Changeset 231 for branches/samba-3.2.x/docs/manpages/smb.conf.5
- Timestamp:
- May 27, 2009, 9:08:03 AM (16 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
branches/samba-3.2.x/docs/manpages/smb.conf.5
r229 r231 1 1 .\" Title: smb.conf 2 .\" Author: 3 .\" Generator: DocBook XSL Stylesheets v1.7 3.1<http://docbook.sf.net/>4 .\" Date: 12/19/20082 .\" Author: [see the "AUTHOR" section] 3 .\" Generator: DocBook XSL Stylesheets v1.74.0 <http://docbook.sf.net/> 4 .\" Date: 02/03/2009 5 5 .\" Manual: File Formats and Conventions 6 6 .\" Source: Samba 3.2 7 .\" Language: English 7 8 .\" 8 .TH "SMB\.CONF" "5" "12/19/2008" "Samba 3\.2" "File Formats and Conventions" 9 .TH "SMB\&.CONF" "5" "02/03/2009" "Samba 3\&.2" "File Formats and Conventions" 10 .\" ----------------------------------------------------------------- 11 .\" * (re)Define some macros 12 .\" ----------------------------------------------------------------- 13 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 14 .\" toupper - uppercase a string (locale-aware) 15 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 16 .de toupper 17 .tr aAbBcCdDeEfFgGhHiIjJkKlLmMnNoOpPqQrRsStTuUvVwWxXyYzZ 18 \\$* 19 .tr aabbccddeeffgghhiijjkkllmmnnooppqqrrssttuuvvwwxxyyzz 20 .. 21 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 22 .\" SH-xref - format a cross-reference to an SH section 23 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 24 .de SH-xref 25 .ie n \{\ 26 .\} 27 .toupper \\$* 28 .el \{\ 29 \\$* 30 .\} 31 .. 32 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 33 .\" SH - level-one heading that works better for non-TTY output 34 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 35 .de1 SH 36 .\" put an extra blank line of space above the head in non-TTY output 37 .if t \{\ 38 .sp 1 39 .\} 40 .sp \\n[PD]u 41 .nr an-level 1 42 .set-an-margin 43 .nr an-prevailing-indent \\n[IN] 44 .fi 45 .in \\n[an-margin]u 46 .ti 0 47 .HTML-TAG ".NH \\n[an-level]" 48 .it 1 an-trap 49 .nr an-no-space-flag 1 50 .nr an-break-flag 1 51 \." make the size of the head bigger 52 .ps +3 53 .ft B 54 .ne (2v + 1u) 55 .ie n \{\ 56 .\" if n (TTY output), use uppercase 57 .toupper \\$* 58 .\} 59 .el \{\ 60 .nr an-break-flag 0 61 .\" if not n (not TTY), use normal case (not uppercase) 62 \\$1 63 .in \\n[an-margin]u 64 .ti 0 65 .\" if not n (not TTY), put a border/line under subheading 66 .sp -.6 67 \l'\n(.lu' 68 .\} 69 .. 70 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 71 .\" SS - level-two heading that works better for non-TTY output 72 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 73 .de1 SS 74 .sp \\n[PD]u 75 .nr an-level 1 76 .set-an-margin 77 .nr an-prevailing-indent \\n[IN] 78 .fi 79 .in \\n[IN]u 80 .ti \\n[SN]u 81 .it 1 an-trap 82 .nr an-no-space-flag 1 83 .nr an-break-flag 1 84 .ps \\n[PS-SS]u 85 \." make the size of the head bigger 86 .ps +2 87 .ft B 88 .ne (2v + 1u) 89 .if \\n[.$] \&\\$* 90 .. 91 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 92 .\" BB/BE - put background/screen (filled box) around block of text 93 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 94 .de BB 95 .if t \{\ 96 .sp -.5 97 .br 98 .in +2n 99 .ll -2n 100 .gcolor red 101 .di BX 102 .\} 103 .. 104 .de EB 105 .if t \{\ 106 .if "\\$2"adjust-for-leading-newline" \{\ 107 .sp -1 108 .\} 109 .br 110 .di 111 .in 112 .ll 113 .gcolor 114 .nr BW \\n(.lu-\\n(.i 115 .nr BH \\n(dn+.5v 116 .ne \\n(BHu+.5v 117 .ie "\\$2"adjust-for-leading-newline" \{\ 118 \M[\\$1]\h'1n'\v'+.5v'\D'P \\n(BWu 0 0 \\n(BHu -\\n(BWu 0 0 -\\n(BHu'\M[] 119 .\} 120 .el \{\ 121 \M[\\$1]\h'1n'\v'-.5v'\D'P \\n(BWu 0 0 \\n(BHu -\\n(BWu 0 0 -\\n(BHu'\M[] 122 .\} 123 .in 0 124 .sp -.5v 125 .nf 126 .BX 127 .in 128 .sp .5v 129 .fi 130 .\} 131 .. 132 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 133 .\" BM/EM - put colored marker in margin next to block of text 134 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 135 .de BM 136 .if t \{\ 137 .br 138 .ll -2n 139 .gcolor red 140 .di BX 141 .\} 142 .. 143 .de EM 144 .if t \{\ 145 .br 146 .di 147 .ll 148 .gcolor 149 .nr BH \\n(dn 150 .ne \\n(BHu 151 \M[\\$1]\D'P -.75n 0 0 \\n(BHu -(\\n[.i]u - \\n(INu - .75n) 0 0 -\\n(BHu'\M[] 152 .in 0 153 .nf 154 .BX 155 .in 156 .fi 157 .\} 158 .. 159 .\" ----------------------------------------------------------------- 160 .\" * set default formatting 161 .\" ----------------------------------------------------------------- 9 162 .\" disable hyphenation 10 163 .nh 11 164 .\" disable justification (adjust text to left margin only) 12 165 .ad l 13 .SH "NAME" 14 smb.conf - The configuration file for the Samba suite 166 .\" ----------------------------------------------------------------- 167 .\" * MAIN CONTENT STARTS HERE * 168 .\" ----------------------------------------------------------------- 169 .SH "Name" 170 smb.conf \- The configuration file for the Samba suite 15 171 .SH "SYNOPSIS" 16 172 .PP 17 173 The 18 \ fIsmb\.conf\fR19 file is a configuration file for the Samba suite\ .20 \ fIsmb\.conf\fR21 contains runtime configuration information for the Samba programs\ . The22 \ fIsmb\.conf\fR174 \FCsmb\&.conf\F[] 175 file is a configuration file for the Samba suite\&. 176 \FCsmb\&.conf\F[] 177 contains runtime configuration information for the Samba programs\&. The 178 \FCsmb\&.conf\F[] 23 179 file is designed to be configured and administered by the 24 180 \fBswat\fR(8) 25 program\ . The complete description of the file format and possible parameters held within are here for reference purposes\.181 program\&. The complete description of the file format and possible parameters held within are here for reference purposes\&. 26 182 .SH "FILE FORMAT" 27 183 .PP 28 The file consists of sections and parameters\. A section begins with the name of the section in square brackets and continues until the next section begins\. Sections contain parameters of the form: 29 .sp 30 .RS 4 184 The file consists of sections and parameters\&. A section begins with the name of the section in square brackets and continues until the next section begins\&. Sections contain parameters of the form: 185 .sp 186 .if n \{\ 187 .RS 4 188 .\} 189 .fam C 190 .ps -1 31 191 .nf 192 .if t \{\ 193 .sp -1 194 .\} 195 .BB lightgray adjust-for-leading-newline 196 .sp -1 197 32 198 \fIname\fR = \fIvalue \fR 199 .EB lightgray adjust-for-leading-newline 200 .if t \{\ 201 .sp 1 202 .\} 33 203 .fi 34 .RE 35 .PP 36 The file is line\-based \- that is, each newline\-terminated line represents either a comment, a section name or a parameter\. 37 .PP 38 Section and parameter names are not case sensitive\. 39 .PP 40 Only the first equals sign in a parameter is significant\. Whitespace before or after the first equals sign is discarded\. Leading, trailing and internal whitespace in section and parameter names is irrelevant\. Leading and trailing whitespace in a parameter value is discarded\. Internal whitespace within a parameter value is retained verbatim\. 41 .PP 42 Any line beginning with a semicolon (\(lq;\(rq) or a hash (\(lq#\(rq) character is ignored, as are lines containing only whitespace\. 204 .fam 205 .ps +1 206 .if n \{\ 207 .RE 208 .\} 209 .PP 210 The file is line\-based \- that is, each newline\-terminated line represents either a comment, a section name or a parameter\&. 211 .PP 212 Section and parameter names are not case sensitive\&. 213 .PP 214 Only the first equals sign in a parameter is significant\&. Whitespace before or after the first equals sign is discarded\&. Leading, trailing and internal whitespace in section and parameter names is irrelevant\&. Leading and trailing whitespace in a parameter value is discarded\&. Internal whitespace within a parameter value is retained verbatim\&. 215 .PP 216 Any line beginning with a semicolon (\(lq;\(rq) or a hash (\(lq#\(rq) character is ignored, as are lines containing only whitespace\&. 43 217 .PP 44 218 Any line ending in a 45 \(lq\ e\(rq46 is continued on the next line in the customary UNIX fashion\ .47 .PP 48 The values following the equals sign in parameters are all either a string (no quotes needed) or a boolean, which may be given as yes/no, 1/0 or true/false\ . Case is not significant in boolean values, but is preserved in string values\. Some items such as create masks are numeric\.219 \(lq\FC\e\F[]\(rq 220 is continued on the next line in the customary UNIX fashion\&. 221 .PP 222 The values following the equals sign in parameters are all either a string (no quotes needed) or a boolean, which may be given as yes/no, 1/0 or true/false\&. Case is not significant in boolean values, but is preserved in string values\&. Some items such as create masks are numeric\&. 49 223 .SH "SECTION DESCRIPTIONS" 50 224 .PP 51 225 Each section in the configuration file (except for the [global] section) describes a shared resource (known as a 52 \(lqshare\(rq)\ . The section name is the name of the shared resource and the parameters within the section define the shares attributes\.226 \(lqshare\(rq)\&. The section name is the name of the shared resource and the parameters within the section define the shares attributes\&. 53 227 .PP 54 228 There are three special sections, [global], [homes] and [printers], which are described under 55 \fIspecial sections\fR\ . The following notes apply to ordinary section descriptions\.56 .PP 57 A share consists of a directory to which access is being given plus a description of the access rights which are granted to the user of the service\ . Some housekeeping options are also specifiable\.58 .PP 59 Sections are either file share services (used by the client as an extension of their native file systems) or printable services (used by the client to access print services on the host running the server)\ .229 \fIspecial sections\fR\&. The following notes apply to ordinary section descriptions\&. 230 .PP 231 A share consists of a directory to which access is being given plus a description of the access rights which are granted to the user of the service\&. Some housekeeping options are also specifiable\&. 232 .PP 233 Sections are either file share services (used by the client as an extension of their native file systems) or printable services (used by the client to access print services on the host running the server)\&. 60 234 .PP 61 235 Sections may be designated 62 236 \fIguest\fR 63 services, in which case no password is required to access them\ . A specified UNIX237 services, in which case no password is required to access them\&. A specified UNIX 64 238 \fIguest account\fR 65 is used to define access privileges in this case\. 66 .PP 67 Sections other than guest services will require a password to access them\. The client provides the username\. As older clients only provide passwords and not usernames, you may specify a list of usernames to check against the password using the 68 user = 69 option in the share definition\. For modern clients such as Windows 95/98/ME/NT/2000, this should not be necessary\. 70 .PP 71 The access rights granted by the server are masked by the access rights granted to the specified or guest UNIX user by the host system\. The server does not grant more access than the host system grants\. 72 .PP 73 The following sample section defines a file space share\. The user has write access to the path 74 \fI/home/bar\fR\. The share is accessed via the share name 75 foo: 76 .sp 77 .RS 4 239 is used to define access privileges in this case\&. 240 .PP 241 Sections other than guest services will require a password to access them\&. The client provides the username\&. As older clients only provide passwords and not usernames, you may specify a list of usernames to check against the password using the 242 \FCuser =\F[] 243 option in the share definition\&. For modern clients such as Windows 95/98/ME/NT/2000, this should not be necessary\&. 244 .PP 245 The access rights granted by the server are masked by the access rights granted to the specified or guest UNIX user by the host system\&. The server does not grant more access than the host system grants\&. 246 .PP 247 The following sample section defines a file space share\&. The user has write access to the path 248 \FC/home/bar\F[]\&. The share is accessed via the share name 249 \FCfoo\F[]: 250 .sp 251 .if n \{\ 252 .RS 4 253 .\} 254 .fam C 255 .ps -1 78 256 .nf 257 .if t \{\ 258 .sp -1 259 .\} 260 .BB lightgray adjust-for-leading-newline 261 .sp -1 262 79 263 \fI[foo]\fR 80 \fIpath = /home/bar\fR 81 \fIread only = no\fR 264 \m[blue]\fBpath = /home/bar\fR\m[] 265 \m[blue]\fBread only = no\fR\m[] 266 .EB lightgray adjust-for-leading-newline 267 .if t \{\ 268 .sp 1 269 .\} 82 270 .fi 83 .RE 84 .PP 85 The following sample section defines a printable share\. The share is read\-only, but printable\. That is, the only write access permitted is via calls to open, write to and close a spool file\. The 271 .fam 272 .ps +1 273 .if n \{\ 274 .RE 275 .\} 276 .PP 277 The following sample section defines a printable share\&. The share is read\-only, but printable\&. That is, the only write access permitted is via calls to open, write to and close a spool file\&. The 86 278 \fIguest ok\fR 87 279 parameter means access will be permitted as the default guest user (specified elsewhere): 88 280 .sp 89 .RS 4 281 .if n \{\ 282 .RS 4 283 .\} 284 .fam C 285 .ps -1 90 286 .nf 287 .if t \{\ 288 .sp -1 289 .\} 290 .BB lightgray adjust-for-leading-newline 291 .sp -1 292 91 293 \fI[aprinter]\fR 92 \fIpath = /usr/spool/public\fR 93 \fIread only = yes\fR 94 \fIprintable = yes\fR 95 \fIguest ok = yes\fR 294 \m[blue]\fBpath = /usr/spool/public\fR\m[] 295 \m[blue]\fBread only = yes\fR\m[] 296 \m[blue]\fBprintable = yes\fR\m[] 297 \m[blue]\fBguest ok = yes\fR\m[] 298 .EB lightgray adjust-for-leading-newline 299 .if t \{\ 300 .sp 1 301 .\} 96 302 .fi 97 .RE 303 .fam 304 .ps +1 305 .if n \{\ 306 .RE 307 .\} 98 308 .sp 99 309 .SH "SPECIAL SECTIONS" 100 310 .SS "The [global] section" 101 311 .PP 102 Parameters in this section apply to the server as a whole, or are defaults for sections that do not specifically define certain items\ . See the notes under PARAMETERS for more information\.312 Parameters in this section apply to the server as a whole, or are defaults for sections that do not specifically define certain items\&. See the notes under PARAMETERS for more information\&. 103 313 .SS "The [homes] section" 104 314 .PP 105 If a section called [homes] is included in the configuration file, services connecting clients to their home directories can be created on the fly by the server\ .106 .PP 107 When the connection request is made, the existing sections are scanned\ . If a match is found, it is used\. If no match is found, the requested section name is treated as a username and looked up in the local password file\. If the name exists and the correct password has been given, a share is created by cloning the [homes] section\.315 If a section called [homes] is included in the configuration file, services connecting clients to their home directories can be created on the fly by the server\&. 316 .PP 317 When the connection request is made, the existing sections are scanned\&. If a match is found, it is used\&. If no match is found, the requested section name is treated as a username and looked up in the local password file\&. If the name exists and the correct password has been given, a share is created by cloning the [homes] section\&. 108 318 .PP 109 319 Some modifications are then made to the newly created share: … … 117 327 .IP \(bu 2.3 118 328 .\} 119 The share name is changed from homes to the located username\ .120 .RE 121 .sp 122 .RS 4 123 .ie n \{\ 124 \h'-04'\(bu\h'+03'\c 125 .\} 126 .el \{\ 127 .sp -1 128 .IP \(bu 2.3 129 .\} 130 If no path was given, the path is set to the user\'s home directory\ .329 The share name is changed from homes to the located username\&. 330 .RE 331 .sp 332 .RS 4 333 .ie n \{\ 334 \h'-04'\(bu\h'+03'\c 335 .\} 336 .el \{\ 337 .sp -1 338 .IP \(bu 2.3 339 .\} 340 If no path was given, the path is set to the user\'s home directory\&. 131 341 .sp 132 342 .RE … … 134 344 If you decide to use a 135 345 \fIpath =\fR 136 line in your [homes] section, it may be useful to use the %S macro\. For example: 137 .sp 138 .RS 4 346 line in your [homes] section, it may be useful to use the %S macro\&. For example: 347 .sp 348 .if n \{\ 349 .RS 4 350 .\} 351 .fam C 352 .ps -1 139 353 .nf 354 .if t \{\ 355 .sp -1 356 .\} 357 .BB lightgray adjust-for-leading-newline 358 .sp -1 359 140 360 \fBpath = /data/pchome/%S\fR 361 .EB lightgray adjust-for-leading-newline 362 .if t \{\ 363 .sp 1 364 .\} 141 365 .fi 142 .RE 143 .sp 144 is useful if you have different home directories for your PCs than for UNIX access\. 145 .PP 146 This is a fast and simple way to give a large number of clients access to their home directories with a minimum of fuss\. 366 .fam 367 .ps +1 368 .if n \{\ 369 .RE 370 .\} 371 .sp 372 is useful if you have different home directories for your PCs than for UNIX access\&. 373 .PP 374 This is a fast and simple way to give a large number of clients access to their home directories with a minimum of fuss\&. 147 375 .PP 148 376 A similar process occurs if the requested section name is 149 \(lqhomes\(rq, except that the share name is not changed to that of the requesting user\. This method of using the [homes] section works well if different users share a client PC\. 150 .PP 151 The [homes] section can specify all the parameters a normal service section can specify, though some make more sense than others\. The following is a typical and suitable [homes] section: 152 .sp 153 .RS 4 377 \(lqhomes\(rq, except that the share name is not changed to that of the requesting user\&. This method of using the [homes] section works well if different users share a client PC\&. 378 .PP 379 The [homes] section can specify all the parameters a normal service section can specify, though some make more sense than others\&. The following is a typical and suitable [homes] section: 380 .sp 381 .if n \{\ 382 .RS 4 383 .\} 384 .fam C 385 .ps -1 154 386 .nf 387 .if t \{\ 388 .sp -1 389 .\} 390 .BB lightgray adjust-for-leading-newline 391 .sp -1 392 155 393 \fI[homes]\fR 156 \fIread only = no\fR 394 \m[blue]\fBread only = no\fR\m[] 395 .EB lightgray adjust-for-leading-newline 396 .if t \{\ 397 .sp 1 398 .\} 157 399 .fi 158 .RE 400 .fam 401 .ps +1 402 .if n \{\ 403 .RE 404 .\} 159 405 .PP 160 406 An important point is that if guest access is specified in the [homes] section, all home directories will be visible to all clients 161 \fIwithout a password\fR\ . In the very unlikely event that this is actually desirable, it is wise to also specify162 \fIread only access\fR\ .407 \fIwithout a password\fR\&. In the very unlikely event that this is actually desirable, it is wise to also specify 408 \fIread only access\fR\&. 163 409 .PP 164 410 The 165 411 \fIbrowseable\fR 166 flag for auto home directories will be inherited from the global browseable flag, not the [homes] browseable flag\ . This is useful as it means setting412 flag for auto home directories will be inherited from the global browseable flag, not the [homes] browseable flag\&. This is useful as it means setting 167 413 \fIbrowseable = no\fR 168 in the [homes] section will hide the [homes] share but make any auto home directories visible\ .414 in the [homes] section will hide the [homes] share but make any auto home directories visible\&. 169 415 .SS "The [printers] section" 170 416 .PP 171 This section works like [homes], but for printers\ .172 .PP 173 If a [printers] section occurs in the configuration file, users are able to connect to any printer specified in the local host\'s printcap file\ .174 .PP 175 When a connection request is made, the existing sections are scanned\ . If a match is found, it is used\. If no match is found, but a [homes] section exists, it is used as described above\. Otherwise, the requested section name is treated as a printer name and the appropriate printcap file is scanned to see if the requested section name is a valid printer share name\. If a match is found, a new printer share is created by cloning the [printers] section\.417 This section works like [homes], but for printers\&. 418 .PP 419 If a [printers] section occurs in the configuration file, users are able to connect to any printer specified in the local host\'s printcap file\&. 420 .PP 421 When a connection request is made, the existing sections are scanned\&. If a match is found, it is used\&. If no match is found, but a [homes] section exists, it is used as described above\&. Otherwise, the requested section name is treated as a printer name and the appropriate printcap file is scanned to see if the requested section name is a valid printer share name\&. If a match is found, a new printer share is created by cloning the [printers] section\&. 176 422 .PP 177 423 A few modifications are then made to the newly created share: … … 207 453 .IP \(bu 2.3 208 454 .\} 209 If the share does not permit guest access and no username was given, the username is set to the located printer name\. 210 .sp 211 .RE 212 .PP 213 The [printers] service MUST be printable \- if you specify otherwise, the server will refuse to load the configuration file\. 214 .PP 215 Typically the path specified is that of a world\-writeable spool directory with the sticky bit set on it\. A typical [printers] entry looks like this: 216 .sp 217 .RS 4 455 If the share does not permit guest access and no username was given, the username is set to the located printer name\&. 456 .sp 457 .RE 458 .PP 459 The [printers] service MUST be printable \- if you specify otherwise, the server will refuse to load the configuration file\&. 460 .PP 461 Typically the path specified is that of a world\-writeable spool directory with the sticky bit set on it\&. A typical [printers] entry looks like this: 462 .sp 463 .if n \{\ 464 .RS 4 465 .\} 466 .fam C 467 .ps -1 218 468 .nf 469 .if t \{\ 470 .sp -1 471 .\} 472 .BB lightgray adjust-for-leading-newline 473 .sp -1 474 219 475 \fI[printers]\fR 220 \fIpath = /usr/spool/public\fR 221 \fIguest ok = yes\fR 222 \fIprintable = yes\fR 476 \m[blue]\fBpath = /usr/spool/public\fR\m[] 477 \m[blue]\fBguest ok = yes\fR\m[] 478 \m[blue]\fBprintable = yes\fR\m[] 479 .EB lightgray adjust-for-leading-newline 480 .if t \{\ 481 .sp 1 482 .\} 223 483 .fi 224 .RE 225 .PP 226 All aliases given for a printer in the printcap file are legitimate printer names as far as the server is concerned\. If your printing subsystem doesn\'t work like that, you will have to set up a pseudo\-printcap\. This is a file consisting of one or more lines like this: 227 .sp 228 .RS 4 484 .fam 485 .ps +1 486 .if n \{\ 487 .RE 488 .\} 489 .PP 490 All aliases given for a printer in the printcap file are legitimate printer names as far as the server is concerned\&. If your printing subsystem doesn\'t work like that, you will have to set up a pseudo\-printcap\&. This is a file consisting of one or more lines like this: 491 .sp 492 .if n \{\ 493 .RS 4 494 .\} 495 .fam C 496 .ps -1 229 497 .nf 230 alias|alias|alias|alias\.\.\. 498 .if t \{\ 499 .sp -1 500 .\} 501 .BB lightgray adjust-for-leading-newline 502 .sp -1 503 504 alias|alias|alias|alias\&.\&.\&. 505 .EB lightgray adjust-for-leading-newline 506 .if t \{\ 507 .sp 1 508 .\} 231 509 .fi 232 .RE 233 .PP 234 Each alias should be an acceptable printer name for your printing subsystem\. In the [global] section, specify the new file as your printcap\. The server will only recognize names found in your pseudo\-printcap, which of course can contain whatever aliases you like\. The same technique could be used simply to limit access to a subset of your local printers\. 235 .PP 236 An alias, by the way, is defined as any component of the first entry of a printcap record\. Records are separated by newlines, components (if there are more than one) are separated by vertical bar symbols (|)\. 237 .sp 510 .fam 511 .ps +1 512 .if n \{\ 513 .RE 514 .\} 515 .PP 516 Each alias should be an acceptable printer name for your printing subsystem\&. In the [global] section, specify the new file as your printcap\&. The server will only recognize names found in your pseudo\-printcap, which of course can contain whatever aliases you like\&. The same technique could be used simply to limit access to a subset of your local printers\&. 517 .PP 518 An alias, by the way, is defined as any component of the first entry of a printcap record\&. Records are separated by newlines, components (if there are more than one) are separated by vertical bar symbols (\FC|\F[])\&. 519 .if n \{\ 520 .sp 521 .\} 522 .RS 4 523 .BM yellow 238 524 .it 1 an-trap 239 525 .nr an-no-space-flag 1 240 526 .nr an-break-flag 1 241 527 .br 242 Note 528 .ps +1 529 \fBNote\fR 530 .ps -1 531 .br 243 532 .PP 244 533 On SYSV systems which use lpstat to determine what printers are defined on the system you may be able to use 245 printcap name = lpstat 246 to automatically obtain a list of printers\. See the 247 printcap name 248 option for more details\. 534 \FCprintcap name = lpstat\F[] 535 to automatically obtain a list of printers\&. See the 536 \FCprintcap name\F[] 537 option for more details\&. 538 .sp .5v 539 .EM yellow 540 .RE 249 541 .SH "USERSHARES" 250 542 .PP 251 Starting with Samba version 3\ .0\.23 the capability for non\-root users to add, modify, and delete their own share definitions has been added\. This capability is called543 Starting with Samba version 3\&.0\&.23 the capability for non\-root users to add, modify, and delete their own share definitions has been added\&. This capability is called 252 544 \fIusershares\fR 253 and is controlled by a set of parameters in the [global] section of the smb\ .conf\. The relevant parameters are :545 and is controlled by a set of parameters in the [global] section of the smb\&.conf\&. The relevant parameters are : 254 546 .PP 255 547 usershare allow guests 256 548 .RS 4 257 Controls if usershares can permit guest access\ .549 Controls if usershares can permit guest access\&. 258 550 .RE 259 551 .PP 260 552 usershare max shares 261 553 .RS 4 262 Maximum number of user defined shares allowed\ .554 Maximum number of user defined shares allowed\&. 263 555 .RE 264 556 .PP 265 557 usershare owner only 266 558 .RS 4 267 If set only directories owned by the sharing user can be shared\ .559 If set only directories owned by the sharing user can be shared\&. 268 560 .RE 269 561 .PP 270 562 usershare path 271 563 .RS 4 272 Points to the directory containing the user defined share definitions\ . The filesystem permissions on this directory control who can create user defined shares\.564 Points to the directory containing the user defined share definitions\&. The filesystem permissions on this directory control who can create user defined shares\&. 273 565 .RE 274 566 .PP 275 567 usershare prefix allow list 276 568 .RS 4 277 Comma\-separated list of absolute pathnames restricting what directories can be shared\ . Only directories below the pathnames in this list are permitted\.569 Comma\-separated list of absolute pathnames restricting what directories can be shared\&. Only directories below the pathnames in this list are permitted\&. 278 570 .RE 279 571 .PP 280 572 usershare prefix deny list 281 573 .RS 4 282 Comma\-separated list of absolute pathnames restricting what directories can be shared\ . Directories below the pathnames in this list are prohibited\.574 Comma\-separated list of absolute pathnames restricting what directories can be shared\&. Directories below the pathnames in this list are prohibited\&. 283 575 .RE 284 576 .PP 285 577 usershare template share 286 578 .RS 4 287 Names a pre\-existing share used as a template for creating new usershares\ . All other share parameters not specified in the user defined share definition are copied from this named share\.579 Names a pre\-existing share used as a template for creating new usershares\&. All other share parameters not specified in the user defined share definition are copied from this named share\&. 288 580 .RE 289 581 .PP 290 582 To allow members of the UNIX group 291 foo 583 \FCfoo\F[] 292 584 to create user defined shares, create the directory to contain the share definitions as follows: 293 585 .PP 294 586 Become root: 295 587 .sp 296 .RS 4 588 .if n \{\ 589 .RS 4 590 .\} 591 .fam C 592 .ps -1 297 593 .nf 594 .if t \{\ 595 .sp -1 596 .\} 597 .BB lightgray adjust-for-leading-newline 598 .sp -1 599 298 600 mkdir /usr/local/samba/lib/usershares 299 601 chgrp foo /usr/local/samba/lib/usershares 300 602 chmod 1770 /usr/local/samba/lib/usershares 603 .EB lightgray adjust-for-leading-newline 604 .if t \{\ 605 .sp 1 606 .\} 301 607 .fi 302 .RE 608 .fam 609 .ps +1 610 .if n \{\ 611 .RE 612 .\} 303 613 .PP 304 614 Then add the parameters 305 615 .sp 306 .RS 4 616 .if n \{\ 617 .RS 4 618 .\} 619 .fam C 620 .ps -1 307 621 .nf 308 \fIusershare path = /usr/local/samba/lib/usershares\fR 309 \fIusershare max shares = 10\fR # (or the desired number of shares) 622 .if t \{\ 623 .sp -1 624 .\} 625 .BB lightgray adjust-for-leading-newline 626 .sp -1 627 628 \m[blue]\fBusershare path = /usr/local/samba/lib/usershares\fR\m[] 629 \m[blue]\fBusershare max shares = 10\fR\m[] # (or the desired number of shares) 630 .EB lightgray adjust-for-leading-newline 631 .if t \{\ 632 .sp 1 633 .\} 310 634 .fi 311 .RE 635 .fam 636 .ps +1 637 .if n \{\ 638 .RE 639 .\} 312 640 .sp 313 641 to the global section of your 314 \ fIsmb\.conf\fR\. Members of the group foo may then manipulate the user defined shares using the following commands\.642 \FCsmb\&.conf\F[]\&. Members of the group foo may then manipulate the user defined shares using the following commands\&. 315 643 .PP 316 644 net usershare add sharename path [comment] [acl] [guest_ok=[y|n]] 317 645 .RS 4 318 To create or modify (overwrite) a user defined share\ .646 To create or modify (overwrite) a user defined share\&. 319 647 .RE 320 648 .PP 321 649 net usershare delete sharename 322 650 .RS 4 323 To delete a user defined share\ .651 To delete a user defined share\&. 324 652 .RE 325 653 .PP 326 654 net usershare list wildcard\-sharename 327 655 .RS 4 328 To list user defined shares\ .656 To list user defined shares\&. 329 657 .RE 330 658 .PP 331 659 net usershare info wildcard\-sharename 332 660 .RS 4 333 To print information about user defined shares\ .661 To print information about user defined shares\&. 334 662 .RE 335 663 .SH "PARAMETERS" 336 664 .PP 337 Parameters define the specific attributes of sections\ .338 .PP 339 Some parameters are specific to the [global] section (e\ .g\.,340 \fIsecurity\fR)\ . Some parameters are usable in all sections (e\.g\.,341 \fIcreate mask\fR)\ . All others are permissible only in normal sections\. For the purposes of the following descriptions the [homes] and [printers] sections will be considered normal\. The letter665 Parameters define the specific attributes of sections\&. 666 .PP 667 Some parameters are specific to the [global] section (e\&.g\&., 668 \fIsecurity\fR)\&. Some parameters are usable in all sections (e\&.g\&., 669 \fIcreate mask\fR)\&. All others are permissible only in normal sections\&. For the purposes of the following descriptions the [homes] and [printers] sections will be considered normal\&. The letter 342 670 \fIG\fR 343 in parentheses indicates that a parameter is specific to the [global] section\ . The letter671 in parentheses indicates that a parameter is specific to the [global] section\&. The letter 344 672 \fIS\fR 345 indicates that a parameter can be specified in a service specific section\ . All673 indicates that a parameter can be specified in a service specific section\&. All 346 674 \fIS\fR 347 parameters can also be specified in the [global] section \- in which case they will define the default behavior for all services\ .348 .PP 349 Parameters are arranged here in alphabetical order \- this may not create best bedfellows, but at least you can find them! Where there are synonyms, the preferred synonym is described, others refer to the preferred synonym\ .675 parameters can also be specified in the [global] section \- in which case they will define the default behavior for all services\&. 676 .PP 677 Parameters are arranged here in alphabetical order \- this may not create best bedfellows, but at least you can find them! Where there are synonyms, the preferred synonym is described, others refer to the preferred synonym\&. 350 678 .SH "VARIABLE SUBSTITUTIONS" 351 679 .PP 352 Many of the strings that are settable in the config file can take substitutions\ . For example the option680 Many of the strings that are settable in the config file can take substitutions\&. For example the option 353 681 \(lqpath = /tmp/%u\(rq 354 682 is interpreted as 355 683 \(lqpath = /tmp/john\(rq 356 if the user connected with the username john\ .357 .PP 358 These substitutions are mostly noted in the descriptions below, but there are some general substitutions which apply whenever they might be relevant\ . These are:684 if the user connected with the username john\&. 685 .PP 686 These substitutions are mostly noted in the descriptions below, but there are some general substitutions which apply whenever they might be relevant\&. These are: 359 687 .PP 360 688 %U 361 689 .RS 4 362 session username (the username that the client wanted, not necessarily the same as the one they got)\ .690 session username (the username that the client wanted, not necessarily the same as the one they got)\&. 363 691 .RE 364 692 .PP 365 693 %G 366 694 .RS 4 367 primary group name of %U\ .695 primary group name of %U\&. 368 696 .RE 369 697 .PP 370 698 %h 371 699 .RS 4 372 the Internet hostname that Samba is running on\ .700 the Internet hostname that Samba is running on\&. 373 701 .RE 374 702 .PP 375 703 %m 376 704 .RS 4 377 the NetBIOS name of the client machine (very useful)\ .378 .sp 379 This parameter is not available when Samba listens on port 445, as clients no longer send this information\ . If you use this macro in an include statement on a domain that has a Samba domain controller be sure to set in the [global] section380 \fIsmb ports = 139\fR\ . This will cause Samba to not listen on port 445 and will permit include functionality to function as it did with Samba 2\.x\.705 the NetBIOS name of the client machine (very useful)\&. 706 .sp 707 This parameter is not available when Samba listens on port 445, as clients no longer send this information\&. If you use this macro in an include statement on a domain that has a Samba domain controller be sure to set in the [global] section 708 \fIsmb ports = 139\fR\&. This will cause Samba to not listen on port 445 and will permit include functionality to function as it did with Samba 2\&.x\&. 381 709 .RE 382 710 .PP 383 711 %L 384 712 .RS 4 385 the NetBIOS name of the server\ . This allows you to change your config based on what the client calls you\. Your server can have a386 \(lqdual personality\(rq\ .713 the NetBIOS name of the server\&. This allows you to change your config based on what the client calls you\&. Your server can have a 714 \(lqdual personality\(rq\&. 387 715 .RE 388 716 .PP 389 717 %M 390 718 .RS 4 391 the Internet name of the client machine\ .719 the Internet name of the client machine\&. 392 720 .RE 393 721 .PP 394 722 %R 395 723 .RS 4 396 the selected protocol level after protocol negotiation\ . It can be one of CORE, COREPLUS, LANMAN1, LANMAN2 or NT1\.724 the selected protocol level after protocol negotiation\&. It can be one of CORE, COREPLUS, LANMAN1, LANMAN2 or NT1\&. 397 725 .RE 398 726 .PP 399 727 %d 400 728 .RS 4 401 the process id of the current server process\ .729 the process id of the current server process\&. 402 730 .RE 403 731 .PP 404 732 %a 405 733 .RS 4 406 The architecture of the remote machine\ . It currently recognizes Samba (\fBSamba\fR), the Linux CIFS file system (\fBCIFSFS\fR), OS/2, (\fBOS2\fR), Windows for Workgroups (\fBWfWg\fR), Windows 9x/ME (\fBWin95\fR), Windows NT (\fBWinNT\fR), Windows 2000 (\fBWin2K\fR), Windows XP (\fBWinXP\fR), Windows XP 64\-bit(\fBWinXP64\fR), Windows 2003 including 2003R2 (\fBWin2K3\fR), and Windows Vista (\fBVista\fR)\. Anything else will be known as407 \fBUNKNOWN\fR\ .734 The architecture of the remote machine\&. It currently recognizes Samba (\fBSamba\fR), the Linux CIFS file system (\fBCIFSFS\fR), OS/2, (\fBOS2\fR), Windows for Workgroups (\fBWfWg\fR), Windows 9x/ME (\fBWin95\fR), Windows NT (\fBWinNT\fR), Windows 2000 (\fBWin2K\fR), Windows XP (\fBWinXP\fR), Windows XP 64\-bit(\fBWinXP64\fR), Windows 2003 including 2003R2 (\fBWin2K3\fR), and Windows Vista (\fBVista\fR)\&. Anything else will be known as 735 \fBUNKNOWN\fR\&. 408 736 .RE 409 737 .PP 410 738 %I 411 739 .RS 4 412 the IP address of the client machine\ .740 the IP address of the client machine\&. 413 741 .RE 414 742 .PP 415 743 %i 416 744 .RS 4 417 the local IP address to which a client connected\ .745 the local IP address to which a client connected\&. 418 746 .RE 419 747 .PP 420 748 %T 421 749 .RS 4 422 the current date and time\ .750 the current date and time\&. 423 751 .RE 424 752 .PP 425 753 %D 426 754 .RS 4 427 name of the domain or workgroup of the current user\ .755 name of the domain or workgroup of the current user\&. 428 756 .RE 429 757 .PP 430 758 %w 431 759 .RS 4 432 the winbind separator\ .760 the winbind separator\&. 433 761 .RE 434 762 .PP … … 436 764 .RS 4 437 765 the value of the environment variable 438 \fIenvar\fR\ .766 \fIenvar\fR\&. 439 767 .RE 440 768 .PP … … 443 771 %S 444 772 .RS 4 445 the name of the current service, if any\ .773 the name of the current service, if any\&. 446 774 .RE 447 775 .PP 448 776 %P 449 777 .RS 4 450 the root directory of the current service, if any\ .778 the root directory of the current service, if any\&. 451 779 .RE 452 780 .PP 453 781 %u 454 782 .RS 4 455 username of the current service, if any\ .783 username of the current service, if any\&. 456 784 .RE 457 785 .PP 458 786 %g 459 787 .RS 4 460 primary group name of %u\ .788 primary group name of %u\&. 461 789 .RE 462 790 .PP 463 791 %H 464 792 .RS 4 465 the home directory of the user given by %u\ .793 the home directory of the user given by %u\&. 466 794 .RE 467 795 .PP 468 796 %N 469 797 .RS 4 470 the name of your NIS home directory server\ . This is obtained from your NIS auto\.map entry\. If you have not compiled Samba with the798 the name of your NIS home directory server\&. This is obtained from your NIS auto\&.map entry\&. If you have not compiled Samba with the 471 799 \fI\-\-with\-automount\fR 472 option, this value will be the same as %L\ .800 option, this value will be the same as %L\&. 473 801 .RE 474 802 .PP 475 803 %p 476 804 .RS 4 477 the path of the service\'s home directory, obtained from your NIS auto\ .map entry\. The NIS auto\.map entry is split up as478 %N:%p\.805 the path of the service\'s home directory, obtained from your NIS auto\&.map entry\&. The NIS auto\&.map entry is split up as 806 \FC%N:%p\F[]\&. 479 807 .RE 480 808 .PP 481 809 There are some quite creative things that can be done with these substitutions and other 482 \ fIsmb\.conf\fR483 options\ .810 \FCsmb\&.conf\F[] 811 options\&. 484 812 .SH "NAME MANGLING" 485 813 .PP 486 814 Samba supports 487 name mangling 488 so that DOS and Windows clients can use files that don\'t conform to the 8\ .3 format\. It can also be set to adjust the case of 8\.3 format filenames\.489 .PP 490 There are several options that control the way mangling is performed, and they are grouped here rather than listed separately\ . For the defaults look at the output of the testparm program\.491 .PP 492 These options can be set separately for each service\ .815 \FCname mangling\F[] 816 so that DOS and Windows clients can use files that don\'t conform to the 8\&.3 format\&. It can also be set to adjust the case of 8\&.3 format filenames\&. 817 .PP 818 There are several options that control the way mangling is performed, and they are grouped here rather than listed separately\&. For the defaults look at the output of the testparm program\&. 819 .PP 820 These options can be set separately for each service\&. 493 821 .PP 494 822 The options are: … … 496 824 case sensitive = yes/no/auto 497 825 .RS 4 498 controls whether filenames are case sensitive\ . If they aren\'t, Samba must do a filename search and match on passed names\. The default setting of auto allows clients that support case sensitive filenames (Linux CIFSVFS and smbclient 3\.0\.5 and above currently) to tell the Samba server on a per\-packet basis that they wish to access the file system in a case\-sensitive manner (to support UNIX case sensitive semantics)\. No Windows or DOS system supports case\-sensitive filename so setting this option to auto is that same as setting it to no for them\. Default499 \fIauto\fR\ .826 controls whether filenames are case sensitive\&. If they aren\'t, Samba must do a filename search and match on passed names\&. The default setting of auto allows clients that support case sensitive filenames (Linux CIFSVFS and smbclient 3\&.0\&.5 and above currently) to tell the Samba server on a per\-packet basis that they wish to access the file system in a case\-sensitive manner (to support UNIX case sensitive semantics)\&. No Windows or DOS system supports case\-sensitive filename so setting this option to auto is that same as setting it to no for them\&. Default 827 \fIauto\fR\&. 500 828 .RE 501 829 .PP 502 830 default case = upper/lower 503 831 .RS 4 504 controls what the default case is for new filenames (ie\ . files that don\'t currently exist in the filesystem)\. Default505 \fIlower\fR\ . IMPORTANT NOTE: This option will be used to modify the case of832 controls what the default case is for new filenames (ie\&. files that don\'t currently exist in the filesystem)\&. Default 833 \fIlower\fR\&. IMPORTANT NOTE: This option will be used to modify the case of 506 834 \fIall\fR 507 835 incoming client filenames, not just new filenames if the options 508 \ fIcase sensitive = yes\fR,509 \ fIpreserve case = No\fR,510 \ fIshort preserve case = No\fR511 are set\ . This change is needed as part of the optimisations for directories containing large numbers of files\.836 \m[blue]\fBcase sensitive = yes\fR\m[], 837 \m[blue]\fBpreserve case = No\fR\m[], 838 \m[blue]\fBshort preserve case = No\fR\m[] 839 are set\&. This change is needed as part of the optimisations for directories containing large numbers of files\&. 512 840 .RE 513 841 .PP 514 842 preserve case = yes/no 515 843 .RS 4 516 controls whether new files (ie\ . files that don\'t currently exist in the filesystem) are created with the case that the client passes, or if they are forced to be the517 default 518 case\ . Default519 \fIyes\fR\ .844 controls whether new files (ie\&. files that don\'t currently exist in the filesystem) are created with the case that the client passes, or if they are forced to be the 845 \FCdefault\F[] 846 case\&. Default 847 \fIyes\fR\&. 520 848 .RE 521 849 .PP 522 850 short preserve case = yes/no 523 851 .RS 4 524 controls if new files (ie\ . files that don\'t currently exist in the filesystem) which conform to 8\.3 syntax, that is all in upper case and of suitable length, are created upper case, or if they are forced to be the525 default 526 case\ . This option can be used with527 preserve case = yes 528 to permit long filenames to retain their case, while short names are lowercased\ . Default529 \fIyes\fR\ .530 .RE 531 .PP 532 By default, Samba 3\ .0 has the same semantics as a Windows NT server, in that it is case insensitive but case preserving\. As a special case for directories with large numbers of files, if the case options are set as follows, "case sensitive = yes", "case preserve = no", "short preserve case = no" then the "default case" option will be applied and will modify all filenames sent from the client when accessing this share\.852 controls if new files (ie\&. files that don\'t currently exist in the filesystem) which conform to 8\&.3 syntax, that is all in upper case and of suitable length, are created upper case, or if they are forced to be the 853 \FCdefault\F[] 854 case\&. This option can be used with 855 \FCpreserve case = yes\F[] 856 to permit long filenames to retain their case, while short names are lowercased\&. Default 857 \fIyes\fR\&. 858 .RE 859 .PP 860 By default, Samba 3\&.0 has the same semantics as a Windows NT server, in that it is case insensitive but case preserving\&. As a special case for directories with large numbers of files, if the case options are set as follows, "case sensitive = yes", "case preserve = no", "short preserve case = no" then the "default case" option will be applied and will modify all filenames sent from the client when accessing this share\&. 533 861 .SH "NOTE ABOUT USERNAME/PASSWORD VALIDATION" 534 862 .PP 535 There are a number of ways in which a user can connect to a service\ . The server uses the following steps in determining if it will allow a connection to a specified service\. If all the steps fail, the connection request is rejected\. However, if one of the steps succeeds, the following steps are not checked\.863 There are a number of ways in which a user can connect to a service\&. The server uses the following steps in determining if it will allow a connection to a specified service\&. If all the steps fail, the connection request is rejected\&. However, if one of the steps succeeds, the following steps are not checked\&. 536 864 .PP 537 865 If the service is marked 538 866 \(lqguest only = yes\(rq 539 and the server is running with share\-level security (\(lqsecurity = share\(rq, steps 1 to 5 are skipped\. 540 .sp 541 .RS 4 542 \h'-04' 1.\h'+02'If the client has passed a username/password pair and that username/password pair is validated by the UNIX system\'s password programs, the connection is made as that username\. This includes the 543 \e\eserver\eservice%\fIusername\fR 544 method of passing a username\. 545 .RE 546 .sp 547 .RS 4 548 \h'-04' 2.\h'+02'If the client has previously registered a username with the system and now supplies a correct password for that username, the connection is allowed\. 549 .RE 550 .sp 551 .RS 4 552 \h'-04' 3.\h'+02'The client\'s NetBIOS name and any previously used usernames are checked against the supplied password\. If they match, the connection is allowed as the corresponding user\. 553 .RE 554 .sp 555 .RS 4 556 \h'-04' 4.\h'+02'If the client has previously validated a username/password pair with the server and the client has passed the validation token, that username is used\. 557 .RE 558 .sp 559 .RS 4 560 \h'-04' 5.\h'+02'If a 561 user = 867 and the server is running with share\-level security (\(lqsecurity = share\(rq, steps 1 to 5 are skipped\&. 868 .sp 869 .RS 4 870 .ie n \{\ 871 \h'-04' 1.\h'+01'\c 872 .\} 873 .el \{\ 874 .sp -1 875 .IP " 1." 4.2 876 .\} 877 If the client has passed a username/password pair and that username/password pair is validated by the UNIX system\'s password programs, the connection is made as that username\&. This includes the 878 \FC\e\eserver\eservice\F[]%\fIusername\fR 879 method of passing a username\&. 880 .RE 881 .sp 882 .RS 4 883 .ie n \{\ 884 \h'-04' 2.\h'+01'\c 885 .\} 886 .el \{\ 887 .sp -1 888 .IP " 2." 4.2 889 .\} 890 If the client has previously registered a username with the system and now supplies a correct password for that username, the connection is allowed\&. 891 .RE 892 .sp 893 .RS 4 894 .ie n \{\ 895 \h'-04' 3.\h'+01'\c 896 .\} 897 .el \{\ 898 .sp -1 899 .IP " 3." 4.2 900 .\} 901 The client\'s NetBIOS name and any previously used usernames are checked against the supplied password\&. If they match, the connection is allowed as the corresponding user\&. 902 .RE 903 .sp 904 .RS 4 905 .ie n \{\ 906 \h'-04' 4.\h'+01'\c 907 .\} 908 .el \{\ 909 .sp -1 910 .IP " 4." 4.2 911 .\} 912 If the client has previously validated a username/password pair with the server and the client has passed the validation token, that username is used\&. 913 .RE 914 .sp 915 .RS 4 916 .ie n \{\ 917 \h'-04' 5.\h'+01'\c 918 .\} 919 .el \{\ 920 .sp -1 921 .IP " 5." 4.2 922 .\} 923 If a 924 \FCuser = \F[] 562 925 field is given in the 563 \ fIsmb\.conf\fR926 \FCsmb\&.conf\F[] 564 927 file for the service and the client has supplied a password, and that password matches (according to the UNIX system\'s password checking) with one of the usernames from the 565 user = 928 \FCuser =\F[] 566 929 field, the connection is made as the username in the 567 user = 568 line\ . If one of the usernames in the569 user = 930 \FCuser =\F[] 931 line\&. If one of the usernames in the 932 \FCuser =\F[] 570 933 list begins with a 571 @, that name expands to a list of names in the group of the same name\. 572 .RE 573 .sp 574 .RS 4 575 \h'-04' 6.\h'+02'If the service is a guest service, a connection is made as the username given in the 576 guest account = 577 for the service, irrespective of the supplied password\. 934 \FC@\F[], that name expands to a list of names in the group of the same name\&. 935 .RE 936 .sp 937 .RS 4 938 .ie n \{\ 939 \h'-04' 6.\h'+01'\c 940 .\} 941 .el \{\ 942 .sp -1 943 .IP " 6." 4.2 944 .\} 945 If the service is a guest service, a connection is made as the username given in the 946 \FCguest account =\F[] 947 for the service, irrespective of the supplied password\&. 578 948 .RE 579 949 .SH "REGISTRY-BASED CONFIGURATION" 580 950 .PP 581 Starting with Samba version 3\.2\.0, the capability to store Samba configuration in the registry is available\. The configuration is stored in the registry key 582 \fIHKLM\eSoftware\eSamba\esmbconf\fR\. There are two levels of registry configuration: 583 .sp 584 .RS 4 585 \h'-04' 1.\h'+02'Share definitions stored in registry are used\. This is triggered by setting the global parameter 951 Starting with Samba version 3\&.2\&.0, the capability to store Samba configuration in the registry is available\&. The configuration is stored in the registry key 952 \fI\FCHKLM\eSoftware\eSamba\esmbconf\F[]\fR\&. There are two levels of registry configuration: 953 .sp 954 .RS 4 955 .ie n \{\ 956 \h'-04' 1.\h'+01'\c 957 .\} 958 .el \{\ 959 .sp -1 960 .IP " 1." 4.2 961 .\} 962 Share definitions stored in registry are used\&. This is triggered by setting the global parameter 586 963 \fIregistry shares\fR 587 964 to 588 965 \(lqyes\(rq 589 966 in 590 \fIsmb\ .conf\fR\.967 \fIsmb\&.conf\fR\&. 591 968 .sp 592 969 The registry shares are loaded not at startup but on demand at runtime by 593 \fIsmbd\fR\. Shares defined in 594 \fIsmb\.conf\fR 595 take priority over shares of the same name defined in registry\. 596 .RE 597 .sp 598 .RS 4 599 \h'-04' 2.\h'+02'Global 600 \fIsmb\.conf\fR 601 options stored in registry are used\. This can be activated in two different ways: 970 \fIsmbd\fR\&. Shares defined in 971 \fIsmb\&.conf\fR 972 take priority over shares of the same name defined in registry\&. 973 .RE 974 .sp 975 .RS 4 976 .ie n \{\ 977 \h'-04' 2.\h'+01'\c 978 .\} 979 .el \{\ 980 .sp -1 981 .IP " 2." 4.2 982 .\} 983 Global 984 \fIsmb\&.conf\fR 985 options stored in registry are used\&. This can be activated in two different ways: 602 986 .sp 603 987 Firstly, a registry only configuration is triggered by setting 604 \ fIconfig backend = registry\fR988 \m[blue]\fBconfig backend = registry\fR\m[] 605 989 in the [global] section of 606 \fIsmb\ .conf\fR\. This resets everything that has been read from config files to this point and reads the content of the global configuration section from the registry\. This is the recommended method of using registry based configuration\.990 \fIsmb\&.conf\fR\&. This resets everything that has been read from config files to this point and reads the content of the global configuration section from the registry\&. This is the recommended method of using registry based configuration\&. 607 991 .sp 608 992 Secondly, a mixed configuration can be activated by a special new meaning of the parameter 609 \ fIinclude = registry\fR993 \m[blue]\fBinclude = registry\fR\m[] 610 994 in the [global] section of 611 \fIsmb\ .conf\fR\. This reads the global options from registry with the same priorities as for an include of a text file\. This may be especially useful in cases where an initial configuration is needed to access the registry\.612 .sp 613 Activation of global registry options automatically activates registry shares\ . So in the registry only case, shares are loaded on demand only\.995 \fIsmb\&.conf\fR\&. This reads the global options from registry with the same priorities as for an include of a text file\&. This may be especially useful in cases where an initial configuration is needed to access the registry\&. 996 .sp 997 Activation of global registry options automatically activates registry shares\&. So in the registry only case, shares are loaded on demand only\&. 614 998 .RE 615 999 .sp … … 622 1006 inside the registry configuration has been disabled: Especially by changing the 623 1007 \fIlock directory\fR 624 inside the registry configuration, one would create a broken setup where the daemons do not see the configuration they loaded once it is active\ .1008 inside the registry configuration, one would create a broken setup where the daemons do not see the configuration they loaded once it is active\&. 625 1009 .PP 626 1010 The registry configuration can be accessed with tools like … … 629 1013 \fInet (rpc) registry\fR 630 1014 in the key 631 \fI HKLM\eSoftware\eSamba\esmbconf\fR\. More conveniently, the1015 \fI\FCHKLM\eSoftware\eSamba\esmbconf\F[]\fR\&. More conveniently, the 632 1016 \fIconf\fR 633 1017 subcommand of the 634 1018 \fBnet\fR(8) 635 utility offers a dedicated interface to read and write the registry based configuration locally, i\ .e\. directly accessing the database file, circumventing the server\.1019 utility offers a dedicated interface to read and write the registry based configuration locally, i\&.e\&. directly accessing the database file, circumventing the server\&. 636 1020 .SH "EXPLANATION OF EACH PARAMETER" 637 1021 638 1022 639 1023 abort shutdown script (G) 1024 .\" abort shutdown script 640 1025 .PP 641 1026 .RS 4 … … 643 1028 \fBsmbd\fR(8) 644 1029 that should stop a shutdown procedure issued by the 645 \ fIshutdown script\fR\.1030 \m[blue]\fBshutdown script\fR\m[]\&. 646 1031 .sp 647 1032 If the connected user posseses the 648 \fBSeRemoteShutdownPrivilege\fR, right, this command will be run as user\ .649 .sp 650 Default: 651 \fI\fIabort shutdown script\fR\fR\fI = \fR\fI ""\fR\fI \fR652 .sp 653 Example: 654 \fI\fIabort shutdown script\fR\fR\fI = \fR\fI /sbin/shutdown \-c\fR\fI \fR1033 \fBSeRemoteShutdownPrivilege\fR, right, this command will be run as user\&. 1034 .sp 1035 Default: 1036 \fI\fIabort shutdown script\fR\fR\fI = \fR\fI\FC""\F[]\fR\fI \fR 1037 .sp 1038 Example: 1039 \fI\fIabort shutdown script\fR\fR\fI = \fR\fI\FC/sbin/shutdown \-c\F[]\fR\fI \fR 655 1040 .RE 656 1041 657 1042 acl check permissions (S) 1043 .\" acl check permissions 658 1044 .PP 659 1045 .RS 4 660 1046 This boolean parameter controls what 661 \fBsmbd\fR(8)does on receiving a protocol request of "open for delete" from a Windows client\. If a Windows client doesn\'t have permissions to delete a file then they expect this to be denied at open time\. POSIX systems normally only detect restrictions on delete by actually attempting to delete the file or directory\. As Windows clients can (and do) "back out" a delete request by unsetting the "delete on close" bit Samba cannot delete the file immediately on "open for delete" request as we cannot restore such a deleted file\. With this parameter set to true (the default) then smbd checks the file system permissions directly on "open for delete" and denies the request without actually deleting the file if the file system permissions would seem to deny it\. This is not perfect, as it\'s possible a user could have deleted a file without Samba being able to check the permissions correctly, but it is close enough to Windows semantics for mostly correct behaviour\. Samba will correctly check POSIX ACL semantics in this case\. 662 .sp 663 If this parameter is set to "false" Samba doesn\'t check permissions on "open for delete" and allows the open\. If the user doesn\'t have permission to delete the file this will only be discovered at close time, which is too late for the Windows user tools to display an error message to the user\. The symptom of this is files that appear to have been deleted "magically" re\-appearing on a Windows explorer refersh\. This is an extremely advanced protocol option which should not need to be changed\. This parameter was introduced in its final form in 3\.0\.21, an earlier version with slightly different semantics was introduced in 3\.0\.20\. That older version is not documented here\. 664 .sp 665 Default: 666 \fI\fIacl check permissions\fR\fR\fI = \fR\fITrue\fR\fI \fR 667 .RE 668 669 acl compatibility (S) 670 .PP 671 .RS 4 672 This parameter specifies what OS ACL semantics should be compatible with\. Possible values are 1047 \fBsmbd\fR(8)does on receiving a protocol request of "open for delete" from a Windows client\&. If a Windows client doesn\'t have permissions to delete a file then they expect this to be denied at open time\&. POSIX systems normally only detect restrictions on delete by actually attempting to delete the file or directory\&. As Windows clients can (and do) "back out" a delete request by unsetting the "delete on close" bit Samba cannot delete the file immediately on "open for delete" request as we cannot restore such a deleted file\&. With this parameter set to true (the default) then smbd checks the file system permissions directly on "open for delete" and denies the request without actually deleting the file if the file system permissions would seem to deny it\&. This is not perfect, as it\'s possible a user could have deleted a file without Samba being able to check the permissions correctly, but it is close enough to Windows semantics for mostly correct behaviour\&. Samba will correctly check POSIX ACL semantics in this case\&. 