax described in the 6836 \fIinvalid users\fR 6837 parameter\. 5630 6838 .sp 5631 6839 This parameter will not work with the 5632 security = share in Samba 3.0. This is by design. 5633 .sp 5634 Default: 5635 \fB\fIread list\fR = \fR 5636 .sp 5637 Example: 5638 \fB\fIread list\fR = mary, @students \fR 5639 .RE 5640 .PP 6840 \fIsecurity = share\fR 6841 in Samba 3\.0\. This is by design\. 6842 .sp 6843 Default: 6844 \fI\fIread list\fR\fR\fI = \fR\fI\fR\fI \fR 6845 .sp 6846 Example: 6847 \fI\fIread list\fR\fR\fI = \fR\fImary, @students\fR\fI \fR 6848 .RE 6849 5641 6850 read only (S) 5642 .RS 3n 6851 .PP 6852 .RS 4 5643 6853 An inverted synonym is 5644 writeable.6854 \fIwriteable\fR\. 5645 6855 .sp 5646 6856 If this parameter is 5647 \fByes\fR, then users of a service may not create or modify files in the service 's directory.6857 \fByes\fR, then users of a service may not create or modify files in the service\'s directory\. 5648 6858 .sp 5649 6859 Note that a printable service (printable = yes) will 5650 \f BALWAYS\fR5651 allow writing to the directory (user privileges permitting), but only via spooling operations .5652 .sp 5653 Default: 5654 \f B\fIread only\fR = yes\fR5655 .RE 5656 .PP 6860 \fIALWAYS\fR 6861 allow writing to the directory (user privileges permitting), but only via spooling operations\. 6862 .sp 6863 Default: 6864 \fI\fIread only\fR\fR\fI = \fR\fIyes\fR\fI \fR 6865 .RE 6866 5657 6867 read raw (G) 5658 .RS 3n 5659 This parameter controls whether or not the server will support the raw read SMB requests when transferring data to clients. 5660 .sp 5661 If enabled, raw reads allow reads of 65535 bytes in one packet. This typically provides a major performance benefit. 5662 .sp 5663 However, some clients either negotiate the allowable block size incorrectly or are incapable of supporting larger block sizes, and for these clients you may need to disable raw reads. 5664 .sp 5665 In general this parameter should be viewed as a system tuning tool and left severely alone. 5666 .sp 5667 Default: 5668 \fB\fIread raw\fR = yes \fR 5669 .RE 5670 .PP 6868 .PP 6869 .RS 4 6870 This parameter controls whether or not the server will support the raw read SMB requests when transferring data to clients\. 6871 .sp 6872 If enabled, raw reads allow reads of 65535 bytes in one packet\. This typically provides a major performance benefit\. 6873 .sp 6874 However, some clients either negotiate the allowable block size incorrectly or are incapable of supporting larger block sizes, and for these clients you may need to disable raw reads\. 6875 .sp 6876 In general this parameter should be viewed as a system tuning tool and left severely alone\. 6877 .sp 6878 Default: 6879 \fI\fIread raw\fR\fR\fI = \fR\fIyes\fR\fI \fR 6880 .RE 6881 5671 6882 realm (G) 5672 .RS 3n 5673 This option specifies the kerberos realm to use. The realm is used as the ADS equivalent of the NT4 5674 domain. It is usually set to the DNS name of the kerberos server. 5675 .sp 5676 Default: 5677 \fB\fIrealm\fR = \fR 5678 .sp 5679 Example: 5680 \fB\fIrealm\fR = mysambabox.mycompany.com \fR 5681 .RE 5682 .PP 6883 .PP 6884 .RS 4 6885 This option specifies the kerberos realm to use\. The realm is used as the ADS equivalent of the NT4 6886 domain\. It is usually set to the DNS name of the kerberos server\. 6887 .sp 6888 Default: 6889 \fI\fIrealm\fR\fR\fI = \fR\fI\fR\fI \fR 6890 .sp 6891 Example: 6892 \fI\fIrealm\fR\fR\fI = \fR\fImysambabox\.mycompany\.com\fR\fI \fR 6893 .RE 6894 5683 6895 remote announce (G) 5684 .RS 3n 6896 .PP 6897 .RS 4 5685 6898 This option allows you to setup 5686 \fBnmbd\fR(8)to periodically announce itself to arbitrary IP addresses with an arbitrary workgroup name .5687 .sp 5688 This is useful if you want your Samba server to appear in a remote workgroup for which the normal browse propagation rules don 't work. The remote workgroup can be anywhere that you can send IP packets to.6899 \fBnmbd\fR(8)to periodically announce itself to arbitrary IP addresses with an arbitrary workgroup name\. 6900 .sp 6901 This is useful if you want your Samba server to appear in a remote workgroup for which the normal browse propagation rules don\'t work\. The remote workgroup can be anywhere that you can send IP packets to\. 5689 6902 .sp 5690 6903 For example: 5691 5692 .sp 5693 6904 .sp 6905 .RS 4 5694 6906 .nf 5695 5696 remote announce = 192.168.2.255/SERVERS 192.168.4.255/STAFF 5697 6907 remote announce = 192\.168\.2\.255/SERVERS 192\.168\.4\.255/STAFF 5698 6908 .fi 6909 .RE 6910 .sp 5699 6911 the above line would cause 5700 6912 nmbd 5701 to announce itself to the two given IP addresses using the given workgroup names. If you leave out the workgroup name then the one given in the 5702 workgroup parameter is used instead. 5703 .sp 5704 The IP addresses you choose would normally be the broadcast addresses of the remote networks, but can also be the IP addresses of known browse masters if your network config is that stable. 5705 .sp 5706 See the chapter on Network Browsing in the Samba-HOWTO book. 5707 .sp 5708 Default: 5709 \fB\fIremote announce\fR = \fR 5710 .RE 5711 .PP 6913 to announce itself to the two given IP addresses using the given workgroup names\. If you leave out the workgroup name then the one given in the 6914 \fIworkgroup\fR 6915 parameter is used instead\. 6916 .sp 6917 The IP addresses you choose would normally be the broadcast addresses of the remote networks, but can also be the IP addresses of known browse masters if your network config is that stable\. 6918 .sp 6919 See the chapter on Network Browsing in the Samba\-HOWTO book\. 6920 .sp 6921 Default: 6922 \fI\fIremote announce\fR\fR\fI = \fR\fI\fR\fI \fR 6923 .RE 6924 5712 6925 remote browse sync (G) 5713 .RS 3n 6926 .PP 6927 .RS 4 5714 6928 This option allows you to setup 5715 6929 \fBnmbd\fR(8) 5716 to periodically request synchronization of browse lists with the master browser of a Samba server that is on a remote segment . This option will allow you to gain browse lists for multiple workgroups across routed networks. This is done in a manner that does not work with any non-Samba servers.5717 .sp 5718 This is useful if you want your Samba server and all local clients to appear in a remote workgroup for which the normal browse propagation rules don 't work. The remote workgroup can be anywhere that you can send IP packets to.6930 to periodically request synchronization of browse lists with the master browser of a Samba server that is on a remote segment\. This option will allow you to gain browse lists for multiple workgroups across routed networks\. This is done in a manner that does not work with any non\-Samba servers\. 6931 .sp 6932 This is useful if you want your Samba server and all local clients to appear in a remote workgroup for which the normal browse propagation rules don\'t work\. The remote workgroup can be anywhere that you can send IP packets to\. 5719 6933 .sp 5720 6934 For example: 5721 5722 .sp 5723 6935 .sp 6936 .RS 4 5724 6937 .nf 5725 5726 \fIremote browse sync = 192.168.2.255 192.168.4.255\fR 5727 6938 \fIremote browse sync = 192\.168\.2\.255 192\.168\.4\.255\fR 5728 6939 .fi 6940 .RE 6941 .sp 5729 6942 the above line would cause 5730 6943 nmbd 5731 to request the master browser on the specified subnets or addresses to synchronize their browse lists with the local server .5732 .sp 5733 The IP addresses you choose would normally be the broadcast addresses of the remote networks, but can also be the IP addresses of known browse masters if your network config is that stable . If a machine IP address is given Samba makes NO attempt to validate that the remote machine is available, is listening, nor that it is in fact the browse master on its segment.6944 to request the master browser on the specified subnets or addresses to synchronize their browse lists with the local server\. 6945 .sp 6946 The IP addresses you choose would normally be the broadcast addresses of the remote networks, but can also be the IP addresses of known browse masters if your network config is that stable\. If a machine IP address is given Samba makes NO attempt to validate that the remote machine is available, is listening, nor that it is in fact the browse master on its segment\. 5734 6947 .sp 5735 6948 The 5736 remote browse sync may be used on networks where there is no WINS server, and may be used on disjoint networks where each network has its own WINS server. 5737 .sp 5738 Default: 5739 \fB\fIremote browse sync\fR = \fR 5740 .RE 5741 .PP 6949 \fIremote browse sync\fR 6950 may be used on networks where there is no WINS server, and may be used on disjoint networks where each network has its own WINS server\. 6951 .sp 6952 Default: 6953 \fI\fIremote browse sync\fR\fR\fI = \fR\fI\fR\fI \fR 6954 .RE 6955 5742 6956 rename user script (G) 5743 .RS 3n 6957 .PP 6958 .RS 4 5744 6959 This is the full pathname to a script that will be run as root by 5745 6960 \fBsmbd\fR(8) 5746 under special circumstances described below .5747 .sp 5748 When a user with admin authority or SeAddUserPrivilege rights renames a user (e .g.: from the NT4 User Manager for Domains), this script will be run to rename the POSIX user. Two variables,6961 under special circumstances described below\. 6962 .sp 6963 When a user with admin authority or SeAddUserPrivilege rights renames a user (e\.g\.: from the NT4 User Manager for Domains), this script will be run to rename the POSIX user\. Two variables, 5749 6964 %uold 5750 6965 and 5751 %unew, will be substituted with the old and new usernames, respectively . The script should return 0 upon successful completion, and nonzero otherwise.6966 %unew, will be substituted with the old and new usernames, respectively\. The script should return 0 upon successful completion, and nonzero otherwise\. 5752 6967 .sp 5753 6968 .it 1 an-trap … … 5755 6970 .nr an-break-flag 1 5756 6971 .br 5757 \fBNote\fR 5758 The script has all responsibility to rename all the necessary data that is accessible in this posix method. This can mean different requirements for different backends. The tdbsam and smbpasswd backends will take care of the contents of their respective files, so the script is responsible only for changing the POSIX username, and other data that may required for your circumstances, such as home directory. Please also consider whether or not you need to rename the actual home directories themselves. The ldapsam backend will not make any changes, because of the potential issues with renaming the LDAP naming attribute. In this case the script is responsible for changing the attribute that samba uses (uid) for locating users, as well as any data that needs to change for other applications using the same directory. 5759 Default: 5760 \fB\fIrename user script\fR = no \fR 5761 .RE 5762 .PP 6972 Note 6973 The script has all responsibility to rename all the necessary data that is accessible in this posix method\. This can mean different requirements for different backends\. The tdbsam and smbpasswd backends will take care of the contents of their respective files, so the script is responsible only for changing the POSIX username, and other data that may required for your circumstances, such as home directory\. Please also consider whether or not you need to rename the actual home directories themselves\. The ldapsam backend will not make any changes, because of the potential issues with renaming the LDAP naming attribute\. In this case the script is responsible for changing the attribute that samba uses (uid) for locating users, as well as any data that needs to change for other applications using the same directory\. 6974 6975 Default: 6976 \fI\fIrename user script\fR\fR\fI = \fR\fIno\fR\fI \fR 6977 .RE 6978 5763 6979 reset on zero vc (G) 5764 .RS 3n 5765 This boolean option controls whether an incoming session setup should kill other connections coming from the same IP. This matches the default Windows 2003 behaviour. Setting this parameter to yes becomes necessary when you have a flaky network and windows decides to reconnect while the old connection still has files with share modes open. These files become inaccessible over the new connection. The client sends a zero VC on the new connection, and Windows 2003 kills all other connections coming from the same IP. This way the locked files are accessible again. Please be aware that enabling this option will kill connections behind a masquerading router. 5766 .sp 5767 Default: 5768 \fB\fIreset on zero vc\fR = no \fR 5769 .RE 5770 .PP 6980 .PP 6981 .RS 4 6982 This boolean option controls whether an incoming session setup should kill other connections coming from the same IP\. This matches the default Windows 2003 behaviour\. Setting this parameter to yes becomes necessary when you have a flaky network and windows decides to reconnect while the old connection still has files with share modes open\. These files become inaccessible over the new connection\. The client sends a zero VC on the new connection, and Windows 2003 kills all other connections coming from the same IP\. This way the locked files are accessible again\. Please be aware that enabling this option will kill connections behind a masquerading router\. 6983 .sp 6984 Default: 6985 \fI\fIreset on zero vc\fR\fR\fI = \fR\fIno\fR\fI \fR 6986 .RE 6987 5771 6988 restrict anonymous (G) 5772 . RS 3n5773 The setting of this parameter determines whether user and group list information is returned for an anonymous connection. and mirrors the effects of the 5774 5775 .sp 5776 6989 .PP 6990 .RS 4 6991 The setting of this parameter determines whether user and group list information is returned for an anonymous connection\. and mirrors the effects of the 6992 .sp 6993 .RS 4 5777 6994 .nf 5778 5779 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ 5780 Control\LSA\RestrictAnonymous 5781 6995 HKEY_LOCAL_MACHINE\eSYSTEM\eCurrentControlSet\e 6996 Control\eLSA\eRestrictAnonymous 5782 6997 .fi 5783 registry key in Windows 2000 and Windows NT. When set to 0, user and group list information is returned to anyone who asks. When set to 1, only an authenticated user can retrive user and group list information. For the value 2, supported by Windows 2000/XP and Samba, no anonymous connections are allowed at all. This can break third party and Microsoft applications which expect to be allowed to perform operations anonymously. 5784 .sp 5785 The security advantage of using restrict anonymous = 1 is dubious, as user and group list information can be obtained using other means. 6998 .RE 6999 .sp 7000 registry key in Windows 2000 and Windows NT\. When set to 0, user and group list information is returned to anyone who asks\. When set to 1, only an authenticated user can retrive user and group list information\. For the value 2, supported by Windows 2000/XP and Samba, no anonymous connections are allowed at all\. This can break third party and Microsoft applications which expect to be allowed to perform operations anonymously\. 7001 .sp 7002 The security advantage of using restrict anonymous = 1 is dubious, as user and group list information can be obtained using other means\. 5786 7003 .sp 5787 7004 .it 1 an-trap … … 5789 7006 .nr an-break-flag 1 5790 7007 .br 5791 \fBNote\fR 7008 Note 5792 7009 The security advantage of using restrict anonymous = 2 is removed by setting 5793 guest ok = yes on any share. 5794 Default: 5795 \fB\fIrestrict anonymous\fR = 0 \fR 5796 .RE 5797 .PP 5798 root 5799 .RS 3n 5800 This parameter is a synonym for root directory. 5801 .RE 5802 .PP 5803 root dir 5804 .RS 3n 5805 This parameter is a synonym for root directory. 5806 .RE 5807 .PP 7010 \fIguest ok = yes\fR 7011 on any share\. 7012 7013 Default: 7014 \fI\fIrestrict anonymous\fR\fR\fI = \fR\fI0\fR\fI \fR 7015 .RE 7016 root.PP 7017 .RS 4 7018 This parameter is a synonym for 7019 root directory\. 7020 .RE 7021 root dir.PP 7022 .RS 4 7023 This parameter is a synonym for 7024 root directory\. 7025 .RE 7026 5808 7027 root directory (G) 5809 .RS 3n 7028 .PP 7029 .RS 4 5810 7030 The server will 5811 7031 chroot() 5812 (i.e. Change its root directory) to this directory on startup. This is not strictly necessary for secure operation. Even without it the server will deny access to files not in one of the service entries. It may also check for, and deny access to, soft links to other parts of the filesystem, or attempts to use ".." in file names to access other directories (depending on the setting of the 5813 wide smbconfoptions parameter). 7032 (i\.e\. Change its root directory) to this directory on startup\. This is not strictly necessary for secure operation\. Even without it the server will deny access to files not in one of the service entries\. It may also check for, and deny access to, soft links to other parts of the filesystem, or attempts to use "\.\." in file names to access other directories (depending on the setting of the 7033 \fIwide smbconfoptions\fR 7034 parameter)\. 5814 7035 .sp 5815 7036 Adding a 5816 7037 \fIroot directory\fR 5817 entry other than "/" adds an extra level of security, but at a price . It absolutely ensures that no access is given to files not in the sub-tree specified in the7038 entry other than "/" adds an extra level of security, but at a price\. It absolutely ensures that no access is given to files not in the sub\-tree specified in the 5818 7039 \fIroot directory\fR 5819 7040 option, 5820 \f Bincluding\fR5821 some files needed for complete operation of the server . To maintain full operability of the server you will need to mirror some system files into the7041 \fIincluding\fR 7042 some files needed for complete operation of the server\. To maintain full operability of the server you will need to mirror some system files into the 5822 7043 \fIroot directory\fR 5823 tree . In particular you will need to mirror7044 tree\. In particular you will need to mirror 5824 7045 \fI/etc/passwd\fR 5825 (or a subset of it), and any binaries or configuration files needed for printing (if required) . The set of files that must be mirrored is operating system dependent.5826 .sp 5827 Default: 5828 \f B\fIroot directory\fR = /\fR5829 .sp 5830 Example: 5831 \f B\fIroot directory\fR = /homes/smb\fR5832 .RE 5833 .PP 7046 (or a subset of it), and any binaries or configuration files needed for printing (if required)\. The set of files that must be mirrored is operating system dependent\. 7047 .sp 7048 Default: 7049 \fI\fIroot directory\fR\fR\fI = \fR\fI/\fR\fI \fR 7050 .sp 7051 Example: 7052 \fI\fIroot directory\fR\fR\fI = \fR\fI/homes/smb\fR\fI \fR 7053 .RE 7054 5834 7055 root postexec (S) 5835 .RS 3n 7056 .PP 7057 .RS 4 5836 7058 This is the same as the 5837 7059 \fIpostexec\fR 5838 parameter except that the command is run as root. This is useful for unmounting filesystems (such as CDROMs) after a connection is closed. 5839 .sp 5840 Default: 5841 \fB\fIroot postexec\fR = \fR 5842 .RE 5843 .PP 7060 parameter except that the command is run as root\. This is useful for unmounting filesystems (such as CDROMs) after a connection is closed\. 7061 .sp 7062 Default: 7063 \fI\fIroot postexec\fR\fR\fI = \fR\fI\fR\fI \fR 7064 .RE 7065 7066 root preexec close (S) 7067 .PP 7068 .RS 4 7069 This is the same as the 7070 \fIpreexec close \fR 7071 parameter except that the command is run as root\. 7072 .sp 7073 Default: 7074 \fI\fIroot preexec close\fR\fR\fI = \fR\fIno\fR\fI \fR 7075 .RE 7076 5844 7077 root preexec (S) 5845 .RS 3n 7078 .PP 7079 .RS 4 5846 7080 This is the same as the 5847 7081 \fIpreexec\fR 5848 parameter except that the command is run as root. This is useful for mounting filesystems (such as CDROMs) when a connection is opened. 5849 .sp 5850 Default: 5851 \fB\fIroot preexec\fR = \fR 5852 .RE 5853 .PP 5854 root preexec close (S) 5855 .RS 3n 5856 This is the same as the 5857 \fIpreexec close \fR 5858 parameter except that the command is run as root. 5859 .sp 5860 Default: 5861 \fB\fIroot preexec close\fR = no \fR 5862 .RE 5863 .PP 7082 parameter except that the command is run as root\. This is useful for mounting filesystems (such as CDROMs) when a connection is opened\. 7083 .sp 7084 Default: 7085 \fI\fIroot preexec\fR\fR\fI = \fR\fI\fR\fI \fR 7086 .RE 7087 7088 security mask (S) 7089 .PP 7090 .RS 4 7091 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box\. 