Changeset 134 for branches/samba-3.0/docs/manpages/smbpasswd.5
- Timestamp:
- May 23, 2008, 6:56:41 AM (17 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
branches/samba-3.0/docs/manpages/smbpasswd.5
r44 r134 1 .\"Generated by db2man.xsl. Don't modify this, modify the source. 2 .de Sh \" Subsection 3 .br 4 .if t .Sp 5 .ne 5 6 .PP 7 \fB\\$1\fR 8 .PP 9 .. 10 .de Sp \" Vertical space (when we can't use .PP) 11 .if t .sp .5v 12 .if n .sp 13 .. 14 .de Ip \" List item 15 .br 16 .ie \\n(.$>=3 .ne \\$3 17 .el .ne 3 18 .IP "\\$1" \\$2 19 .. 20 .TH "SMBPASSWD" 5 "" "" "" 1 .\" Title: smbpasswd 2 .\" Author: 3 .\" Generator: DocBook XSL Stylesheets v1.73.2 <http://docbook.sf.net/> 4 .\" Date: 05/21/2008 5 .\" Manual: File Formats and Conventions 6 .\" Source: Samba 3.0 7 .\" 8 .TH "SMBPASSWD" "5" "05/21/2008" "Samba 3\.0" "File Formats and Conventions" 9 .\" disable hyphenation 10 .nh 11 .\" disable justification (adjust text to left margin only) 12 .ad l 21 13 .SH "NAME" 22 14 smbpasswd - The Samba encrypted password file … … 28 20 This tool is part of the 29 21 \fBsamba\fR(7) 30 suite .22 suite\. 31 23 .PP 32 smbpasswd is the Samba encrypted password file . It contains the username, Unix user id and the SMB hashed passwords of the user, as well as account flag information and the time the password was last changed. This file format has been evolving with Samba and has had several different formats in the past.24 smbpasswd is the Samba encrypted password file\. It contains the username, Unix user id and the SMB hashed passwords of the user, as well as account flag information and the time the password was last changed\. This file format has been evolving with Samba and has had several different formats in the past\. 33 25 .SH "FILE FORMAT" 34 26 .PP 35 The format of the smbpasswd file used by Samba 2 .2 is very similar to the familiar Unix27 The format of the smbpasswd file used by Samba 2\.2 is very similar to the familiar Unix 36 28 \fIpasswd(5)\fR 37 file . It is an ASCII file containing one line for each user. Each field ithin each line is separated from the next by a colon. Any entry beginning with '#' is ignored. The smbpasswd file contains the following information for each user:29 file\. It is an ASCII file containing one line for each user\. Each field ithin each line is separated from the next by a colon\. Any entry beginning with \'#\' is ignored\. The smbpasswd file contains the following information for each user: 38 30 .PP 39 31 name 40 .RS 3n41 This is the user name . It must be a name that already exists in the standard UNIX passwd file.32 .RS 4 33 This is the user name\. It must be a name that already exists in the standard UNIX passwd file\. 42 34 .RE 43 35 .PP 44 36 uid 45 .RS 3n46 This is the UNIX uid . It must match the uid field for the same user entry in the standard UNIX passwd file. If this does not match then Samba will refuse to recognize this smbpasswd file entry as being valid for a user.37 .RS 4 38 This is the UNIX uid\. It must match the uid field for the same user entry in the standard UNIX passwd file\. If this does not match then Samba will refuse to recognize this smbpasswd file entry as being valid for a user\. 47 39 .RE 48 40 .PP 49 41 Lanman Password Hash 50 .RS 3n51 This is the LANMAN hash of the user 's password, encoded as 32 hex digits. The LANMAN hash is created by DES encrypting a well known string with the user's password as the DES key. This is the same password used by Windows 95/98 machines. Note that this password hash is regarded as weak as it is vulnerable to dictionary attacks and if two users choose the same password this entry will be identical (i.e. the password is not "salted" as the UNIX password is). If the user has a null password this field will contain the characters "NO PASSWORD" as the start of the hex string. If the hex string is equal to 32 'X' characters then the user's account is marked as42 .RS 4 43 This is the LANMAN hash of the user\'s password, encoded as 32 hex digits\. The LANMAN hash is created by DES encrypting a well known string with the user\'s password as the DES key\. This is the same password used by Windows 95/98 machines\. Note that this password hash is regarded as weak as it is vulnerable to dictionary attacks and if two users choose the same password this entry will be identical (i\.e\. the password is not "salted" as the UNIX password is)\. If the user has a null password this field will contain the characters "NO PASSWORD" as the start of the hex string\. If the hex string is equal to 32 \'X\' characters then the user\'s account is marked as 52 44 \fBdisabled\fR 53 and the user will not be able to log onto the Samba server .45 and the user will not be able to log onto the Samba server\. 