1048 .sp 1049 If this parameter is set to "false" Samba doesn\'t check permissions on "open for delete" and allows the open\&. If the user doesn\'t have permission to delete the file this will only be discovered at close time, which is too late for the Windows user tools to display an error message to the user\&. The symptom of this is files that appear to have been deleted "magically" re\-appearing on a Windows explorer refersh\&. This is an extremely advanced protocol option which should not need to be changed\&. This parameter was introduced in its final form in 3\&.0\&.21, an earlier version with slightly different semantics was introduced in 3\&.0\&.20\&. That older version is not documented here\&. 1050 .sp 1051 Default: 1052 \fI\fIacl check permissions\fR\fR\fI = \fR\fI\FCTrue\F[]\fR\fI \fR 1053 .RE 1054 1055 acl compatibility (G) 1056 .\" acl compatibility 1057 .PP 1058 .RS 4 1059 This parameter specifies what OS ACL semantics should be compatible with\&. Possible values are 673 1060 \fIwinnt\fR 674 1061 for Windows NT 4, 675 1062 \fIwin2k\fR 676 1063 for Windows 2000 and above and 677 \fIauto\fR\ . If you specify678 \fIauto\fR, the value for this parameter will be based upon the version of the client\ . There should be no reason to change this parameter from the default\.679 .sp 680 Default: 681 \fI\fIacl compatibility\fR\fR\fI = \fR\fI Auto\fR\fI \fR682 .sp 683 Example: 684 \fI\fIacl compatibility\fR\fR\fI = \fR\fI win2k\fR\fI \fR1064 \fIauto\fR\&. If you specify 1065 \fIauto\fR, the value for this parameter will be based upon the version of the client\&. There should be no reason to change this parameter from the default\&. 1066 .sp 1067 Default: 1068 \fI\fIacl compatibility\fR\fR\fI = \fR\fI\FCAuto\F[]\fR\fI \fR 1069 .sp 1070 Example: 1071 \fI\fIacl compatibility\fR\fR\fI = \fR\fI\FCwin2k\F[]\fR\fI \fR 685 1072 .RE 686 1073 687 1074 acl group control (S) 688 .PP 689 .RS 4 690 In a POSIX filesystem, only the owner of a file or directory and the superuser can modify the permissions and ACLs on a file\. If this parameter is set, then Samba overrides this restriction, and also allows the 1075 .\" acl group control 1076 .PP 1077 .RS 4 1078 In a POSIX filesystem, only the owner of a file or directory and the superuser can modify the permissions and ACLs on a file\&. If this parameter is set, then Samba overrides this restriction, and also allows the 691 1079 \fIprimary group owner\fR 692 of a file or directory to modify the permissions and ACLs on that file\ .693 .sp 694 On a Windows server, groups may be the owner of a file or directory \- thus allowing anyone in that group to modify the permissions on it\ . This allows the delegation of security controls on a point in the filesystem to the group owner of a directory and anything below it also owned by that group\. This means there are multiple people with permissions to modify ACLs on a file or directory, easing managability\.695 .sp 696 This parameter allows Samba to also permit delegation of the control over a point in the exported directory hierarchy in much the same way as Windows\ . This allows all members of a UNIX group to control the permissions on a file or directory they have group ownership on\.1080 of a file or directory to modify the permissions and ACLs on that file\&. 1081 .sp 1082 On a Windows server, groups may be the owner of a file or directory \- thus allowing anyone in that group to modify the permissions on it\&. This allows the delegation of security controls on a point in the filesystem to the group owner of a directory and anything below it also owned by that group\&. This means there are multiple people with permissions to modify ACLs on a file or directory, easing managability\&. 1083 .sp 1084 This parameter allows Samba to also permit delegation of the control over a point in the exported directory hierarchy in much the same way as Windows\&. This allows all members of a UNIX group to control the permissions on a file or directory they have group ownership on\&. 697 1085 .sp 698 1086 This parameter is best used with the 699 \ fIinherit owner\fR1087 \m[blue]\fBinherit owner\fR\m[] 700 1088 option and also on on a share containing directories with the UNIX 701 1089 \fIsetgid bit\fR 702 set on them, which causes new files and directories created within it to inherit the group ownership from the containing directory\ .703 .sp 704 This is parameter has been was deprecated in Samba 3\ .0\.23, but re\-activated in Samba 3\.0\.31 and above, as it now only controls permission changes if the user is in the owning primary group\. It is now no longer equivalent to the1090 set on them, which causes new files and directories created within it to inherit the group ownership from the containing directory\&. 1091 .sp 1092 This is parameter has been was deprecated in Samba 3\&.0\&.23, but re\-activated in Samba 3\&.0\&.31 and above, as it now only controls permission changes if the user is in the owning primary group\&. It is now no longer equivalent to the 705 1093 \fIdos filemode\fR 706 option\ .707 .sp 708 Default: 709 \fI\fIacl group control\fR\fR\fI = \fR\fI no\fR\fI \fR1094 option\&. 1095 .sp 1096 Default: 1097 \fI\fIacl group control\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 710 1098 .RE 711 1099 712 1100 acl map full control (S) 1101 .\" acl map full control 713 1102 .PP 714 1103 .RS 4 715 1104 This boolean parameter controls whether 716 \fBsmbd\fR(8)maps a POSIX ACE entry of "rwx" (read/write/execute), the maximum allowed POSIX permission set, into a Windows ACL of "FULL CONTROL"\ . If this parameter is set to true any POSIX ACE entry of "rwx" will be returned in a Windows ACL as "FULL CONTROL", is this parameter is set to false any POSIX ACE entry of "rwx" will be returned as the specific Windows ACL bits representing read, write and execute\.717 .sp 718 Default: 719 \fI\fIacl map full control\fR\fR\fI = \fR\fI True\fR\fI \fR1105 \fBsmbd\fR(8)maps a POSIX ACE entry of "rwx" (read/write/execute), the maximum allowed POSIX permission set, into a Windows ACL of "FULL CONTROL"\&. If this parameter is set to true any POSIX ACE entry of "rwx" will be returned in a Windows ACL as "FULL CONTROL", is this parameter is set to false any POSIX ACE entry of "rwx" will be returned as the specific Windows ACL bits representing read, write and execute\&. 1106 .sp 1107 Default: 1108 \fI\fIacl map full control\fR\fR\fI = \fR\fI\FCTrue\F[]\fR\fI \fR 720 1109 .RE 721 1110 722 1111 add group script (G) 1112 .\" add group script 723 1113 .PP 724 1114 .RS 4 … … 727 1117 by 728 1118 \fBsmbd\fR(8) 729 when a new group is requested\ . It will expand any1119 when a new group is requested\&. It will expand any 730 1120 \fI%g\fR 731 to the group name passed\ . This script is only useful for installations using the Windows NT domain administration tools\. The script is free to create a group with an arbitrary name to circumvent unix group name restrictions\. In that case the script must print the numeric gid of the created group on stdout\.732 .sp 733 Default: 734 \fI\fIadd group script\fR\fR\fI = \fR\fI\ fR\fI \fR735 .sp 736 Example: 737 \fI\fIadd group script\fR\fR\fI = \fR\fI /usr/sbin/groupadd %g\fR\fI \fR1121 to the group name passed\&. This script is only useful for installations using the Windows NT domain administration tools\&. The script is free to create a group with an arbitrary name to circumvent unix group name restrictions\&. In that case the script must print the numeric gid of the created group on stdout\&. 1122 .sp 1123 Default: 1124 \fI\fIadd group script\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 1125 .sp 1126 Example: 1127 \fI\fIadd group script\fR\fR\fI = \fR\fI\FC/usr/sbin/groupadd %g\F[]\fR\fI \fR 738 1128 .RE 739 1129 740 1130 add machine script (G) 1131 .\" add machine script 741 1132 .PP 742 1133 .RS 4 743 1134 This is the full pathname to a script that will be run by 744 1135 \fBsmbd\fR(8) 745 when a machine is added to Samba\'s domain and a Unix account matching the machine\'s name appended with a "$" does not already exist\ .1136 when a machine is added to Samba\'s domain and a Unix account matching the machine\'s name appended with a "$" does not already exist\&. 746 1137 .sp 747 1138 This option is very similar to the 748 \ fIadd user script\fR, and likewise uses the %u substitution for the account name\. Do not use the %m substitution\.749 .sp 750 Default: 751 \fI\fIadd machine script\fR\fR\fI = \fR\fI\ fR\fI \fR752 .sp 753 Example: 754 \fI\fIadd machine script\fR\fR\fI = \fR\fI /usr/sbin/adduser \-n \-g machines \-c Machine \-d /var/lib/nobody \-s /bin/false %u\fR\fI \fR1139 \m[blue]\fBadd user script\fR\m[], and likewise uses the %u substitution for the account name\&. Do not use the %m substitution\&. 1140 .sp 1141 Default: 1142 \fI\fIadd machine script\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 1143 .sp 1144 Example: 1145 \fI\fIadd machine script\fR\fR\fI = \fR\fI\FC/usr/sbin/adduser \-n \-g machines \-c Machine \-d /var/lib/nobody \-s /bin/false %u\F[]\fR\fI \fR 755 1146 .RE 756 1147 757 1148 add port command (G) 758 .PP 759 .RS 4 760 Samba 3\.0\.23 introduced support for adding printer ports remotely using the Windows "Add Standard TCP/IP Port Wizard"\. This option defines an external program to be executed when smbd receives a request to add a new Port to the system\. The script is passed two parameters: 1149 .\" add port command 1150 .PP 1151 .RS 4 1152 Samba 3\&.0\&.23 introduced support for adding printer ports remotely using the Windows "Add Standard TCP/IP Port Wizard"\&. This option defines an external program to be executed when smbd receives a request to add a new Port to the system\&. The script is passed two parameters: 761 1153 .sp 762 1154 .RS 4 … … 782 1174 .sp 783 1175 .RE 784 The deviceURI is in the for of socket://<hostname>[:<portnumber>] or lpd://<hostname>/<queuename>\ .785 .sp 786 Default: 787 \fI\fIadd port command\fR\fR\fI = \fR\fI\ fR\fI \fR788 .sp 789 Example: 790 \fI\fIadd port command\fR\fR\fI = \fR\fI /etc/samba/scripts/addport\.sh\fR\fI \fR1176 The deviceURI is in the for of socket://<hostname>[:<portnumber>] or lpd://<hostname>/<queuename>\&. 1177 .sp 1178 Default: 1179 \fI\fIadd port command\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 1180 .sp 1181 Example: 1182 \fI\fIadd port command\fR\fR\fI = \fR\fI\FC/etc/samba/scripts/addport\&.sh\F[]\fR\fI \fR 791 1183 .RE 792 1184 793 1185 addprinter command (G) 794 .PP 795 .RS 4 796 With the introduction of MS\-RPC based printing support for Windows NT/2000 clients in Samba 2\.2, The MS Add Printer Wizard (APW) icon is now also available in the "Printers\.\.\." folder displayed a share listing\. The APW allows for printers to be add remotely to a Samba or Windows NT/2000 print server\. 797 .sp 798 For a Samba host this means that the printer must be physically added to the underlying printing system\. The 1186 .\" addprinter command 1187 .PP 1188 .RS 4 1189 With the introduction of MS\-RPC based printing support for Windows NT/2000 clients in Samba 2\&.2, The MS Add Printer Wizard (APW) icon is now also available in the "Printers\&.\&.\&." folder displayed a share listing\&. The APW allows for printers to be add remotely to a Samba or Windows NT/2000 print server\&. 1190 .sp 1191 For a Samba host this means that the printer must be physically added to the underlying printing system\&. The 799 1192 \fIaddprinter command\fR 800 1193 defines a script to be run which will perform the necessary operations for adding the printer to the print system and to add the appropriate service definition to the 801 \ fIsmb\.conf\fR1194 \FCsmb\&.conf\F[] 802 1195 file in order that it can be shared by 803 \fBsmbd\fR(8)\ .1196 \fBsmbd\fR(8)\&. 804 1197 .sp 805 1198 The … … 873 1266 .sp 874 1267 .RE 875 All parameters are filled in from the PRINTER_INFO_2 structure sent by the Windows NT/2000 client with one exception\ . The "Windows 9x driver location" parameter is included for backwards compatibility only\. The remaining fields in the structure are generated from answers to the APW questions\.1268 All parameters are filled in from the PRINTER_INFO_2 structure sent by the Windows NT/2000 client with one exception\&. The "Windows 9x driver location" parameter is included for backwards compatibility only\&. The remaining fields in the structure are generated from answers to the APW questions\&. 876 1269 .sp 877 1270 Once the 878 1271 \fIaddprinter command\fR 879 1272 has been executed, 880 smbd 1273 \FCsmbd\F[] 881 1274 will reparse the 882 \ fI smb\.conf\fR883 to determine if the share defined by the APW exists\ . If the sharename is still invalid, then884 smbd 885 will return an ACCESS_DENIED error to the client\ .1275 \FC smb\&.conf\F[] 1276 to determine if the share defined by the APW exists\&. If the sharename is still invalid, then 1277 \FCsmbd \F[] 1278 will return an ACCESS_DENIED error to the client\&. 886 1279 .sp 887 1280 The 888 1281 \fIaddprinter command\fR 889 program can output a single line of text, which Samba will set as the port the new printer is connected to\ . If this line isn\'t output, Samba won\'t reload its printer shares\.890 .sp 891 Default: 892 \fI\fIaddprinter command\fR\fR\fI = \fR\fI\ fR\fI \fR893 .sp 894 Example: 895 \fI\fIaddprinter command\fR\fR\fI = \fR\fI /usr/bin/addprinter\fR\fI \fR1282 program can output a single line of text, which Samba will set as the port the new printer is connected to\&. If this line isn\'t output, Samba won\'t reload its printer shares\&. 1283 .sp 1284 Default: 1285 \fI\fIaddprinter command\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 1286 .sp 1287 Example: 1288 \fI\fIaddprinter command\fR\fR\fI = \fR\fI\FC/usr/bin/addprinter\F[]\fR\fI \fR 896 1289 .RE 897 1290 898 1291 add share command (G) 899 .PP 900 .RS 4 901 Samba 2\.2\.0 introduced the ability to dynamically add and delete shares via the Windows NT 4\.0 Server Manager\. The 1292 .\" add share command 1293 .PP 1294 .RS 4 1295 Samba 2\&.2\&.0 introduced the ability to dynamically add and delete shares via the Windows NT 4\&.0 Server Manager\&. The 902 1296 \fIadd share command\fR 903 1297 is used to define an external program or script which will add a new service definition to 904 \fIsmb\.conf\fR\. In order to successfully execute the 1298 \FCsmb\&.conf\F[]\&. 1299 .sp 1300 In order to successfully execute the 905 1301 \fIadd share command\fR, 906 smbd 907 requires that the administrator be connected using a root account (i\.e\. uid == 0)\. 908 .sp 909 If the connected account has 910 SeDiskOperatorPrivilege, scripts defined in 911 \fIchange share\fR 912 parameter are executed as root\. 1302 \FCsmbd\F[] 1303 requires that the administrator connects using a root account (i\&.e\&. uid == 0) or has the 1304 \FCSeDiskOperatorPrivilege\F[]\&. Scripts defined in the 1305 \fIadd share command\fR 1306 parameter are executed as root\&. 913 1307 .sp 914 1308 When executed, 915 smbd 1309 \FCsmbd\F[] 916 1310 will automatically invoke the 917 1311 \fIadd share command\fR 918 with five parameters\ .1312 with five parameters\&. 919 1313 .sp 920 1314 .RS 4 … … 928 1322 \fIconfigFile\fR 929 1323 \- the location of the global 930 \ fIsmb\.conf\fR931 file\ .1324 \FCsmb\&.conf\F[] 1325 file\&. 932 1326 .RE 933 1327 .sp … … 941 1335 .\} 942 1336 \fIshareName\fR 943 \- the name of the new share\ .1337 \- the name of the new share\&. 944 1338 .RE 945 1339 .sp … … 953 1347 .\} 954 1348 \fIpathName\fR 955 \- path to an **existing** directory on disk\ .1349 \- path to an **existing** directory on disk\&. 956 1350 .RE 957 1351 .sp … … 965 1359 .\} 966 1360 \fIcomment\fR 967 \- comment string to associate with the new share\ .1361 \- comment string to associate with the new share\&. 968 1362 .RE 969 1363 .sp … … 977 1371 .\} 978 1372 \fImax connections\fR 979 Number of maximum simultaneous connections to this share\ .980 .sp 981 .RE 982 This parameter is only used for add file shares\. To add printer shares, see the983 \ fIaddprinter command\fR\.984 .sp 985 Default: 986 \fI\fIadd share command\fR\fR\fI = \fR\fI\ fR\fI \fR987 .sp 988 Example: 989 \fI\fIadd share command\fR\fR\fI = \fR\fI /usr/local/bin/addshare\fR\fI \fR1373 Number of maximum simultaneous connections to this share\&. 1374 .sp 1375 .RE 1376 This parameter is only used to add file shares\&. To add printer shares, see the 1377 \m[blue]\fBaddprinter command\fR\m[]\&. 1378 .sp 1379 Default: 1380 \fI\fIadd share command\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 1381 .sp 1382 Example: 1383 \fI\fIadd share command\fR\fR\fI = \fR\fI\FC/usr/local/bin/addshare\F[]\fR\fI \fR 990 1384 .RE 991 1385 992 1386 add user script (G) 1387 .\" add user script 993 1388 .PP 994 1389 .RS 4 … … 997 1392 by 998 1393 \fBsmbd\fR(8) 999 under special circumstances described below\ .1000 .sp 1001 Normally, a Samba server requires that UNIX users are created for all users accessing files on this server\ . For sites that use Windows NT account databases as their primary user database creating these users and keeping the user list in sync with the Windows NT PDC is an onerous task\. This option allows smbd to create the required UNIX users1394 under special circumstances described below\&. 1395 .sp 1396 Normally, a Samba server requires that UNIX users are created for all users accessing files on this server\&. For sites that use Windows NT account databases as their primary user database creating these users and keeping the user list in sync with the Windows NT PDC is an onerous task\&. This option allows smbd to create the required UNIX users 1002 1397 \fION DEMAND\fR 1003 when a user accesses the Samba server\ .1398 when a user accesses the Samba server\&. 1004 1399 .sp 1005 1400 In order to use this option, … … 1008 1403 \fINOT\fR 1009 1404 be set to 1010 \ fIsecurity = share\fR1405 \m[blue]\fBsecurity = share\fR\m[] 1011 1406 and 1012 \ fIadd user script\fR1407 \m[blue]\fBadd user script\fR\m[] 1013 1408 must be set to a full pathname for a script that will create a UNIX user given one argument of 1014 \fI%u\fR, which expands into the UNIX user name to create\ .1409 \fI%u\fR, which expands into the UNIX user name to create\&. 1015 1410 .sp 1016 1411 When the Windows user attempts to access the Samba server, at login (session setup in the SMB protocol) time, 1017 1412 \fBsmbd\fR(8) 1018 1413 contacts the 1019 \ fIpassword server\fR1020 and attempts to authenticate the given user with the given password\ . If the authentication succeeds then1021 smbd 1022 attempts to find a UNIX user in the UNIX password database to map the Windows user into\ . If this lookup fails, and1023 \ fIadd user script\fR1414 \m[blue]\fBpassword server\fR\m[] 1415 and attempts to authenticate the given user with the given password\&. If the authentication succeeds then 1416 \FCsmbd\F[] 1417 attempts to find a UNIX user in the UNIX password database to map the Windows user into\&. If this lookup fails, and 1418 \m[blue]\fBadd user script\fR\m[] 1024 1419 is set then 1025 smbd 1420 \FCsmbd\F[] 1026 1421 will call the specified script 1027 1422 \fIAS ROOT\fR, expanding any 1028 1423 \fI%u\fR 1029 argument to be the user name to create\ .1424 argument to be the user name to create\&. 1030 1425 .sp 1031 1426 If this script successfully creates the user then 1032 smbd 1033 will continue on as though the UNIX user already existed\ . In this way, UNIX users are dynamically created to match existing Windows NT accounts\.1427 \FCsmbd\F[] 1428 will continue on as though the UNIX user already existed\&. In this way, UNIX users are dynamically created to match existing Windows NT accounts\&. 1034 1429 .sp 1035 1430 See also 1036 \ fIsecurity\fR,1037 \ fIpassword server\fR,1038 \ fIdelete user script\fR\.1039 .sp 1040 Default: 1041 \fI\fIadd user script\fR\fR\fI = \fR\fI\ fR\fI \fR1042 .sp 1043 Example: 1044 \fI\fIadd user script\fR\fR\fI = \fR\fI /usr/local/samba/bin/add_user %u\fR\fI \fR1431 \m[blue]\fBsecurity\fR\m[], 1432 \m[blue]\fBpassword server\fR\m[], 1433 \m[blue]\fBdelete user script\fR\m[]\&. 1434 .sp 1435 Default: 1436 \fI\fIadd user script\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 1437 .sp 1438 Example: 1439 \fI\fIadd user script\fR\fR\fI = \fR\fI\FC/usr/local/samba/bin/add_user %u\F[]\fR\fI \fR 1045 1440 .RE 1046 1441 1047 1442 add user to group script (G) 1048 .PP 1049 .RS 4 1050 Full path to the script that will be called when a user is added to a group using the Windows NT domain administration tools\. It will be run by 1443 .\" add user to group script 1444 .PP 1445 .RS 4 1446 Full path to the script that will be called when a user is added to a group using the Windows NT domain administration tools\&. It will be run by 1051 1447 \fBsmbd\fR(8) 1052 \fIAS ROOT\fR\ . Any1448 \fIAS ROOT\fR\&. Any 1053 1449 \fI%g\fR 1054 1450 will be replaced with the group name and any 1055 1451 \fI%u\fR 1056 will be replaced with the user name\ .1452 will be replaced with the user name\&. 1057 1453 .sp 1058 1454 Note that the 1059 adduser 1060 command used in the example below does not support the used syntax on all systems\ .1061 .sp 1062 Default: 1063 \fI\fIadd user to group script\fR\fR\fI = \fR\fI\ fR\fI \fR1064 .sp 1065 Example: 1066 \fI\fIadd user to group script\fR\fR\fI = \fR\fI /usr/sbin/adduser %u %g\fR\fI \fR1455 \FCadduser\F[] 1456 command used in the example below does not support the used syntax on all systems\&. 1457 .sp 1458 Default: 1459 \fI\fIadd user to group script\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 1460 .sp 1461 Example: 1462 \fI\fIadd user to group script\fR\fR\fI = \fR\fI\FC/usr/sbin/adduser %u %g\F[]\fR\fI \fR 1067 1463 .RE 1068 1464 1069 1465 administrative share (S) 1466 .\" administrative share 1070 1467 .PP 1071 1468 .RS 4 1072 1469 If this parameter is set to 1073 1470 \fByes\fR 1074 for a share, then the share will be an administrative share\ . The Administrative Shares are the default network shares created by all Windows NT\-based operating systems\. These are shares like C$, D$ or ADMIN$\. The type of these shares is STYPE_DISKTREE_HIDDEN\.1471 for a share, then the share will be an administrative share\&. The Administrative Shares are the default network shares created by all Windows NT\-based operating systems\&. These are shares like C$, D$ or ADMIN$\&. The type of these shares is STYPE_DISKTREE_HIDDEN\&. 1075 1472 .sp 1076 1473 See the section below on 1077 \ fIsecurity\fR1078 for more information about this option\ .1079 .sp 1080 Default: 1081 \fI\fIadministrative share\fR\fR\fI = \fR\fI no\fR\fI \fR1474 \m[blue]\fBsecurity\fR\m[] 1475 for more information about this option\&. 1476 .sp 1477 Default: 1478 \fI\fIadministrative share\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 1082 1479 .RE 1083 1480 1084 1481 admin users (S) 1085 .PP 1086 .RS 4 1087 This is a list of users who will be granted administrative privileges on the share\. This means that they will do all file operations as the super\-user (root)\. 1088 .sp 1089 You should use this option very carefully, as any user in this list will be able to do anything they like on the share, irrespective of file permissions\. 1482 .\" admin users 1483 .PP 1484 .RS 4 1485 This is a list of users who will be granted administrative privileges on the share\&. This means that they will do all file operations as the super\-user (root)\&. 1486 .sp 1487 You should use this option very carefully, as any user in this list will be able to do anything they like on the share, irrespective of file permissions\&. 1090 1488 .sp 1091 1489 This parameter will not work with the 1092 \ fIsecurity = share\fR1093 in Samba 3\ .0\. This is by design\.1094 .sp 1095 Default: 1096 \fI\fIadmin users\fR\fR\fI = \fR\fI\ fR\fI \fR1097 .sp 1098 Example: 1099 \fI\fIadmin users\fR\fR\fI = \fR\fI jason\fR\fI \fR1490 \m[blue]\fBsecurity = share\fR\m[] 1491 in Samba 3\&.0\&. This is by design\&. 1492 .sp 1493 Default: 1494 \fI\fIadmin users\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 1495 .sp 1496 Example: 1497 \fI\fIadmin users\fR\fR\fI = \fR\fI\FCjason\F[]\fR\fI \fR 1100 1498 .RE 1101 1499 1102 1500 afs share (S) 1103 .PP 1104 .RS 4 1105 This parameter controls whether special AFS features are enabled for this share\. If enabled, it assumes that the directory exported via the 1501 .\" afs share 1502 .PP 1503 .RS 4 1504 This parameter controls whether special AFS features are enabled for this share\&. If enabled, it assumes that the directory exported via the 1106 1505 \fIpath\fR 1107 parameter is a local AFS import\ . The special AFS features include the attempt to hand\-craft an AFS token if you enabled \-\-with\-fake\-kaserver in configure\.1108 .sp 1109 Default: 1110 \fI\fIafs share\fR\fR\fI = \fR\fI no\fR\fI \fR1506 parameter is a local AFS import\&. The special AFS features include the attempt to hand\-craft an AFS token if you enabled \-\-with\-fake\-kaserver in configure\&. 1507 .sp 1508 Default: 1509 \fI\fIafs share\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 1111 1510 .RE 1112 1511 1113 1512 afs username map (G) 1114 .PP 1115 .RS 4 1116 If you are using the fake kaserver AFS feature, you might want to hand\-craft the usernames you are creating tokens for\. For example this is necessary if you have users from several domain in your AFS Protection Database\. One possible scheme to code users as DOMAIN+User as it is done by winbind with the + as a separator\. 1117 .sp 1118 The mapped user name must contain the cell name to log into, so without setting this parameter there will be no token\. 1119 .sp 1120 Default: 1121 \fI\fIafs username map\fR\fR\fI = \fR\fI\fR\fI \fR 1122 .sp 1123 Example: 1124 \fI\fIafs username map\fR\fR\fI = \fR\fI%u@afs\.samba\.org\fR\fI \fR 1513 .\" afs username map 1514 .PP 1515 .RS 4 1516 If you are using the fake kaserver AFS feature, you might want to hand\-craft the usernames you are creating tokens for\&. For example this is necessary if you have users from several domain in your AFS Protection Database\&. One possible scheme to code users as DOMAIN+User as it is done by winbind with the + as a separator\&. 1517 .sp 1518 The mapped user name must contain the cell name to log into, so without setting this parameter there will be no token\&. 1519 .sp 1520 Default: 1521 \fI\fIafs username map\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 1522 .sp 1523 Example: 1524 \fI\fIafs username map\fR\fR\fI = \fR\fI\FC%u@afs\&.samba\&.org\F[]\fR\fI \fR 1125 1525 .RE 1126 1526 1127 1527 aio read size (S) 1128 .PP 1129 .RS 4 1130 If Samba has been built with asynchronous I/O support and this integer parameter is set to non\-zero value, Samba will read from file asynchronously when size of request is bigger than this value\. Note that it happens only for non\-chained and non\-chaining reads and when not using write cache\. 1131 .sp 1132 Current implementation of asynchronous I/O in Samba 3\.0 does support only up to 10 outstanding asynchronous requests, read and write combined\. 1528 .\" aio read size 1529 .PP 1530 .RS 4 1531 If Samba has been built with asynchronous I/O support and this integer parameter is set to non\-zero value, Samba will read from file asynchronously when size of request is bigger than this value\&. Note that it happens only for non\-chained and non\-chaining reads and when not using write cache\&. 1532 .sp 1533 Current implementation of asynchronous I/O in Samba 3\&.0 does support only up to 10 outstanding asynchronous requests, read and write combined\&. 1133 1534 .sp 1134 1535 Related command: 1135 \ fIwrite cache size\fR1536 \m[blue]\fBwrite cache size\fR\m[] 1136 1537 .sp 1137 1538 Related command: 1138 \ fIaio write size\fR1139 .sp 1140 Default: 1141 \fI\fIaio read size\fR\fR\fI = \fR\fI 0\fR\fI \fR1142 .sp 1143 Example: 1144 \fI\fIaio read size\fR\fR\fI = \fR\fI 16384 # Use asynchronous I/O for reads bigger than 16KB request size\fR\fI \fR1539 \m[blue]\fBaio write size\fR\m[] 1540 .sp 1541 Default: 1542 \fI\fIaio read size\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 1543 .sp 1544 Example: 1545 \fI\fIaio read size\fR\fR\fI = \fR\fI\FC16384 # Use asynchronous I/O for reads bigger than 16KB request size\F[]\fR\fI \fR 1145 1546 .RE 1146 1547 1147 1548 aio write size (S) 1148 .PP 1149 .RS 4 1150 If Samba has been built with asynchronous I/O support and this integer parameter is set to non\-zero value, Samba will write to file asynchronously when size of request is bigger than this value\. Note that it happens only for non\-chained and non\-chaining reads and when not using write cache\. 1151 .sp 1152 Current implementation of asynchronous I/O in Samba 3\.0 does support only up to 10 outstanding asynchronous requests, read and write combined\. 1549 .\" aio write size 1550 .PP 1551 .RS 4 1552 If Samba has been built with asynchronous I/O support and this integer parameter is set to non\-zero value, Samba will write to file asynchronously when size of request is bigger than this value\&. Note that it happens only for non\-chained and non\-chaining reads and when not using write cache\&. 1553 .sp 1554 Current implementation of asynchronous I/O in Samba 3\&.0 does support only up to 10 outstanding asynchronous requests, read and write combined\&. 1153 1555 .sp 1154 1556 Related command: 1155 \ fIwrite cache size\fR1557 \m[blue]\fBwrite cache size\fR\m[] 1156 1558 .sp 1157 1559 Related command: 1158 \ fIaio read size\fR1159 .sp 1160 Default: 1161 \fI\fIaio write size\fR\fR\fI = \fR\fI 0\fR\fI \fR1162 .sp 1163 Example: 1164 \fI\fIaio write size\fR\fR\fI = \fR\fI 16384 # Use asynchronous I/O for writes bigger than 16KB request size\fR\fI \fR1560 \m[blue]\fBaio read size\fR\m[] 1561 .sp 1562 Default: 1563 \fI\fIaio write size\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 1564 .sp 1565 Example: 1566 \fI\fIaio write size\fR\fR\fI = \fR\fI\FC16384 # Use asynchronous I/O for writes bigger than 16KB request size\F[]\fR\fI \fR 1165 1567 .RE 1166 1568 1167 1569 algorithmic rid base (G) 1168 .PP 1169 .RS 4 1170 This determines how Samba will use its algorithmic mapping from uids/gid to the RIDs needed to construct NT Security Identifiers\. 1171 .sp 1172 Setting this option to a larger value could be useful to sites transitioning from WinNT and Win2k, as existing user and group rids would otherwise clash with sytem users etc\. 1173 .sp 1174 All UIDs and GIDs must be able to be resolved into SIDs for the correct operation of ACLs on the server\. As such the algorithmic mapping can\'t be \'turned off\', but pushing it \'out of the way\' should resolve the issues\. Users and groups can then be assigned \'low\' RIDs in arbitrary\-rid supporting backends\. 1175 .sp 1176 Default: 1177 \fI\fIalgorithmic rid base\fR\fR\fI = \fR\fI1000\fR\fI \fR 1178 .sp 1179 Example: 1180 \fI\fIalgorithmic rid base\fR\fR\fI = \fR\fI100000\fR\fI \fR 1570 .\" algorithmic rid base 1571 .PP 1572 .RS 4 1573 This determines how Samba will use its algorithmic mapping from uids/gid to the RIDs needed to construct NT Security Identifiers\&. 1574 .sp 1575 Setting this option to a larger value could be useful to sites transitioning from WinNT and Win2k, as existing user and group rids would otherwise clash with sytem users etc\&. 1576 .sp 1577 All UIDs and GIDs must be able to be resolved into SIDs for the correct operation of ACLs on the server\&. As such the algorithmic mapping can\'t be \'turned off\', but pushing it \'out of the way\' should resolve the issues\&. Users and groups can then be assigned \'low\' RIDs in arbitrary\-rid supporting backends\&. 1578 .sp 1579 Default: 1580 \fI\fIalgorithmic rid base\fR\fR\fI = \fR\fI\FC1000\F[]\fR\fI \fR 1581 .sp 1582 Example: 1583 \fI\fIalgorithmic rid base\fR\fR\fI = \fR\fI\FC100000\F[]\fR\fI \fR 1181 1584 .RE 1182 1585 1183 1586 allocation roundup size (S) 1184 .PP 1185 .RS 4 1186 This parameter allows an administrator to tune the allocation size reported to Windows clients\. The default size of 1Mb generally results in improved Windows client performance\. However, rounding the allocation size may cause difficulties for some applications, e\.g\. MS Visual Studio\. If the MS Visual Studio compiler starts to crash with an internal error, set this parameter to zero for this share\. 1187 .sp 1188 The integer parameter specifies the roundup size in bytes\. 1189 .sp 1190 Default: 1191 \fI\fIallocation roundup size\fR\fR\fI = \fR\fI1048576\fR\fI \fR 1192 .sp 1193 Example: 1194 \fI\fIallocation roundup size\fR\fR\fI = \fR\fI0 # (to disable roundups)\fR\fI \fR 1587 .\" allocation roundup size 1588 .PP 1589 .RS 4 1590 This parameter allows an administrator to tune the allocation size reported to Windows clients\&. The default size of 1Mb generally results in improved Windows client performance\&. However, rounding the allocation size may cause difficulties for some applications, e\&.g\&. MS Visual Studio\&. If the MS Visual Studio compiler starts to crash with an internal error, set this parameter to zero for this share\&. 1591 .sp 1592 The integer parameter specifies the roundup size in bytes\&. 1593 .sp 1594 Default: 1595 \fI\fIallocation roundup size\fR\fR\fI = \fR\fI\FC1048576\F[]\fR\fI \fR 1596 .sp 1597 Example: 1598 \fI\fIallocation roundup size\fR\fR\fI = \fR\fI\FC0 # (to disable roundups)\F[]\fR\fI \fR 1195 1599 .RE 1196 1600 1197 1601 allow trusted domains (G) 1602 .\" allow trusted domains 1198 1603 .PP 1199 1604 .RS 4 1200 1605 This option only takes effect when the 1201 \ fIsecurity\fR1606 \m[blue]\fBsecurity\fR\m[] 1202 1607 option is set to 1203 1608 \fBserver\fR, 1204 1609 \fBdomain\fR 1205 1610 or 1206 \fBads\fR\ . If it is set to no, then attempts to connect to a resource from a domain or workgroup other than the one which smbd is running in will fail, even if that domain is trusted by the remote server doing the authentication\.1207 .sp 1208 This is useful if you only want your Samba server to serve resources to users in the domain it is a member of\ . As an example, suppose that there are two domains DOMA and DOMB\. DOMB is trusted by DOMA, which contains the Samba server\. Under normal circumstances, a user with an account in DOMB can then access the resources of a UNIX account with the same account name on the Samba server even if they do not have an account in DOMA\. This can make implementing a security boundary difficult\.1209 .sp 1210 Default: 1211 \fI\fIallow trusted domains\fR\fR\fI = \fR\fI yes\fR\fI \fR1611 \fBads\fR\&. If it is set to no, then attempts to connect to a resource from a domain or workgroup other than the one which smbd is running in will fail, even if that domain is trusted by the remote server doing the authentication\&. 1612 .sp 1613 This is useful if you only want your Samba server to serve resources to users in the domain it is a member of\&. As an example, suppose that there are two domains DOMA and DOMB\&. DOMB is trusted by DOMA, which contains the Samba server\&. Under normal circumstances, a user with an account in DOMB can then access the resources of a UNIX account with the same account name on the Samba server even if they do not have an account in DOMA\&. This can make implementing a security boundary difficult\&. 1614 .sp 1615 Default: 1616 \fI\fIallow trusted domains\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 1212 1617 .RE 1213 1618 1214 1619 announce as (G) 1620 .\" announce as 1215 1621 .PP 1216 1622 .RS 4 1217 1623 This specifies what type of server 1218 1624 \fBnmbd\fR(8) 1219 will announce itself as, to a network neighborhood browse list\ . By default this is set to Windows NT\. The valid options are : "NT Server" (which can also be written as "NT"), "NT Workstation", "Win95" or "WfW" meaning Windows NT Server, Windows NT Workstation, Windows 95 and Windows for Workgroups respectively\. Do not change this parameter unless you have a specific need to stop Samba appearing as an NT server as this may prevent Samba servers from participating as browser servers correctly\.1220 .sp 1221 Default: 1222 \fI\fIannounce as\fR\fR\fI = \fR\fI NT Server\fR\fI \fR1223 .sp 1224 Example: 1225 \fI\fIannounce as\fR\fR\fI = \fR\fI Win95\fR\fI \fR1625 will announce itself as, to a network neighborhood browse list\&. By default this is set to Windows NT\&. The valid options are : "NT Server" (which can also be written as "NT"), "NT Workstation", "Win95" or "WfW" meaning Windows NT Server, Windows NT Workstation, Windows 95 and Windows for Workgroups respectively\&. Do not change this parameter unless you have a specific need to stop Samba appearing as an NT server as this may prevent Samba servers from participating as browser servers correctly\&. 1626 .sp 1627 Default: 1628 \fI\fIannounce as\fR\fR\fI = \fR\fI\FCNT Server\F[]\fR\fI \fR 1629 .sp 1630 Example: 1631 \fI\fIannounce as\fR\fR\fI = \fR\fI\FCWin95\F[]\fR\fI \fR 1226 1632 .RE 1227 1633 1228 1634 announce version (G) 1229 .PP 1230 .RS 4 1231 This specifies the major and minor version numbers that nmbd will use when announcing itself as a server\. The default is 4\.9\. Do not change this parameter unless you have a specific need to set a Samba server to be a downlevel server\. 1232 .sp 1233 Default: 1234 \fI\fIannounce version\fR\fR\fI = \fR\fI4\.9\fR\fI \fR 1235 .sp 1236 Example: 1237 \fI\fIannounce version\fR\fR\fI = \fR\fI2\.0\fR\fI \fR 1635 .\" announce version 1636 .PP 1637 .RS 4 1638 This specifies the major and minor version numbers that nmbd will use when announcing itself as a server\&. The default is 4\&.9\&. Do not change this parameter unless you have a specific need to set a Samba server to be a downlevel server\&. 1639 .sp 1640 Default: 1641 \fI\fIannounce version\fR\fR\fI = \fR\fI\FC4\&.9\F[]\fR\fI \fR 1642 .sp 1643 Example: 1644 \fI\fIannounce version\fR\fR\fI = \fR\fI\FC2\&.0\F[]\fR\fI \fR 1238 1645 .RE 1239 1646 1240 1647 auth methods (G) 1648 .\" auth methods 1241 1649 .PP 1242 1650 .RS 4 1243 1651 This option allows the administrator to chose what authentication methods 1244 smbd 1245 will use when authenticating a user\ . This option defaults to sensible values based on1246 \ fIsecurity\fR\. This should be considered a developer option and used only in rare circumstances\. In the majority (if not all) of production servers, the default setting should be adequate\.1247 .sp 1248 Each entry in the list attempts to authenticate the user in turn, until the user authenticates\ . In practice only one method will ever actually be able to complete the authentication\.1652 \FCsmbd\F[] 1653 will use when authenticating a user\&. This option defaults to sensible values based on 1654 \m[blue]\fBsecurity\fR\m[]\&. This should be considered a developer option and used only in rare circumstances\&. In the majority (if not all) of production servers, the default setting should be adequate\&. 1655 .sp 1656 Each entry in the list attempts to authenticate the user in turn, until the user authenticates\&. In practice only one method will ever actually be able to complete the authentication\&. 1249 1657 .sp 1250 1658 Possible options include … … 1258 1666 (pre\-winbindd method of authentication for remote domain users; deprecated in favour of winbind method), 1259 1667 \fBtrustdomain\fR 1260 (authenticate trusted users by contacting the remote DC directly from smbd; deprecated in favour of winbind method)\ .1261 .sp 1262 Default: 1263 \fI\fIauth methods\fR\fR\fI = \fR\fI\ fR\fI \fR1264 .sp 1265 Example: 1266 \fI\fIauth methods\fR\fR\fI = \fR\fI guest sam winbind\fR\fI \fR1668 (authenticate trusted users by contacting the remote DC directly from smbd; deprecated in favour of winbind method)\&. 1669 .sp 1670 Default: 1671 \fI\fIauth methods\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 1672 .sp 1673 Example: 1674 \fI\fIauth methods\fR\fR\fI = \fR\fI\FCguest sam winbind\F[]\fR\fI \fR 1267 1675 .RE 1268 1676 1269 1677 available (S) 1270 .PP 1271 .RS 4 1272 This parameter lets you "turn off" a service\. If 1678 .\" available 1679 .PP 1680 .RS 4 1681 This parameter lets you "turn off" a service\&. If 1273 1682 \fIavailable = no\fR, then 1274 1683 \fIALL\fR 1275 attempts to connect to the service will fail\ . Such failures are logged\.1276 .sp 1277 Default: 1278 \fI\fIavailable\fR\fR\fI = \fR\fI yes\fR\fI \fR1684 attempts to connect to the service will fail\&. Such failures are logged\&. 1685 .sp 1686 Default: 1687 \fI\fIavailable\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 1279 1688 .RE 1280 1689 1281 1690 bind interfaces only (G) 1282 .PP 1283 .RS 4 1284 This global parameter allows the Samba admin to limit what interfaces on a machine will serve SMB requests\. It affects file service 1691 .\" bind interfaces only 1692 .PP 1693 .RS 4 1694 This global parameter allows the Samba admin to limit what interfaces on a machine will serve SMB requests\&. It affects file service 1285 1695 \fBsmbd\fR(8) 1286 1696 and name service 1287 1697 \fBnmbd\fR(8) 1288 in a slightly different ways\ .1698 in a slightly different ways\&. 1289 1699 .sp 1290 1700 For name service it causes 1291 nmbd 1701 \FCnmbd\F[] 1292 1702 to bind to ports 137 and 138 on the interfaces listed in the 1293 \ fIinterfaces\fR1294 parameter\ .1295 nmbd 1296 also binds to the "all addresses" interface (0\ .0\.0\.0) on ports 137 and 138 for the purposes of reading broadcast messages\. If this option is not set then1297 nmbd 1298 will service name requests on all of these sockets\ . If1299 \ fIbind interfaces only\fR1703 \m[blue]\fBinterfaces\fR\m[] 1704 parameter\&. 1705 \FCnmbd\F[] 1706 also binds to the "all addresses" interface (0\&.0\&.0\&.0) on ports 137 and 138 for the purposes of reading broadcast messages\&. If this option is not set then 1707 \FCnmbd\F[] 1708 will service name requests on all of these sockets\&. If 1709 \m[blue]\fBbind interfaces only\fR\m[] 1300 1710 is set then 1301 nmbd 1711 \FCnmbd\F[] 1302 1712 will check the source address of any packets coming in on the broadcast sockets and discard any that don\'t match the broadcast addresses of the interfaces in the 1303 \ fIinterfaces\fR1304 parameter list\ . As unicast packets are received on the other sockets it allows1305 nmbd 1713 \m[blue]\fBinterfaces\fR\m[] 1714 parameter list\&. As unicast packets are received on the other sockets it allows 1715 \FCnmbd\F[] 1306 1716 to refuse to serve names to machines that send packets that arrive through any interfaces not listed in the 1307 \ fIinterfaces\fR1308 list\ . IP Source address spoofing does defeat this simple check, however, so it must not be used seriously as a security feature for1309 nmbd\.1717 \m[blue]\fBinterfaces\fR\m[] 1718 list\&. IP Source address spoofing does defeat this simple check, however, so it must not be used seriously as a security feature for 1719 \FCnmbd\F[]\&. 1310 1720 .sp 1311 1721 For file service it causes 1312 1722 \fBsmbd\fR(8) 1313 1723 to bind only to the interface list given in the 1314 \ fIinterfaces\fR1315 parameter\ . This restricts the networks that1316 smbd 1317 will serve, to packets coming in on those interfaces\ . Note that you should not use this parameter for machines that are serving PPP or other intermittent or non\-broadcast network interfaces as it will not cope with non\-permanent interfaces\.1724 \m[blue]\fBinterfaces\fR\m[] 1725 parameter\&. This restricts the networks that 1726 \FCsmbd\F[] 1727 will serve, to packets coming in on those interfaces\&. Note that you should not use this parameter for machines that are serving PPP or other intermittent or non\-broadcast network interfaces as it will not cope with non\-permanent interfaces\&. 1318 1728 .sp 1319 1729 If 1320 \ fIbind interfaces only\fR1730 \m[blue]\fBbind interfaces only\fR\m[] 1321 1731 is set and the network address 1322 \fI127\ .0\.0\.1\fR1732 \fI127\&.0\&.0\&.1\fR 1323 1733 is not added to the 1324 \ fIinterfaces\fR1734 \m[blue]\fBinterfaces\fR\m[] 1325 1735 parameter list 1326 1736 \fBsmbpasswd\fR(8) 1327 1737 and 1328 1738 \fBswat\fR(8) 1329 may not work as expected due to the reasons covered below\ .1739 may not work as expected due to the reasons covered below\&. 1330 1740 .sp 1331 1741 To change a users SMB password, the 1332 smbpasswd 1742 \FCsmbpasswd\F[] 1333 1743 by default connects to the 1334 \fIlocalhost \- 127\ .0\.0\.1\fR1335 address as an SMB client to issue the password change request\ . If1336 \ fIbind interfaces only\fR1744 \fIlocalhost \- 127\&.0\&.0\&.1\fR 1745 address as an SMB client to issue the password change request\&. If 1746 \m[blue]\fBbind interfaces only\fR\m[] 1337 1747 is set then unless the network address 1338 \fI127\ .0\.0\.1\fR1748 \fI127\&.0\&.0\&.1\fR 1339 1749 is added to the 1340 \ fIinterfaces\fR1750 \m[blue]\fBinterfaces\fR\m[] 1341 1751 parameter list then 1342 smbpasswd 1343 will fail to connect in it\'s default mode\ .1344 smbpasswd 1752 \FC smbpasswd\F[] 1753 will fail to connect in it\'s default mode\&. 1754 \FCsmbpasswd\F[] 1345 1755 can be forced to use the primary IP interface of the local host by using its 1346 1756 \fBsmbpasswd\fR(8) … … 1348 1758 parameter, with 1349 1759 \fIremote machine\fR 1350 set to the IP name of the primary interface of the local host\ .1760 set to the IP name of the primary interface of the local host\&. 1351 1761 .sp 1352 1762 The 1353 swat 1763 \FCswat\F[] 1354 1764 status page tries to connect with 1355 smbd 1765 \FCsmbd\F[] 1356 1766 and 1357 nmbd 1767 \FCnmbd\F[] 1358 1768 at the address 1359 \fI127\ .0\.0\.1\fR1360 to determine if they are running\ . Not adding1361 \fI127\ .0\.0\.1\fR1769 \fI127\&.0\&.0\&.1\fR 1770 to determine if they are running\&. Not adding 1771 \fI127\&.0\&.0\&.1\fR 1362 1772 will cause 1363 smbd 1773 \FC smbd\F[] 1364 1774 and 1365 nmbd 1366 to always show "not running" even if they really are\ . This can prevent1367 swat 1775 \FCnmbd\F[] 1776 to always show "not running" even if they really are\&. This can prevent 1777 \FC swat\F[] 1368 1778 from starting/stopping/restarting 1369 smbd 1779 \FCsmbd\F[] 1370 1780 and 1371 nmbd\.1372 .sp 1373 Default: 1374 \fI\fIbind interfaces only\fR\fR\fI = \fR\fI no\fR\fI \fR1781 \FCnmbd\F[]\&. 1782 .sp 1783 Default: 1784 \fI\fIbind interfaces only\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 1375 1785 .RE 1376 1786 1377 1787 blocking locks (S) 1788 .\" blocking locks 1378 1789 .PP 1379 1790 .RS 4 1380 1791 This parameter controls the behavior of 1381 1792 \fBsmbd\fR(8) 1382 when given a request by a client to obtain a byte range lock on a region of an open file, and the request has a time limit associated with it\ .1383 .sp 1384 If this parameter is set and the lock range requested cannot be immediately satisfied, samba will internally queue the lock request, and periodically attempt to obtain the lock until the timeout period expires\ .1793 when given a request by a client to obtain a byte range lock on a region of an open file, and the request has a time limit associated with it\&. 1794 .sp 1795 If this parameter is set and the lock range requested cannot be immediately satisfied, samba will internally queue the lock request, and periodically attempt to obtain the lock until the timeout period expires\&. 1385 1796 .sp 1386 1797 If this parameter is set to 1387 \fBno\fR, then samba will behave as previous versions of Samba would and will fail the lock request immediately if the lock range cannot be obtained\ .1388 .sp 1389 Default: 1390 \fI\fIblocking locks\fR\fR\fI = \fR\fI yes\fR\fI \fR1798 \fBno\fR, then samba will behave as previous versions of Samba would and will fail the lock request immediately if the lock range cannot be obtained\&. 1799 .sp 1800 Default: 1801 \fI\fIblocking locks\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 1391 1802 .RE 1392 1803 1393 1804 block size (S) 1805 .\" block size 1394 1806 .PP 1395 1807 .RS 4 1396 1808 This parameter controls the behavior of 1397 1809 \fBsmbd\fR(8) 1398 when reporting disk free sizes\ . By default, this reports a disk block size of 1024 bytes\.1399 .sp 1400 Changing this parameter may have some effect on the efficiency of client writes, this is not yet confirmed\ . This parameter was added to allow advanced administrators to change it (usually to a higher value) and test the effect it has on client write performance without re\-compiling the code\. As this is an experimental option it may be removed in a future release\.1401 .sp 1402 Changing this option does not change the disk free reporting size, just the block size unit reported to the client\ .1403 .sp 1404 Default: 1405 \fI\fIblock size\fR\fR\fI = \fR\fI 1024\fR\fI \fR1406 .sp 1407 Example: 1408 \fI\fIblock size\fR\fR\fI = \fR\fI 4096\fR\fI \fR1810 when reporting disk free sizes\&. By default, this reports a disk block size of 1024 bytes\&. 1811 .sp 1812 Changing this parameter may have some effect on the efficiency of client writes, this is not yet confirmed\&. This parameter was added to allow advanced administrators to change it (usually to a higher value) and test the effect it has on client write performance without re\-compiling the code\&. As this is an experimental option it may be removed in a future release\&. 1813 .sp 1814 Changing this option does not change the disk free reporting size, just the block size unit reported to the client\&. 1815 .sp 1816 Default: 1817 \fI\fIblock size\fR\fR\fI = \fR\fI\FC1024\F[]\fR\fI \fR 1818 .sp 1819 Example: 1820 \fI\fIblock size\fR\fR\fI = \fR\fI\FC4096\F[]\fR\fI \fR 1409 1821 .RE 1410 1822 1411 1823 browsable 1824 .\" browsable 1412 1825 .PP 1413 1826 .RS 4 1414 1827 This parameter is a synonym for 1415 browseable\ .1828 browseable\&. 1416 1829 .RE 1417 1830 1418 1831 browseable (S) 1419 .PP 1420 .RS 4 1421 This controls whether this share is seen in the list of available shares in a net view and in the browse list\. 1422 .sp 1423 Default: 1424 \fI\fIbrowseable\fR\fR\fI = \fR\fIyes\fR\fI \fR 1832 .\" browseable 1833 .PP 1834 .RS 4 1835 This controls whether this share is seen in the list of available shares in a net view and in the browse list\&. 1836 .sp 1837 Default: 1838 \fI\fIbrowseable\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 1425 1839 .RE 1426 1840 1427 1841 browse list (G) 1842 .\" browse list 1428 1843 .PP 1429 1844 .RS 4 … … 1431 1846 \fBsmbd\fR(8) 1432 1847 will serve a browse list to a client doing a 1433 NetServerEnum 1434 call\ . Normally set to1435 \fByes\fR\ . You should never need to change this\.1436 .sp 1437 Default: 1438 \fI\fIbrowse list\fR\fR\fI = \fR\fI yes\fR\fI \fR1848 \FCNetServerEnum\F[] 1849 call\&. Normally set to 1850 \fByes\fR\&. You should never need to change this\&. 1851 .sp 1852 Default: 1853 \fI\fIbrowse list\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 1439 1854 .RE 1440 1855 1441 1856 casesignames 1857 .\" casesignames 1442 1858 .PP 1443 1859 .RS 4 1444 1860 This parameter is a synonym for 1445 case sensitive\ .1861 case sensitive\&. 1446 1862 .RE 1447 1863 1448 1864 case sensitive (S) 1865 .\" case sensitive 1449 1866 .PP 1450 1867 .RS 4 1451 1868 See the discussion in the section 1452 \ fIname mangling\fR\.1453 .sp 1454 Default: 1455 \fI\fIcase sensitive\fR\fR\fI = \fR\fI no\fR\fI \fR1869 \m[blue]\fBname mangling\fR\m[]\&. 1870 .sp 1871 Default: 1872 \fI\fIcase sensitive\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 1456 1873 .RE 1457 1874 1458 1875 change notify (S) 1459 .PP 1460 .RS 4 1461 This parameter specifies whether Samba should reply to a client\'s file change notify requests\. 1876 .\" change notify 1877 .PP 1878 .RS 4 1879 This parameter specifies whether Samba should reply to a client\'s file change notify requests\&. 1462 1880 .sp 1463 1881 You should never need to change this parameter 1464 1882 .sp 1465 1883 Default: 1466 \fI\fIchange notify\fR\fR\fI = \fR\fI yes\fR\fI \fR1884 \fI\fIchange notify\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 1467 1885 .RE 1468 1886 1469 1887 change share command (G) 1470 .PP 1471 .RS 4 1472 Samba 2\.2\.0 introduced the ability to dynamically add and delete shares via the Windows NT 4\.0 Server Manager\. The 1888 .\" change share command 1889 .PP 1890 .RS 4 1891 Samba 2\&.2\&.0 introduced the ability to dynamically add and delete shares via the Windows NT 4\&.0 Server Manager\&. The 1473 1892 \fIchange share command\fR 1474 1893 is used to define an external program or script which will modify an existing service definition in 1475 \fIsmb\.conf\fR\. In order to successfully execute the 1894 \FCsmb\&.conf\F[]\&. 1895 .sp 1896 In order to successfully execute the 1476 1897 \fIchange share command\fR, 1477 smbd 1478 requires that the administrator be connected using a root account (i\.e\. uid == 0)\. 1479 .sp 1480 If the connected account has 1481 SeDiskOperatorPrivilege, scripts defined in 1482 \fIchange share\fR 1483 parameter are executed as root\. 1898 \FCsmbd\F[] 1899 requires that the administrator connects using a root account (i\&.e\&. uid == 0) or has the 1900 \FCSeDiskOperatorPrivilege\F[]\&. Scripts defined in the 1901 \fIchange share command\fR 1902 parameter are executed as root\&. 1484 1903 .sp 1485 1904 When executed, 1486 smbd 1905 \FCsmbd\F[] 1487 1906 will automatically invoke the 1488 1907 \fIchange share command\fR 1489 with five parameters\ .1908 with five parameters\&. 1490 1909 .sp 1491 1910 .RS 4 … … 1499 1918 \fIconfigFile\fR 1500 1919 \- the location of the global 1501 \ fIsmb\.conf\fR1502 file\ .1920 \FCsmb\&.conf\F[] 1921 file\&. 1503 1922 .RE 1504 1923 .sp … … 1512 1931 .\} 1513 1932 \fIshareName\fR 1514 \- the name of the new share\ .1933 \- the name of the new share\&. 1515 1934 .RE 1516 1935 .sp … … 1524 1943 .\} 1525 1944 \fIpathName\fR 1526 \- path to an **existing** directory on disk\ .1945 \- path to an **existing** directory on disk\&. 1527 1946 .RE 1528 1947 .sp … … 1536 1955 .\} 1537 1956 \fIcomment\fR 1538 \- comment string to associate with the new share\ .1957 \- comment string to associate with the new share\&. 1539 1958 .RE 1540 1959 .sp … … 1548 1967 .\} 1549 1968 \fImax connections\fR 1550 Number of maximum simultaneous connections to this share\ .1551 .sp 1552 .RE 1553 This parameter is only used modify existing file shares definitions\. To modify printer shares, use the "Printers\.\.\." folder as seen when browsing the Samba host\.1554 .sp 1555 Default: 1556 \fI\fIchange share command\fR\fR\fI = \fR\fI\ fR\fI \fR1557 .sp 1558 Example: 1559 \fI\fIchange share command\fR\fR\fI = \fR\fI /usr/local/bin/addshare\fR\fI \fR1969 Number of maximum simultaneous connections to this share\&. 1970 .sp 1971 .RE 1972 This parameter is only used to modify existing file share definitions\&. To modify printer shares, use the "Printers\&.\&.\&." folder as seen when browsing the Samba host\&. 1973 .sp 1974 Default: 1975 \fI\fIchange share command\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 1976 .sp 1977 Example: 1978 \fI\fIchange share command\fR\fR\fI = \fR\fI\FC/usr/local/bin/changeshare\F[]\fR\fI \fR 1560 1979 .RE 1561 1980 1562 1981 check password script (G) 1563 .PP 1564 .RS 4 1565 The name of a program that can be used to check password complexity\. The password is sent to the program\'s standard input\. 1566 .sp 1567 The program must return 0 on a good password, or any other value if the password is bad\. In case the password is considered weak (the program does not return 0) the user will be notified and the password change will fail\. 1982 .\" check password script 1983 .PP 1984 .RS 4 1985 The name of a program that can be used to check password complexity\&. The password is sent to the program\'s standard input\&. 1986 .sp 1987 The program must return 0 on a good password, or any other value if the password is bad\&. In case the password is considered weak (the program does not return 0) the user will be notified and the password change will fail\&. 1568 1988 .sp 1569 1989 Note: In the example directory is a sample program called 1570 crackcheck 1571 that uses cracklib to check the password quality\ .1572 .sp 1573 Default: 1574 \fI\fIcheck password script\fR\fR\fI = \fR\fI Disabled\fR\fI \fR1575 .sp 1576 Example: 1577 \fI\fIcheck password script\fR\fR\fI = \fR\fI check password script = /usr/local/sbin/crackcheck\fR\fI \fR1990 \FCcrackcheck\F[] 1991 that uses cracklib to check the password quality\&. 1992 .sp 1993 Default: 1994 \fI\fIcheck password script\fR\fR\fI = \fR\fI\FCDisabled\F[]\fR\fI \fR 1995 .sp 1996 Example: 1997 \fI\fIcheck password script\fR\fR\fI = \fR\fI\FCcheck password script = /usr/local/sbin/crackcheck\F[]\fR\fI \fR 1578 1998 .RE 1579 1999 1580 2000 client lanman auth (G) 2001 .\" client lanman auth 1581 2002 .PP 1582 2003 .RS 4 1583 2004 This parameter determines whether or not 1584 2005 \fBsmbclient\fR(8) 1585 and other samba client tools will attempt to authenticate itself to servers using the weaker LANMAN password hash\ . If disabled, only server which support NT password hashes (e\.g\. Windows NT/2000, Samba, etc\.\.\. but not Windows 95/98) will be able to be connected from the Samba client\.1586 .sp 1587 The LANMAN encrypted response is easily broken, due to it\'s case\-insensitive nature, and the choice of algorithm\ . Clients without Windows 95/98 servers are advised to disable this option\.2006 and other samba client tools will attempt to authenticate itself to servers using the weaker LANMAN password hash\&. If disabled, only server which support NT password hashes (e\&.g\&. Windows NT/2000, Samba, etc\&.\&.\&. but not Windows 95/98) will be able to be connected from the Samba client\&. 2007 .sp 2008 The LANMAN encrypted response is easily broken, due to it\'s case\-insensitive nature, and the choice of algorithm\&. Clients without Windows 95/98 servers are advised to disable this option\&. 1588 2009 .sp 1589 2010 Disabling this option will also disable the 1590 client plaintext auth 2011 \FCclient plaintext auth\F[] 1591 2012 option 1592 2013 .sp 1593 2014 Likewise, if the 1594 client ntlmv2 auth 1595 parameter is enabled, then only NTLMv2 logins will be attempted\ .1596 .sp 1597 Default: 1598 \fI\fIclient lanman auth\fR\fR\fI = \fR\fI no\fR\fI \fR2015 \FCclient ntlmv2 auth\F[] 2016 parameter is enabled, then only NTLMv2 logins will be attempted\&. 2017 .sp 2018 Default: 2019 \fI\fIclient lanman auth\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 1599 2020 .RE 1600 2021 1601 2022 client ldap sasl wrapping (G) 2023 .