7092 .sp 7093 This parameter is applied as a mask (AND\'ed with) to the incoming permission bits, thus resetting any bits not in this mask\. Make sure not to mix up this parameter with 7094 \fIforce security mode\fR, which works in a manner similar to this one but uses a logical OR instead of an AND\. 7095 .sp 7096 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the file permissions regardless of the previous status of this bits on the file\. 7097 .sp 7098 If not set explicitly this parameter is 0777, allowing a user to set all the user/group/world permissions on a file\. 7099 .sp 7100 \fI Note\fR 7101 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\. Administrators of most normal systems will probably want to leave it set to 7102 \fB0777\fR\. 7103 .sp 7104 Default: 7105 \fI\fIsecurity mask\fR\fR\fI = \fR\fI0777\fR\fI \fR 7106 .sp 7107 Example: 7108 \fI\fIsecurity mask\fR\fR\fI = \fR\fI0770\fR\fI \fR 7109 .RE 7110 5864 7111 security (G) 5865 .RS 3n 7112 .PP 7113 .RS 4 5866 7114 This option affects how clients respond to Samba and is one of the most important settings in the 5867 \fI smb .conf\fR5868 file .7115 \fI smb\.conf\fR 7116 file\. 5869 7117 .sp 5870 7118 The option sets the "security mode bit" in replies to protocol negotiations with 5871 7119 \fBsmbd\fR(8) 5872 to turn share level security on or off . Clients decide based on this bit whether (and how) to transfer user and password information to the server.7120 to turn share level security on or off\. Clients decide based on this bit whether (and how) to transfer user and password information to the server\. 5873 7121 .sp 5874 7122 The default is 5875 security = user, as this is the most common setting needed when talking to Windows 98 and Windows NT .7123 security = user, as this is the most common setting needed when talking to Windows 98 and Windows NT\. 5876 7124 .sp 5877 7125 The alternatives are … … 5879 7127 security = server 5880 7128 or 5881 security = domain .5882 .sp 5883 In versions of Samba prior to 2 .0.0, the default was7129 security = domain\. 7130 .sp 7131 In versions of Samba prior to 2\.0\.0, the default was 5884 7132 security = share 5885 mainly because that was the only option at one stage .5886 .sp 5887 There is a bug in WfWg that has relevance to this setting . When in user or server level security a WfWg client will totally ignore the username and password you type in the "connect drive" dialog box. This makes it very difficult (if not impossible) to connect to a Samba service as anyone except the user that you are logged into WfWg as.7133 mainly because that was the only option at one stage\. 7134 .sp 7135 There is a bug in WfWg that has relevance to this setting\. When in user or server level security a WfWg client will totally ignore the username and password you type in the "connect drive" dialog box\. This makes it very difficult (if not impossible) to connect to a Samba service as anyone except the user that you are logged into WfWg as\. 5888 7136 .sp 5889 7137 If your PCs use usernames that are the same as their usernames on the UNIX machine then you will want to use 5890 security = user . If you mostly use usernames that don't exist on the UNIX box then use5891 security = share .7138 security = user\. If you mostly use usernames that don\'t exist on the UNIX box then use 7139 security = share\. 5892 7140 .sp 5893 7141 You should also use 5894 7142 security = share 5895 if you want to mainly setup shares without a password (guest shares) . This is commonly used for a shared printer server. It is more difficult to setup guest shares with7143 if you want to mainly setup shares without a password (guest shares)\. This is commonly used for a shared printer server\. It is more difficult to setup guest shares with 5896 7144 security = user, see the 5897 map to guestparameter for details.7145 \fImap to guest\fRparameter for details\. 5898 7146 .sp 5899 7147 It is possible to use 5900 7148 smbd 5901 7149 in a 5902 \f Bhybrid mode\fR7150 \fI hybrid mode\fR 5903 7151 where it is offers both user and share level security under different 5904 NetBIOS aliases.5905 .sp 5906 The different settings will now be explained .5907 .sp 5908 \f BSECURITY = SHARE\fR7152 \fINetBIOS aliases\fR\. 7153 .sp 7154 The different settings will now be explained\. 7155 .sp 7156 \fISECURITY = SHARE\fR 5909 7157 .sp 5910 7158 When clients connect to a share level security server they need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a 5911 7159 security = share 5912 server) . Instead, the clients send authentication information (passwords) on a per-share basis, at the time they attempt to connect to that share.7160 server)\. Instead, the clients send authentication information (passwords) on a per\-share basis, at the time they attempt to connect to that share\. 5913 7161 .sp 5914 7162 Note that 5915 7163 smbd 5916 \f BALWAYS\fR7164 \fIALWAYS\fR 5917 7165 uses a valid UNIX user to act on behalf of the client, even in 5918 7166 security = share 5919 level security .7167 level security\. 5920 7168 .sp 5921 7169 As clients are not required to send a username to the server in share level security, 5922 7170 smbd 5923 uses several techniques to determine the correct UNIX user to use on behalf of the client .7171 uses several techniques to determine the correct UNIX user to use on behalf of the client\. 5924 7172 .sp 5925 7173 A list of possible UNIX usernames to match with the given client password is constructed using the following methods : 5926 .RS 3n 5927 .TP 3n 5928 \(bu 5929 If the 5930 guest only parameter is set, then all the other stages are missed and only the 5931 guest account username is checked. 5932 .TP 3n 5933 \(bu 5934 Is a username is sent with the share connection request, then this username (after mapping - see 5935 username map), is added as a potential username. 5936 .TP 3n 5937 \(bu 5938 If the client did a previous 5939 \fBlogon \fR 5940 request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username. 5941 .TP 3n 5942 \(bu 5943 The name of the service the client requested is added as a potential username. 5944 .TP 3n 5945 \(bu 5946 The NetBIOS name of the client is added to the list as a potential username. 5947 .TP 3n 5948 \(bu 5949 Any users on the 5950 user list are added as potential usernames. 5951 .RE 5952 .IP "" 3n 7174 .sp 7175 .RS 4 7176 .ie n \{\ 7177 \h'-04'\(bu\h'+03'\c 7178 .\} 7179 .el \{\ 7180 .sp -1 7181 .IP \(bu 2.3 7182 .\} 5953 7183 If the 5954 7184 \fIguest only\fR 5955 parameter is not set, then this list is then tried with the supplied password. The first user for whom the password matches will be used as the UNIX user. 7185 parameter is set, then all the other stages are missed and only the 7186 \fIguest account\fR 7187 username is checked\. 7188 .RE 7189 .sp 7190 .RS 4 7191 .ie n \{\ 7192 \h'-04'\(bu\h'+03'\c 7193 .\} 7194 .el \{\ 7195 .sp -1 7196 .IP \(bu 2.3 7197 .\} 7198 Is a username is sent with the share connection request, then this username (after mapping \- see 7199 \fIusername map\fR), is added as a potential username\. 7200 .RE 7201 .sp 7202 .RS 4 7203 .ie n \{\ 7204 \h'-04'\(bu\h'+03'\c 7205 .\} 7206 .el \{\ 7207 .sp -1 7208 .IP \(bu 2.3 7209 .\} 7210 If the client did a previous 7211 \fIlogon \fR 7212 request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username\. 7213 .RE 7214 .sp 7215 .RS 4 7216 .ie n \{\ 7217 \h'-04'\(bu\h'+03'\c 7218 .\} 7219 .el \{\ 7220 .sp -1 7221 .IP \(bu 2.3 7222 .\} 7223 The name of the service the client requested is added as a potential username\. 7224 .RE 7225 .sp 7226 .RS 4 7227 .ie n \{\ 7228 \h'-04'\(bu\h'+03'\c 7229 .\} 7230 .el \{\ 7231 .sp -1 7232 .IP \(bu 2.3 7233 .\} 7234 The NetBIOS name of the client is added to the list as a potential username\. 7235 .RE 7236 .sp 7237 .RS 4 7238 .ie n \{\ 7239 \h'-04'\(bu\h'+03'\c 7240 .\} 7241 .el \{\ 7242 .sp -1 7243 .IP \(bu 2.3 7244 .\} 7245 Any users on the 7246 \fIuser\fR 7247 list are added as potential usernames\. 7248 .sp 7249 .RE 7250 If the 7251 \fIguest only\fR 7252 parameter is not set, then this list is then tried with the supplied password\. The first user for whom the password matches will be used as the UNIX user\. 5956 7253 .sp 5957 7254 If the 5958 7255 \fIguest only\fR 5959 7256 parameter is set, or no username can be determined then if the share is marked as available to the 5960 \fIguest account\fR, then this guest user will be used, otherwise access is denied .7257 \fIguest account\fR, then this guest user will be used, otherwise access is denied\. 5961 7258 .sp 5962 7259 Note that it can be 5963 \f Bvery\fR5964 confusing in share -level security as to which UNIX username will eventually be used in granting access.7260 \fIvery\fR 7261 confusing in share\-level security as to which UNIX username will eventually be used in granting access\. 5965 7262 .sp 5966 7263 See also the section 5967 NOTE ABOUT USERNAME/PASSWORD VALIDATION. 5968 .sp 5969 \fBSECURITY = USER\fR 5970 .sp 5971 This is the default security setting in Samba 3.0. With user-level security a client must first "log-on" with a valid username and password (which can be mapped using the 5972 username map parameter). Encrypted passwords (see the 5973 encrypted passwords parameter) can also be used in this security mode. Parameters such as 5974 user and 5975 guest only if set are then applied and may change the UNIX user to use on this connection, but only after the user has been successfully authenticated. 5976 .sp 5977 \fBNote\fR 7264 NOTE ABOUT USERNAME/PASSWORD VALIDATION\. 7265 .sp 7266 \fISECURITY = USER\fR 7267 .sp 7268 This is the default security setting in Samba 3\.0\. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the 7269 \fIusername map\fR 7270 parameter)\. Encrypted passwords (see the 7271 \fIencrypted passwords\fR 7272 parameter) can also be used in this security mode\. Parameters such as 7273 \fIuser\fR 7274 and 7275 \fIguest only\fR 7276 if set are then applied and may change the UNIX user to use on this connection, but only after the user has been successfully authenticated\. 7277 .sp 7278 \fINote\fR 5978 7279 that the name of the resource being requested is 5979 \fBnot\fR 5980 sent to the server until after the server has successfully authenticated the client. This is why guest shares don't work in user level security without allowing the server to automatically map unknown users into the 5981 guest account. See the 5982 map to guest parameter for details on doing this. 7280 \fInot\fR 7281 sent to the server until after the server has successfully authenticated the client\. This is why guest shares don\'t work in user level security without allowing the server to automatically map unknown users into the 7282 \fIguest account\fR\. See the 7283 \fImap to guest\fR 7284 parameter for details on doing this\. 5983 7285 .sp 5984 7286 See also the section 5985 NOTE ABOUT USERNAME/PASSWORD VALIDATION .5986 .sp 5987 \f BSECURITY = DOMAIN\fR7287 NOTE ABOUT USERNAME/PASSWORD VALIDATION\. 7288 .sp 7289 \fISECURITY = DOMAIN\fR 5988 7290 .sp 5989 7291 This mode will only work correctly if 5990 7292 \fBnet\fR(8) 5991 has been used to add this machine into a Windows NT Domain. It expects the 5992 encrypted passwords parameter to be set to 5993 \fByes\fR. In this mode Samba will try to validate the username/password by passing it to a Windows NT Primary or Backup Domain Controller, in exactly the same way that a Windows NT Server would do. 5994 .sp 5995 \fBNote\fR 5996 that a valid UNIX user must still exist as well as the account on the Domain Controller to allow Samba to have a valid UNIX account to map file access to. 5997 .sp 5998 \fBNote\fR 5999 that from the client's point of view 7293 has been used to add this machine into a Windows NT Domain\. It expects the 7294 \fIencrypted passwords\fR 7295 parameter to be set to 7296 \fByes\fR\. In this mode Samba will try to validate the username/password by passing it to a Windows NT Primary or Backup Domain Controller, in exactly the same way that a Windows NT Server would do\. 7297 .sp 7298 \fINote\fR 7299 that a valid UNIX user must still exist as well as the account on the Domain Controller to allow Samba to have a valid UNIX account to map file access to\. 7300 .sp 7301 \fINote\fR 7302 that from the client\'s point of view 6000 7303 security = domain 6001 7304 is the same as 6002 security = user . It only affects how the server deals with the authentication, it does not in any way affect what the client sees.6003 .sp 6004 \f BNote\fR7305 security = user\. It only affects how the server deals with the authentication, it does not in any way affect what the client sees\. 7306 .sp 7307 \fINote\fR 6005 7308 that the name of the resource being requested is 6006 \fBnot\fR 6007 sent to the server until after the server has successfully authenticated the client. This is why guest shares don't work in user level security without allowing the server to automatically map unknown users into the 6008 guest account. See the 6009 map to guest parameter for details on doing this. 7309 \fInot\fR 7310 sent to the server until after the server has successfully authenticated the client\. This is why guest shares don\'t work in user level security without allowing the server to automatically map unknown users into the 7311 \fIguest account\fR\. See the 7312 \fImap to guest\fR 7313 parameter for details on doing this\. 6010 7314 .sp 6011 7315 See also the section 6012 NOTE ABOUT USERNAME/PASSWORD VALIDATION .7316 NOTE ABOUT USERNAME/PASSWORD VALIDATION\. 6013 7317 .sp 6014 7318 See also the 6015 password server parameter and the 6016 encrypted passwords parameter. 6017 .sp 6018 \fBSECURITY = SERVER\fR 6019 .sp 6020 In this mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box. If this fails it will revert to 6021 security = user. It expects the 6022 encrypted passwords parameter to be set to 6023 \fByes\fR, unless the remote server does not support them. However note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid 7319 \fIpassword server\fR 7320 parameter and the 7321 \fIencrypted passwords\fR 7322 parameter\. 7323 .sp 7324 \fISECURITY = SERVER\fR 7325 .sp 7326 In this mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box\. If this fails it will revert to 7327 security = user\. It expects the 7328 \fIencrypted passwords\fR 7329 parameter to be set to 7330 \fByes\fR, unless the remote server does not support them\. However note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid 6024 7331 \fIsmbpasswd\fR 6025 file to check users against . See the chapter about the User Database in the Samba HOWTO Collection for details on how to set this up.7332 file to check users against\. See the chapter about the User Database in the Samba HOWTO Collection for details on how to set this up\. 6026 7333 .sp 6027 7334 .it 1 an-trap … … 6029 7336 .nr an-break-flag 1 6030 7337 .br 6031 \fBNote\fR 6032 This mode of operation has significant pitfalls since it is more vulnerable to man -in-the-middle attacks and server impersonation. In particular, this mode of operation can cause significant resource consuption on the PDC, as it must maintain an active connection for the duration of the user's session. Furthermore, if this connection is lost, there is no way to reestablish it, and futher authentications to the Samba server may fail (from a single client, till it disconnects).7338 Note 7339 This mode of operation has significant pitfalls since it is more vulnerable to man\-in\-the\-middle attacks and server impersonation\. In particular, this mode of operation can cause significant resource consuption on the PDC, as it must maintain an active connection for the duration of the user\'s session\. Furthermore, if this connection is lost, there is no way to reestablish it, and futher authentications to the Samba server may fail (from a single client, till it disconnects)\. 6033 7340 .sp 6034 7341 .it 1 an-trap … … 6036 7343 .nr an-break-flag 1 6037 7344 .br 6038 \fBNote\fR 6039 From the client 's point of view7345 Note 7346 From the client\'s point of view 6040 7347 security = server 6041 7348 is the same as 6042 security = user. It only affects how the server deals with the authentication, it does not in any way affect what the client sees. 6043 \fBNote\fR 7349 security = user\. It only affects how the server deals with the authentication, it does not in any way affect what the client sees\. 7350 7351 \fINote\fR 6044 7352 that the name of the resource being requested is 6045 \fBnot\fR 6046 sent to the server until after the server has successfully authenticated the client. This is why guest shares don't work in user level security without allowing the server to automatically map unknown users into the 6047 guest account. See the 6048 map to guest parameter for details on doing this. 7353 \fInot\fR 7354 sent to the server until after the server has successfully authenticated the client\. This is why guest shares don\'t work in user level security without allowing the server to automatically map unknown users into the 7355 \fIguest account\fR\. See the 7356 \fImap to guest\fR 7357 parameter for details on doing this\. 6049 7358 .sp 6050 7359 See also the section 6051 NOTE ABOUT USERNAME/PASSWORD VALIDATION .7360 NOTE ABOUT USERNAME/PASSWORD VALIDATION\. 6052 7361 .sp 6053 7362 See also the 6054 password server parameter and the 6055 encrypted passwords parameter. 6056 .sp 6057 \fBSECURITY = ADS\fR 6058 .sp 6059 In this mode, Samba will act as a domain member in an ADS realm. To operate in this mode, the machine running Samba will need to have Kerberos installed and configured and Samba will need to be joined to the ADS realm using the net utility. 6060 .sp 6061 Note that this mode does NOT make Samba operate as a Active Directory Domain Controller. 6062 .sp 6063 Read the chapter about Domain Membership in the HOWTO for details. 6064 .sp 6065 Default: 6066 \fB\fIsecurity\fR = USER \fR 6067 .sp 6068 Example: 6069 \fB\fIsecurity\fR = DOMAIN \fR 6070 .RE 6071 .PP 6072 security mask (S) 6073 .RS 3n 6074 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box. 6075 .sp 6076 This parameter is applied as a mask (AND'ed with) to the changed permission bits, thus preventing any bits not in this mask from being modified. Make sure not to mix up this parameter with 6077 force security mode, which works in a manner similar to this one but uses a logical OR instead of an AND. 6078 .sp 6079 Essentially, zero bits in this mask may be treated as a set of bits the user is not allowed to change. 6080 .sp 6081 If not set explicitly this parameter is 0777, allowing a user to modify all the user/group/world permissions on a file. 6082 .sp 6083 \fB Note\fR 6084 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems. Administrators of most normal systems will probably want to leave it set to 6085 \fB0777\fR. 6086 .sp 6087 Default: 6088 \fB\fIsecurity mask\fR = 0777 \fR 6089 .sp 6090 Example: 6091 \fB\fIsecurity mask\fR = 0770 \fR 6092 .RE 6093 .PP 7363 \fIpassword server\fR 7364 parameter and the 7365 \fIencrypted passwords\fR 7366 parameter\. 7367 .sp 7368 \fISECURITY = ADS\fR 7369 .sp 7370 In this mode, Samba will act as a domain member in an ADS realm\. To operate in this mode, the machine running Samba will need to have Kerberos installed and configured and Samba will need to be joined to the ADS realm using the net utility\. 7371 .sp 7372 Note that this mode does NOT make Samba operate as a Active Directory Domain Controller\. 7373 .sp 7374 Read the chapter about Domain Membership in the HOWTO for details\. 7375 .sp 7376 Default: 7377 \fI\fIsecurity\fR\fR\fI = \fR\fIUSER\fR\fI \fR 7378 .sp 7379 Example: 7380 \fI\fIsecurity\fR\fR\fI = \fR\fIDOMAIN\fR\fI \fR 7381 .RE 7382 6094 7383 server schannel (G) 6095 .RS 3n 6096 This controls whether the server offers or even demands the use of the netlogon schannel. 6097 server schannel = no does not offer the schannel, 6098 server schannel = auto offers the schannel but does not enforce it, and 6099 server schannel = yes denies access if the client is not able to speak netlogon schannel. This is only the case for Windows NT4 before SP4. 7384 .PP 7385 .RS 4 7386 This controls whether the server offers or even demands the use of the netlogon schannel\. 7387 \fIserver schannel = no\fR 7388 does not offer the schannel, 7389 \fIserver schannel = auto\fR 7390 offers the schannel but does not enforce it, and 7391 \fIserver schannel = yes\fR 7392 denies access if the client is not able to speak netlogon schannel\. This is only the case for Windows NT4 before SP4\. 