Ignore:
Timestamp:
May 24, 2009, 7:17:10 AM (16 years ago)
Author:
Herwig Bauernfeind
Message:

Update Samba 3.3 to 3.3.1

File:
1 edited

Legend:

Unmodified
Added
Removed
  • branches/samba-3.3.x/docs/manpages/smb.conf.5

    r216 r221  
    22.\"    Author: [see the "AUTHOR" section]
    33.\" Generator: DocBook XSL Stylesheets v1.74.0 <http://docbook.sf.net/>
    4 .\"      Date: 01/27/2009
     4.\"      Date: 02/24/2009
    55.\"    Manual: File Formats and Conventions
    66.\"    Source: Samba 3.3
    77.\"  Language: English
    88.\"
    9 .TH "SMB\&.CONF" "5" "01/27/2009" "Samba 3\&.3" "File Formats and Conventions"
     9.TH "SMB\&.CONF" "5" "02/24/2009" "Samba 3\&.3" "File Formats and Conventions"
    1010.\" -----------------------------------------------------------------
    1111.\" * (re)Define some macros
     
    10471047\fBsmbd\fR(8)does on receiving a protocol request of "open for delete" from a Windows client\&. If a Windows client doesn\'t have permissions to delete a file then they expect this to be denied at open time\&. POSIX systems normally only detect restrictions on delete by actually attempting to delete the file or directory\&. As Windows clients can (and do) "back out" a delete request by unsetting the "delete on close" bit Samba cannot delete the file immediately on "open for delete" request as we cannot restore such a deleted file\&. With this parameter set to true (the default) then smbd checks the file system permissions directly on "open for delete" and denies the request without actually deleting the file if the file system permissions would seem to deny it\&. This is not perfect, as it\'s possible a user could have deleted a file without Samba being able to check the permissions correctly, but it is close enough to Windows semantics for mostly correct behaviour\&. Samba will correctly check POSIX ACL semantics in this case\&.
    10481048.sp
    1049 If this parameter is set to "false" Samba doesn\'t check permissions on "open for delete" and allows the open\&. If the user doesn\'t have permission to delete the file this will only be discovered at close time, which is too late for the Windows user tools to display an error message to the user\&. The symptom of this is files that appear to have been deleted "magically" re\-appearing on a Windows explorer refersh\&. This is an extremely advanced protocol option which should not need to be changed\&. This parameter was introduced in its final form in 3\&.0\&.21, an earlier version with slightly different semantics was introduced in 3\&.0\&.20\&. That older version is not documented here\&.
     1049If this parameter is set to "false" Samba doesn\'t check permissions on "open for delete" and allows the open\&. If the user doesn\'t have permission to delete the file this will only be discovered at close time, which is too late for the Windows user tools to display an error message to the user\&. The symptom of this is files that appear to have been deleted "magically" re\-appearing on a Windows explorer refresh\&. This is an extremely advanced protocol option which should not need to be changed\&. This parameter was introduced in its final form in 3\&.0\&.21, an earlier version with slightly different semantics was introduced in 3\&.0\&.20\&. That older version is not documented here\&.
    10501050.sp
    10511051Default:
     
    20062006and other samba client tools will attempt to authenticate itself to servers using the weaker LANMAN password hash\&. If disabled, only server which support NT password hashes (e\&.g\&. Windows NT/2000, Samba, etc\&.\&.\&. but not Windows 95/98) will be able to be connected from the Samba client\&.
    20072007.sp
    2008 The LANMAN encrypted response is easily broken, due to it\'s case\-insensitive nature, and the choice of algorithm\&. Clients without Windows 95/98 servers are advised to disable this option\&.
     2008The LANMAN encrypted response is easily broken, due to its case\-insensitive nature, and the choice of algorithm\&. Clients without Windows 95/98 servers are advised to disable this option\&.
    20092009.sp
    20102010Disabling this option will also disable the
     
    21152115.PP
    21162116.RS 4
    2117 This controls whether the client offers or requires the server it talks to to use SMB signing\&. Possible values are
     2117This controls whether the client is allowed or required to use SMB signing\&. Possible values are
    21182118\fIauto\fR,
    21192119\fImandatory\fR
     