\" client ldap sasl wrapping 1602 2024 .PP 1603 2025 .RS 4 1604 2026 The 1605 \ fIclient ldap sasl wrapping\fR1606 defines whether ldap traffic will be signed or signed and encrypted (sealed)\ . Possible values are2027 \m[blue]\fBclient ldap sasl wrapping\fR\m[] 2028 defines whether ldap traffic will be signed or signed and encrypted (sealed)\&. Possible values are 1607 2029 \fIplain\fR, 1608 2030 \fIsign\fR 1609 2031 and 1610 \fIseal\fR\ .2032 \fIseal\fR\&. 1611 2033 .sp 1612 2034 The values … … 1614 2036 and 1615 2037 \fIseal\fR 1616 are only available if Samba has been compiled against a modern OpenLDAP version (2\ .3\.x or higher)\.1617 .sp 1618 This option is needed in the case of Domain Controllers enforcing the usage of signed LDAP connections (e\ .g\. Windows 2000 SP3 or higher)\. LDAP sign and seal can be controlled with the registry key "HKLM\eSystem\eCurrentControlSet\eServices\e1619 NTDS\eParameters\eLDAPServerIntegrity" on the Windows server side\.1620 .sp 1621 Depending on the used KRB5 library (MIT and older Heimdal versions) it is possible that the message "integrity only" is not supported\ . In this case,2038 are only available if Samba has been compiled against a modern OpenLDAP version (2\&.3\&.x or higher)\&. 2039 .sp 2040 This option is needed in the case of Domain Controllers enforcing the usage of signed LDAP connections (e\&.g\&. Windows 2000 SP3 or higher)\&. LDAP sign and seal can be controlled with the registry key "\FCHKLM\eSystem\eCurrentControlSet\eServices\e\F[] 2041 \FCNTDS\eParameters\eLDAPServerIntegrity\F[]" on the Windows server side\&. 2042 .sp 2043 Depending on the used KRB5 library (MIT and older Heimdal versions) it is possible that the message "integrity only" is not supported\&. In this case, 1622 2044 \fIsign\fR 1623 2045 is just an alias for 1624 \fIseal\fR\ .2046 \fIseal\fR\&. 1625 2047 .sp 1626 2048 The default value is 1627 2049 \fIplain\fR 1628 which is not irritable to KRB5 clock skew errors\ . That implies synchronizing the time with the KDC in the case of using2050 which is not irritable to KRB5 clock skew errors\&. That implies synchronizing the time with the KDC in the case of using 1629 2051 \fIsign\fR 1630 2052 or 1631 \fIseal\fR\ .1632 .sp 1633 Default: 1634 \fI\fIclient ldap sasl wrapping\fR\fR\fI = \fR\fI plain\fR\fI \fR2053 \fIseal\fR\&. 2054 .sp 2055 Default: 2056 \fI\fIclient ldap sasl wrapping\fR\fR\fI = \fR\fI\FCplain\F[]\fR\fI \fR 1635 2057 .RE 1636 2058 1637 2059 client ntlmv2 auth (G) 2060 .\" client ntlmv2 auth 1638 2061 .PP 1639 2062 .RS 4 1640 2063 This parameter determines whether or not 1641 2064 \fBsmbclient\fR(8) 1642 will attempt to authenticate itself to servers using the NTLMv2 encrypted password response\ .1643 .sp 1644 If enabled, only an NTLMv2 and LMv2 response (both much more secure than earlier versions) will be sent\ . Many servers (including NT4 < SP4, Win9x and Samba 2\.2) are not compatible with NTLMv2\.2065 will attempt to authenticate itself to servers using the NTLMv2 encrypted password response\&. 2066 .sp 2067 If enabled, only an NTLMv2 and LMv2 response (both much more secure than earlier versions) will be sent\&. Many servers (including NT4 < SP4, Win9x and Samba 2\&.2) are not compatible with NTLMv2\&. 1645 2068 .sp 1646 2069 Similarly, if enabled, NTLMv1, 1647 client lanman auth 2070 \FCclient lanman auth\F[] 1648 2071 and 1649 client plaintext auth 1650 authentication will be disabled\ . This also disables share\-level authentication\.2072 \FCclient plaintext auth\F[] 2073 authentication will be disabled\&. This also disables share\-level authentication\&. 1651 2074 .sp 1652 2075 If disabled, an NTLM response (and possibly a LANMAN response) will be sent by the client, depending on the value of 1653 client lanman auth\.1654 .sp 1655 Note that some sites (particularly those following \'best practice\' security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM\ .1656 .sp 1657 Default: 1658 \fI\fIclient ntlmv2 auth\fR\fR\fI = \fR\fI no\fR\fI \fR2076 \FCclient lanman auth\F[]\&. 2077 .sp 2078 Note that some sites (particularly those following \'best practice\' security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM\&. 2079 .sp 2080 Default: 2081 \fI\fIclient ntlmv2 auth\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 1659 2082 .RE 1660 2083 1661 2084 client plaintext auth (G) 1662 .PP 1663 .RS 4 1664 Specifies whether a client should send a plaintext password if the server does not support encrypted passwords\. 1665 .sp 1666 Default: 1667 \fI\fIclient plaintext auth\fR\fR\fI = \fR\fIno\fR\fI \fR 2085 .\" client plaintext auth 2086 .PP 2087 .RS 4 2088 Specifies whether a client should send a plaintext password if the server does not support encrypted passwords\&. 2089 .sp 2090 Default: 2091 \fI\fIclient plaintext auth\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 1668 2092 .RE 1669 2093 1670 2094 client schannel (G) 1671 .PP 1672 .RS 4 1673 This controls whether the client offers or even demands the use of the netlogon schannel\. 1674 \fIclient schannel = no\fR 2095 .\" client schannel 2096 .PP 2097 .RS 4 2098 This controls whether the client offers or even demands the use of the netlogon schannel\&. 2099 \m[blue]\fBclient schannel = no\fR\m[] 1675 2100 does not offer the schannel, 1676 \ fIclient schannel = auto\fR2101 \m[blue]\fBclient schannel = auto\fR\m[] 1677 2102 offers the schannel but does not enforce it, and 1678 \ fIclient schannel = yes\fR1679 denies access if the server is not able to speak netlogon schannel\ .1680 .sp 1681 Default: 1682 \fI\fIclient schannel\fR\fR\fI = \fR\fI auto\fR\fI \fR1683 .sp 1684 Example: 1685 \fI\fIclient schannel\fR\fR\fI = \fR\fI yes\fR\fI \fR2103 \m[blue]\fBclient schannel = yes\fR\m[] 2104 denies access if the server is not able to speak netlogon schannel\&. 2105 .sp 2106 Default: 2107 \fI\fIclient schannel\fR\fR\fI = \fR\fI\FCauto\F[]\fR\fI \fR 2108 .sp 2109 Example: 2110 \fI\fIclient schannel\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 1686 2111 .RE 1687 2112 1688 2113 client signing (G) 1689 .PP 1690 .RS 4 1691 This controls whether the client offers or requires the server it talks to to use SMB signing\. Possible values are 2114 .\" client signing 2115 .PP 2116 .RS 4 2117 This controls whether the client offers or requires the server it talks to to use SMB signing\&. Possible values are 1692 2118 \fIauto\fR, 1693 2119 \fImandatory\fR 1694 2120 and 1695 \fIdisabled\fR\ .1696 .sp 1697 When set to auto, SMB signing is offered, but not enforced\ . When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either\.1698 .sp 1699 Default: 1700 \fI\fIclient signing\fR\fR\fI = \fR\fI auto\fR\fI \fR2121 \fIdisabled\fR\&. 2122 .sp 2123 When set to auto, SMB signing is offered, but not enforced\&. When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either\&. 2124 .sp 2125 Default: 2126 \fI\fIclient signing\fR\fR\fI = \fR\fI\FCauto\F[]\fR\fI \fR 1701 2127 .RE 1702 2128 1703 2129 client use spnego (G) 1704 .PP 1705 .RS 4 1706 This variable controls whether Samba clients will try to use Simple and Protected NEGOciation (as specified by rfc2478) with supporting servers (including WindowsXP, Windows2000 and Samba 3\.0) to agree upon an authentication mechanism\. This enables Kerberos authentication in particular\. 1707 .sp 1708 Default: 1709 \fI\fIclient use spnego\fR\fR\fI = \fR\fIyes\fR\fI \fR 2130 .\" client use spnego 2131 .PP 2132 .RS 4 2133 This variable controls whether Samba clients will try to use Simple and Protected NEGOciation (as specified by rfc2478) with supporting servers (including WindowsXP, Windows2000 and Samba 3\&.0) to agree upon an authentication mechanism\&. This enables Kerberos authentication in particular\&. 2134 .sp 2135 Default: 2136 \fI\fIclient use spnego\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 1710 2137 .RE 1711 2138 1712 2139 cluster addresses (G) 1713 .PP 1714 .RS 4 1715 With this parameter you can add additional addresses nmbd will register with a WINS server\. These addresses are not necessarily present on all nodes simultaneously, but they will be registered with the WINS server so that clients can contact any of the nodes\. 1716 .sp 1717 Default: 1718 \fI\fIcluster addresses\fR\fR\fI = \fR\fI\fR\fI \fR 1719 .sp 1720 Example: 1721 \fI\fIcluster addresses\fR\fR\fI = \fR\fI10\.0\.0\.1 10\.0\.0\.2 10\.0\.0\.3\fR\fI \fR 2140 .\" cluster addresses 2141 .PP 2142 .RS 4 2143 With this parameter you can add additional addresses nmbd will register with a WINS server\&. These addresses are not necessarily present on all nodes simultaneously, but they will be registered with the WINS server so that clients can contact any of the nodes\&. 2144 .sp 2145 Default: 2146 \fI\fIcluster addresses\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 2147 .sp 2148 Example: 2149 \fI\fIcluster addresses\fR\fR\fI = \fR\fI\FC10\&.0\&.0\&.1 10\&.0\&.0\&.2 10\&.0\&.0\&.3\F[]\fR\fI \fR 1722 2150 .RE 1723 2151 1724 2152 clustering (G) 1725 .PP 1726 .RS 4 1727 This parameter specifies whether Samba should contact ctdb for accessing its tdb files and use ctdb as a backend for its messaging backend\. 2153 .\" clustering 2154 .PP 2155 .RS 4 2156 This parameter specifies whether Samba should contact ctdb for accessing its tdb files and use ctdb as a backend for its messaging backend\&. 1728 2157 .sp 1729 2158 Set this parameter to 1730 yes 1731 only if you have a cluster setup with ctdb running\ .1732 .sp 1733 Default: 1734 \fI\fIclustering\fR\fR\fI = \fR\fI no\fR\fI \fR2159 \FCyes\F[] 2160 only if you have a cluster setup with ctdb running\&. 2161 .sp 2162 Default: 2163 \fI\fIclustering\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 1735 2164 .RE 1736 2165 1737 2166 comment (S) 2167 .\" comment 1738 2168 .PP 1739 2169 .RS 4 1740 2170 This is a text field that is seen next to a share when a client does a queries the server, either via the network neighborhood or via 1741 net view 1742 to list what shares are available\ .2171 \FCnet view\F[] 2172 to list what shares are available\&. 1743 2173 .sp 1744 2174 If you want to set the string that is displayed next to the machine name then see the 1745 \ fIserver string\fR1746 parameter\ .1747 .sp 1748 Default: 1749 \fI\fIcomment\fR\fR\fI = \fR\fI # No comment\fR\fI \fR1750 .sp 1751 Example: 1752 \fI\fIcomment\fR\fR\fI = \fR\fI Fred\'s Files\fR\fI \fR2175 \m[blue]\fBserver string\fR\m[] 2176 parameter\&. 2177 .sp 2178 Default: 2179 \fI\fIcomment\fR\fR\fI = \fR\fI\FC # No comment\F[]\fR\fI \fR 2180 .sp 2181 Example: 2182 \fI\fIcomment\fR\fR\fI = \fR\fI\FCFred\'s Files\F[]\fR\fI \fR 1753 2183 .RE 1754 2184 1755 2185 config backend (G) 1756 .PP 1757 .RS 4 1758 This controls the backend for storing the configuration\. Possible values are 2186 .\" config backend 2187 .PP 2188 .RS 4 2189 This controls the backend for storing the configuration\&. Possible values are 1759 2190 \fIfile\fR 1760 2191 (the default) and 1761 \fIregistry\fR\ . When1762 \ fIconfig backend = registry\fR2192 \fIregistry\fR\&. When 2193 \m[blue]\fBconfig backend = registry\fR\m[] 1763 2194 is encountered while loading 1764 \fIsmb\ .conf\fR, the configuration read so far is dropped and the global options are read from registry instead\. So this triggers a registry only configuration\. Share definitions are not read immediately but instead2195 \fIsmb\&.conf\fR, the configuration read so far is dropped and the global options are read from registry instead\&. So this triggers a registry only configuration\&. Share definitions are not read immediately but instead 1765 2196 \fIregistry shares\fR 1766 2197 is set to 1767 \fIyes\fR\ .1768 .sp 1769 Note: This option can not be set inside the registry configuration itself\ .1770 .sp 1771 Default: 1772 \fI\fIconfig backend\fR\fR\fI = \fR\fI file\fR\fI \fR1773 .sp 1774 Example: 1775 \fI\fIconfig backend\fR\fR\fI = \fR\fI registry\fR\fI \fR2198 \fIyes\fR\&. 2199 .sp 2200 Note: This option can not be set inside the registry configuration itself\&. 2201 .sp 2202 Default: 2203 \fI\fIconfig backend\fR\fR\fI = \fR\fI\FCfile\F[]\fR\fI \fR 2204 .sp 2205 Example: 2206 \fI\fIconfig backend\fR\fR\fI = \fR\fI\FCregistry\F[]\fR\fI \fR 1776 2207 .RE 1777 2208 1778 2209 config file (G) 2210 .\" config file 1779 2211 .PP 1780 2212 .RS 4 1781 2213 This allows you to override the config file to use, instead of the default (usually 1782 \ fIsmb\.conf\fR)\. There is a chicken and egg problem here as this option is set in the config file!1783 .sp 1784 For this reason, if the name of the config file has changed when the parameters are loaded then it will reload them from the new config file\ .1785 .sp 1786 This option takes the usual substitutions, which can be very useful\ .1787 .sp 1788 If the config file doesn\'t exist then it won\'t be loaded (allowing you to special case the config files of just a few clients)\ .2214 \FCsmb\&.conf\F[])\&. There is a chicken and egg problem here as this option is set in the config file! 2215 .sp 2216 For this reason, if the name of the config file has changed when the parameters are loaded then it will reload them from the new config file\&. 2217 .sp 2218 This option takes the usual substitutions, which can be very useful\&. 2219 .sp 2220 If the config file doesn\'t exist then it won\'t be loaded (allowing you to special case the config files of just a few clients)\&. 1789 2221 .sp 1790 2222 \fINo default\fR 1791 2223 .sp 1792 2224 Example: 1793 \fI\fIconfig file\fR\fR\fI = \fR\fI /usr/local/samba/lib/smb\.conf\.%m\fR\fI \fR2225 \fI\fIconfig file\fR\fR\fI = \fR\fI\FC/usr/local/samba/lib/smb\&.conf\&.%m\F[]\fR\fI \fR 1794 2226 .RE 1795 2227 1796 2228 copy (S) 1797 .PP 1798 .RS 4 1799 This parameter allows you to "clone" service entries\. The specified service is simply duplicated under the current service\'s name\. Any parameters specified in the current section will override those in the section being copied\. 1800 .sp 1801 This feature lets you set up a \'template\' service and create similar services easily\. Note that the service being copied must occur earlier in the configuration file than the service doing the copying\. 1802 .sp 1803 Default: 1804 \fI\fIcopy\fR\fR\fI = \fR\fI\fR\fI \fR 1805 .sp 1806 Example: 1807 \fI\fIcopy\fR\fR\fI = \fR\fIotherservice\fR\fI \fR 2229 .\" copy 2230 .PP 2231 .RS 4 2232 This parameter allows you to "clone" service entries\&. The specified service is simply duplicated under the current service\'s name\&. Any parameters specified in the current section will override those in the section being copied\&. 2233 .sp 2234 This feature lets you set up a \'template\' service and create similar services easily\&. Note that the service being copied must occur earlier in the configuration file than the service doing the copying\&. 2235 .sp 2236 Default: 2237 \fI\fIcopy\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 2238 .sp 2239 Example: 2240 \fI\fIcopy\fR\fR\fI = \fR\fI\FCotherservice\F[]\fR\fI \fR 1808 2241 .RE 1809 2242 1810 2243 create mode 2244 .\" create mode 1811 2245 .PP 1812 2246 .RS 4 1813 2247 This parameter is a synonym for 1814 create mask\ .2248 create mask\&. 1815 2249 .RE 1816 2250 1817 2251 create mask (S) 1818 .PP 1819 .RS 4 1820 When a file is created, the necessary permissions are calculated according to the mapping from DOS modes to UNIX permissions, and the resulting UNIX mode is then bit\-wise \'AND\'ed with this parameter\. This parameter may be thought of as a bit\-wise MASK for the UNIX modes of a file\. Any bit 2252 .\" create mask 2253 .PP 2254 .RS 4 2255 When a file is created, the necessary permissions are calculated according to the mapping from DOS modes to UNIX permissions, and the resulting UNIX mode is then bit\-wise \'AND\'ed with this parameter\&. This parameter may be thought of as a bit\-wise MASK for the UNIX modes of a file\&. Any bit 1821 2256 \fInot\fR 1822 set here will be removed from the modes set on a file when it is created\ .2257 set here will be removed from the modes set on a file when it is created\&. 1823 2258 .sp 1824 2259 The default value of this parameter removes the 1825 group 2260 \FCgroup\F[] 1826 2261 and 1827 other 1828 write and execute bits from the UNIX modes\ .2262 \FCother\F[] 2263 write and execute bits from the UNIX modes\&. 1829 2264 .sp 1830 2265 Following this Samba will bit\-wise \'OR\' the UNIX mode created from this parameter with the value of the 1831 \ fIforce create mode\fR1832 parameter which is set to 000 by default\ .1833 .sp 1834 This parameter does not affect directory masks\ . See the parameter1835 \ fIdirectory mask\fR1836 for details\ .1837 .sp 1838 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors\ . If the administrator wishes to enforce a mask on access control lists also, they need to set the1839 \ fIsecurity mask\fR\.1840 .sp 1841 Default: 1842 \fI\fIcreate mask\fR\fR\fI = \fR\fI 0744\fR\fI \fR1843 .sp 1844 Example: 1845 \fI\fIcreate mask\fR\fR\fI = \fR\fI 0775\fR\fI \fR2266 \m[blue]\fBforce create mode\fR\m[] 2267 parameter which is set to 000 by default\&. 2268 .sp 2269 This parameter does not affect directory masks\&. See the parameter 2270 \m[blue]\fBdirectory mask\fR\m[] 2271 for details\&. 2272 .sp 2273 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors\&. If the administrator wishes to enforce a mask on access control lists also, they need to set the 2274 \m[blue]\fBsecurity mask\fR\m[]\&. 2275 .sp 2276 Default: 2277 \fI\fIcreate mask\fR\fR\fI = \fR\fI\FC0744\F[]\fR\fI \fR 2278 .sp 2279 Example: 2280 \fI\fIcreate mask\fR\fR\fI = \fR\fI\FC0775\F[]\fR\fI \fR 1846 2281 .RE 1847 2282 1848 2283 csc policy (S) 2284 .\" csc policy 1849 2285 .PP 1850 2286 .RS 4 1851 2287 This stands for 1852 \fIclient\-side caching policy\fR, and specifies how clients capable of offline caching will cache the files in the share\ . The valid values are: manual, documents, programs, disable\.1853 .sp 1854 These values correspond to those used on Windows servers\ .2288 \fIclient\-side caching policy\fR, and specifies how clients capable of offline caching will cache the files in the share\&. The valid values are: manual, documents, programs, disable\&. 2289 .sp 2290 These values correspond to those used on Windows servers\&. 1855 2291 .sp 1856 2292 For example, shares containing roaming profiles can have offline caching disabled using 1857 \ fIcsc policy = disable\fR\.1858 .sp 1859 Default: 1860 \fI\fIcsc policy\fR\fR\fI = \fR\fI manual\fR\fI \fR1861 .sp 1862 Example: 1863 \fI\fIcsc policy\fR\fR\fI = \fR\fI programs\fR\fI \fR2293 \m[blue]\fBcsc policy = disable\fR\m[]\&. 2294 .sp 2295 Default: 2296 \fI\fIcsc policy\fR\fR\fI = \fR\fI\FCmanual\F[]\fR\fI \fR 2297 .sp 2298 Example: 2299 \fI\fIcsc policy\fR\fR\fI = \fR\fI\FCprograms\F[]\fR\fI \fR 1864 2300 .RE 1865 2301 1866 2302 ctdbd socket (G) 2303 .\" ctdbd socket 1867 2304 .PP 1868 2305 .RS 4 1869 2306 If you set 1870 clustering=yes, you need to tell Samba where ctdbd listens on its unix domain socket\. The default path as of ctdb 1\.0 is /tmp/ctdb\.socket which you have to explicitly set for Samba in smb\.conf\.1871 .sp 1872 Default: 1873 \fI\fIctdbd socket\fR\fR\fI = \fR\fI\ fR\fI \fR1874 .sp 1875 Example: 1876 \fI\fIctdbd socket\fR\fR\fI = \fR\fI /tmp/ctdb\.socket\fR\fI \fR2307 \FCclustering=yes\F[], you need to tell Samba where ctdbd listens on its unix domain socket\&. The default path as of ctdb 1\&.0 is /tmp/ctdb\&.socket which you have to explicitly set for Samba in smb\&.conf\&. 2308 .sp 2309 Default: 2310 \fI\fIctdbd socket\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 2311 .sp 2312 Example: 2313 \fI\fIctdbd socket\fR\fR\fI = \fR\fI\FC/tmp/ctdb\&.socket\F[]\fR\fI \fR 1877 2314 .RE 1878 2315 1879 2316 cups options (S) 2317 .\" cups options 1880 2318 .PP 1881 2319 .RS 4 1882 2320 This parameter is only applicable if 1883 \ fIprinting\fR2321 \m[blue]\fBprinting\fR\m[] 1884 2322 is set to 1885 \fBcups\fR\ . Its value is a free form string of options passed directly to the cups library\.1886 .sp 1887 You can pass any generic print option known to CUPS (as listed in the CUPS "Software Users\' Manual")\ . You can also pass any printer specific option (as listed in "lpoptions \-d printername \-l") valid for the target queue\. Multiple parameters should be space\-delimited name/value pairs according to the PAPI text option ABNF specification\. Collection values ("name={a=\.\.\. b=\.\.\. c=\.\.\.}") are stored with the curley brackets intact\.2323 \fBcups\fR\&. Its value is a free form string of options passed directly to the cups library\&. 2324 .sp 2325 You can pass any generic print option known to CUPS (as listed in the CUPS "Software Users\' Manual")\&. You can also pass any printer specific option (as listed in "lpoptions \-d printername \-l") valid for the target queue\&. Multiple parameters should be space\-delimited name/value pairs according to the PAPI text option ABNF specification\&. Collection values ("name={a=\&.\&.\&. b=\&.\&.\&. c=\&.\&.\&.}") are stored with the curley brackets intact\&. 1888 2326 .sp 1889 2327 You should set this parameter to 1890 2328 \fBraw\fR 1891 2329 if your CUPS server 1892 \ fIerror_log\fR1893 file contains messages such as "Unsupported format \'application/octet\-stream\'" when printing from a Windows client through Samba\ . It is no longer necessary to enable system wide raw printing in1894 \ fI/etc/cups/mime\.{convs,types}\fR\.1895 .sp 1896 Default: 1897 \fI\fIcups options\fR\fR\fI = \fR\fI ""\fR\fI \fR1898 .sp 1899 Example: 1900 \fI\fIcups options\fR\fR\fI = \fR\fI "raw media=a4"\fR\fI \fR2330 \FCerror_log\F[] 2331 file contains messages such as "Unsupported format \'application/octet\-stream\'" when printing from a Windows client through Samba\&. It is no longer necessary to enable system wide raw printing in 2332 \FC/etc/cups/mime\&.{convs,types}\F[]\&. 2333 .sp 2334 Default: 2335 \fI\fIcups options\fR\fR\fI = \fR\fI\FC""\F[]\fR\fI \fR 2336 .sp 2337 Example: 2338 \fI\fIcups options\fR\fR\fI = \fR\fI\FC"raw media=a4"\F[]\fR\fI \fR 1901 2339 .RE 1902 2340 1903 2341 cups server (G) 2342 .\" cups server 1904 2343 .PP 1905 2344 .RS 4 1906 2345 This parameter is only applicable if 1907 \ fIprinting\fR2346 \m[blue]\fBprinting\fR\m[] 1908 2347 is set to 1909 \fBcups\fR\ .2348 \fBcups\fR\&. 1910 2349 .sp 1911 2350 If set, this option overrides the ServerName option in the CUPS 1912 \ fIclient\.conf\fR\. This is necessary if you have virtual samba servers that connect to different CUPS daemons\.1913 .sp 1914 Optionally, a port can be specified by separating the server name and port number with a colon\ . If no port was specified, the default port for IPP (631) will be used\.1915 .sp 1916 Default: 1917 \fI\fIcups server\fR\fR\fI = \fR\fI ""\fR\fI \fR1918 .sp 1919 Example: 1920 \fI\fIcups server\fR\fR\fI = \fR\fI mycupsserver\fR\fI \fR1921 .sp 1922 Example: 1923 \fI\fIcups server\fR\fR\fI = \fR\fI mycupsserver:1631\fR\fI \fR2351 \FCclient\&.conf\F[]\&. This is necessary if you have virtual samba servers that connect to different CUPS daemons\&. 2352 .sp 2353 Optionally, a port can be specified by separating the server name and port number with a colon\&. If no port was specified, the default port for IPP (631) will be used\&. 2354 .sp 2355 Default: 2356 \fI\fIcups server\fR\fR\fI = \fR\fI\FC""\F[]\fR\fI \fR 2357 .sp 2358 Example: 2359 \fI\fIcups server\fR\fR\fI = \fR\fI\FCmycupsserver\F[]\fR\fI \fR 2360 .sp 2361 Example: 2362 \fI\fIcups server\fR\fR\fI = \fR\fI\FCmycupsserver:1631\F[]\fR\fI \fR 1924 2363 .RE 1925 2364 1926 2365 deadtime (G) 1927 .PP 1928 .RS 4 1929 The value of the parameter (a decimal integer) represents the number of minutes of inactivity before a connection is considered dead, and it is disconnected\. The deadtime only takes effect if the number of open files is zero\. 1930 .sp 1931 This is useful to stop a server\'s resources being exhausted by a large number of inactive connections\. 1932 .sp 1933 Most clients have an auto\-reconnect feature when a connection is broken so in most cases this parameter should be transparent to users\. 1934 .sp 1935 Using this parameter with a timeout of a few minutes is recommended for most systems\. 1936 .sp 1937 A deadtime of zero indicates that no auto\-disconnection should be performed\. 1938 .sp 1939 Default: 1940 \fI\fIdeadtime\fR\fR\fI = \fR\fI0\fR\fI \fR 1941 .sp 1942 Example: 1943 \fI\fIdeadtime\fR\fR\fI = \fR\fI15\fR\fI \fR 2366 .\" deadtime 2367 .PP 2368 .RS 4 2369 The value of the parameter (a decimal integer) represents the number of minutes of inactivity before a connection is considered dead, and it is disconnected\&. The deadtime only takes effect if the number of open files is zero\&. 2370 .sp 2371 This is useful to stop a server\'s resources being exhausted by a large number of inactive connections\&. 2372 .sp 2373 Most clients have an auto\-reconnect feature when a connection is broken so in most cases this parameter should be transparent to users\&. 2374 .sp 2375 Using this parameter with a timeout of a few minutes is recommended for most systems\&. 2376 .sp 2377 A deadtime of zero indicates that no auto\-disconnection should be performed\&. 2378 .sp 2379 Default: 2380 \fI\fIdeadtime\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 2381 .sp 2382 Example: 2383 \fI\fIdeadtime\fR\fR\fI = \fR\fI\FC15\F[]\fR\fI \fR 1944 2384 .RE 1945 2385 1946 2386 debug class (G) 1947 .PP 1948 .RS 4 1949 With this boolean parameter enabled, the debug class (DBGC_CLASS) will be displayed in the debug header\. 2387 .\" debug class 2388 .PP 2389 .RS 4 2390 With this boolean parameter enabled, the debug class (DBGC_CLASS) will be displayed in the debug header\&. 1950 2391 .sp 1951 2392 For more information about currently available debug classes, see section about 1952 \ fIlog level\fR\.1953 .sp 1954 Default: 1955 \fI\fIdebug class\fR\fR\fI = \fR\fI no\fR\fI \fR2393 \m[blue]\fBlog level\fR\m[]\&. 2394 .sp 2395 Default: 2396 \fI\fIdebug class\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 1956 2397 .RE 1957 2398 1958 2399 debug hires timestamp (G) 1959 .PP 1960 .RS 4 1961 Sometimes the timestamps in the log messages are needed with a resolution of higher that seconds, this boolean parameter adds microsecond resolution to the timestamp message header when turned on\. 2400 .\" debug hires timestamp 2401 .PP 2402 .RS 4 2403 Sometimes the timestamps in the log messages are needed with a resolution of higher that seconds, this boolean parameter adds microsecond resolution to the timestamp message header when turned on\&. 1962 2404 .sp 1963 2405 Note that the parameter 1964 \ fIdebug timestamp\fR1965 must be on for this to have an effect\ .1966 .sp 1967 Default: 1968 \fI\fIdebug hires timestamp\fR\fR\fI = \fR\fI no\fR\fI \fR2406 \m[blue]\fBdebug timestamp\fR\m[] 2407 must be on for this to have an effect\&. 2408 .sp 2409 Default: 2410 \fI\fIdebug hires timestamp\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 1969 2411 .RE 1970 2412 1971 2413 debug pid (G) 2414 .\" debug pid 1972 2415 .PP 1973 2416 .RS 4 1974 2417 When using only one log file for more then one forked 1975 \fBsmbd\fR(8)\-process there may be hard to follow which process outputs which message\ . This boolean parameter is adds the process\-id to the timestamp message headers in the logfile when turned on\.2418 \fBsmbd\fR(8)\-process there may be hard to follow which process outputs which message\&. This boolean parameter is adds the process\-id to the timestamp message headers in the logfile when turned on\&. 1976 2419 .sp 1977 2420 Note that the parameter 1978 \ fIdebug timestamp\fR1979 must be on for this to have an effect\ .1980 .sp 1981 Default: 1982 \fI\fIdebug pid\fR\fR\fI = \fR\fI no\fR\fI \fR2421 \m[blue]\fBdebug timestamp\fR\m[] 2422 must be on for this to have an effect\&. 2423 .sp 2424 Default: 2425 \fI\fIdebug pid\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 1983 2426 .RE 1984 2427 1985 2428 debug prefix timestamp (G) 2429 .\" debug prefix timestamp 1986 2430 .PP 1987 2431 .RS 4 1988 2432 With this option enabled, the timestamp message header is prefixed to the debug message without the filename and function information that is included with the 1989 \ fIdebug timestamp\fR1990 parameter\ . This gives timestamps to the messages without adding an additional line\.2433 \m[blue]\fBdebug timestamp\fR\m[] 2434 parameter\&. This gives timestamps to the messages without adding an additional line\&. 1991 2435 .sp 1992 2436 Note that this parameter overrides the 1993 \ fIdebug timestamp\fR1994 parameter\ .1995 .sp 1996 Default: 1997 \fI\fIdebug prefix timestamp\fR\fR\fI = \fR\fI no\fR\fI \fR2437 \m[blue]\fBdebug timestamp\fR\m[] 2438 parameter\&. 2439 .sp 2440 Default: 2441 \fI\fIdebug prefix timestamp\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 1998 2442 .RE 1999 2443 2000 2444 timestamp logs 2445 .\" timestamp logs 2001 2446 .PP 2002 2447 .RS 4 2003 2448 This parameter is a synonym for 2004 debug timestamp\ .2449 debug timestamp\&. 2005 2450 .RE 2006 2451 2007 2452 debug timestamp (G) 2008 .PP 2009 .RS 4 2010 Samba debug log messages are timestamped by default\. If you are running at a high 2011 \fIdebug level\fR 2012 these timestamps can be distracting\. This boolean parameter allows timestamping to be turned off\. 2013 .sp 2014 Default: 2015 \fI\fIdebug timestamp\fR\fR\fI = \fR\fIyes\fR\fI \fR 2453 .\" debug timestamp 2454 .PP 2455 .RS 4 2456 Samba debug log messages are timestamped by default\&. If you are running at a high 2457 \m[blue]\fBdebug level\fR\m[] 2458 these timestamps can be distracting\&. This boolean parameter allows timestamping to be turned off\&. 2459 .sp 2460 Default: 2461 \fI\fIdebug timestamp\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 2016 2462 .RE 2017 2463 2018 2464 debug uid (G) 2019 .PP 2020 .RS 4 2021 Samba is sometimes run as root and sometime run as the connected user, this boolean parameter inserts the current euid, egid, uid and gid to the timestamp message headers in the log file if turned on\. 2465 .\" debug uid 2466 .PP 2467 .RS 4 2468 Samba is sometimes run as root and sometime run as the connected user, this boolean parameter inserts the current euid, egid, uid and gid to the timestamp message headers in the log file if turned on\&. 2022 2469 .sp 2023 2470 Note that the parameter 2024 \ fIdebug timestamp\fR2025 must be on for this to have an effect\ .2026 .sp 2027 Default: 2028 \fI\fIdebug uid\fR\fR\fI = \fR\fI no\fR\fI \fR2471 \m[blue]\fBdebug timestamp\fR\m[] 2472 must be on for this to have an effect\&. 2473 .sp 2474 Default: 2475 \fI\fIdebug uid\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2029 2476 .RE 2030 2477 2031 2478 default case (S) 2479 .\" default case 2032 2480 .PP 2033 2481 .RS 4 2034 2482 See the section on 2035 \ fIname mangling\fR\. Also note the2036 \ fIshort preserve case\fR2037 parameter\ .2038 .sp 2039 Default: 2040 \fI\fIdefault case\fR\fR\fI = \fR\fI lower\fR\fI \fR2483 \m[blue]\fBname mangling\fR\m[]\&. Also note the 2484 \m[blue]\fBshort preserve case\fR\m[] 2485 parameter\&. 2486 .sp 2487 Default: 2488 \fI\fIdefault case\fR\fR\fI = \fR\fI\FClower\F[]\fR\fI \fR 2041 2489 .RE 2042 2490 2043 2491 default devmode (S) 2492 .\" default devmode 2044 2493 .PP 2045 2494 .RS 4 2046 2495 This parameter is only applicable to 2047 \ fIprintable\fR2048 services\ . When smbd is serving Printer Drivers to Windows NT/2k/XP clients, each printer on the Samba server has a Device Mode which defines things such as paper size and orientation and duplex settings\. The device mode can only correctly be generated by the printer driver itself (which can only be executed on a Win32 platform)\. Because smbd is unable to execute the driver code to generate the device mode, the default behavior is to set this field to NULL\.2049 .sp 2050 Most problems with serving printer drivers to Windows NT/2k/XP clients can be traced to a problem with the generated device mode\ . Certain drivers will do things such as crashing the client\'s Explorer\.exe with a NULL devmode\. However, other printer drivers can cause the client\'s spooler service (spoolsv\.exe) to die if the devmode was not created by the driver itself (i\.e\. smbd generates a default devmode)\.2051 .sp 2052 This parameter should be used with care and tested with the printer driver in question\ . It is better to leave the device mode to NULL and let the Windows client set the correct values\. Because drivers do not do this all the time, setting2053 default devmode = yes 2054 will instruct smbd to generate a default one\ .2496 \m[blue]\fBprintable\fR\m[] 2497 services\&. When smbd is serving Printer Drivers to Windows NT/2k/XP clients, each printer on the Samba server has a Device Mode which defines things such as paper size and orientation and duplex settings\&. The device mode can only correctly be generated by the printer driver itself (which can only be executed on a Win32 platform)\&. Because smbd is unable to execute the driver code to generate the device mode, the default behavior is to set this field to NULL\&. 2498 .sp 2499 Most problems with serving printer drivers to Windows NT/2k/XP clients can be traced to a problem with the generated device mode\&. Certain drivers will do things such as crashing the client\'s Explorer\&.exe with a NULL devmode\&. However, other printer drivers can cause the client\'s spooler service (spoolsv\&.exe) to die if the devmode was not created by the driver itself (i\&.e\&. smbd generates a default devmode)\&. 2500 .sp 2501 This parameter should be used with care and tested with the printer driver in question\&. It is better to leave the device mode to NULL and let the Windows client set the correct values\&. Because drivers do not do this all the time, setting 2502 \FCdefault devmode = yes\F[] 2503 will instruct smbd to generate a default one\&. 2055 2504 .sp 2056 2505 For more information on Windows NT/2k printing and Device Modes, see the 2057 MSDN documentation\ .2058 .sp 2059 Default: 2060 \fI\fIdefault devmode\fR\fR\fI = \fR\fI yes\fR\fI \fR2506 MSDN documentation\&. 2507 .sp 2508 Default: 2509 \fI\fIdefault devmode\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 2061 2510 .RE 2062 2511 2063 2512 default 2513 .\" default 2064 2514 .PP 2065 2515 .RS 4 2066 2516 This parameter is a synonym for 2067 default service\ .2517 default service\&. 2068 2518 .RE 2069 2519 2070 2520 default service (G) 2071 .PP 2072 .RS 4 2073 This parameter specifies the name of a service which will be connected to if the service actually requested cannot be found\. Note that the square brackets are 2521 .\" default service 2522 .PP 2523 .RS 4 2524 This parameter specifies the name of a service which will be connected to if the service actually requested cannot be found\&. Note that the square brackets are 2074 2525 \fINOT\fR 2075 given in the parameter value (see example below)\ .2076 .sp 2077 There is no default value for this parameter\ . If this parameter is not given, attempting to connect to a nonexistent service results in an error\.2526 given in the parameter value (see example below)\&. 2527 .sp 2528 There is no default value for this parameter\&. If this parameter is not given, attempting to connect to a nonexistent service results in an error\&. 2078 2529 .sp 2079 2530 Typically the default service would be a 2080 \ fIguest ok\fR,2081 \ fIread\-only\fR2082 service\ .2531 \m[blue]\fBguest ok\fR\m[], 2532 \m[blue]\fBread\-only\fR\m[] 2533 service\&. 2083 2534 .sp 2084 2535 Also note that the apparent service name will be changed to equal that of the requested service, this is very useful as it allows you to use macros like 2085 2536 \fI%S\fR 2086 to make a wildcard service\ .2087 .sp 2088 Note also that any "_" characters in the name of the service used in the default service will get mapped to a "/"\ . This allows for interesting things\.2089 .sp 2090 Default: 2091 \fI\fIdefault service\fR\fR\fI = \fR\fI\ fR\fI \fR2092 .sp 2093 Example: 2094 \fI\fIdefault service\fR\fR\fI = \fR\fI pub\fR\fI \fR2537 to make a wildcard service\&. 2538 .sp 2539 Note also that any "_" characters in the name of the service used in the default service will get mapped to a "/"\&. This allows for interesting things\&. 2540 .sp 2541 Default: 2542 \fI\fIdefault service\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 2543 .sp 2544 Example: 2545 \fI\fIdefault service\fR\fR\fI = \fR\fI\FCpub\F[]\fR\fI \fR 2095 2546 .RE 2096 2547 2097 2548 defer sharing violations (G) 2098 .PP 2099 .RS 4 2100 Windows allows specifying how a file will be shared with other processes when it is opened\. Sharing violations occur when a file is opened by a different process using options that violate the share settings specified by other processes\. This parameter causes smbd to act as a Windows server does, and defer returning a "sharing violation" error message for up to one second, allowing the client to close the file causing the violation in the meantime\. 2101 .sp 2102 UNIX by default does not have this behaviour\. 2103 .sp 2104 There should be no reason to turn off this parameter, as it is designed to enable Samba to more correctly emulate Windows\. 2105 .sp 2106 Default: 2107 \fI\fIdefer sharing violations\fR\fR\fI = \fR\fITrue\fR\fI \fR 2549 .\" defer sharing violations 2550 .PP 2551 .RS 4 2552 Windows allows specifying how a file will be shared with other processes when it is opened\&. Sharing violations occur when a file is opened by a different process using options that violate the share settings specified by other processes\&. This parameter causes smbd to act as a Windows server does, and defer returning a "sharing violation" error message for up to one second, allowing the client to close the file causing the violation in the meantime\&. 2553 .sp 2554 UNIX by default does not have this behaviour\&. 2555 .sp 2556 There should be no reason to turn off this parameter, as it is designed to enable Samba to more correctly emulate Windows\&. 2557 .sp 2558 Default: 2559 \fI\fIdefer sharing violations\fR\fR\fI = \fR\fI\FCTrue\F[]\fR\fI \fR 2108 2560 .RE 2109 2561 2110 2562 delete group script (G) 2563 .\" delete group script 2111 2564 .PP 2112 2565 .RS 4 … … 2114 2567 \fIAS ROOT\fR 2115 2568 \fBsmbd\fR(8) 2116 when a group is requested to be deleted\ . It will expand any2569 when a group is requested to be deleted\&. It will expand any 2117 2570 \fI%g\fR 2118 to the group name passed\ . This script is only useful for installations using the Windows NT domain administration tools\.2119 .sp 2120 Default: 2121 \fI\fIdelete group script\fR\fR\fI = \fR\fI\ fR\fI \fR2571 to the group name passed\&. This script is only useful for installations using the Windows NT domain administration tools\&. 2572 .sp 2573 Default: 2574 \fI\fIdelete group script\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 2122 2575 .RE 2123 2576 2124 2577 deleteprinter command (G) 2125 .PP 2126 .RS 4 2127 With the introduction of MS\-RPC based printer support for Windows NT/2000 clients in Samba 2\.2, it is now possible to delete a printer at run time by issuing the DeletePrinter() RPC call\. 2128 .sp 2129 For a Samba host this means that the printer must be physically deleted from the underlying printing system\. The 2130 \fIdeleteprinter command\fR 2578 .\" deleteprinter command 2579 .PP 2580 .RS 4 2581 With the introduction of MS\-RPC based printer support for Windows NT/2000 clients in Samba 2\&.2, it is now possible to delete a printer at run time by issuing the DeletePrinter() RPC call\&. 2582 .sp 2583 For a Samba host this means that the printer must be physically deleted from the underlying printing system\&. The 2584 \m[blue]\fBdeleteprinter command\fR\m[] 2131 2585 defines a script to be run which will perform the necessary operations for removing the printer from the print system and from 2132 \ fIsmb\.conf\fR\.2586 \FCsmb\&.conf\F[]\&. 2133 2587 .sp 2134 2588 The 2135 \ fIdeleteprinter command\fR2589 \m[blue]\fBdeleteprinter command\fR\m[] 2136 2590 is automatically called with only one parameter: 2137 \ fIprinter name\fR\.2591 \m[blue]\fBprinter name\fR\m[]\&. 2138 2592 .sp 2139 2593 Once the 2140 \ fIdeleteprinter command\fR2594 \m[blue]\fBdeleteprinter command\fR\m[] 2141 2595 has been executed, 2142 smbd 2596 \FCsmbd\F[] 2143 2597 will reparse the 2144 \ fI smb\.conf\fR2145 to check that the associated printer no longer exists\ . If the sharename is still valid, then2146 smbd 2147 will return an ACCESS_DENIED error to the client\ .2148 .sp 2149 Default: 2150 \fI\fIdeleteprinter command\fR\fR\fI = \fR\fI\ fR\fI \fR2151 .sp 2152 Example: 2153 \fI\fIdeleteprinter command\fR\fR\fI = \fR\fI /usr/bin/removeprinter\fR\fI \fR2598 \FC smb\&.conf\F[] 2599 to check that the associated printer no longer exists\&. If the sharename is still valid, then 2600 \FCsmbd \F[] 2601 will return an ACCESS_DENIED error to the client\&. 2602 .sp 2603 Default: 2604 \fI\fIdeleteprinter command\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 2605 .sp 2606 Example: 2607 \fI\fIdeleteprinter command\fR\fR\fI = \fR\fI\FC/usr/bin/removeprinter\F[]\fR\fI \fR 2154 2608 .RE 2155 2609 2156 2610 delete readonly (S) 2157 .PP 2158 .RS 4 2159 This parameter allows readonly files to be deleted\. This is not normal DOS semantics, but is allowed by UNIX\. 2160 .sp 2161 This option may be useful for running applications such as rcs, where UNIX file ownership prevents changing file permissions, and DOS semantics prevent deletion of a read only file\. 2162 .sp 2163 Default: 2164 \fI\fIdelete readonly\fR\fR\fI = \fR\fIno\fR\fI \fR 2611 .\" delete readonly 2612 .PP 2613 .RS 4 2614 This parameter allows readonly files to be deleted\&. This is not normal DOS semantics, but is allowed by UNIX\&. 2615 .sp 2616 This option may be useful for running applications such as rcs, where UNIX file ownership prevents changing file permissions, and DOS semantics prevent deletion of a read only file\&. 2617 .sp 2618 Default: 2619 \fI\fIdelete readonly\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2165 2620 .RE 2166 2621 2167 2622 delete share command (G) 2168 .PP 2169 .RS 4 2170 Samba 2\.2\.0 introduced the ability to dynamically add and delete shares via the Windows NT 4\.0 Server Manager\. The 2623 .\" delete share command 2624 .PP 2625 .RS 4 2626 Samba 2\&.2\&.0 introduced the ability to dynamically add and delete shares via the Windows NT 4\&.0 Server Manager\&. The 2171 2627 \fIdelete share command\fR 2172 2628 is used to define an external program or script which will remove an existing service definition from 2173 \fIsmb\.conf\fR\. In order to successfully execute the 2629 \FCsmb\&.conf\F[]\&. 2630 .sp 2631 In order to successfully execute the 2174 2632 \fIdelete share command\fR, 2175 smbd 2176 requires that the administrator be connected using a root account (i\.e\. uid == 0)\. 2177 .sp 2178 If the connected account has 2179 SeDiskOperatorPrivilege, scripts defined in 2180 \fIchange share\fR 2181 parameter are executed as root\. 2633 \FCsmbd\F[] 2634 requires that the administrator connects using a root account (i\&.e\&. uid == 0) or has the 2635 \FCSeDiskOperatorPrivilege\F[]\&. Scripts defined in the 2636 \fIdelete share command\fR 2637 parameter are executed as root\&. 2182 2638 .sp 2183 2639 When executed, 2184 smbd 2640 \FCsmbd\F[] 2185 2641 will automatically invoke the 2186 2642 \fIdelete share command\fR 2187 with two parameters\ .2643 with two parameters\&. 2188 2644 .sp 2189 2645 .RS 4 … … 2197 2653 \fIconfigFile\fR 2198 2654 \- the location of the global 2199 \ fIsmb\.conf\fR2200 file\ .2655 \FCsmb\&.conf\F[] 2656 file\&. 2201 2657 .RE 2202 2658 .sp … … 2210 2666 .\} 2211 2667 \fIshareName\fR 2212 \- the name of the existing service\ .2213 .sp 2214 .RE 2215 This parameter is only used to remove file shares\ . To delete printer shares, see the2216 \ fIdeleteprinter command\fR\.2217 .sp 2218 Default: 2219 \fI\fIdelete share command\fR\fR\fI = \fR\fI\ fR\fI \fR2220 .sp 2221 Example: 2222 \fI\fIdelete share command\fR\fR\fI = \fR\fI /usr/local/bin/delshare\fR\fI \fR2668 \- the name of the existing service\&. 2669 .sp 2670 .RE 2671 This parameter is only used to remove file shares\&. To delete printer shares, see the 2672 \m[blue]\fBdeleteprinter command\fR\m[]\&. 2673 .sp 2674 Default: 2675 \fI\fIdelete share command\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 2676 .sp 2677 Example: 2678 \fI\fIdelete share command\fR\fR\fI = \fR\fI\FC/usr/local/bin/delshare\F[]\fR\fI \fR 2223 2679 .RE 2224 2680 2225 2681 delete user from group script (G) 2226 .PP 2227 .RS 4 2228 Full path to the script that will be called when a user is removed from a group using the Windows NT domain administration tools\. It will be run by 2682 .\" delete user from group script 2683 .PP 2684 .RS 4 2685 Full path to the script that will be called when a user is removed from a group using the Windows NT domain administration tools\&. It will be run by 2229 2686 \fBsmbd\fR(8) 2230 \fIAS ROOT\fR\ . Any2687 \fIAS ROOT\fR\&. Any 2231 2688 \fI%g\fR 2232 2689 will be replaced with the group name and any 2233 2690 \fI%u\fR 2234 will be replaced with the user name\ .2235 .sp 2236 Default: 2237 \fI\fIdelete user from group script\fR\fR\fI = \fR\fI\ fR\fI \fR2238 .sp 2239 Example: 2240 \fI\fIdelete user from group script\fR\fR\fI = \fR\fI /usr/sbin/deluser %u %g\fR\fI \fR2691 will be replaced with the user name\&. 2692 .sp 2693 Default: 2694 \fI\fIdelete user from group script\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 2695 .sp 2696 Example: 2697 \fI\fIdelete user from group script\fR\fR\fI = \fR\fI\FC/usr/sbin/deluser %u %g\F[]\fR\fI \fR 2241 2698 .RE 2242 2699 2243 2700 delete user script (G) 2701 .\" delete user script 2244 2702 .PP 2245 2703 .RS 4 2246 2704 This is the full pathname to a script that will be run by 2247 2705 \fBsmbd\fR(8) 2248 when managing users with remote RPC (NT) tools\ .2706 when managing users with remote RPC (NT) tools\&. 2249 2707 .sp 2250 2708 This script is called when a remote client removes a user from the server, normally using \'User Manager for Domains\' or 2251 rpcclient\.2252 .sp 2253 This script should delete the given UNIX username\ .2254 .sp 2255 Default: 2256 \fI\fIdelete user script\fR\fR\fI = \fR\fI\ fR\fI \fR2257 .sp 2258 Example: 2259 \fI\fIdelete user script\fR\fR\fI = \fR\fI /usr/local/samba/bin/del_user %u\fR\fI \fR2709 \FCrpcclient\F[]\&. 2710 .sp 2711 This script should delete the given UNIX username\&. 2712 .sp 2713 Default: 2714 \fI\fIdelete user script\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 2715 .sp 2716 Example: 2717 \fI\fIdelete user script\fR\fR\fI = \fR\fI\FC/usr/local/samba/bin/del_user %u\F[]\fR\fI \fR 2260 2718 .RE 2261 2719 2262 2720 delete veto files (S) 2721 .\" delete veto files 2263 2722 .PP 2264 2723 .RS 4 2265 2724 This option is used when Samba is attempting to delete a directory that contains one or more vetoed directories (see the 2266 \ fIveto files\fR2267 option)\ . If this option is set to2725 \m[blue]\fBveto files\fR\m[] 2726 option)\&. If this option is set to 2268 2727 \fBno\fR 2269 (the default) then if a vetoed directory contains any non\-vetoed files or directories then the directory delete will fail\ . This is usually what you want\.2728 (the default) then if a vetoed directory contains any non\-vetoed files or directories then the directory delete will fail\&. This is usually what you want\&. 2270 2729 .sp 2271 2730 If this option is set to 2272 \fByes\fR, then Samba will attempt to recursively delete any files and directories within the vetoed directory\ . This can be useful for integration with file serving systems such as NetAtalk which create meta\-files within directories you might normally veto DOS/Windows users from seeing (e\.g\.2273 \ fI\.AppleDouble\fR)2731 \fByes\fR, then Samba will attempt to recursively delete any files and directories within the vetoed directory\&. This can be useful for integration with file serving systems such as NetAtalk which create meta\-files within directories you might normally veto DOS/Windows users from seeing (e\&.g\&. 2732 \FC\&.AppleDouble\F[]) 2274 2733 .sp 2275 2734 Setting 2276 \ fIdelete veto files = yes\fR2277 allows these directories to be transparently deleted when the parent directory is deleted (so long as the user has permissions to do so)\ .2278 .sp 2279 Default: 2280 \fI\fIdelete veto files\fR\fR\fI = \fR\fI no\fR\fI \fR2735 \m[blue]\fBdelete veto files = yes\fR\m[] 2736 allows these directories to be transparently deleted when the parent directory is deleted (so long as the user has permissions to do so)\&. 2737 .sp 2738 Default: 2739 \fI\fIdelete veto files\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2281 2740 .RE 2282 2741 2283 2742 dfree cache time (S) 2743 .\" dfree cache time 2284 2744 .PP 2285 2745 .RS 4 2286 2746 The 2287 2747 \fIdfree cache time\fR 2288 should only be used on systems where a problem occurs with the internal disk space calculations\ . This has been known to happen with Ultrix, but may occur with other operating systems\. The symptom that was seen was an error of "Abort Retry Ignore" at the end of each directory listing\.2289 .sp 2290 This is a new parameter introduced in Samba version 3\ .0\.21\. It specifies in seconds the time that smbd will cache the output of a disk free query\. If set to zero (the default) no caching is done\. This allows a heavily loaded server to prevent rapid spawning of2291 \ fIdfree command\fR2292 scripts increasing the load\ .2293 .sp 2294 By default this parameter is zero, meaning no caching will be done\ .2748 should only be used on systems where a problem occurs with the internal disk space calculations\&. This has been known to happen with Ultrix, but may occur with other operating systems\&. The symptom that was seen was an error of "Abort Retry Ignore" at the end of each directory listing\&. 2749 .sp 2750 This is a new parameter introduced in Samba version 3\&.0\&.21\&. It specifies in seconds the time that smbd will cache the output of a disk free query\&. If set to zero (the default) no caching is done\&. This allows a heavily loaded server to prevent rapid spawning of 2751 \m[blue]\fBdfree command\fR\m[] 2752 scripts increasing the load\&. 2753 .sp 2754 By default this parameter is zero, meaning no caching will be done\&. 2295 2755 .sp 2296 2756 \fINo default\fR 2297 2757 .sp 2298 2758 Example: 2299 \fI\fIdfree cache time\fR\fR\fI = \fR\fI dfree cache time = 60\fR\fI \fR2759 \fI\fIdfree cache time\fR\fR\fI = \fR\fI\FCdfree cache time = 60\F[]\fR\fI \fR 2300 2760 .RE 2301 2761 2302 2762 dfree command (S) 2763 .\" dfree command 2303 2764 .PP 2304 2765 .RS 4 2305 2766 The 2306 2767 \fIdfree command\fR 2307 setting should only be used on systems where a problem occurs with the internal disk space calculations\ . This has been known to happen with Ultrix, but may occur with other operating systems\. The symptom that was seen was an error of "Abort Retry Ignore" at the end of each directory listing\.2308 .sp 2309 This setting allows the replacement of the internal routines to calculate the total disk space and amount available with an external routine\ . The example below gives a possible script that might fulfill this function\.2310 .sp 2311 In Samba version 3\ .0\.21 this parameter has been changed to be a per\-share parameter, and in addition the parameter2312 \ fIdfree cache time\fR2313 was added to allow the output of this script to be cached for systems under heavy load\ .2314 .sp 2315 The external program will be passed a single parameter indicating a directory in the filesystem being queried\ . This will typically consist of the string2316 \ fI\./\fR\. The script should return two integers in ASCII\. The first should be the total disk space in blocks, and the second should be the number of available blocks\. An optional third return value can give the block size in bytes\. The default blocksize is 1024 bytes\.2768 setting should only be used on systems where a problem occurs with the internal disk space calculations\&. This has been known to happen with Ultrix, but may occur with other operating systems\&. The symptom that was seen was an error of "Abort Retry Ignore" at the end of each directory listing\&. 2769 .sp 2770 This setting allows the replacement of the internal routines to calculate the total disk space and amount available with an external routine\&. The example below gives a possible script that might fulfill this function\&. 2771 .sp 2772 In Samba version 3\&.0\&.21 this parameter has been changed to be a per\-share parameter, and in addition the parameter 2773 \m[blue]\fBdfree cache time\fR\m[] 2774 was added to allow the output of this script to be cached for systems under heavy load\&. 2775 .sp 2776 The external program will be passed a single parameter indicating a directory in the filesystem being queried\&. This will typically consist of the string 2777 \FC\&./\F[]\&. The script should return two integers in ASCII\&. The first should be the total disk space in blocks, and the second should be the number of available blocks\&. An optional third return value can give the block size in bytes\&. The default blocksize is 1024 bytes\&. 2317 2778 .sp 2318 2779 Note: Your script should … … 2322 2783 Where the script dfree (which must be made executable) could be: 2323 2784 .sp 2324 .RS 4 2785 .if n \{\ 2786 .RS 4 2787 .\} 2788 .fam C 2789 .ps -1 2325 2790 .nf 2791 .BB lightgray 2326 2792 2327 2793 #!/bin/sh 2328 2794 df $1 | tail \-1 | awk \'{print $(NF\-4),$(NF\-2)}\' 2795 .EB lightgray 2329 2796 .fi 2330 .RE 2797 .fam 2798 .ps +1 2799 .if n \{\ 2800 .RE 2801 .\} 2331 2802 .sp 2332 2803 or perhaps (on Sys V based systems): 2333 2804 .sp 2334 .RS 4 2805 .if n \{\ 2806 .RS 4 2807 .\} 2808 .fam C 2809 .ps -1 2335 2810 .nf 2811 .BB lightgray 2336 2812 2337 2813 #!/bin/sh 2338 2814 /usr/bin/df \-k $1 | tail \-1 | awk \'{print $3" "$5}\' 2815 .EB lightgray 2339 2816 .fi 2340 .RE 2341 .sp 2342 Note that you may have to replace the command names with full path names on some systems\. 2343 .sp 2344 By default internal routines for determining the disk capacity and remaining space will be used\. 2817 .fam 2818 .ps +1 2819 .if n \{\ 2820 .RE 2821 .\} 2822 .sp 2823 Note that you may have to replace the command names with full path names on some systems\&. 2824 .sp 2825 By default internal routines for determining the disk capacity and remaining space will be used\&. 2345 2826 .sp 2346 2827 \fINo default\fR 2347 2828 .sp 2348 2829 Example: 2349 \fI\fIdfree command\fR\fR\fI = \fR\fI /usr/local/samba/bin/dfree\fR\fI \fR2830 \fI\fIdfree command\fR\fR\fI = \fR\fI\FC/usr/local/samba/bin/dfree\F[]\fR\fI \fR 2350 2831 .RE 2351 2832 2352 2833 directory mode 2834 .\" directory mode 2353 2835 .PP 2354 2836 .RS 4 2355 2837 This parameter is a synonym for 2356 directory mask\ .2838 directory mask\&. 2357 2839 .RE 2358 2840 2359 2841 directory mask (S) 2360 .PP 2361 .RS 4 2362 This parameter is the octal modes which are used when converting DOS modes to UNIX modes when creating UNIX directories\. 2363 .sp 2364 When a directory is created, the necessary permissions are calculated according to the mapping from DOS modes to UNIX permissions, and the resulting UNIX mode is then bit\-wise \'AND\'ed with this parameter\. This parameter may be thought of as a bit\-wise MASK for the UNIX modes of a directory\. Any bit 2842 .\" directory mask 2843 .PP 2844 .RS 4 2845 This parameter is the octal modes which are used when converting DOS modes to UNIX modes when creating UNIX directories\&. 2846 .sp 2847 When a directory is created, the necessary permissions are calculated according to the mapping from DOS modes to UNIX permissions, and the resulting UNIX mode is then bit\-wise \'AND\'ed with this parameter\&. This parameter may be thought of as a bit\-wise MASK for the UNIX modes of a directory\&. Any bit 2365 2848 \fInot\fR 2366 set here will be removed from the modes set on a directory when it is created\ .2367 .sp 2368 The default value of this parameter removes the \'group\' and \'other\' write bits from the UNIX mode, allowing only the user who owns the directory to modify it\ .2849 set here will be removed from the modes set on a directory when it is created\&. 2850 .sp 2851 The default value of this parameter removes the \'group\' and \'other\' write bits from the UNIX mode, allowing only the user who owns the directory to modify it\&. 2369 2852 .sp 2370 2853 Following this Samba will bit\-wise \'OR\' the UNIX mode created from this parameter with the value of the 2371 \ fIforce directory mode\fR2372 parameter\ . This parameter is set to 000 by default (i\.e\. no extra mode bits are added)\.2373 .sp 2374 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors\ . If the administrator wishes to enforce a mask on access control lists also, they need to set the2375 \ fIdirectory security mask\fR\.2376 .sp 2377 Default: 2378 \fI\fIdirectory mask\fR\fR\fI = \fR\fI 0755\fR\fI \fR2379 .sp 2380 Example: 2381 \fI\fIdirectory mask\fR\fR\fI = \fR\fI 0775\fR\fI \fR2854 \m[blue]\fBforce directory mode\fR\m[] 2855 parameter\&. This parameter is set to 000 by default (i\&.e\&. no extra mode bits are added)\&. 2856 .sp 2857 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors\&. If the administrator wishes to enforce a mask on access control lists also, they need to set the 2858 \m[blue]\fBdirectory security mask\fR\m[]\&. 2859 .sp 2860 Default: 2861 \fI\fIdirectory mask\fR\fR\fI = \fR\fI\FC0755\F[]\fR\fI \fR 2862 .sp 2863 Example: 2864 \fI\fIdirectory mask\fR\fR\fI = \fR\fI\FC0775\F[]\fR\fI \fR 2382 2865 .RE 2383 2866 2384 2867 directory security mask (S) 2385 .PP 2386 .RS 4 2387 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box\. 2388 .sp 2389 This parameter is applied as a mask (AND\'ed with) to the incoming permission bits, thus resetting any bits not in this mask\. Make sure not to mix up this parameter with 2390 \fIforce directory security mode\fR, which works similar like this one but uses logical OR instead of AND\. Essentially, zero bits in this mask are a set of bits that will always be set to zero\. 2391 .sp 2392 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the file permissions regardless of the previous status of this bits on the file\. 