6100 7393 .sp 6101 7394 Please note that with this set to 6102 7395 no 6103 7396 you will have to apply the WindowsXP 6104 \fIWinXP_SignOrSeal .reg\fR6105 registry patch found in the docs/registry subdirectory of the Samba distribution tarball .6106 .sp 6107 Default: 6108 \f B\fIserver schannel\fR = auto\fR6109 .sp 6110 Example: 6111 \f B\fIserver schannel\fR = yes\fR6112 .RE 6113 .PP 7397 \fIWinXP_SignOrSeal\.reg\fR 7398 registry patch found in the docs/registry subdirectory of the Samba distribution tarball\. 7399 .sp 7400 Default: 7401 \fI\fIserver schannel\fR\fR\fI = \fR\fIauto\fR\fI \fR 7402 .sp 7403 Example: 7404 \fI\fIserver schannel\fR\fR\fI = \fR\fIyes\fR\fI \fR 7405 .RE 7406 6114 7407 server signing (G) 6115 .RS 3n 6116 This controls whether the server offers or requires the client it talks to to use SMB signing. Possible values are 6117 \fBauto\fR, 6118 \fBmandatory\fR 7408 .PP 7409 .RS 4 7410 This controls whether the server offers or requires the client it talks to to use SMB signing\. Possible values are 7411 \fIauto\fR, 7412 \fImandatory\fR 6119 7413 and 6120 \f Bdisabled\fR.6121 .sp 6122 When set to auto, SMB signing is offered, but not enforced . When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either.6123 .sp 6124 Default: 6125 \f B\fIserver signing\fR = Disabled\fR6126 .RE 6127 .PP 7414 \fIdisabled\fR\. 7415 .sp 7416 When set to auto, SMB signing is offered, but not enforced\. When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either\. 7417 .sp 7418 Default: 7419 \fI\fIserver signing\fR\fR\fI = \fR\fIDisabled\fR\fI \fR 7420 .RE 7421 6128 7422 server string (G) 6129 .RS 3n 7423 .PP 7424 .RS 4 6130 7425 This controls what string will show up in the printer comment box in print manager and next to the IPC connection in 6131 net view . It can be any string that you wish to show to your users.6132 .sp 6133 It also sets what will appear in browse lists next to the machine name .7426 net view\. It can be any string that you wish to show to your users\. 7427 .sp 7428 It also sets what will appear in browse lists next to the machine name\. 6134 7429 .sp 6135 7430 A 6136 7431 \fI%v\fR 6137 will be replaced with the Samba version number .7432 will be replaced with the Samba version number\. 6138 7433 .sp 6139 7434 A 6140 7435 \fI%h\fR 6141 will be replaced with the hostname .6142 .sp 6143 Default: 6144 \f B\fIserver string\fR = Samba %v\fR6145 .sp 6146 Example: 6147 \f B\fIserver string\fR = University of GNUs Samba Server\fR6148 .RE 6149 .PP 7436 will be replaced with the hostname\. 7437 .sp 7438 Default: 7439 \fI\fIserver string\fR\fR\fI = \fR\fISamba %v\fR\fI \fR 7440 .sp 7441 Example: 7442 \fI\fIserver string\fR\fR\fI = \fR\fIUniversity of GNUs Samba Server\fR\fI \fR 7443 .RE 7444 6150 7445 set directory (S) 6151 .RS 3n 7446 .PP 7447 .RS 4 6152 7448 If 6153 set directory = no, then users of the service may not use the setdir command to change directory .7449 set directory = no, then users of the service may not use the setdir command to change directory\. 6154 7450 .sp 6155 7451 The 6156 7452 setdir 6157 command is only implemented in the Digital Pathworks client . See the Pathworks documentation for details.6158 .sp 6159 Default: 6160 \f B\fIset directory\fR = no\fR6161 .RE 6162 .PP 7453 command is only implemented in the Digital Pathworks client\. See the Pathworks documentation for details\. 7454 .sp 7455 Default: 7456 \fI\fIset directory\fR\fR\fI = \fR\fIno\fR\fI \fR 7457 .RE 7458 6163 7459 set primary group script (G) 6164 .RS 3n 6165 Thanks to the Posix subsystem in NT a Windows User has a primary group in addition to the auxiliary groups. This script sets the primary group in the unix userdatase when an administrator sets the primary group from the windows user manager or when fetching a SAM with 6166 net rpc vampire. 7460 .PP 7461 .RS 4 7462 Thanks to the Posix subsystem in NT a Windows User has a primary group in addition to the auxiliary groups\. This script sets the primary group in the unix userdatase when an administrator sets the primary group from the windows user manager or when fetching a SAM with 7463 net rpc vampire\. 6167 7464 \fI%u\fR 6168 will be replaced with the user whose primary group is to be set .7465 will be replaced with the user whose primary group is to be set\. 6169 7466 \fI%g\fR 6170 will be replaced with the group to set .6171 .sp 6172 Default: 6173 \f B\fIset primary group script\fR =\fR6174 .sp 6175 Example: 6176 \f B\fIset primary group script\fR = /usr/sbin/usermod -g '%g' '%u'\fR6177 .RE 6178 .PP 7467 will be replaced with the group to set\. 7468 .sp 7469 Default: 7470 \fI\fIset primary group script\fR\fR\fI = \fR\fI\fR\fI \fR 7471 .sp 7472 Example: 7473 \fI\fIset primary group script\fR\fR\fI = \fR\fI/usr/sbin/usermod \-g \'%g\' \'%u\'\fR\fI \fR 7474 .RE 7475 6179 7476 set quota command (G) 6180 .RS 3n 7477 .PP 7478 .RS 4 6181 7479 The 6182 7480 set quota command 6183 should only be used whenever there is no operating system API available from the OS that samba can use .7481 should only be used whenever there is no operating system API available from the OS that samba can use\. 6184 7482 .sp 6185 7483 This option is only available if Samba was configured with the argument 6186 --with-sys-quotas7484 \-\-with\-sys\-quotas 6187 7485 or on linux when 6188 ./configure --with-quotas6189 was used and a working quota api was found in the system . Most packages are configured with these options already.6190 .sp 6191 This parameter should specify the path to a script that can set quota for the specified arguments .7486 \./configure \-\-with\-quotas 7487 was used and a working quota api was found in the system\. Most packages are configured with these options already\. 7488 .sp 7489 This parameter should specify the path to a script that can set quota for the specified arguments\. 6192 7490 .sp 6193 7491 The specified script should take the following arguments: 6194 .RS 3n 6195 .TP 3n 6196 \(bu 6197 1 - quota type 6198 .RS 3n 6199 .TP 3n 6200 \(bu 6201 1 - user quotas 6202 .TP 3n 6203 \(bu 6204 2 - user default quotas (uid = -1) 6205 .TP 3n 6206 \(bu 6207 3 - group quotas 6208 .TP 3n 6209 \(bu 6210 4 - group default quotas (gid = -1) 6211 .RE 6212 .IP "" 3n 6213 6214 .TP 3n 6215 \(bu 6216 2 - id (uid for user, gid for group, -1 if N/A) 6217 .TP 3n 6218 \(bu 6219 3 - quota state (0 = disable, 1 = enable, 2 = enable and enforce) 6220 .TP 3n 6221 \(bu 6222 4 - block softlimit 6223 .TP 3n 6224 \(bu 6225 5 - block hardlimit 6226 .TP 3n 6227 \(bu 6228 6 - inode softlimit 6229 .TP 3n 6230 \(bu 6231 7 - inode hardlimit 6232 .TP 3n 6233 \(bu 6234 8(optional) - block size, defaults to 1024 6235 .RE 6236 .IP "" 3n 6237 The script should output at least one line of data on success. And nothing on failure. 6238 .sp 6239 Default: 6240 \fB\fIset quota command\fR = \fR 6241 .sp 6242 Example: 6243 \fB\fIset quota command\fR = /usr/local/sbin/set_quota \fR 6244 .RE 6245 .PP 7492 .sp 7493 .RS 4 7494 .ie n \{\ 7495 \h'-04'\(bu\h'+03'\c 7496 .\} 7497 .el \{\ 7498 .sp -1 7499 .IP \(bu 2.3 7500 .\} 7501 1 \- quota type 7502 .sp 7503 .RS 4 7504 .ie n \{\ 7505 \h'-04'\(bu\h'+03'\c 7506 .\} 7507 .el \{\ 7508 .sp -1 7509 .IP \(bu 2.3 7510 .\} 7511 1 \- user quotas 7512 .RE 7513 .sp 7514 .RS 4 7515 .ie n \{\ 7516 \h'-04'\(bu\h'+03'\c 7517 .\} 7518 .el \{\ 7519 .sp -1 7520 .IP \(bu 2.3 7521 .\} 7522 2 \- user default quotas (uid = \-1) 7523 .RE 7524 .sp 7525 .RS 4 7526 .ie n \{\ 7527 \h'-04'\(bu\h'+03'\c 7528 .\} 7529 .el \{\ 7530 .sp -1 7531 .IP \(bu 2.3 7532 .\} 7533 3 \- group quotas 7534 .RE 7535 .sp 7536 .RS 4 7537 .ie n \{\ 7538 \h'-04'\(bu\h'+03'\c 7539 .\} 7540 .el \{\ 7541 .sp -1 7542 .IP \(bu 2.3 7543 .\} 7544 4 \- group default quotas (gid = \-1) 7545 .sp 7546 .RE 7547 .RE 7548 .sp 7549 .RS 4 7550 .ie n \{\ 7551 \h'-04'\(bu\h'+03'\c 7552 .\} 7553 .el \{\ 7554 .sp -1 7555 .IP \(bu 2.3 7556 .\} 7557 2 \- id (uid for user, gid for group, \-1 if N/A) 7558 .RE 7559 .sp 7560 .RS 4 7561 .ie n \{\ 7562 \h'-04'\(bu\h'+03'\c 7563 .\} 7564 .el \{\ 7565 .sp -1 7566 .IP \(bu 2.3 7567 .\} 7568 3 \- quota state (0 = disable, 1 = enable, 2 = enable and enforce) 7569 .RE 7570 .sp 7571 .RS 4 7572 .ie n \{\ 7573 \h'-04'\(bu\h'+03'\c 7574 .\} 7575 .el \{\ 7576 .sp -1 7577 .IP \(bu 2.3 7578 .\} 7579 4 \- block softlimit 7580 .RE 7581 .sp 7582 .RS 4 7583 .ie n \{\ 7584 \h'-04'\(bu\h'+03'\c 7585 .\} 7586 .el \{\ 7587 .sp -1 7588 .IP \(bu 2.3 7589 .\} 7590 5 \- block hardlimit 7591 .RE 7592 .sp 7593 .RS 4 7594 .ie n \{\ 7595 \h'-04'\(bu\h'+03'\c 7596 .\} 7597 .el \{\ 7598 .sp -1 7599 .IP \(bu 2.3 7600 .\} 7601 6 \- inode softlimit 7602 .RE 7603 .sp 7604 .RS 4 7605 .ie n \{\ 7606 \h'-04'\(bu\h'+03'\c 7607 .\} 7608 .el \{\ 7609 .sp -1 7610 .IP \(bu 2.3 7611 .\} 7612 7 \- inode hardlimit 7613 .RE 7614 .sp 7615 .RS 4 7616 .ie n \{\ 7617 \h'-04'\(bu\h'+03'\c 7618 .\} 7619 .el \{\ 7620 .sp -1 7621 .IP \(bu 2.3 7622 .\} 7623 8(optional) \- block size, defaults to 1024 7624 .sp 7625 .RE 7626 The script should output at least one line of data on success\. And nothing on failure\. 7627 .sp 7628 Default: 7629 \fI\fIset quota command\fR\fR\fI = \fR\fI\fR\fI \fR 7630 .sp 7631 Example: 7632 \fI\fIset quota command\fR\fR\fI = \fR\fI/usr/local/sbin/set_quota\fR\fI \fR 7633 .RE 7634 6246 7635 share modes (S) 6247 .RS 3n 7636 .PP 7637 .RS 4 6248 7638 This enables or disables the honoring of the 6249 7639 \fIshare modes\fR 6250 during a file open . These modes are used by clients to gain exclusive read or write access to a file.6251 .sp 6252 These open modes are not directly supported by UNIX, so they are simulated using shared memory, or lock files if your UNIX doesn 't support shared memory (almost all do).7640 during a file open\. These modes are used by clients to gain exclusive read or write access to a file\. 7641 .sp 7642 These open modes are not directly supported by UNIX, so they are simulated using shared memory, or lock files if your UNIX doesn\'t support shared memory (almost all do)\. 6253 7643 .sp 6254 7644 The share modes that are enabled by this option are … … 6259 7649 \fBDENY_NONE\fR 6260 7650 and 6261 \fBDENY_FCB\fR .6262 .sp 6263 This option gives full share compatibility and enabled by default .7651 \fBDENY_FCB\fR\. 7652 .sp 7653 This option gives full share compatibility and enabled by default\. 6264 7654 .sp 6265 7655 You should 6266 \f BNEVER\fR6267 turn this parameter off as many Windows applications will break if you do so .6268 .sp 6269 Default: 6270 \f B\fIshare modes\fR = yes\fR6271 .RE 6272 .PP 7656 \fINEVER\fR 7657 turn this parameter off as many Windows applications will break if you do so\. 7658 .sp 7659 Default: 7660 \fI\fIshare modes\fR\fR\fI = \fR\fIyes\fR\fI \fR 7661 .RE 7662 6273 7663 short preserve case (S) 6274 .RS 3n 6275 This boolean parameter controls if new files which conform to 8.3 syntax, that is all in upper case and of suitable length, are created upper case, or if they are forced to be the 6276 default case. This option can be use with 6277 preserve case = yes to permit long filenames to retain their case, while short names are lowered. 7664 .PP 7665 .RS 4 7666 This boolean parameter controls if new files which conform to 8\.3 syntax, that is all in upper case and of suitable length, are created upper case, or if they are forced to be the 7667 \fIdefault case\fR\. This option can be use with 7668 \fIpreserve case = yes\fR 7669 to permit long filenames to retain their case, while short names are lowered\. 6278 7670 .sp 6279 7671 See the section on 6280 NAME MANGLING .6281 .sp 6282 Default: 6283 \f B\fIshort preserve case\fR = yes\fR6284 .RE 6285 .PP 7672 NAME MANGLING\. 7673 .sp 7674 Default: 7675 \fI\fIshort preserve case\fR\fR\fI = \fR\fIyes\fR\fI \fR 7676 .RE 7677 6286 7678 show add printer wizard (G) 6287 .RS 3n 6288 With the introduction of MS-RPC based printing support for Windows NT/2000 client in Samba 2.2, a "Printers..." folder will appear on Samba hosts in the share listing. Normally this folder will contain an icon for the MS Add Printer Wizard (APW). However, it is possible to disable this feature regardless of the level of privilege of the connected user. 6289 .sp 6290 Under normal circumstances, the Windows NT/2000 client will open a handle on the printer server with OpenPrinterEx() asking for Administrator privileges. If the user does not have administrative access on the print server (i.e is not root or a member of the 7679 .PP 7680 .RS 4 7681 With the introduction of MS\-RPC based printing support for Windows NT/2000 client in Samba 2\.2, a "Printers\.\.\." folder will appear on Samba hosts in the share listing\. Normally this folder will contain an icon for the MS Add Printer Wizard (APW)\. However, it is possible to disable this feature regardless of the level of privilege of the connected user\. 7682 .sp 7683 Under normal circumstances, the Windows NT/2000 client will open a handle on the printer server with OpenPrinterEx() asking for Administrator privileges\. If the user does not have administrative access on the print server (i\.e is not root or a member of the 6291 7684 \fIprinter admin\fR 6292 group), the OpenPrinterEx() call fails and the client makes another open call with a request for a lower privilege level . This should succeed, however the APW icon will not be displayed.7685 group), the OpenPrinterEx() call fails and the client makes another open call with a request for a lower privilege level\. This should succeed, however the APW icon will not be displayed\. 6293 7686 .sp 6294 7687 Disabling the 6295 7688 \fIshow add printer wizard\fR 6296 parameter will always cause the OpenPrinterEx() on the server to fail . Thus the APW icon will never be displayed.7689 parameter will always cause the OpenPrinterEx() on the server to fail\. Thus the APW icon will never be displayed\. 6297 7690 .sp 6298 7691 .it 1 an-trap … … 6300 7693 .nr an-break-flag 1 6301 7694 .br 6302 \fBNote\fR 6303 This does not prevent the same user from having administrative privilege on an individual printer. 6304 Default: 6305 \fB\fIshow add printer wizard\fR = yes \fR 6306 .RE 6307 .PP 7695 Note 7696 This does not prevent the same user from having administrative privilege on an individual printer\. 7697 7698 Default: 7699 \fI\fIshow add printer wizard\fR\fR\fI = \fR\fIyes\fR\fI \fR 7700 .RE 7701 6308 7702 shutdown script (G) 6309 .RS 3n 7703 .PP 7704 .RS 4 6310 7705 This a full path name to a script called by 6311 7706 \fBsmbd\fR(8) 6312 that should start a shutdown procedure .7707 that should start a shutdown procedure\. 6313 7708 .sp 6314 7709 If the connected user posseses the 6315 \fBSeRemoteShutdownPrivilege\fR, right, this command will be run as user .7710 \fBSeRemoteShutdownPrivilege\fR, right, this command will be run as user\. 6316 7711 .sp 6317 7712 The %z %t %r %f variables are expanded as follows: 6318 .RS 3n 6319 .TP 3n 6320 \(bu 7713 .sp 7714 .RS 4 7715 .ie n \{\ 7716 \h'-04'\(bu\h'+03'\c 7717 .\} 7718 .el \{\ 7719 .sp -1 7720 .IP \(bu 2.3 7721 .\} 6321 7722 \fI%z\fR 6322 will be substituted with the shutdown message sent to the server. 6323 .TP 3n 6324 \(bu 7723 will be substituted with the shutdown message sent to the server\. 7724 .RE 7725 .sp 7726 .RS 4 7727 .ie n \{\ 7728 \h'-04'\(bu\h'+03'\c 7729 .\} 7730 .el \{\ 7731 .sp -1 7732 .IP \(bu 2.3 7733 .\} 6325 7734 \fI%t\fR 6326 will be substituted with the number of seconds to wait before effectively starting the shutdown procedure. 6327 .TP 3n 6328 \(bu 7735 will be substituted with the number of seconds to wait before effectively starting the shutdown procedure\. 7736 .RE 7737 .sp 7738 .RS 4 7739 .ie n \{\ 7740 \h'-04'\(bu\h'+03'\c 7741 .\} 7742 .el \{\ 7743 .sp -1 7744 .IP \(bu 2.3 7745 .\} 6329 7746 \fI%r\fR 6330 7747 will be substituted with the switch 6331 \fB-r\fR. It means reboot after shutdown for NT. 6332 .TP 3n 6333 \(bu 7748 \fI\-r\fR\. It means reboot after shutdown for NT\. 7749 .RE 7750 .sp 7751 .RS 4 7752 .ie n \{\ 7753 \h'-04'\(bu\h'+03'\c 7754 .\} 7755 .el \{\ 7756 .sp -1 7757 .IP \(bu 2.3 7758 .\} 6334 7759 \fI%f\fR 6335 7760 will be substituted with the switch 6336 \f B-f\fR. It means force the shutdown even if applications do not respond for NT.6337 . RE6338 . IP "" 3n7761 \fI\-f\fR\. It means force the shutdown even if applications do not respond for NT\. 7762 .sp 7763 .RE 6339 7764 Shutdown script example: 6340 6341 .sp 6342 7765 .sp 7766 .RS 4 6343 7767 .nf 6344 6345 7768 #!/bin/bash 6346 7769 … … 6350 7773 6351 7774 /sbin/shutdown $3 $4 +$time $1 & 6352 6353 7775 .fi 6354 Shutdown does not return so we need to launch it in background. 6355 .sp 6356 Default: 6357 \fB\fIshutdown script\fR = \fR 6358 .sp 6359 Example: 6360 \fB\fIshutdown script\fR = /usr/local/samba/sbin/shutdown %m %t %r %f \fR 6361 .RE 6362 .PP 7776 .RE 7777 .sp 7778 Shutdown does not return so we need to launch it in background\. 7779 .sp 7780 Default: 7781 \fI\fIshutdown script\fR\fR\fI = \fR\fI\fR\fI \fR 7782 .sp 7783 Example: 7784 \fI\fIshutdown script\fR\fR\fI = \fR\fI/usr/local/samba/sbin/shutdown %m %t %r %f\fR\fI \fR 7785 .RE 7786 6363 7787 smb passwd file (G) 6364 .RS 3n 6365 This option sets the path to the encrypted smbpasswd file. By default the path to the smbpasswd file is compiled into Samba. 7788 .PP 7789 .RS 4 7790 This option sets the path to the encrypted smbpasswd file\. By default the path to the smbpasswd file is compiled into Samba\. 6366 7791 .sp 6367 7792 An example of use is: 6368 6369 .sp 6370 7793 .sp 7794 .RS 4 6371 7795 .nf 6372 6373 7796 smb passwd file = /etc/samba/smbpasswd 6374 6375 7797 .fi 6376 6377 .sp 6378 Default: 6379 \fB\fIsmb passwd file\fR = ${prefix}/private/smbpasswd \fR 6380 .RE 6381 .PP 7798 .RE 7799 .sp 7800 .sp 7801 Default: 7802 \fI\fIsmb passwd file\fR\fR\fI = \fR\fI${prefix}/private/smbpasswd\fR\fI \fR 7803 .RE 7804 6382 7805 smb ports (G) 6383 .RS 3n 6384 Specifies which ports the server should listen on for SMB traffic. 6385 .sp 6386 Default: 6387 \fB\fIsmb ports\fR = 445 139 \fR 6388 .RE 6389 .PP 7806 .PP 7807 .RS 4 7808 Specifies which ports the server should listen on for SMB traffic\. 7809 .sp 7810 Default: 7811 \fI\fIsmb ports\fR\fR\fI = \fR\fI445 139\fR\fI \fR 7812 .RE 7813 6390 7814 socket address (G) 6391 .RS 3n 6392 This option allows you to control what address Samba will listen for connections on. This is used to support multiple virtual interfaces on the one server, each with a different configuration. 6393 .sp 6394 By default Samba will accept connections on any address. 6395 .sp 6396 Default: 6397 \fB\fIsocket address\fR = \fR 6398 .sp 6399 Example: 6400 \fB\fIsocket address\fR = 192.168.2.20 \fR 6401 .RE 6402 .PP 7815 .PP 7816 .RS 4 7817 This option allows you to control what address Samba will listen for connections on\. This is used to support multiple virtual interfaces on the one server, each with a different configuration\. 7818 .sp 7819 By default Samba will accept connections on any address\. 7820 .sp 7821 Default: 7822 \fI\fIsocket address\fR\fR\fI = \fR\fI\fR\fI \fR 7823 .sp 7824 Example: 7825 \fI\fIsocket address\fR\fR\fI = \fR\fI192\.168\.2\.20\fR\fI \fR 7826 .RE 7827 6403 7828 socket options (G) 6404 .RS 3n 6405 This option allows you to set socket options to be used when talking with the client. 6406 .sp 6407 Socket options are controls on the networking layer of the operating systems which allow the connection to be tuned. 6408 .sp 6409 This option will typically be used to tune your Samba server for optimal performance for your local network. There is no way that Samba can know what the optimal parameters are for your net, so you must experiment and choose them yourself. We strongly suggest you read the appropriate documentation for your operating system first (perhaps 7829 .PP 7830 .RS 4 7831 This option allows you to set socket options to be used when talking with the client\. 7832 .sp 7833 Socket options are controls on the networking layer of the operating systems which allow the connection to be tuned\. 7834 .sp 7835 This option will typically be used to tune your Samba server for optimal performance for your local network\. There is no way that Samba can know what the optimal parameters are for your net, so you must experiment and choose them yourself\. We strongly suggest you read the appropriate documentation for your operating system first (perhaps 6410 7836 man setsockopt 6411 will help) .6412 .sp 6413 You may find that on some systems Samba will say "Unknown socket option" when you supply an option . This means you either incorrectly typed it or you need to add an include file to includes.h for your OS. If the latter is the case please send the patch to6414 samba -technical@samba.org.6415 .sp 6416 Any of the supported socket options may be combined in any way you like, as long as your OS allows it .7837 will help)\. 