    31353135.PP
    31363136.RS 4
    3137 Hosts running the "Advanced Server for Unix (ASU)" product require some special accomodations such as creating a builting [ADMIN$] share that only supports IPC connections\&. The has been the default behavior in smbd for many years\&. However, certain Microsoft applications such as the Print Migrator tool require that the remote server support an [ADMIN$} file share\&. Disabling this parameter allows for creating an [ADMIN$] file share in smb\&.conf\&.
     3137Hosts running the "Advanced Server for Unix (ASU)" product require some special accomodations such as creating a builtin [ADMIN$] share that only supports IPC connections\&. The has been the default behavior in smbd for many years\&. However, certain Microsoft applications such as the Print Migrator tool require that the remote server support an [ADMIN$} file share\&. Disabling this parameter allows for creating an [ADMIN$] file share in smb\&.conf\&.
    31383138.sp
    31393139Default:
     
    31913191The first enhancement to browse propagation consists of a regular wildcard query to a Samba WINS server for all Domain Master Browsers, followed by a browse synchronization with each of the returned DMBs\&. The second enhancement consists of a regular randomised browse synchronization with all currently known DMBs\&.
    31923192.sp
    3193 You may wish to disable this option if you have a problem with empty workgroups not disappearing from browse lists\&. Due to the restrictions of the browse protocols these enhancements can cause a empty workgroup to stay around forever which can be annoying\&.
     3193You may wish to disable this option if you have a problem with empty workgroups not disappearing from browse lists\&. Due to the restrictions of the browse protocols, these enhancements can cause a empty workgroup to stay around forever which can be annoying\&.
    31943194.sp
    31953195In general you should leave this option enabled as it makes cross\-subnet browse propagation much more reliable\&.
     
    45414541will attempt to authenticate users or permit password changes using the LANMAN password hash\&. If disabled, only clients which support NT password hashes (e\&.g\&. Windows NT/2000 clients, smbclient, but not Windows 95/98 or the MS DOS network client) will be able to connect to the Samba host\&.
    45424542.sp
    4543 The LANMAN encrypted response is easily broken, due to it\'s case\-insensitive nature, and the choice of algorithm\&. Servers without Windows 95/98/ME or MS DOS clients are advised to disable this option\&.
     4543The LANMAN encrypted response is easily broken, due to its case\-insensitive nature, and the choice of algorithm\&. Servers without Windows 95/98/ME or MS DOS clients are advised to disable this option\&.
    45444544.sp
    45454545Unlike the
     
    49034903.RE
    49044904
     4905ldap ssl ads (G)
     4906.\" ldap ssl ads
     4907.PP
     4908.RS 4
     4909This option is used to define whether or not Samba should use SSL when connecting to the ldap server using
     4910\fIads\fR
     4911methods\&. Rpc methods are not affected by this parameter\&. Please note, that this parameter won\'t have any effect if
     4912\m[blue]\fBldap ssl\fR\m[]
     4913is set to
     4914\fIno\fR\&.
     4915.sp
     4916See
     4917smb\&.conf(5)
     4918for more information on
     4919\m[blue]\fBldap ssl\fR\m[]\&.
     4920.sp
     4921Default:
     4922\fI\fIldap ssl ads\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR
     4923.RE
     4924
    49054925ldap ssl (G)
    49064926.\" ldap ssl
     
    49154935script\&.
    49164936.sp
    4917 LDAP connections should be secured where possible\&. This may be done setting either this parameter to
     4937LDAP connections should be secured where possible\&. This may be done setting
     4938\fIeither\fR
     4939this parameter to
    49184940\fIStart_tls\fR
    4919 or by specifying
     4941\fIor\fR
     4942by specifying
    49204943\fIldaps://\fR
    49214944in the URL argument of
     
    49504973.sp
    49514974.RE
     4975Please note that this parameter does only affect
     4976\fIrpc\fR
     4977methods\&. To enable the LDAPv3 StartTLS extended operation (RFC2830) for
     4978\fIads\fR, set
     4979\m[blue]\fBldap ssl = yes\fR\m[]
     4980\fIand\fR
     4981\m[blue]\fBldap ssl ads = yes\fR\m[]\&. See
     4982smb\&.conf(5)
     4983for more information on
     4984\m[blue]\fBldap ssl ads\fR\m[]\&.
     4985.sp
    49524986Default:
    49534987\fI\fIldap ssl\fR\fR\fI = \fR\fI\FCstart tls\F[]\fR\fI \fR
     
    74457479By specifying the name of another SMB server or Active Directory domain controller with this option, and using
    74467480\FCsecurity = [ads|domain|server]\F[]
    7447 it is possible to get Samba to to do all its username/password validation using a specific remote server\&.
     7481it is possible to get Samba to do all its username/password validation using a specific remote server\&.
    74487482.sp
    74497483This option sets the name or IP address of the password server to use\&. New syntax has been added to support defining the port to use when connecting to the server the case of an ADS realm\&. To define a port other than the default LDAP port of 389, add the port number using a colon after the name or IP address (e\&.g\&. 192\&.168\&.1\&.100:389)\&. If you do not specify a port, Samba will use the standard LDAP port of tcp/389\&. Note that port numbers have no effect on password servers for Windows NT 4\&.0 domains or netbios connections\&.
     