2393 .sp 2394 If not set explicitly this parameter is set to 0777 meaning a user is allowed to set all the user/group/world permissions on a directory\. 2868 .\" directory security mask 2869 .PP 2870 .RS 4 2871 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box\&. 2872 .sp 2873 This parameter is applied as a mask (AND\'ed with) to the incoming permission bits, thus resetting any bits not in this mask\&. Make sure not to mix up this parameter with 2874 \m[blue]\fBforce directory security mode\fR\m[], which works similar like this one but uses logical OR instead of AND\&. Essentially, zero bits in this mask are a set of bits that will always be set to zero\&. 2875 .sp 2876 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the file permissions regardless of the previous status of this bits on the file\&. 2877 .sp 2878 If not set explicitly this parameter is set to 0777 meaning a user is allowed to set all the user/group/world permissions on a directory\&. 2395 2879 .sp 2396 2880 \fINote\fR 2397 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\ . Administrators of most normal systems will probably want to leave it as the default of2398 \fB0777\fR\ .2399 .sp 2400 Default: 2401 \fI\fIdirectory security mask\fR\fR\fI = \fR\fI 0777\fR\fI \fR2402 .sp 2403 Example: 2404 \fI\fIdirectory security mask\fR\fR\fI = \fR\fI 0700\fR\fI \fR2881 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it as the default of 2882 \fB0777\fR\&. 2883 .sp 2884 Default: 2885 \fI\fIdirectory security mask\fR\fR\fI = \fR\fI\FC0777\F[]\fR\fI \fR 2886 .sp 2887 Example: 2888 \fI\fIdirectory security mask\fR\fR\fI = \fR\fI\FC0700\F[]\fR\fI \fR 2405 2889 .RE 2406 2890 2407 2891 disable netbios (G) 2408 .PP 2409 .RS 4 2410 Enabling this parameter will disable netbios support in Samba\. Netbios is the only available form of browsing in all windows versions except for 2000 and XP\. 2411 .sp 2892 .\" disable netbios 2893 .PP 2894 .RS 4 2895 Enabling this parameter will disable netbios support in Samba\&. Netbios is the only available form of browsing in all windows versions except for 2000 and XP\&. 2896 .if n \{\ 2897 .sp 2898 .\} 2899 .RS 4 2900 .BM yellow 2412 2901 .it 1 an-trap 2413 2902 .nr an-no-space-flag 1 2414 2903 .nr an-break-flag 1 2415 2904 .br 2416 Note 2417 Clients that only support netbios won\'t be able to see your samba server when netbios support is disabled\. 2418 2419 Default: 2420 \fI\fIdisable netbios\fR\fR\fI = \fR\fIno\fR\fI \fR 2905 .ps +1 2906 \fBNote\fR 2907 .ps -1 2908 .br 2909 Clients that only support netbios won\'t be able to see your samba server when netbios support is disabled\&. 2910 .sp .5v 2911 .EM yellow 2912 .RE 2913 Default: 2914 \fI\fIdisable netbios\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2421 2915 .RE 2422 2916 2423 2917 disable spoolss (G) 2424 .PP 2425 .RS 4 2426 Enabling this parameter will disable Samba\'s support for the SPOOLSS set of MS\-RPC\'s and will yield identical behavior as Samba 2\.0\.x\. Windows NT/2000 clients will downgrade to using Lanman style printing commands\. Windows 9x/ME will be unaffected by the parameter\. However, this will also disable the ability to upload printer drivers to a Samba server via the Windows NT Add Printer Wizard or by using the NT printer properties dialog window\. It will also disable the capability of Windows NT/2000 clients to download print drivers from the Samba host upon demand\. 2427 \fIBe very careful about enabling this parameter\.\fR 2428 .sp 2429 Default: 2430 \fI\fIdisable spoolss\fR\fR\fI = \fR\fIno\fR\fI \fR 2918 .\" disable spoolss 2919 .PP 2920 .RS 4 2921 Enabling this parameter will disable Samba\'s support for the SPOOLSS set of MS\-RPC\'s and will yield identical behavior as Samba 2\&.0\&.x\&. Windows NT/2000 clients will downgrade to using Lanman style printing commands\&. Windows 9x/ME will be unaffected by the parameter\&. However, this will also disable the ability to upload printer drivers to a Samba server via the Windows NT Add Printer Wizard or by using the NT printer properties dialog window\&. It will also disable the capability of Windows NT/2000 clients to download print drivers from the Samba host upon demand\&. 2922 \fIBe very careful about enabling this parameter\&.\fR 2923 .sp 2924 Default: 2925 \fI\fIdisable spoolss\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2431 2926 .RE 2432 2927 2433 2928 display charset (G) 2434 .PP 2435 .RS 4 2436 Specifies the charset that samba will use to print messages to stdout and stderr\. The default value is "LOCALE", which means automatically set, depending on the current locale\. The value should generally be the same as the value of the parameter 2437 \fIunix charset\fR\. 2438 .sp 2439 Default: 2440 \fI\fIdisplay charset\fR\fR\fI = \fR\fI"LOCALE" or "ASCII" (depending on the system)\fR\fI \fR 2441 .sp 2442 Example: 2443 \fI\fIdisplay charset\fR\fR\fI = \fR\fIUTF8\fR\fI \fR 2929 .\" display charset 2930 .PP 2931 .RS 4 2932 Specifies the charset that samba will use to print messages to stdout and stderr\&. The default value is "LOCALE", which means automatically set, depending on the current locale\&. The value should generally be the same as the value of the parameter 2933 \m[blue]\fBunix charset\fR\m[]\&. 2934 .sp 2935 Default: 2936 \fI\fIdisplay charset\fR\fR\fI = \fR\fI\FC"LOCALE" or "ASCII" (depending on the system)\F[]\fR\fI \fR 2937 .sp 2938 Example: 2939 \fI\fIdisplay charset\fR\fR\fI = \fR\fI\FCUTF8\F[]\fR\fI \fR 2444 2940 .RE 2445 2941 2446 2942 dmapi support (S) 2447 . PP2448 . RS 42449 This parameter specifies whether Samba should use DMAPI to determine whether a file is offline or not\. This would typically be used in conjunction with a hierarchical storage system that automatically migrates files to tape\. 2450 .sp 2451 Note that Samba infers the status of a file by examining the events that a DMAPI application has registered interest in\. This heuristic is satisfactory for a number of hierarchical storage systems, but there may be system for which it will fail\. In this case, Samba may erroneously report files to be offline\. 2452 .sp 2453 This parameter is only available if a supported DMAPI implementation was found at compilation time\. It will only be used if DMAPI is found to enabled on the system at run time\. 2454 .sp 2455 .sp 2456 Default: 2457 \fI\fIdmapi support\fR\fR\fI = \fR\fI no\fR\fI \fR2943 .\" dmapi support 2944 .PP 2945 .RS 4 2946 This parameter specifies whether Samba should use DMAPI to determine whether a file is offline or not\&. This would typically be used in conjunction with a hierarchical storage system that automatically migrates files to tape\&. 2947 .sp 2948 Note that Samba infers the status of a file by examining the events that a DMAPI application has registered interest in\&. This heuristic is satisfactory for a number of hierarchical storage systems, but there may be system for which it will fail\&. In this case, Samba may erroneously report files to be offline\&. 2949 .sp 2950 This parameter is only available if a supported DMAPI implementation was found at compilation time\&. It will only be used if DMAPI is found to enabled on the system at run time\&. 2951 .sp 2952 Default: 2953 \fI\fIdmapi support\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2458 2954 .RE 2459 2955 2460 2956 dns proxy (G) 2957 .\" dns proxy 2461 2958 .PP 2462 2959 .RS 4 2463 2960 Specifies that 2464 2961 \fBnmbd\fR(8) 2465 when acting as a WINS server and finding that a NetBIOS name has not been registered, should treat the NetBIOS name word\-for\-word as a DNS name and do a lookup with the DNS server for that name on behalf of the name\-querying client\ .2466 .sp 2467 Note that the maximum length for a NetBIOS name is 15 characters, so the DNS name (or DNS alias) can likewise only be 15 characters, maximum\ .2468 .sp 2469 nmbd 2470 spawns a second copy of itself to do the DNS name lookup requests, as doing a name lookup is a blocking action\ .2471 .sp 2472 Default: 2473 \fI\fIdns proxy\fR\fR\fI = \fR\fI yes\fR\fI \fR2962 when acting as a WINS server and finding that a NetBIOS name has not been registered, should treat the NetBIOS name word\-for\-word as a DNS name and do a lookup with the DNS server for that name on behalf of the name\-querying client\&. 2963 .sp 2964 Note that the maximum length for a NetBIOS name is 15 characters, so the DNS name (or DNS alias) can likewise only be 15 characters, maximum\&. 2965 .sp 2966 \FCnmbd\F[] 2967 spawns a second copy of itself to do the DNS name lookup requests, as doing a name lookup is a blocking action\&. 2968 .sp 2969 Default: 2970 \fI\fIdns proxy\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 2474 2971 .RE 2475 2972 2476 2973 domain logons (G) 2974 .\" domain logons 2477 2975 .PP 2478 2976 .RS 4 2479 2977 If set to 2480 2978 \fByes\fR, the Samba server will provide the netlogon service for Windows 9X network logons for the 2481 \ fIworkgroup\fR2482 it is in\ . This will also cause the Samba server to act as a domain controller for NT4 style domain services\. For more details on setting up this feature see the Domain Control chapter of the Samba HOWTO Collection\.2483 .sp 2484 Default: 2485 \fI\fIdomain logons\fR\fR\fI = \fR\fI no\fR\fI \fR2979 \m[blue]\fBworkgroup\fR\m[] 2980 it is in\&. This will also cause the Samba server to act as a domain controller for NT4 style domain services\&. For more details on setting up this feature see the Domain Control chapter of the Samba HOWTO Collection\&. 2981 .sp 2982 Default: 2983 \fI\fIdomain logons\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2486 2984 .RE 2487 2985 2488 2986 domain master (G) 2987 .\" domain master 2489 2988 .PP 2490 2989 .RS 4 2491 2990 Tell 2492 2991 \fBsmbd\fR(8) 2493 to enable WAN\-wide browse list collation\ . Setting this option causes2494 nmbd 2992 to enable WAN\-wide browse list collation\&. Setting this option causes 2993 \FCnmbd\F[] 2495 2994 to claim a special domain specific NetBIOS name that identifies it as a domain master browser for its given 2496 \ fIworkgroup\fR\. Local master browsers in the same2497 \ fIworkgroup\fR2995 \m[blue]\fBworkgroup\fR\m[]\&. Local master browsers in the same 2996 \m[blue]\fBworkgroup\fR\m[] 2498 2997 on broadcast\-isolated subnets will give this 2499 nmbd 2998 \FCnmbd\F[] 2500 2999 their local browse lists, and then ask 2501 3000 \fBsmbd\fR(8) 2502 for a complete copy of the browse list for the whole wide area network\ . Browser clients will then contact their local master browser, and will receive the domain\-wide browse list, instead of just the list for their broadcast\-isolated subnet\.3001 for a complete copy of the browse list for the whole wide area network\&. Browser clients will then contact their local master browser, and will receive the domain\-wide browse list, instead of just the list for their broadcast\-isolated subnet\&. 2503 3002 .sp 2504 3003 Note that Windows NT Primary Domain Controllers expect to be able to claim this 2505 \ fIworkgroup\fR3004 \m[blue]\fBworkgroup\fR\m[] 2506 3005 specific special NetBIOS name that identifies them as domain master browsers for that 2507 \ fIworkgroup\fR2508 by default (i\ .e\. there is no way to prevent a Windows NT PDC from attempting to do this)\. This means that if this parameter is set and2509 nmbd 3006 \m[blue]\fBworkgroup\fR\m[] 3007 by default (i\&.e\&. there is no way to prevent a Windows NT PDC from attempting to do this)\&. This means that if this parameter is set and 3008 \FCnmbd\F[] 2510 3009 claims the special name for a 2511 \ fIworkgroup\fR2512 before a Windows NT PDC is able to do so then cross subnet browsing will behave strangely and may fail\ .3010 \m[blue]\fBworkgroup\fR\m[] 3011 before a Windows NT PDC is able to do so then cross subnet browsing will behave strangely and may fail\&. 2513 3012 .sp 2514 3013 If 2515 \ fIdomain logons = yes\fR, then the default behavior is to enable the2516 \ fIdomain master\fR2517 parameter\ . If2518 \ fIdomain logons\fR3014 \m[blue]\fBdomain logons = yes\fR\m[], then the default behavior is to enable the 3015 \m[blue]\fBdomain master\fR\m[] 3016 parameter\&. If 3017 \m[blue]\fBdomain logons\fR\m[] 2519 3018 is not enabled (the default setting), then neither will 2520 \ fIdomain master\fR2521 be enabled by default\ .3019 \m[blue]\fBdomain master\fR\m[] 3020 be enabled by default\&. 2522 3021 .sp 2523 3022 When 2524 \ fIdomain logons = Yes\fR2525 the default setting for this parameter is Yes, with the result that Samba will be a PDC\ . If2526 \ fIdomain master = No\fR, Samba will function as a BDC\. In general, this parameter should be set to \'No\' only on a BDC\.2527 .sp 2528 Default: 2529 \fI\fIdomain master\fR\fR\fI = \fR\fI auto\fR\fI \fR3023 \m[blue]\fBdomain logons = Yes\fR\m[] 3024 the default setting for this parameter is Yes, with the result that Samba will be a PDC\&. If 3025 \m[blue]\fBdomain master = No\fR\m[], Samba will function as a BDC\&. In general, this parameter should be set to \'No\' only on a BDC\&. 3026 .sp 3027 Default: 3028 \fI\fIdomain master\fR\fR\fI = \fR\fI\FCauto\F[]\fR\fI \fR 2530 3029 .RE 2531 3030 2532 3031 dont descend (S) 2533 .PP 2534 .RS 4 2535 There are certain directories on some systems (e\.g\., the 2536 \fI/proc\fR 2537 tree under Linux) that are either not of interest to clients or are infinitely deep (recursive)\. This parameter allows you to specify a comma\-delimited list of directories that the server should always show as empty\. 2538 .sp 2539 Note that Samba can be very fussy about the exact format of the "dont descend" entries\. For example you may need 2540 \fI \./proc\fR 3032 .\" dont descend 3033 .PP 3034 .RS 4 3035 There are certain directories on some systems (e\&.g\&., the 3036 \FC/proc\F[] 3037 tree under Linux) that are either not of interest to clients or are infinitely deep (recursive)\&. This parameter allows you to specify a comma\-delimited list of directories that the server should always show as empty\&. 3038 .sp 3039 Note that Samba can be very fussy about the exact format of the "dont descend" entries\&. For example you may need 3040 \FC \&./proc\F[] 2541 3041 instead of just 2542 \ fI/proc\fR\. Experimentation is the best policy :\-)2543 .sp 2544 Default: 2545 \fI\fIdont descend\fR\fR\fI = \fR\fI\ fR\fI \fR2546 .sp 2547 Example: 2548 \fI\fIdont descend\fR\fR\fI = \fR\fI /proc,/dev\fR\fI \fR3042 \FC/proc\F[]\&. Experimentation is the best policy :\-) 3043 .sp 3044 Default: 3045 \fI\fIdont descend\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 3046 .sp 3047 Example: 3048 \fI\fIdont descend\fR\fR\fI = \fR\fI\FC/proc,/dev\F[]\fR\fI \fR 2549 3049 .RE 2550 3050 2551 3051 dos charset (G) 2552 .PP 2553 .RS 4 2554 DOS SMB clients assume the server has the same charset as they do\. This option specifies which charset Samba should talk to DOS clients\. 2555 .sp 2556 The default depends on which charsets you have installed\. Samba tries to use charset 850 but falls back to ASCII in case it is not available\. Run 3052 .\" dos charset 3053 .PP 3054 .RS 4 3055 DOS SMB clients assume the server has the same charset as they do\&. This option specifies which charset Samba should talk to DOS clients\&. 3056 .sp 3057 The default depends on which charsets you have installed\&. Samba tries to use charset 850 but falls back to ASCII in case it is not available\&. Run 2557 3058 \fBtestparm\fR(1) 2558 to check the default on your system\ .3059 to check the default on your system\&. 2559 3060 .sp 2560 3061 \fINo default\fR … … 2562 3063 2563 3064 dos filemode (S) 2564 .PP 2565 .RS 4 2566 The default behavior in Samba is to provide UNIX\-like behavior where only the owner of a file/directory is able to change the permissions on it\. However, this behavior is often confusing to DOS/Windows users\. Enabling this parameter allows a user who has write access to the file (by whatever means, including an ACL permission) to modify the permissions (including ACL) on it\. Note that a user belonging to the group owning the file will not be allowed to change permissions if the group is only granted read access\. Ownership of the file/directory may also be changed\. 2567 .sp 2568 Default: 2569 \fI\fIdos filemode\fR\fR\fI = \fR\fIno\fR\fI \fR 3065 .\" dos filemode 3066 .PP 3067 .RS 4 3068 The default behavior in Samba is to provide UNIX\-like behavior where only the owner of a file/directory is able to change the permissions on it\&. However, this behavior is often confusing to DOS/Windows users\&. Enabling this parameter allows a user who has write access to the file (by whatever means, including an ACL permission) to modify the permissions (including ACL) on it\&. Note that a user belonging to the group owning the file will not be allowed to change permissions if the group is only granted read access\&. Ownership of the file/directory may also be changed\&. 3069 .sp 3070 Default: 3071 \fI\fIdos filemode\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2570 3072 .RE 2571 3073 2572 3074 dos filetime resolution (S) 2573 .PP 2574 .RS 4 2575 Under the DOS and Windows FAT filesystem, the finest granularity on time resolution is two seconds\. Setting this parameter for a share causes Samba to round the reported time down to the nearest two second boundary when a query call that requires one second resolution is made to 2576 \fBsmbd\fR(8)\. 2577 .sp 2578 This option is mainly used as a compatibility option for Visual C++ when used against Samba shares\. If oplocks are enabled on a share, Visual C++ uses two different time reading calls to check if a file has changed since it was last read\. One of these calls uses a one\-second granularity, the other uses a two second granularity\. As the two second call rounds any odd second down, then if the file has a timestamp of an odd number of seconds then the two timestamps will not match and Visual C++ will keep reporting the file has changed\. Setting this option causes the two timestamps to match, and Visual C++ is happy\. 2579 .sp 2580 Default: 2581 \fI\fIdos filetime resolution\fR\fR\fI = \fR\fIno\fR\fI \fR 3075 .\" dos filetime resolution 3076 .PP 3077 .RS 4 3078 Under the DOS and Windows FAT filesystem, the finest granularity on time resolution is two seconds\&. Setting this parameter for a share causes Samba to round the reported time down to the nearest two second boundary when a query call that requires one second resolution is made to 3079 \fBsmbd\fR(8)\&. 3080 .sp 3081 This option is mainly used as a compatibility option for Visual C++ when used against Samba shares\&. If oplocks are enabled on a share, Visual C++ uses two different time reading calls to check if a file has changed since it was last read\&. One of these calls uses a one\-second granularity, the other uses a two second granularity\&. As the two second call rounds any odd second down, then if the file has a timestamp of an odd number of seconds then the two timestamps will not match and Visual C++ will keep reporting the file has changed\&. Setting this option causes the two timestamps to match, and Visual C++ is happy\&. 3082 .sp 3083 Default: 3084 \fI\fIdos filetime resolution\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2582 3085 .RE 2583 3086 2584 3087 dos filetimes (S) 2585 .PP 2586 .RS 4 2587 Under DOS and Windows, if a user can write to a file they can change the timestamp on it\. Under POSIX semantics, only the owner of the file or root may change the timestamp\. By default, Samba runs with POSIX semantics and refuses to change the timestamp on a file if the user 2588 smbd 2589 is acting on behalf of is not the file owner\. Setting this option to 3088 .\" dos filetimes 3089 .PP 3090 .RS 4 3091 Under DOS and Windows, if a user can write to a file they can change the timestamp on it\&. Under POSIX semantics, only the owner of the file or root may change the timestamp\&. By default, Samba runs with POSIX semantics and refuses to change the timestamp on a file if the user 3092 \FCsmbd\F[] 3093 is acting on behalf of is not the file owner\&. Setting this option to 2590 3094 \fB yes\fR 2591 3095 allows DOS semantics and 2592 3096 \fBsmbd\fR(8) 2593 will change the file timestamp as DOS requires\ . Due to changes in Microsoft Office 2000 and beyond, the default for this parameter has been changed from "no" to "yes" in Samba 3\.0\.14 and above\. Microsoft Excel will display dialog box warnings about the file being changed by another user if this parameter is not set to "yes" and files are being shared between users\.2594 .sp 2595 Default: 2596 \fI\fIdos filetimes\fR\fR\fI = \fR\fI yes\fR\fI \fR3097 will change the file timestamp as DOS requires\&. Due to changes in Microsoft Office 2000 and beyond, the default for this parameter has been changed from "no" to "yes" in Samba 3\&.0\&.14 and above\&. Microsoft Excel will display dialog box warnings about the file being changed by another user if this parameter is not set to "yes" and files are being shared between users\&. 3098 .sp 3099 Default: 3100 \fI\fIdos filetimes\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 2597 3101 .RE 2598 3102 2599 3103 ea support (S) 3104 .\" ea support 2600 3105 .PP 2601 3106 .RS 4 2602 3107 This boolean parameter controls whether 2603 3108 \fBsmbd\fR(8) 2604 will allow clients to attempt to store OS/2 style Extended attributes on a share\ . In order to enable this parameter the underlying filesystem exported by the share must support extended attributes (such as provided on XFS and EXT3 on Linux, with the correct kernel patches)\. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel\.2605 .sp 2606 Default: 2607 \fI\fIea support\fR\fR\fI = \fR\fI no\fR\fI \fR3109 will allow clients to attempt to store OS/2 style Extended attributes on a share\&. In order to enable this parameter the underlying filesystem exported by the share must support extended attributes (such as provided on XFS and EXT3 on Linux, with the correct kernel patches)\&. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel\&. 3110 .sp 3111 Default: 3112 \fI\fIea support\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2608 3113 .RE 2609 3114 2610 3115 enable asu support (G) 2611 .PP 2612 .RS 4 2613 Hosts running the "Advanced Server for Unix (ASU)" product require some special accomodations such as creating a builting [ADMIN$] share that only supports IPC connections\. The has been the default behavior in smbd for many years\. However, certain Microsoft applications such as the Print Migrator tool require that the remote server support an [ADMIN$} file share\. Disabling this parameter allows for creating an [ADMIN$] file share in smb\.conf\. 2614 .sp 2615 Default: 2616 \fI\fIenable asu support\fR\fR\fI = \fR\fIno\fR\fI \fR 3116 .\" enable asu support 3117 .PP 3118 .RS 4 3119 Hosts running the "Advanced Server for Unix (ASU)" product require some special accomodations such as creating a builting [ADMIN$] share that only supports IPC connections\&. The has been the default behavior in smbd for many years\&. However, certain Microsoft applications such as the Print Migrator tool require that the remote server support an [ADMIN$} file share\&. Disabling this parameter allows for creating an [ADMIN$] file share in smb\&.conf\&. 3120 .sp 3121 Default: 3122 \fI\fIenable asu support\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2617 3123 .RE 2618 3124 2619 3125 enable privileges (G) 3126 .\" enable privileges 2620 3127 .PP 2621 3128 .RS 4 2622 3129 This parameter controls whether or not smbd will honor privileges assigned to specific SIDs via either 2623 net rpc rights 2624 or one of the Windows user and group manager tools\ . This parameter is enabled by default\. It can be disabled to prevent members of the Domain Admins group from being able to assign privileges to users or groups which can then result in certain smbd operations running as root that would normally run under the context of the connected user\.2625 .sp 2626 An example of how privileges can be used is to assign the right to join clients to a Samba controlled domain without providing root access to the server via smbd\ .2627 .sp 2628 Please read the extended description provided in the Samba HOWTO documentation\ .2629 .sp 2630 Default: 2631 \fI\fIenable privileges\fR\fR\fI = \fR\fI yes\fR\fI \fR3130 \FCnet rpc rights\F[] 3131 or one of the Windows user and group manager tools\&. This parameter is enabled by default\&. It can be disabled to prevent members of the Domain Admins group from being able to assign privileges to users or groups which can then result in certain smbd operations running as root that would normally run under the context of the connected user\&. 3132 .sp 3133 An example of how privileges can be used is to assign the right to join clients to a Samba controlled domain without providing root access to the server via smbd\&. 3134 .sp 3135 Please read the extended description provided in the Samba HOWTO documentation\&. 3136 .sp 3137 Default: 3138 \fI\fIenable privileges\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 2632 3139 .RE 2633 3140 2634 3141 encrypt passwords (G) 2635 .PP 2636 .RS 4 2637 This boolean controls whether encrypted passwords will be negotiated with the client\. Note that Windows NT 4\.0 SP3 and above and also Windows 98 will by default expect encrypted passwords unless a registry entry is changed\. To use encrypted passwords in Samba see the chapter "User Database" in the Samba HOWTO Collection\. 2638 .sp 2639 MS Windows clients that expect Microsoft encrypted passwords and that do not have plain text password support enabled will be able to connect only to a Samba server that has encrypted password support enabled and for which the user accounts have a valid encrypted password\. Refer to the smbpasswd command man page for information regarding the creation of encrypted passwords for user accounts\. 2640 .sp 2641 The use of plain text passwords is NOT advised as support for this feature is no longer maintained in Microsoft Windows products\. If you want to use plain text passwords you must set this parameter to no\. 3142 .\" encrypt passwords 3143 .PP 3144 .RS 4 3145 This boolean controls whether encrypted passwords will be negotiated with the client\&. Note that Windows NT 4\&.0 SP3 and above and also Windows 98 will by default expect encrypted passwords unless a registry entry is changed\&. To use encrypted passwords in Samba see the chapter "User Database" in the Samba HOWTO Collection\&. 3146 .sp 3147 MS Windows clients that expect Microsoft encrypted passwords and that do not have plain text password support enabled will be able to connect only to a Samba server that has encrypted password support enabled and for which the user accounts have a valid encrypted password\&. Refer to the smbpasswd command man page for information regarding the creation of encrypted passwords for user accounts\&. 3148 .sp 3149 The use of plain text passwords is NOT advised as support for this feature is no longer maintained in Microsoft Windows products\&. If you want to use plain text passwords you must set this parameter to no\&. 2642 3150 .sp 2643 3151 In order for encrypted passwords to work correctly … … 2648 3156 \fBsmbpasswd\fR(8) 2649 3157 program for information on how to set up and maintain this file), or set the 2650 \ fIsecurity = [server|domain|ads]\fR3158 \m[blue]\fBsecurity = [server|domain|ads]\fR\m[] 2651 3159 parameter which causes 2652 smbd 2653 to authenticate against another server\ .2654 .sp 2655 Default: 2656 \fI\fIencrypt passwords\fR\fR\fI = \fR\fI yes\fR\fI \fR3160 \FCsmbd\F[] 3161 to authenticate against another server\&. 3162 .sp 3163 Default: 3164 \fI\fIencrypt passwords\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 2657 3165 .RE 2658 3166 2659 3167 enhanced browsing (G) 2660 .PP 2661 .RS 4 2662 This option enables a couple of enhancements to cross\-subnet browse propagation that have been added in Samba but which are not standard in Microsoft implementations\. 2663 .sp 2664 The first enhancement to browse propagation consists of a regular wildcard query to a Samba WINS server for all Domain Master Browsers, followed by a browse synchronization with each of the returned DMBs\. The second enhancement consists of a regular randomised browse synchronization with all currently known DMBs\. 2665 .sp 2666 You may wish to disable this option if you have a problem with empty workgroups not disappearing from browse lists\. Due to the restrictions of the browse protocols these enhancements can cause a empty workgroup to stay around forever which can be annoying\. 2667 .sp 2668 In general you should leave this option enabled as it makes cross\-subnet browse propagation much more reliable\. 2669 .sp 2670 Default: 2671 \fI\fIenhanced browsing\fR\fR\fI = \fR\fIyes\fR\fI \fR 3168 .\" enhanced browsing 3169 .PP 3170 .RS 4 3171 This option enables a couple of enhancements to cross\-subnet browse propagation that have been added in Samba but which are not standard in Microsoft implementations\&. 3172 .sp 3173 The first enhancement to browse propagation consists of a regular wildcard query to a Samba WINS server for all Domain Master Browsers, followed by a browse synchronization with each of the returned DMBs\&. The second enhancement consists of a regular randomised browse synchronization with all currently known DMBs\&. 3174 .sp 3175 You may wish to disable this option if you have a problem with empty workgroups not disappearing from browse lists\&. Due to the restrictions of the browse protocols these enhancements can cause a empty workgroup to stay around forever which can be annoying\&. 3176 .sp 3177 In general you should leave this option enabled as it makes cross\-subnet browse propagation much more reliable\&. 3178 .sp 3179 Default: 3180 \fI\fIenhanced browsing\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 2672 3181 .RE 2673 3182 2674 3183 enumports command (G) 2675 .PP 2676 .RS 4 2677 The concept of a "port" is fairly foreign to UNIX hosts\. Under Windows NT/2000 print servers, a port is associated with a port monitor and generally takes the form of a local port (i\.e\. LPT1:, COM1:, FILE:) or a remote port (i\.e\. LPD Port Monitor, etc\.\.\.)\. By default, Samba has only one port defined\-\-\fB"Samba Printer Port"\fR\. Under Windows NT/2000, all printers must have a valid port name\. If you wish to have a list of ports displayed (smbd 3184 .\" enumports command 3185 .PP 3186 .RS 4 3187 The concept of a "port" is fairly foreign to UNIX hosts\&. Under Windows NT/2000 print servers, a port is associated with a port monitor and generally takes the form of a local port (i\&.e\&. LPT1:, COM1:, FILE:) or a remote port (i\&.e\&. LPD Port Monitor, etc\&.\&.\&.)\&. By default, Samba has only one port defined\-\-\fB"Samba Printer Port"\fR\&. Under Windows NT/2000, all printers must have a valid port name\&. If you wish to have a list of ports displayed (\FCsmbd \F[] 2678 3188 does not use a port name for anything) other than the default 2679 3189 \fB"Samba Printer Port"\fR, you can define 2680 3190 \fIenumports command\fR 2681 to point to a program which should generate a list of ports, one per line, to standard output\ . This listing will then be used in response to the level 1 and 2 EnumPorts() RPC\.2682 .sp 2683 Default: 2684 \fI\fIenumports command\fR\fR\fI = \fR\fI\ fR\fI \fR2685 .sp 2686 Example: 2687 \fI\fIenumports command\fR\fR\fI = \fR\fI /usr/bin/listports\fR\fI \fR3191 to point to a program which should generate a list of ports, one per line, to standard output\&. This listing will then be used in response to the level 1 and 2 EnumPorts() RPC\&. 3192 .sp 3193 Default: 3194 \fI\fIenumports command\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 3195 .sp 3196 Example: 3197 \fI\fIenumports command\fR\fR\fI = \fR\fI\FC/usr/bin/listports\F[]\fR\fI \fR 2688 3198 .RE 2689 3199 2690 3200 eventlog list (G) 2691 .PP 2692 .RS 4 2693 This option defines a list of log names that Samba will report to the Microsoft EventViewer utility\. The listed eventlogs will be associated with tdb file on disk in the 2694 \fI$(lockdir)/eventlog\fR\. 3201 .\" eventlog list 3202 .PP 3203 .RS 4 3204 This option defines a list of log names that Samba will report to the Microsoft EventViewer utility\&. The listed eventlogs will be associated with tdb file on disk in the 3205 \FC$(lockdir)/eventlog\F[]\&. 2695 3206 .sp 2696 3207 The administrator must use an external process to parse the normal Unix logs such as 2697 \ fI/var/log/messages\fR2698 and write then entries to the eventlog tdb files\ . Refer to the eventlogadm(8) utility for how to write eventlog entries\.2699 .sp 2700 Default: 2701 \fI\fIeventlog list\fR\fR\fI = \fR\fI\ fR\fI \fR2702 .sp 2703 Example: 2704 \fI\fIeventlog list\fR\fR\fI = \fR\fI Security Application Syslog Apache\fR\fI \fR3208 \FC/var/log/messages\F[] 3209 and write then entries to the eventlog tdb files\&. Refer to the eventlogadm(8) utility for how to write eventlog entries\&. 3210 .sp 3211 Default: 3212 \fI\fIeventlog list\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 3213 .sp 3214 Example: 3215 \fI\fIeventlog list\fR\fR\fI = \fR\fI\FCSecurity Application Syslog Apache\F[]\fR\fI \fR 2705 3216 .RE 2706 3217 2707 3218 fake directory create times (S) 2708 .PP 2709 .RS 4 2710 NTFS and Windows VFAT file systems keep a create time for all files and directories\. This is not the same as the ctime \- status change time \- that Unix keeps, so Samba by default reports the earliest of the various times Unix does keep\. Setting this parameter for a share causes Samba to always report midnight 1\-1\-1980 as the create time for directories\. 2711 .sp 2712 This option is mainly used as a compatibility option for Visual C++ when used against Samba shares\. Visual C++ generated makefiles have the object directory as a dependency for each object file, and a make rule to create the directory\. Also, when NMAKE compares timestamps it uses the creation time when examining a directory\. Thus the object directory will be created if it does not exist, but once it does exist it will always have an earlier timestamp than the object files it contains\. 2713 .sp 2714 However, Unix time semantics mean that the create time reported by Samba will be updated whenever a file is created or or deleted in the directory\. NMAKE finds all object files in the object directory\. The timestamp of the last one built is then compared to the timestamp of the object directory\. If the directory\'s timestamp if newer, then all object files will be rebuilt\. Enabling this option ensures directories always predate their contents and an NMAKE build will proceed as expected\. 2715 .sp 2716 Default: 2717 \fI\fIfake directory create times\fR\fR\fI = \fR\fIno\fR\fI \fR 3219 .\" fake directory create times 3220 .PP 3221 .RS 4 3222 NTFS and Windows VFAT file systems keep a create time for all files and directories\&. This is not the same as the ctime \- status change time \- that Unix keeps, so Samba by default reports the earliest of the various times Unix does keep\&. Setting this parameter for a share causes Samba to always report midnight 1\-1\-1980 as the create time for directories\&. 3223 .sp 3224 This option is mainly used as a compatibility option for Visual C++ when used against Samba shares\&. Visual C++ generated makefiles have the object directory as a dependency for each object file, and a make rule to create the directory\&. Also, when NMAKE compares timestamps it uses the creation time when examining a directory\&. Thus the object directory will be created if it does not exist, but once it does exist it will always have an earlier timestamp than the object files it contains\&. 3225 .sp 3226 However, Unix time semantics mean that the create time reported by Samba will be updated whenever a file is created or or deleted in the directory\&. NMAKE finds all object files in the object directory\&. The timestamp of the last one built is then compared to the timestamp of the object directory\&. If the directory\'s timestamp if newer, then all object files will be rebuilt\&. Enabling this option ensures directories always predate their contents and an NMAKE build will proceed as expected\&. 3227 .sp 3228 Default: 3229 \fI\fIfake directory create times\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2718 3230 .RE 2719 3231 2720 3232 fake oplocks (S) 2721 .PP 2722 .RS 4 2723 Oplocks are the way that SMB clients get permission from a server to locally cache file operations\. If a server grants an oplock (opportunistic lock) then the client is free to assume that it is the only one accessing the file and it will aggressively cache file data\. With some oplock types the client may even cache file open/close operations\. This can give enormous performance benefits\. 3233 .\" fake oplocks 3234 .PP 3235 .RS 4 3236 Oplocks are the way that SMB clients get permission from a server to locally cache file operations\&. If a server grants an oplock (opportunistic lock) then the client is free to assume that it is the only one accessing the file and it will aggressively cache file data\&. With some oplock types the client may even cache file open/close operations\&. This can give enormous performance benefits\&. 2724 3237 .sp 2725 3238 When you set 2726 fake oplocks = yes,3239 \FCfake oplocks = yes\F[], 2727 3240 \fBsmbd\fR(8) 2728 will always grant oplock requests no matter how many clients are using the file\ .3241 will always grant oplock requests no matter how many clients are using the file\&. 2729 3242 .sp 2730 3243 It is generally much better to use the real 2731 \ fIoplocks\fR2732 support rather than this parameter\ .2733 .sp 2734 If you enable this option on all read\-only shares or shares that you know will only be accessed from one client at a time such as physically read\-only media like CDROMs, you will see a big performance improvement on many operations\ . If you enable this option on shares where multiple clients may be accessing the files read\-write at the same time you can get data corruption\. Use this option carefully!2735 .sp 2736 Default: 2737 \fI\fIfake oplocks\fR\fR\fI = \fR\fI no\fR\fI \fR3244 \m[blue]\fBoplocks\fR\m[] 3245 support rather than this parameter\&. 3246 .sp 3247 If you enable this option on all read\-only shares or shares that you know will only be accessed from one client at a time such as physically read\-only media like CDROMs, you will see a big performance improvement on many operations\&. If you enable this option on shares where multiple clients may be accessing the files read\-write at the same time you can get data corruption\&. Use this option carefully! 3248 .sp 3249 Default: 3250 \fI\fIfake oplocks\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2738 3251 .RE 2739 3252 2740 3253 follow symlinks (S) 3254 .\" follow symlinks 2741 3255 .PP 2742 3256 .RS 4 2743 3257 This parameter allows the Samba administrator to stop 2744 3258 \fBsmbd\fR(8) 2745 from following symbolic links in a particular share\ . Setting this parameter to3259 from following symbolic links in a particular share\&. Setting this parameter to 2746 3260 \fBno\fR 2747 prevents any file or directory that is a symbolic link from being followed (the user will get an error)\ . This option is very useful to stop users from adding a symbolic link to2748 \ fI/etc/passwd\fR2749 in their home directory for instance\ . However it will slow filename lookups down slightly\.2750 .sp 2751 This option is enabled (i\ .e\.2752 smbd 2753 will follow symbolic links) by default\ .2754 .sp 2755 Default: 2756 \fI\fIfollow symlinks\fR\fR\fI = \fR\fI yes\fR\fI \fR3261 prevents any file or directory that is a symbolic link from being followed (the user will get an error)\&. This option is very useful to stop users from adding a symbolic link to 3262 \FC/etc/passwd\F[] 3263 in their home directory for instance\&. However it will slow filename lookups down slightly\&. 3264 .sp 3265 This option is enabled (i\&.e\&. 3266 \FCsmbd\F[] 3267 will follow symbolic links) by default\&. 3268 .sp 3269 Default: 3270 \fI\fIfollow symlinks\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 2757 3271 .RE 2758 3272 2759 3273 force create mode (S) 3274 .\" force create mode 2760 3275 .PP 2761 3276 .RS 4 2762 3277 This parameter specifies a set of UNIX mode bit permissions that will 2763 3278 \fIalways\fR 2764 be set on a file created by Samba\ . This is done by bitwise \'OR\'ing these bits onto the mode bits of a file that is being created\. The default for this parameter is (in octal) 000\. The modes in this parameter are bitwise \'OR\'ed onto the file mode after the mask set in the3279 be set on a file created by Samba\&. This is done by bitwise \'OR\'ing these bits onto the mode bits of a file that is being created\&. The default for this parameter is (in octal) 000\&. The modes in this parameter are bitwise \'OR\'ed onto the file mode after the mask set in the 2765 3280 \fIcreate mask\fR 2766 parameter is applied\ .2767 .sp 2768 The example below would force all newly created files to have read and execute permissions set for \'group\' and \'other\' as well as the read/write/execute bits set for the \'user\'\ .2769 .sp 2770 Default: 2771 \fI\fIforce create mode\fR\fR\fI = \fR\fI 000\fR\fI \fR2772 .sp 2773 Example: 2774 \fI\fIforce create mode\fR\fR\fI = \fR\fI 0755\fR\fI \fR3281 parameter is applied\&. 3282 .sp 3283 The example below would force all newly created files to have read and execute permissions set for \'group\' and \'other\' as well as the read/write/execute bits set for the \'user\'\&. 3284 .sp 3285 Default: 3286 \fI\fIforce create mode\fR\fR\fI = \fR\fI\FC000\F[]\fR\fI \fR 3287 .sp 3288 Example: 3289 \fI\fIforce create mode\fR\fR\fI = \fR\fI\FC0755\F[]\fR\fI \fR 2775 3290 .RE 2776 3291 2777 3292 force directory mode (S) 3293 .\" force directory mode 2778 3294 .PP 2779 3295 .RS 4 2780 3296 This parameter specifies a set of UNIX mode bit permissions that will 2781 3297 \fIalways\fR 2782 be set on a directory created by Samba\ . This is done by bitwise \'OR\'ing these bits onto the mode bits of a directory that is being created\. The default for this parameter is (in octal) 0000 which will not add any extra permission bits to a created directory\. This operation is done after the mode mask in the parameter3298 be set on a directory created by Samba\&. This is done by bitwise \'OR\'ing these bits onto the mode bits of a directory that is being created\&. The default for this parameter is (in octal) 0000 which will not add any extra permission bits to a created directory\&. This operation is done after the mode mask in the parameter 2783 3299 \fIdirectory mask\fR 2784 is applied\ .2785 .sp 2786 The example below would force all created directories to have read and execute permissions set for \'group\' and \'other\' as well as the read/write/execute bits set for the \'user\'\ .2787 .sp 2788 Default: 2789 \fI\fIforce directory mode\fR\fR\fI = \fR\fI 000\fR\fI \fR2790 .sp 2791 Example: 2792 \fI\fIforce directory mode\fR\fR\fI = \fR\fI 0755\fR\fI \fR3300 is applied\&. 3301 .sp 3302 The example below would force all created directories to have read and execute permissions set for \'group\' and \'other\' as well as the read/write/execute bits set for the \'user\'\&. 3303 .sp 3304 Default: 3305 \fI\fIforce directory mode\fR\fR\fI = \fR\fI\FC000\F[]\fR\fI \fR 3306 .sp 3307 Example: 3308 \fI\fIforce directory mode\fR\fR\fI = \fR\fI\FC0755\F[]\fR\fI \fR 2793 3309 .RE 2794 3310 2795 3311 force directory security mode (S) 2796 .PP 2797 .RS 4 2798 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box\. 2799 .sp 2800 This parameter is applied as a mask (OR\'ed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on\. Make sure not to mix up this parameter with 2801 \fIdirectory security mask\fR, which works in a similar manner to this one, but uses a logical AND instead of an OR\. 2802 .sp 2803 Essentially, this mask may be treated as a set of bits that, when modifying security on a directory, to will enable (1) any flags that are off (0) but which the mask has set to on (1)\. 2804 .sp 2805 If not set explicitly this parameter is 0000, which allows a user to modify all the user/group/world permissions on a directory without restrictions\. 2806 .sp 3312 .\" force directory security mode 3313 .PP 3314 .RS 4 3315 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box\&. 3316 .sp 3317 This parameter is applied as a mask (OR\'ed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on\&. Make sure not to mix up this parameter with 3318 \m[blue]\fBdirectory security mask\fR\m[], which works in a similar manner to this one, but uses a logical AND instead of an OR\&. 3319 .sp 3320 Essentially, this mask may be treated as a set of bits that, when modifying security on a directory, to will enable (1) any flags that are off (0) but which the mask has set to on (1)\&. 3321 .sp 3322 If not set explicitly this parameter is 0000, which allows a user to modify all the user/group/world permissions on a directory without restrictions\&. 3323 .if n \{\ 3324 .sp 3325 .\} 3326 .RS 4 3327 .BM yellow 2807 3328 .it 1 an-trap 2808 3329 .nr an-no-space-flag 1 2809 3330 .nr an-break-flag 1 2810 3331 .br 2811 Note 2812 Users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\. Administrators of most normal systems will probably want to leave it set as 0000\. 2813 2814 Default: 2815 \fI\fIforce directory security mode\fR\fR\fI = \fR\fI0\fR\fI \fR 2816 .sp 2817 Example: 2818 \fI\fIforce directory security mode\fR\fR\fI = \fR\fI700\fR\fI \fR 3332 .ps +1 3333 \fBNote\fR 3334 .ps -1 3335 .br 3336 Users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it set as 0000\&. 3337 .sp .5v 3338 .EM yellow 3339 .RE 3340 Default: 3341 \fI\fIforce directory security mode\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 3342 .sp 3343 Example: 3344 \fI\fIforce directory security mode\fR\fR\fI = \fR\fI\FC700\F[]\fR\fI \fR 2819 3345 .RE 2820 3346 2821 3347 group 3348 .\" group 2822 3349 .PP 2823 3350 .RS 4 2824 3351 This parameter is a synonym for 2825 force group\ .3352 force group\&. 2826 3353 .RE 2827 3354 2828 3355 force group (S) 2829 .PP 2830 .RS 4 2831 This specifies a UNIX group name that will be assigned as the default primary group for all users connecting to this service\. This is useful for sharing files by ensuring that all access to files on service will use the named group for their permissions checking\. Thus, by assigning permissions for this group to the files and directories within this service the Samba administrator can restrict or allow sharing of these files\. 2832 .sp 2833 In Samba 2\.0\.5 and above this parameter has extended functionality in the following way\. If the group name listed here has a \'+\' character prepended to it then the current user accessing the share only has the primary group default assigned to this group if they are already assigned as a member of that group\. This allows an administrator to decide that only users who are already in a particular group will create files with group ownership set to that group\. This gives a finer granularity of ownership assignment\. For example, the setting 2834 \fIforce group = +sys\fR 2835 means that only users who are already in group sys will have their default primary group assigned to sys when accessing this Samba share\. All other users will retain their ordinary primary group\. 3356 .\" force group 3357 .PP 3358 .RS 4 3359 This specifies a UNIX group name that will be assigned as the default primary group for all users connecting to this service\&. This is useful for sharing files by ensuring that all access to files on service will use the named group for their permissions checking\&. Thus, by assigning permissions for this group to the files and directories within this service the Samba administrator can restrict or allow sharing of these files\&. 3360 .sp 3361 In Samba 2\&.0\&.5 and above this parameter has extended functionality in the following way\&. If the group name listed here has a \'+\' character prepended to it then the current user accessing the share only has the primary group default assigned to this group if they are already assigned as a member of that group\&. This allows an administrator to decide that only users who are already in a particular group will create files with group ownership set to that group\&. This gives a finer granularity of ownership assignment\&. For example, the setting 3362 \FCforce group = +sys\F[] 3363 means that only users who are already in group sys will have their default primary group assigned to sys when accessing this Samba share\&. All other users will retain their ordinary primary group\&. 2836 3364 .sp 2837 3365 If the 2838 \ fIforce user\fR3366 \m[blue]\fBforce user\fR\m[] 2839 3367 parameter is also set the group specified in 2840 3368 \fIforce group\fR 2841 3369 will override the primary group set in 2842 \fIforce user\fR\ .2843 .sp 2844 Default: 2845 \fI\fIforce group\fR\fR\fI = \fR\fI\ fR\fI \fR2846 .sp 2847 Example: 2848 \fI\fIforce group\fR\fR\fI = \fR\fI agroup\fR\fI \fR3370 \fIforce user\fR\&. 3371 .sp 3372 Default: 3373 \fI\fIforce group\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 3374 .sp 3375 Example: 3376 \fI\fIforce group\fR\fR\fI = \fR\fI\FCagroup\F[]\fR\fI \fR 2849 3377 .RE 2850 3378 2851 3379 force printername (S) 3380 .\" force printername 2852 3381 .PP 2853 3382 .RS 4 2854 3383 When printing from Windows NT (or later), each printer in 2855 \ fIsmb\.conf\fR2856 has two associated names which can be used by the client\ . The first is the sharename (or shortname) defined in smb\.conf\. This is the only printername available for use by Windows 9x clients\. The second name associated with a printer can be seen when browsing to the "Printers" (or "Printers and Faxes") folder on the Samba server\. This is referred to simply as the printername (not to be confused with the3384 \FCsmb\&.conf\F[] 3385 has two associated names which can be used by the client\&. The first is the sharename (or shortname) defined in smb\&.conf\&. This is the only printername available for use by Windows 9x clients\&. The second name associated with a printer can be seen when browsing to the "Printers" (or "Printers and Faxes") folder on the Samba server\&. This is referred to simply as the printername (not to be confused with the 2857 3386 \fIprinter name\fR 2858 option)\ .2859 .sp 2860 When assigning a new driver to a printer on a remote Windows compatible print server such as Samba, the Windows client will rename the printer to match the driver name just uploaded\ . This can result in confusion for users when multiple printers are bound to the same driver\. To prevent Samba from allowing the printer\'s printername to differ from the sharename defined in smb\.conf, set2861 \fIforce printername = yes\fR\ .2862 .sp 2863 Be aware that enabling this parameter may affect migrating printers from a Windows server to Samba since Windows has no way to force the sharename and printername to match\ .2864 .sp 2865 It is recommended that this parameter\'s value not be changed once the printer is in use by clients as this could cause a user not be able to delete printer connections from their local Printers folder\ .2866 .sp 2867 Default: 2868 \fI\fIforce printername\fR\fR\fI = \fR\fI no\fR\fI \fR3387 option)\&. 3388 .sp 3389 When assigning a new driver to a printer on a remote Windows compatible print server such as Samba, the Windows client will rename the printer to match the driver name just uploaded\&. This can result in confusion for users when multiple printers are bound to the same driver\&. To prevent Samba from allowing the printer\'s printername to differ from the sharename defined in smb\&.conf, set 3390 \fIforce printername = yes\fR\&. 3391 .sp 3392 Be aware that enabling this parameter may affect migrating printers from a Windows server to Samba since Windows has no way to force the sharename and printername to match\&. 3393 .sp 3394 It is recommended that this parameter\'s value not be changed once the printer is in use by clients as this could cause a user not be able to delete printer connections from their local Printers folder\&. 3395 .sp 3396 Default: 3397 \fI\fIforce printername\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2869 3398 .RE 2870 3399 2871 3400 force security mode (S) 2872 .PP 2873 .RS 4 2874 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box\. 2875 .sp 2876 This parameter is applied as a mask (OR\'ed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on\. Make sure not to mix up this parameter with 2877 \fIsecurity mask\fR, which works similar like this one but uses logical AND instead of OR\. 2878 .sp 2879 Essentially, one bits in this mask may be treated as a set of bits that, when modifying security on a file, the user has always set to be on\. 2880 .sp 2881 If not set explicitly this parameter is set to 0, and allows a user to modify all the user/group/world permissions on a file, with no restrictions\. 3401 .\" force security mode 3402 .PP 3403 .RS 4 3404 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box\&. 3405 .sp 3406 This parameter is applied as a mask (OR\'ed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on\&. Make sure not to mix up this parameter with 3407 \m[blue]\fBsecurity mask\fR\m[], which works similar like this one but uses logical AND instead of OR\&. 3408 .sp 3409 Essentially, one bits in this mask may be treated as a set of bits that, when modifying security on a file, the user has always set to be on\&. 3410 .sp 3411 If not set explicitly this parameter is set to 0, and allows a user to modify all the user/group/world permissions on a file, with no restrictions\&. 2882 3412 .sp 2883 3413 \fI Note\fR 2884 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\ . Administrators of most normal systems will probably want to leave this set to 0000\.2885 .sp 2886 Default: 2887 \fI\fIforce security mode\fR\fR\fI = \fR\fI 0\fR\fI \fR2888 .sp 2889 Example: 2890 \fI\fIforce security mode\fR\fR\fI = \fR\fI 700\fR\fI \fR3414 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave this set to 0000\&. 3415 .sp 3416 Default: 3417 \fI\fIforce security mode\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 3418 .sp 3419 Example: 3420 \fI\fIforce security mode\fR\fR\fI = \fR\fI\FC700\F[]\fR\fI \fR 2891 3421 .RE 2892 3422 2893 3423 force unknown acl user (S) 2894 .PP 2895 .RS 4 2896 If this parameter is set, a Windows NT ACL that contains an unknown SID (security descriptor, or representation of a user or group id) as the owner or group owner of the file will be silently mapped into the current UNIX uid or gid of the currently connected user\. 2897 .sp 2898 This is designed to allow Windows NT clients to copy files and folders containing ACLs that were created locally on the client machine and contain users local to that machine only (no domain users) to be copied to a Samba server (usually with XCOPY /O) and have the unknown userid and groupid of the file owner map to the current connected user\. This can only be fixed correctly when winbindd allows arbitrary mapping from any Windows NT SID to a UNIX uid or gid\. 2899 .sp 2900 Try using this parameter when XCOPY /O gives an ACCESS_DENIED error\. 2901 .sp 2902 Default: 2903 \fI\fIforce unknown acl user\fR\fR\fI = \fR\fIno\fR\fI \fR 3424 .\" force unknown acl user 3425 .PP 3426 .RS 4 3427 If this parameter is set, a Windows NT ACL that contains an unknown SID (security descriptor, or representation of a user or group id) as the owner or group owner of the file will be silently mapped into the current UNIX uid or gid of the currently connected user\&. 3428 .sp 3429 This is designed to allow Windows NT clients to copy files and folders containing ACLs that were created locally on the client machine and contain users local to that machine only (no domain users) to be copied to a Samba server (usually with XCOPY /O) and have the unknown userid and groupid of the file owner map to the current connected user\&. This can only be fixed correctly when winbindd allows arbitrary mapping from any Windows NT SID to a UNIX uid or gid\&. 3430 .sp 3431 Try using this parameter when XCOPY /O gives an ACCESS_DENIED error\&. 3432 .sp 3433 Default: 3434 \fI\fIforce unknown acl user\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 2904 3435 .RE 2905 3436 2906 3437 force user (S) 2907 .PP 2908 .RS 4 2909 This specifies a UNIX user name that will be assigned as the default user for all users connecting to this service\. This is useful for sharing files\. You should also use it carefully as using it incorrectly can cause security problems\. 2910 .sp 2911 This user name only gets used once a connection is established\. Thus clients still need to connect as a valid user and supply a valid password\. Once connected, all file operations will be performed as the "forced user", no matter what username the client connected as\. This can be very useful\. 2912 .sp 2913 In Samba 2\.0\.5 and above this parameter also causes the primary group of the forced user to be used as the primary group for all file activity\. Prior to 2\.0\.5 the primary group was left as the primary group of the connecting user (this was a bug)\. 2914 .sp 2915 Default: 2916 \fI\fIforce user\fR\fR\fI = \fR\fI\fR\fI \fR 2917 .sp 2918 Example: 2919 \fI\fIforce user\fR\fR\fI = \fR\fIauser\fR\fI \fR 3438 .\" force user 3439 .PP 3440 .RS 4 3441 This specifies a UNIX user name that will be assigned as the default user for all users connecting to this service\&. This is useful for sharing files\&. You should also use it carefully as using it incorrectly can cause security problems\&. 3442 .sp 3443 This user name only gets used once a connection is established\&. Thus clients still need to connect as a valid user and supply a valid password\&. Once connected, all file operations will be performed as the "forced user", no matter what username the client connected as\&. This can be very useful\&. 