7838 .sp 7839 You may find that on some systems Samba will say "Unknown socket option" when you supply an option\. This means you either incorrectly typed it or you need to add an include file to includes\.h for your OS\. If the latter is the case please send the patch to 7840 samba\-technical@samba\.org\. 7841 .sp 7842 Any of the supported socket options may be combined in any way you like, as long as your OS allows it\. 6417 7843 .sp 6418 7844 This is the list of socket options currently settable using this option: 6419 .RS 3n 6420 .TP 3n 6421 \(bu 7845 .sp 7846 .RS 4 7847 .ie n \{\ 7848 \h'-04'\(bu\h'+03'\c 7849 .\} 7850 .el \{\ 7851 .sp -1 7852 .IP \(bu 2.3 7853 .\} 6422 7854 SO_KEEPALIVE 6423 .TP 3n 6424 \(bu 7855 .RE 7856 .sp 7857 .RS 4 7858 .ie n \{\ 7859 \h'-04'\(bu\h'+03'\c 7860 .\} 7861 .el \{\ 7862 .sp -1 7863 .IP \(bu 2.3 7864 .\} 6425 7865 SO_REUSEADDR 6426 .TP 3n 6427 \(bu 7866 .RE 7867 .sp 7868 .RS 4 7869 .ie n \{\ 7870 \h'-04'\(bu\h'+03'\c 7871 .\} 7872 .el \{\ 7873 .sp -1 7874 .IP \(bu 2.3 7875 .\} 6428 7876 SO_BROADCAST 6429 .TP 3n 6430 \(bu 7877 .RE 7878 .sp 7879 .RS 4 7880 .ie n \{\ 7881 \h'-04'\(bu\h'+03'\c 7882 .\} 7883 .el \{\ 7884 .sp -1 7885 .IP \(bu 2.3 7886 .\} 6431 7887 TCP_NODELAY 6432 .TP 3n 6433 \(bu 7888 .RE 7889 .sp 7890 .RS 4 7891 .ie n \{\ 7892 \h'-04'\(bu\h'+03'\c 7893 .\} 7894 .el \{\ 7895 .sp -1 7896 .IP \(bu 2.3 7897 .\} 6434 7898 IPTOS_LOWDELAY 6435 .TP 3n 6436 \(bu 7899 .RE 7900 .sp 7901 .RS 4 7902 .ie n \{\ 7903 \h'-04'\(bu\h'+03'\c 7904 .\} 7905 .el \{\ 7906 .sp -1 7907 .IP \(bu 2.3 7908 .\} 6437 7909 IPTOS_THROUGHPUT 6438 .TP 3n 6439 \(bu 7910 .RE 7911 .sp 7912 .RS 4 7913 .ie n \{\ 7914 \h'-04'\(bu\h'+03'\c 7915 .\} 7916 .el \{\ 7917 .sp -1 7918 .IP \(bu 2.3 7919 .\} 6440 7920 SO_SNDBUF * 6441 .TP 3n 6442 \(bu 7921 .RE 7922 .sp 7923 .RS 4 7924 .ie n \{\ 7925 \h'-04'\(bu\h'+03'\c 7926 .\} 7927 .el \{\ 7928 .sp -1 7929 .IP \(bu 2.3 7930 .\} 6443 7931 SO_RCVBUF * 6444 .TP 3n 6445 \(bu 7932 .RE 7933 .sp 7934 .RS 4 7935 .ie n \{\ 7936 \h'-04'\(bu\h'+03'\c 7937 .\} 7938 .el \{\ 7939 .sp -1 7940 .IP \(bu 2.3 7941 .\} 6446 7942 SO_SNDLOWAT * 6447 .TP 3n 6448 \(bu 7943 .RE 7944 .sp 7945 .RS 4 7946 .ie n \{\ 7947 \h'-04'\(bu\h'+03'\c 7948 .\} 7949 .el \{\ 7950 .sp -1 7951 .IP \(bu 2.3 7952 .\} 6449 7953 SO_RCVLOWAT * 6450 . RE6451 . IP "" 3n7954 .sp 7955 .RE 6452 7956 Those marked with a 6453 \f B'*'\fR6454 take an integer argument . The others can optionally take a 1 or 0 argument to enable or disable the option, by default they will be enabled if you don't specify 1 or 0.7957 \fI\'*\'\fR 7958 take an integer argument\. The others can optionally take a 1 or 0 argument to enable or disable the option, by default they will be enabled if you don\'t specify 1 or 0\. 6455 7959 .sp 6456 7960 To specify an argument use the syntax SOME_OPTION = VALUE for example 6457 SO_SNDBUF = 8192 . Note that you must not have any spaces before or after the = sign.7961 SO_SNDBUF = 8192\. Note that you must not have any spaces before or after the = sign\. 6458 7962 .sp 6459 7963 If you are on a local network then a sensible option might be: … … 6465 7969 socket options = IPTOS_LOWDELAY TCP_NODELAY 6466 7970 .sp 6467 If you are on a wide area network then perhaps try setting IPTOS_THROUGHPUT .6468 .sp 6469 Note that several of the options may cause your Samba server to fail completely . Use these options with caution!6470 .sp 6471 Default: 6472 \f B\fIsocket options\fR = TCP_NODELAY\fR6473 .sp 6474 Example: 6475 \f B\fIsocket options\fR = IPTOS_LOWDELAY\fR6476 .RE 6477 .PP 7971 If you are on a wide area network then perhaps try setting IPTOS_THROUGHPUT\. 7972 .sp 7973 Note that several of the options may cause your Samba server to fail completely\. Use these options with caution! 7974 .sp 7975 Default: 7976 \fI\fIsocket options\fR\fR\fI = \fR\fITCP_NODELAY\fR\fI \fR 7977 .sp 7978 Example: 7979 \fI\fIsocket options\fR\fR\fI = \fR\fIIPTOS_LOWDELAY\fR\fI \fR 7980 .RE 7981 6478 7982 stat cache (G) 6479 .RS 3n 7983 .PP 7984 .RS 4 6480 7985 This parameter determines if 6481 7986 \fBsmbd\fR(8) 6482 will use a cache in order to speed up case insensitive name mappings . You should never need to change this parameter.6483 .sp 6484 Default: 6485 \f B\fIstat cache\fR = yes\fR6486 .RE 6487 .PP 7987 will use a cache in order to speed up case insensitive name mappings\. You should never need to change this parameter\. 7988 .sp 7989 Default: 7990 \fI\fIstat cache\fR\fR\fI = \fR\fIyes\fR\fI \fR 7991 .RE 7992 6488 7993 store dos attributes (S) 6489 .RS 3n 6490 If this parameter is set Samba attempts to first read DOS attributes (SYSTEM, HIDDEN, ARCHIVE or READ-ONLY) from a filesystem extended attribute, before mapping DOS attributes to UNIX permission bits (such as occurs with 6491 map hidden and 6492 map readonly). When set, DOS attributes will be stored onto an extended attribute in the UNIX filesystem, associated with the file or directory. For no other mapping to occur as a fall-back, the parameters 6493 map hidden, 6494 map system, 6495 map archive and 6496 map readonly must be set to off. This parameter writes the DOS attributes as a string into the extended attribute named "user.DOSATTRIB". This extended attribute is explicitly hidden from smbd clients requesting an EA list. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel. 6497 .sp 6498 Default: 6499 \fB\fIstore dos attributes\fR = no \fR 6500 .RE 6501 .PP 7994 .PP 7995 .RS 4 7996 If this parameter is set Samba attempts to first read DOS attributes (SYSTEM, HIDDEN, ARCHIVE or READ\-ONLY) from a filesystem extended attribute, before mapping DOS attributes to UNIX permission bits (such as occurs with 7997 \fImap hidden\fR 7998 and 7999 \fImap readonly\fR)\. When set, DOS attributes will be stored onto an extended attribute in the UNIX filesystem, associated with the file or directory\. For no other mapping to occur as a fall\-back, the parameters 8000 \fImap hidden\fR, 8001 \fImap system\fR, 8002 \fImap archive\fR 8003 and 8004 \fImap readonly\fR 8005 must be set to off\. This parameter writes the DOS attributes as a string into the extended attribute named "user\.DOSATTRIB"\. This extended attribute is explicitly hidden from smbd clients requesting an EA list\. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel\. 8006 .sp 8007 Default: 8008 \fI\fIstore dos attributes\fR\fR\fI = \fR\fIno\fR\fI \fR 8009 .RE 8010 6502 8011 strict allocate (S) 6503 .RS 3n 6504 This is a boolean that controls the handling of disk space allocation in the server. When this is set to 8012 .PP 8013 .RS 4 8014 This is a boolean that controls the handling of disk space allocation in the server\. When this is set to 6505 8015 \fByes\fR 6506 the server will change from UNIX behaviour of not committing real disk storage blocks when a file is extended to the Windows behaviour of actually forcing the disk system to allocate real storage blocks when a file is created or extended to be a given size . In UNIX terminology this means that Samba will stop creating sparse files. This can be slow on some systems.8016 the server will change from UNIX behaviour of not committing real disk storage blocks when a file is extended to the Windows behaviour of actually forcing the disk system to allocate real storage blocks when a file is created or extended to be a given size\. In UNIX terminology this means that Samba will stop creating sparse files\. This can be slow on some systems\. 6507 8017 .sp 6508 8018 When strict allocate is 6509 8019 \fBno\fR 6510 the server does sparse disk block allocation when a file is extended .8020 the server does sparse disk block allocation when a file is extended\. 6511 8021 .sp 6512 8022 Setting this to 6513 8023 \fByes\fR 6514 can help Samba return out of quota messages on systems that are restricting the disk quota of users .6515 .sp 6516 Default: 6517 \f B\fIstrict allocate\fR = no\fR6518 .RE 6519 .PP 8024 can help Samba return out of quota messages on systems that are restricting the disk quota of users\. 8025 .sp 8026 Default: 8027 \fI\fIstrict allocate\fR\fR\fI = \fR\fIno\fR\fI \fR 8028 .RE 8029 6520 8030 strict locking (S) 6521 .RS 3n 6522 This is an enumerated type that controls the handling of file locking in the server. When this is set to 6523 \fByes\fR, the server will check every read and write access for file locks, and deny access if locks exist. This can be slow on some systems. 6524 .sp 6525 When strict locking is set to Auto (the default), the server performs file lock checks only on non-oplocked files. As most Windows redirectors perform file locking checks locally on oplocked files this is a good trade off for inproved performance. 6526 .sp 6527 When strict locking is disabled, the server performs file lock checks only when the client explicitly asks for them. 6528 .sp 6529 Well-behaved clients always ask for lock checks when it is important. So in the vast majority of cases, 8031 .PP 8032 .RS 4 8033 This is an enumerated type that controls the handling of file locking in the server\. When this is set to 8034 \fByes\fR, the server will check every read and write access for file locks, and deny access if locks exist\. This can be slow on some systems\. 8035 .sp 8036 When strict locking is set to Auto (the default), the server performs file lock checks only on non\-oplocked files\. As most Windows redirectors perform file locking checks locally on oplocked files this is a good trade off for inproved performance\. 8037 .sp 8038 When strict locking is disabled, the server performs file lock checks only when the client explicitly asks for them\. 8039 .sp 8040 Well\-behaved clients always ask for lock checks when it is important\. So in the vast majority of cases, 6530 8041 strict locking = Auto 6531 8042 or 6532 8043 strict locking = no 6533 is acceptable .6534 .sp 6535 Default: 6536 \f B\fIstrict locking\fR = Auto\fR6537 .RE 6538 .PP 8044 is acceptable\. 8045 .sp 8046 Default: 8047 \fI\fIstrict locking\fR\fR\fI = \fR\fIAuto\fR\fI \fR 8048 .RE 8049 6539 8050 strict sync (S) 6540 .RS 3n 6541 Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk. Under UNIX, a sync call forces the process to be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storage. This is very slow and should only be done rarely. Setting this parameter to 8051 .PP 8052 .RS 4 8053 Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk\. Under UNIX, a sync call forces the process to be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storage\. This is very slow and should only be done rarely\. Setting this parameter to 6542 8054 \fBno\fR 6543 8055 (the default) means that 6544 8056 \fBsmbd\fR(8) 6545 ignores the Windows applications requests for a sync call . There is only a possibility of losing data if the operating system itself that Samba is running on crashes, so there is little danger in this default setting. In addition, this fixes many performance problems that people have reported with the new Windows98 explorer shell file copies.6546 .sp 6547 Default: 6548 \f B\fIstrict sync\fR = no\fR6549 .RE 6550 .PP 8057 ignores the Windows applications requests for a sync call\. There is only a possibility of losing data if the operating system itself that Samba is running on crashes, so there is little danger in this default setting\. In addition, this fixes many performance problems that people have reported with the new Windows98 explorer shell file copies\. 8058 .sp 8059 Default: 8060 \fI\fIstrict sync\fR\fR\fI = \fR\fIno\fR\fI \fR 8061 .RE 8062 6551 8063 svcctl list (G) 6552 .RS 3n 6553 This option defines a list of init scripts that smbd will use for starting and stopping Unix services via the Win32 ServiceControl API. This allows Windows administrators to utilize the MS Management Console plug-ins to manage a Unix server running Samba. 8064 .PP 8065 .RS 4 8066 This option defines a list of init scripts that smbd will use for starting and stopping Unix services via the Win32 ServiceControl API\. This allows Windows administrators to utilize the MS Management Console plug\-ins to manage a Unix server running Samba\. 6554 8067 .sp 6555 8068 The administrator must create a directory name 6556 8069 \fIsvcctl\fR 6557 in Samba 's $(libdir) and create symbolic links to the init scripts in6558 \fI/etc/init .d/\fR. The name of the links must match the names given as part of the6559 \fIsvcctl list\fR .6560 .sp 6561 Default: 6562 \f B\fIsvcctl list\fR =\fR6563 .sp 6564 Example: 6565 \f B\fIsvcctl list\fR = cups postfix portmap httpd\fR6566 .RE 6567 .PP 8070 in Samba\'s $(libdir) and create symbolic links to the init scripts in 8071 \fI/etc/init\.d/\fR\. The name of the links must match the names given as part of the 8072 \fIsvcctl list\fR\. 8073 .sp 8074 Default: 8075 \fI\fIsvcctl list\fR\fR\fI = \fR\fI\fR\fI \fR 8076 .sp 8077 Example: 8078 \fI\fIsvcctl list\fR\fR\fI = \fR\fIcups postfix portmap httpd\fR\fI \fR 8079 .RE 8080 6568 8081 sync always (S) 6569 .RS 3n 6570 This is a boolean parameter that controls whether writes will always be written to stable storage before the write call returns. If this is 8082 .PP 8083 .RS 4 8084 This is a boolean parameter that controls whether writes will always be written to stable storage before the write call returns\. If this is 6571 8085 \fBno\fR 6572 then the server will be guided by the client 's request in each write call (clients can set a bit indicating that a particular write should be synchronous). If this is8086 then the server will be guided by the client\'s request in each write call (clients can set a bit indicating that a particular write should be synchronous)\. If this is 6573 8087 \fByes\fR 6574 8088 then every write will be followed by a 6575 8089 fsync() 6576 call to ensure the data is written to disk . Note that the8090 call to ensure the data is written to disk\. Note that the 6577 8091 \fIstrict sync\fR 6578 8092 parameter must be set to 6579 8093 \fByes\fR 6580 in order for this parameter to have any affect. 6581 .sp 6582 Default: 6583 \fB\fIsync always\fR = no \fR 6584 .RE 6585 .PP 8094 in order for this parameter to have any affect\. 8095 .sp 8096 Default: 8097 \fI\fIsync always\fR\fR\fI = \fR\fIno\fR\fI \fR 8098 .RE 8099 8100 syslog only (G) 8101 .PP 8102 .RS 4 8103 If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files\. There still will be some logging to log\.[sn]mbd even if 8104 \fIsyslog only\fR 8105 is enabled\. 8106 .sp 8107 Default: 8108 \fI\fIsyslog only\fR\fR\fI = \fR\fIno\fR\fI \fR 8109 .RE 8110 6586 8111 syslog (G) 6587 .RS 3n 6588 This parameter maps how Samba debug messages are logged onto the system syslog logging levels. Samba debug level zero maps onto syslog 8112 .PP 8113 .RS 4 8114 This parameter maps how Samba debug messages are logged onto the system syslog logging levels\. Samba debug level zero maps onto syslog 6589 8115 \fBLOG_ERR\fR, debug level one maps onto 6590 8116 \fBLOG_WARNING\fR, debug level two maps onto 6591 \fBLOG_NOTICE\fR, debug level three maps onto LOG_INFO. All higher levels are mapped to 6592 \fBLOG_DEBUG\fR. 6593 .sp 6594 This parameter sets the threshold for sending messages to syslog. Only messages with debug level less than this value will be sent to syslog. 6595 .sp 6596 Default: 6597 \fB\fIsyslog\fR = 1 \fR 6598 .RE 6599 .PP 6600 syslog only (G) 6601 .RS 3n 6602 If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files. 6603 .sp 6604 Default: 6605 \fB\fIsyslog only\fR = no \fR 6606 .RE 6607 .PP 8117 \fBLOG_NOTICE\fR, debug level three maps onto LOG_INFO\. All higher levels are mapped to 8118 \fBLOG_DEBUG\fR\. 8119 .sp 8120 This parameter sets the threshold for sending messages to syslog\. Only messages with debug level less than this value will be sent to syslog\. There still will be some logging to log\.[sn]mbd even if 8121 \fIsyslog only\fR 8122 is enabled\. 8123 .sp 8124 Default: 8125 \fI\fIsyslog\fR\fR\fI = \fR\fI1\fR\fI \fR 8126 .RE 8127 6608 8128 template homedir (G) 6609 .RS 3n 8129 .PP 8130 .RS 4 6610 8131 When filling out the user information for a Windows NT user, the 6611 8132 \fBwinbindd\fR(8) 6612 daemon uses this parameter to fill in the home directory for that user . If the string8133 daemon uses this parameter to fill in the home directory for that user\. If the string 6613 8134 \fI%D\fR 6614 is present it is substituted with the user 's Windows NT domain name. If the string8135 is present it is substituted with the user\'s Windows NT domain name\. If the string 6615 8136 \fI%U\fR 6616 is present it is substituted with the user 's Windows NT user name.6617 .sp 6618 Default: 6619 \f B\fItemplate homedir\fR = /home/%D/%U\fR6620 .RE 6621 .PP 8137 is present it is substituted with the user\'s Windows NT user name\. 8138 .sp 8139 Default: 8140 \fI\fItemplate homedir\fR\fR\fI = \fR\fI/home/%D/%U\fR\fI \fR 8141 .RE 8142 6622 8143 template shell (G) 6623 .RS 3n 8144 .PP 8145 .RS 4 6624 8146 When filling out the user information for a Windows NT user, the 6625 8147 \fBwinbindd\fR(8) 6626 daemon uses this parameter to fill in the login shell for that user .6627 .sp 6628 \f BNo default\fR6629 .RE 6630 .PP 8148 daemon uses this parameter to fill in the login shell for that user\. 8149 .sp 8150 \fINo default\fR 8151 .RE 8152 6631 8153 time offset (G) 6632 .RS 3n 6633 This parameter is a setting in minutes to add to the normal GMT to local time conversion. This is useful if you are serving a lot of PCs that have incorrect daylight saving time handling. 6634 .sp 6635 Default: 6636 \fB\fItime offset\fR = 0 \fR 6637 .sp 6638 Example: 6639 \fB\fItime offset\fR = 60 \fR 6640 .RE 6641 .PP 8154 .PP 8155 .RS 4 8156 This parameter is a setting in minutes to add to the normal GMT to local time conversion\. This is useful if you are serving a lot of PCs that have incorrect daylight saving time handling\. 8157 .sp 8158 Default: 8159 \fI\fItime offset\fR\fR\fI = \fR\fI0\fR\fI \fR 8160 .sp 8161 Example: 8162 \fI\fItime offset\fR\fR\fI = \fR\fI60\fR\fI \fR 8163 .RE 8164 6642 8165 time server (G) 6643 .RS 3n 8166 .PP 8167 .RS 4 6644 8168 This parameter determines if 6645 8169 \fBnmbd\fR(8) 6646 advertises itself as a time server to Windows clients .6647 .sp 6648 Default: 6649 \f B\fItime server\fR = no\fR6650 .RE 6651 .PP 8170 advertises itself as a time server to Windows clients\. 8171 .sp 8172 Default: 8173 \fI\fItime server\fR\fR\fI = \fR\fIno\fR\fI \fR 8174 .RE 8175 6652 8176 unix charset (G) 6653 .RS 3n 6654 Specifies the charset the unix machine Samba runs on uses. Samba needs to know this in order to be able to convert text to the charsets other SMB clients use. 6655 .sp 6656 This is also the charset Samba will use when specifying arguments to scripts that it invokes. 6657 .sp 6658 Default: 6659 \fB\fIunix charset\fR = UTF8 \fR 6660 .sp 6661 Example: 6662 \fB\fIunix charset\fR = ASCII \fR 6663 .RE 6664 .PP 8177 .PP 8178 .RS 4 8179 Specifies the charset the unix machine Samba runs on uses\. Samba needs to know this in order to be able to convert text to the charsets other SMB clients use\. 8180 .sp 8181 This is also the charset Samba will use when specifying arguments to scripts that it invokes\. 8182 .sp 8183 Default: 8184 \fI\fIunix charset\fR\fR\fI = \fR\fIUTF8\fR\fI \fR 8185 .sp 8186 Example: 8187 \fI\fIunix charset\fR\fR\fI = \fR\fIASCII\fR\fI \fR 8188 .RE 8189 6665 8190 unix extensions (G) 6666 .RS 3n 6667 This boolean parameter controls whether Samba implments the CIFS UNIX extensions, as defined by HP. These extensions enable Samba to better serve UNIX CIFS clients by supporting features such as symbolic links, hard links, etc... These extensions require a similarly enabled client, and are of no current use to Windows clients. 6668 .sp 6669 Default: 6670 \fB\fIunix extensions\fR = yes \fR 6671 .RE 6672 .PP 8191 .PP 8192 .RS 4 8193 This boolean parameter controls whether Samba implments the CIFS UNIX extensions, as defined by HP\. These extensions enable Samba to better serve UNIX CIFS clients by supporting features such as symbolic links, hard links, etc\.\.\. These extensions require a similarly enabled client, and are of no current use to Windows clients\. 