54 46 .sp 55 \f BWARNING !!\fR56 Note that, due to the challenge -response nature of the SMB/CIFS authentication protocol, anyone with a knowledge of this password hash will be able to impersonate the user on the network. For this reason these hashes are known as57 \f Bplain text equivalents\fR47 \fIWARNING !!\fR 48 Note that, due to the challenge\-response nature of the SMB/CIFS authentication protocol, anyone with a knowledge of this password hash will be able to impersonate the user on the network\. For this reason these hashes are known as 49 \fIplain text equivalents\fR 58 50 and must 59 \f BNOT\fR60 be made available to anyone but the root user . To protect these passwords the smbpasswd file is placed in a directory with read and traverse access only to the root user and the smbpasswd file itself must be set to be read/write only by root, with no other access.51 \fINOT\fR 52 be made available to anyone but the root user\. To protect these passwords the smbpasswd file is placed in a directory with read and traverse access only to the root user and the smbpasswd file itself must be set to be read/write only by root, with no other access\. 61 53 .RE 62 54 .PP 63 55 NT Password Hash 64 .RS 3n65 This is the Windows NT hash of the user 's password, encoded as 32 hex digits. The Windows NT hash is created by taking the user's password as represented in 16-bit, little-endian UNICODE and then applying the MD4 (internet rfc1321) hashing algorithm to it.56 .RS 4 57 This is the Windows NT hash of the user\'s password, encoded as 32 hex digits\. The Windows NT hash is created by taking the user\'s password as represented in 16\-bit, little\-endian UNICODE and then applying the MD4 (internet rfc1321) hashing algorithm to it\. 66 58 .sp 67 This password hash is considered more secure than the LANMAN Password Hash as it preserves the case of the password and uses a much higher quality hashing algorithm . However, it is still the case that if two users choose the same password this entry will be identical (i.e. the password is not "salted" as the UNIX password is).59 This password hash is considered more secure than the LANMAN Password Hash as it preserves the case of the password and uses a much higher quality hashing algorithm\. However, it is still the case that if two users choose the same password this entry will be identical (i\.e\. the password is not "salted" as the UNIX password is)\. 68 60 .sp 69 \f BWARNING !!\fR. Note that, due to the challenge-response nature of the SMB/CIFS authentication protocol, anyone with a knowledge of this password hash will be able to impersonate the user on the network. For this reason these hashes are known as70 \f Bplain text equivalents\fR61 \fIWARNING !!\fR\. Note that, due to the challenge\-response nature of the SMB/CIFS authentication protocol, anyone with a knowledge of this password hash will be able to impersonate the user on the network\. For this reason these hashes are known as 62 \fIplain text equivalents\fR 71 63 and must 72 \f BNOT\fR73 be made available to anyone but the root user . To protect these passwords the smbpasswd file is placed in a directory with read and traverse access only to the root user and the smbpasswd file itself must be set to be read/write only by root, with no other access.64 \fINOT\fR 65 be made available to anyone but the root user\. To protect these passwords the smbpasswd file is placed in a directory with read and traverse access only to the root user and the smbpasswd file itself must be set to be read/write only by root, with no other access\. 74 66 .RE 75 67 .PP 76 68 Account Flags 77 .RS 3n 78 This section contains flags that describe the attributes of the users account. This field is bracketed by '[' and ']' characters and is always 13 characters in length (including the '[' and ']' characters). The contents of this field may be any of the following characters: 79 .RS 3n 80 .TP 3n 81 \(bu 82 \fBU\fR 83 - This means this is a "User" account, i.e. an ordinary user. 84 .TP 3n 85 \(bu 86 \fBN\fR 87 - This means the account has no password (the passwords in the fields LANMAN Password Hash and NT Password Hash are ignored). Note that this will only allow users to log on with no password if the 69 .RS 4 70 This section contains flags that describe the attributes of the users account\. This field is bracketed by \'[\' and \']\' characters and is always 13 characters in length (including the \'[\' and \']\' characters)\. The contents of this field may be any of the following characters: 71 .sp 72 .RS 4 73 .ie n \{\ 74 \h'-04'\(bu\h'+03'\c 75 .