3444 .sp 3445 In Samba 2\&.0\&.5 and above this parameter also causes the primary group of the forced user to be used as the primary group for all file activity\&. Prior to 2\&.0\&.5 the primary group was left as the primary group of the connecting user (this was a bug)\&. 3446 .sp 3447 Default: 3448 \fI\fIforce user\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 3449 .sp 3450 Example: 3451 \fI\fIforce user\fR\fR\fI = \fR\fI\FCauser\F[]\fR\fI \fR 2920 3452 .RE 2921 3453 2922 3454 fstype (S) 3455 .\" fstype 2923 3456 .PP 2924 3457 .RS 4 2925 3458 This parameter allows the administrator to configure the string that specifies the type of filesystem a share is using that is reported by 2926 3459 \fBsmbd\fR(8) 2927 when a client queries the filesystem type for a share\ . The default type is3460 when a client queries the filesystem type for a share\&. The default type is 2928 3461 \fBNTFS\fR 2929 3462 for compatibility with Windows NT but this can be changed to other strings such as … … 2931 3464 or 2932 3465 \fBFAT\fR 2933 if required\ .2934 .sp 2935 Default: 2936 \fI\fIfstype\fR\fR\fI = \fR\fI NTFS\fR\fI \fR2937 .sp 2938 Example: 2939 \fI\fIfstype\fR\fR\fI = \fR\fI Samba\fR\fI \fR3466 if required\&. 3467 .sp 3468 Default: 3469 \fI\fIfstype\fR\fR\fI = \fR\fI\FCNTFS\F[]\fR\fI \fR 3470 .sp 3471 Example: 3472 \fI\fIfstype\fR\fR\fI = \fR\fI\FCSamba\F[]\fR\fI \fR 2940 3473 .RE 2941 3474 2942 3475 get quota command (G) 3476 .\" get quota command 2943 3477 .PP 2944 3478 .RS 4 2945 3479 The 2946 get quota command 2947 should only be used whenever there is no operating system API available from the OS that samba can use\ .3480 \FCget quota command\F[] 3481 should only be used whenever there is no operating system API available from the OS that samba can use\&. 2948 3482 .sp 2949 3483 This option is only available you have compiled Samba with the 2950 \ -\-with\-sys\-quotas3484 \FC\-\-with\-sys\-quotas\F[] 2951 3485 option or on Linux with 2952 \ -\-with\-quotas2953 and a working quota api was found in the system\ .2954 .sp 2955 This parameter should specify the path to a script that queries the quota information for the specified user/group for the partition that the specified directory is on\ .3486 \FC\-\-with\-quotas\F[] 3487 and a working quota api was found in the system\&. 3488 .sp 3489 This parameter should specify the path to a script that queries the quota information for the specified user/group for the partition that the specified directory is on\&. 2956 3490 .sp 2957 3491 Such a script should take 3 arguments: … … 3036 3570 .sp 3037 3571 .RE 3038 This script should print one line as output with spaces between the arguments\ . The arguments are:3572 This script should print one line as output with spaces between the arguments\&. The arguments are: 3039 3573 .sp 3040 3574 .RS 4 … … 3127 3661 .RE 3128 3662 Default: 3129 \fI\fIget quota command\fR\fR\fI = \fR\fI\ fR\fI \fR3130 .sp 3131 Example: 3132 \fI\fIget quota command\fR\fR\fI = \fR\fI /usr/local/sbin/query_quota\fR\fI \fR3663 \fI\fIget quota command\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 3664 .sp 3665 Example: 3666 \fI\fIget quota command\fR\fR\fI = \fR\fI\FC/usr/local/sbin/query_quota\F[]\fR\fI \fR 3133 3667 .RE 3134 3668 3135 3669 getwd cache (G) 3136 .PP 3137 .RS 4 3138 This is a tuning option\. When this is enabled a caching algorithm will be used to reduce the time taken for getwd() calls\. This can have a significant impact on performance, especially when the 3139 \fIwide smbconfoptions\fR 3670 .\" getwd cache 3671 .PP 3672 .RS 4 3673 This is a tuning option\&. When this is enabled a caching algorithm will be used to reduce the time taken for getwd() calls\&. This can have a significant impact on performance, especially when the 3674 \m[blue]\fBwide smbconfoptions\fR\m[] 3140 3675 parameter is set to 3141 \fBno\fR\ .3142 .sp 3143 Default: 3144 \fI\fIgetwd cache\fR\fR\fI = \fR\fI yes\fR\fI \fR3676 \fBno\fR\&. 3677 .sp 3678 Default: 3679 \fI\fIgetwd cache\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 3145 3680 .RE 3146 3681 3147 3682 guest account (G) 3683 .\" guest account 3148 3684 .PP 3149 3685 .RS 4 3150 3686 This is a username which will be used for access to services which are specified as 3151 \ fIguest ok\fR3152 (see below)\ . Whatever privileges this user has will be available to any client connecting to the guest service\. This user must exist in the password file, but does not require a valid login\. The user account "ftp" is often a good choice for this parameter\.3153 .sp 3154 On some systems the default guest account "nobody" may not be able to print\ . Use another account in this case\. You should test this by trying to log in as your guest user (perhaps by using the3155 su \- 3687 \m[blue]\fBguest ok\fR\m[] 3688 (see below)\&. Whatever privileges this user has will be available to any client connecting to the guest service\&. This user must exist in the password file, but does not require a valid login\&. The user account "ftp" is often a good choice for this parameter\&. 3689 .sp 3690 On some systems the default guest account "nobody" may not be able to print\&. Use another account in this case\&. You should test this by trying to log in as your guest user (perhaps by using the 3691 \FCsu \-\F[] 3156 3692 command) and trying to print using the system print command such as 3157 lpr(1) 3693 \FClpr(1)\F[] 3158 3694 or 3159 lp(1)\.3160 .sp 3161 This parameter does not accept % macros, because many parts of the system require this value to be constant for correct operation\ .3162 .sp 3163 Default: 3164 \fI\fIguest account\fR\fR\fI = \fR\fI nobody # default can be changed at compile\-time\fR\fI \fR3165 .sp 3166 Example: 3167 \fI\fIguest account\fR\fR\fI = \fR\fI ftp\fR\fI \fR3695 \FC lp(1)\F[]\&. 3696 .sp 3697 This parameter does not accept % macros, because many parts of the system require this value to be constant for correct operation\&. 3698 .sp 3699 Default: 3700 \fI\fIguest account\fR\fR\fI = \fR\fI\FCnobody # default can be changed at compile\-time\F[]\fR\fI \fR 3701 .sp 3702 Example: 3703 \fI\fIguest account\fR\fR\fI = \fR\fI\FCftp\F[]\fR\fI \fR 3168 3704 .RE 3169 3705 3170 3706 public 3707 .\" public 3171 3708 .PP 3172 3709 .RS 4 3173 3710 This parameter is a synonym for 3174 guest ok\ .3711 guest ok\&. 3175 3712 .RE 3176 3713 3177 3714 guest ok (S) 3715 .\" guest ok 3178 3716 .PP 3179 3717 .RS 4 3180 3718 If this parameter is 3181 3719 \fByes\fR 3182 for a service, then no password is required to connect to the service\ . Privileges will be those of the3183 \ fIguest account\fR\.3720 for a service, then no password is required to connect to the service\&. Privileges will be those of the 3721 \m[blue]\fBguest account\fR\m[]\&. 3184 3722 .sp 3185 3723 This paramater nullifies the benifits of setting 3186 \ fIrestrict anonymous = 2\fR3724 \m[blue]\fBrestrict anonymous = 2\fR\m[] 3187 3725 .sp 3188 3726 See the section below on 3189 \ fIsecurity\fR3190 for more information about this option\ .3191 .sp 3192 Default: 3193 \fI\fIguest ok\fR\fR\fI = \fR\fI no\fR\fI \fR3727 \m[blue]\fBsecurity\fR\m[] 3728 for more information about this option\&. 3729 .sp 3730 Default: 3731 \fI\fIguest ok\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 3194 3732 .RE 3195 3733 3196 3734 only guest 3735 .\" only guest 3197 3736 .PP 3198 3737 .RS 4 3199 3738 This parameter is a synonym for 3200 guest only\ .3739 guest only\&. 3201 3740 .RE 3202 3741 3203 3742 guest only (S) 3743 .\" guest only 3204 3744 .PP 3205 3745 .RS 4 3206 3746 If this parameter is 3207 3747 \fByes\fR 3208 for a service, then only guest connections to the service are permitted\ . This parameter will have no effect if3209 \ fIguest ok\fR3210 is not set for the service\ .3748 for a service, then only guest connections to the service are permitted\&. This parameter will have no effect if 3749 \m[blue]\fBguest ok\fR\m[] 3750 is not set for the service\&. 3211 3751 .sp 3212 3752 See the section below on 3213 \ fIsecurity\fR3214 for more information about this option\ .3215 .sp 3216 Default: 3217 \fI\fIguest only\fR\fR\fI = \fR\fI no\fR\fI \fR3753 \m[blue]\fBsecurity\fR\m[] 3754 for more information about this option\&. 3755 .sp 3756 Default: 3757 \fI\fIguest only\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 3218 3758 .RE 3219 3759 3220 3760 hide dot files (S) 3221 .PP 3222 .RS 4 3223 This is a boolean parameter that controls whether files starting with a dot appear as hidden files\. 3224 .sp 3225 Default: 3226 \fI\fIhide dot files\fR\fR\fI = \fR\fIyes\fR\fI \fR 3761 .\" hide dot files 3762 .PP 3763 .RS 4 3764 This is a boolean parameter that controls whether files starting with a dot appear as hidden files\&. 3765 .sp 3766 Default: 3767 \fI\fIhide dot files\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 3227 3768 .RE 3228 3769 3229 3770 hide files (S) 3230 .PP 3231 .RS 4 3232 This is a list of files or directories that are not visible but are accessible\. The DOS \'hidden\' attribute is applied to any files or directories that match\. 3233 .sp 3234 Each entry in the list must be separated by a \'/\', which allows spaces to be included in the entry\. \'*\' and \'?\' can be used to specify multiple files or directories as in DOS wildcards\. 3235 .sp 3236 Each entry must be a Unix path, not a DOS path and must not include the Unix directory separator \'/\'\. 3237 .sp 3238 Note that the case sensitivity option is applicable in hiding files\. 3239 .sp 3240 Setting this parameter will affect the performance of Samba, as it will be forced to check all files and directories for a match as they are scanned\. 3771 .\" hide files 3772 .PP 3773 .RS 4 3774 This is a list of files or directories that are not visible but are accessible\&. The DOS \'hidden\' attribute is applied to any files or directories that match\&. 3775 .sp 3776 Each entry in the list must be separated by a \'/\', which allows spaces to be included in the entry\&. \'*\' and \'?\' can be used to specify multiple files or directories as in DOS wildcards\&. 3777 .sp 3778 Each entry must be a Unix path, not a DOS path and must not include the Unix directory separator \'/\'\&. 3779 .sp 3780 Note that the case sensitivity option is applicable in hiding files\&. 3781 .sp 3782 Setting this parameter will affect the performance of Samba, as it will be forced to check all files and directories for a match as they are scanned\&. 3241 3783 .sp 3242 3784 The example shown above is based on files that the Macintosh SMB client (DAVE) available from 3243 3785 Thursby 3244 creates for internal use, and also still hides all files beginning with a dot\ .3786 creates for internal use, and also still hides all files beginning with a dot\&. 3245 3787 .sp 3246 3788 An example of us of this parameter is: 3247 3789 .sp 3248 .RS 4 3790 .if n \{\ 3791 .RS 4 3792 .\} 3793 .fam C 3794 .ps -1 3249 3795 .nf 3250 hide files = /\.*/DesktopFolderDB/TrashFor%m/resource\.frk/ 3796 .if t \{\ 3797 .sp -1 3798 .\} 3799 .BB lightgray adjust-for-leading-newline 3800 .sp -1 3801 3802 hide files = /\&.*/DesktopFolderDB/TrashFor%m/resource\&.frk/ 3803 .EB lightgray adjust-for-leading-newline 3804 .if t \{\ 3805 .sp 1 3806 .\} 3251 3807 .fi 3252 .RE 3253 .sp 3254 .sp 3255 Default: 3256 \fI\fIhide files\fR\fR\fI = \fR\fI # no file are hidden\fR\fI \fR 3808 .fam 3809 .ps +1 3810 .if n \{\ 3811 .RE 3812 .\} 3813 .sp 3814 Default: 3815 \fI\fIhide files\fR\fR\fI = \fR\fI\FC # no file are hidden\F[]\fR\fI \fR 3257 3816 .RE 3258 3817 3259 3818 hide special files (S) 3260 .PP 3261 .RS 4 3262 This parameter prevents clients from seeing special files such as sockets, devices and fifo\'s in directory listings\. 3263 .sp 3264 Default: 3265 \fI\fIhide special files\fR\fR\fI = \fR\fIno\fR\fI \fR 3819 .\" hide special files 3820 .PP 3821 .RS 4 3822 This parameter prevents clients from seeing special files such as sockets, devices and fifo\'s in directory listings\&. 3823 .sp 3824 Default: 3825 \fI\fIhide special files\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 3266 3826 .RE 3267 3827 3268 3828 hide unreadable (S) 3269 .PP 3270 .RS 4 3271 This parameter prevents clients from seeing the existance of files that cannot be read\. Defaults to off\. 3272 .sp 3273 Default: 3274 \fI\fIhide unreadable\fR\fR\fI = \fR\fIno\fR\fI \fR 3829 .\" hide unreadable 3830 .PP 3831 .RS 4 3832 This parameter prevents clients from seeing the existance of files that cannot be read\&. Defaults to off\&. 3833 .sp 3834 Default: 3835 \fI\fIhide unreadable\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 3275 3836 .RE 3276 3837 3277 3838 hide unwriteable files (S) 3278 .PP 3279 .RS 4 3280 This parameter prevents clients from seeing the existance of files that cannot be written to\. Defaults to off\. Note that unwriteable directories are shown as usual\. 3281 .sp 3282 Default: 3283 \fI\fIhide unwriteable files\fR\fR\fI = \fR\fIno\fR\fI \fR 3839 .\" hide unwriteable files 3840 .PP 3841 .RS 4 3842 This parameter prevents clients from seeing the existance of files that cannot be written to\&. Defaults to off\&. Note that unwriteable directories are shown as usual\&. 3843 .sp 3844 Default: 3845 \fI\fIhide unwriteable files\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 3284 3846 .RE 3285 3847 3286 3848 homedir map (G) 3849 .\" homedir map 3287 3850 .PP 3288 3851 .RS 4 3289 3852 If 3290 \ fInis homedir\fR3853 \m[blue]\fBnis homedir\fR\m[] 3291 3854 is 3292 3855 \fByes\fR, and … … 3294 3857 is also acting as a Win95/98 3295 3858 \fIlogon server\fR 3296 then this parameter specifies the NIS (or YP) map from which the server for the user\'s home directory should be extracted\. At present, only the Sun auto\.home map format is understood\. The form of the map is: 3297 .sp 3298 .RS 4 3859 then this parameter specifies the NIS (or YP) map from which the server for the user\'s home directory should be extracted\&. At present, only the Sun auto\&.home map format is understood\&. The form of the map is: 3860 .sp 3861 .if n \{\ 3862 .RS 4 3863 .\} 3864 .fam C 3865 .ps -1 3299 3866 .nf 3300 username server:/some/file/system 3867 .if t \{\ 3868 .sp -1 3869 .\} 3870 .BB lightgray adjust-for-leading-newline 3871 .sp -1 3872 3873 \FCusername server:/some/file/system\F[] 3874 .EB lightgray adjust-for-leading-newline 3875 .if t \{\ 3876 .sp 1 3877 .\} 3301 3878 .fi 3302 .RE 3303 .sp 3304 and the program will extract the servername from before the first \':\'\. There should probably be a better parsing system that copes with different map formats and also Amd (another automounter) maps\. 3305 .sp 3879 .fam 3880 .ps +1 3881 .if n \{\ 3882 .RE 3883 .\} 3884 .sp 3885 and the program will extract the servername from before the first \':\'\&. There should probably be a better parsing system that copes with different map formats and also Amd (another automounter) maps\&. 3886 .if n \{\ 3887 .sp 3888 .\} 3889 .RS 4 3890 .BM yellow 3306 3891 .it 1 an-trap 3307 3892 .nr an-no-space-flag 1 3308 3893 .nr an-break-flag 1 3309 3894 .br 3310 Note 3311 A working NIS client is required on the system for this option to work\. 3312 3313 Default: 3314 \fI\fIhomedir map\fR\fR\fI = \fR\fI\fR\fI \fR 3315 .sp 3316 Example: 3317 \fI\fIhomedir map\fR\fR\fI = \fR\fIamd\.homedir\fR\fI \fR 3895 .ps +1 3896 \fBNote\fR 3897 .ps -1 3898 .br 3899 A working NIS client is required on the system for this option to work\&. 3900 .sp .5v 3901 .EM yellow 3902 .RE 3903 Default: 3904 \fI\fIhomedir map\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 3905 .sp 3906 Example: 3907 \fI\fIhomedir map\fR\fR\fI = \fR\fI\FCamd\&.homedir\F[]\fR\fI \fR 3318 3908 .RE 3319 3909 3320 3910 host msdfs (G) 3911 .\" host msdfs 3321 3912 .PP 3322 3913 .RS 4 3323 3914 If set to 3324 \fByes\fR, Samba will act as a Dfs server, and allow Dfs\-aware clients to browse Dfs trees hosted on the server\ .3915 \fByes\fR, Samba will act as a Dfs server, and allow Dfs\-aware clients to browse Dfs trees hosted on the server\&. 3325 3916 .sp 3326 3917 See also the 3327 \ fImsdfs root\fR3328 share level parameter\ . For more information on setting up a Dfs tree on Samba, refer to the MSFDS chapter in the book Samba3\-HOWTO\.3329 .sp 3330 Default: 3331 \fI\fIhost msdfs\fR\fR\fI = \fR\fI yes\fR\fI \fR3918 \m[blue]\fBmsdfs root\fR\m[] 3919 share level parameter\&. For more information on setting up a Dfs tree on Samba, refer to the MSFDS chapter in the book Samba3\-HOWTO\&. 3920 .sp 3921 Default: 3922 \fI\fIhost msdfs\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 3332 3923 .RE 3333 3924 3334 3925 hostname lookups (G) 3335 .PP 3336 .RS 4 3337 Specifies whether samba should use (expensive) hostname lookups or use the ip addresses instead\. An example place where hostname lookups are currently used is when checking the 3338 hosts deny 3926 .\" hostname lookups 3927 .PP 3928 .RS 4 3929 Specifies whether samba should use (expensive) hostname lookups or use the ip addresses instead\&. An example place where hostname lookups are currently used is when checking the 3930 \FChosts deny\F[] 3339 3931 and 3340 hosts allow\.3341 .sp 3342 Default: 3343 \fI\fIhostname lookups\fR\fR\fI = \fR\fI no\fR\fI \fR3344 .sp 3345 Example: 3346 \fI\fIhostname lookups\fR\fR\fI = \fR\fI yes\fR\fI \fR3932 \FChosts allow\F[]\&. 3933 .sp 3934 Default: 3935 \fI\fIhostname lookups\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 3936 .sp 3937 Example: 3938 \fI\fIhostname lookups\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 3347 3939 .RE 3348 3940 3349 3941 allow hosts 3942 .\" allow hosts 3350 3943 .PP 3351 3944 .RS 4 3352 3945 This parameter is a synonym for 3353 hosts allow\ .3946 hosts allow\&. 3354 3947 .RE 3355 3948 3356 3949 hosts allow (S) 3950 .\" hosts allow 3357 3951 .PP 3358 3952 .RS 4 3359 3953 A synonym for this parameter is 3360 \ fIallow hosts\fR\.3361 .sp 3362 This parameter is a comma, space, or tab delimited set of hosts which are permitted to access a service\ .3363 .sp 3364 If specified in the [global] section then it will apply to all services, regardless of whether the individual service has a different setting\ .3365 .sp 3366 You can specify the hosts by name or IP number\ . For example, you could restrict access to only the hosts on a Class C subnet with something like3367 allow hosts = 150\.203\.5\.\. The full syntax of the list is described in the man page3368 \ fIhosts_access(5)\fR\. Note that this man page may not be present on your system, so a brief description will be given here also\.3369 .sp 3370 Note that the localhost address 127\ .0\.0\.1 will always be allowed access unless specifically denied by a3371 \ fIhosts deny\fR3372 option\ .3373 .sp 3374 You can also specify hosts by network/netmask pairs and by netgroup names if your system supports netgroups\ . The3954 \m[blue]\fBallow hosts\fR\m[]\&. 3955 .sp 3956 This parameter is a comma, space, or tab delimited set of hosts which are permitted to access a service\&. 3957 .sp 3958 If specified in the [global] section then it will apply to all services, regardless of whether the individual service has a different setting\&. 3959 .sp 3960 You can specify the hosts by name or IP number\&. For example, you could restrict access to only the hosts on a Class C subnet with something like 3961 \FCallow hosts = 150\&.203\&.5\&.\F[]\&. The full syntax of the list is described in the man page 3962 \FChosts_access(5)\F[]\&. Note that this man page may not be present on your system, so a brief description will be given here also\&. 3963 .sp 3964 Note that the localhost address 127\&.0\&.0\&.1 will always be allowed access unless specifically denied by a 3965 \m[blue]\fBhosts deny\fR\m[] 3966 option\&. 3967 .sp 3968 You can also specify hosts by network/netmask pairs and by netgroup names if your system supports netgroups\&. The 3375 3969 \fIEXCEPT\fR 3376 keyword can also be used to limit a wildcard list\ . The following examples may provide some help:3377 .sp 3378 Example 1: allow all IPs in 150\ .203\.*\.*; except one3379 .sp 3380 hosts allow = 150\.203\. EXCEPT 150\.203\.6\.66 3970 keyword can also be used to limit a wildcard list\&. The following examples may provide some help: 3971 .sp 3972 Example 1: allow all IPs in 150\&.203\&.*\&.*; except one 3973 .sp 3974 \FChosts allow = 150\&.203\&. EXCEPT 150\&.203\&.6\&.66\F[] 3381 3975 .sp 3382 3976 Example 2: allow hosts that match the given network/netmask 3383 3977 .sp 3384 hosts allow = 150\.203\.15\.0/255\.255\.255\.0 3978 \FChosts allow = 150\&.203\&.15\&.0/255\&.255\&.255\&.0\F[] 3385 3979 .sp 3386 3980 Example 3: allow a couple of hosts 3387 3981 .sp 3388 hosts allow = lapland, arvidsjaur 3982 \FChosts allow = lapland, arvidsjaur\F[] 3389 3983 .sp 3390 3984 Example 4: allow only hosts in NIS netgroup "foonet", but deny access from one particular host 3391 3985 .sp 3392 hosts allow = @foonet 3393 .sp 3394 hosts deny = pirate 3395 .sp 3986 \FChosts allow = @foonet\F[] 3987 .sp 3988 \FChosts deny = pirate\F[] 3989 .if n \{\ 3990 .sp 3991 .\} 3992 .RS 4 3993 .BM yellow 3396 3994 .it 1 an-trap 3397 3995 .nr an-no-space-flag 1 3398 3996 .nr an-break-flag 1 3399 3997 .br 3400 Note 3401 Note that access still requires suitable user\-level passwords\. 3402 3998 .ps +1 3999 \fBNote\fR 4000 .ps -1 4001 .br 4002 Note that access still requires suitable user\-level passwords\&. 4003 .sp .5v 4004 .EM yellow 4005 .RE 3403 4006 See 3404 4007 \fBtestparm\fR(1) 3405 for a way of testing your host access to see if it does what you expect\ .3406 .sp 3407 Default: 3408 \fI\fIhosts allow\fR\fR\fI = \fR\fI # none (i\.e\., all hosts permitted access)\fR\fI \fR3409 .sp 3410 Example: 3411 \fI\fIhosts allow\fR\fR\fI = \fR\fI 150\.203\.5\. myhost\.mynet\.edu\.au\fR\fI \fR4008 for a way of testing your host access to see if it does what you expect\&. 4009 .sp 4010 Default: 4011 \fI\fIhosts allow\fR\fR\fI = \fR\fI\FC # none (i\&.e\&., all hosts permitted access)\F[]\fR\fI \fR 4012 .sp 4013 Example: 4014 \fI\fIhosts allow\fR\fR\fI = \fR\fI\FC150\&.203\&.5\&. myhost\&.mynet\&.edu\&.au\F[]\fR\fI \fR 3412 4015 .RE 3413 4016 3414 4017 deny hosts 4018 .\" deny hosts 3415 4019 .PP 3416 4020 .RS 4 3417 4021 This parameter is a synonym for 3418 hosts deny\ .4022 hosts deny\&. 3419 4023 .RE 3420 4024 3421 4025 hosts deny (S) 4026 .\" hosts deny 3422 4027 .PP 3423 4028 .RS 4 … … 3426 4031 \- hosts listed here are 3427 4032 \fINOT\fR 3428 permitted access to services unless the specific services have their own lists to override this one\ . Where the lists conflict, the4033 permitted access to services unless the specific services have their own lists to override this one\&. Where the lists conflict, the 3429 4034 \fIallow\fR 3430 list takes precedence\ .4035 list takes precedence\&. 3431 4036 .sp 3432 4037 In the event that it is necessary to deny all by default, use the keyword ALL (or the netmask 3433 0\.0\.0\.0/0) and then explicitly specify to the3434 \ fIhosts allow = hosts allow\fR3435 parameter those hosts that should be permitted access\ .3436 .sp 3437 Default: 3438 \fI\fIhosts deny\fR\fR\fI = \fR\fI # none (i\.e\., no hosts specifically excluded)\fR\fI \fR3439 .sp 3440 Example: 3441 \fI\fIhosts deny\fR\fR\fI = \fR\fI 150\.203\.4\. badhost\.mynet\.edu\.au\fR\fI \fR4038 \FC0\&.0\&.0\&.0/0\F[]) and then explicitly specify to the 4039 \m[blue]\fBhosts allow = hosts allow\fR\m[] 4040 parameter those hosts that should be permitted access\&. 4041 .sp 4042 Default: 4043 \fI\fIhosts deny\fR\fR\fI = \fR\fI\FC # none (i\&.e\&., no hosts specifically excluded)\F[]\fR\fI \fR 4044 .sp 4045 Example: 4046 \fI\fIhosts deny\fR\fR\fI = \fR\fI\FC150\&.203\&.4\&. badhost\&.mynet\&.edu\&.au\F[]\fR\fI \fR 3442 4047 .RE 3443 4048 3444 4049 idmap alloc backend (G) 3445 .PP 3446 .RS 4 3447 The idmap alloc backend provides a plugin interface for Winbind to use when allocating Unix uids/gids for Windows SIDs\. This option is to be used in conjunction with the 3448 \fIidmap domains\fR 3449 parameter and refers to the name of the idmap module which will provide the id allocation functionality\. Please refer to the man page for each idmap plugin to determine whether or not the module implements the allocation feature\. The most common plugins are the tdb (\fBidmap_tdb\fR(8)) and ldap (\fBidmap_ldap\fR(8)) libraries\. 4050 .\" idmap alloc backend 4051 .PP 4052 .RS 4 4053 The idmap alloc backend provides a plugin interface for Winbind to use when allocating Unix uids/gids for Windows SIDs\&. This option is to be used in conjunction with the 4054 \m[blue]\fBidmap domains\fR\m[] 4055 parameter and refers to the name of the idmap module which will provide the id allocation functionality\&. Please refer to the man page for each idmap plugin to determine whether or not the module implements the allocation feature\&. The most common plugins are the tdb (\fBidmap_tdb\fR(8)) and ldap (\fBidmap_ldap\fR(8)) libraries\&. 3450 4056 .sp 3451 4057 Also refer to the 3452 \ fIidmap alloc config\fR3453 option\ .4058 \m[blue]\fBidmap alloc config\fR\m[] 4059 option\&. 3454 4060 .sp 3455 4061 \fINo default\fR 3456 4062 .sp 3457 4063 Example: 3458 \fI\fIidmap alloc backend\fR\fR\fI = \fR\fI tdb\fR\fI \fR4064 \fI\fIidmap alloc backend\fR\fR\fI = \fR\fI\FCtdb\F[]\fR\fI \fR 3459 4065 .RE 3460 4066 3461 4067 idmap alloc config (G) 4068 .\" idmap alloc config 3462 4069 .PP 3463 4070 .RS 4 3464 4071 The idmap alloc config prefix provides a means of managing settings for the backend defined by the 3465 \ fIidmap alloc backend\fR3466 parameter\ . Refer to the man page for each idmap plugin regarding specific configuration details\.4072 \m[blue]\fBidmap alloc backend\fR\m[] 4073 parameter\&. Refer to the man page for each idmap plugin regarding specific configuration details\&. 3467 4074 .sp 3468 4075 \fINo default\fR … … 3470 4077 3471 4078 idmap backend (G) 3472 .PP 3473 .RS 4 3474 The idmap backend provides a plugin interface for Winbind to use varying backends to store SID/uid/gid mapping tables\. This option is mutually exclusive with the newer and more flexible 3475 \fIidmap domains\fR 3476 parameter\. The main difference between the "idmap backend" and the "idmap domains" is that the former only allows one backend for all domains while the latter supports configuring backends on a per domain basis\. 3477 .sp 3478 Examples of SID/uid/gid backends include tdb (\fBidmap_tdb\fR(8)), ldap (\fBidmap_ldap\fR(8)), rid (\fBidmap_rid\fR(8)), and ad (\fBidmap_tdb\fR(8))\. 3479 .sp 3480 Default: 3481 \fI\fIidmap backend\fR\fR\fI = \fR\fItdb\fR\fI \fR 4079 .\" idmap backend 4080 .PP 4081 .RS 4 4082 The idmap backend provides a plugin interface for Winbind to use varying backends to store SID/uid/gid mapping tables\&. This option is mutually exclusive with the newer and more flexible 4083 \m[blue]\fBidmap domains\fR\m[] 4084 parameter\&. The main difference between the "idmap backend" and the "idmap domains" is that the former only allows one backend for all domains while the latter supports configuring backends on a per domain basis\&. 4085 .sp 4086 Examples of SID/uid/gid backends include tdb (\fBidmap_tdb\fR(8)), ldap (\fBidmap_ldap\fR(8)), rid (\fBidmap_rid\fR(8)), and ad (\fBidmap_tdb\fR(8))\&. 4087 .sp 4088 Default: 4089 \fI\fIidmap backend\fR\fR\fI = \fR\fI\FCtdb\F[]\fR\fI \fR 3482 4090 .RE 3483 4091 3484 4092 idmap cache time (G) 3485 .PP 3486 .RS 4 3487 This parameter specifies the number of seconds that Winbind\'s idmap interface will cache positive SID/uid/gid query results\. 3488 .sp 3489 Default: 3490 \fI\fIidmap cache time\fR\fR\fI = \fR\fI900\fR\fI \fR 4093 .\" idmap cache time 4094 .PP 4095 .RS 4 4096 This parameter specifies the number of seconds that Winbind\'s idmap interface will cache positive SID/uid/gid query results\&. 4097 .sp 4098 Default: 4099 \fI\fIidmap cache time\fR\fR\fI = \fR\fI\FC900\F[]\fR\fI \fR 3491 4100 .RE 3492 4101 3493 4102 idmap config (G) 4103 .\" idmap config 3494 4104 .PP 3495 4105 .RS 4 3496 4106 The idmap config prefix provides a means of managing each domain defined by the 3497 \ fIidmap domains\fR3498 option using Samba\'s parametric option support\ . The idmap config prefix should be followed by the name of the domain, a colon, and a setting specific to the chosen backend\. There are three options available for all domains:4107 \m[blue]\fBidmap domains\fR\m[] 4108 option using Samba\'s parametric option support\&. The idmap config prefix should be followed by the name of the domain, a colon, and a setting specific to the chosen backend\&. There are three options available for all domains: 3499 4109 .PP 3500 4110 backend = backend_name 3501 4111 .RS 4 3502 Specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\ .4112 Specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\&. 3503 4113 .RE 3504 4114 .PP 3505 4115 default = [yes|no] 3506 4116 .RS 4 3507 The default domain/backend will be used for searching for users and groups not belonging to one of the explicitly listed domains (matched by comparing the account SID and the domain SID)\ .4117 The default domain/backend will be used for searching for users and groups not belonging to one of the explicitly listed domains (matched by comparing the account SID and the domain SID)\&. 3508 4118 .RE 3509 4119 .PP … … 3511 4121 .RS 4 3512 4122 Mark the domain as readonly which means that no attempts to allocate a uid or gid (by the 3513 \ fIidmap alloc backend\fR) for any user or group in that domain will be attempted\.4123 \m[blue]\fBidmap alloc backend\fR\m[]) for any user or group in that domain will be attempted\&. 3514 4124 .RE 3515 4125 .sp … … 3518 4128 for the CORP domain and the 3519 4129 \fBidmap_tdb\fR(8) 3520 backend for all other domains\. The TRUSTEDDOMAINS string is simply an arbitrary key used to reference the "idmap config" settings and does not represent the actual name of a domain\. It is a catchall domain backend for any domain not explicitly listed\. 3521 .sp 3522 .RS 4 4130 backend for all other domains\&. The TRUSTEDDOMAINS string is simply an arbitrary key used to reference the "idmap config" settings and does not represent the actual name of a domain\&. It is a catchall domain backend for any domain not explicitly listed\&. 4131 .sp 4132 .if n \{\ 4133 .RS 4 4134 .\} 4135 .fam C 4136 .ps -1 3523 4137 .nf 4138 .if t \{\ 4139 .sp -1 4140 .\} 4141 .BB lightgray adjust-for-leading-newline 4142 .sp -1 4143 3524 4144 idmap domains = CORP TRUSTEDDOMAINS 3525 4145 … … 3531 4151 idmap config TRUSTEDDOMAINS:range = 1000 \- 9999 3532 4152 4153 .EB lightgray adjust-for-leading-newline 4154 .if t \{\ 4155 .sp 1 4156 .\} 3533 4157 .fi 3534 .RE 4158 .fam 4159 .ps +1 4160 .if n \{\ 4161 .RE 4162 .\} 4163 .sp 3535 4164 \fINo default\fR 3536 4165 .RE 3537 4166 3538 4167 idmap domains (G) 3539 .PP 3540 .RS 4 3541 The idmap domains option defines a list of Windows domains which will each have a separately configured backend for managing Winbind\'s SID/uid/gid tables\. This parameter is mutually exclusive with the older 3542 \fIidmap backend\fR 3543 option\. 3544 .sp 3545 Values consist of the short domain name for Winbind\'s primary or collection of trusted domains\. You may also use an arbitrary string to represent a catchall domain backend for any domain not explicitly listed\. 4168 .\" idmap domains 4169 .PP 4170 .RS 4 4171 The idmap domains option defines a list of Windows domains which will each have a separately configured backend for managing Winbind\'s SID/uid/gid tables\&. This parameter is mutually exclusive with the older 4172 \m[blue]\fBidmap backend\fR\m[] 4173 option\&. 4174 .sp 4175 Values consist of the short domain name for Winbind\'s primary or collection of trusted domains\&. You may also use an arbitrary string to represent a catchall domain backend for any domain not explicitly listed\&. 3546 4176 .sp 3547 4177 Refer to the 3548 \ fIidmap config\fR3549 for details about managing the SID/uid/gid backend for each domain\ .4178 \m[blue]\fBidmap config\fR\m[] 4179 for details about managing the SID/uid/gid backend for each domain\&. 3550 4180 .sp 3551 4181 \fINo default\fR 3552 4182 .sp 3553 4183 Example: 3554 \fI\fIidmap domains\fR\fR\fI = \fR\fI default AD CORP\fR\fI \fR4184 \fI\fIidmap domains\fR\fR\fI = \fR\fI\FCdefault AD CORP\F[]\fR\fI \fR 3555 4185 .RE 3556 4186 3557 4187 winbind gid 4188 .\" winbind gid 3558 4189 .PP 3559 4190 .RS 4 3560 4191 This parameter is a synonym for 3561 idmap gid\ .4192 idmap gid\&. 3562 4193 .RE 3563 4194 3564 4195 idmap gid (G) 3565 .PP 3566 .RS 4 3567 The idmap gid parameter specifies the range of group ids that are allocated for the purpose of mapping UNX groups to NT group SIDs\. This range of group ids should have no existing local or NIS groups within it as strange conflicts can occur otherwise\. 4196 .\" idmap gid 4197 .PP 4198 .RS 4 4199 The idmap gid parameter specifies the range of group ids that are allocated for the purpose of mapping UNX groups to NT group SIDs\&. This range of group ids should have no existing local or NIS groups within it as strange conflicts can occur otherwise\&. 3568 4200 .sp 3569 4201 See also the 3570 \ fIidmap backend\fR,3571 \ fIidmap domains\fR, and3572 \ fIidmap config\fR3573 options\ .3574 .sp 3575 Default: 3576 \fI\fIidmap gid\fR\fR\fI = \fR\fI\ fR\fI \fR3577 .sp 3578 Example: 3579 \fI\fIidmap gid\fR\fR\fI = \fR\fI 10000\-20000\fR\fI \fR4202 \m[blue]\fBidmap backend\fR\m[], 4203 \m[blue]\fBidmap domains\fR\m[], and 4204 \m[blue]\fBidmap config\fR\m[] 4205 options\&. 4206 .sp 4207 Default: 4208 \fI\fIidmap gid\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 4209 .sp 4210 Example: 4211 \fI\fIidmap gid\fR\fR\fI = \fR\fI\FC10000\-20000\F[]\fR\fI \fR 3580 4212 .RE 3581 4213 3582 4214 idmap negative cache time (G) 3583 .PP 3584 .RS 4 3585 This parameter specifies the number of seconds that Winbind\'s idmap interface will cache negative SID/uid/gid query results\. 3586 .sp 3587 Default: 3588 \fI\fIidmap negative cache time\fR\fR\fI = \fR\fI120\fR\fI \fR 4215 .\" idmap negative cache time 4216 .PP 4217 .RS 4 4218 This parameter specifies the number of seconds that Winbind\'s idmap interface will cache negative SID/uid/gid query results\&. 4219 .sp 4220 Default: 4221 \fI\fIidmap negative cache time\fR\fR\fI = \fR\fI\FC120\F[]\fR\fI \fR 3589 4222 .RE 3590 4223 3591 4224 winbind uid 4225 .\" winbind uid 3592 4226 .PP 3593 4227 .RS 4 3594 4228 This parameter is a synonym for 3595 idmap uid\ .4229 idmap uid\&. 3596 4230 .RE 3597 4231 3598 4232 idmap uid (G) 3599 .PP 3600 .RS 4 3601 The idmap uid parameter specifies the range of user ids that are allocated for use in mapping UNIX users to NT user SIDs\. This range of ids should have no existing local or NIS users within it as strange conflicts can occur otherwise\. 4233 .\" idmap uid 4234 .PP 4235 .RS 4 4236 The idmap uid parameter specifies the range of user ids that are allocated for use in mapping UNIX users to NT user SIDs\&. This range of ids should have no existing local or NIS users within it as strange conflicts can occur otherwise\&. 3602 4237 .sp 3603 4238 See also the 3604 \ fIidmap backend\fR,3605 \ fIidmap domains\fR, and3606 \ fIidmap config\fR3607 options\ .3608 .sp 3609 Default: 3610 \fI\fIidmap uid\fR\fR\fI = \fR\fI\ fR\fI \fR3611 .sp 3612 Example: 3613 \fI\fIidmap uid\fR\fR\fI = \fR\fI 10000\-20000\fR\fI \fR4239 \m[blue]\fBidmap backend\fR\m[], 4240 \m[blue]\fBidmap domains\fR\m[], and 4241 \m[blue]\fBidmap config\fR\m[] 4242 options\&. 4243 .sp 4244 Default: 4245 \fI\fIidmap uid\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 4246 .sp 4247 Example: 4248 \fI\fIidmap uid\fR\fR\fI = \fR\fI\FC10000\-20000\F[]\fR\fI \fR 3614 4249 .RE 3615 4250 3616 4251 include (G) 3617 .PP 3618 .RS 4 3619 This allows you to include one config file inside another\. The file is included literally, as though typed in place\. 4252 .\" include 4253 .PP 4254 .RS 4 4255 This allows you to include one config file inside another\&. The file is included literally, as though typed in place\&. 3620 4256 .sp 3621 4257 It takes the standard substitutions, except … … 3623 4259 \fI%P\fR 3624 4260 and 3625 \fI%S\fR\ .4261 \fI%S\fR\&. 3626 4262 .sp 3627 4263 The parameter … … 3631 4267 include a file named 3632 4268 \fIregistry\fR 3633 from the current working directory, but instead reads the global configuration options from the registry\ . See the section on registry\-based configuration for details\. Note that this option automatically activates registry shares\.3634 .sp 3635 Default: 3636 \fI\fIinclude\fR\fR\fI = \fR\fI\ fR\fI \fR3637 .sp 3638 Example: 3639 \fI\fIinclude\fR\fR\fI = \fR\fI /usr/local/samba/lib/admin_smb\.conf\fR\fI \fR4269 from the current working directory, but instead reads the global configuration options from the registry\&. See the section on registry\-based configuration for details\&. Note that this option automatically activates registry shares\&. 4270 .sp 4271 Default: 4272 \fI\fIinclude\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 4273 .sp 4274 Example: 4275 \fI\fIinclude\fR\fR\fI = \fR\fI\FC/usr/local/samba/lib/admin_smb\&.conf\F[]\fR\fI \fR 3640 4276 .RE 3641 4277 3642 4278 inherit acls (S) 3643 .PP 3644 .RS 4 3645 This parameter can be used to ensure that if default acls exist on parent directories, they are always honored when creating a new file or subdirectory in these parent directories\. The default behavior is to use the unix mode specified when creating the directory\. Enabling this option sets the unix mode to 0777, thus guaranteeing that default directory acls are propagated\. 3646 .sp 3647 Default: 3648 \fI\fIinherit acls\fR\fR\fI = \fR\fIno\fR\fI \fR 4279 .\" inherit acls 4280 .PP 4281 .RS 4 4282 This parameter can be used to ensure that if default acls exist on parent directories, they are always honored when creating a new file or subdirectory in these parent directories\&. The default behavior is to use the unix mode specified when creating the directory\&. Enabling this option sets the unix mode to 0777, thus guaranteeing that default directory acls are propagated\&. 4283 .sp 4284 Default: 4285 \fI\fIinherit acls\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 3649 4286 .RE 3650 4287 3651 4288 inherit owner (S) 3652 .PP 3653 .RS 4 3654 The ownership of new files and directories is normally governed by effective uid of the connected user\. This option allows the Samba administrator to specify that the ownership for new files and directories should be controlled by the ownership of the parent directory\. 3655 .sp 3656 Common scenarios where this behavior is useful is in implementing drop\-boxes where users can create and edit files but not delete them and to ensure that newly create files in a user\'s roaming profile directory are actually owner by the user\. 3657 .sp 3658 Default: 3659 \fI\fIinherit owner\fR\fR\fI = \fR\fIno\fR\fI \fR 4289 .\" inherit owner 4290 .PP 4291 .RS 4 4292 The ownership of new files and directories is normally governed by effective uid of the connected user\&. This option allows the Samba administrator to specify that the ownership for new files and directories should be controlled by the ownership of the parent directory\&. 4293 .sp 4294 Common scenarios where this behavior is useful is in implementing drop\-boxes where users can create and edit files but not delete them and to ensure that newly create files in a user\'s roaming profile directory are actually owner by the user\&. 4295 .sp 4296 Default: 4297 \fI\fIinherit owner\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 3660 4298 .RE 3661 4299 3662 4300 inherit permissions (S) 4301 .\" inherit permissions 3663 4302 .PP 3664 4303 .RS 4 3665 4304 The permissions on new files and directories are normally governed by 3666 \ fIcreate mask\fR,3667 \ fIdirectory mask\fR,3668 \ fIforce create mode\fR4305 \m[blue]\fBcreate mask\fR\m[], 4306 \m[blue]\fBdirectory mask\fR\m[], 4307 \m[blue]\fBforce create mode\fR\m[] 3669 4308 and 3670 \ fIforce directory mode\fR3671 but the boolean inherit permissions parameter overrides this\ .3672 .sp 3673 New directories inherit the mode of the parent directory, including bits such as setgid\ .3674 .sp 3675 New files inherit their read/write bits from the parent directory\ . Their execute bits continue to be determined by3676 \ fImap archive\fR,3677 \ fImap hidden\fR4309 \m[blue]\fBforce directory mode\fR\m[] 4310 but the boolean inherit permissions parameter overrides this\&. 4311 .sp 4312 New directories inherit the mode of the parent directory, including bits such as setgid\&. 4313 .sp 4314 New files inherit their read/write bits from the parent directory\&. Their execute bits continue to be determined by 4315 \m[blue]\fBmap archive\fR\m[], 4316 \m[blue]\fBmap hidden\fR\m[] 3678 4317 and 3679 \ fImap system\fR3680 as usual\ .4318 \m[blue]\fBmap system\fR\m[] 4319 as usual\&. 3681 4320 .sp 3682 4321 Note that the setuid bit is 3683 4322 \fInever\fR 3684 set via inheritance (the code explicitly prohibits this)\ .3685 .sp 3686 This can be particularly useful on large systems with many users, perhaps several thousand, to allow a single [homes] share to be used flexibly by each user\ .3687 .sp 3688 Default: 3689 \fI\fIinherit permissions\fR\fR\fI = \fR\fI no\fR\fI \fR4323 set via inheritance (the code explicitly prohibits this)\&. 4324 .sp 4325 This can be particularly useful on large systems with many users, perhaps several thousand, to allow a single [homes] share to be used flexibly by each user\&. 4326 .sp 4327 Default: 4328 \fI\fIinherit permissions\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 3690 4329 .RE 3691 4330 3692 4331 interfaces (G) 3693 .PP 3694 .RS 4 3695 This option allows you to override the default network interfaces list that Samba will use for browsing, name registration and other NetBIOS over TCP/IP (NBT) traffic\. By default Samba will query the kernel for the list of all active interfaces and use any interfaces except 127\.0\.0\.1 that are broadcast capable\. 3696 .sp 3697 The option takes a list of interface strings\. Each string can be in any of the following forms: 3698 .sp 3699 .RS 4 3700 .ie n \{\ 3701 \h'-04'\(bu\h'+03'\c 3702 .\} 3703 .el \{\ 3704 .sp -1 3705 .IP \(bu 2.3 3706 .\} 3707 a network interface name (such as eth0)\. This may include shell\-like wildcards so eth* will match any interface starting with the substring "eth" 3708 .RE 3709 .sp 3710 .RS 4 3711 .ie n \{\ 3712 \h'-04'\(bu\h'+03'\c 3713 .\} 3714 .el \{\ 3715 .sp -1 3716 .IP \(bu 2.3 3717 .\} 3718 an IP address\. In this case the netmask is determined from the list of interfaces obtained from the kernel 3719 .RE 3720 .sp 3721 .RS 4 3722 .ie n \{\ 3723 \h'-04'\(bu\h'+03'\c 3724 .\} 3725 .el \{\ 3726 .sp -1 3727 .IP \(bu 2.3 3728 .\} 3729 an IP/mask pair\. 3730 .RE 3731 .sp 3732 .RS 4 3733 .ie n \{\ 3734 \h'-04'\(bu\h'+03'\c 3735 .\} 3736 .el \{\ 3737 .sp -1 3738 .IP \(bu 2.3 3739 .\} 3740 a broadcast/mask pair\. 3741 .sp 3742 .RE 3743 The "mask" parameters can either be a bit length (such as 24 for a C class network) or a full netmask in dotted decimal form\. 3744 .sp 3745 The "IP" parameters above can either be a full dotted decimal IP address or a hostname which will be looked up via the OS\'s normal hostname resolution mechanisms\. 3746 .sp 3747 By default Samba enables all active interfaces that are broadcast capable except the loopback adaptor (IP address 127\.0\.0\.1)\. 3748 .sp 3749 The example below configures three network interfaces corresponding to the eth0 device and IP addresses 192\.168\.2\.10 and 192\.168\.3\.10\. The netmasks of the latter two interfaces would be set to 255\.255\.255\.0\. 3750 .sp 3751 Default: 3752 \fI\fIinterfaces\fR\fR\fI = \fR\fI\fR\fI \fR 3753 .sp 3754 Example: 3755 \fI\fIinterfaces\fR\fR\fI = \fR\fIeth0 192\.168\.2\.10/24 192\.168\.3\.10/255\.255\.255\.0\fR\fI \fR 4332 .\" interfaces 4333 .PP 4334 .RS 4 4335 This option allows you to override the default network interfaces list that Samba will use for browsing, name registration and other NetBIOS over TCP/IP (NBT) traffic\&. By default Samba will query the kernel for the list of all active interfaces and use any interfaces except 127\&.0\&.0\&.1 that are broadcast capable\&. 4336 .sp 4337 The option takes a list of interface strings\&. Each string can be in any of the following forms: 4338 .sp 4339 .RS 4 4340 .ie n \{\ 4341 \h'-04'\(bu\h'+03'\c 4342 .\} 4343 .el \{\ 4344 .sp -1 4345 .IP \(bu 2.3 4346 .\} 4347 a network interface name (such as eth0)\&. This may include shell\-like wildcards so eth* will match any interface starting with the substring "eth" 4348 .RE 4349 .sp 4350 .RS 4 4351 .ie n \{\ 4352 \h'-04'\(bu\h'+03'\c 4353 .\} 4354 .el \{\ 4355 .sp -1 4356 .IP \(bu 2.3 4357 .\} 4358 an IP address\&. In this case the netmask is determined from the list of interfaces obtained from the kernel 4359 .RE 4360 .sp 4361 .RS 4 4362 .ie n \{\ 4363 \h'-04'\(bu\h'+03'\c 4364 .\} 4365 .el \{\ 4366 .sp -1 4367 .IP \(bu 2.3 4368 .\} 4369 an IP/mask pair\&. 4370 .RE 4371 .sp 4372 .RS 4 4373 .ie n \{\ 4374 \h'-04'\(bu\h'+03'\c 4375 .\} 4376 .el \{\ 4377 .sp -1 4378 .IP \(bu 2.3 4379 .\} 4380 a broadcast/mask pair\&. 4381 .sp 4382 .RE 4383 The "mask" parameters can either be a bit length (such as 24 for a C class network) or a full netmask in dotted decimal form\&. 4384 .sp 4385 The "IP" parameters above can either be a full dotted decimal IP address or a hostname which will be looked up via the OS\'s normal hostname resolution mechanisms\&. 4386 .sp 4387 By default Samba enables all active interfaces that are broadcast capable except the loopback adaptor (IP address 127\&.0\&.0\&.1)\&. 4388 .sp 4389 The example below configures three network interfaces corresponding to the eth0 device and IP addresses 192\&.168\&.2\&.10 and 192\&.168\&.3\&.10\&. The netmasks of the latter two interfaces would be set to 255\&.255\&.255\&.0\&. 4390 .sp 4391 Default: 4392 \fI\fIinterfaces\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 4393 .sp 4394 Example: 4395 \fI\fIinterfaces\fR\fR\fI = \fR\fI\FCeth0 192\&.168\&.2\&.10/24 192\&.168\&.3\&.10/255\&.255\&.255\&.0\F[]\fR\fI \fR 3756 4396 .RE 3757 4397 3758 4398 invalid users (S) 3759 .PP 3760 .RS 4 3761 This is a list of users that should not be allowed to login to this service\. This is really a 4399 .\" invalid users 4400 .PP 4401 .RS 4 4402 This is a list of users that should not be allowed to login to this service\&. This is really a 3762 4403 \fIparanoid\fR 3763 check to absolutely ensure an improper setting does not breach your security\ .3764 .sp 3765 A name starting with a \'@\' is interpreted as an NIS netgroup first (if your system supports NIS), and then as a UNIX group if the name was not found in the NIS netgroup database\ .3766 .sp 3767 A name starting with \'+\' is interpreted only by looking in the UNIX group database via the NSS getgrnam() interface\ . A name starting with \'&\' is interpreted only by looking in the NIS netgroup database (this requires NIS to be working on your system)\. The characters \'+\' and \'&\' may be used at the start of the name in either order so the value4404 check to absolutely ensure an improper setting does not breach your security\&. 4405 .sp 4406 A name starting with a \'@\' is interpreted as an NIS netgroup first (if your system supports NIS), and then as a UNIX group if the name was not found in the NIS netgroup database\&. 4407 .sp 4408 A name starting with \'+\' is interpreted only by looking in the UNIX group database via the NSS getgrnam() interface\&. A name starting with \'&\' is interpreted only by looking in the NIS netgroup database (this requires NIS to be working on your system)\&. The characters \'+\' and \'&\' may be used at the start of the name in either order so the value 3768 4409 \fI+&group\fR 3769 4410 means check the UNIX group database, followed by the NIS netgroup database, and the value 3770 4411 \fI&+group\fR 3771 means check the NIS netgroup database, followed by the UNIX group database (the same as the \'@\' prefix)\ .4412 means check the NIS netgroup database, followed by the UNIX group database (the same as the \'@\' prefix)\&. 3772 4413 .sp 3773 4414 The current servicename is substituted for 3774 \fI%S\fR\ . This is useful in the [homes] section\.3775 .sp 3776 Default: 3777 \fI\fIinvalid users\fR\fR\fI = \fR\fI # no invalid users\fR\fI \fR3778 .sp 3779 Example: 3780 \fI\fIinvalid users\fR\fR\fI = \fR\fI root fred admin @wheel\fR\fI \fR4415 \fI%S\fR\&. This is useful in the [homes] section\&. 4416 .sp 4417 Default: 4418 \fI\fIinvalid users\fR\fR\fI = \fR\fI\FC # no invalid users\F[]\fR\fI \fR 4419 .sp 4420 Example: 4421 \fI\fIinvalid users\fR\fR\fI = \fR\fI\FCroot fred admin @wheel\F[]\fR\fI \fR 3781 4422 .RE 3782 4423 3783 4424 iprint server (G) 4425 .\" iprint server 3784 4426 .PP 3785 4427 .RS 4 3786 4428 This parameter is only applicable if 3787 \ fIprinting\fR4429 \m[blue]\fBprinting\fR\m[] 3788 4430 is set to 3789 \fBiprint\fR\ .4431 \fBiprint\fR\&. 3790 4432 .sp 3791 4433 If set, this option overrides the ServerName option in the CUPS 3792 \ fIclient\.conf\fR\. This is necessary if you have virtual samba servers that connect to different CUPS daemons\.3793 .sp 3794 Default: 3795 \fI\fIiprint server\fR\fR\fI = \fR\fI ""\fR\fI \fR3796 .sp 3797 Example: 3798 \fI\fIiprint server\fR\fR\fI = \fR\fI MYCUPSSERVER\fR\fI \fR4434 \FCclient\&.conf\F[]\&. This is necessary if you have virtual samba servers that connect to different CUPS daemons\&. 4435 .sp 4436 Default: 4437 \fI\fIiprint server\fR\fR\fI = \fR\fI\FC""\F[]\fR\fI \fR 4438 .sp 4439 Example: 4440 \fI\fIiprint server\fR\fR\fI = \fR\fI\FCMYCUPSSERVER\F[]\fR\fI \fR 3799 4441 .RE 3800 4442 3801 4443 keepalive (G) 4444 .\" keepalive 3802 4445 .PP 3803 4446 .RS 4 3804 4447 The value of the parameter (an integer) represents the number of seconds between 3805 4448 \fIkeepalive\fR 3806 packets\ . If this parameter is zero, no keepalive packets will be sent\. Keepalive packets, if sent, allow the server to tell whether a client is still present and responding\.3807 .sp 3808 Keepalives should, in general, not be needed if the socket has the SO_KEEPALIVE attribute set on it by default\ . (see3809 \ fIsocket options\fR)\. Basically you should only use this option if you strike difficulties\.3810 .sp 3811 Default: 3812 \fI\fIkeepalive\fR\fR\fI = \fR\fI 300\fR\fI \fR3813 .sp 3814 Example: 3815 \fI\fIkeepalive\fR\fR\fI = \fR\fI 600\fR\fI \fR4449 packets\&. If this parameter is zero, no keepalive packets will be sent\&. Keepalive packets, if sent, allow the server to tell whether a client is still present and responding\&. 4450 .sp 4451 Keepalives should, in general, not be needed if the socket has the SO_KEEPALIVE attribute set on it by default\&. (see 4452 \m[blue]\fBsocket options\fR\m[])\&. Basically you should only use this option if you strike difficulties\&. 4453 .sp 4454 Default: 4455 \fI\fIkeepalive\fR\fR\fI = \fR\fI\FC300\F[]\fR\fI \fR 4456 .sp 4457 Example: 4458 \fI\fIkeepalive\fR\fR\fI = \fR\fI\FC600\F[]\fR\fI \fR 3816 4459 .RE 3817 4460 3818 4461 kernel change notify (S) 3819 .PP 3820 .RS 4 3821 This parameter specifies whether Samba should ask the kernel for change notifications in directories so that SMB clients can refresh whenever the data on the server changes\. 3822 .sp 3823 This parameter is only used when your kernel supports change notification to user programs using the inotify interface\. 3824 .sp 3825 Default: 3826 \fI\fIkernel change notify\fR\fR\fI = \fR\fIyes\fR\fI \fR 4462 .\" kernel change notify 4463 .PP 4464 .RS 4 4465 This parameter specifies whether Samba should ask the kernel for change notifications in directories so that SMB clients can refresh whenever the data on the server changes\&. 4466 .sp 4467 This parameter is only used when your kernel supports change notification to user programs using the inotify interface\&. 4468 .sp 4469 Default: 4470 \fI\fIkernel change notify\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 3827 4471 .RE 3828 4472 3829 4473 kernel oplocks (G) 4474 .\" kernel oplocks 3830 4475 .PP 3831 4476 .RS 4 3832 4477 For UNIXes that support kernel based 3833 \ fIoplocks\fR3834 (currently only IRIX and the Linux 2\ .4 kernel), this parameter allows the use of them to be turned on or off\.4478 \m[blue]\fBoplocks\fR\m[] 4479 (currently only IRIX and the Linux 2\&.4 kernel), this parameter allows the use of them to be turned on or off\&. 3835 4480 .sp 3836 4481 Kernel oplocks support allows Samba … … 3838 4483 to be broken whenever a local UNIX process or NFS operation accesses a file that 3839 4484 \fBsmbd\fR(8) 3840 has oplocked\ . This allows complete data consistency between SMB/CIFS, NFS and local file access (and is a4485 has oplocked\&. This allows complete data consistency between SMB/CIFS, NFS and local file access (and is a 3841 4486 \fIvery\fR 3842 cool feature :\-)\ .4487 cool feature :\-)\&. 3843 4488 .sp 3844 4489 This parameter defaults to 3845 \fBon\fR, but is translated to a no\-op on systems that no not have the necessary kernel support\ . You should never need to touch this parameter\.3846 .sp 3847 Default: 3848 \fI\fIkernel oplocks\fR\fR\fI = \fR\fI yes\fR\fI \fR4490 \fBon\fR, but is translated to a no\-op on systems that no not have the necessary kernel support\&. You should never need to touch this parameter\&. 4491 .sp 4492 Default: 4493 \fI\fIkernel oplocks\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 3849 4494 .RE 3850 4495 3851 4496 lanman auth (G) 4497 .\" lanman auth 3852 4498 .PP 3853 4499 .RS 4 3854 4500 This parameter determines whether or not 3855 4501 \fBsmbd\fR(8) 3856 will attempt to authenticate users or permit password changes using the LANMAN password hash\ . If disabled, only clients which support NT password hashes (e\.g\. Windows NT/2000 clients, smbclient, but not Windows 95/98 or the MS DOS network client) will be able to connect to the Samba host\.3857 .sp 3858 The LANMAN encrypted response is easily broken, due to it\'s case\-insensitive nature, and the choice of algorithm\ . Servers without Windows 95/98/ME or MS DOS clients are advised to disable this option\.4502 will attempt to authenticate users or permit password changes using the LANMAN password hash\&. If disabled, only clients which support NT password hashes (e\&.g\&. Windows NT/2000 clients, smbclient, but not Windows 95/98 or the MS DOS network client) will be able to connect to the Samba host\&. 4503 .sp 4504 The LANMAN encrypted response is easily broken, due to it\'s case\-insensitive nature, and the choice of algorithm\&. Servers without Windows 95/98/ME or MS DOS clients are advised to disable this option\&. 3859 4505 .sp 3860 4506 Unlike the 3861 encrypt passwords 3862 option, this parameter cannot alter client behaviour, and the LANMAN response will still be sent over the network\ . See the3863 client lanman auth 4507 \FCencrypt passwords\F[] 4508 option, this parameter cannot alter client behaviour, and the LANMAN response will still be sent over the network\&. See the 4509 \FCclient lanman auth\F[] 3864 4510 to disable this for Samba\'s clients (such as smbclient) 3865 4511 .sp 3866 4512 If this option, and 3867 ntlm auth 3868 are both disabled, then only NTLMv2 logins will be permited\ . Not all clients support NTLMv2, and most will require special configuration to use it\.3869 .sp 3870 Default: 3871 \fI\fIlanman auth\fR\fR\fI = \fR\fI no\fR\fI \fR4513 \FCntlm auth\F[] 4514 are both disabled, then only NTLMv2 logins will be permited\&. Not all clients support NTLMv2, and most will require special configuration to use it\&. 4515 .sp 4516 Default: 4517 \fI\fIlanman auth\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 3872 4518 .RE 3873 4519 3874 4520 large readwrite (G) 4521 .\" large readwrite 3875 4522 .PP 3876 4523 .RS 4 3877 4524 This parameter determines whether or not 3878 4525 \fBsmbd\fR(8) 3879 supports the new 64k streaming read and write varient SMB requests introduced with Windows 2000\ . Note that due to Windows 2000 client redirector bugs this requires Samba to be running on a 64\-bit capable operating system such as IRIX, Solaris or a Linux 2\.4 kernel\. Can improve performance by 10% with Windows 2000 clients\. Defaults to on\. Not as tested as some other Samba code paths\.3880 .sp 3881 Default: 3882 \fI\fIlarge readwrite\fR\fR\fI = \fR\fI yes\fR\fI \fR4526 supports the new 64k streaming read and write varient SMB requests introduced with Windows 2000\&. Note that due to Windows 2000 client redirector bugs this requires Samba to be running on a 64\-bit capable operating system such as IRIX, Solaris or a Linux 2\&.4 kernel\&. Can improve performance by 10% with Windows 2000 clients\&. Defaults to on\&. Not as tested as some other Samba code paths\&. 4527 .sp 4528 Default: 4529 \fI\fIlarge readwrite\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 3883 4530 .RE 3884 4531 3885 4532 ldap admin dn (G) 4533 .\" ldap admin dn 3886 4534 .PP 3887 4535 .RS 4 3888 4536 The 3889 \ fIldap admin dn\fR3890 defines the Distinguished Name (DN) name used by Samba to contact the ldap server when retreiving user account information\ . The3891 \ fIldap admin dn\fR4537 \m[blue]\fBldap admin dn\fR\m[] 4538 defines the Distinguished Name (DN) name used by Samba to contact the ldap server when retreiving user account information\&. The 4539 \m[blue]\fBldap admin dn\fR\m[] 3892 4540 is used in conjunction with the admin dn password stored in the 3893 \ fIprivate/secrets\.tdb\fR3894 file\ . See the4541 \FCprivate/secrets\&.tdb\F[] 4542 file\&. See the 3895 4543 \fBsmbpasswd\fR(8) 3896 man page for more information on how to accomplish this\ .4544 man page for more information on how to accomplish this\&. 3897 4545 .sp 3898 4546 The 3899 \ fIldap admin dn\fR3900 requires a fully specified DN\ . The3901 \ fIldap suffix\fR4547 \m[blue]\fBldap admin dn\fR\m[] 4548 requires a fully specified DN\&. The 4549 \m[blue]\fBldap suffix\fR\m[] 3902 4550 is not appended to the 3903 \ fIldap admin dn\fR\.4551 \m[blue]\fBldap admin dn\fR\m[]\&. 3904 4552 .sp 3905 4553 \fINo default\fR … … 3907 4555 3908 4556 ldap connection timeout (G) 3909 .PP 3910 .RS 4 3911 This parameter tells the LDAP library calls which timeout in seconds they should honor during initial connection establishments to LDAP servers\. It is very useful in failover scenarios in particular\. If one or more LDAP servers are not reachable at all, we do not have to wait until TCP timeouts are over\. This feature must be supported by your LDAP library\. 