8194 .sp 8195 Default: 8196 \fI\fIunix extensions\fR\fR\fI = \fR\fIyes\fR\fI \fR 8197 .RE 8198 6673 8199 unix password sync (G) 6674 .RS 3n 6675 This boolean parameter controls whether Samba attempts to synchronize the UNIX password with the SMB password when the encrypted SMB password in the smbpasswd file is changed. If this is set to 8200 .PP 8201 .RS 4 8202 This boolean parameter controls whether Samba attempts to synchronize the UNIX password with the SMB password when the encrypted SMB password in the smbpasswd file is changed\. If this is set to 6676 8203 \fByes\fR 6677 8204 the program specified in the 6678 8205 \fIpasswd program\fRparameter is called 6679 \f BAS ROOT\fR6680 - to allow the new UNIX password to be set without access to the old UNIX password (as the SMB password change code has no access to the old password cleartext, only the new).6681 .sp 6682 Default: 6683 \f B\fIunix password sync\fR = no\fR6684 .RE 6685 .PP 8206 \fIAS ROOT\fR 8207 \- to allow the new UNIX password to be set without access to the old UNIX password (as the SMB password change code has no access to the old password cleartext, only the new)\. 8208 .sp 8209 Default: 8210 \fI\fIunix password sync\fR\fR\fI = \fR\fIno\fR\fI \fR 8211 .RE 8212 6686 8213 update encrypted (G) 6687 .RS 3n 6688 This boolean parameter allows a user logging on with a plaintext password to have their encrypted (hashed) password in the smbpasswd file to be updated automatically as they log on. This option allows a site to migrate from plaintext password authentication (users authenticate with plaintext password over the wire, and are checked against a UNIX account atabase) to encrypted password authentication (the SMB challenge/response authentication mechanism) without forcing all users to re-enter their passwords via smbpasswd at the time the change is made. This is a convenience option to allow the change over to encrypted passwords to be made over a longer period. Once all users have encrypted representations of their passwords in the smbpasswd file this parameter should be set to 6689 \fBno\fR. 8214 .PP 8215 .RS 4 8216 This boolean parameter allows a user logging on with a plaintext password to have their encrypted (hashed) password in the smbpasswd file to be updated automatically as they log on\. This option allows a site to migrate from plaintext password authentication (users authenticate with plaintext password over the wire, and are checked against a UNIX account atabase) to encrypted password authentication (the SMB challenge/response authentication mechanism) without forcing all users to re\-enter their passwords via smbpasswd at the time the change is made\. This is a convenience option to allow the change over to encrypted passwords to be made over a longer period\. Once all users have encrypted representations of their passwords in the smbpasswd file this parameter should be set to 8217 \fBno\fR\. 6690 8218 .sp 6691 8219 In order for this parameter to be operative the 6692 encrypt passwords parameter must be set to 6693 \fBno\fR. The default value of 6694 encrypt passwords = Yes. Note: This must be set to 8220 \fIencrypt passwords\fR 8221 parameter must be set to 8222 \fBno\fR\. The default value of 8223 \fIencrypt passwords = Yes\fR\. Note: This must be set to 6695 8224 \fBno\fR 6696 8225 for this 6697 update encrypted to work. 8226 \fIupdate encrypted\fR 8227 to work\. 6698 8228 .sp 6699 8229 Note that even when this parameter is set a user authenticating to 6700 8230 smbd 6701 must still enter a valid password in order to connect correctly, and to update their hashed (smbpasswd) passwords .6702 .sp 6703 Default: 6704 \f B\fIupdate encrypted\fR = no\fR6705 .RE 6706 .PP 8231 must still enter a valid password in order to connect correctly, and to update their hashed (smbpasswd) passwords\. 8232 .sp 8233 Default: 8234 \fI\fIupdate encrypted\fR\fR\fI = \fR\fIno\fR\fI \fR 8235 .RE 8236 6707 8237 use client driver (S) 6708 .RS 3n 6709 This parameter applies only to Windows NT/2000 clients. It has no effect on Windows 95/98/ME clients. When serving a printer to Windows NT/2000 clients without first installing a valid printer driver on the Samba host, the client will be required to install a local printer driver. From this point on, the client will treat the print as a local printer and not a network printer connection. This is much the same behavior that will occur when 6710 disable spoolss = yes. 6711 .sp 6712 The differentiating factor is that under normal circumstances, the NT/2000 client will attempt to open the network printer using MS-RPC. The problem is that because the client considers the printer to be local, it will attempt to issue the OpenPrinterEx() call requesting access rights associated with the logged on user. If the user possesses local administator rights but not root privilege on the Samba host (often the case), the OpenPrinterEx() call will fail. The result is that the client will now display an "Access Denied; Unable to connect" message in the printer queue window (even though jobs may successfully be printed). 6713 .sp 6714 If this parameter is enabled for a printer, then any attempt to open the printer with the PRINTER_ACCESS_ADMINISTER right is mapped to PRINTER_ACCESS_USE instead. Thus allowing the OpenPrinterEx() call to succeed. 6715 \fBThis parameter MUST not be able enabled on a print share which has valid print driver installed on the Samba server.\fR 6716 .sp 6717 Default: 6718 \fB\fIuse client driver\fR = no \fR 6719 .RE 6720 .PP 8238 .PP 8239 .RS 4 8240 This parameter applies only to Windows NT/2000 clients\. It has no effect on Windows 95/98/ME clients\. When serving a printer to Windows NT/2000 clients without first installing a valid printer driver on the Samba host, the client will be required to install a local printer driver\. From this point on, the client will treat the print as a local printer and not a network printer connection\. This is much the same behavior that will occur when 8241 disable spoolss = yes\. 8242 .sp 8243 The differentiating factor is that under normal circumstances, the NT/2000 client will attempt to open the network printer using MS\-RPC\. The problem is that because the client considers the printer to be local, it will attempt to issue the OpenPrinterEx() call requesting access rights associated with the logged on user\. If the user possesses local administator rights but not root privilege on the Samba host (often the case), the OpenPrinterEx() call will fail\. The result is that the client will now display an "Access Denied; Unable to connect" message in the printer queue window (even though jobs may successfully be printed)\. 8244 .sp 8245 If this parameter is enabled for a printer, then any attempt to open the printer with the PRINTER_ACCESS_ADMINISTER right is mapped to PRINTER_ACCESS_USE instead\. Thus allowing the OpenPrinterEx() call to succeed\. 8246 \fIThis parameter MUST not be able enabled on a print share which has valid print driver installed on the Samba server\.\fR 8247 .sp 8248 Default: 8249 \fI\fIuse client driver\fR\fR\fI = \fR\fIno\fR\fI \fR 8250 .RE 8251 6721 8252 use kerberos keytab (G) 6722 .RS 3n 8253 .PP 8254 .RS 4 6723 8255 Specifies whether Samba should attempt to maintain service principals in the systems keytab file for 6724 8256 \fBhost/FQDN\fR 6725 8257 and 6726 \fBcifs/FQDN\fR .8258 \fBcifs/FQDN\fR\. 6727 8259 .sp 6728 8260 When you are using the heimdal Kerberos libraries, you must also specify the following in 6729 \fI/etc/krb5.conf\fR: 6730 6731 .sp 6732 8261 \fI/etc/krb5\.conf\fR: 8262 .sp 8263 .RS 4 6733 8264 .nf 6734 6735 8265 [libdefaults] 6736 default_keytab_name = FILE:/etc/krb5.keytab 6737 8266 default_keytab_name = FILE:/etc/krb5\.keytab 6738 8267 .fi 6739 6740 .sp 6741 Default: 6742 \fB\fIuse kerberos keytab\fR = False \fR 6743 .RE 6744 .PP 8268 .RE 8269 .sp 8270 .sp 8271 Default: 8272 \fI\fIuse kerberos keytab\fR\fR\fI = \fR\fIFalse\fR\fI \fR 8273 .RE 8274 6745 8275 use mmap (G) 6746 .RS 3n 6747 This global parameter determines if the tdb internals of Samba can depend on mmap working correctly on the running system. Samba requires a coherent mmap/read-write system memory cache. Currently only HPUX does not have such a coherent cache, and so this parameter is set to 8276 .PP 8277 .RS 4 8278 This global parameter determines if the tdb internals of Samba can depend on mmap working correctly on the running system\. Samba requires a coherent mmap/read\-write system memory cache\. Currently only HPUX does not have such a coherent cache, and so this parameter is set to 6748 8279 \fBno\fR 6749 by default on HPUX. On all other systems this parameter should be left alone. This parameter is provided to help the Samba developers track down problems with the tdb internal code. 6750 .sp 6751 Default: 6752 \fB\fIuse mmap\fR = yes \fR 6753 .RE 6754 .PP 6755 user 6756 .RS 3n 6757 This parameter is a synonym for username. 6758 .RE 6759 .PP 6760 users 6761 .RS 3n 6762 This parameter is a synonym for username. 6763 .RE 6764 .PP 6765 username (S) 6766 .RS 3n 6767 Multiple users may be specified in a comma-delimited list, in which case the supplied password will be tested against each username in turn (left to right). 6768 .sp 6769 The 6770 \fIusername\fR 6771 line is needed only when the PC is unable to supply its own username. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames. In both these cases you may also be better using the \\server\share%user syntax instead. 6772 .sp 6773 The 6774 \fIusername\fR 6775 line is not a great solution in many cases as it means Samba will try to validate the supplied password against each of the usernames in the 6776 \fIusername\fR 6777 line in turn. This is slow and a bad idea for lots of users in case of duplicate passwords. You may get timeouts or security breaches using this parameter unwisely. 6778 .sp 6779 Samba relies on the underlying UNIX security. This parameter does not restrict who can login, it just offers hints to the Samba server as to what usernames might correspond to the supplied password. Users can login as whoever they please and they will be able to do no more damage than if they started a telnet session. The daemon runs as the user that they log in as, so they cannot do anything that user cannot do. 6780 .sp 6781 To restrict a service to a particular set of users you can use the 6782 valid users parameter. 6783 .sp 6784 If any of the usernames begin with a '@' then the name will be looked up first in the NIS netgroups list (if Samba is compiled with netgroup support), followed by a lookup in the UNIX groups database and will expand to a list of all users in the group of that name. 6785 .sp 6786 If any of the usernames begin with a '+' then the name will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name. 6787 .sp 6788 If any of the usernames begin with a '&' then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name. 6789 .sp 6790 Note that searching though a groups database can take quite some time, and some clients may time out during the search. 6791 .sp 6792 See the section 6793 NOTE ABOUT USERNAME/PASSWORD VALIDATION 6794 for more information on how this parameter determines access to the services. 6795 .sp 6796 Default: 6797 \fB\fIusername\fR = # The guest account if a guest service, else <empty string>. \fR 6798 .sp 6799 Example: 6800 \fB\fIusername\fR = fred, mary, jack, jane, @users, @pcgroup \fR 6801 .RE 6802 .PP 8280 by default on HPUX\. On all other systems this parameter should be left alone\. This parameter is provided to help the Samba developers track down problems with the tdb internal code\. 8281 .sp 8282 Default: 8283 \fI\fIuse mmap\fR\fR\fI = \fR\fIyes\fR\fI \fR 8284 .RE 8285 6803 8286 username level (G) 6804 .RS 3n 6805 This option helps Samba to try and 'guess' at the real UNIX username, as many DOS clients send an all-uppercase username. By default Samba tries all lowercase, followed by the username with the first letter capitalized, and fails if the username is not found on the UNIX machine. 6806 .sp 6807 If this parameter is set to non-zero the behavior changes. This parameter is a number that specifies the number of uppercase combinations to try while trying to determine the UNIX user name. The higher the number the more combinations will be tried, but the slower the discovery of usernames will be. Use this parameter when you have strange usernames on your UNIX machine, such as 6808 \fBAstrangeUser \fR. 6809 .sp 6810 This parameter is needed only on UNIX systems that have case sensitive usernames. 6811 .sp 6812 Default: 6813 \fB\fIusername level\fR = 0 \fR 6814 .sp 6815 Example: 6816 \fB\fIusername level\fR = 5 \fR 6817 .RE 6818 .PP 8287 .PP 8288 .RS 4 8289 This option helps Samba to try and \'guess\' at the real UNIX username, as many DOS clients send an all\-uppercase username\. By default Samba tries all lowercase, followed by the username with the first letter capitalized, and fails if the username is not found on the UNIX machine\. 8290 .sp 8291 If this parameter is set to non\-zero the behavior changes\. This parameter is a number that specifies the number of uppercase combinations to try while trying to determine the UNIX user name\. The higher the number the more combinations will be tried, but the slower the discovery of usernames will be\. Use this parameter when you have strange usernames on your UNIX machine, such as 8292 \fBAstrangeUser \fR\. 8293 .sp 8294 This parameter is needed only on UNIX systems that have case sensitive usernames\. 8295 .sp 8296 Default: 8297 \fI\fIusername level\fR\fR\fI = \fR\fI0\fR\fI \fR 8298 .sp 8299 Example: 8300 \fI\fIusername level\fR\fR\fI = \fR\fI5\fR\fI \fR 8301 .RE 8302 8303 username map script (G) 8304 .PP 8305 .RS 4 8306 This script is a mutually exclusive alternative to the 8307 \fIusername map\fR 8308 parameter\. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line line on standard output (the name to which the account should mapped)\. In this way, it is possible to store username map tables in an LDAP or NIS directory services\. 8309 .sp 8310 Default: 8311 \fI\fIusername map script\fR\fR\fI = \fR\fI\fR\fI \fR 8312 .sp 8313 Example: 8314 \fI\fIusername map script\fR\fR\fI = \fR\fI/etc/samba/scripts/mapusers\.sh\fR\fI \fR 8315 .RE 8316 6819 8317 username map (G) 6820 .RS 3n 6821 This option allows you to specify a file containing a mapping of usernames from the clients to the server. This can be used for several purposes. The most common is to map usernames that users use on DOS or Windows machines to those that the UNIX box uses. The other is to map multiple users to a single username so that they can more easily share files. 6822 .sp 6823 Please note that for user or share mode security, the username map is applied prior to validating the user credentials. Domain member servers (domain or ads) apply the username map after the user has been successfully authenticated by the domain controller and require fully qualified enties in the map table (e.g. biddle = DOMAIN\foo). 6824 .sp 6825 The map file is parsed line by line. Each line should contain a single UNIX username on the left then a '=' followed by a list of usernames on the right. The list of usernames on the right may contain names of the form @group in which case they will match any UNIX username in that group. The special client name '*' is a wildcard and matches any name. Each line of the map file may be up to 1023 characters long. 6826 .sp 6827 The file is processed on each line by taking the supplied username and comparing it with each username on the right hand side of the '=' signs. If the supplied name matches any of the names on the right hand side then it is replaced with the name on the left. Processing then continues with the next line. 6828 .sp 6829 If any line begins with a '#' or a ';' then it is ignored. 6830 .sp 6831 If any line begins with an '!' then the processing will stop after that line if a mapping was done by the line. Otherwise mapping continues with every line being processed. Using '!' is most useful when you have a wildcard mapping line later in the file. 8318 .PP 8319 .RS 4 8320 This option allows you to specify a file containing a mapping of usernames from the clients to the server\. This can be used for several purposes\. The most common is to map usernames that users use on DOS or Windows machines to those that the UNIX box uses\. The other is to map multiple users to a single username so that they can more easily share files\. 8321 .sp 8322 Please note that for user or share mode security, the username map is applied prior to validating the user credentials\. Domain member servers (domain or ads) apply the username map after the user has been successfully authenticated by the domain controller and require fully qualified enties in the map table (e\.g\. biddle = 8323 DOMAIN\efoo)\. 8324 .sp 8325 The map file is parsed line by line\. Each line should contain a single UNIX username on the left then a \'=\' followed by a list of usernames on the right\. The list of usernames on the right may contain names of the form @group in which case they will match any UNIX username in that group\. The special client name \'*\' is a wildcard and matches any name\. Each line of the map file may be up to 1023 characters long\. 8326 .sp 8327 The file is processed on each line by taking the supplied username and comparing it with each username on the right hand side of the \'=\' signs\. If the supplied name matches any of the names on the right hand side then it is replaced with the name on the left\. Processing then continues with the next line\. 8328 .sp 8329 If any line begins with a \'#\' or a \';\' then it is ignored\. 8330 .sp 8331 If any line begins with an \'!\' then the processing will stop after that line if a mapping was done by the line\. Otherwise mapping continues with every line being processed\. Using \'!\' is most useful when you have a wildcard mapping line later in the file\. 6832 8332 .sp 6833 8333 For example to map from the name … … 6838 8338 \fB root\fR 6839 8339 you would use: 6840 6841 .sp 6842 8340 .sp 8341 .RS 4 6843 8342 .nf 6844 6845 8343 root = admin administrator 6846 6847 8344 .fi 8345 .RE 8346 .sp 6848 8347 Or to map anyone in the UNIX group 6849 8348 \fBsystem\fR … … 6851 8350 \fBsys\fR 6852 8351 you would use: 6853 6854 .sp 6855 8352 .sp 8353 .RS 4 6856 8354 .nf 6857 6858 8355 sys = @system 6859 6860 8356 .fi 6861 6862 .sp 6863 You can have as many mappings as you like in a username map file. 8357 .RE 8358 .sp 8359 .sp 8360 You can have as many mappings as you like in a username map file\. 6864 8361 .sp 6865 8362 If your system supports the NIS NETGROUP option then the netgroup database is checked before the 6866 8363 \fI/etc/group \fR 6867 database for matching groups. 6868 .sp 6869 You can map Windows usernames that have spaces in them by using double quotes around the name. For example: 6870 6871 .sp 6872 8364 database for matching groups\. 8365 .sp 8366 You can map Windows usernames that have spaces in them by using double quotes around the name\. For example: 8367 .sp 8368 .RS 4 6873 8369 .nf 6874 6875 8370 tridge = "Andrew Tridgell" 6876 6877 8371 .fi 6878 would map the windows username "Andrew Tridgell" to the unix username "tridge". 6879 .sp 6880 The following example would map mary and fred to the unix user sys, and map the rest to guest. Note the use of the '!' to tell Samba to stop processing if it gets a match on that line: 6881 6882 .sp 6883 8372 .RE 8373 .sp 8374 would map the windows username "Andrew Tridgell" to the unix username "tridge"\. 8375 .sp 8376 The following example would map mary and fred to the unix user sys, and map the rest to guest\. Note the use of the \'!\' to tell Samba to stop processing if it gets a match on that line: 8377 .sp 8378 .RS 4 6884 8379 .nf 6885 6886 8380 !sys = mary fred 6887 8381 guest = * 6888 6889 8382 .fi 6890 6891 .sp 6892 Note that the remapping is applied to all occurrences of usernames. Thus if you connect to \\server\fred and 8383 .RE 8384 .sp 8385 .sp 8386 Note that the remapping is applied to all occurrences of usernames\. Thus if you connect to \e\eserver\efred and 6893 8387 \fBfred\fR 6894 8388 is remapped to 6895 8389 \fBmary\fR 6896 then you will actually be connecting to \ \server\mary and will need to supply a password suitable for8390 then you will actually be connecting to \e\eserver\emary and will need to supply a password suitable for 6897 8391 \fBmary\fR 6898 8392 not 6899 \fBfred\fR. The only exception to this is the username passed to the 6900 password server (if you have one). The password server will receive whatever username the client supplies without modification. 