    82258259.RS 4
    82268260This option allows you to setup
    8227 \fBnmbd\fR(8)to periodically announce itself to arbitrary IP addresses with an arbitrary workgroup name\&.
     8261\fBnmbd\fR(8)
     8262to periodically announce itself to arbitrary IP addresses with an arbitrary workgroup name\&.
    82288263.sp
    82298264This is useful if you want your Samba server to appear in a remote workgroup for which the normal browse propagation rules don\'t work\&. The remote workgroup can be anywhere that you can send IP packets to\&.
     
    82578292the above line would cause
    82588293\FCnmbd\F[]
    8259 to announce itself to the two given IP addresses using the given workgroup names\&. If you leave out the workgroup name then the one given in the
     8294to announce itself to the two given IP addresses using the given workgroup names\&. If you leave out the workgroup name, then the one given in the
    82608295\m[blue]\fBworkgroup\fR\m[]
    82618296parameter is used instead\&.
     
    85598594if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&. It is more difficult to setup guest shares with
    85608595\FCsecurity = user\F[], see the
    8561 \m[blue]\fBmap to guest\fR\m[]parameter for details\&.
     8596\m[blue]\fBmap to guest\fR\m[]
     8597parameter for details\&.
    85628598.sp
    85638599It is possible to use
     
    85728608\fISECURITY = SHARE\fR
    85738609.sp
    8574 When clients connect to a share level security server they need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a
     8610When clients connect to a share level security server, they need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a
    85758611\FCsecurity = share \F[]
    85768612server)\&. Instead, the clients send authentication information (passwords) on a per\-share basis, at the time they attempt to connect to that share\&.
     
    87778813.ps -1
    87788814.br
    8779 From the client\'s point of view
     8815From the client\'s point of view,
    87808816\FCsecurity = server\F[]
    87818817is the same as
     
    88298865.sp
    88308866Please note that with this set to
    8831 \FCno\F[]
    8832 you will have to apply the WindowsXP
     8867\FCno\F[], you will have to apply the WindowsXP
    88338868\FCWinXP_SignOrSeal\&.reg\F[]
    88348869registry patch found in the docs/registry subdirectory of the Samba distribution tarball\&.
     
    88458880.PP
    88468881.RS 4
    8847 This controls whether the server offers or requires the client it talks to to use SMB signing\&. Possible values are
     8882This controls whether the client is allowed or required to use SMB signing\&. Possible values are
    88488883\fIauto\fR,
    88498884\fImandatory\fR
     
    92589293This is a new feature introduced with Samba 3\&.2 and above\&. It is an extension to the SMB/CIFS protocol negotiated as part of the UNIX extensions\&. SMB encryption uses the GSSAPI (SSPI on Windows) ability to encrypt and sign every request/response in a SMB protocol stream\&. When enabled it provides a secure method of SMB/CIFS communication, similar to an ssh protected session, but using SMB/CIFS authentication to negotiate encryption and signing keys\&. Currently this is only supported by Samba 3\&.2 smbclient, and hopefully soon Linux CIFSFS and MacOS/X clients\&. Windows clients do not support this feature\&.
    92599294.sp
    9260 This controls whether the server offers or requires the client it talks to to use SMB encryption\&. Possible values are
     9295This controls whether the remote client is allowed or required to use SMB encryption\&. Possible values are
    92619296\fIauto\fR,
    92629297\fImandatory\fR
     
    95529587\fByes\fR, the server will check every read and write access for file locks, and deny access if locks exist\&. This can be slow on some systems\&.
    95539588.sp
    9554 When strict locking is set to Auto (the default), the server performs file lock checks only on non\-oplocked files\&. As most Windows redirectors perform file locking checks locally on oplocked files this is a good trade off for inproved performance\&.
     9589When strict locking is set to Auto (the default), the server performs file lock checks only on non\-oplocked files\&. As most Windows redirectors perform file locking checks locally on oplocked files this is a good trade off for improved performance\&.
    95559590.sp
    95569591When strict locking is disabled, the server performs file lock checks only when the client explicitly asks for them\&.
     