\} 76 .el \{\ 77 .sp -1 78 .IP \(bu 2.3 79 .\} 80 \fIU\fR 81 \- This means this is a "User" account, i\.e\. an ordinary user\. 82 .RE 83 .sp 84 .RS 4 85 .ie n \{\ 86 \h'-04'\(bu\h'+03'\c 87 .\} 88 .el \{\ 89 .sp -1 90 .IP \(bu 2.3 91 .\} 92 \fIN\fR 93 \- This means the account has no password (the passwords in the fields LANMAN Password Hash and NT Password Hash are ignored)\. Note that this will only allow users to log on with no password if the 88 94 \fI null passwords\fR 89 95 parameter is set in the 90 96 \fBsmb.conf\fR(5) 91 config file. 92 .TP 3n 93 \(bu 94 \fBD\fR 95 - This means the account is disabled and no SMB/CIFS logins will be allowed for this user. 96 .TP 3n 97 \(bu 98 \fBX\fR 99 - This means the password does not expire. 100 .TP 3n 101 \(bu 102 \fBW\fR 103 - This means this account is a "Workstation Trust" account. This kind of account is used in the Samba PDC code stream to allow Windows NT Workstations and Servers to join a Domain hosted by a Samba PDC. 97 config file\. 104 98 .RE 105 .IP "" 3n 106 Other flags may be added as the code is extended in future. The rest of this field space is filled in with spaces. For further information regarding the flags that are supported please refer to the man page for the 99 .sp 100 .RS 4 101 .ie n \{\ 102 \h'-04'\(bu\h'+03'\c 103 .\} 104 .el \{\ 105 .sp -1 106 .IP \(bu 2.3 107 .\} 108 \fID\fR 109 \- This means the account is disabled and no SMB/CIFS logins will be allowed for this user\. 110 .RE 111 .sp 112 .RS 4 113 .ie n \{\ 114 \h'-04'\(bu\h'+03'\c 115 .\} 116 .el \{\ 117 .sp -1 118 .IP \(bu 2.3 119 .\} 120 \fIX\fR 121 \- This means the password does not expire\. 122 .RE 123 .sp 124 .RS 4 125 .ie n \{\ 126 \h'-04'\(bu\h'+03'\c 127 .\} 128 .el \{\ 129 .sp -1 130 .IP \(bu 2.3 131 .\} 132 \fIW\fR 133 \- This means this account is a "Workstation Trust" account\. This kind of account is used in the Samba PDC code stream to allow Windows NT Workstations and Servers to join a Domain hosted by a Samba PDC\. 134 .sp 135 .RE 136 Other flags may be added as the code is extended in future\. The rest of this field space is filled in with spaces\. For further information regarding the flags that are supported please refer to the man page for the 107 137 pdbedit 108 command .138 command\. 109 139 .RE 110 140 .PP 111 141 Last Change Time 112 .RS 3n113 This field consists of the time the account was last modified . It consists of the characters 'LCT-' (standing for "Last Change Time") followed by a numeric encoding of the UNIX time in seconds since the epoch (1970) that the last change was made.142 .RS 4 143 This field consists of the time the account was last modified\. It consists of the characters \'LCT\-\' (standing for "Last Change Time") followed by a numeric encoding of the UNIX time in seconds since the epoch (1970) that the last change was made\. 114 144 .RE 115 145 .PP 116 All other colon separated fields are ignored at this time .146 All other colon separated fields are ignored at this time\. 117 147 .SH "VERSION" 118 148 .PP 119 This man page is correct for version 3 .0 of the Samba suite.149 This man page is correct for version 3\.0 of the Samba suite\. 120 150 .SH "SEE ALSO" 121 151 .PP 122 152 \fBsmbpasswd\fR(8), 123 \fBSamba\fR(7), and the Internet RFC1321 for details on the MD4 algorithm .153 \fBSamba\fR(7), and the Internet RFC1321 for details on the MD4 algorithm\. 124 154 .SH "AUTHOR" 125 155 .PP 126 The original Samba software and related utilities were created by Andrew Tridgell . Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed.156 The original Samba software and related utilities were created by Andrew Tridgell\. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed\. 127 157 .PP 128 The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another excellent piece of Open Source software, available at 129 ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy. 130 158 The original Samba man pages were written by Karl Auer\. The man page sources were converted to YODL format (another excellent piece of Open Source software, available at 159 ftp://ftp\.icce\.rug\.nl/pub/unix/) and updated for the Samba 2\.0 release by Jeremy Allison\. The conversion to DocBook for Samba 2\.2 was done by Gerald Carter\. The conversion to DocBook XML 4\.2 for Samba 3\.0 was done by Alexander Bokovoy\.
Note:
See TracChangeset
for help on using the changeset viewer.