6901 .sp 6902 Also note that no reverse mapping is done. The main effect this has is with printing. Users who have been mapped may have trouble deleting print jobs as PrintManager under WfWg will think they don't own the print job. 6903 .sp 6904 Samba versions prior to 3.0.8 would only support reading the fully qualified username (e.g.: DOMAIN\user) from the username map when performing a kerberos login from a client. However, when looking up a map entry for a user authenticated by NTLM[SSP], only the login name would be used for matches. This resulted in inconsistent behavior sometimes even on the same server. 6905 .sp 6906 The following functionality is obeyed in version 3.0.8 and later: 6907 .sp 6908 When performing local authentication, the username map is applied to the login name before attempting to authenticate the connection. 6909 .sp 6910 When relying upon a external domain controller for validating authentication requests, smbd will apply the username map to the fully qualified username (i.e. DOMAIN\user) only after the user has been successfully authenticated. 8393 \fBfred\fR\. The only exception to this is the username passed to the 8394 \fIpassword server\fR 8395 (if you have one)\. The password server will receive whatever username the client supplies without modification\. 8396 .sp 8397 Also note that no reverse mapping is done\. The main effect this has is with printing\. Users who have been mapped may have trouble deleting print jobs as PrintManager under WfWg will think they don\'t own the print job\. 8398 .sp 8399 Samba versions prior to 3\.0\.8 would only support reading the fully qualified username (e\.g\.: 8400 DOMAIN\euser) from the username map when performing a kerberos login from a client\. However, when looking up a map entry for a user authenticated by NTLM[SSP], only the login name would be used for matches\. This resulted in inconsistent behavior sometimes even on the same server\. 8401 .sp 8402 The following functionality is obeyed in version 3\.0\.8 and later: 8403 .sp 8404 When performing local authentication, the username map is applied to the login name before attempting to authenticate the connection\. 8405 .sp 8406 When relying upon a external domain controller for validating authentication requests, smbd will apply the username map to the fully qualified username (i\.e\. 8407 DOMAIN\euser) only after the user has been successfully authenticated\. 6911 8408 .sp 6912 8409 An example of use is: 6913 6914 .sp 6915 8410 .sp 8411 .RS 4 6916 8412 .nf 6917 6918 username map = /usr/local/samba/lib/users.map 6919 8413 username map = /usr/local/samba/lib/users\.map 6920 8414 .fi 6921 6922 .sp 6923 Default: 6924 \fB\fIusername map\fR = # no username map \fR 6925 .RE 6926 .PP 6927 username map script (G) 6928 .RS 3n 6929 This script is a mutually exclusive alternative to the 6930 username map parameter. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line line on standard output (the name to which the account should mapped). In this way, it is possible to store username map tables in an LDAP or NIS directory services. 6931 .sp 6932 Default: 6933 \fB\fIusername map script\fR = \fR 6934 .sp 6935 Example: 6936 \fB\fIusername map script\fR = /etc/samba/scripts/mapusers.sh \fR 6937 .RE 6938 .PP 8415 .RE 8416 .sp 8417 .sp 8418 Default: 8419 \fI\fIusername map\fR\fR\fI = \fR\fI # no username map\fR\fI \fR 8420 .RE 8421 user.PP 8422 .RS 4 8423 This parameter is a synonym for 8424 username\. 8425 .RE 8426 users.PP 8427 .RS 4 8428 This parameter is a synonym for 8429 username\. 8430 .RE 8431 8432 username (S) 8433 .PP 8434 .RS 4 8435 Multiple users may be specified in a comma\-delimited list, in which case the supplied password will be tested against each username in turn (left to right)\. 8436 .sp 8437 The 8438 \fIusername\fR 8439 line is needed only when the PC is unable to supply its own username\. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames\. In both these cases you may also be better using the \e\eserver\eshare%user syntax instead\. 8440 .sp 8441 The 8442 \fIusername\fR 8443 line is not a great solution in many cases as it means Samba will try to validate the supplied password against each of the usernames in the 8444 \fIusername\fR 8445 line in turn\. This is slow and a bad idea for lots of users in case of duplicate passwords\. You may get timeouts or security breaches using this parameter unwisely\. 8446 .sp 8447 Samba relies on the underlying UNIX security\. This parameter does not restrict who can login, it just offers hints to the Samba server as to what usernames might correspond to the supplied password\. Users can login as whoever they please and they will be able to do no more damage than if they started a telnet session\. The daemon runs as the user that they log in as, so they cannot do anything that user cannot do\. 8448 .sp 8449 To restrict a service to a particular set of users you can use the 8450 \fIvalid users\fR 8451 parameter\. 8452 .sp 8453 If any of the usernames begin with a \'@\' then the name will be looked up first in the NIS netgroups list (if Samba is compiled with netgroup support), followed by a lookup in the UNIX groups database and will expand to a list of all users in the group of that name\. 8454 .sp 8455 If any of the usernames begin with a \'+\' then the name will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name\. 8456 .sp 8457 If any of the usernames begin with a \'&\' then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name\. 8458 .sp 8459 Note that searching though a groups database can take quite some time, and some clients may time out during the search\. 8460 .sp 8461 See the section 8462 NOTE ABOUT USERNAME/PASSWORD VALIDATION 8463 for more information on how this parameter determines access to the services\. 8464 .sp 8465 Default: 8466 \fI\fIusername\fR\fR\fI = \fR\fI # The guest account if a guest service, else <empty string>\.\fR\fI \fR 8467 .sp 8468 Example: 8469 \fI\fIusername\fR\fR\fI = \fR\fIfred, mary, jack, jane, @users, @pcgroup\fR\fI \fR 8470 .RE 8471 6939 8472 usershare allow guests (G) 6940 .RS 3n 6941 This parameter controls whether user defined shares are allowed to be accessed by non-authenticated users or not. It is the equivalent of allowing people who can create a share the option of setting 8473 .PP 8474 .RS 4 8475 This parameter controls whether user defined shares are allowed to be accessed by non\-authenticated users or not\. It is the equivalent of allowing people who can create a share the option of setting 6942 8476 \fIguest ok = yes\fR 6943 in a share definition . Due to the security sensitive nature of this the default is set to off.6944 .sp 6945 Default: 6946 \f B\fIusershare allow guests\fR = no\fR6947 .RE 6948 .PP 8477 in a share definition\. Due to the security sensitive nature of this the default is set to off\. 8478 .sp 8479 Default: 8480 \fI\fIusershare allow guests\fR\fR\fI = \fR\fIno\fR\fI \fR 8481 .RE 8482 6949 8483 usershare max shares (G) 6950 .RS 3n 6951 This parameter specifies the number of user defined shares that are allowed to be created by users belonging to the group owning the usershare directory. If set to zero (the default) user defined shares are ignored. 6952 .sp 6953 Default: 6954 \fB\fIusershare max shares\fR = 0 \fR 6955 .RE 6956 .PP 8484 .PP 8485 .RS 4 8486 This parameter specifies the number of user defined shares that are allowed to be created by users belonging to the group owning the usershare directory\. If set to zero (the default) user defined shares are ignored\. 8487 .sp 8488 Default: 8489 \fI\fIusershare max shares\fR\fR\fI = \fR\fI0\fR\fI \fR 8490 .RE 8491 6957 8492 usershare owner only (G) 6958 .RS 3n 6959 This parameter controls whether the pathname exported by a user defined shares must be owned by the user creating the user defined share or not. If set to True (the default) then smbd checks that the directory path being shared is owned by the user who owns the usershare file defining this share and refuses to create the share if not. If set to False then no such check is performed and any directory path may be exported regardless of who owns it. 6960 .sp 6961 Default: 6962 \fB\fIusershare owner only\fR = True \fR 6963 .RE 6964 .PP 8493 .PP 8494 .RS 4 8495 This parameter controls whether the pathname exported by a user defined shares must be owned by the user creating the user defined share or not\. If set to True (the default) then smbd checks that the directory path being shared is owned by the user who owns the usershare file defining this share and refuses to create the share if not\. If set to False then no such check is performed and any directory path may be exported regardless of who owns it\. 8496 .sp 8497 Default: 8498 \fI\fIusershare owner only\fR\fR\fI = \fR\fITrue\fR\fI \fR 8499 .RE 8500 6965 8501 usershare path (G) 6966 . RS 3n6967 This parameter specifies the absolute path of the directory on the filesystem used to store the user defined share definition files. This directory must be owned by root, and have no access for other, and be writable only by the group owner. In addition the "sticky" bit must also be set, restricting rename and delete to owners of a file (in the same way the /tmp directory is usually configured). Members of the group owner of this directory are the users allowed to create usershares. If this parameter is undefined then no user defined shares are allowed. 6968 .sp 6969 For example, a valid usershare directory might be /usr/local/samba/lib/usershares, set up as follows. 6970 .sp 6971 6972 6973 .sp 6974 8502 .PP 8503 .RS 4 8504 This parameter specifies the absolute path of the directory on the filesystem used to store the user defined share definition files\. This directory must be owned by root, and have no access for other, and be writable only by the group owner\. In addition the "sticky" bit must also be set, restricting rename and delete to owners of a file (in the same way the /tmp directory is usually configured)\. Members of the group owner of this directory are the users allowed to create usershares\. If this parameter is undefined then no user defined shares are allowed\. 8505 .sp 8506 For example, a valid usershare directory might be /usr/local/samba/lib/usershares, set up as follows\. 8507 .sp 8508 8509 .sp 8510 .RS 4 6975 8511 .nf 6976 6977 ls -ld /usr/local/samba/lib/usershares/ 6978 drwxrwx--T 2 root power_users 4096 2006-05-05 12:27 /usr/local/samba/lib/usershares/ 8512 ls \-ld /usr/local/samba/lib/usershares/ 8513 drwxrwx\-\-T 2 root power_users 4096 2006\-05\-05 12:27 /usr/local/samba/lib/usershares/ 6979 8514 6980 8515 .fi 6981 6982 .sp 6983 In this case, only members of the group "power_users" can create user defined shares. 6984 .sp 6985 Default: 6986 \fB\fIusershare path\fR = NULL \fR 6987 .RE 6988 .PP 8516 .RE 8517 .sp 8518 .sp 8519 In this case, only members of the group "power_users" can create user defined shares\. 8520 .sp 8521 Default: 8522 \fI\fIusershare path\fR\fR\fI = \fR\fINULL\fR\fI \fR 8523 .RE 8524 6989 8525 usershare prefix allow list (G) 6990 .RS 3n 6991 This parameter specifies a list of absolute pathnames the root of which are allowed to be exported by user defined share definitions. If the pathname exported doesn't start with one of the strings in this list the user defined share will not be allowed. This allows the Samba administrator to restrict the directories on the system that can be exported by user defined shares. 6992 .sp 6993 If there is a "usershare prefix deny list" and also a "usershare prefix allow list" the deny list is processed first, followed by the allow list, thus leading to the most restrictive interpretation. 6994 .sp 6995 Default: 6996 \fB\fIusershare prefix allow list\fR = NULL \fR 6997 .sp 6998 Example: 6999 \fB\fIusershare prefix allow list\fR = /home /data /space \fR 7000 .RE 7001 .PP 8526 .PP 8527 .RS 4 8528 This parameter specifies a list of absolute pathnames the root of which are allowed to be exported by user defined share definitions\. If the pathname exported doesn\'t start with one of the strings in this list the user defined share will not be allowed\. This allows the Samba administrator to restrict the directories on the system that can be exported by user defined shares\. 8529 .sp 8530 If there is a "usershare prefix deny list" and also a "usershare prefix allow list" the deny list is processed first, followed by the allow list, thus leading to the most restrictive interpretation\. 8531 .sp 8532 Default: 8533 \fI\fIusershare prefix allow list\fR\fR\fI = \fR\fINULL\fR\fI \fR 8534 .sp 8535 Example: 8536 \fI\fIusershare prefix allow list\fR\fR\fI = \fR\fI/home /data /space\fR\fI \fR 8537 .RE 8538 7002 8539 usershare prefix deny list (G) 7003 .RS 3n 7004 This parameter specifies a list of absolute pathnames the root of which are NOT allowed to be exported by user defined share definitions. If the pathname exported starts with one of the strings in this list the user defined share will not be allowed. Any pathname not starting with one of these strings will be allowed to be exported as a usershare. This allows the Samba administrator to restrict the directories on the system that can be exported by user defined shares. 7005 .sp 7006 If there is a "usershare prefix deny list" and also a "usershare prefix allow list" the deny list is processed first, followed by the allow list, thus leading to the most restrictive interpretation. 7007 .sp 7008 Default: 7009 \fB\fIusershare prefix deny list\fR = NULL \fR 7010 .sp 7011 Example: 7012 \fB\fIusershare prefix deny list\fR = /etc /dev /private \fR 7013 .RE 7014 .PP 8540 .PP 8541 .RS 4 8542 This parameter specifies a list of absolute pathnames the root of which are NOT allowed to be exported by user defined share definitions\. If the pathname exported starts with one of the strings in this list the user defined share will not be allowed\. Any pathname not starting with one of these strings will be allowed to be exported as a usershare\. This allows the Samba administrator to restrict the directories on the system that can be exported by user defined shares\. 8543 .sp 8544 If there is a "usershare prefix deny list" and also a "usershare prefix allow list" the deny list is processed first, followed by the allow list, thus leading to the most restrictive interpretation\. 8545 .sp 8546 Default: 8547 \fI\fIusershare prefix deny list\fR\fR\fI = \fR\fINULL\fR\fI \fR 8548 .sp 8549 Example: 8550 \fI\fIusershare prefix deny list\fR\fR\fI = \fR\fI/etc /dev /private\fR\fI \fR 8551 .RE 8552 7015 8553 usershare template share (G) 7016 .RS 3n 7017 User defined shares only have limited possible parameters such as path, guest ok etc. This parameter allows usershares to "cloned" from an existing share. If "usershare template share" is set to the name of an existing share, then all usershares created have their defaults set from the parameters set on this share. 7018 .sp 7019 The target share may be set to be invalid for real file sharing by setting the parameter "-valid = False" on the template share definition. This causes it not to be seen as a real exported share but to be able to be used as a template for usershares. 7020 .sp 7021 Default: 7022 \fB\fIusershare template share\fR = NULL \fR 7023 .sp 7024 Example: 7025 \fB\fIusershare template share\fR = template_share \fR 7026 .RE 7027 .PP 8554 .PP 8555 .RS 4 8556 User defined shares only have limited possible parameters such as path, guest ok etc\. This parameter allows usershares to "cloned" from an existing share\. If "usershare template share" is set to the name of an existing share, then all usershares created have their defaults set from the parameters set on this share\. 8557 .sp 8558 The target share may be set to be invalid for real file sharing by setting the parameter "\-valid = False" on the template share definition\. This causes it not to be seen as a real exported share but to be able to be used as a template for usershares\. 8559 .sp 8560 Default: 8561 \fI\fIusershare template share\fR\fR\fI = \fR\fINULL\fR\fI \fR 8562 .sp 8563 Example: 8564 \fI\fIusershare template share\fR\fR\fI = \fR\fItemplate_share\fR\fI \fR 8565 .RE 8566 7028 8567 use sendfile (S) 7029 .RS 3n 8568 .PP 8569 .RS 4 7030 8570 If this parameter is 7031 8571 \fByes\fR, and the 7032 8572 \fBsendfile()\fR 7033 system call is supported by the underlying operating system, then some SMB read calls (mainly ReadAndX and ReadRaw) will use the more efficient sendfile system call for files that are exclusively oplocked . This may make more efficient use of the system CPU's and cause Samba to be faster. Samba automatically turns this off for clients that use protocol levels lower than NT LM 0.12 and when it detects a client is Windows 9x (using sendfile from Linux will cause these clients to fail).7034 .sp 7035 Default: 7036 \f B\fIuse sendfile\fR = false\fR7037 .RE 7038 .PP 8573 system call is supported by the underlying operating system, then some SMB read calls (mainly ReadAndX and ReadRaw) will use the more efficient sendfile system call for files that are exclusively oplocked\. This may make more efficient use of the system CPU\'s and cause Samba to be faster\. Samba automatically turns this off for clients that use protocol levels lower than NT LM 0\.12 and when it detects a client is Windows 9x (using sendfile from Linux will cause these clients to fail)\. 8574 .sp 8575 Default: 8576 \fI\fIuse sendfile\fR\fR\fI = \fR\fIfalse\fR\fI \fR 8577 .RE 8578 7039 8579 use spnego (G) 7040 .RS 3n 7041 This variable controls controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism. 7042 .sp 7043 Unless further issues are discovered with our SPNEGO implementation, there is no reason this should ever be disabled. 7044 .sp 7045 Default: 7046 \fB\fIuse spnego\fR = yes \fR 7047 .RE 7048 .PP 8580 .PP 8581 .RS 4 8582 This variable controls controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\. 8583 .sp 8584 Unless further issues are discovered with our SPNEGO implementation, there is no reason this should ever be disabled\. 8585 .sp 8586 Default: 8587 \fI\fIuse spnego\fR\fR\fI = \fR\fIyes\fR\fI \fR 8588 .RE 8589 8590 utmp directory (G) 8591 .PP 8592 .RS 4 8593 This parameter is only available if Samba has been configured and compiled with the option 8594 \-\-with\-utmp\. It specifies a directory pathname that is used to store the utmp or utmpx files (depending on the UNIX system) that record user connections to a Samba server\. By default this is not set, meaning the system will use whatever utmp file the native system is set to use (usually 8595 \fI/var/run/utmp\fR 8596 on Linux)\. 8597 .sp 8598 Default: 8599 \fI\fIutmp directory\fR\fR\fI = \fR\fI # Determined automatically\fR\fI \fR 8600 .sp 8601 Example: 8602 \fI\fIutmp directory\fR\fR\fI = \fR\fI/var/run/utmp\fR\fI \fR 8603 .RE 8604 7049 8605 utmp (G) 7050 .RS 3n 8606 .PP 8607 .RS 4 7051 8608 This boolean parameter is only available if Samba has been configured and compiled with the option 7052 --with-utmp. If set to8609 \-\-with\-utmp\. If set to 7053 8610 \fByes\fR 7054 then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server. Sites may use this to record the user connecting to a Samba share. 7055 .sp 7056 Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user. Enabling this option creates an n^2 algorithm to find this number. This may impede performance on large installations. 7057 .sp 7058 Default: 7059 \fB\fIutmp\fR = no \fR 7060 .RE 7061 .PP 7062 utmp directory (G) 7063 .RS 3n 7064 This parameter is only available if Samba has been configured and compiled with the option 7065 --with-utmp. It specifies a directory pathname that is used to store the utmp or utmpx files (depending on the UNIX system) that record user connections to a Samba server. By default this is not set, meaning the system will use whatever utmp file the native system is set to use (usually 7066 \fI/var/run/utmp\fR 7067 on Linux). 7068 .sp 7069 Default: 7070 \fB\fIutmp directory\fR = # Determined automatically \fR 7071 .sp 7072 Example: 7073 \fB\fIutmp directory\fR = /var/run/utmp \fR 7074 .RE 7075 .PP 7076 -valid (S) 7077 .RS 3n 7078 This parameter indicates whether a share is valid and thus can be used. When this parameter is set to false, the share will be in no way visible nor accessible. 