    97469781.PP
    97479782.RS 4
    9748 This boolean parameter allows a user logging on with a plaintext password to have their encrypted (hashed) password in the smbpasswd file to be updated automatically as they log on\&. This option allows a site to migrate from plaintext password authentication (users authenticate with plaintext password over the wire, and are checked against a UNIX account atabase) to encrypted password authentication (the SMB challenge/response authentication mechanism) without forcing all users to re\-enter their passwords via smbpasswd at the time the change is made\&. This is a convenience option to allow the change over to encrypted passwords to be made over a longer period\&. Once all users have encrypted representations of their passwords in the smbpasswd file this parameter should be set to
     9783This boolean parameter allows a user logging on with a plaintext password to have their encrypted (hashed) password in the smbpasswd file to be updated automatically as they log on\&. This option allows a site to migrate from plaintext password authentication (users authenticate with plaintext password over the wire, and are checked against a UNIX account database) to encrypted password authentication (the SMB challenge/response authentication mechanism) without forcing all users to re\-enter their passwords via smbpasswd at the time the change is made\&. This is a convenience option to allow the change over to encrypted passwords to be made over a longer period\&. Once all users have encrypted representations of their passwords in the smbpasswd file this parameter should be set to
    97499784\fBno\fR\&.
    97509785.sp
     
    97599794to work\&.
    97609795.sp
    9761 Note that even when this parameter is set a user authenticating to
     9796Note that even when this parameter is set, a user authenticating to
    97629797\FCsmbd\F[]
    97639798must still enter a valid password in order to connect correctly, and to update their hashed (smbpasswd) passwords\&.
     
    97779812.sp
    97789813If this parameter is enabled for a printer, then any attempt to open the printer with the PRINTER_ACCESS_ADMINISTER right is mapped to PRINTER_ACCESS_USE instead\&. Thus allowing the OpenPrinterEx() call to succeed\&.
    9779 \fIThis parameter MUST not be able enabled on a print share which has valid print driver installed on the Samba server\&.\fR
     9814\fIThis parameter MUST not be enabled on a print share which has valid print driver installed on the Samba server\&.\fR
    97809815.sp
    97819816Default:
     
    1012510160This parameter controls whether user defined shares are allowed to be accessed by non\-authenticated users or not\&. It is the equivalent of allowing people who can create a share the option of setting
    1012610161\fIguest ok = yes\fR
    10127 in a share definition\&. Due to the security sensitive nature of this the default is set to off\&.
     10162in a share definition\&. Due to its security sensitive nature, the default is set to off\&.
    1012810163.sp
    1012910164Default:
     
    1019710232.PP
    1019810233.RS 4
    10199 This parameter specifies a list of absolute pathnames the root of which are allowed to be exported by user defined share definitions\&. If the pathname exported doesn\'t start with one of the strings in this list the user defined share will not be allowed\&. This allows the Samba administrator to restrict the directories on the system that can be exported by user defined shares\&.
     10234This parameter specifies a list of absolute pathnames the root of which are allowed to be exported by user defined share definitions\&. If the pathname to be exported doesn\'t start with one of the strings in this list, the user defined share will not be allowed\&. This allows the Samba administrator to restrict the directories on the system that can be exported by user defined shares\&.
    1020010235.sp
    1020110236If there is a "usershare prefix deny list" and also a "usershare prefix allow list" the deny list is processed first, followed by the allow list, thus leading to the most restrictive interpretation\&.
     
    1022710262.PP
    1022810263.RS 4
    10229 User defined shares only have limited possible parameters such as path, guest ok etc\&. This parameter allows usershares to "cloned" from an existing share\&. If "usershare template share" is set to the name of an existing share, then all usershares created have their defaults set from the parameters set on this share\&.
     10264User defined shares only have limited possible parameters such as path, guest ok, etc\&. This parameter allows usershares to "cloned" from an existing share\&. If "usershare template share" is set to the name of an existing share, then all usershares created have their defaults set from the parameters set on this share\&.
    1023010265.sp
    1023110266The target share may be set to be invalid for real file sharing by setting the parameter "\-valid = False" on the template share definition\&. This causes it not to be seen as a real exported share but to be able to be used as a template for usershares\&.
Note: See TracChangeset for help on using the changeset viewer.