4557 .\" ldap connection timeout 4558 .PP 4559 .RS 4 4560 This parameter tells the LDAP library calls which timeout in seconds they should honor during initial connection establishments to LDAP servers\&. It is very useful in failover scenarios in particular\&. If one or more LDAP servers are not reachable at all, we do not have to wait until TCP timeouts are over\&. This feature must be supported by your LDAP library\&. 3912 4561 .sp 3913 4562 This parameter is different from 3914 \ fIldap timeout\fR3915 which affects operations on LDAP servers using an existing connection and not establishing an initial connection\ .3916 .sp 3917 Default: 3918 \fI\fIldap connection timeout\fR\fR\fI = \fR\fI 2\fR\fI \fR4563 \m[blue]\fBldap timeout\fR\m[] 4564 which affects operations on LDAP servers using an existing connection and not establishing an initial connection\&. 4565 .sp 4566 Default: 4567 \fI\fIldap connection timeout\fR\fR\fI = \fR\fI\FC2\F[]\fR\fI \fR 3919 4568 .RE 3920 4569 3921 4570 ldap debug level (G) 3922 .PP 3923 .RS 4 3924 This parameter controls the debug level of the LDAP library calls\. In the case of OpenLDAP, it is the same bit\-field as understood by the server and documented in the 4571 .\" ldap debug level 4572 .PP 4573 .RS 4 4574 This parameter controls the debug level of the LDAP library calls\&. In the case of OpenLDAP, it is the same bit\-field as understood by the server and documented in the 3925 4575 \fBslapd.conf\fR(5) 3926 manpage\ . A typical useful value will be4576 manpage\&. A typical useful value will be 3927 4577 \fI1\fR 3928 for tracing function calls\ .3929 .sp 3930 The debug ouput from the LDAP libraries appears with the prefix [LDAP] in Samba\'s logging output\ . The level at which LDAP logging is printed is controlled by the parameter3931 \fIldap debug threshold\fR\ .3932 .sp 3933 Default: 3934 \fI\fIldap debug level\fR\fR\fI = \fR\fI 0\fR\fI \fR3935 .sp 3936 Example: 3937 \fI\fIldap debug level\fR\fR\fI = \fR\fI 1\fR\fI \fR4578 for tracing function calls\&. 4579 .sp 4580 The debug ouput from the LDAP libraries appears with the prefix [LDAP] in Samba\'s logging output\&. The level at which LDAP logging is printed is controlled by the parameter 4581 \fIldap debug threshold\fR\&. 4582 .sp 4583 Default: 4584 \fI\fIldap debug level\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 4585 .sp 4586 Example: 4587 \fI\fIldap debug level\fR\fR\fI = \fR\fI\FC1\F[]\fR\fI \fR 3938 4588 .RE 3939 4589 3940 4590 ldap debug threshold (G) 3941 .PP 3942 .RS 4 3943 This parameter controls the Samba debug level at which the ldap library debug output is printed in the Samba logs\. See the description of 4591 .\" ldap debug threshold 4592 .PP 4593 .RS 4 4594 This parameter controls the Samba debug level at which the ldap library debug output is printed in the Samba logs\&. See the description of 3944 4595 \fIldap debug level\fR 3945 for details\ .3946 .sp 3947 Default: 3948 \fI\fIldap debug threshold\fR\fR\fI = \fR\fI 10\fR\fI \fR3949 .sp 3950 Example: 3951 \fI\fIldap debug threshold\fR\fR\fI = \fR\fI 5\fR\fI \fR4596 for details\&. 4597 .sp 4598 Default: 4599 \fI\fIldap debug threshold\fR\fR\fI = \fR\fI\FC10\F[]\fR\fI \fR 4600 .sp 4601 Example: 4602 \fI\fIldap debug threshold\fR\fR\fI = \fR\fI\FC5\F[]\fR\fI \fR 3952 4603 .RE 3953 4604 3954 4605 ldap delete dn (G) 3955 .PP 3956 .RS 4 3957 This parameter specifies whether a delete operation in the ldapsam deletes the complete entry or only the attributes specific to Samba\. 3958 .sp 3959 Default: 3960 \fI\fIldap delete dn\fR\fR\fI = \fR\fIno\fR\fI \fR 4606 .\" ldap delete dn 4607 .PP 4608 .RS 4 4609 This parameter specifies whether a delete operation in the ldapsam deletes the complete entry or only the attributes specific to Samba\&. 4610 .sp 4611 Default: 4612 \fI\fIldap delete dn\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 3961 4613 .RE 3962 4614 3963 4615 ldap group suffix (G) 3964 .PP 3965 .RS 4 3966 This parameter specifies the suffix that is used for groups when these are added to the LDAP directory\. If this parameter is unset, the value of 3967 \fIldap suffix\fR 3968 will be used instead\. The suffix string is pre\-pended to the 3969 \fIldap suffix\fR 3970 string so use a partial DN\. 3971 .sp 3972 Default: 3973 \fI\fIldap group suffix\fR\fR\fI = \fR\fI\fR\fI \fR 3974 .sp 3975 Example: 3976 \fI\fIldap group suffix\fR\fR\fI = \fR\fIou=Groups\fR\fI \fR 4616 .\" ldap group suffix 4617 .PP 4618 .RS 4 4619 This parameter specifies the suffix that is used for groups when these are added to the LDAP directory\&. If this parameter is unset, the value of 4620 \m[blue]\fBldap suffix\fR\m[] 4621 will be used instead\&. The suffix string is pre\-pended to the 4622 \m[blue]\fBldap suffix\fR\m[] 4623 string so use a partial DN\&. 4624 .sp 4625 Default: 4626 \fI\fIldap group suffix\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 4627 .sp 4628 Example: 4629 \fI\fIldap group suffix\fR\fR\fI = \fR\fI\FCou=Groups\F[]\fR\fI \fR 3977 4630 .RE 3978 4631 3979 4632 ldap idmap suffix (G) 3980 .PP 3981 .RS 4 3982 This parameters specifies the suffix that is used when storing idmap mappings\. If this parameter is unset, the value of 3983 \fIldap suffix\fR 3984 will be used instead\. The suffix string is pre\-pended to the 3985 \fIldap suffix\fR 3986 string so use a partial DN\. 3987 .sp 3988 Default: 3989 \fI\fIldap idmap suffix\fR\fR\fI = \fR\fI\fR\fI \fR 3990 .sp 3991 Example: 3992 \fI\fIldap idmap suffix\fR\fR\fI = \fR\fIou=Idmap\fR\fI \fR 4633 .\" ldap idmap suffix 4634 .PP 4635 .RS 4 4636 This parameters specifies the suffix that is used when storing idmap mappings\&. If this parameter is unset, the value of 4637 \m[blue]\fBldap suffix\fR\m[] 4638 will be used instead\&. The suffix string is pre\-pended to the 4639 \m[blue]\fBldap suffix\fR\m[] 4640 string so use a partial DN\&. 4641 .sp 4642 Default: 4643 \fI\fIldap idmap suffix\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 4644 .sp 4645 Example: 4646 \fI\fIldap idmap suffix\fR\fR\fI = \fR\fI\FCou=Idmap\F[]\fR\fI \fR 3993 4647 .RE 3994 4648 3995 4649 ldap machine suffix (G) 3996 .PP 3997 .RS 4 3998 It specifies where machines should be added to the ldap tree\. If this parameter is unset, the value of 3999 \fIldap suffix\fR 4000 will be used instead\. The suffix string is pre\-pended to the 4001 \fIldap suffix\fR 4002 string so use a partial DN\. 4003 .sp 4004 Default: 4005 \fI\fIldap machine suffix\fR\fR\fI = \fR\fI\fR\fI \fR 4006 .sp 4007 Example: 4008 \fI\fIldap machine suffix\fR\fR\fI = \fR\fIou=Computers\fR\fI \fR 4650 .\" ldap machine suffix 4651 .PP 4652 .RS 4 4653 It specifies where machines should be added to the ldap tree\&. If this parameter is unset, the value of 4654 \m[blue]\fBldap suffix\fR\m[] 4655 will be used instead\&. The suffix string is pre\-pended to the 4656 \m[blue]\fBldap suffix\fR\m[] 4657 string so use a partial DN\&. 4658 .sp 4659 Default: 4660 \fI\fIldap machine suffix\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 4661 .sp 4662 Example: 4663 \fI\fIldap machine suffix\fR\fR\fI = \fR\fI\FCou=Computers\F[]\fR\fI \fR 4009 4664 .RE 4010 4665 4011 4666 ldap passwd sync (G) 4012 .PP 4013 .RS 4 4014 This option is used to define whether or not Samba should sync the LDAP password with the NT and LM hashes for normal accounts (NOT for workstation, server or domain trusts) on a password change via SAMBA\. 4667 .\" ldap passwd sync 4668 .PP 4669 .RS 4 4670 This option is used to define whether or not Samba should sync the LDAP password with the NT and LM hashes for normal accounts (NOT for workstation, server or domain trusts) on a password change via SAMBA\&. 4015 4671 .sp 4016 4672 The 4017 \ fIldap passwd sync\fR4673 \m[blue]\fBldap passwd sync\fR\m[] 4018 4674 can be set to one of three values: 4019 4675 .sp … … 4027 4683 .\} 4028 4684 \fIYes\fR 4029 = Try to update the LDAP, NT and LM passwords and update the pwdLastSet time\ .4685 = Try to update the LDAP, NT and LM passwords and update the pwdLastSet time\&. 4030 4686 .RE 4031 4687 .sp … … 4039 4695 .\} 4040 4696 \fINo\fR 4041 = Update NT and LM passwords and update the pwdLastSet time\ .4697 = Update NT and LM passwords and update the pwdLastSet time\&. 4042 4698 .RE 4043 4699 .sp … … 4051 4707 .\} 4052 4708 \fIOnly\fR 4053 = Only update the LDAP password and let the LDAP server do the rest\ .4054 .sp 4055 .RE 4056 Default: 4057 \fI\fIldap passwd sync\fR\fR\fI = \fR\fI no\fR\fI \fR4709 = Only update the LDAP password and let the LDAP server do the rest\&. 4710 .sp 4711 .RE 4712 Default: 4713 \fI\fIldap passwd sync\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 4058 4714 .RE 4059 4715 4060 4716 ldap replication sleep (G) 4061 .PP 4062 .RS 4 4063 When Samba is asked to write to a read\-only LDAP replica, we are redirected to talk to the read\-write master server\. This server then replicates our changes back to the \'local\' server, however the replication might take some seconds, especially over slow links\. Certain client activities, particularly domain joins, can become confused by the \'success\' that does not immediately change the LDAP back\-end\'s data\. 4064 .sp 4065 This option simply causes Samba to wait a short time, to allow the LDAP server to catch up\. If you have a particularly high\-latency network, you may wish to time the LDAP replication with a network sniffer, and increase this value accordingly\. Be aware that no checking is performed that the data has actually replicated\. 4066 .sp 4067 The value is specified in milliseconds, the maximum value is 5000 (5 seconds)\. 4068 .sp 4069 Default: 4070 \fI\fIldap replication sleep\fR\fR\fI = \fR\fI1000\fR\fI \fR 4717 .\" ldap replication sleep 4718 .PP 4719 .RS 4 4720 When Samba is asked to write to a read\-only LDAP replica, we are redirected to talk to the read\-write master server\&. This server then replicates our changes back to the \'local\' server, however the replication might take some seconds, especially over slow links\&. Certain client activities, particularly domain joins, can become confused by the \'success\' that does not immediately change the LDAP back\-end\'s data\&. 4721 .sp 4722 This option simply causes Samba to wait a short time, to allow the LDAP server to catch up\&. If you have a particularly high\-latency network, you may wish to time the LDAP replication with a network sniffer, and increase this value accordingly\&. Be aware that no checking is performed that the data has actually replicated\&. 4723 .sp 4724 The value is specified in milliseconds, the maximum value is 5000 (5 seconds)\&. 4725 .sp 4726 Default: 4727 \fI\fIldap replication sleep\fR\fR\fI = \fR\fI\FC1000\F[]\fR\fI \fR 4071 4728 .RE 4072 4729 4073 4730 ldapsam:editposix (G) 4074 .PP 4075 .RS 4 4076 Editposix is an option that leverages ldapsam:trusted to make it simpler to manage a domain controller eliminating the need to set up custom scripts to add and manage the posix users and groups\. This option will instead directly manipulate the ldap tree to create, remove and modify user and group entries\. This option also requires a running winbindd as it is used to allocate new uids/gids on user/group creation\. The allocation range must be therefore configured\. 4077 .sp 4078 To use this option, a basic ldap tree must be provided and the ldap suffix parameters must be properly configured\. On virgin servers the default users and groups (Administrator, Guest, Domain Users, Domain Admins, Domain Guests) can be precreated with the command 4079 net sam provision\. To run this command the ldap server must be running, Winindd must be running and the smb\.conf ldap options must be properly configured\. The typical ldap setup used with the 4080 \fIldapsam:trusted = yes\fR 4731 .\" ldapsam:editposix 4732 .PP 4733 .RS 4 4734 Editposix is an option that leverages ldapsam:trusted to make it simpler to manage a domain controller eliminating the need to set up custom scripts to add and manage the posix users and groups\&. This option will instead directly manipulate the ldap tree to create, remove and modify user and group entries\&. This option also requires a running winbindd as it is used to allocate new uids/gids on user/group creation\&. The allocation range must be therefore configured\&. 4735 .sp 4736 To use this option, a basic ldap tree must be provided and the ldap suffix parameters must be properly configured\&. On virgin servers the default users and groups (Administrator, Guest, Domain Users, Domain Admins, Domain Guests) can be precreated with the command 4737 \FCnet sam provision\F[]\&. To run this command the ldap server must be running, Winindd must be running and the smb\&.conf ldap options must be properly configured\&. The typical ldap setup used with the 4738 \m[blue]\fBldapsam:trusted = yes\fR\m[] 4081 4739 option is usually sufficient to use 4082 \ fIldapsam:editposix = yes\fR4083 as well\ .4740 \m[blue]\fBldapsam:editposix = yes\fR\m[] 4741 as well\&. 4084 4742 .sp 4085 4743 An example configuration can be the following: 4086 4744 .sp 4087 .RS 4 4745 .if n \{\ 4746 .RS 4 4747 .\} 4748 .fam C 4749 .ps -1 4088 4750 .nf 4751 .if t \{\ 4752 .sp -1 4753 .\} 4754 .BB lightgray adjust-for-leading-newline 4755 .sp -1 4756 4089 4757 encrypt passwords = true 4090 4758 passdb backend = ldapsam … … 4106 4774 idmap gid = 5000\-50000 4107 4775 4776 .EB lightgray adjust-for-leading-newline 4777 .if t \{\ 4778 .sp 1 4779 .\} 4108 4780 .fi 4109 .RE 4781 .fam 4782 .ps +1 4783 .if n \{\ 4784 .RE 4785 .\} 4110 4786 .sp 4111 4787 This configuration assumes a directory layout like described in the following ldif: 4112 4788 .sp 4113 .RS 4 4789 .if n \{\ 4790 .RS 4 4791 .\} 4792 .fam C 4793 .ps -1 4114 4794 .nf 4795 .if t \{\ 4796 .sp -1 4797 .\} 4798 .BB lightgray adjust-for-leading-newline 4799 .sp -1 4800 4115 4801 dn: dc=samba,dc=org 4116 4802 objectClass: top 4117 4803 objectClass: dcObject 4118 4804 objectClass: organization 4119 o: samba\ .org4805 o: samba\&.org 4120 4806 dc: samba 4121 4807 … … 4147 4833 ou: computers 4148 4834 4835 .EB lightgray adjust-for-leading-newline 4836 .if t \{\ 4837 .sp 1 4838 .\} 4149 4839 .fi 4150 .RE 4151 .sp 4152 .sp 4153 Default: 4154 \fI\fIldapsam:editposix\fR\fR\fI = \fR\fIno\fR\fI \fR 4840 .fam 4841 .ps +1 4842 .if n \{\ 4843 .RE 4844 .\} 4845 .sp 4846 Default: 4847 \fI\fIldapsam:editposix\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 4155 4848 .RE 4156 4849 4157 4850 ldapsam:trusted (G) 4158 .PP 4159 .RS 4 4160 By default, Samba as a Domain Controller with an LDAP backend needs to use the Unix\-style NSS subsystem to access user and group information\. Due to the way Unix stores user information in /etc/passwd and /etc/group this inevitably leads to inefficiencies\. One important question a user needs to know is the list of groups he is member of\. The plain UNIX model involves a complete enumeration of the file /etc/group and its NSS counterparts in LDAP\. UNIX has optimized functions to enumerate group membership\. Sadly, other functions that are used to deal with user and group attributes lack such optimization\. 4851 .\" ldapsam:trusted 4852 .PP 4853 .RS 4 4854 By default, Samba as a Domain Controller with an LDAP backend needs to use the Unix\-style NSS subsystem to access user and group information\&. Due to the way Unix stores user information in /etc/passwd and /etc/group this inevitably leads to inefficiencies\&. One important question a user needs to know is the list of groups he is member of\&. The plain UNIX model involves a complete enumeration of the file /etc/group and its NSS counterparts in LDAP\&. UNIX has optimized functions to enumerate group membership\&. Sadly, other functions that are used to deal with user and group attributes lack such optimization\&. 4161 4855 .sp 4162 4856 To make Samba scale well in large environments, the 4163 \ fIldapsam:trusted = yes\fR4164 option assumes that the complete user and group database that is relevant to Samba is stored in LDAP with the standard posixAccount/posixGroup attributes\ . It further assumes that the Samba auxiliary object classes are stored together with the POSIX data in the same LDAP object\. If these assumptions are met,4165 \ fIldapsam:trusted = yes\fR4166 can be activated and Samba can bypass the NSS system to query user group memberships\ . Optimized LDAP queries can greatly speed up domain logon and administration tasks\. Depending on the size of the LDAP database a factor of 100 or more for common queries is easily achieved\.4167 .sp 4168 Default: 4169 \fI\fIldapsam:trusted\fR\fR\fI = \fR\fI no\fR\fI \fR4857 \m[blue]\fBldapsam:trusted = yes\fR\m[] 4858 option assumes that the complete user and group database that is relevant to Samba is stored in LDAP with the standard posixAccount/posixGroup attributes\&. It further assumes that the Samba auxiliary object classes are stored together with the POSIX data in the same LDAP object\&. If these assumptions are met, 4859 \m[blue]\fBldapsam:trusted = yes\fR\m[] 4860 can be activated and Samba can bypass the NSS system to query user group memberships\&. Optimized LDAP queries can greatly speed up domain logon and administration tasks\&. Depending on the size of the LDAP database a factor of 100 or more for common queries is easily achieved\&. 4861 .sp 4862 Default: 4863 \fI\fIldapsam:trusted\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 4170 4864 .RE 4171 4865 4172 4866 ldap ssl (G) 4867 .\" ldap ssl 4173 4868 .PP 4174 4869 .RS 4 … … 4176 4871 \fINOT\fR 4177 4872 related to Samba\'s previous SSL support which was enabled by specifying the 4178 \ -\-with\-ssl4873 \FC\-\-with\-ssl\F[] 4179 4874 option to the 4180 \fIconfigure\fR 4181 script\. 4875 \FCconfigure\F[] 4876 script\&. 4877 .sp 4878 LDAP connections should be secured where possible\&. This may be done setting either this parameter to 4879 \fIStart_tls\fR 4880 or by specifying 4881 \fIldaps://\fR 4882 in the URL argument of 4883 \m[blue]\fBpassdb backend\fR\m[]\&. 4182 4884 .sp 4183 4885 The 4184 \ fIldap ssl\fR4185 can be set to one of t hreevalues:4886 \m[blue]\fBldap ssl\fR\m[] 4887 can be set to one of two values: 4186 4888 .sp 4187 4889 .RS 4 … … 4194 4896 .\} 4195 4897 \fIOff\fR 4196 = Never use SSL when querying the directory\ .4898 = Never use SSL when querying the directory\&. 4197 4899 .RE 4198 4900 .sp … … 4206 4908 .\} 4207 4909 \fIStart_tls\fR 4208 = Use the LDAPv3 StartTLS extended operation (RFC2830) for communicating with the directory server\. 4209 .RE 4210 .sp 4211 .RS 4 4212 .ie n \{\ 4213 \h'-04'\(bu\h'+03'\c 4214 .\} 4215 .el \{\ 4216 .sp -1 4217 .IP \(bu 2.3 4218 .\} 4219 \fIOn\fR 4220 = Use SSL on the ldaps port when contacting the 4221 \fIldap server\fR\. Only available when the backwards\-compatiblity 4222 \-\-with\-ldapsam 4223 option is specified to configure\. See 4224 \fIpassdb backend\fR 4225 \. 4226 .sp 4227 .RE 4228 Default: 4229 \fI\fIldap ssl\fR\fR\fI = \fR\fIstart_tls\fR\fI \fR 4910 = Use the LDAPv3 StartTLS extended operation (RFC2830) for communicating with the directory server\&. 4911 .sp 4912 .RE 4913 Default: 4914 \fI\fIldap ssl\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 4230 4915 .RE 4231 4916 4232 4917 ldap suffix (G) 4233 .PP 4234 .RS 4 4235 Specifies the base for all ldap suffixes and for storing the sambaDomain object\. 4918 .\" ldap suffix 4919 .PP 4920 .RS 4 4921 Specifies the base for all ldap suffixes and for storing the sambaDomain object\&. 4236 4922 .sp 4237 4923 The ldap suffix will be appended to the values specified for the 4238 \ fIldap user suffix\fR,4239 \ fIldap group suffix\fR,4240 \ fIldap machine suffix\fR, and the4241 \ fIldap idmap suffix\fR\. Each of these should be given only a DN relative to the4242 \ fIldap suffix\fR\.4243 .sp 4244 Default: 4245 \fI\fIldap suffix\fR\fR\fI = \fR\fI\ fR\fI \fR4246 .sp 4247 Example: 4248 \fI\fIldap suffix\fR\fR\fI = \fR\fI dc=samba,dc=org\fR\fI \fR4924 \m[blue]\fBldap user suffix\fR\m[], 4925 \m[blue]\fBldap group suffix\fR\m[], 4926 \m[blue]\fBldap machine suffix\fR\m[], and the 4927 \m[blue]\fBldap idmap suffix\fR\m[]\&. Each of these should be given only a DN relative to the 4928 \m[blue]\fBldap suffix\fR\m[]\&. 4929 .sp 4930 Default: 4931 \fI\fIldap suffix\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 4932 .sp 4933 Example: 4934 \fI\fIldap suffix\fR\fR\fI = \fR\fI\FCdc=samba,dc=org\F[]\fR\fI \fR 4249 4935 .RE 4250 4936 4251 4937 ldap timeout (G) 4252 .PP 4253 .RS 4 4254 When Samba connects to an ldap server that server may be down or unreachable\. To prevent Samba from hanging whilst waiting for the connection this parameter specifies in seconds how long Samba should wait before failing the connect\. The default is to only wait fifteen seconds for the ldap server to respond to the connect request\. 4255 .sp 4256 Default: 4257 \fI\fIldap timeout\fR\fR\fI = \fR\fI15\fR\fI \fR 4938 .\" ldap timeout 4939 .PP 4940 .RS 4 4941 This parameter defines the number of seconds that Samba should use as timeout for LDAP operations\&. 4942 .sp 4943 Default: 4944 \fI\fIldap timeout\fR\fR\fI = \fR\fI\FC15\F[]\fR\fI \fR 4258 4945 .RE 4259 4946 4260 4947 ldap user suffix (G) 4261 .PP 4262 .RS 4 4263 This parameter specifies where users are added to the tree\. If this parameter is unset, the value of 4264 \fIldap suffix\fR 4265 will be used instead\. The suffix string is pre\-pended to the 4266 \fIldap suffix\fR 4267 string so use a partial DN\. 4268 .sp 4269 Default: 4270 \fI\fIldap user suffix\fR\fR\fI = \fR\fI\fR\fI \fR 4271 .sp 4272 Example: 4273 \fI\fIldap user suffix\fR\fR\fI = \fR\fIou=people\fR\fI \fR 4948 .\" ldap user suffix 4949 .PP 4950 .RS 4 4951 This parameter specifies where users are added to the tree\&. If this parameter is unset, the value of 4952 \m[blue]\fBldap suffix\fR\m[] 4953 will be used instead\&. The suffix string is pre\-pended to the 4954 \m[blue]\fBldap suffix\fR\m[] 4955 string so use a partial DN\&. 4956 .sp 4957 Default: 4958 \fI\fIldap user suffix\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 4959 .sp 4960 Example: 4961 \fI\fIldap user suffix\fR\fR\fI = \fR\fI\FCou=people\F[]\fR\fI \fR 4274 4962 .RE 4275 4963 4276 4964 level2 oplocks (S) 4277 .PP 4278 .RS 4 4279 This parameter controls whether Samba supports level2 (read\-only) oplocks on a share\. 4280 .sp 4281 Level2, or read\-only oplocks allow Windows NT clients that have an oplock on a file to downgrade from a read\-write oplock to a read\-only oplock once a second client opens the file (instead of releasing all oplocks on a second open, as in traditional, exclusive oplocks)\. This allows all openers of the file that support level2 oplocks to cache the file for read\-ahead only (ie\. they may not cache writes or lock requests) and increases performance for many accesses of files that are not commonly written (such as application \.EXE files)\. 4282 .sp 4283 Once one of the clients which have a read\-only oplock writes to the file all clients are notified (no reply is needed or waited for) and told to break their oplocks to "none" and delete any read\-ahead caches\. 4284 .sp 4285 It is recommended that this parameter be turned on to speed access to shared executables\. 4286 .sp 4287 For more discussions on level2 oplocks see the CIFS spec\. 4965 .\" level2 oplocks 4966 .PP 4967 .RS 4 4968 This parameter controls whether Samba supports level2 (read\-only) oplocks on a share\&. 4969 .sp 4970 Level2, or read\-only oplocks allow Windows NT clients that have an oplock on a file to downgrade from a read\-write oplock to a read\-only oplock once a second client opens the file (instead of releasing all oplocks on a second open, as in traditional, exclusive oplocks)\&. This allows all openers of the file that support level2 oplocks to cache the file for read\-ahead only (ie\&. they may not cache writes or lock requests) and increases performance for many accesses of files that are not commonly written (such as application \&.EXE files)\&. 4971 .sp 4972 Once one of the clients which have a read\-only oplock writes to the file all clients are notified (no reply is needed or waited for) and told to break their oplocks to "none" and delete any read\-ahead caches\&. 4973 .sp 4974 It is recommended that this parameter be turned on to speed access to shared executables\&. 4975 .sp 4976 For more discussions on level2 oplocks see the CIFS spec\&. 4288 4977 .sp 4289 4978 Currently, if 4290 \ fIkernel oplocks\fR4979 \m[blue]\fBkernel oplocks\fR\m[] 4291 4980 are supported then level2 oplocks are not granted (even if this parameter is set to 4292 \fByes\fR)\ . Note also, the4293 \ fIoplocks\fR4981 \fByes\fR)\&. Note also, the 4982 \m[blue]\fBoplocks\fR\m[] 4294 4983 parameter must be set to 4295 4984 \fByes\fR 4296 on this share in order for this parameter to have any effect\ .4297 .sp 4298 Default: 4299 \fI\fIlevel2 oplocks\fR\fR\fI = \fR\fI yes\fR\fI \fR4985 on this share in order for this parameter to have any effect\&. 4986 .sp 4987 Default: 4988 \fI\fIlevel2 oplocks\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 4300 4989 .RE 4301 4990 4302 4991 lm announce (G) 4992 .\" lm announce 4303 4993 .PP 4304 4994 .RS 4 4305 4995 This parameter determines if 4306 4996 \fBnmbd\fR(8) 4307 will produce Lanman announce broadcasts that are needed by OS/2 clients in order for them to see the Samba server in their browse list\ . This parameter can have three values,4997 will produce Lanman announce broadcasts that are needed by OS/2 clients in order for them to see the Samba server in their browse list\&. This parameter can have three values, 4308 4998 \fByes\fR, 4309 4999 \fBno\fR, or 4310 \fBauto\fR\ . The default is4311 \fBauto\fR\ . If set to5000 \fBauto\fR\&. The default is 5001 \fBauto\fR\&. If set to 4312 5002 \fBno\fR 4313 Samba will never produce these broadcasts\ . If set to5003 Samba will never produce these broadcasts\&. If set to 4314 5004 \fByes\fR 4315 5005 Samba will produce Lanman announce broadcasts at a frequency set by the parameter 4316 \ fIlm interval\fR\. If set to5006 \m[blue]\fBlm interval\fR\m[]\&. If set to 4317 5007 \fBauto\fR 4318 Samba will not send Lanman announce broadcasts by default but will listen for them\ . If it hears such a broadcast on the wire it will then start sending them at a frequency set by the parameter4319 \ fIlm interval\fR\.4320 .sp 4321 Default: 4322 \fI\fIlm announce\fR\fR\fI = \fR\fI auto\fR\fI \fR4323 .sp 4324 Example: 4325 \fI\fIlm announce\fR\fR\fI = \fR\fI yes\fR\fI \fR5008 Samba will not send Lanman announce broadcasts by default but will listen for them\&. If it hears such a broadcast on the wire it will then start sending them at a frequency set by the parameter 5009 \m[blue]\fBlm interval\fR\m[]\&. 5010 .sp 5011 Default: 5012 \fI\fIlm announce\fR\fR\fI = \fR\fI\FCauto\F[]\fR\fI \fR 5013 .sp 5014 Example: 5015 \fI\fIlm announce\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 4326 5016 .RE 4327 5017 4328 5018 lm interval (G) 5019 .\" lm interval 4329 5020 .PP 4330 5021 .RS 4 4331 5022 If Samba is set to produce Lanman announce broadcasts needed by OS/2 clients (see the 4332 \ fIlm announce\fR4333 parameter) then this parameter defines the frequency in seconds with which they will be made\ . If this is set to zero then no Lanman announcements will be made despite the setting of the4334 \ fIlm announce\fR4335 parameter\ .4336 .sp 4337 Default: 4338 \fI\fIlm interval\fR\fR\fI = \fR\fI 60\fR\fI \fR4339 .sp 4340 Example: 4341 \fI\fIlm interval\fR\fR\fI = \fR\fI 120\fR\fI \fR5023 \m[blue]\fBlm announce\fR\m[] 5024 parameter) then this parameter defines the frequency in seconds with which they will be made\&. If this is set to zero then no Lanman announcements will be made despite the setting of the 5025 \m[blue]\fBlm announce\fR\m[] 5026 parameter\&. 5027 .sp 5028 Default: 5029 \fI\fIlm interval\fR\fR\fI = \fR\fI\FC60\F[]\fR\fI \fR 5030 .sp 5031 Example: 5032 \fI\fIlm interval\fR\fR\fI = \fR\fI\FC120\F[]\fR\fI \fR 4342 5033 .RE 4343 5034 4344 5035 load printers (G) 4345 .PP 4346 .RS 4 4347 A boolean variable that controls whether all printers in the printcap will be loaded for browsing by default\. See the 4348 \fIprinters\fR 4349 section for more details\. 4350 .sp 4351 Default: 4352 \fI\fIload printers\fR\fR\fI = \fR\fIyes\fR\fI \fR 5036 .\" load printers 5037 .PP 5038 .RS 4 5039 A boolean variable that controls whether all printers in the printcap will be loaded for browsing by default\&. See the 5040 \m[blue]\fBprinters\fR\m[] 5041 section for more details\&. 5042 .sp 5043 Default: 5044 \fI\fIload printers\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 4353 5045 .RE 4354 5046 4355 5047 local master (G) 5048 .\" local master 4356 5049 .PP 4357 5050 .RS 4 4358 5051 This option allows 4359 5052 \fBnmbd\fR(8) 4360 to try and become a local master browser on a subnet\ . If set to5053 to try and become a local master browser on a subnet\&. If set to 4361 5054 \fBno\fR 4362 5055 then 4363 nmbd 4364 will not attempt to become a local master browser on a subnet and will also lose in all browsing elections\ . By default this value is set to4365 \fByes\fR\ . Setting this value to5056 \FC nmbd\F[] 5057 will not attempt to become a local master browser on a subnet and will also lose in all browsing elections\&. By default this value is set to 5058 \fByes\fR\&. Setting this value to 4366 5059 \fByes\fR 4367 5060 doesn\'t mean that Samba will 4368 5061 \fIbecome\fR 4369 5062 the local master browser on a subnet, just that 4370 nmbd 5063 \FCnmbd\F[] 4371 5064 will 4372 5065 \fIparticipate\fR 4373 in elections for local master browser\ .5066 in elections for local master browser\&. 4374 5067 .sp 4375 5068 Setting this value to 4376 5069 \fBno\fR 4377 5070 will cause 4378 nmbd 5071 \FCnmbd\F[] 4379 5072 \fInever\fR 4380 to become a local master browser\ .4381 .sp 4382 Default: 4383 \fI\fIlocal master\fR\fR\fI = \fR\fI yes\fR\fI \fR5073 to become a local master browser\&. 5074 .sp 5075 Default: 5076 \fI\fIlocal master\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 4384 5077 .RE 4385 5078 4386 5079 lock dir 5080 .\" lock dir 4387 5081 .PP 4388 5082 .RS 4 4389 5083 This parameter is a synonym for 4390 lock directory\ .5084 lock directory\&. 4391 5085 .RE 4392 5086 4393 5087 lock directory (G) 4394 .PP 4395 .RS 4 4396 This option specifies the directory where lock files will be placed\. The lock files are used to implement the 4397 \fImax connections\fR 4398 option\. 4399 .sp 4400 Note: This option can not be set inside registry configurations\. 4401 .sp 4402 Default: 4403 \fI\fIlock directory\fR\fR\fI = \fR\fI${prefix}/var/locks\fR\fI \fR 4404 .sp 4405 Example: 4406 \fI\fIlock directory\fR\fR\fI = \fR\fI/var/run/samba/locks\fR\fI \fR 5088 .\" lock directory 5089 .PP 5090 .RS 4 5091 This option specifies the directory where lock files will be placed\&. The lock files are used to implement the 5092 \m[blue]\fBmax connections\fR\m[] 5093 option\&. 5094 .sp 5095 Note: This option can not be set inside registry configurations\&. 5096 .sp 5097 Default: 5098 \fI\fIlock directory\fR\fR\fI = \fR\fI\FC${prefix}/var/locks\F[]\fR\fI \fR 5099 .sp 5100 Example: 5101 \fI\fIlock directory\fR\fR\fI = \fR\fI\FC/var/run/samba/locks\F[]\fR\fI \fR 4407 5102 .RE 4408 5103 4409 5104 locking (S) 4410 .PP 4411 .RS 4 4412 This controls whether or not locking will be performed by the server in response to lock requests from the client\. 5105 .\" locking 5106 .PP 5107 .RS 4 5108 This controls whether or not locking will be performed by the server in response to lock requests from the client\&. 4413 5109 .sp 4414 5110 If 4415 locking = no, all lock and unlock requests will appear to succeed and all lock queries will report that the file in question is available for locking\.5111 \FClocking = no\F[], all lock and unlock requests will appear to succeed and all lock queries will report that the file in question is available for locking\&. 4416 5112 .sp 4417 5113 If 4418 locking = yes, real locking will be performed by the server\.5114 \FClocking = yes\F[], real locking will be performed by the server\&. 4419 5115 .sp 4420 5116 This option … … 4424 5120 not need locking (such as CDROM drives), although setting this parameter of 4425 5121 \fBno\fR 4426 is not really recommended even in this case\ .4427 .sp 4428 Be careful about disabling locking either globally or in a specific service, as lack of locking may result in data corruption\ . You should never need to set this parameter\.5122 is not really recommended even in this case\&. 5123 .sp 5124 Be careful about disabling locking either globally or in a specific service, as lack of locking may result in data corruption\&. You should never need to set this parameter\&. 4429 5125 .sp 4430 5126 \fINo default\fR … … 4432 5128 4433 5129 lock spin count (G) 4434 .PP 4435 .RS 4 4436 This parameter has been made inoperative in Samba 3\.0\.24\. The functionality it contolled is now controlled by the parameter 4437 \fIlock spin time\fR\. 4438 .sp 4439 Default: 4440 \fI\fIlock spin count\fR\fR\fI = \fR\fI0\fR\fI \fR 5130 .\" lock spin count 5131 .PP 5132 .RS 4 5133 This parameter has been made inoperative in Samba 3\&.0\&.24\&. The functionality it contolled is now controlled by the parameter 5134 \m[blue]\fBlock spin time\fR\m[]\&. 5135 .sp 5136 Default: 5137 \fI\fIlock spin count\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 4441 5138 .RE 4442 5139 4443 5140 lock spin time (G) 4444 .PP 4445 .RS 4 4446 The time in microseconds that smbd should keep waiting to see if a failed lock request can be granted\. This parameter has changed in default value from Samba 3\.0\.23 from 10 to 200\. The associated 4447 \fIlock spin count\fR 4448 parameter is no longer used in Samba 3\.0\.24\. You should not need to change the value of this parameter\. 4449 .sp 4450 Default: 4451 \fI\fIlock spin time\fR\fR\fI = \fR\fI200\fR\fI \fR 5141 .\" lock spin time 5142 .PP 5143 .RS 4 5144 The time in microseconds that smbd should keep waiting to see if a failed lock request can be granted\&. This parameter has changed in default value from Samba 3\&.0\&.23 from 10 to 200\&. The associated 5145 \m[blue]\fBlock spin count\fR\m[] 5146 parameter is no longer used in Samba 3\&.0\&.24\&. You should not need to change the value of this parameter\&. 5147 .sp 5148 Default: 5149 \fI\fIlock spin time\fR\fR\fI = \fR\fI\FC200\F[]\fR\fI \fR 4452 5150 .RE 4453 5151 4454 5152 log file (G) 4455 .PP 4456 .RS 4 4457 This option allows you to override the name of the Samba log file (also known as the debug file)\. 4458 .sp 4459 This option takes the standard substitutions, allowing you to have separate log files for each user or machine\. 5153 .\" log file 5154 .PP 5155 .RS 4 5156 This option allows you to override the name of the Samba log file (also known as the debug file)\&. 5157 .sp 5158 This option takes the standard substitutions, allowing you to have separate log files for each user or machine\&. 4460 5159 .sp 4461 5160 \fINo default\fR 4462 5161 .sp 4463 5162 Example: 4464 \fI\fIlog file\fR\fR\fI = \fR\fI /usr/local/samba/var/log\.%m\fR\fI \fR5163 \fI\fIlog file\fR\fR\fI = \fR\fI\FC/usr/local/samba/var/log\&.%m\F[]\fR\fI \fR 4465 5164 .RE 4466 5165 4467 5166 debuglevel 5167 .\" debuglevel 4468 5168 .PP 4469 5169 .RS 4 4470 5170 This parameter is a synonym for 4471 log level\ .5171 log level\&. 4472 5172 .RE 4473 5173 4474 5174 log level (G) 5175 .\" log level 4475 5176 .PP 4476 5177 .RS 4 4477 5178 The value of the parameter (a astring) allows the debug level (logging level) to be specified in the 4478 \ fIsmb\.conf\fR4479 file\ .4480 .sp 4481 This parameter has been extended since the 2\ .2\.x series, now it allows to specify the debug level for multiple debug classes\. This is to give greater flexibility in the configuration of the system\. The following debug classes are currently implemented:5179 \FCsmb\&.conf\F[] 5180 file\&. 5181 .sp 5182 This parameter has been extended since the 2\&.2\&.x series, now it allows to specify the debug level for multiple debug classes\&. This is to give greater flexibility in the configuration of the system\&. The following debug classes are currently implemented: 4482 5183 .sp 4483 5184 .RS 4 … … 4702 5403 .RE 4703 5404 Default: 4704 \fI\fIlog level\fR\fR\fI = \fR\fI 0\fR\fI \fR4705 .sp 4706 Example: 4707 \fI\fIlog level\fR\fR\fI = \fR\fI 3 passdb:5 auth:10 winbind:2\fR\fI \fR5405 \fI\fIlog level\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 5406 .sp 5407 Example: 5408 \fI\fIlog level\fR\fR\fI = \fR\fI\FC3 passdb:5 auth:10 winbind:2\F[]\fR\fI \fR 4708 5409 .RE 4709 5410 4710 5411 logon drive (G) 5412 .\" logon drive 4711 5413 .PP 4712 5414 .RS 4 4713 5415 This parameter specifies the local path to which the home directory will be connected (see 4714 \ fIlogon home\fR) and is only used by NT Workstations\.4715 .sp 4716 Note that this option is only useful if Samba is set up as a logon server\ .4717 .sp 4718 Default: 4719 \fI\fIlogon drive\fR\fR\fI = \fR\fI\ fR\fI \fR4720 .sp 4721 Example: 4722 \fI\fIlogon drive\fR\fR\fI = \fR\fI h:\fR\fI \fR5416 \m[blue]\fBlogon home\fR\m[]) and is only used by NT Workstations\&. 5417 .sp 5418 Note that this option is only useful if Samba is set up as a logon server\&. 5419 .sp 5420 Default: 5421 \fI\fIlogon drive\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 5422 .sp 5423 Example: 5424 \fI\fIlogon drive\fR\fR\fI = \fR\fI\FCh:\F[]\fR\fI \fR 4723 5425 .RE 4724 5426 4725 5427 logon home (G) 4726 .PP 4727 .RS 4 4728 This parameter specifies the home directory location when a Win95/98 or NT Workstation logs into a Samba PDC\. It allows you to do 4729 .sp 4730 4731 C:\e>\fBNET USE H: /HOME\fR 4732 .sp 4733 from a command prompt, for example\. 4734 .sp 4735 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\. 4736 .sp 4737 This parameter can be used with Win9X workstations to ensure that roaming profiles are stored in a subdirectory of the user\'s home directory\. This is done in the following way: 4738 .sp 4739 4740 logon home = \e\e%N\e%U\eprofile 4741 .sp 4742 This tells Samba to return the above string, with substitutions made when a client requests the info, generally in a NetUserGetInfo request\. Win9X clients truncate the info to \e\eserver\eshare when a user does 4743 net use /home 4744 but use the whole string when dealing with profiles\. 5428 .\" logon home 5429 .PP 5430 .RS 4 5431 This parameter specifies the home directory location when a Win95/98 or NT Workstation logs into a Samba PDC\&. It allows you to do 5432 .sp 5433 5434 \FCC:\e>\F[]\fBNET USE H: /HOME\fR 5435 .sp 5436 from a command prompt, for example\&. 5437 .sp 5438 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\&. 5439 .sp 5440 This parameter can be used with Win9X workstations to ensure that roaming profiles are stored in a subdirectory of the user\'s home directory\&. This is done in the following way: 5441 .sp 5442 5443 \FClogon home = \e\e%N\e%U\eprofile\F[] 5444 .sp 5445 This tells Samba to return the above string, with substitutions made when a client requests the info, generally in a NetUserGetInfo request\&. Win9X clients truncate the info to \e\eserver\eshare when a user does 5446 \FCnet use /home\F[] 5447 but use the whole string when dealing with profiles\&. 4745 5448 .sp 4746 5449 Note that in prior versions of Samba, the 4747 \ fIlogon path\fR5450 \m[blue]\fBlogon path\fR\m[] 4748 5451 was returned rather than 4749 \fIlogon home\fR\ . This broke4750 net use /home 4751 but allowed profiles outside the home directory\ . The current implementation is correct, and can be used for profiles if you use the above trick\.5452 \fIlogon home\fR\&. This broke 5453 \FCnet use /home\F[] 5454 but allowed profiles outside the home directory\&. The current implementation is correct, and can be used for profiles if you use the above trick\&. 4752 5455 .sp 4753 5456 Disable this feature by setting 4754 \ fIlogon home = ""\fR4755 \- using the empty string\ .4756 .sp 4757 This option is only useful if Samba is set up as a logon server\ .4758 .sp 4759 Default: 4760 \fI\fIlogon home\fR\fR\fI = \fR\fI\ e\e%N\e%U\fR\fI \fR4761 .sp 4762 Example: 4763 \fI\fIlogon home\fR\fR\fI = \fR\fI\ e\eremote_smb_server\e%U\fR\fI \fR5457 \m[blue]\fBlogon home = ""\fR\m[] 5458 \- using the empty string\&. 5459 .sp 5460 This option is only useful if Samba is set up as a logon server\&. 5461 .sp 5462 Default: 5463 \fI\fIlogon home\fR\fR\fI = \fR\fI\FC\e\e%N\e%U\F[]\fR\fI \fR 5464 .sp 5465 Example: 5466 \fI\fIlogon home\fR\fR\fI = \fR\fI\FC\e\eremote_smb_server\e%U\F[]\fR\fI \fR 4764 5467 .RE 4765 5468 4766 5469 logon path (G) 4767 .PP 4768 .RS 4 4769 This parameter specifies the directory where roaming profiles (Desktop, NTuser\.dat, etc) are stored\. Contrary to previous versions of these manual pages, it has nothing to do with Win 9X roaming profiles\. To find out how to handle roaming profiles for Win 9X system, see the 4770 \fIlogon home\fR 4771 parameter\. 4772 .sp 4773 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\. It also specifies the directory from which the "Application Data", 4774 \fIdesktop\fR, 4775 \fIstart menu\fR, 4776 \fInetwork neighborhood\fR, 4777 \fIprograms\fR 4778 and other folders, and their contents, are loaded and displayed on your Windows NT client\. 4779 .sp 4780 The share and the path must be readable by the user for the preferences and directories to be loaded onto the Windows NT client\. The share must be writeable when the user logs in for the first time, in order that the Windows NT client can create the NTuser\.dat and other directories\. Thereafter, the directories and any of the contents can, if required, be made read\-only\. It is not advisable that the NTuser\.dat file be made read\-only \- rename it to NTuser\.man to achieve the desired effect (a 4781 \fIMAN\fRdatory profile)\. 4782 .sp 4783 Windows clients can sometimes maintain a connection to the [homes] share, even though there is no user logged in\. Therefore, it is vital that the logon path does not include a reference to the homes share (i\.e\. setting this parameter to \e\e%N\ehomes\eprofile_path will cause problems)\. 4784 .sp 4785 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\. 4786 .sp 5470 .\" logon path 5471 .PP 5472 .RS 4 5473 This parameter specifies the directory where roaming profiles (Desktop, NTuser\&.dat, etc) are stored\&. Contrary to previous versions of these manual pages, it has nothing to do with Win 9X roaming profiles\&. To find out how to handle roaming profiles for Win 9X system, see the 5474 \m[blue]\fBlogon home\fR\m[] 5475 parameter\&. 5476 .sp 5477 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\&. It also specifies the directory from which the "Application Data", 5478 \FCdesktop\F[], 5479 \FCstart menu\F[], 5480 \FCnetwork neighborhood\F[], 5481 \FCprograms\F[] 5482 and other folders, and their contents, are loaded and displayed on your Windows NT client\&. 5483 .sp 5484 The share and the path must be readable by the user for the preferences and directories to be loaded onto the Windows NT client\&. The share must be writeable when the user logs in for the first time, in order that the Windows NT client can create the NTuser\&.dat and other directories\&. Thereafter, the directories and any of the contents can, if required, be made read\-only\&. It is not advisable that the NTuser\&.dat file be made read\-only \- rename it to NTuser\&.man to achieve the desired effect (a 5485 \fIMAN\fRdatory profile)\&. 5486 .sp 5487 Windows clients can sometimes maintain a connection to the [homes] share, even though there is no user logged in\&. Therefore, it is vital that the logon path does not include a reference to the homes share (i\&.e\&. setting this parameter to \e\e%N\ehomes\eprofile_path will cause problems)\&. 5488 .sp 5489 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\&. 5490 .if n \{\ 5491 .sp 5492 .\} 5493 .RS 4 5494 .BM yellow 4787 5495 .it 1 an-trap 4788 5496 .nr an-no-space-flag 1 4789 5497 .nr an-break-flag 1 4790 5498 .br 4791 Warning 4792 Do not quote the value\. Setting this as 5499 .ps +1 5500 \fBWarning\fR 5501 .ps -1 5502 .br 5503 Do not quote the value\&. Setting this as 4793 5504 \(lq\e\e%N\eprofile\e%U\(rq 4794 will break profile handling\. Where the tdbsam or ldapsam passdb backend is used, at the time the user account is created the value configured for this parameter is written to the passdb backend and that value will over\-ride the parameter value present in the smb\.conf file\. Any error present in the passdb backend account record must be editted using the appropriate tool (pdbedit on the command\-line, or any other locally provided system tool)\. 4795 4796 Note that this option is only useful if Samba is set up as a domain controller\. 4797 .sp 4798 Disable the use of roaming profiles by setting the value of this parameter to the empty string\. For example, 4799 \fIlogon path = ""\fR\. Take note that even if the default setting in the smb\.conf file is the empty string, any value specified in the user account settings in the passdb backend will over\-ride the effect of setting this parameter to null\. Disabling of all roaming profile use requires that the user account settings must also be blank\. 5505 will break profile handling\&. Where the tdbsam or ldapsam passdb backend is used, at the time the user account is created the value configured for this parameter is written to the passdb backend and that value will over\-ride the parameter value present in the smb\&.conf file\&. Any error present in the passdb backend account record must be editted using the appropriate tool (pdbedit on the command\-line, or any other locally provided system tool)\&. 5506 .sp .5v 5507 .EM yellow 5508 .RE 5509 Note that this option is only useful if Samba is set up as a domain controller\&. 5510 .sp 5511 Disable the use of roaming profiles by setting the value of this parameter to the empty string\&. For example, 5512 \m[blue]\fBlogon path = ""\fR\m[]\&. Take note that even if the default setting in the smb\&.conf file is the empty string, any value specified in the user account settings in the passdb backend will over\-ride the effect of setting this parameter to null\&. Disabling of all roaming profile use requires that the user account settings must also be blank\&. 4800 5513 .sp 4801 5514 An example of use is: 4802 5515 .sp 4803 .RS 4 5516 .if n \{\ 5517 .RS 4 5518 .\} 5519 .fam C 5520 .ps -1 4804 5521 .nf 5522 .if t \{\ 5523 .sp -1 5524 .\} 5525 .BB lightgray adjust-for-leading-newline 5526 .sp -1 5527 4805 5528 logon path = \e\ePROFILESERVER\ePROFILE\e%U 5529 .EB lightgray adjust-for-leading-newline 5530 .if t \{\ 5531 .sp 1 5532 .\} 4806 5533 .fi 4807 .RE 4808 .sp 4809 .sp 4810 Default: 4811 \fI\fIlogon path\fR\fR\fI = \fR\fI\e\e%N\e%U\eprofile\fR\fI \fR 5534 .fam 5535 .ps +1 5536 .if n \{\ 5537 .RE 5538 .\} 5539 .sp 5540 Default: 5541 \fI\fIlogon path\fR\fR\fI = \fR\fI\FC\e\e%N\e%U\eprofile\F[]\fR\fI \fR 4812 5542 .RE 4813 5543 4814 5544 logon script (G) 4815 .PP 4816 .RS 4 4817 This parameter specifies the batch file (\fI\.bat\fR) or NT command file (\fI\.cmd\fR) to be downloaded and run on a machine when a user successfully logs in\. The file must contain the DOS style CR/LF line endings\. Using a DOS\-style editor to create the file is recommended\. 5545 .\" logon script 5546 .PP 5547 .RS 4 5548 This parameter specifies the batch file (\FC\&.bat\F[]) or NT command file (\FC\&.cmd\F[]) to be downloaded and run on a machine when a user successfully logs in\&. The file must contain the DOS style CR/LF line endings\&. Using a DOS\-style editor to create the file is recommended\&. 4818 5549 .sp 4819 5550 The script must be a relative path to the 4820 5551 \fI[netlogon]\fR 4821 service\ . If the [netlogon] service specifies a4822 \ fIpath\fR5552 service\&. If the [netlogon] service specifies a 5553 \m[blue]\fBpath\fR\m[] 4823 5554 of 4824 \fI/usr/local/samba/netlogon\fR, and 4825 \fIlogon script = STARTUP\.BAT\fR, then the file that will be downloaded is: 4826 .sp 4827 .RS 4 5555 \FC/usr/local/samba/netlogon\F[], and 5556 \m[blue]\fBlogon script = STARTUP\&.BAT\fR\m[], then the file that will be downloaded is: 5557 .sp 5558 .if n \{\ 5559 .RS 4 5560 .\} 5561 .fam C 5562 .ps -1 4828 5563 .nf 4829 /usr/local/samba/netlogon/STARTUP\.BAT 5564 .if t \{\ 5565 .sp -1 5566 .\} 5567 .BB lightgray adjust-for-leading-newline 5568 .sp -1 5569 5570 /usr/local/samba/netlogon/STARTUP\&.BAT 5571 .EB lightgray adjust-for-leading-newline 5572 .if t \{\ 5573 .sp 1 5574 .\} 4830 5575 .fi 4831 .RE 4832 .sp 4833 .sp 4834 The contents of the batch file are entirely your choice\. A suggested command would be to add 4835 NET TIME \e\eSERVER /SET /YES, to force every machine to synchronize clocks with the same time server\. Another use would be to add 4836 NET USE U: \e\eSERVER\eUTILS 5576 .fam 5577 .ps +1 5578 .if n \{\ 5579 .RE 5580 .\} 5581 .sp 5582 The contents of the batch file are entirely your choice\&. A suggested command would be to add 5583 \FCNET TIME \e\eSERVER /SET /YES\F[], to force every machine to synchronize clocks with the same time server\&. Another use would be to add 5584 \FCNET USE U: \e\eSERVER\eUTILS\F[] 4837 5585 for commonly used utilities, or 4838 5586 .sp 4839 .RS 4 5587 .if n \{\ 5588 .RS 4 5589 .\} 5590 .fam C 5591 .ps -1 4840 5592 .nf 5593 .if t \{\ 5594 .sp -1 5595 .\} 5596 .BB lightgray adjust-for-leading-newline 5597 .sp -1 5598 4841 5599 \fBNET USE Q: \e\eSERVER\eISO9001_QA\fR 5600 .EB lightgray adjust-for-leading-newline 5601 .if t \{\ 5602 .sp 1 5603 .\} 4842 5604 .fi 4843 .RE 4844 .sp 4845 for example\. 4846 .sp 4847 Note that it is particularly important not to allow write access to the [netlogon] share, or to grant users write permission on the batch files in a secure environment, as this would allow the batch files to be arbitrarily modified and security to be breached\. 4848 .sp 4849 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\. 4850 .sp 4851 This option is only useful if Samba is set up as a logon server\. 4852 .sp 4853 Default: 4854 \fI\fIlogon script\fR\fR\fI = \fR\fI\fR\fI \fR 4855 .sp 4856 Example: 4857 \fI\fIlogon script\fR\fR\fI = \fR\fIscripts\e%U\.bat\fR\fI \fR 5605 .fam 5606 .ps +1 5607 .if n \{\ 5608 .RE 5609 .\} 5610 .sp 5611 for example\&. 5612 .sp 5613 Note that it is particularly important not to allow write access to the [netlogon] share, or to grant users write permission on the batch files in a secure environment, as this would allow the batch files to be arbitrarily modified and security to be breached\&. 5614 .sp 5615 This option takes the standard substitutions, allowing you to have separate logon scripts for each user or machine\&. 5616 .sp 5617 This option is only useful if Samba is set up as a logon server\&. 5618 .sp 5619 Default: 5620 \fI\fIlogon script\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 5621 .sp 5622 Example: 5623 \fI\fIlogon script\fR\fR\fI = \fR\fI\FCscripts\e%U\&.bat\F[]\fR\fI \fR 4858 5624 .RE 4859 5625 4860 5626 lppause command (S) 4861 .PP 4862 .RS 4 4863 This parameter specifies the command to be executed on the server host in order to stop printing or spooling a specific print job\. 4864 .sp 4865 This command should be a program or script which takes a printer name and job number to pause the print job\. One way of implementing this is by using job priorities, where jobs having a too low priority won\'t be sent to the printer\. 5627 .\" lppause command 5628 .PP 5629 .RS 4 5630 This parameter specifies the command to be executed on the server host in order to stop printing or spooling a specific print job\&. 5631 .sp 5632 This command should be a program or script which takes a printer name and job number to pause the print job\&. One way of implementing this is by using job priorities, where jobs having a too low priority won\'t be sent to the printer\&. 4866 5633 .sp 4867 5634 If a 4868 5635 \fI%p\fR 4869 is given then the printer name is put in its place\ . A5636 is given then the printer name is put in its place\&. A 4870 5637 \fI%j\fR 4871 is replaced with the job number (an integer)\ . On HPUX (see5638 is replaced with the job number (an integer)\&. On HPUX (see 4872 5639 \fIprinting=hpux \fR), if the 4873 5640 \fI\-p%p\fR 4874 option is added to the lpq command, the job will show up with the correct status, i\ .e\. if the job priority is lower than the set fence priority it will have the PAUSED status, whereas if the priority is equal or higher it will have the SPOOLED or PRINTING status\.4875 .sp 4876 Note that it is good practice to include the absolute path in the lppause command as the PATH may not be available to the server\ .4877 .sp 4878 Default: 4879 \fI\fIlppause command\fR\fR\fI = \fR\fI # Currently no default value is given to this string, unless the value of the \fIprinting\fR parameter is \fBSYSV\fR, in which case the default is : lp \-i %p\-%j \-H hold or if the value of the \fIprinting\fR parameter is \fBSOFTQ\fR, then the default is: qstat \-s \-j%j \-h\.\fR\fI \fR4880 .sp 4881 Example: 4882 \fI\fIlppause command\fR\fR\fI = \fR\fI /usr/bin/lpalt %p\-%j \-p0\fR\fI \fR5641 option is added to the lpq command, the job will show up with the correct status, i\&.e\&. if the job priority is lower than the set fence priority it will have the PAUSED status, whereas if the priority is equal or higher it will have the SPOOLED or PRINTING status\&. 5642 .sp 5643 Note that it is good practice to include the absolute path in the lppause command as the PATH may not be available to the server\&. 5644 .sp 5645 Default: 5646 \fI\fIlppause command\fR\fR\fI = \fR\fI\FC # Currently no default value is given to this string, unless the value of the \m[blue]\fBprinting\fR\m[] parameter is \fBSYSV\fR, in which case the default is : \FClp \-i %p\-%j \-H hold\F[] or if the value of the \fIprinting\fR parameter is \fBSOFTQ\fR, then the default is: \FCqstat \-s \-j%j \-h\F[]\&. \F[]\fR\fI \fR 5647 .sp 5648 Example: 5649 \fI\fIlppause command\fR\fR\fI = \fR\fI\FC/usr/bin/lpalt %p\-%j \-p0\F[]\fR\fI \fR 4883 5650 .RE 4884 5651 4885 5652 lpq cache time (G) 5653 .\" lpq cache time 4886 5654 .PP 4887 5655 .RS 4 4888 5656 This controls how long lpq info will be cached for to prevent the 4889 lpq 4890 command being called too often\ . A separate cache is kept for each variation of the4891 lpq 5657 \FClpq\F[] 5658 command being called too often\&. A separate cache is kept for each variation of the 5659 \FC lpq\F[] 4892 5660 command used by the system, so if you use different 4893 lpq 4894 commands for different users then they won\'t share cache information\ .5661 \FClpq\F[] 5662 commands for different users then they won\'t share cache information\&. 4895 5663 .sp 4896 5664 The cache files are stored in 4897 \ fI/tmp/lpq\.xxxx\fR5665 \FC/tmp/lpq\&.xxxx\F[] 4898 5666 where xxxx is a hash of the 4899 lpq 4900 command in use\ .5667 \FClpq\F[] 5668 command in use\&. 4901 5669 .sp 4902 5670 The default is 30 seconds, meaning that the cached results of a previous identical 4903 lpq 4904 command will be used if the cached data is less than 30 seconds old\ . A large value may be advisable if your4905 lpq 4906 command is very slow\ .4907 .sp 4908 A value of 0 will disable caching completely\ .4909 .sp 4910 Default: 4911 \fI\fIlpq cache time\fR\fR\fI = \fR\fI 30\fR\fI \fR4912 .sp 4913 Example: 4914 \fI\fIlpq cache time\fR\fR\fI = \fR\fI 10\fR\fI \fR5671 \FClpq\F[] 5672 command will be used if the cached data is less than 30 seconds old\&. A large value may be advisable if your 5673 \FClpq\F[] 5674 command is very slow\&. 5675 .sp 5676 A value of 0 will disable caching completely\&. 5677 .sp 5678 Default: 5679 \fI\fIlpq cache time\fR\fR\fI = \fR\fI\FC30\F[]\fR\fI \fR 5680 .sp 5681 Example: 5682 \fI\fIlpq cache time\fR\fR\fI = \fR\fI\FC10\F[]\fR\fI \fR 4915 5683 .RE 4916 5684 4917 5685 lpq command (S) 5686 .\" lpq command 4918 5687 .PP 4919 5688 .RS 4 4920 5689 This parameter specifies the command to be executed on the server host in order to obtain 4921 lpq\-style printer status information\.4922 .sp 4923 This command should be a program or script which takes a printer name as its only parameter and outputs printer status information\ .4924 .sp 4925 Currently nine styles of printer status information are supported; BSD, AIX, LPRNG, PLP, SYSV, HPUX, QNX, CUPS, and SOFTQ\ . This covers most UNIX systems\. You control which type is expected using the5690 \FClpq \F[]\-style printer status information\&. 5691 .sp 5692 This command should be a program or script which takes a printer name as its only parameter and outputs printer status information\&. 5693 .sp 5694 Currently nine styles of printer status information are supported; BSD, AIX, LPRNG, PLP, SYSV, HPUX, QNX, CUPS, and SOFTQ\&. This covers most UNIX systems\&. You control which type is expected using the 4926 5695 \fIprinting =\fR 4927 option\ .4928 .sp 4929 Some clients (notably Windows for Workgroups) may not correctly send the connection number for the printer they are requesting status information about\ . To get around this, the server reports on the first printer service connected to by the client\. This only happens if the connection number sent is invalid\.5696 option\&. 5697 .sp 5698 Some clients (notably Windows for Workgroups) may not correctly send the connection number for the printer they are requesting status information about\&. To get around this, the server reports on the first printer service connected to by the client\&. This only happens if the connection number sent is invalid\&. 4930 5699 .sp 4931 5700 If a 4932 5701 \fI%p\fR 4933 is given then the printer name is put in its place\ . Otherwise it is placed at the end of the command\.5702 is given then the printer name is put in its place\&. Otherwise it is placed at the end of the command\&. 