7079 .sp 7080 This option should not be used by regular users but might be of help to developers. Samba uses this option internally to mark shares as deleted. 7081 .sp 7082 Default: 7083 \fB\fI-valid\fR = yes \fR 7084 .RE 7085 .PP 8611 then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server\. Sites may use this to record the user connecting to a Samba share\. 8612 .sp 8613 Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user\. Enabling this option creates an n^2 algorithm to find this number\. This may impede performance on large installations\. 8614 .sp 8615 Default: 8616 \fI\fIutmp\fR\fR\fI = \fR\fIno\fR\fI \fR 8617 .RE 8618 7086 8619 valid users (S) 7087 .RS 3n 7088 This is a list of users that should be allowed to login to this service. Names starting with '@', '+' and '&' are interpreted using the same rules as described in the 8620 .PP 8621 .RS 4 8622 This is a list of users that should be allowed to login to this service\. Names starting with \'@\', \'+\' and \'&\' are interpreted using the same rules as described in the 7089 8623 \fIinvalid users\fR 7090 parameter .7091 .sp 7092 If this is empty (the default) then any user can login . If a username is in both this list and the8624 parameter\. 8625 .sp 8626 If this is empty (the default) then any user can login\. If a username is in both this list and the 7093 8627 \fIinvalid users\fR 7094 list then access is denied for that user .8628 list then access is denied for that user\. 7095 8629 .sp 7096 8630 The current servicename is substituted for 7097 \fI%S\fR. This is useful in the [homes] section. 7098 .sp 7099 Default: 7100 \fB\fIvalid users\fR = # No valid users list (anyone can login) \fR 7101 .sp 7102 Example: 7103 \fB\fIvalid users\fR = greg, @pcusers \fR 7104 .RE 7105 .PP 8631 \fI%S\fR\. This is useful in the [homes] section\. 8632 .sp 8633 Default: 8634 \fI\fIvalid users\fR\fR\fI = \fR\fI # No valid users list (anyone can login) \fR\fI \fR 8635 .sp 8636 Example: 8637 \fI\fIvalid users\fR\fR\fI = \fR\fIgreg, @pcusers\fR\fI \fR 8638 .RE 8639 8640 \-valid (S) 8641 .PP 8642 .RS 4 8643 This parameter indicates whether a share is valid and thus can be used\. When this parameter is set to false, the share will be in no way visible nor accessible\. 8644 .sp 8645 This option should not be used by regular users but might be of help to developers\. Samba uses this option internally to mark shares as deleted\. 8646 .sp 8647 Default: 8648 \fI\fI\-valid\fR\fR\fI = \fR\fIyes\fR\fI \fR 8649 .RE 8650 7106 8651 veto files (S) 7107 .RS 3n 7108 This is a list of files and directories that are neither visible nor accessible. Each entry in the list must be separated by a '/', which allows spaces to be included in the entry. '*' and '?' can be used to specify multiple files or directories as in DOS wildcards. 8652 .PP 8653 .RS 4 8654 This is a list of files and directories that are neither visible nor accessible\. Each entry in the list must be separated by a \'/\', which allows spaces to be included in the entry\. \'*\' and \'?\' can be used to specify multiple files or directories as in DOS wildcards\. 7109 8655 .sp 7110 8656 Each entry must be a unix path, not a DOS path and must 7111 \f Bnot\fR7112 include the unix directory separator '/'.8657 \fInot\fR 8658 include the unix directory separator \'/\'\. 7113 8659 .sp 7114 8660 Note that the 7115 case sensitive option is applicable in vetoing files. 7116 .sp 7117 One feature of the veto files parameter that it is important to be aware of is Samba's behaviour when trying to delete a directory. If a directory that is to be deleted contains nothing but veto files this deletion will 7118 \fBfail\fR 8661 \fIcase sensitive\fR 8662 option is applicable in vetoing files\. 8663 .sp 8664 One feature of the veto files parameter that it is important to be aware of is Samba\'s behaviour when trying to delete a directory\. If a directory that is to be deleted contains nothing but veto files this deletion will 8665 \fIfail\fR 7119 8666 unless you also set the 7120 delete veto files parameter to 7121 \fIyes\fR. 7122 .sp 7123 Setting this parameter will affect the performance of Samba, as it will be forced to check all files and directories for a match as they are scanned. 8667 \fIdelete veto files\fR 8668 parameter to 8669 \fIyes\fR\. 8670 .sp 8671 Setting this parameter will affect the performance of Samba, as it will be forced to check all files and directories for a match as they are scanned\. 7124 8672 .sp 7125 8673 Examples of use include: 7126 7127 .sp 7128 8674 .sp 8675 .RS 4 7129 8676 .nf 7130 7131 8677 ; Veto any files containing the word Security, 7132 ; any ending in .tmp, and any directory containing the7133 ; word root .7134 veto files = /*Security*/* .tmp/*root*/8678 ; any ending in \.tmp, and any directory containing the 8679 ; word root\. 8680 veto files = /*Security*/*\.tmp/*root*/ 7135 8681 7136 8682 ; Veto the Apple specific files that a NetAtalk server 7137 ; creates. 7138 veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ 7139 8683 ; creates\. 8684 veto files = /\.AppleDouble/\.bin/\.AppleDesktop/Network Trash Folder/ 7140 8685 .fi 7141 7142 .sp 7143 Default: 7144 \fB\fIveto files\fR = No files or directories are vetoed. \fR 7145 .RE 7146 .PP 8686 .RE 8687 .sp 8688 .sp 8689 Default: 8690 \fI\fIveto files\fR\fR\fI = \fR\fINo files or directories are vetoed\.\fR\fI \fR 8691 .RE 8692 7147 8693 veto oplock files (S) 7148 .RS 3n 8694 .PP 8695 .RS 4 7149 8696 This parameter is only valid when the 7150 oplocks parameter is turned on for a share. It allows the Samba administrator to selectively turn off the granting of oplocks on selected files that match a wildcarded list, similar to the wildcarded list used in the 7151 veto files parameter. 7152 .sp 7153 You might want to do this on files that you know will be heavily contended for by clients. A good example of this is in the NetBench SMB benchmark program, which causes heavy client contention for files ending in 7154 \fI.SEM\fR. To cause Samba not to grant oplocks on these files you would use the line (either in the [global] section or in the section for the particular NetBench share. 8697 \fIoplocks\fR 8698 parameter is turned on for a share\. It allows the Samba administrator to selectively turn off the granting of oplocks on selected files that match a wildcarded list, similar to the wildcarded list used in the 8699 \fIveto files\fR 8700 parameter\. 8701 .sp 8702 You might want to do this on files that you know will be heavily contended for by clients\. A good example of this is in the NetBench SMB benchmark program, which causes heavy client contention for files ending in 8703 \fI\.SEM\fR\. To cause Samba not to grant oplocks on these files you would use the line (either in the [global] section or in the section for the particular NetBench share\. 7155 8704 .sp 7156 8705 An example of use is: 7157 7158 .sp 7159 8706 .sp 8707 .RS 4 7160 8708 .nf 7161 7162 veto oplock files = /.*SEM/ 7163 8709 veto oplock files = /\.*SEM/ 7164 8710 .fi 7165 7166 .sp 7167 Default: 7168 \fB\fIveto oplock files\fR = # No files are vetoed for oplock grants \fR 7169 .RE 7170 .PP 7171 vfs object 7172 .RS 3n 7173 This parameter is a synonym for vfs objects. 7174 .RE 7175 .PP 8711 .RE 8712 .sp 8713 .sp 8714 Default: 8715 \fI\fIveto oplock files\fR\fR\fI = \fR\fI # No files are vetoed for oplock grants\fR\fI \fR 8716 .RE 8717 vfs object.PP 8718 .RS 4 8719 This parameter is a synonym for 8720 vfs objects\. 8721 .RE 8722 7176 8723 vfs objects (S) 7177 .RS 3n 7178 This parameter specifies the backend names which are used for Samba VFS I/O operations. By default, normal disk I/O operations are used but these can be overloaded with one or more VFS objects. 7179 .sp 7180 Default: 7181 \fB\fIvfs objects\fR = \fR 7182 .sp 7183 Example: 7184 \fB\fIvfs objects\fR = extd_audit recycle \fR 7185 .RE 7186 .PP 8724 .PP 8725 .RS 4 8726 This parameter specifies the backend names which are used for Samba VFS I/O operations\. By default, normal disk I/O operations are used but these can be overloaded with one or more VFS objects\. 8727 .sp 8728 Default: 8729 \fI\fIvfs objects\fR\fR\fI = \fR\fI\fR\fI \fR 8730 .sp 8731 Example: 8732 \fI\fIvfs objects\fR\fR\fI = \fR\fIextd_audit recycle\fR\fI \fR 8733 .RE 8734 7187 8735 volume (S) 7188 .RS 3n 7189 This allows you to override the volume label returned for a share. Useful for CDROMs with installation programs that insist on a particular volume label. 7190 .sp 7191 Default: 7192 \fB\fIvolume\fR = # the name of the share \fR 7193 .RE 7194 .PP 8736 .PP 8737 .RS 4 8738 This allows you to override the volume label returned for a share\. Useful for CDROMs with installation programs that insist on a particular volume label\. 8739 .sp 8740 Default: 8741 \fI\fIvolume\fR\fR\fI = \fR\fI # the name of the share\fR\fI \fR 8742 .RE 8743 7195 8744 wide links (S) 7196 .RS 3n 7197 This parameter controls whether or not links in the UNIX file system may be followed by the server. Links that point to areas within the directory tree exported by the server are always allowed; this parameter controls access only to areas that are outside the directory tree being exported. 7198 .sp 7199 Note that setting this parameter can have a negative effect on your server performance due to the extra system calls that Samba has to do in order to perform the link checks. 7200 .sp 7201 Default: 7202 \fB\fIwide links\fR = yes \fR 7203 .RE 7204 .PP 8745 .PP 8746 .RS 4 8747 This parameter controls whether or not links in the UNIX file system may be followed by the server\. Links that point to areas within the directory tree exported by the server are always allowed; this parameter controls access only to areas that are outside the directory tree being exported\. 8748 .sp 8749 Note that setting this parameter can have a negative effect on your server performance due to the extra system calls that Samba has to do in order to perform the link checks\. 8750 .sp 8751 Default: 8752 \fI\fIwide links\fR\fR\fI = \fR\fIyes\fR\fI \fR 8753 .RE 8754 7205 8755 winbind cache time (G) 7206 .RS 3n 8756 .PP 8757 .RS 4 7207 8758 This parameter specifies the number of seconds the 7208 8759 \fBwinbindd\fR(8) 7209 daemon will cache user and group information before querying a Windows NT server again .8760 daemon will cache user and group information before querying a Windows NT server again\. 7210 8761 .sp 7211 8762 This does not apply to authentication requests, these are always evaluated in real time unless the 7212 winbind offline logon option has been enabled. 7213 .sp 7214 Default: 7215 \fB\fIwinbind cache time\fR = 300 \fR 7216 .RE 7217 .PP 8763 \fIwinbind offline logon\fR 8764 option has been enabled\. 8765 .sp 8766 Default: 8767 \fI\fIwinbind cache time\fR\fR\fI = \fR\fI300\fR\fI \fR 8768 .RE 8769 7218 8770 winbind enum groups (G) 7219 .RS 3n 8771 .PP 8772 .RS 4 7220 8773 On large installations using 7221 8774 \fBwinbindd\fR(8) … … 7225 8778 and 7226 8779 endgrent() 7227 group of system calls . If the8780 group of system calls\. If the 7228 8781 \fIwinbind enum groups\fR 7229 8782 parameter is 7230 8783 \fBno\fR, calls to the 7231 8784 getgrent() 7232 system call will not return any data .8785 system call will not return any data\. 7233 8786 .sp 7234 8787 .it 1 an-trap … … 7236 8789 .nr an-break-flag 1 7237 8790 .br 7238 \fBWarning\fR 7239 Turning off group enumeration may cause some programs to behave oddly. 7240 Default: 7241 \fB\fIwinbind enum groups\fR = no \fR 7242 .RE 7243 .PP 8791 Warning 8792 Turning off group enumeration may cause some programs to behave oddly\. 8793 8794 Default: 8795 \fI\fIwinbind enum groups\fR\fR\fI = \fR\fIno\fR\fI \fR 8796 .RE 8797 7244 8798 winbind enum users (G) 7245 .RS 3n 8799 .PP 8800 .RS 4 7246 8801 On large installations using 7247 8802 \fBwinbindd\fR(8) … … 7251 8806 and 7252 8807 endpwent() 7253 group of system calls . If the8808 group of system calls\. If the 7254 8809 \fIwinbind enum users\fR 7255 8810 parameter is 7256 8811 \fBno\fR, calls to the 7257 8812 getpwent 7258 system call will not return any data .8813 system call will not return any data\. 7259 8814 .sp 7260 8815 .it 1 an-trap … … 7262 8817 .nr an-break-flag 1 7263 8818 .br 7264 \fBWarning\fR 7265 Turning off user enumeration may cause some programs to behave oddly. For example, the finger program relies on having access to the full user list when searching for matching usernames. 7266 Default: 7267 \fB\fIwinbind enum users\fR = no \fR 7268 .RE 7269 .PP 7270 winbind expand groups (G) 7271 .RS 3n 7272 This option controls the maximum depth that winbindd will traverse when flattening nested group memberships of Windows domain groups. This is different from the 7273 winbind nested groups option which implements the Windows NT4 model of local group nesting. The "winbind expand groups" parameter specifically applies to the membership of domain groups. 7274 .sp 7275 Be aware that a high value for this parameter can result in system slowdown as the main parent winbindd daemon must perform the group unrolling and will be unable to answer incoming NSS or authentication requests during this time. 7276 .sp 7277 Default: 7278 \fB\fIwinbind expand groups\fR = 1 \fR 7279 .RE 7280 .PP 8819 Warning 8820 Turning off user enumeration may cause some programs to behave oddly\. For example, the finger program relies on having access to the full user list when searching for matching usernames\. 8821 8822 Default: 8823 \fI\fIwinbind enum users\fR\fR\fI = \fR\fIno\fR\fI \fR 8824 .RE 8825 7281 8826 winbind nested groups (G) 7282 .RS 3n 7283 If set to yes, this parameter activates the support for nested groups. Nested groups are also called local groups or aliases. They work like their counterparts in Windows: Nested groups are defined locally on any machine (they are shared between DC's through their SAM) and can contain users and global groups from any trusted SAM. To be able to use nested groups, you need to run nss_winbind. 7284 .sp 7285 Default: 7286 \fB\fIwinbind nested groups\fR = yes \fR 7287 .RE 7288 .PP 8827 .PP 8828 .RS 4 8829 If set to yes, this parameter activates the support for nested groups\. Nested groups are also called local groups or aliases\. They work like their counterparts in Windows: Nested groups are defined locally on any machine (they are shared between DC\'s through their SAM) and can contain users and global groups from any trusted SAM\. To be able to use nested groups, you need to run nss_winbind\. 8830 .sp 8831 Default: 8832 \fI\fIwinbind nested groups\fR\fR\fI = \fR\fIyes\fR\fI \fR 8833 .RE 8834 7289 8835 winbind normalize names (G) 7290 .RS 3n 7291 This parameter controls whether winbindd will replace whitespace in user and group names with an underscore (_) character. For example, whether the name "Space Kadet" should be replaced with the string "space_kadet". Frequently Unix shell scripts will have difficulty with usernames contains whitespace due to the default field separator in the shell. Do not enable this option if the underscore character is used in account names within your domain 7292 .sp 7293 Default: 7294 \fB\fIwinbind normalize names\fR = no \fR 7295 .sp 7296 Example: 7297 \fB\fIwinbind normalize names\fR = yes \fR 7298 .RE 7299 .PP 8836 .PP 8837 .RS 4 8838 This parameter controls whether winbindd will replace whitespace in user and group names with an underscore (_) character\. For example, whether the name "Space Kadet" should be replaced with the string "space_kadet"\. Frequently Unix shell scripts will have difficulty with usernames contains whitespace due to the default field separator in the shell\. Do not enable this option if the underscore character is used in account names within your domain 8839 .sp 8840 Default: 8841 \fI\fIwinbind normalize names\fR\fR\fI = \fR\fIno\fR\fI \fR 8842 .sp 8843 Example: 8844 \fI\fIwinbind normalize names\fR\fR\fI = \fR\fIyes\fR\fI \fR 8845 .RE 8846 7300 8847 winbind nss info (G) 7301 .RS 3n 7302 This parameter is designed to control how Winbind retrieves Name Service Information to construct a user's home directory and login shell. Currently the following settings are available: 7303 .RS 3n 7304 .TP 3n 7305 \(bu 8848 .PP 8849 .RS 4 8850 This parameter is designed to control how Winbind retrieves Name Service Information to construct a user\'s home directory and login shell\. Currently the following settings are available: 8851 .sp 8852 .RS 4 8853 .ie n \{\ 8854 \h'-04'\(bu\h'+03'\c 8855 .\} 8856 .el \{\ 8857 .sp -1 8858 .IP \(bu 2.3 8859 .\} 7306 8860 \fItemplate\fR 7307 - The default, using the parameters of8861 \- The default, using the parameters of 7308 8862 \fItemplate shell\fR 7309 8863 and 7310 8864 \fItemplate homedir\fR) 7311 .TP 3n 7312 \(bu 7313 \fIsfu\fR 7314 - When Samba is running in security = ads and your Active Directory Domain Controller does support the Microsoft "Services for Unix" (SFU) LDAP schema, winbind can retrieve the login shell and the home directory attributes directly from your Directory Server. Note that retrieving UID and GID from your ADS-Server requires to use 8865 .RE 8866 .sp 8867 .RS 4 8868 .ie n \{\ 8869 \h'-04'\(bu\h'+03'\c 8870 .\} 8871 .el \{\ 8872 .sp -1 8873 .IP \(bu 2.3 8874 .\} 8875 \fI<sfu | rfc2307 >\fR 8876 \- When Samba is running in security = ads and your Active Directory Domain Controller does support the Microsoft "Services for Unix" (SFU) LDAP schema, winbind can retrieve the login shell and the home directory attributes directly from your Directory Server\. Note that retrieving UID and GID from your ADS\-Server requires to use 7315 8877 \fIidmap backend\fR 7316 = idmap_ad as well. 7317 .RE 7318 .IP "" 3n 7319 7320 .sp 7321 Default: 7322 \fB\fIwinbind nss info\fR = template \fR 7323 .sp 7324 Example: 7325 \fB\fIwinbind nss info\fR = template sfu \fR 7326 .RE 7327 .PP 8878 = ad or 8879 \fIidmap config DOMAIN:backend\fR 8880 = ad as well\. 8881 .sp 8882 .RE 8883 .sp 8884 Default: 8885 \fI\fIwinbind nss info\fR\fR\fI = \fR\fItemplate\fR\fI \fR 8886 .sp 8887 Example: 8888 \fI\fIwinbind nss info\fR\fR\fI = \fR\fItemplate sfu\fR\fI \fR 8889 .RE 8890 7328 8891 winbind offline logon (G) 7329 .RS 3n 8892 .PP 8893 .RS 4 7330 8894 This parameter is designed to control whether Winbind should allow to login with the 7331 8895 \fIpam_winbind\fR 7332 module using Cached Credentials . If enabled, winbindd will store user credentials from successful logins encrypted in a local cache.7333 .sp 7334 Default: 7335 \f B\fIwinbind offline logon\fR = false\fR7336 .sp 7337 Example: 7338 \f B\fIwinbind offline logon\fR = true\fR7339 .RE 7340 .PP 8896 module using Cached Credentials\. If enabled, winbindd will store user credentials from successful logins encrypted in a local cache\. 8897 .sp 8898 Default: 8899 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fIfalse\fR\fI \fR 8900 .sp 8901 Example: 8902 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fItrue\fR\fI \fR 8903 .RE 8904 7341 8905 winbind refresh tickets (G) 7342 .RS 3n 8906 .PP 8907 .RS 4 7343 8908 This parameter is designed to control whether Winbind should refresh Kerberos Tickets retrieved using the 7344 8909 \fIpam_winbind\fR 7345 module. 7346 .sp 7347 Default: 7348 \fB\fIwinbind refresh tickets\fR = false \fR 7349 .sp 7350 Example: 7351 \fB\fIwinbind refresh tickets\fR = true \fR 7352 .RE 7353 .PP 7354 winbind rpc only (G) 7355 .RS 3n 7356 Setting this parameter to 7357 yes 7358 forces winbindd to use RPC instead of LDAP to retrieve information from Domain Controllers. 7359 .sp 7360 Default: 7361 \fB\fIwinbind rpc only\fR = no \fR 7362 .RE 7363 .PP 8910 module\. 8911 .sp 8912 Default: 8913 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fIfalse\fR\fI \fR 8914 .sp 8915 Example: 8916 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fItrue\fR\fI \fR 8917 .RE 8918 7364 8919 winbind separator (G) 7365 .RS 3n 8920 .PP 8921 .RS 4 7366 8922 This parameter allows an admin to define the character used when listing a username of the form of 7367 \fIDOMAIN \fR\ \fIuser\fR. This parameter is only applicable when using the7368 \fIpam_winbind .so\fR8923 \fIDOMAIN \fR\e\fIuser\fR\. This parameter is only applicable when using the 8924 \fIpam_winbind\.so\fR 7369 8925 and 7370 \fInss_winbind .so\fR7371 modules for UNIX services .7372 .sp 7373 Please note that setting this parameter to + causes problems with group membership at least on glibc systems, as the character + is used as a special character for NIS in /etc/group .7374 .sp 7375 Default: 7376 \f B\fIwinbind separator\fR = '\\'\fR7377 .sp 7378 Example: 7379 \f B\fIwinbind separator\fR = +\fR7380 .RE 7381 .PP 8926 \fInss_winbind\.so\fR 8927 modules for UNIX services\. 