4934 5703 .sp 4935 5704 Note that it is good practice to include the absolute path in the … … 4937 5706 as the 4938 5707 \fB$PATH \fR 4939 may not be available to the server\ . When compiled with the CUPS libraries, no5708 may not be available to the server\&. When compiled with the CUPS libraries, no 4940 5709 \fIlpq command\fR 4941 is needed because smbd will make a library call to obtain the print queue listing\ .4942 .sp 4943 Default: 4944 \fI\fIlpq command\fR\fR\fI = \fR\fI\ fR\fI \fR4945 .sp 4946 Example: 4947 \fI\fIlpq command\fR\fR\fI = \fR\fI /usr/bin/lpq \-P%p\fR\fI \fR5710 is needed because smbd will make a library call to obtain the print queue listing\&. 5711 .sp 5712 Default: 5713 \fI\fIlpq command\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 5714 .sp 5715 Example: 5716 \fI\fIlpq command\fR\fR\fI = \fR\fI\FC/usr/bin/lpq \-P%p\F[]\fR\fI \fR 4948 5717 .RE 4949 5718 4950 5719 lpresume command (S) 4951 .PP 4952 .RS 4 4953 This parameter specifies the command to be executed on the server host in order to restart or continue printing or spooling a specific print job\. 4954 .sp 4955 This command should be a program or script which takes a printer name and job number to resume the print job\. See also the 4956 \fIlppause command\fR 4957 parameter\. 5720 .\" lpresume command 5721 .PP 5722 .RS 4 5723 This parameter specifies the command to be executed on the server host in order to restart or continue printing or spooling a specific print job\&. 5724 .sp 5725 This command should be a program or script which takes a printer name and job number to resume the print job\&. See also the 5726 \m[blue]\fBlppause command\fR\m[] 5727 parameter\&. 4958 5728 .sp 4959 5729 If a 4960 5730 \fI%p\fR 4961 is given then the printer name is put in its place\ . A5731 is given then the printer name is put in its place\&. A 4962 5732 \fI%j\fR 4963 is replaced with the job number (an integer)\ .5733 is replaced with the job number (an integer)\&. 4964 5734 .sp 4965 5735 Note that it is good practice to include the absolute path in the 4966 5736 \fIlpresume command\fR 4967 as the PATH may not be available to the server\ .5737 as the PATH may not be available to the server\&. 4968 5738 .sp 4969 5739 See also the 4970 \ fIprinting\fR4971 parameter\ .5740 \m[blue]\fBprinting\fR\m[] 5741 parameter\&. 4972 5742 .sp 4973 5743 Default: Currently no default value is given to this string, unless the value of the … … 4976 5746 \fBSYSV\fR, in which case the default is: 4977 5747 .sp 4978 lp \-i %p\-%j \-H resume 5748 \FClp \-i %p\-%j \-H resume\F[] 4979 5749 .sp 4980 5750 or if the value of the … … 4983 5753 \fBSOFTQ\fR, then the default is: 4984 5754 .sp 4985 qstat \-s \-j%j \-r 5755 \FCqstat \-s \-j%j \-r\F[] 4986 5756 .sp 4987 5757 \fINo default\fR 4988 5758 .sp 4989 5759 Example: 4990 \fI\fIlpresume command\fR\fR\fI = \fR\fI /usr/bin/lpalt %p\-%j \-p2\fR\fI \fR5760 \fI\fIlpresume command\fR\fR\fI = \fR\fI\FC/usr/bin/lpalt %p\-%j \-p2\F[]\fR\fI \fR 4991 5761 .RE 4992 5762 4993 5763 lprm command (S) 4994 .PP 4995 .RS 4 4996 This parameter specifies the command to be executed on the server host in order to delete a print job\. 4997 .sp 4998 This command should be a program or script which takes a printer name and job number, and deletes the print job\. 5764 .\" lprm command 5765 .PP 5766 .RS 4 5767 This parameter specifies the command to be executed on the server host in order to delete a print job\&. 5768 .sp 5769 This command should be a program or script which takes a printer name and job number, and deletes the print job\&. 4999 5770 .sp 5000 5771 If a 5001 5772 \fI%p\fR 5002 is given then the printer name is put in its place\ . A5773 is given then the printer name is put in its place\&. A 5003 5774 \fI%j\fR 5004 is replaced with the job number (an integer)\ .5775 is replaced with the job number (an integer)\&. 5005 5776 .sp 5006 5777 Note that it is good practice to include the absolute path in the 5007 5778 \fIlprm command\fR 5008 as the PATH may not be available to the server\ .5779 as the PATH may not be available to the server\&. 5009 5780 .sp 5010 5781 Examples of use are: 5011 5782 .sp 5012 .RS 4 5783 .if n \{\ 5784 .RS 4 5785 .\} 5786 .fam C 5787 .ps -1 5013 5788 .nf 5789 .if t \{\ 5790 .sp -1 5791 .\} 5792 .BB lightgray adjust-for-leading-newline 5793 .sp -1 5794 5014 5795 lprm command = /usr/bin/lprm \-P%p %j 5015 5796 … … 5017 5798 5018 5799 lprm command = /usr/bin/cancel %p\-%j 5800 .EB lightgray adjust-for-leading-newline 5801 .if t \{\ 5802 .sp 1 5803 .\} 5019 5804 .fi 5020 .RE 5021 .sp 5022 .sp 5023 Default: 5024 \fI\fIlprm command\fR\fR\fI = \fR\fI determined by printing parameter\fR\fI \fR 5805 .fam 5806 .ps +1 5807 .if n \{\ 5808 .RE 5809 .\} 5810 .sp 5811 Default: 5812 \fI\fIlprm command\fR\fR\fI = \fR\fI\FC determined by printing parameter\F[]\fR\fI \fR 5025 5813 .RE 5026 5814 5027 5815 machine password timeout (G) 5816 .\" machine password timeout 5028 5817 .PP 5029 5818 .RS 4 5030 5819 If a Samba server is a member of a Windows NT Domain (see the 5031 \ fIsecurity = domain\fR5820 \m[blue]\fBsecurity = domain\fR\m[] 5032 5821 parameter) then periodically a running smbd process will try and change the MACHINE ACCOUNT PASSWORD stored in the TDB called 5033 \ fIprivate/secrets\.tdb \fR\. This parameter specifies how often this password will be changed, in seconds\. The default is one week (expressed in seconds), the same as a Windows NT Domain member server\.5822 \FCprivate/secrets\&.tdb \F[]\&. This parameter specifies how often this password will be changed, in seconds\&. The default is one week (expressed in seconds), the same as a Windows NT Domain member server\&. 5034 5823 .sp 5035 5824 See also 5036 5825 \fBsmbpasswd\fR(8), and the 5037 \ fIsecurity = domain\fR5038 parameter\ .5039 .sp 5040 Default: 5041 \fI\fImachine password timeout\fR\fR\fI = \fR\fI 604800\fR\fI \fR5826 \m[blue]\fBsecurity = domain\fR\m[] 5827 parameter\&. 5828 .sp 5829 Default: 5830 \fI\fImachine password timeout\fR\fR\fI = \fR\fI\FC604800\F[]\fR\fI \fR 5042 5831 .RE 5043 5832 5044 5833 magic output (S) 5834 .\" magic output 5045 5835 .PP 5046 5836 .RS 4 5047 5837 This parameter specifies the name of a file which will contain output created by a magic script (see the 5048 \fImagic script\fR 5049 parameter below)\. 5050 .sp 5838 \m[blue]\fBmagic script\fR\m[] 5839 parameter below)\&. 5840 .if n \{\ 5841 .sp 5842 .\} 5843 .RS 4 5844 .BM yellow 5051 5845 .it 1 an-trap 5052 5846 .nr an-no-space-flag 1 5053 5847 .nr an-break-flag 1 5054 5848 .br 5055 Warning 5849 .ps +1 5850 \fBWarning\fR 5851 .ps -1 5852 .br 5056 5853 If two clients use the same 5057 5854 \fImagic script \fR 5058 in the same directory the output file content is undefined\. 5059 5060 Default: 5061 \fI\fImagic output\fR\fR\fI = \fR\fI<magic script name>\.out\fR\fI \fR 5062 .sp 5063 Example: 5064 \fI\fImagic output\fR\fR\fI = \fR\fImyfile\.txt\fR\fI \fR 5855 in the same directory the output file content is undefined\&. 5856 .sp .5v 5857 .EM yellow 5858 .RE 5859 Default: 5860 \fI\fImagic output\fR\fR\fI = \fR\fI\FC<magic script name>\&.out\F[]\fR\fI \fR 5861 .sp 5862 Example: 5863 \fI\fImagic output\fR\fR\fI = \fR\fI\FCmyfile\&.txt\F[]\fR\fI \fR 5065 5864 .RE 5066 5865 5067 5866 magic script (S) 5068 .PP 5069 .RS 4 5070 This parameter specifies the name of a file which, if opened, will be executed by the server when the file is closed\. This allows a UNIX script to be sent to the Samba host and executed on behalf of the connected user\. 5071 .sp 5072 Scripts executed in this way will be deleted upon completion assuming that the user has the appropriate level of privilege and the file permissions allow the deletion\. 5867 .\" magic script 5868 .PP 5869 .RS 4 5870 This parameter specifies the name of a file which, if opened, will be executed by the server when the file is closed\&. This allows a UNIX script to be sent to the Samba host and executed on behalf of the connected user\&. 5871 .sp 5872 Scripts executed in this way will be deleted upon completion assuming that the user has the appropriate level of privilege and the file permissions allow the deletion\&. 5073 5873 .sp 5074 5874 If the script generates output, output will be sent to the file specified by the 5075 \ fImagic output\fR5076 parameter (see above)\ .5077 .sp 5078 Note that some shells are unable to interpret scripts containing CR/LF instead of CR as the end\-of\-line marker\ . Magic scripts must be executable5875 \m[blue]\fBmagic output\fR\m[] 5876 parameter (see above)\&. 5877 .sp 5878 Note that some shells are unable to interpret scripts containing CR/LF instead of CR as the end\-of\-line marker\&. Magic scripts must be executable 5079 5879 \fIas is\fR 5080 on the host, which for some hosts and some shells will require filtering at the DOS end\ .5880 on the host, which for some hosts and some shells will require filtering at the DOS end\&. 5081 5881 .sp 5082 5882 Magic scripts are … … 5084 5884 and should 5085 5885 \fINOT\fR 5086 be relied upon\ .5087 .sp 5088 Default: 5089 \fI\fImagic script\fR\fR\fI = \fR\fI\ fR\fI \fR5090 .sp 5091 Example: 5092 \fI\fImagic script\fR\fR\fI = \fR\fI user\.csh\fR\fI \fR5886 be relied upon\&. 5887 .sp 5888 Default: 5889 \fI\fImagic script\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 5890 .sp 5891 Example: 5892 \fI\fImagic script\fR\fR\fI = \fR\fI\FCuser\&.csh\F[]\fR\fI \fR 5093 5893 .RE 5094 5894 5095 5895 mangled names (S) 5096 .PP 5097 .RS 4 5098 This controls whether non\-DOS names under UNIX should be mapped to DOS\-compatible names ("mangled") and made visible, or whether non\-DOS names should simply be ignored\. 5896 .\" mangled names 5897 .PP 5898 .RS 4 5899 This controls whether non\-DOS names under UNIX should be mapped to DOS\-compatible names ("mangled") and made visible, or whether non\-DOS names should simply be ignored\&. 5099 5900 .sp 5100 5901 See the section on 5101 \ fIname mangling\fR5102 for details on how to control the mangling process\ .5902 \m[blue]\fBname mangling\fR\m[] 5903 for details on how to control the mangling process\&. 5103 5904 .sp 5104 5905 If mangling is used then the mangling algorithm is as follows: … … 5112 5913 .IP \(bu 2.3 5113 5914 .\} 5114 The first (up to) five alphanumeric characters before the rightmost dot of the filename are preserved, forced to upper case, and appear as the first (up to) five characters of the mangled name\ .5115 .RE 5116 .sp 5117 .RS 4 5118 .ie n \{\ 5119 \h'-04'\(bu\h'+03'\c 5120 .\} 5121 .el \{\ 5122 .sp -1 5123 .IP \(bu 2.3 5124 .\} 5125 A tilde "~" is appended to the first part of the mangled name, followed by a two\-character unique sequence, based on the original root name (i\ .e\., the original filename minus its final extension)\. The final extension is included in the hash calculation only if it contains any upper case characters or is longer than three characters\.5915 The first (up to) five alphanumeric characters before the rightmost dot of the filename are preserved, forced to upper case, and appear as the first (up to) five characters of the mangled name\&. 5916 .RE 5917 .sp 5918 .RS 4 5919 .ie n \{\ 5920 \h'-04'\(bu\h'+03'\c 5921 .\} 5922 .el \{\ 5923 .sp -1 5924 .IP \(bu 2.3 5925 .\} 5926 A tilde "~" is appended to the first part of the mangled name, followed by a two\-character unique sequence, based on the original root name (i\&.e\&., the original filename minus its final extension)\&. The final extension is included in the hash calculation only if it contains any upper case characters or is longer than three characters\&. 5126 5927 .sp 5127 5928 Note that the character to use may be specified using the 5128 \ fImangling char\fR5129 option, if you don\'t like \'~\'\ .5130 .RE 5131 .sp 5132 .RS 4 5133 .ie n \{\ 5134 \h'-04'\(bu\h'+03'\c 5135 .\} 5136 .el \{\ 5137 .sp -1 5138 .IP \(bu 2.3 5139 .\} 5140 Files whose UNIX name begins with a dot will be presented as DOS hidden files\ . The mangled name will be created as for other filenames, but with the leading dot removed and "___" as its extension regardless of actual original extension (that\'s three underscores)\.5141 .sp 5142 .RE 5143 The two\-digit hash value consists of upper case alphanumeric characters\ .5144 .sp 5145 This algorithm can cause name collisions only if files in a directory share the same first five alphanumeric characters\ . The probability of such a clash is 1/1300\.5146 .sp 5147 The name mangling (if enabled) allows a file to be copied between UNIX directories from Windows/DOS while retaining the long UNIX filename\ . UNIX files can be renamed to a new extension from Windows/DOS and will retain the same basename\. Mangled names do not change between sessions\.5148 .sp 5149 Default: 5150 \fI\fImangled names\fR\fR\fI = \fR\fI yes\fR\fI \fR5929 \m[blue]\fBmangling char\fR\m[] 5930 option, if you don\'t like \'~\'\&. 5931 .RE 5932 .sp 5933 .RS 4 5934 .ie n \{\ 5935 \h'-04'\(bu\h'+03'\c 5936 .\} 5937 .el \{\ 5938 .sp -1 5939 .IP \(bu 2.3 5940 .\} 5941 Files whose UNIX name begins with a dot will be presented as DOS hidden files\&. The mangled name will be created as for other filenames, but with the leading dot removed and "___" as its extension regardless of actual original extension (that\'s three underscores)\&. 5942 .sp 5943 .RE 5944 The two\-digit hash value consists of upper case alphanumeric characters\&. 5945 .sp 5946 This algorithm can cause name collisions only if files in a directory share the same first five alphanumeric characters\&. The probability of such a clash is 1/1300\&. 5947 .sp 5948 The name mangling (if enabled) allows a file to be copied between UNIX directories from Windows/DOS while retaining the long UNIX filename\&. UNIX files can be renamed to a new extension from Windows/DOS and will retain the same basename\&. Mangled names do not change between sessions\&. 5949 .sp 5950 Default: 5951 \fI\fImangled names\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 5151 5952 .RE 5152 5953 5153 5954 mangle prefix (G) 5154 .PP 5155 .RS 4 5156 controls the number of prefix characters from the original name used when generating the mangled names\. A larger value will give a weaker hash and therefore more name collisions\. The minimum value is 1 and the maximum value is 6\. 5157 .sp 5158 mangle prefix is effective only when mangling method is hash2\. 5159 .sp 5160 Default: 5161 \fI\fImangle prefix\fR\fR\fI = \fR\fI1\fR\fI \fR 5162 .sp 5163 Example: 5164 \fI\fImangle prefix\fR\fR\fI = \fR\fI4\fR\fI \fR 5955 .\" mangle prefix 5956 .PP 5957 .RS 4 5958 controls the number of prefix characters from the original name used when generating the mangled names\&. A larger value will give a weaker hash and therefore more name collisions\&. The minimum value is 1 and the maximum value is 6\&. 5959 .sp 5960 mangle prefix is effective only when mangling method is hash2\&. 5961 .sp 5962 Default: 5963 \fI\fImangle prefix\fR\fR\fI = \fR\fI\FC1\F[]\fR\fI \fR 5964 .sp 5965 Example: 5966 \fI\fImangle prefix\fR\fR\fI = \fR\fI\FC4\F[]\fR\fI \fR 5165 5967 .RE 5166 5968 5167 5969 mangling char (S) 5970 .\" mangling char 5168 5971 .PP 5169 5972 .RS 4 … … 5171 5974 \fImagic\fR 5172 5975 character in 5173 \ fIname mangling\fR\. The default is a \'~\' but this may interfere with some software\. Use this option to set it to whatever you prefer\. This is effective only when mangling method is hash\.5174 .sp 5175 Default: 5176 \fI\fImangling char\fR\fR\fI = \fR\fI ~\fR\fI \fR5177 .sp 5178 Example: 5179 \fI\fImangling char\fR\fR\fI = \fR\fI ^\fR\fI \fR5976 \m[blue]\fBname mangling\fR\m[]\&. The default is a \'~\' but this may interfere with some software\&. Use this option to set it to whatever you prefer\&. This is effective only when mangling method is hash\&. 5977 .sp 5978 Default: 5979 \fI\fImangling char\fR\fR\fI = \fR\fI\FC~\F[]\fR\fI \fR 5980 .sp 5981 Example: 5982 \fI\fImangling char\fR\fR\fI = \fR\fI\FC^\F[]\fR\fI \fR 5180 5983 .RE 5181 5984 5182 5985 mangling method (G) 5183 .PP 5184 .RS 4 5185 controls the algorithm used for the generating the mangled names\. Can take two different values, "hash" and "hash2"\. "hash" is the algorithm that was used used in Samba for many years and was the default in Samba 2\.2\.x "hash2" is now the default and is newer and considered a better algorithm (generates less collisions) in the names\. Many Win32 applications store the mangled names and so changing to algorithms must not be done lightly as these applications may break unless reinstalled\. 5186 .sp 5187 Default: 5188 \fI\fImangling method\fR\fR\fI = \fR\fIhash2\fR\fI \fR 5189 .sp 5190 Example: 5191 \fI\fImangling method\fR\fR\fI = \fR\fIhash\fR\fI \fR 5986 .\" mangling method 5987 .PP 5988 .RS 4 5989 controls the algorithm used for the generating the mangled names\&. Can take two different values, "hash" and "hash2"\&. "hash" is the algorithm that was used used in Samba for many years and was the default in Samba 2\&.2\&.x "hash2" is now the default and is newer and considered a better algorithm (generates less collisions) in the names\&. Many Win32 applications store the mangled names and so changing to algorithms must not be done lightly as these applications may break unless reinstalled\&. 5990 .sp 5991 Default: 5992 \fI\fImangling method\fR\fR\fI = \fR\fI\FChash2\F[]\fR\fI \fR 5993 .sp 5994 Example: 5995 \fI\fImangling method\fR\fR\fI = \fR\fI\FChash\F[]\fR\fI \fR 5192 5996 .RE 5193 5997 5194 5998 map acl inherit (S) 5999 .\" map acl inherit 5195 6000 .PP 5196 6001 .RS 4 5197 6002 This boolean parameter controls whether 5198 6003 \fBsmbd\fR(8) 5199 will attempt to map the \'inherit\' and \'protected\' access control entry flags stored in Windows ACLs into an extended attribute called user\ .SAMBA_PAI\. This parameter only takes effect if Samba is being run on a platform that supports extended attributes (Linux and IRIX so far) and allows the Windows 2000 ACL editor to correctly use inheritance with the Samba POSIX ACL mapping code\.5200 .sp 5201 Default: 5202 \fI\fImap acl inherit\fR\fR\fI = \fR\fI no\fR\fI \fR6004 will attempt to map the \'inherit\' and \'protected\' access control entry flags stored in Windows ACLs into an extended attribute called user\&.SAMBA_PAI\&. This parameter only takes effect if Samba is being run on a platform that supports extended attributes (Linux and IRIX so far) and allows the Windows 2000 ACL editor to correctly use inheritance with the Samba POSIX ACL mapping code\&. 6005 .sp 6006 Default: 6007 \fI\fImap acl inherit\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 5203 6008 .RE 5204 6009 5205 6010 map archive (S) 5206 .PP 5207 .RS 4 5208 This controls whether the DOS archive attribute should be mapped to the UNIX owner execute bit\. The DOS archive bit is set when a file has been modified since its last backup\. One motivation for this option is to keep Samba/your PC from making any file it touches from becoming executable under UNIX\. This can be quite annoying for shared source code, documents, etc\.\.\. 6011 .\" map archive 6012 .PP 6013 .RS 4 6014 This controls whether the DOS archive attribute should be mapped to the UNIX owner execute bit\&. The DOS archive bit is set when a file has been modified since its last backup\&. One motivation for this option is to keep Samba/your PC from making any file it touches from becoming executable under UNIX\&. This can be quite annoying for shared source code, documents, etc\&.\&.\&. 5209 6015 .sp 5210 6016 Note that this requires the 5211 \ fIcreate mask\fR5212 parameter to be set such that owner execute bit is not masked out (i\ .e\. it must include 100)\. See the parameter5213 \ fIcreate mask\fR5214 for details\ .5215 .sp 5216 Default: 5217 \fI\fImap archive\fR\fR\fI = \fR\fI yes\fR\fI \fR6017 \m[blue]\fBcreate mask\fR\m[] 6018 parameter to be set such that owner execute bit is not masked out (i\&.e\&. it must include 100)\&. See the parameter 6019 \m[blue]\fBcreate mask\fR\m[] 6020 for details\&. 6021 .sp 6022 Default: 6023 \fI\fImap archive\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 5218 6024 .RE 5219 6025 5220 6026 map hidden (S) 5221 .PP 5222 .RS 4 5223 This controls whether DOS style hidden files should be mapped to the UNIX world execute bit\. 6027 .\" map hidden 6028 .PP 6029 .RS 4 6030 This controls whether DOS style hidden files should be mapped to the UNIX world execute bit\&. 5224 6031 .sp 5225 6032 Note that this requires the 5226 \ fIcreate mask\fR5227 to be set such that the world execute bit is not masked out (i\ .e\. it must include 001)\. See the parameter5228 \ fIcreate mask\fR5229 for details\ .6033 \m[blue]\fBcreate mask\fR\m[] 6034 to be set such that the world execute bit is not masked out (i\&.e\&. it must include 001)\&. See the parameter 6035 \m[blue]\fBcreate mask\fR\m[] 6036 for details\&. 5230 6037 .sp 5231 6038 \fINo default\fR … … 5233 6040 5234 6041 map read only (S) 5235 .PP 5236 .RS 4 5237 This controls how the DOS read only attribute should be mapped from a UNIX filesystem\. 6042 .\" map read only 6043 .PP 6044 .RS 4 6045 This controls how the DOS read only attribute should be mapped from a UNIX filesystem\&. 5238 6046 .sp 5239 6047 This parameter can take three different values, which tell 5240 6048 \fBsmbd\fR(8) 5241 6049 how to display the read only attribute on files, where either 5242 \ fIstore dos attributes\fR6050 \m[blue]\fBstore dos attributes\fR\m[] 5243 6051 is set to 5244 \fBNo\fR, or no extended attribute is present\ . If5245 \ fIstore dos attributes\fR6052 \fBNo\fR, or no extended attribute is present\&. If 6053 \m[blue]\fBstore dos attributes\fR\m[] 5246 6054 is set to 5247 6055 \fByes\fR 5248 6056 then this parameter is 5249 \fIignored\fR\ . This is a new parameter introduced in Samba version 3\.0\.21\.6057 \fIignored\fR\&. This is a new parameter introduced in Samba version 3\&.0\&.21\&. 5250 6058 .sp 5251 6059 The three settings are : … … 5261 6069 5262 6070 \fBYes\fR 5263 \- The read only DOS attribute is mapped to the inverse of the user or owner write bit in the unix permission mode set\ . If the owner write bit is not set, the read only attribute is reported as being set on the file\. If the read only DOS attribute is set, Samba sets the owner, group and others write bits to zero\. Write bits set in an ACL are ignored by Samba\. If the read only DOS attribute is unset, Samba simply sets the write bit of the owner to one\.6071 \- The read only DOS attribute is mapped to the inverse of the user or owner write bit in the unix permission mode set\&. If the owner write bit is not set, the read only attribute is reported as being set on the file\&. If the read only DOS attribute is set, Samba sets the owner, group and others write bits to zero\&. Write bits set in an ACL are ignored by Samba\&. If the read only DOS attribute is unset, Samba simply sets the write bit of the owner to one\&. 5264 6072 .RE 5265 6073 .sp … … 5276 6084 \- The read only DOS attribute is mapped to the effective permissions of the connecting user, as evaluated by 5277 6085 \fBsmbd\fR(8) 5278 by reading the unix permissions and POSIX ACL (if present)\ . If the connecting user does not have permission to modify the file, the read only attribute is reported as being set on the file\.6086 by reading the unix permissions and POSIX ACL (if present)\&. If the connecting user does not have permission to modify the file, the read only attribute is reported as being set on the file\&. 5279 6087 .RE 5280 6088 .sp … … 5290 6098 \fBNo\fR 5291 6099 \- The read only DOS attribute is unaffected by permissions, and can only be set by the 5292 \ fIstore dos attributes\fR5293 method\ . This may be useful for exporting mounted CDs\.5294 .sp 5295 .RE 5296 Default: 5297 \fI\fImap read only\fR\fR\fI = \fR\fI yes\fR\fI \fR6100 \m[blue]\fBstore dos attributes\fR\m[] 6101 method\&. This may be useful for exporting mounted CDs\&. 6102 .sp 6103 .RE 6104 Default: 6105 \fI\fImap read only\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 5298 6106 .RE 5299 6107 5300 6108 map system (S) 5301 .PP 5302 .RS 4 5303 This controls whether DOS style system files should be mapped to the UNIX group execute bit\. 6109 .\" map system 6110 .PP 6111 .RS 4 6112 This controls whether DOS style system files should be mapped to the UNIX group execute bit\&. 5304 6113 .sp 5305 6114 Note that this requires the 5306 \ fIcreate mask\fR5307 to be set such that the group execute bit is not masked out (i\ .e\. it must include 010)\. See the parameter5308 \ fIcreate mask\fR5309 for details\ .5310 .sp 5311 Default: 5312 \fI\fImap system\fR\fR\fI = \fR\fI no\fR\fI \fR6115 \m[blue]\fBcreate mask\fR\m[] 6116 to be set such that the group execute bit is not masked out (i\&.e\&. it must include 010)\&. See the parameter 6117 \m[blue]\fBcreate mask\fR\m[] 6118 for details\&. 6119 .sp 6120 Default: 6121 \fI\fImap system\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 5313 6122 .RE 5314 6123 5315 6124 map to guest (G) 6125 .\" map to guest 5316 6126 .PP 5317 6127 .RS 4 5318 6128 This parameter is only useful in 5319 \ fISECURITY = security\fR6129 \m[blue]\fBSECURITY = security\fR\m[] 5320 6130 modes other than 5321 6131 \fIsecurity = share\fR 5322 6132 and 5323 6133 \fIsecurity = server\fR 5324 \- i\ .e\.6134 \- i\&.e\&. 5325 6135 \fBuser\fR, and 5326 \fBdomain\fR\ .6136 \fBdomain\fR\&. 5327 6137 .sp 5328 6138 This parameter can take four different values, which tell 5329 6139 \fBsmbd\fR(8) 5330 what to do with user login requests that don\'t match a valid UNIX user in some way\ .6140 what to do with user login requests that don\'t match a valid UNIX user in some way\&. 5331 6141 .sp 5332 6142 The four settings are : … … 5341 6151 .\} 5342 6152 \fBNever\fR 5343 \- Means user login requests with an invalid password are rejected\ . This is the default\.6153 \- Means user login requests with an invalid password are rejected\&. This is the default\&. 5344 6154 .RE 5345 6155 .sp … … 5354 6164 \fBBad User\fR 5355 6165 \- Means user logins with an invalid password are rejected, unless the username does not exist, in which case it is treated as a guest login and mapped into the 5356 \ fIguest account\fR\.6166 \m[blue]\fBguest account\fR\m[]\&. 5357 6167 .RE 5358 6168 .sp … … 5367 6177 \fBBad Password\fR 5368 6178 \- Means user logins with an invalid password are treated as a guest login and mapped into the 5369 \ fIguest account\fR\. Note that this can cause problems as it means that any user incorrectly typing their password will be silently logged on as "guest" \- and will not know the reason they cannot access files they think they should \- there will have been no message given to them that they got their password wrong\. Helpdesk services will6179 \m[blue]\fBguest account\fR\m[]\&. Note that this can cause problems as it means that any user incorrectly typing their password will be silently logged on as "guest" \- and will not know the reason they cannot access files they think they should \- there will have been no message given to them that they got their password wrong\&. Helpdesk services will 5370 6180 \fIhate\fR 5371 6181 you if you set the 5372 6182 \fImap to guest\fR 5373 parameter this way :\-)\ .6183 parameter this way :\-)\&. 5374 6184 .RE 5375 6185 .sp … … 5383 6193 .\} 5384 6194 \fBBad Uid\fR 5385 \- Is only applicable when Samba is configured in some type of domain mode security (security = {domain|ads}) and means that user logins which are successfully authenticated but which have no valid Unix user account (and smbd is unable to create one) should be mapped to the defined guest account\ . This was the default behavior of Samba 2\.x releases\. Note that if a member server is running winbindd, this option should never be required because the nss_winbind library will export the Windows domain users and groups to the underlying OS via the Name Service Switch interface\.6195 \- Is only applicable when Samba is configured in some type of domain mode security (security = {domain|ads}) and means that user logins which are successfully authenticated but which have no valid Unix user account (and smbd is unable to create one) should be mapped to the defined guest account\&. This was the default behavior of Samba 2\&.x releases\&. Note that if a member server is running winbindd, this option should never be required because the nss_winbind library will export the Windows domain users and groups to the underlying OS via the Name Service Switch interface\&. 5386 6196 .sp 5387 6197 .RE 5388 6198 Note that this parameter is needed to set up "Guest" share services when using 5389 6199 \fIsecurity\fR 5390 modes other than share and server\ . This is because in these modes the name of the resource being requested is6200 modes other than share and server\&. This is because in these modes the name of the resource being requested is 5391 6201 \fInot\fR 5392 sent to the server until after the server has successfully authenticated the client so the server cannot make authentication decisions at the correct time (connection to the share) for "Guest" shares\ . This parameter is not useful with6202 sent to the server until after the server has successfully authenticated the client so the server cannot make authentication decisions at the correct time (connection to the share) for "Guest" shares\&. This parameter is not useful with 5393 6203 \fIsecurity = server\fR 5394 as in this security mode no information is returned about whether a user logon failed due to a bad username or bad password, the same error is returned from a modern server in both cases\ .6204 as in this security mode no information is returned about whether a user logon failed due to a bad username or bad password, the same error is returned from a modern server in both cases\&. 5395 6205 .sp 5396 6206 For people familiar with the older Samba releases, this parameter maps to the old compile\-time setting of the 5397 6207 \fB GUEST_SESSSETUP\fR 5398 value in local\ .h\.5399 .sp 5400 Default: 5401 \fI\fImap to guest\fR\fR\fI = \fR\fI Never\fR\fI \fR5402 .sp 5403 Example: 5404 \fI\fImap to guest\fR\fR\fI = \fR\fI Bad User\fR\fI \fR6208 value in local\&.h\&. 6209 .sp 6210 Default: 6211 \fI\fImap to guest\fR\fR\fI = \fR\fI\FCNever\F[]\fR\fI \fR 6212 .sp 6213 Example: 6214 \fI\fImap to guest\fR\fR\fI = \fR\fI\FCBad User\F[]\fR\fI \fR 5405 6215 .RE 5406 6216 5407 6217 max connections (S) 5408 .PP 5409 .RS 4 5410 This option allows the number of simultaneous connections to a service to be limited\. If 6218 .\" max connections 6219 .PP 6220 .RS 4 6221 This option allows the number of simultaneous connections to a service to be limited\&. If 5411 6222 \fImax connections\fR 5412 is greater than 0 then connections will be refused if this number of connections to the service are already open\ . A value of zero mean an unlimited number of connections may be made\.5413 .sp 5414 Record lock files are used to implement this feature\ . The lock files will be stored in the directory specified by the5415 \ fIlock directory\fR5416 option\ .5417 .sp 5418 Default: 5419 \fI\fImax connections\fR\fR\fI = \fR\fI 0\fR\fI \fR5420 .sp 5421 Example: 5422 \fI\fImax connections\fR\fR\fI = \fR\fI 10\fR\fI \fR6223 is greater than 0 then connections will be refused if this number of connections to the service are already open\&. A value of zero mean an unlimited number of connections may be made\&. 6224 .sp 6225 Record lock files are used to implement this feature\&. The lock files will be stored in the directory specified by the 6226 \m[blue]\fBlock directory\fR\m[] 6227 option\&. 6228 .sp 6229 Default: 6230 \fI\fImax connections\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 6231 .sp 6232 Example: 6233 \fI\fImax connections\fR\fR\fI = \fR\fI\FC10\F[]\fR\fI \fR 5423 6234 .RE 5424 6235 5425 6236 max disk size (G) 5426 .PP 5427 .RS 4 5428 This option allows you to put an upper limit on the apparent size of disks\. If you set this option to 100 then all shares will appear to be not larger than 100 MB in size\. 5429 .sp 5430 Note that this option does not limit the amount of data you can put on the disk\. In the above case you could still store much more than 100 MB on the disk, but if a client ever asks for the amount of free disk space or the total disk size then the result will be bounded by the amount specified in 5431 \fImax disk size\fR\. 5432 .sp 5433 This option is primarily useful to work around bugs in some pieces of software that can\'t handle very large disks, particularly disks over 1GB in size\. 6237 .\" max disk size 6238 .PP 6239 .RS 4 6240 This option allows you to put an upper limit on the apparent size of disks\&. If you set this option to 100 then all shares will appear to be not larger than 100 MB in size\&. 6241 .sp 6242 Note that this option does not limit the amount of data you can put on the disk\&. In the above case you could still store much more than 100 MB on the disk, but if a client ever asks for the amount of free disk space or the total disk size then the result will be bounded by the amount specified in 6243 \fImax disk size\fR\&. 6244 .sp 6245 This option is primarily useful to work around bugs in some pieces of software that can\'t handle very large disks, particularly disks over 1GB in size\&. 5434 6246 .sp 5435 6247 A 5436 6248 \fImax disk size\fR 5437 of 0 means no limit\ .5438 .sp 5439 Default: 5440 \fI\fImax disk size\fR\fR\fI = \fR\fI 0\fR\fI \fR5441 .sp 5442 Example: 5443 \fI\fImax disk size\fR\fR\fI = \fR\fI 1000\fR\fI \fR6249 of 0 means no limit\&. 6250 .sp 6251 Default: 6252 \fI\fImax disk size\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 6253 .sp 6254 Example: 6255 \fI\fImax disk size\fR\fR\fI = \fR\fI\FC1000\F[]\fR\fI \fR 5444 6256 .RE 5445 6257 5446 6258 max log size (G) 5447 .PP 5448 .RS 4 5449 This option (an integer in kilobytes) specifies the max size the log file should grow to\. Samba periodically checks the size and if it is exceeded it will rename the file, adding a 5450 \fI\.old\fR 5451 extension\. 5452 .sp 5453 A size of 0 means no limit\. 5454 .sp 5455 Default: 5456 \fI\fImax log size\fR\fR\fI = \fR\fI5000\fR\fI \fR 5457 .sp 5458 Example: 5459 \fI\fImax log size\fR\fR\fI = \fR\fI1000\fR\fI \fR 6259 .\" max log size 6260 .PP 6261 .RS 4 6262 This option (an integer in kilobytes) specifies the max size the log file should grow to\&. Samba periodically checks the size and if it is exceeded it will rename the file, adding a 6263 \FC\&.old\F[] 6264 extension\&. 6265 .sp 6266 A size of 0 means no limit\&. 6267 .sp 6268 Default: 6269 \fI\fImax log size\fR\fR\fI = \fR\fI\FC5000\F[]\fR\fI \fR 6270 .sp 6271 Example: 6272 \fI\fImax log size\fR\fR\fI = \fR\fI\FC1000\F[]\fR\fI \fR 5460 6273 .RE 5461 6274 5462 6275 max mux (G) 5463 .PP 5464 .RS 4 5465 This option controls the maximum number of outstanding simultaneous SMB operations that Samba tells the client it will allow\. You should never need to set this parameter\. 5466 .sp 5467 Default: 5468 \fI\fImax mux\fR\fR\fI = \fR\fI50\fR\fI \fR 6276 .\" max mux 6277 .PP 6278 .RS 4 6279 This option controls the maximum number of outstanding simultaneous SMB operations that Samba tells the client it will allow\&. You should never need to set this parameter\&. 6280 .sp 6281 Default: 6282 \fI\fImax mux\fR\fR\fI = \fR\fI\FC50\F[]\fR\fI \fR 5469 6283 .RE 5470 6284 5471 6285 max open files (G) 6286 .\" max open files 5472 6287 .PP 5473 6288 .RS 4 5474 6289 This parameter limits the maximum number of open files that one 5475 6290 \fBsmbd\fR(8) 5476 file serving process may have open for a client at any one time\ . The default for this parameter is set very high (10,000) as Samba uses only one bit per unopened file\.5477 .sp 5478 The limit of the number of open files is usually set by the UNIX per\-process file descriptor limit rather than this parameter so you should never need to touch this parameter\ .5479 .sp 5480 Default: 5481 \fI\fImax open files\fR\fR\fI = \fR\fI 10000\fR\fI \fR6291 file serving process may have open for a client at any one time\&. The default for this parameter is set very high (10,000) as Samba uses only one bit per unopened file\&. 6292 .sp 6293 The limit of the number of open files is usually set by the UNIX per\-process file descriptor limit rather than this parameter so you should never need to touch this parameter\&. 6294 .sp 6295 Default: 6296 \fI\fImax open files\fR\fR\fI = \fR\fI\FC10000\F[]\fR\fI \fR 5482 6297 .RE 5483 6298 5484 6299 max print jobs (S) 5485 .PP 5486 .RS 4 5487 This parameter limits the maximum number of jobs allowable in a Samba printer queue at any given moment\. If this number is exceeded, 6300 .\" max print jobs 6301 .PP 6302 .RS 4 6303 This parameter limits the maximum number of jobs allowable in a Samba printer queue at any given moment\&. If this number is exceeded, 5488 6304 \fBsmbd\fR(8) 5489 will remote "Out of Space" to the client\ .5490 .sp 5491 Default: 5492 \fI\fImax print jobs\fR\fR\fI = \fR\fI 1000\fR\fI \fR5493 .sp 5494 Example: 5495 \fI\fImax print jobs\fR\fR\fI = \fR\fI 5000\fR\fI \fR6305 will remote "Out of Space" to the client\&. 6306 .sp 6307 Default: 6308 \fI\fImax print jobs\fR\fR\fI = \fR\fI\FC1000\F[]\fR\fI \fR 6309 .sp 6310 Example: 6311 \fI\fImax print jobs\fR\fR\fI = \fR\fI\FC5000\F[]\fR\fI \fR 5496 6312 .RE 5497 6313 5498 6314 protocol 6315 .\" protocol 5499 6316 .PP 5500 6317 .RS 4 5501 6318 This parameter is a synonym for 5502 max protocol\ .6319 max protocol\&. 5503 6320 .RE 5504 6321 5505 6322 max protocol (G) 5506 .PP 5507 .RS 4 5508 The value of the parameter (a string) is the highest protocol level that will be supported by the server\. 6323 .\" max protocol 6324 .PP 6325 .RS 4 6326 The value of the parameter (a string) is the highest protocol level that will be supported by the server\&. 5509 6327 .sp 5510 6328 Possible values are : … … 5518 6336 .IP \(bu 2.3 5519 6337 .\} 5520 \fBCORE\fR: Earliest version\ . No concept of user names\.5521 .RE 5522 .sp 5523 .RS 4 5524 .ie n \{\ 5525 \h'-04'\(bu\h'+03'\c 5526 .\} 5527 .el \{\ 5528 .sp -1 5529 .IP \(bu 2.3 5530 .\} 5531 \fBCOREPLUS\fR: Slight improvements on CORE for efficiency\ .6338 \fBCORE\fR: Earliest version\&. No concept of user names\&. 6339 .RE 6340 .sp 6341 .RS 4 6342 .ie n \{\ 6343 \h'-04'\(bu\h'+03'\c 6344 .\} 6345 .el \{\ 6346 .sp -1 6347 .IP \(bu 2.3 6348 .\} 6349 \fBCOREPLUS\fR: Slight improvements on CORE for efficiency\&. 5532 6350 .RE 5533 6351 .sp … … 5542 6360 \fBLANMAN1\fR: First 5543 6361 \fI modern\fR 5544 version of the protocol\ . Long filename support\.5545 .RE 5546 .sp 5547 .RS 4 5548 .ie n \{\ 5549 \h'-04'\(bu\h'+03'\c 5550 .\} 5551 .el \{\ 5552 .sp -1 5553 .IP \(bu 2.3 5554 .\} 5555 \fBLANMAN2\fR: Updates to Lanman1 protocol\ .5556 .RE 5557 .sp 5558 .RS 4 5559 .ie n \{\ 5560 \h'-04'\(bu\h'+03'\c 5561 .\} 5562 .el \{\ 5563 .sp -1 5564 .IP \(bu 2.3 5565 .\} 5566 \fBNT1\fR: Current up to date version of the protocol\ . Used by Windows NT\. Known as CIFS\.5567 .sp 5568 .RE 5569 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\ .5570 .sp 5571 Default: 5572 \fI\fImax protocol\fR\fR\fI = \fR\fI NT1\fR\fI \fR5573 .sp 5574 Example: 5575 \fI\fImax protocol\fR\fR\fI = \fR\fI LANMAN1\fR\fI \fR6362 version of the protocol\&. Long filename support\&. 6363 .RE 6364 .sp 6365 .RS 4 6366 .ie n \{\ 6367 \h'-04'\(bu\h'+03'\c 6368 .\} 6369 .el \{\ 6370 .sp -1 6371 .IP \(bu 2.3 6372 .\} 6373 \fBLANMAN2\fR: Updates to Lanman1 protocol\&. 6374 .RE 6375 .sp 6376 .RS 4 6377 .ie n \{\ 6378 \h'-04'\(bu\h'+03'\c 6379 .\} 6380 .el \{\ 6381 .sp -1 6382 .IP \(bu 2.3 6383 .\} 6384 \fBNT1\fR: Current up to date version of the protocol\&. Used by Windows NT\&. Known as CIFS\&. 6385 .sp 6386 .RE 6387 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&. 6388 .sp 6389 Default: 6390 \fI\fImax protocol\fR\fR\fI = \fR\fI\FCNT1\F[]\fR\fI \fR 6391 .sp 6392 Example: 6393 \fI\fImax protocol\fR\fR\fI = \fR\fI\FCLANMAN1\F[]\fR\fI \fR 5576 6394 .RE 5577 6395 5578 6396 max reported print jobs (S) 5579 .PP 5580 .RS 4 5581 This parameter limits the maximum number of jobs displayed in a port monitor for Samba printer queue at any given moment\. If this number is exceeded, the excess jobs will not be shown\. A value of zero means there is no limit on the number of print jobs reported\. 5582 .sp 5583 Default: 5584 \fI\fImax reported print jobs\fR\fR\fI = \fR\fI0\fR\fI \fR 5585 .sp 5586 Example: 5587 \fI\fImax reported print jobs\fR\fR\fI = \fR\fI1000\fR\fI \fR 6397 .\" max reported print jobs 6398 .PP 6399 .RS 4 6400 This parameter limits the maximum number of jobs displayed in a port monitor for Samba printer queue at any given moment\&. If this number is exceeded, the excess jobs will not be shown\&. A value of zero means there is no limit on the number of print jobs reported\&. 6401 .sp 6402 Default: 6403 \fI\fImax reported print jobs\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 6404 .sp 6405 Example: 6406 \fI\fImax reported print jobs\fR\fR\fI = \fR\fI\FC1000\F[]\fR\fI \fR 5588 6407 .RE 5589 6408 5590 6409 max smbd processes (G) 6410 .\" max smbd processes 5591 6411 .PP 5592 6412 .RS 4 5593 6413 This parameter limits the maximum number of 5594 6414 \fBsmbd\fR(8) 5595 processes concurrently running on a system and is intended as a stopgap to prevent degrading service to clients in the event that the server has insufficient resources to handle more than this number of connections\ . Remember that under normal operating conditions, each user will have an6415 processes concurrently running on a system and is intended as a stopgap to prevent degrading service to clients in the event that the server has insufficient resources to handle more than this number of connections\&. Remember that under normal operating conditions, each user will have an 5596 6416 \fBsmbd\fR(8) 5597 associated with him or her to handle connections to all shares from a given host\ .5598 .sp 5599 Default: 5600 \fI\fImax smbd processes\fR\fR\fI = \fR\fI 0\fR\fI \fR5601 .sp 5602 Example: 5603 \fI\fImax smbd processes\fR\fR\fI = \fR\fI 1000\fR\fI \fR6417 associated with him or her to handle connections to all shares from a given host\&. 6418 .sp 6419 Default: 6420 \fI\fImax smbd processes\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 6421 .sp 6422 Example: 6423 \fI\fImax smbd processes\fR\fR\fI = \fR\fI\FC1000\F[]\fR\fI \fR 5604 6424 .RE 5605 6425 5606 6426 max stat cache size (G) 6427 .\" max stat cache size 5607 6428 .PP 5608 6429 .RS 4 5609 6430 This parameter limits the size in memory of any 5610 6431 \fIstat cache\fR 5611 being used to speed up case insensitive name mappings\ . It represents the number of kilobyte (1024) units the stat cache can use\. A value of zero, meaning unlimited, is not advisable due to increased memory useage\. You should not need to change this parameter\.5612 .sp 5613 Default: 5614 \fI\fImax stat cache size\fR\fR\fI = \fR\fI 256\fR\fI \fR5615 .sp 5616 Example: 5617 \fI\fImax stat cache size\fR\fR\fI = \fR\fI 100\fR\fI \fR6432 being used to speed up case insensitive name mappings\&. It represents the number of kilobyte (1024) units the stat cache can use\&. A value of zero, meaning unlimited, is not advisable due to increased memory useage\&. You should not need to change this parameter\&. 6433 .sp 6434 Default: 6435 \fI\fImax stat cache size\fR\fR\fI = \fR\fI\FC256\F[]\fR\fI \fR 6436 .sp 6437 Example: 6438 \fI\fImax stat cache size\fR\fR\fI = \fR\fI\FC100\F[]\fR\fI \fR 5618 6439 .RE 5619 6440 5620 6441 max ttl (G) 6442 .\" max ttl 5621 6443 .PP 5622 6444 .RS 4 … … 5624 6446 \fBnmbd\fR(8) 5625 6447 what the default \'time to live\' of NetBIOS names should be (in seconds) when 5626 nmbd 5627 is requesting a name using either a broadcast packet or from a WINS server\ . You should never need to change this parameter\. The default is 3 days\.5628 .sp 5629 Default: 5630 \fI\fImax ttl\fR\fR\fI = \fR\fI 259200\fR\fI \fR6448 \FCnmbd\F[] 6449 is requesting a name using either a broadcast packet or from a WINS server\&. You should never need to change this parameter\&. The default is 3 days\&. 6450 .sp 6451 Default: 6452 \fI\fImax ttl\fR\fR\fI = \fR\fI\FC259200\F[]\fR\fI \fR 5631 6453 .RE 5632 6454 5633 6455 max wins ttl (G) 6456 .\" max wins ttl 5634 6457 .PP 5635 6458 .RS 4 5636 6459 This option tells 5637 6460 \fBsmbd\fR(8) 5638 when acting as a WINS server (\ fIwins support = yes\fR) what the maximum \'time to live\' of NetBIOS names that5639 nmbd 5640 will grant will be (in seconds)\ . You should never need to change this parameter\. The default is 6 days (518400 seconds)\.5641 .sp 5642 Default: 5643 \fI\fImax wins ttl\fR\fR\fI = \fR\fI 518400\fR\fI \fR6461 when acting as a WINS server (\m[blue]\fBwins support = yes\fR\m[]) what the maximum \'time to live\' of NetBIOS names that 6462 \FCnmbd\F[] 6463 will grant will be (in seconds)\&. You should never need to change this parameter\&. The default is 6 days (518400 seconds)\&. 6464 .sp 6465 Default: 6466 \fI\fImax wins ttl\fR\fR\fI = \fR\fI\FC518400\F[]\fR\fI \fR 5644 6467 .RE 5645 6468 5646 6469 max xmit (G) 5647 .PP 5648 .RS 4 5649 This option controls the maximum packet size that will be negotiated by Samba\. The default is 16644, which matches the behavior of Windows 2000\. A value below 2048 is likely to cause problems\. You should never need to change this parameter from its default value\. 5650 .sp 5651 Default: 5652 \fI\fImax xmit\fR\fR\fI = \fR\fI16644\fR\fI \fR 5653 .sp 5654 Example: 5655 \fI\fImax xmit\fR\fR\fI = \fR\fI8192\fR\fI \fR 6470 .\" max xmit 6471 .PP 6472 .RS 4 6473 This option controls the maximum packet size that will be negotiated by Samba\&. The default is 16644, which matches the behavior of Windows 2000\&. A value below 2048 is likely to cause problems\&. You should never need to change this parameter from its default value\&. 6474 .sp 6475 Default: 6476 \fI\fImax xmit\fR\fR\fI = \fR\fI\FC16644\F[]\fR\fI \fR 6477 .sp 6478 Example: 6479 \fI\fImax xmit\fR\fR\fI = \fR\fI\FC8192\F[]\fR\fI \fR 5656 6480 .RE 5657 6481 5658 6482 message command (G) 5659 .PP 5660 .RS 4 5661 This specifies what command to run when the server receives a WinPopup style message\. 5662 .sp 5663 This would normally be a command that would deliver the message somehow\. How this is to be done is up to your imagination\. 6483 .\" message command 6484 .PP 6485 .RS 4 6486 This specifies what command to run when the server receives a WinPopup style message\&. 6487 .sp 6488 This would normally be a command that would deliver the message somehow\&. How this is to be done is up to your imagination\&. 5664 6489 .sp 5665 6490 An example is: 5666 6491 .sp 5667 .RS 4 6492 .if n \{\ 6493 .RS 4 6494 .\} 6495 .fam C 6496 .ps -1 5668 6497 .nf 5669 message command = csh \-c \'xedit %s;rm %s\' & 6498 .if t \{\ 6499 .sp -1 6500 .\} 6501 .BB lightgray adjust-for-leading-newline 6502 .sp -1 6503 6504 \FCmessage command = csh \-c \'xedit %s;rm %s\' &\F[] 6505 .EB lightgray adjust-for-leading-newline 6506 .if t \{\ 6507 .sp 1 6508 .\} 5670 6509 .fi 5671 .RE 5672 .sp 6510 .fam 6511 .ps +1 6512 .if n \{\ 6513 .RE 6514 .\} 5673 6515 .sp 5674 6516 This delivers the message using 5675 xedit, then removes it afterwards\.5676 \fINOTE THAT IT IS VERY IMPORTANT THAT THIS COMMAND RETURN IMMEDIATELY\fR\ . That\'s why I have the \'&\' on the end\. If it doesn\'t return immediately then your PCs may freeze when sending messages (they should recover after 30 seconds, hopefully)\.5677 .sp 5678 All messages are delivered as the global guest user\ . The command takes the standard substitutions, although6517 \FCxedit\F[], then removes it afterwards\&. 6518 \fINOTE THAT IT IS VERY IMPORTANT THAT THIS COMMAND RETURN IMMEDIATELY\fR\&. That\'s why I have the \'&\' on the end\&. If it doesn\'t return immediately then your PCs may freeze when sending messages (they should recover after 30 seconds, hopefully)\&. 6519 .sp 6520 All messages are delivered as the global guest user\&. The command takes the standard substitutions, although 5679 6521 \fI %u\fR 5680 6522 won\'t work (\fI%U\fR 5681 may be better in this case)\ .5682 .sp 5683 Apart from the standard substitutions, some additional ones apply\ . In particular:6523 may be better in this case)\&. 6524 .sp 6525 Apart from the standard substitutions, some additional ones apply\&. In particular: 5684 6526 .sp 5685 6527 .RS 4 … … 5692 6534 .\} 5693 6535 \fI%s\fR 5694 = the filename containing the message\ .6536 = the filename containing the message\&. 5695 6537 .RE 5696 6538 .sp … … 5704 6546 .\} 5705 6547 \fI%t\fR 5706 = the destination that the message was sent to (probably the server name)\ .6548 = the destination that the message was sent to (probably the server name)\&. 5707 6549 .RE 5708 6550 .sp … … 5716 6558 .\} 5717 6559 \fI%f\fR 5718 = who the message is from\ .5719 .sp 5720 .RE 5721 You could make this command send mail, or whatever else takes your fancy\ . Please let us know of any really interesting ideas you have\.6560 = who the message is from\&. 6561 .sp 6562 .RE 6563 You could make this command send mail, or whatever else takes your fancy\&. Please let us know of any really interesting ideas you have\&. 5722 6564 .sp 5723 6565 Here\'s a way of sending the messages as mail to root: 5724 6566 .sp 5725 .RS 4 6567 .if n \{\ 6568 .RS 4 6569 .\} 6570 .fam C 6571 .ps -1 5726 6572 .nf 5727 message command = /bin/mail \-s \'message from %f on %m\' root < %s; rm %s 6573 .if t \{\ 6574 .sp -1 6575 .\} 6576 .BB lightgray adjust-for-leading-newline 6577 .sp -1 6578 6579 \FCmessage command = /bin/mail \-s \'message from %f on %m\' root < %s; rm %s\F[] 6580 .EB lightgray adjust-for-leading-newline 6581 .if t \{\ 6582 .sp 1 6583 .\} 5728 6584 .fi 5729 .RE 5730 .sp 5731 .sp 5732 If you don\'t have a message command then the message won\'t be delivered and Samba will tell the sender there was an error\. Unfortunately WfWg totally ignores the error code and carries on regardless, saying that the message was delivered\. 6585 .fam 6586 .ps +1 6587 .if n \{\ 6588 .RE 6589 .\} 6590 .sp 6591 If you don\'t have a message command then the message won\'t be delivered and Samba will tell the sender there was an error\&. Unfortunately WfWg totally ignores the error code and carries on regardless, saying that the message was delivered\&. 5733 6592 .sp 5734 6593 If you want to silently delete it then try: 5735 6594 .sp 5736 .RS 4 6595 .if n \{\ 6596 .RS 4 6597 .\} 6598 .fam C 6599 .ps -1 5737 6600 .nf 5738 message command = rm %s 6601 .if t \{\ 6602 .sp -1 6603 .\} 6604 .BB lightgray adjust-for-leading-newline 6605 .sp -1 6606 6607 \FCmessage command = rm %s\F[] 6608 .EB lightgray adjust-for-leading-newline 6609 .if t \{\ 6610 .sp 1 6611 .\} 5739 6612 .fi 5740 .RE 5741 .sp 5742 .sp 5743 Default: 5744 \fI\fImessage command\fR\fR\fI = \fR\fI\fR\fI \fR 5745 .sp 5746 Example: 5747 \fI\fImessage command\fR\fR\fI = \fR\fIcsh \-c \'xedit %s; rm %s\' &\fR\fI \fR 6613 .fam 6614 .ps +1 6615 .if n \{\ 6616 .RE 6617 .\} 6618 .sp 6619 Default: 6620 \fI\fImessage command\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 6621 .sp 6622 Example: 6623 \fI\fImessage command\fR\fR\fI = \fR\fI\FCcsh \-c \'xedit %s; rm %s\' &\F[]\fR\fI \fR 5748 6624 .RE 5749 6625 5750 6626 min print space (S) 5751 .PP 5752 .RS 4 5753 This sets the minimum amount of free disk space that must be available before a user will be able to spool a print job\. It is specified in kilobytes\. The default is 0, which means a user can always spool a print job\. 5754 .sp 5755 Default: 5756 \fI\fImin print space\fR\fR\fI = \fR\fI0\fR\fI \fR 5757 .sp 5758 Example: 5759 \fI\fImin print space\fR\fR\fI = \fR\fI2000\fR\fI \fR 6627 .\" min print space 6628 .PP 6629 .RS 4 6630 This sets the minimum amount of free disk space that must be available before a user will be able to spool a print job\&. It is specified in kilobytes\&. The default is 0, which means a user can always spool a print job\&. 6631 .sp 6632 Default: 6633 \fI\fImin print space\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 6634 .sp 6635 Example: 6636 \fI\fImin print space\fR\fR\fI = \fR\fI\FC2000\F[]\fR\fI \fR 5760 6637 .RE 5761 6638 5762 6639 min protocol (G) 5763 .PP 5764 .RS 4 5765 The value of the parameter (a string) is the lowest SMB protocol dialect than Samba will support\. Please refer to the 5766 \fImax protocol\fR 5767 parameter for a list of valid protocol names and a brief description of each\. You may also wish to refer to the C source code in 5768 \fIsource/smbd/negprot\.c\fR 5769 for a listing of known protocol dialects supported by clients\. 6640 .\" min protocol 6641 .PP 6642 .RS 4 6643 The value of the parameter (a string) is the lowest SMB protocol dialect than Samba will support\&. Please refer to the 6644 \m[blue]\fBmax protocol\fR\m[] 6645 parameter for a list of valid protocol names and a brief description of each\&. You may also wish to refer to the C source code in 6646 \FCsource/smbd/negprot\&.c\F[] 6647 for a listing of known protocol dialects supported by clients\&. 5770 6648 .sp 5771 6649 If you are viewing this parameter as a security measure, you should also refer to the 5772 \ fIlanman auth\fR5773 parameter\ . Otherwise, you should never need to change this parameter\.5774 .sp 5775 Default: 5776 \fI\fImin protocol\fR\fR\fI = \fR\fI CORE\fR\fI \fR5777 .sp 5778 Example: 5779 \fI\fImin protocol\fR\fR\fI = \fR\fI NT1\fR\fI \fR6650 \m[blue]\fBlanman auth\fR\m[] 6651 parameter\&. Otherwise, you should never need to change this parameter\&. 6652 .sp 6653 Default: 6654 \fI\fImin protocol\fR\fR\fI = \fR\fI\FCCORE\F[]\fR\fI \fR 6655 .sp 6656 Example: 6657 \fI\fImin protocol\fR\fR\fI = \fR\fI\FCNT1\F[]\fR\fI \fR 5780 6658 .RE 5781 6659 5782 6660 min receivefile size (G) 6661 .\" min receivefile size 5783 6662 .PP 5784 6663 .RS 4 5785 6664 This option changes the behavior of 5786 6665 \fBsmbd\fR(8) 5787 when processing SMBwriteX calls\ . Any incoming SMBwriteX call on a non\-signed SMB/CIFS connection greater than this value will not be processed in the normal way but will be passed to any underlying kernel recvfile or splice system call (if there is no such call Samba will emulate in user space)\. This allows zero\-copy writes directly from network socket buffers into the filesystem buffer cache, if available\. It may improve performance but user testing is recommended\. If set to zero Samba processes SMBwriteX calls in the normal way\. To enable POSIX large write support (SMB/CIFS writes up to 16Mb) this option must be nonzero\. The maximum value is 128k\. Values greater than 128k will be silently set to 128k\.5788 .sp 5789 Note this option will have NO EFFECT if set on a SMB signed connection\ .5790 .sp 5791 The default is zero, which diables this option\ .5792 .sp 5793 Default: 5794 \fI\fImin receivefile size\fR\fR\fI = \fR\fI 0\fR\fI \fR6666 when processing SMBwriteX calls\&. Any incoming SMBwriteX call on a non\-signed SMB/CIFS connection greater than this value will not be processed in the normal way but will be passed to any underlying kernel recvfile or splice system call (if there is no such call Samba will emulate in user space)\&. This allows zero\-copy writes directly from network socket buffers into the filesystem buffer cache, if available\&. It may improve performance but user testing is recommended\&. If set to zero Samba processes SMBwriteX calls in the normal way\&. To enable POSIX large write support (SMB/CIFS writes up to 16Mb) this option must be nonzero\&. The maximum value is 128k\&. Values greater than 128k will be silently set to 128k\&. 6667 .sp 6668 Note this option will have NO EFFECT if set on a SMB signed connection\&. 6669 .sp 6670 The default is zero, which diables this option\&. 6671 .sp 6672 Default: 6673 \fI\fImin receivefile size\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 5795 6674 .RE 5796 6675 5797 6676 min wins ttl (G) 6677 .\" min wins ttl 5798 6678 .PP 5799 6679 .RS 4 5800 6680 This option tells 5801 6681 \fBnmbd\fR(8) 5802 when acting as a WINS server (\ fIwins support = yes\fR) what the minimum \'time to live\' of NetBIOS names that5803 nmbd 5804 will grant will be (in seconds)\ . You should never need to change this parameter\. The default is 6 hours (21600 seconds)\.5805 .sp 5806 Default: 5807 \fI\fImin wins ttl\fR\fR\fI = \fR\fI 21600\fR\fI \fR6682 when acting as a WINS server (\m[blue]\fBwins support = yes\fR\m[]) what the minimum \'time to live\' of NetBIOS names that 6683 \FCnmbd\F[] 6684 will grant will be (in seconds)\&. You should never need to change this parameter\&. The default is 6 hours (21600 seconds)\&. 6685 .sp 6686 Default: 6687 \fI\fImin wins ttl\fR\fR\fI = \fR\fI\FC21600\F[]\fR\fI \fR 5808 6688 .RE 5809 6689 5810 6690 msdfs proxy (S) 5811 .PP 5812 .RS 4 5813 This parameter indicates that the share is a stand\-in for another CIFS share whose location is specified by the value of the parameter\. When clients attempt to connect to this share, they are redirected to the proxied share using the SMB\-Dfs protocol\. 5814 .sp 5815 Only Dfs roots can act as proxy shares\. Take a look at the 5816 \fImsdfs root\fR 6691 .\" msdfs proxy 6692 .PP 6693 .RS 4 6694 This parameter indicates that the share is a stand\-in for another CIFS share whose location is specified by the value of the parameter\&. When clients attempt to connect to this share, they are redirected to the proxied share using the SMB\-Dfs protocol\&. 6695 .sp 6696 Only Dfs roots can act as proxy shares\&. Take a look at the 6697 \m[blue]\fBmsdfs root\fR\m[] 5817 6698 and 5818 \ fIhost msdfs\fR5819 options to find out how to set up a Dfs root share\ .6699 \m[blue]\fBhost msdfs\fR\m[] 6700 options to find out how to set up a Dfs root share\&. 5820 6701 .sp 5821 6702 \fINo default\fR 5822 6703 .sp 5823 6704 Example: 5824 \fI\fImsdfs proxy\fR\fR\fI = \fR\fI\ eotherserver\esomeshare\fR\fI \fR6705 \fI\fImsdfs proxy\fR\fR\fI = \fR\fI\FC\eotherserver\esomeshare\F[]\fR\fI \fR 5825 6706 .RE 5826 6707 5827 6708 msdfs root (S) 6709 .\" msdfs root 5828 6710 .PP 5829 6711 .RS 4 5830 6712 If set to 5831 \fByes\fR, Samba treats the share as a Dfs root and allows clients to browse the distributed file system tree rooted at the share directory\ . Dfs links are specified in the share directory by symbolic links of the form5832 \ fImsdfs:serverA\e\eshareA,serverB\e\eshareB\fR5833 and so on\ . For more information on setting up a Dfs tree on Samba, refer to the MSDFS chapter in the Samba3\-HOWTO book\.5834 .sp 5835 Default: 5836 \fI\fImsdfs root\fR\fR\fI = \fR\fI no\fR\fI \fR6713 \fByes\fR, Samba treats the share as a Dfs root and allows clients to browse the distributed file system tree rooted at the share directory\&. Dfs links are specified in the share directory by symbolic links of the form 6714 \FCmsdfs:serverA\e\eshareA,serverB\e\eshareB\F[] 6715 and so on\&. For more information on setting up a Dfs tree on Samba, refer to the MSDFS chapter in the Samba3\-HOWTO book\&. 