8928 .sp 8929 Please note that setting this parameter to + causes problems with group membership at least on glibc systems, as the character + is used as a special character for NIS in /etc/group\. 8930 .sp 8931 Default: 8932 \fI\fIwinbind separator\fR\fR\fI = \fR\fI\'\e\'\fR\fI \fR 8933 .sp 8934 Example: 8935 \fI\fIwinbind separator\fR\fR\fI = \fR\fI+\fR\fI \fR 8936 .RE 8937 7382 8938 winbind trusted domains only (G) 7383 .RS 3n 7384 This parameter is designed to allow Samba servers that are members of a Samba controlled domain to use UNIX accounts distributed via NIS, rsync, or LDAP as the uid's for winbindd users in the hosts primary domain. Therefore, the user 7385 DOMAIN\\user1 7386 would be mapped to the account user1 in /etc/passwd instead of allocating a new uid for him or her. 7387 .sp 7388 This parameter is now deprecated in favor of the newer idmap_nss backend. Refer to the 7389 idmap domains smb.conf option and the 8939 .PP 8940 .RS 4 8941 This parameter is designed to allow Samba servers that are members of a Samba controlled domain to use UNIX accounts distributed via NIS, rsync, or LDAP as the uid\'s for winbindd users in the hosts primary domain\. Therefore, the user 8942 DOMAIN\euser1 8943 would be mapped to the account user1 in /etc/passwd instead of allocating a new uid for him or her\. 8944 .sp 8945 This parameter is now deprecated in favor of the newer idmap_nss backend\. Refer to the 8946 \fIidmap domains\fR 8947 smb\.conf option and the 7390 8948 \fBidmap_nss\fR(8) 7391 man page for more information .7392 .sp 7393 Default: 7394 \f B\fIwinbind trusted domains only\fR = no\fR7395 .RE 7396 .PP 8949 man page for more information\. 8950 .sp 8951 Default: 8952 \fI\fIwinbind trusted domains only\fR\fR\fI = \fR\fIno\fR\fI \fR 8953 .RE 8954 7397 8955 winbind use default domain (G) 7398 .RS 3n 8956 .PP 8957 .RS 4 7399 8958 This parameter specifies whether the 7400 8959 \fBwinbindd\fR(8) 7401 daemon should operate on users without domain component in their username . Users without a domain component are treated as is part of the winbindd server's own domain. While this does not benifit Windows users, it makes SSH, FTP and e-mail function in a way much closer to the way they would in a native unix system.7402 .sp 7403 Default: 7404 \f B\fIwinbind use default domain\fR = no\fR7405 .sp 7406 Example: 7407 \f B\fIwinbind use default domain\fR = yes\fR7408 .RE 7409 .PP 8960 daemon should operate on users without domain component in their username\. Users without a domain component are treated as is part of the winbindd server\'s own domain\. While this does not benifit Windows users, it makes SSH, FTP and e\-mail function in a way much closer to the way they would in a native unix system\. 8961 .sp 8962 Default: 8963 \fI\fIwinbind use default domain\fR\fR\fI = \fR\fIno\fR\fI \fR 8964 .sp 8965 Example: 8966 \fI\fIwinbind use default domain\fR\fR\fI = \fR\fIyes\fR\fI \fR 8967 .RE 8968 7410 8969 wins hook (G) 7411 .RS 3n 7412 When Samba is running as a WINS server this allows you to call an external program for all changes to the WINS database. The primary use for this option is to allow the dynamic update of external name resolution databases such as dynamic DNS. 8970 .PP 8971 .RS 4 8972 When Samba is running as a WINS server this allows you to call an external program for all changes to the WINS database\. The primary use for this option is to allow the dynamic update of external name resolution databases such as dynamic DNS\. 7413 8973 .sp 7414 8974 The wins hook parameter specifies the name of a script or executable that will be called as follows: 7415 8975 .sp 7416 8976 wins_hook operation name nametype ttl IP_list 7417 .RS 3n 7418 .TP 3n 7419 \(bu 7420 The first argument is the operation and is one of "add", "delete", or "refresh". In most cases the operation can be ignored as the rest of the parameters provide sufficient information. Note that "refresh" may sometimes be called when the name has not previously been added, in that case it should be treated as an add. 7421 .TP 3n 7422 \(bu 7423 The second argument is the NetBIOS name. If the name is not a legal name then the wins hook is not called. Legal names contain only letters, digits, hyphens, underscores and periods. 7424 .TP 3n 7425 \(bu 7426 The third argument is the NetBIOS name type as a 2 digit hexadecimal number. 7427 .TP 3n 7428 \(bu 7429 The fourth argument is the TTL (time to live) for the name in seconds. 7430 .TP 3n 7431 \(bu 7432 The fifth and subsequent arguments are the IP addresses currently registered for that name. If this list is empty then the name should be deleted. 7433 .RE 7434 .IP "" 3n 8977 .sp 8978 .RS 4 8979 .ie n \{\ 8980 \h'-04'\(bu\h'+03'\c 8981 .\} 8982 .el \{\ 8983 .sp -1 8984 .IP \(bu 2.3 8985 .\} 8986 The first argument is the operation and is one of "add", "delete", or "refresh"\. In most cases the operation can be ignored as the rest of the parameters provide sufficient information\. Note that "refresh" may sometimes be called when the name has not previously been added, in that case it should be treated as an add\. 8987 .RE 8988 .sp 8989 .RS 4 8990 .ie n \{\ 8991 \h'-04'\(bu\h'+03'\c 8992 .\} 8993 .el \{\ 8994 .sp -1 8995 .IP \(bu 2.3 8996 .\} 8997 The second argument is the NetBIOS name\. If the name is not a legal name then the wins hook is not called\. Legal names contain only letters, digits, hyphens, underscores and periods\. 8998 .RE 8999 .sp 9000 .RS 4 9001 .ie n \{\ 9002 \h'-04'\(bu\h'+03'\c 9003 .\} 9004 .el \{\ 9005 .sp -1 9006 .IP \(bu 2.3 9007 .\} 9008 The third argument is the NetBIOS name type as a 2 digit hexadecimal number\. 9009 .RE 9010 .sp 9011 .RS 4 9012 .ie n \{\ 9013 \h'-04'\(bu\h'+03'\c 9014 .\} 9015 .el \{\ 9016 .sp -1 9017 .IP \(bu 2.3 9018 .\} 9019 The fourth argument is the TTL (time to live) for the name in seconds\. 9020 .RE 9021 .sp 9022 .RS 4 9023 .ie n \{\ 9024 \h'-04'\(bu\h'+03'\c 9025 .\} 9026 .el \{\ 9027 .sp -1 9028 .IP \(bu 2.3 9029 .\} 9030 The fifth and subsequent arguments are the IP addresses currently registered for that name\. If this list is empty then the name should be deleted\. 9031 .sp 9032 .RE 7435 9033 An example script that calls the BIND dynamic DNS update program 7436 9034 nsupdate 7437 is provided in the examples directory of the Samba source code .7438 .sp 7439 \f BNo default\fR7440 .RE 7441 .PP 9035 is provided in the examples directory of the Samba source code\. 9036 .sp 9037 \fINo default\fR 9038 .RE 9039 7442 9040 wins proxy (G) 7443 .RS 3n 9041 .PP 9042 .RS 4 7444 9043 This is a boolean that controls if 7445 9044 \fBnmbd\fR(8) 7446 will respond to broadcast name queries on behalf of other hosts . You may need to set this to9045 will respond to broadcast name queries on behalf of other hosts\. You may need to set this to 7447 9046 \fByes\fR 7448 for some older clients .7449 .sp 7450 Default: 7451 \f B\fIwins proxy\fR = no\fR7452 .RE 7453 .PP 9047 for some older clients\. 9048 .sp 9049 Default: 9050 \fI\fIwins proxy\fR\fR\fI = \fR\fIno\fR\fI \fR 9051 .RE 9052 7454 9053 wins server (G) 7455 .RS 3n 9054 .PP 9055 .RS 4 7456 9056 This specifies the IP address (or DNS name: IP address for preference) of the WINS server that 7457 9057 \fBnmbd\fR(8) 7458 should register with . If you have a WINS server on your network then you should set this to the WINS server's IP.7459 .sp 7460 You should point this at your WINS server if you have a multi -subnetted network.7461 .sp 7462 If you want to work in multiple namespaces, you can give every wins server a 'tag'. For each tag, only one (working) server will be queried for a name. The tag should be separated from the ip address by a colon.9058 should register with\. If you have a WINS server on your network then you should set this to the WINS server\'s IP\. 9059 .sp 9060 You should point this at your WINS server if you have a multi\-subnetted network\. 9061 .sp 9062 If you want to work in multiple namespaces, you can give every wins server a \'tag\'\. For each tag, only one (working) server will be queried for a name\. The tag should be separated from the ip address by a colon\. 7463 9063 .sp 7464 9064 .it 1 an-trap … … 7466 9066 .nr an-break-flag 1 7467 9067 .br 7468 \fBNote\fR 7469 You need to set up Samba to point to a WINS server if you have multiple subnets and wish cross-subnet browsing to work correctly. 7470 See the chapter in the Samba3-HOWTO on Network Browsing. 7471 .sp 7472 Default: 7473 \fB\fIwins server\fR = \fR 7474 .sp 7475 Example: 7476 \fB\fIwins server\fR = mary:192.9.200.1 fred:192.168.3.199 mary:192.168.2.61 # For this example when querying a certain name, 192.19.200.1 will be asked first and if that doesn't respond 192.168.2.61. If either of those doesn't know the name 192.168.3.199 will be queried. \fR 7477 .sp 7478 Example: 7479 \fB\fIwins server\fR = 192.9.200.1 192.168.2.61 \fR 7480 .RE 7481 .PP 9068 Note 9069 You need to set up Samba to point to a WINS server if you have multiple subnets and wish cross\-subnet browsing to work correctly\. 9070 9071 See the chapter in the Samba3\-HOWTO on Network Browsing\. 9072 .sp 9073 Default: 9074 \fI\fIwins server\fR\fR\fI = \fR\fI\fR\fI \fR 9075 .sp 9076 Example: 9077 \fI\fIwins server\fR\fR\fI = \fR\fImary:192\.9\.200\.1 fred:192\.168\.3\.199 mary:192\.168\.2\.61 # For this example when querying a certain name, 192\.19\.200\.1 will be asked first and if that doesn\'t respond 192\.168\.2\.61\. If either of those doesn\'t know the name 192\.168\.3\.199 will be queried\.\fR\fI \fR 9078 .sp 9079 Example: 9080 \fI\fIwins server\fR\fR\fI = \fR\fI192\.9\.200\.1 192\.168\.2\.61\fR\fI \fR 9081 .RE 9082 7482 9083 wins support (G) 7483 .RS 3n 9084 .PP 9085 .RS 4 7484 9086 This boolean controls if the 7485 9087 \fBnmbd\fR(8) 7486 process in Samba will act as a WINS server . You should not set this to9088 process in Samba will act as a WINS server\. You should not set this to 7487 9089 \fByes\fR 7488 unless you have a multi -subnetted network and you wish a particular9090 unless you have a multi\-subnetted network and you wish a particular 7489 9091 nmbd 7490 to be your WINS server . Note that you should7491 \f BNEVER\fR9092 to be your WINS server\. Note that you should 9093 \fINEVER\fR 7492 9094 set this to 7493 9095 \fByes\fR 7494 on more than one machine in your network .7495 .sp 7496 Default: 7497 \f B\fIwins support\fR = no\fR7498 .RE 7499 .PP 9096 on more than one machine in your network\. 9097 .sp 9098 Default: 9099 \fI\fIwins support\fR\fR\fI = \fR\fIno\fR\fI \fR 9100 .RE 9101 7500 9102 workgroup (G) 7501 .RS 3n 7502 This controls what workgroup your server will appear to be in when queried by clients. Note that this parameter also controls the Domain name used with the 7503 security = domain setting. 7504 .sp 7505 Default: 7506 \fB\fIworkgroup\fR = WORKGROUP \fR 7507 .sp 7508 Example: 7509 \fB\fIworkgroup\fR = MYGROUP \fR 7510 .RE 7511 .PP 7512 writable 7513 .RS 3n 7514 This parameter is a synonym for writeable. 7515 .RE 7516 .PP 9103 .PP 9104 .RS 4 9105 This controls what workgroup your server will appear to be in when queried by clients\. Note that this parameter also controls the Domain name used with the 9106 \fIsecurity = domain\fR 9107 setting\. 9108 .sp 9109 Default: 9110 \fI\fIworkgroup\fR\fR\fI = \fR\fIWORKGROUP\fR\fI \fR 9111 .sp 9112 Example: 9113 \fI\fIworkgroup\fR\fR\fI = \fR\fIMYGROUP\fR\fI \fR 9114 .RE 9115 writable.PP 9116 .RS 4 9117 This parameter is a synonym for 9118 writeable\. 9119 .RE 9120 7517 9121 writeable (S) 7518 .RS 3n 9122 .PP 9123 .RS 4 7519 9124 Inverted synonym for 7520 read only.7521 .sp 7522 \f BNo default\fR7523 .RE 7524 .PP 9125 \fIread only\fR\. 9126 .sp 9127 \fINo default\fR 9128 .RE 9129 7525 9130 write cache size (S) 7526 .RS 3n 7527 If this integer parameter is set to non-zero value, Samba will create an in-memory cache for each oplocked file (it does 7528 \fBnot\fR 7529 do this for non-oplocked files). All writes that the client does not request to be flushed directly to disk will be stored in this cache if possible. The cache is flushed onto disk when a write comes in whose offset would not fit into the cache or when the file is closed by the client. Reads for the file are also served from this cache if the data is stored within it. 7530 .sp 7531 This cache allows Samba to batch client writes into a more efficient write size for RAID disks (i.e. writes may be tuned to be the RAID stripe size) and can improve performance on systems where the disk subsystem is a bottleneck but there is free memory for userspace programs. 7532 .sp 7533 The integer parameter specifies the size of this cache (per oplocked file) in bytes. 7534 .sp 7535 Default: 7536 \fB\fIwrite cache size\fR = 0 \fR 7537 .sp 7538 Example: 7539 \fB\fIwrite cache size\fR = 262144 # for a 256k cache size per file \fR 7540 .RE 7541 .PP 9131 .PP 9132 .RS 4 9133 If this integer parameter is set to non\-zero value, Samba will create an in\-memory cache for each oplocked file (it does 9134 \fInot\fR 9135 do this for non\-oplocked files)\. All writes that the client does not request to be flushed directly to disk will be stored in this cache if possible\. The cache is flushed onto disk when a write comes in whose offset would not fit into the cache or when the file is closed by the client\. Reads for the file are also served from this cache if the data is stored within it\. 9136 .sp 9137 This cache allows Samba to batch client writes into a more efficient write size for RAID disks (i\.e\. writes may be tuned to be the RAID stripe size) and can improve performance on systems where the disk subsystem is a bottleneck but there is free memory for userspace programs\. 9138 .sp 9139 The integer parameter specifies the size of this cache (per oplocked file) in bytes\. 9140 .sp 9141 Default: 9142 \fI\fIwrite cache size\fR\fR\fI = \fR\fI0\fR\fI \fR 9143 .sp 9144 Example: 9145 \fI\fIwrite cache size\fR\fR\fI = \fR\fI262144 # for a 256k cache size per file\fR\fI \fR 9146 .RE 9147 7542 9148 write list (S) 7543 .RS 3n 7544 This is a list of users that are given read-write access to a service. If the connecting user is in this list then they will be given write access, no matter what the 7545 read only option is set to. The list can include group names using the @group syntax. 7546 .sp 7547 Note that if a user is in both the read list and the write list then they will be given write access. 9149 .PP 9150 .RS 4 9151 This is a list of users that are given read\-write access to a service\. If the connecting user is in this list then they will be given write access, no matter what the 9152 \fIread only\fR 9153 option is set to\. The list can include group names using the @group syntax\. 9154 .sp 9155 Note that if a user is in both the read list and the write list then they will be given write access\. 7548 9156 .sp 7549 9157 By design, this parameter will not work with the 7550 security = share in Samba 3.0. 7551 .sp 7552 Default: 7553 \fB\fIwrite list\fR = \fR 7554 .sp 7555 Example: 7556 \fB\fIwrite list\fR = admin, root, @staff \fR 7557 .RE 7558 .PP 9158 \fIsecurity = share\fR 9159 in Samba 3\.0\. 9160 .sp 9161 Default: 9162 \fI\fIwrite list\fR\fR\fI = \fR\fI\fR\fI \fR 9163 .sp 9164 Example: 9165 \fI\fIwrite list\fR\fR\fI = \fR\fIadmin, root, @staff\fR\fI \fR 9166 .RE 9167 7559 9168 write raw (G) 7560 .RS 3n 7561 This parameter controls whether or not the server will support raw write SMB's when transferring data from clients. You should never need to change this parameter. 7562 .sp 7563 Default: 7564 \fB\fIwrite raw\fR = yes \fR 7565 .RE 7566 .PP 9169 .PP 9170 .RS 4 9171 This parameter controls whether or not the server will support raw write SMB\'s when transferring data from clients\. You should never need to change this parameter\. 9172 .sp 9173 Default: 9174 \fI\fIwrite raw\fR\fR\fI = \fR\fIyes\fR\fI \fR 9175 .RE 9176 7567 9177 wtmp directory (G) 7568 .RS 3n 9178 .PP 9179 .RS 4 7569 9180 This parameter is only available if Samba has been configured and compiled with the option 7570 --with-utmp. It specifies a directory pathname that is used to store the wtmp or wtmpx files (depending on the UNIX system) that record user connections to a Samba server. The difference with the utmp directory is the fact that user info is kept after a user has logged out.9181 \-\-with\-utmp\. It specifies a directory pathname that is used to store the wtmp or wtmpx files (depending on the UNIX system) that record user connections to a Samba server\. The difference with the utmp directory is the fact that user info is kept after a user has logged out\. 7571 9182 .sp 7572 9183 By default this is not set, meaning the system will use whatever utmp file the native system is set to use (usually 7573 9184 \fI/var/run/wtmp\fR 7574 on Linux) .7575 .sp 7576 Default: 7577 \f B\fIwtmp directory\fR =\fR7578 .sp 7579 Example: 7580 \f B\fIwtmp directory\fR = /var/log/wtmp\fR9185 on Linux)\. 9186 .sp 9187 Default: 9188 \fI\fIwtmp directory\fR\fR\fI = \fR\fI\fR\fI \fR 9189 .sp 9190 Example: 9191 \fI\fIwtmp directory\fR\fR\fI = \fR\fI/var/log/wtmp\fR\fI \fR 7581 9192 .RE 7582 9193 .SH "WARNINGS" 7583 9194 .PP 7584 Although the configuration file permits service names to contain spaces, your client software may not . Spaces will be ignored in comparisons anyway, so it shouldn't be a problem - but be aware of the possibility.7585 .PP 7586 On a similar note, many clients - especially DOS clients - limit service names to eight characters.9195 Although the configuration file permits service names to contain spaces, your client software may not\. Spaces will be ignored in comparisons anyway, so it shouldn\'t be a problem \- but be aware of the possibility\. 9196 .PP 9197 On a similar note, many clients \- especially DOS clients \- limit service names to eight characters\. 7587 9198 \fBsmbd\fR(8) 7588 has no such limitation, but attempts to connect from such clients will fail if they truncate the service names . For this reason you should probably keep your service names down to eight characters in length.9199 has no such limitation, but attempts to connect from such clients will fail if they truncate the service names\. For this reason you should probably keep your service names down to eight characters in length\. 7589 9200 .PP 7590 9201 Use of the … … 7592 9203 and 7593 9204 [printers] 7594 special sections make life for an administrator easy, but the various combinations of default attributes can be tricky . Take extreme care when designing these sections. In particular, ensure that the permissions on spool directories are correct.9205 special sections make life for an administrator easy, but the various combinations of default attributes can be tricky\. Take extreme care when designing these sections\. In particular, ensure that the permissions on spool directories are correct\. 7595 9206 .SH "VERSION" 7596 9207 .PP 7597 This man page is correct for version 3 .0 of the Samba suite.9208 This man page is correct for version 3\.0 of the Samba suite\. 7598 9209 .SH "SEE ALSO" 7599 9210 .PP … … 7607 9218 \fBnmblookup\fR(1), 7608 9219 \fBtestparm\fR(1), 7609 \fBtestprns\fR(1) .9220 \fBtestprns\fR(1)\. 7610 9221 .SH "AUTHOR" 7611 9222 .PP 7612 The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed. 7613 .PP 7614 The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another excellent piece of Open Source software, available at 7615 ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy. 7616 9223 The original Samba software and related utilities were created by Andrew Tridgell\. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed\. 9224 .PP 9225 The original Samba man pages were written by Karl Auer\. The man page sources were converted to YODL format (another excellent piece of Open Source software, available at 9226 ftp://ftp\.icce\.rug\.nl/pub/unix/) and updated for the Samba 2\.0 release by Jeremy Allison\. The conversion to DocBook for Samba 2\.2 was done by Gerald Carter\. The conversion to DocBook XML 4\.2 for Samba 3\.0 was done by Alexander Bokovoy\.
Note:
See TracChangeset
for help on using the changeset viewer.