6716 .sp 6717 Default: 6718 \fI\fImsdfs root\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 5837 6719 .RE 5838 6720 5839 6721 name cache timeout (G) 5840 .PP 5841 .RS 4 5842 Specifies the number of seconds it takes before entries in samba\'s hostname resolve cache time out\. If the timeout is set to 0\. the caching is disabled\. 5843 .sp 5844 Default: 5845 \fI\fIname cache timeout\fR\fR\fI = \fR\fI660\fR\fI \fR 5846 .sp 5847 Example: 5848 \fI\fIname cache timeout\fR\fR\fI = \fR\fI0\fR\fI \fR 6722 .\" name cache timeout 6723 .PP 6724 .RS 4 6725 Specifies the number of seconds it takes before entries in samba\'s hostname resolve cache time out\&. If the timeout is set to 0\&. the caching is disabled\&. 6726 .sp 6727 Default: 6728 \fI\fIname cache timeout\fR\fR\fI = \fR\fI\FC660\F[]\fR\fI \fR 6729 .sp 6730 Example: 6731 \fI\fIname cache timeout\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 5849 6732 .RE 5850 6733 5851 6734 name resolve order (G) 5852 .PP 5853 .RS 4 5854 This option is used by the programs in the Samba suite to determine what naming services to use and in what order to resolve host names to IP addresses\. Its main purpose to is to control how netbios name resolution is performed\. The option takes a space separated string of name resolution options\. 5855 .sp 5856 The options are: "lmhosts", "host", "wins" and "bcast"\. They cause names to be resolved as follows: 6735 .\" name resolve order 6736 .PP 6737 .RS 4 6738 This option is used by the programs in the Samba suite to determine what naming services to use and in what order to resolve host names to IP addresses\&. Its main purpose to is to control how netbios name resolution is performed\&. The option takes a space separated string of name resolution options\&. 6739 .sp 6740 The options are: "lmhosts", "host", "wins" and "bcast"\&. They cause names to be resolved as follows: 5857 6741 .sp 5858 6742 .RS 4 … … 5866 6750 5867 6751 \fBlmhosts\fR 5868 : Lookup an IP address in the Samba lmhosts file\ . If the line in lmhosts has no name type attached to the NetBIOS name (see the manpage for lmhosts for details) then any name type matches for lookup\.6752 : Lookup an IP address in the Samba lmhosts file\&. If the line in lmhosts has no name type attached to the NetBIOS name (see the manpage for lmhosts for details) then any name type matches for lookup\&. 5869 6753 .RE 5870 6754 .sp … … 5880 6764 \fBhost\fR 5881 6765 : Do a standard host name to IP address resolution, using the system 5882 \ fI/etc/hosts \fR, NIS, or DNS lookups\. This method of name resolution is operating system depended for instance on IRIX or Solaris this may be controlled by the5883 \ fI/etc/nsswitch\.conf\fR5884 file\ . Note that this method is used only if the NetBIOS name type being queried is the 0x20 (server) name type or 0x1c (domain controllers)\. The latter case is only useful for active directory domains and results in a DNS query for the SRV RR entry matching _ldap\._tcp\.domain\.6766 \FC/etc/hosts \F[], NIS, or DNS lookups\&. This method of name resolution is operating system depended for instance on IRIX or Solaris this may be controlled by the 6767 \FC/etc/nsswitch\&.conf\F[] 6768 file\&. Note that this method is used only if the NetBIOS name type being queried is the 0x20 (server) name type or 0x1c (domain controllers)\&. The latter case is only useful for active directory domains and results in a DNS query for the SRV RR entry matching _ldap\&._tcp\&.domain\&. 5885 6769 .RE 5886 6770 .sp … … 5895 6779 \fBwins\fR 5896 6780 : Query a name with the IP address listed in the 5897 \ fIWINSSERVER\fR5898 parameter\ . If no WINS server has been specified this method will be ignored\.6781 \m[blue]\fBWINSSERVER\fR\m[] 6782 parameter\&. If no WINS server has been specified this method will be ignored\&. 5899 6783 .RE 5900 6784 .sp … … 5909 6793 \fBbcast\fR 5910 6794 : Do a broadcast on each of the known local interfaces listed in the 5911 \ fIinterfaces\fR5912 parameter\ . This is the least reliable of the name resolution methods as it depends on the target host being on a locally connected subnet\.5913 .sp 5914 .RE 5915 The example below will cause the local lmhosts file to be examined first, followed by a broadcast attempt, followed by a normal system hostname lookup\ .5916 .sp 5917 When Samba is functioning in ADS security mode ( security = ads) it is advised to use following settings for6795 \m[blue]\fBinterfaces\fR\m[] 6796 parameter\&. This is the least reliable of the name resolution methods as it depends on the target host being on a locally connected subnet\&. 6797 .sp 6798 .RE 6799 The example below will cause the local lmhosts file to be examined first, followed by a broadcast attempt, followed by a normal system hostname lookup\&. 6800 .sp 6801 When Samba is functioning in ADS security mode (\FCsecurity = ads\F[]) it is advised to use following settings for 5918 6802 \fIname resolve order\fR: 5919 6803 .sp 5920 name resolve order = wins bcast 5921 .sp 5922 DC lookups will still be done via DNS, but fallbacks to netbios names will not inundate your DNS servers with needless querys for DOMAIN<0x1c> lookups\ .5923 .sp 5924 Default: 5925 \fI\fIname resolve order\fR\fR\fI = \fR\fI lmhosts host wins bcast\fR\fI \fR5926 .sp 5927 Example: 5928 \fI\fIname resolve order\fR\fR\fI = \fR\fI lmhosts bcast host\fR\fI \fR6804 \FCname resolve order = wins bcast\F[] 6805 .sp 6806 DC lookups will still be done via DNS, but fallbacks to netbios names will not inundate your DNS servers with needless querys for DOMAIN<0x1c> lookups\&. 6807 .sp 6808 Default: 6809 \fI\fIname resolve order\fR\fR\fI = \fR\fI\FClmhosts host wins bcast\F[]\fR\fI \fR 6810 .sp 6811 Example: 6812 \fI\fIname resolve order\fR\fR\fI = \fR\fI\FClmhosts bcast host\F[]\fR\fI \fR 5929 6813 .RE 5930 6814 5931 6815 netbios aliases (G) 5932 .PP 5933 .RS 4 5934 This is a list of NetBIOS names that nmbd will advertise as additional names by which the Samba server is known\. This allows one machine to appear in browse lists under multiple names\. If a machine is acting as a browse server or logon server none of these names will be advertised as either browse server or logon servers, only the primary name of the machine will be advertised with these capabilities\. 5935 .sp 5936 Default: 5937 \fI\fInetbios aliases\fR\fR\fI = \fR\fI # empty string (no additional names)\fR\fI \fR 5938 .sp 5939 Example: 5940 \fI\fInetbios aliases\fR\fR\fI = \fR\fITEST TEST1 TEST2\fR\fI \fR 6816 .\" netbios aliases 6817 .PP 6818 .RS 4 6819 This is a list of NetBIOS names that nmbd will advertise as additional names by which the Samba server is known\&. This allows one machine to appear in browse lists under multiple names\&. If a machine is acting as a browse server or logon server none of these names will be advertised as either browse server or logon servers, only the primary name of the machine will be advertised with these capabilities\&. 6820 .sp 6821 Default: 6822 \fI\fInetbios aliases\fR\fR\fI = \fR\fI\FC # empty string (no additional names)\F[]\fR\fI \fR 6823 .sp 6824 Example: 6825 \fI\fInetbios aliases\fR\fR\fI = \fR\fI\FCTEST TEST1 TEST2\F[]\fR\fI \fR 5941 6826 .RE 5942 6827 5943 6828 netbios name (G) 5944 .PP 5945 .RS 4 5946 This sets the NetBIOS name by which a Samba server is known\. By default it is the same as the first component of the host\'s DNS name\. If a machine is a browse server or logon server this name (or the first component of the hosts DNS name) will be the name that these services are advertised under\. 6829 .\" netbios name 6830 .PP 6831 .RS 4 6832 This sets the NetBIOS name by which a Samba server is known\&. By default it is the same as the first component of the host\'s DNS name\&. If a machine is a browse server or logon server this name (or the first component of the hosts DNS name) will be the name that these services are advertised under\&. 5947 6833 .sp 5948 6834 There is a bug in Samba\-3 that breaks operation of browsing and access to shares if the netbios name is set to the literal name 5949 PIPE\. To avoid this problem, do not name your Samba\-3 server5950 PIPE\.5951 .sp 5952 Default: 5953 \fI\fInetbios name\fR\fR\fI = \fR\fI # machine DNS name\fR\fI \fR5954 .sp 5955 Example: 5956 \fI\fInetbios name\fR\fR\fI = \fR\fI MYNAME\fR\fI \fR6835 \FCPIPE\F[]\&. To avoid this problem, do not name your Samba\-3 server 6836 \FCPIPE\F[]\&. 6837 .sp 6838 Default: 6839 \fI\fInetbios name\fR\fR\fI = \fR\fI\FC # machine DNS name\F[]\fR\fI \fR 6840 .sp 6841 Example: 6842 \fI\fInetbios name\fR\fR\fI = \fR\fI\FCMYNAME\F[]\fR\fI \fR 5957 6843 .RE 5958 6844 5959 6845 netbios scope (G) 5960 .PP 5961 .RS 4 5962 This sets the NetBIOS scope that Samba will operate under\. This should not be set unless every machine on your LAN also sets this value\. 5963 .sp 5964 Default: 5965 \fI\fInetbios scope\fR\fR\fI = \fR\fI\fR\fI \fR 6846 .\" netbios scope 6847 .PP 6848 .RS 4 6849 This sets the NetBIOS scope that Samba will operate under\&. This should not be set unless every machine on your LAN also sets this value\&. 6850 .sp 6851 Default: 6852 \fI\fInetbios scope\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 5966 6853 .RE 5967 6854 5968 6855 nis homedir (G) 5969 .PP 5970 .RS 4 5971 Get the home share server from a NIS map\. For UNIX systems that use an automounter, the user\'s home directory will often be mounted on a workstation on demand from a remote server\. 5972 .sp 5973 When the Samba logon server is not the actual home directory server, but is mounting the home directories via NFS then two network hops would be required to access the users home directory if the logon server told the client to use itself as the SMB server for home directories (one over SMB and one over NFS)\. This can be very slow\. 5974 .sp 5975 This option allows Samba to return the home share as being on a different server to the logon server and as long as a Samba daemon is running on the home directory server, it will be mounted on the Samba client directly from the directory server\. When Samba is returning the home share to the client, it will consult the NIS map specified in 5976 \fIhomedir map\fR 5977 and return the server listed there\. 5978 .sp 5979 Note that for this option to work there must be a working NIS system and the Samba server with this option must also be a logon server\. 5980 .sp 5981 Default: 5982 \fI\fInis homedir\fR\fR\fI = \fR\fIno\fR\fI \fR 6856 .\" nis homedir 6857 .PP 6858 .RS 4 6859 Get the home share server from a NIS map\&. For UNIX systems that use an automounter, the user\'s home directory will often be mounted on a workstation on demand from a remote server\&. 6860 .sp 6861 When the Samba logon server is not the actual home directory server, but is mounting the home directories via NFS then two network hops would be required to access the users home directory if the logon server told the client to use itself as the SMB server for home directories (one over SMB and one over NFS)\&. This can be very slow\&. 6862 .sp 6863 This option allows Samba to return the home share as being on a different server to the logon server and as long as a Samba daemon is running on the home directory server, it will be mounted on the Samba client directly from the directory server\&. When Samba is returning the home share to the client, it will consult the NIS map specified in 6864 \m[blue]\fBhomedir map\fR\m[] 6865 and return the server listed there\&. 6866 .sp 6867 Note that for this option to work there must be a working NIS system and the Samba server with this option must also be a logon server\&. 6868 .sp 6869 Default: 6870 \fI\fInis homedir\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 5983 6871 .RE 5984 6872 5985 6873 nt acl support (S) 6874 .\" nt acl support 5986 6875 .PP 5987 6876 .RS 4 5988 6877 This boolean parameter controls whether 5989 6878 \fBsmbd\fR(8) 5990 will attempt to map UNIX permissions into Windows NT access control lists\ . The UNIX permissions considered are the the traditional UNIX owner and group permissions, as well as POSIX ACLs set on any files or directories\. This parameter was formally a global parameter in releases prior to 2\.2\.2\.5991 .sp 5992 Default: 5993 \fI\fInt acl support\fR\fR\fI = \fR\fI yes\fR\fI \fR6879 will attempt to map UNIX permissions into Windows NT access control lists\&. The UNIX permissions considered are the the traditional UNIX owner and group permissions, as well as POSIX ACLs set on any files or directories\&. This parameter was formally a global parameter in releases prior to 2\&.2\&.2\&. 6880 .sp 6881 Default: 6882 \fI\fInt acl support\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 5994 6883 .RE 5995 6884 5996 6885 ntlm auth (G) 6886 .\" ntlm auth 5997 6887 .PP 5998 6888 .RS 4 5999 6889 This parameter determines whether or not 6000 6890 \fBsmbd\fR(8) 6001 will attempt to authenticate users using the NTLM encrypted password response\ . If disabled, either the lanman password hash or an NTLMv2 response will need to be sent by the client\.6891 will attempt to authenticate users using the NTLM encrypted password response\&. If disabled, either the lanman password hash or an NTLMv2 response will need to be sent by the client\&. 6002 6892 .sp 6003 6893 If this option, and 6004 lanman auth 6005 are both disabled, then only NTLMv2 logins will be permited\ . Not all clients support NTLMv2, and most will require special configuration to use it\.6006 .sp 6007 Default: 6008 \fI\fIntlm auth\fR\fR\fI = \fR\fI yes\fR\fI \fR6894 \FClanman auth\F[] 6895 are both disabled, then only NTLMv2 logins will be permited\&. Not all clients support NTLMv2, and most will require special configuration to use it\&. 6896 .sp 6897 Default: 6898 \fI\fIntlm auth\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 6009 6899 .RE 6010 6900 6011 6901 nt pipe support (G) 6902 .\" nt pipe support 6012 6903 .PP 6013 6904 .RS 4 … … 6016 6907 will allow Windows NT clients to connect to the NT SMB specific 6017 6908 \fBIPC$\fR 6018 pipes\ . This is a developer debugging option and can be left alone\.6019 .sp 6020 Default: 6021 \fI\fInt pipe support\fR\fR\fI = \fR\fI yes\fR\fI \fR6909 pipes\&. This is a developer debugging option and can be left alone\&. 6910 .sp 6911 Default: 6912 \fI\fInt pipe support\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 6022 6913 .RE 6023 6914 6024 6915 nt status support (G) 6916 .\" nt status support 6025 6917 .PP 6026 6918 .RS 4 6027 6919 This boolean parameter controls whether 6028 6920 \fBsmbd\fR(8) 6029 will negotiate NT specific status support with Windows NT/2k/XP clients\ . This is a developer debugging option and should be left alone\. If this option is set to6921 will negotiate NT specific status support with Windows NT/2k/XP clients\&. This is a developer debugging option and should be left alone\&. If this option is set to 6030 6922 \fBno\fR 6031 then Samba offers exactly the same DOS error codes that versions prior to Samba 2\ .2\.3 reported\.6032 .sp 6033 You should not need to ever disable this parameter\ .6034 .sp 6035 Default: 6036 \fI\fInt status support\fR\fR\fI = \fR\fI yes\fR\fI \fR6923 then Samba offers exactly the same DOS error codes that versions prior to Samba 2\&.2\&.3 reported\&. 6924 .sp 6925 You should not need to ever disable this parameter\&. 6926 .sp 6927 Default: 6928 \fI\fInt status support\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 6037 6929 .RE 6038 6930 6039 6931 null passwords (G) 6040 .PP 6041 .RS 4 6042 Allow or disallow client access to accounts that have null passwords\. 6932 .\" null passwords 6933 .PP 6934 .RS 4 6935 Allow or disallow client access to accounts that have null passwords\&. 6043 6936 .sp 6044 6937 See also 6045 \fBsmbpasswd\fR(5)\ .6046 .sp 6047 Default: 6048 \fI\fInull passwords\fR\fR\fI = \fR\fI no\fR\fI \fR6938 \fBsmbpasswd\fR(5)\&. 6939 .sp 6940 Default: 6941 \fI\fInull passwords\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 6049 6942 .RE 6050 6943 6051 6944 obey pam restrictions (G) 6052 .PP 6053 .RS 4 6054 When Samba 3\.0 is configured to enable PAM support (i\.e\. \-\-with\-pam), this parameter will control whether or not Samba should obey PAM\'s account and session management directives\. The default behavior is to use PAM for clear text authentication only and to ignore any account or session management\. Note that Samba always ignores PAM for authentication in the case of 6055 \fIencrypt passwords = yes\fR\. The reason is that PAM modules cannot support the challenge/response authentication mechanism needed in the presence of SMB password encryption\. 6056 .sp 6057 Default: 6058 \fI\fIobey pam restrictions\fR\fR\fI = \fR\fIno\fR\fI \fR 6945 .\" obey pam restrictions 6946 .PP 6947 .RS 4 6948 When Samba 3\&.0 is configured to enable PAM support (i\&.e\&. \-\-with\-pam), this parameter will control whether or not Samba should obey PAM\'s account and session management directives\&. The default behavior is to use PAM for clear text authentication only and to ignore any account or session management\&. Note that Samba always ignores PAM for authentication in the case of 6949 \m[blue]\fBencrypt passwords = yes\fR\m[]\&. The reason is that PAM modules cannot support the challenge/response authentication mechanism needed in the presence of SMB password encryption\&. 6950 .sp 6951 Default: 6952 \fI\fIobey pam restrictions\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 6059 6953 .RE 6060 6954 6061 6955 only user (S) 6956 .\" only user 6062 6957 .PP 6063 6958 .RS 4 6064 6959 This is a boolean option that controls whether connections with usernames not in the 6065 6960 \fIuser\fR 6066 list will be allowed\ . By default this option is disabled so that a client can supply a username to be used by the server\. Enabling this parameter will force the server to only use the login names from the6961 list will be allowed\&. By default this option is disabled so that a client can supply a username to be used by the server\&. Enabling this parameter will force the server to only use the login names from the 6067 6962 \fIuser\fR 6068 6963 list and is only really useful in 6069 \ fIsecurity = share\fR6070 level security\ .6071 .sp 6072 Note that this also means Samba won\'t try to deduce usernames from the service name\ . This can be annoying for the [homes] section\. To get around this you could use6073 user = %S 6964 \m[blue]\fBsecurity = share\fR\m[] 6965 level security\&. 6966 .sp 6967 Note that this also means Samba won\'t try to deduce usernames from the service name\&. This can be annoying for the [homes] section\&. To get around this you could use 6968 \FCuser = %S\F[] 6074 6969 which means your 6075 6970 \fIuser\fR 6076 list will be just the service name, which for home directories is the name of the user\ .6077 .sp 6078 Default: 6079 \fI\fIonly user\fR\fR\fI = \fR\fI no\fR\fI \fR6971 list will be just the service name, which for home directories is the name of the user\&. 6972 .sp 6973 Default: 6974 \fI\fIonly user\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 6080 6975 .RE 6081 6976 6082 6977 oplock break wait time (G) 6083 .PP 6084 .RS 4 6085 This is a tuning parameter added due to bugs in both Windows 9x and WinNT\. If Samba responds to a client too quickly when that client issues an SMB that can cause an oplock break request, then the network client can fail and not respond to the break request\. This tuning parameter (which is set in milliseconds) is the amount of time Samba will wait before sending an oplock break request to such (broken) clients\. 6086 .sp 6978 .\" oplock break wait time 6979 .PP 6980 .RS 4 6981 This is a tuning parameter added due to bugs in both Windows 9x and WinNT\&. If Samba responds to a client too quickly when that client issues an SMB that can cause an oplock break request, then the network client can fail and not respond to the break request\&. This tuning parameter (which is set in milliseconds) is the amount of time Samba will wait before sending an oplock break request to such (broken) clients\&. 6982 .if n \{\ 6983 .sp 6984 .\} 6985 .RS 4 6986 .BM yellow 6087 6987 .it 1 an-trap 6088 6988 .nr an-no-space-flag 1 6089 6989 .nr an-break-flag 1 6090 6990 .br 6091 Warning 6092 DO NOT CHANGE THIS PARAMETER UNLESS YOU HAVE READ AND UNDERSTOOD THE SAMBA OPLOCK CODE\. 6093 6094 Default: 6095 \fI\fIoplock break wait time\fR\fR\fI = \fR\fI0\fR\fI \fR 6991 .ps +1 6992 \fBWarning\fR 6993 .ps -1 6994 .br 6995 DO NOT CHANGE THIS PARAMETER UNLESS YOU HAVE READ AND UNDERSTOOD THE SAMBA OPLOCK CODE\&. 6996 .sp .5v 6997 .EM yellow 6998 .RE 6999 Default: 7000 \fI\fIoplock break wait time\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 6096 7001 .RE 6097 7002 6098 7003 oplock contention limit (S) 7004 .\" oplock contention limit 6099 7005 .PP 6100 7006 .RS 4 … … 6103 7009 advanced 6104 7010 \fBsmbd\fR(8) 6105 tuning option to improve the efficiency of the granting of oplocks under multiple client contention for the same file\ .7011 tuning option to improve the efficiency of the granting of oplocks under multiple client contention for the same file\&. 6106 7012 .sp 6107 7013 In brief it specifies a number, which causes 6108 \fBsmbd\fR(8)not to grant an oplock even when requested if the approximate number of clients contending for an oplock on the same file goes over this limit\. This causes 6109 smbd 6110 to behave in a similar way to Windows NT\. 6111 .sp 7014 \fBsmbd\fR(8)not to grant an oplock even when requested if the approximate number of clients contending for an oplock on the same file goes over this limit\&. This causes 7015 \FCsmbd\F[] 7016 to behave in a similar way to Windows NT\&. 7017 .if n \{\ 7018 .sp 7019 .\} 7020 .RS 4 7021 .BM yellow 6112 7022 .it 1 an-trap 6113 7023 .nr an-no-space-flag 1 6114 7024 .nr an-break-flag 1 6115 7025 .br 6116 Warning 6117 DO NOT CHANGE THIS PARAMETER UNLESS YOU HAVE READ AND UNDERSTOOD THE SAMBA OPLOCK CODE\. 6118 6119 Default: 6120 \fI\fIoplock contention limit\fR\fR\fI = \fR\fI2\fR\fI \fR 7026 .ps +1 7027 \fBWarning\fR 7028 .ps -1 7029 .br 7030 DO NOT CHANGE THIS PARAMETER UNLESS YOU HAVE READ AND UNDERSTOOD THE SAMBA OPLOCK CODE\&. 7031 .sp .5v 7032 .EM yellow 7033 .RE 7034 Default: 7035 \fI\fIoplock contention limit\fR\fR\fI = \fR\fI\FC2\F[]\fR\fI \fR 6121 7036 .RE 6122 7037 6123 7038 oplocks (S) 7039 .\" oplocks 6124 7040 .PP 6125 7041 .RS 4 6126 7042 This boolean option tells 6127 smbd 6128 whether to issue oplocks (opportunistic locks) to file open requests on this share\ . The oplock code can dramatically (approx\. 30% or more) improve the speed of access to files on Samba servers\. It allows the clients to aggressively cache files locally and you may want to disable this option for unreliable network environments (it is turned on by default in Windows NT Servers)\. For more information see the file6129 \ fISpeed\.txt\fR7043 \FCsmbd\F[] 7044 whether to issue oplocks (opportunistic locks) to file open requests on this share\&. The oplock code can dramatically (approx\&. 30% or more) improve the speed of access to files on Samba servers\&. It allows the clients to aggressively cache files locally and you may want to disable this option for unreliable network environments (it is turned on by default in Windows NT Servers)\&. For more information see the file 7045 \FCSpeed\&.txt\F[] 6130 7046 in the Samba 6131 \ fIdocs/\fR6132 directory\ .6133 .sp 6134 Oplocks may be selectively turned off on certain files with a share\ . See the6135 \ fIveto oplock files\fR6136 parameter\ . On some systems oplocks are recognized by the underlying operating system\. This allows data synchronization between all access to oplocked files, whether it be via Samba or NFS or a local UNIX process\. See the6137 \ fIkernel oplocks\fR6138 parameter for details\ .6139 .sp 6140 Default: 6141 \fI\fIoplocks\fR\fR\fI = \fR\fI yes\fR\fI \fR7047 \FCdocs/\F[] 7048 directory\&. 7049 .sp 7050 Oplocks may be selectively turned off on certain files with a share\&. See the 7051 \m[blue]\fBveto oplock files\fR\m[] 7052 parameter\&. On some systems oplocks are recognized by the underlying operating system\&. This allows data synchronization between all access to oplocked files, whether it be via Samba or NFS or a local UNIX process\&. See the 7053 \m[blue]\fBkernel oplocks\fR\m[] 7054 parameter for details\&. 7055 .sp 7056 Default: 7057 \fI\fIoplocks\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 6142 7058 .RE 6143 7059 6144 7060 os2 driver map (G) 6145 .PP 6146 .RS 4 6147 The parameter is used to define the absolute path to a file containing a mapping of Windows NT printer driver names to OS/2 printer driver names\. The format is: 6148 .sp 6149 <nt driver name> = <os2 driver name>\.<device name> 7061 .\" os2 driver map 7062 .PP 7063 .RS 4 7064 The parameter is used to define the absolute path to a file containing a mapping of Windows NT printer driver names to OS/2 printer driver names\&. The format is: 7065 .sp 7066 <nt driver name> = <os2 driver name>\&.<device name> 6150 7067 .sp 6151 7068 For example, a valid entry using the HP LaserJet 5 printer driver would appear as 6152 HP LaserJet 5L = LASERJET\.HP LaserJet 5L\.6153 .sp 6154 The need for the file is due to the printer driver namespace problem described in the chapter on Classical Printing in the Samba3\-HOWTO book\ . For more details on OS/2 clients, please refer to chapter on other clients in the Samba3\-HOWTO book\.6155 .sp 6156 Default: 6157 \fI\fIos2 driver map\fR\fR\fI = \fR\fI\ fR\fI \fR7069 \FCHP LaserJet 5L = LASERJET\&.HP LaserJet 5L\F[]\&. 7070 .sp 7071 The need for the file is due to the printer driver namespace problem described in the chapter on Classical Printing in the Samba3\-HOWTO book\&. For more details on OS/2 clients, please refer to chapter on other clients in the Samba3\-HOWTO book\&. 7072 .sp 7073 Default: 7074 \fI\fIos2 driver map\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 6158 7075 .RE 6159 7076 6160 7077 os level (G) 6161 .PP 6162 .RS 4 6163 This integer value controls what level Samba advertises itself as for browse elections\. The value of this parameter determines whether 7078 .\" os level 7079 .PP 7080 .RS 4 7081 This integer value controls what level Samba advertises itself as for browse elections\&. The value of this parameter determines whether 6164 7082 \fBnmbd\fR(8) 6165 7083 has a chance of becoming a local master browser for the 6166 \ fIworkgroup\fR6167 in the local broadcast area\ .7084 \m[blue]\fBworkgroup\fR\m[] 7085 in the local broadcast area\&. 6168 7086 .sp 6169 7087 \fI Note:\fR 6170 By default, Samba will win a local master browsing election over all Microsoft operating systems except a Windows NT 4\ .0/2000 Domain Controller\. This means that a misconfigured Samba host can effectively isolate a subnet for browsing purposes\. This parameter is largely auto\-configured in the Samba\-3 release series and it is seldom necessary to manually override the default setting\. Please refer to the chapter on Network Browsing in the Samba\-3 HOWTO document for further information regarding the use of this parameter\.7088 By default, Samba will win a local master browsing election over all Microsoft operating systems except a Windows NT 4\&.0/2000 Domain Controller\&. This means that a misconfigured Samba host can effectively isolate a subnet for browsing purposes\&. This parameter is largely auto\-configured in the Samba\-3 release series and it is seldom necessary to manually override the default setting\&. Please refer to the chapter on Network Browsing in the Samba\-3 HOWTO document for further information regarding the use of this parameter\&. 6171 7089 \fINote:\fR 6172 The maximum value for this parameter is 255\ . If you use higher values, counting will start at 0!6173 .sp 6174 Default: 6175 \fI\fIos level\fR\fR\fI = \fR\fI 20\fR\fI \fR6176 .sp 6177 Example: 6178 \fI\fIos level\fR\fR\fI = \fR\fI 65\fR\fI \fR7090 The maximum value for this parameter is 255\&. If you use higher values, counting will start at 0! 7091 .sp 7092 Default: 7093 \fI\fIos level\fR\fR\fI = \fR\fI\FC20\F[]\fR\fI \fR 7094 .sp 7095 Example: 7096 \fI\fIos level\fR\fR\fI = \fR\fI\FC65\F[]\fR\fI \fR 6179 7097 .RE 6180 7098 6181 7099 pam password change (G) 6182 .PP 6183 .RS 4 6184 With the addition of better PAM support in Samba 2\.2, this parameter, it is possible to use PAM\'s password change control flag for Samba\. If enabled, then PAM will be used for password changes when requested by an SMB client instead of the program listed in 6185 \fIpasswd program\fR\. It should be possible to enable this without changing your 6186 \fIpasswd chat\fR 6187 parameter for most setups\. 6188 .sp 6189 Default: 6190 \fI\fIpam password change\fR\fR\fI = \fR\fIno\fR\fI \fR 7100 .\" pam password change 7101 .PP 7102 .RS 4 7103 With the addition of better PAM support in Samba 2\&.2, this parameter, it is possible to use PAM\'s password change control flag for Samba\&. If enabled, then PAM will be used for password changes when requested by an SMB client instead of the program listed in 7104 \m[blue]\fBpasswd program\fR\m[]\&. It should be possible to enable this without changing your 7105 \m[blue]\fBpasswd chat\fR\m[] 7106 parameter for most setups\&. 7107 .sp 7108 Default: 7109 \fI\fIpam password change\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 6191 7110 .RE 6192 7111 6193 7112 panic action (G) 7113 .\" panic action 6194 7114 .PP 6195 7115 .RS 4 … … 6198 7118 or 6199 7119 \fBnmbd\fR(8) 6200 crashes\ . This is usually used to draw attention to the fact that a problem occurred\.6201 .sp 6202 Default: 6203 \fI\fIpanic action\fR\fR\fI = \fR\fI\ fR\fI \fR6204 .sp 6205 Example: 6206 \fI\fIpanic action\fR\fR\fI = \fR\fI "/bin/sleep 90000"\fR\fI \fR7120 crashes\&. This is usually used to draw attention to the fact that a problem occurred\&. 7121 .sp 7122 Default: 7123 \fI\fIpanic action\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 7124 .sp 7125 Example: 7126 \fI\fIpanic action\fR\fR\fI = \fR\fI\FC"/bin/sleep 90000"\F[]\fR\fI \fR 6207 7127 .RE 6208 7128 6209 7129 paranoid server security (G) 6210 .PP 6211 .RS 4 6212 Some version of NT 4\.x allow non\-guest users with a bad passowrd\. When this option is enabled, samba will not use a broken NT 4\.x server as password server, but instead complain to the logs and exit\. 6213 .sp 6214 Disabling this option prevents Samba from making this check, which involves deliberatly attempting a bad logon to the remote server\. 6215 .sp 6216 Default: 6217 \fI\fIparanoid server security\fR\fR\fI = \fR\fIyes\fR\fI \fR 7130 .\" paranoid server security 7131 .PP 7132 .RS 4 7133 Some version of NT 4\&.x allow non\-guest users with a bad passowrd\&. When this option is enabled, samba will not use a broken NT 4\&.x server as password server, but instead complain to the logs and exit\&. 7134 .sp 7135 Disabling this option prevents Samba from making this check, which involves deliberatly attempting a bad logon to the remote server\&. 7136 .sp 7137 Default: 7138 \fI\fIparanoid server security\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 6218 7139 .RE 6219 7140 6220 7141 passdb backend (G) 6221 .PP 6222 .RS 4 6223 This option allows the administrator to chose which backend will be used for storing user and possibly group information\. This allows you to swap between different storage mechanisms without recompile\. 6224 .sp 6225 The parameter value is divided into two parts, the backend\'s name, and a \'location\' string that has meaning only to that particular backed\. These are separated by a : character\. 7142 .\" passdb backend 7143 .PP 7144 .RS 4 7145 This option allows the administrator to chose which backend will be used for storing user and possibly group information\&. This allows you to swap between different storage mechanisms without recompile\&. 7146 .sp 7147 The parameter value is divided into two parts, the backend\'s name, and a \'location\' string that has meaning only to that particular backed\&. These are separated by a : character\&. 6226 7148 .sp 6227 7149 Available backends can include: … … 6235 7157 .IP \(bu 2.3 6236 7158 .\} 6237 smbpasswd 6238 \- The default smbpasswd backend\ . Takes a path to the smbpasswd file as an optional argument\.6239 .RE 6240 .sp 6241 .RS 4 6242 .ie n \{\ 6243 \h'-04'\(bu\h'+03'\c 6244 .\} 6245 .el \{\ 6246 .sp -1 6247 .IP \(bu 2.3 6248 .\} 6249 tdbsam 6250 \- The TDB based password storage backend\ . Takes a path to the TDB as an optional argument (defaults to passdb\.tdb in the6251 \ fIprivate dir\fR6252 directory\ .6253 .RE 6254 .sp 6255 .RS 4 6256 .ie n \{\ 6257 \h'-04'\(bu\h'+03'\c 6258 .\} 6259 .el \{\ 6260 .sp -1 6261 .IP \(bu 2.3 6262 .\} 6263 ldapsam 6264 \- The LDAP based passdb backend\ . Takes an LDAP URL as an optional argument (defaults to6265 ldap://localhost)6266 .sp 6267 LDAP connections should be secured where possible\ . This may be done using either Start\-TLS (see6268 \ fIldap ssl\fR) or by specifying7159 \FCsmbpasswd\F[] 7160 \- The default smbpasswd backend\&. Takes a path to the smbpasswd file as an optional argument\&. 7161 .RE 7162 .sp 7163 .RS 4 7164 .ie n \{\ 7165 \h'-04'\(bu\h'+03'\c 7166 .\} 7167 .el \{\ 7168 .sp -1 7169 .IP \(bu 2.3 7170 .\} 7171 \FCtdbsam\F[] 7172 \- The TDB based password storage backend\&. Takes a path to the TDB as an optional argument (defaults to passdb\&.tdb in the 7173 \m[blue]\fBprivate dir\fR\m[] 7174 directory\&. 7175 .RE 7176 .sp 7177 .RS 4 7178 .ie n \{\ 7179 \h'-04'\(bu\h'+03'\c 7180 .\} 7181 .el \{\ 7182 .sp -1 7183 .IP \(bu 2.3 7184 .\} 7185 \FCldapsam\F[] 7186 \- The LDAP based passdb backend\&. Takes an LDAP URL as an optional argument (defaults to 7187 \FCldap://localhost\F[]) 7188 .sp 7189 LDAP connections should be secured where possible\&. This may be done using either Start\-TLS (see 7190 \m[blue]\fBldap ssl\fR\m[]) or by specifying 6269 7191 \fIldaps://\fR 6270 in the URL argument\ .6271 .sp 6272 Multiple servers may also be specified in double\-quotes\ . Whether multiple servers are supported or not and the exact syntax depends on the LDAP library you use\.7192 in the URL argument\&. 7193 .sp 7194 Multiple servers may also be specified in double\-quotes\&. Whether multiple servers are supported or not and the exact syntax depends on the LDAP library you use\&. 6273 7195 .sp 6274 7196 .RE … … 6276 7198 Examples of use are: 6277 7199 .sp 6278 .RS 4 7200 .if n \{\ 7201 .RS 4 7202 .\} 7203 .fam C 7204 .ps -1 6279 7205 .nf 6280 passdb backend = tdbsam:/etc/samba/private/passdb\.tdb 7206 .if t \{\ 7207 .sp -1 7208 .\} 7209 .BB lightgray adjust-for-leading-newline 7210 .sp -1 7211 7212 passdb backend = tdbsam:/etc/samba/private/passdb\&.tdb 6281 7213 6282 7214 or multi server LDAP URL with OpenLDAP library: 6283 7215 6284 passdb backend = ldapsam:"ldap://ldap\-1\ .example\.com ldap://ldap\-2\.example\.com"7216 passdb backend = ldapsam:"ldap://ldap\-1\&.example\&.com ldap://ldap\-2\&.example\&.com" 6285 7217 6286 7218 or multi server LDAP URL with Netscape based LDAP library: 6287 7219 6288 passdb backend = ldapsam:"ldap://ldap\-1\.example\.com ldap\-2\.example\.com" 7220 passdb backend = ldapsam:"ldap://ldap\-1\&.example\&.com ldap\-2\&.example\&.com" 7221 .EB lightgray adjust-for-leading-newline 7222 .if t \{\ 7223 .sp 1 7224 .\} 6289 7225 .fi 6290 .RE 6291 Default: 6292 \fI\fIpassdb backend\fR\fR\fI = \fR\fIsmbpasswd\fR\fI \fR 7226 .fam 7227 .ps +1 7228 .if n \{\ 7229 .RE 7230 .\} 7231 .sp 7232 Default: 7233 \fI\fIpassdb backend\fR\fR\fI = \fR\fI\FCsmbpasswd\F[]\fR\fI \fR 6293 7234 .RE 6294 7235 6295 7236 passdb expand explicit (G) 6296 .PP 6297 .RS 4 6298 This parameter controls whether Samba substitutes %\-macros in the passdb fields if they are explicitly set\. We used to expand macros here, but this turned out to be a bug because the Windows client can expand a variable %G_osver% in which %G would have been substituted by the user\'s primary group\. 6299 .sp 6300 Default: 6301 \fI\fIpassdb expand explicit\fR\fR\fI = \fR\fIno\fR\fI \fR 7237 .\" passdb expand explicit 7238 .PP 7239 .RS 4 7240 This parameter controls whether Samba substitutes %\-macros in the passdb fields if they are explicitly set\&. We used to expand macros here, but this turned out to be a bug because the Windows client can expand a variable %G_osver% in which %G would have been substituted by the user\'s primary group\&. 7241 .sp 7242 Default: 7243 \fI\fIpassdb expand explicit\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 6302 7244 .RE 6303 7245 6304 7246 passwd chat debug (G) 7247 .\" passwd chat debug 6305 7248 .PP 6306 7249 .RS 4 6307 7250 This boolean specifies if the passwd chat script parameter is run in 6308 7251 \fIdebug\fR 6309 mode\ . In this mode the strings passed to and received from the passwd chat are printed in the7252 mode\&. In this mode the strings passed to and received from the passwd chat are printed in the 6310 7253 \fBsmbd\fR(8) 6311 7254 log with a 6312 \ fIdebug level\fR6313 of 100\ . This is a dangerous option as it will allow plaintext passwords to be seen in the6314 smbd 6315 log\ . It is available to help Samba admins debug their7255 \m[blue]\fBdebug level\fR\m[] 7256 of 100\&. This is a dangerous option as it will allow plaintext passwords to be seen in the 7257 \FCsmbd\F[] 7258 log\&. It is available to help Samba admins debug their 6316 7259 \fIpasswd chat\fR 6317 7260 scripts when calling the 6318 7261 \fIpasswd program\fR 6319 and should be turned off after this has been done\ . This option has no effect if the6320 \ fIpam password change\fR6321 parameter is set\ . This parameter is off by default\.6322 .sp 6323 Default: 6324 \fI\fIpasswd chat debug\fR\fR\fI = \fR\fI no\fR\fI \fR7262 and should be turned off after this has been done\&. This option has no effect if the 7263 \m[blue]\fBpam password change\fR\m[] 7264 parameter is set\&. This parameter is off by default\&. 7265 .sp 7266 Default: 7267 \fI\fIpasswd chat debug\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 6325 7268 .RE 6326 7269 6327 7270 passwd chat timeout (G) 6328 .PP 6329 .RS 4 6330 This integer specifies the number of seconds smbd will wait for an initial answer from a passwd chat script being run\. Once the initial answer is received the subsequent answers must be received in one tenth of this time\. The default it two seconds\. 6331 .sp 6332 Default: 6333 \fI\fIpasswd chat timeout\fR\fR\fI = \fR\fI2\fR\fI \fR 7271 .\" passwd chat timeout 7272 .PP 7273 .RS 4 7274 This integer specifies the number of seconds smbd will wait for an initial answer from a passwd chat script being run\&. Once the initial answer is received the subsequent answers must be received in one tenth of this time\&. The default it two seconds\&. 7275 .sp 7276 Default: 7277 \fI\fIpasswd chat timeout\fR\fR\fI = \fR\fI\FC2\F[]\fR\fI \fR 6334 7278 .RE 6335 7279 6336 7280 passwd chat (G) 7281 .\" passwd chat 6337 7282 .PP 6338 7283 .RS 4 … … 6341 7286 conversation that takes places between 6342 7287 \fBsmbd\fR(8) 6343 and the local password changing program to change the user\'s password\ . The string describes a sequence of response\-receive pairs that7288 and the local password changing program to change the user\'s password\&. The string describes a sequence of response\-receive pairs that 6344 7289 \fBsmbd\fR(8) 6345 7290 uses to determine what to send to the 6346 \ fIpasswd program\fR6347 and what to expect back\ . If the expected output is not received then the password is not changed\.6348 .sp 6349 This chat sequence is often quite site specific, depending on what local methods are used for password control (such as NIS etc)\ .7291 \m[blue]\fBpasswd program\fR\m[] 7292 and what to expect back\&. If the expected output is not received then the password is not changed\&. 7293 .sp 7294 This chat sequence is often quite site specific, depending on what local methods are used for password control (such as NIS etc)\&. 6350 7295 .sp 6351 7296 Note that this parameter only is used if the 6352 \ fIunix password sync\fR7297 \m[blue]\fBunix password sync\fR\m[] 6353 7298 parameter is set to 6354 \fByes\fR\ . This sequence is then called7299 \fByes\fR\&. This sequence is then called 6355 7300 \fIAS ROOT\fR 6356 when the SMB password in the smbpasswd file is being changed, without access to the old password cleartext\ . This means that root must be able to reset the user\'s password without knowing the text of the previous password\. In the presence of NIS/YP, this means that the6357 \ fIpasswd program\fR6358 must be executed on the NIS master\ .7301 when the SMB password in the smbpasswd file is being changed, without access to the old password cleartext\&. This means that root must be able to reset the user\'s password without knowing the text of the previous password\&. In the presence of NIS/YP, this means that the 7302 \m[blue]\fBpasswd program\fR\m[] 7303 must be executed on the NIS master\&. 6359 7304 .sp 6360 7305 The string can contain the macro 6361 7306 \fI%n\fR 6362 which is substituted for the new password\ . The old passsword (\fI%o\fR) is only available when6363 \ fIencrypt passwords\fR6364 has been disabled\ . The chat sequence can also contain the standard macros \en, \er, \et and \es to give line\-feed, carriage\-return, tab and space\. The chat sequence string can also contain a \'*\' which matches any sequence of characters\. Double quotes can be used to collect strings with spaces in them into a single string\.6365 .sp 6366 If the send string in any part of the chat sequence is a full stop "\ .", then no string is sent\. Similarly, if the expect string is a full stop then no string is expected\.7307 which is substituted for the new password\&. The old passsword (\fI%o\fR) is only available when 7308 \m[blue]\fBencrypt passwords\fR\m[] 7309 has been disabled\&. The chat sequence can also contain the standard macros \en, \er, \et and \es to give line\-feed, carriage\-return, tab and space\&. The chat sequence string can also contain a \'*\' which matches any sequence of characters\&. Double quotes can be used to collect strings with spaces in them into a single string\&. 7310 .sp 7311 If the send string in any part of the chat sequence is a full stop "\&.", then no string is sent\&. Similarly, if the expect string is a full stop then no string is expected\&. 6367 7312 .sp 6368 7313 If the 6369 \ fIpam password change\fR7314 \m[blue]\fBpam password change\fR\m[] 6370 7315 parameter is set to 6371 \fByes\fR, the chat pairs may be matched in any order, and success is determined by the PAM result, not any particular output\ . The \en macro is ignored for PAM conversions\.6372 .sp 6373 Default: 6374 \fI\fIpasswd chat\fR\fR\fI = \fR\fI *new*password* %n\en*new*password* %n\en *changed*\fR\fI \fR6375 .sp 6376 Example: 6377 \fI\fIpasswd chat\fR\fR\fI = \fR\fI "*Enter NEW password*" %n\en "*Reenter NEW password*" %n\en "*Password changed*"\fR\fI \fR7316 \fByes\fR, the chat pairs may be matched in any order, and success is determined by the PAM result, not any particular output\&. The \en macro is ignored for PAM conversions\&. 7317 .sp 7318 Default: 7319 \fI\fIpasswd chat\fR\fR\fI = \fR\fI\FC*new*password* %n\en*new*password* %n\en *changed*\F[]\fR\fI \fR 7320 .sp 7321 Example: 7322 \fI\fIpasswd chat\fR\fR\fI = \fR\fI\FC"*Enter NEW password*" %n\en "*Reenter NEW password*" %n\en "*Password changed*"\F[]\fR\fI \fR 6378 7323 .RE 6379 7324 6380 7325 passwd program (G) 6381 .PP 6382 .RS 4 6383 The name of a program that can be used to set UNIX user passwords\. Any occurrences of 7326 .\" passwd program 7327 .PP 7328 .RS 4 7329 The name of a program that can be used to set UNIX user passwords\&. Any occurrences of 6384 7330 \fI%u\fR 6385 will be replaced with the user name\ . The user name is checked for existence before calling the password changing program\.7331 will be replaced with the user name\&. The user name is checked for existence before calling the password changing program\&. 6386 7332 .sp 6387 7333 Also note that many passwd programs insist in 6388 7334 \fIreasonable \fR 6389 passwords, such as a minimum length, or the inclusion of mixed case chars and digits\ . This can pose a problem as some clients (such as Windows for Workgroups) uppercase the password before sending it\.7335 passwords, such as a minimum length, or the inclusion of mixed case chars and digits\&. This can pose a problem as some clients (such as Windows for Workgroups) uppercase the password before sending it\&. 6390 7336 .sp 6391 7337 \fINote\fR … … 6396 7342 then this program is called 6397 7343 \fIAS ROOT\fR 6398 before the SMB password in the smbpasswd file is changed\ . If this UNIX password change fails, then6399 smbd 6400 will fail to change the SMB password also (this is by design)\ .7344 before the SMB password in the smbpasswd file is changed\&. If this UNIX password change fails, then 7345 \FCsmbd\F[] 7346 will fail to change the SMB password also (this is by design)\&. 6401 7347 .sp 6402 7348 If the … … 6406 7352 for 6407 7353 \fIALL\fR 6408 programs called, and must be examined for security implications\ . Note that by default7354 programs called, and must be examined for security implications\&. Note that by default 6409 7355 \fIunix password sync\fR 6410 7356 is set to 6411 \fBno\fR\ .6412 .sp 6413 Default: 6414 \fI\fIpasswd program\fR\fR\fI = \fR\fI\ fR\fI \fR6415 .sp 6416 Example: 6417 \fI\fIpasswd program\fR\fR\fI = \fR\fI /bin/passwd %u\fR\fI \fR7357 \fBno\fR\&. 7358 .sp 7359 Default: 7360 \fI\fIpasswd program\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 7361 .sp 7362 Example: 7363 \fI\fIpasswd program\fR\fR\fI = \fR\fI\FC/bin/passwd %u\F[]\fR\fI \fR 6418 7364 .RE 6419 7365 6420 7366 password level (G) 6421 .PP 6422 .RS 4 6423 Some client/server combinations have difficulty with mixed\-case passwords\. One offending client is Windows for Workgroups, which for some reason forces passwords to upper case when using the LANMAN1 protocol, but leaves them alone when using COREPLUS! Another problem child is the Windows 95/98 family of operating systems\. These clients upper case clear text passwords even when NT LM 0\.12 selected by the protocol negotiation request/response\. 6424 .sp 6425 This parameter defines the maximum number of characters that may be upper case in passwords\. 6426 .sp 6427 For example, say the password given was "FRED"\. If 7367 .\" password level 7368 .PP 7369 .RS 4 7370 Some client/server combinations have difficulty with mixed\-case passwords\&. One offending client is Windows for Workgroups, which for some reason forces passwords to upper case when using the LANMAN1 protocol, but leaves them alone when using COREPLUS! Another problem child is the Windows 95/98 family of operating systems\&. These clients upper case clear text passwords even when NT LM 0\&.12 selected by the protocol negotiation request/response\&. 7371 .sp 7372 This parameter defines the maximum number of characters that may be upper case in passwords\&. 7373 .sp 7374 For example, say the password given was "FRED"\&. If 6428 7375 \fI password level\fR 6429 7376 is set to 1, the following combinations would be tried if "FRED" failed: … … 6435 7382 was set to 2, the following combinations would also be tried: 6436 7383 .sp 6437 "FRed", "FrEd", "FreD", "fREd", "fReD", "frED", \ .\.6438 .sp 6439 And so on\ .6440 .sp 6441 The higher value this parameter is set to the more likely it is that a mixed case password will be matched against a single case password\ . However, you should be aware that use of this parameter reduces security and increases the time taken to process a new connection\.6442 .sp 6443 A value of zero will cause only two attempts to be made \- the password as is and the password in all\-lower case\ .6444 .sp 6445 This parameter is used only when using plain\-text passwords\ . It is not at all used when encrypted passwords as in use (that is the default since samba\-3\.0\.0)\. Use this only when6446 \ fIencrypt passwords = No\fR\.6447 .sp 6448 Default: 6449 \fI\fIpassword level\fR\fR\fI = \fR\fI 0\fR\fI \fR6450 .sp 6451 Example: 6452 \fI\fIpassword level\fR\fR\fI = \fR\fI 4\fR\fI \fR7384 "FRed", "FrEd", "FreD", "fREd", "fReD", "frED", \&.\&. 7385 .sp 7386 And so on\&. 7387 .sp 7388 The higher value this parameter is set to the more likely it is that a mixed case password will be matched against a single case password\&. However, you should be aware that use of this parameter reduces security and increases the time taken to process a new connection\&. 7389 .sp 7390 A value of zero will cause only two attempts to be made \- the password as is and the password in all\-lower case\&. 7391 .sp 7392 This parameter is used only when using plain\-text passwords\&. It is not at all used when encrypted passwords as in use (that is the default since samba\-3\&.0\&.0)\&. Use this only when 7393 \m[blue]\fBencrypt passwords = No\fR\m[]\&. 7394 .sp 7395 Default: 7396 \fI\fIpassword level\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 7397 .sp 7398 Example: 7399 \fI\fIpassword level\fR\fR\fI = \fR\fI\FC4\F[]\fR\fI \fR 6453 7400 .RE 6454 7401 6455 7402 password server (G) 7403 .\" password server 6456 7404 .PP 6457 7405 .RS 4 6458 7406 By specifying the name of another SMB server or Active Directory domain controller with this option, and using 6459 security = [ads|domain|server]6460 it is possible to get Samba to to do all its username/password validation using a specific remote server\ .6461 .sp 6462 This option sets the name or IP address of the password server to use\ . New syntax has been added to support defining the port to use when connecting to the server the case of an ADS realm\. To define a port other than the default LDAP port of 389, add the port number using a colon after the name or IP address (e\.g\. 192\.168\.1\.100:389)\. If you do not specify a port, Samba will use the standard LDAP port of tcp/389\. Note that port numbers have no effect on password servers for Windows NT 4\.0 domains or netbios connections\.7407 \FCsecurity = [ads|domain|server]\F[] 7408 it is possible to get Samba to to do all its username/password validation using a specific remote server\&. 7409 .sp 7410 This option sets the name or IP address of the password server to use\&. New syntax has been added to support defining the port to use when connecting to the server the case of an ADS realm\&. To define a port other than the default LDAP port of 389, add the port number using a colon after the name or IP address (e\&.g\&. 192\&.168\&.1\&.100:389)\&. If you do not specify a port, Samba will use the standard LDAP port of tcp/389\&. Note that port numbers have no effect on password servers for Windows NT 4\&.0 domains or netbios connections\&. 6463 7411 .sp 6464 7412 If parameter is a name, it is looked up using the parameter 6465 \fIname resolve order\fR 6466 and so may resolved by any method and order described in that parameter\. 6467 .sp 6468 The password server must be a machine capable of using the "LM1\.2X002" or the "NT LM 0\.12" protocol, and it must be in user level security mode\. 6469 .sp 7413 \m[blue]\fBname resolve order\fR\m[] 7414 and so may resolved by any method and order described in that parameter\&. 7415 .sp 7416 The password server must be a machine capable of using the "LM1\&.2X002" or the "NT LM 0\&.12" protocol, and it must be in user level security mode\&. 7417 .if n \{\ 7418 .sp 7419 .\} 7420 .RS 4 7421 .BM yellow 6470 7422 .it 1 an-trap 6471 7423 .nr an-no-space-flag 1 6472 7424 .nr an-break-flag 1 6473 7425 .br 6474 Note 6475 Using a password server means your UNIX box (running Samba) is only as secure as your password server\. 6476 \fIDO NOT CHOOSE A PASSWORD SERVER THAT YOU DON\'T COMPLETELY TRUST\fR\. 6477 6478 Never point a Samba server at itself for password serving\. This will cause a loop and could lock up your Samba server! 7426 .ps +1 7427 \fBNote\fR 7428 .ps -1 7429 .br 7430 Using a password server means your UNIX box (running Samba) is only as secure as your password server\&. 7431 \fIDO NOT CHOOSE A PASSWORD SERVER THAT YOU DON\'T COMPLETELY TRUST\fR\&. 7432 .sp .5v 7433 .EM yellow 7434 .RE 7435 Never point a Samba server at itself for password serving\&. This will cause a loop and could lock up your Samba server! 6479 7436 .sp 6480 7437 The name of the password server takes the standard substitutions, but probably the only useful one is 6481 \fI%m \fR, which means the Samba server will use the incoming client as the password server\ . If you use this then you better trust your clients, and you had better restrict them with hosts allow!7438 \fI%m \fR, which means the Samba server will use the incoming client as the password server\&. If you use this then you better trust your clients, and you had better restrict them with hosts allow! 6482 7439 .sp 6483 7440 If the … … 6486 7443 \fBdomain\fR 6487 7444 or 6488 \fBads\fR, then the list of machines in this option must be a list of Primary or Backup Domain controllers for the Domain or the character \'*\', as the Samba server is effectively in that domain, and will use cryptographically authenticated RPC calls to authenticate the user logging on\ . The advantage of using6489 security = domain 7445 \fBads\fR, then the list of machines in this option must be a list of Primary or Backup Domain controllers for the Domain or the character \'*\', as the Samba server is effectively in that domain, and will use cryptographically authenticated RPC calls to authenticate the user logging on\&. The advantage of using 7446 \FC security = domain\F[] 6490 7447 is that if you list several hosts in the 6491 7448 \fIpassword server\fR 6492 7449 option then 6493 smbd 6494 will try each in turn till it finds one that responds\ . This is useful in case your primary server goes down\.7450 \FCsmbd \F[] 7451 will try each in turn till it finds one that responds\&. This is useful in case your primary server goes down\&. 6495 7452 .sp 6496 7453 If the … … 6498 7455 option is set to the character \'*\', then Samba will attempt to auto\-locate the Primary or Backup Domain controllers to authenticate against by doing a query for the name 6499 7456 \fBWORKGROUP<1C>\fR 6500 and then contacting each server returned in the list of IP addresses from the name resolution source\ .6501 .sp 6502 If the list of servers contains both names/IP\'s and the \'*\' character, the list is treated as a list of preferred domain controllers, but an auto lookup of all remaining DC\'s will be added to the list as well\ . Samba will not attempt to optimize this list by locating the closest DC\.7457 and then contacting each server returned in the list of IP addresses from the name resolution source\&. 7458 .sp 7459 If the list of servers contains both names/IP\'s and the \'*\' character, the list is treated as a list of preferred domain controllers, but an auto lookup of all remaining DC\'s will be added to the list as well\&. Samba will not attempt to optimize this list by locating the closest DC\&. 6503 7460 .sp 6504 7461 If the … … 6506 7463 parameter is set to 6507 7464 \fBserver\fR, then there are different restrictions that 6508 security = domain 7465 \FCsecurity = domain\F[] 6509 7466 doesn\'t suffer from: 6510 7467 .sp … … 6520 7477 \fIpassword server\fR 6521 7478 parameter, however if an 6522 smbd 7479 \FCsmbd\F[] 6523 7480 makes a connection to a password server, and then the password server fails, no more users will be able to be authenticated from this 6524 smbd\. This is a restriction of the SMB/CIFS protocol when in6525 security = server 6526 mode and cannot be fixed in Samba\ .7481 \FCsmbd\F[]\&. This is a restriction of the SMB/CIFS protocol when in 7482 \FCsecurity = server \F[] 7483 mode and cannot be fixed in Samba\&. 6527 7484 .RE 6528 7485 .sp … … 6536 7493 .\} 6537 7494 If you are using a Windows NT server as your password server then you will have to ensure that your users are able to login from the Samba server, as when in 6538 security = server 6539 mode the network logon will appear to come from there rather than from the users workstation\ .6540 .sp 6541 .RE 6542 Default: 6543 \fI\fIpassword server\fR\fR\fI = \fR\fI *\fR\fI \fR6544 .sp 6545 Example: 6546 \fI\fIpassword server\fR\fR\fI = \fR\fI NT\-PDC, NT\-BDC1, NT\-BDC2, *\fR\fI \fR6547 .sp 6548 Example: 6549 \fI\fIpassword server\fR\fR\fI = \fR\fI windc\.mydomain\.com:389 192\.168\.1\.101 *\fR\fI \fR7495 \FC security = server\F[] 7496 mode the network logon will appear to come from there rather than from the users workstation\&. 7497 .sp 7498 .RE 7499 Default: 7500 \fI\fIpassword server\fR\fR\fI = \fR\fI\FC*\F[]\fR\fI \fR 7501 .sp 7502 Example: 7503 \fI\fIpassword server\fR\fR\fI = \fR\fI\FCNT\-PDC, NT\-BDC1, NT\-BDC2, *\F[]\fR\fI \fR 7504 .sp 7505 Example: 7506 \fI\fIpassword server\fR\fR\fI = \fR\fI\FCwindc\&.mydomain\&.com:389 192\&.168\&.1\&.101 *\F[]\fR\fI \fR 6550 7507 .RE 6551 7508 6552 7509 directory 7510 .\" directory 6553 7511 .PP 6554 7512 .RS 4 6555 7513 This parameter is a synonym for 6556 path\ .7514 path\&. 6557 7515 .RE 6558 7516 6559 7517 path (S) 6560 .PP 6561 .RS 4 6562 This parameter specifies a directory to which the user of the service is to be given access\. In the case of printable services, this is where print data will spool prior to being submitted to the host for printing\. 6563 .sp 6564 For a printable service offering guest access, the service should be readonly and the path should be world\-writeable and have the sticky bit set\. This is not mandatory of course, but you probably won\'t get the results you expect if you do otherwise\. 7518 .\" path 7519 .PP 7520 .RS 4 7521 This parameter specifies a directory to which the user of the service is to be given access\&. In the case of printable services, this is where print data will spool prior to being submitted to the host for printing\&. 7522 .sp 7523 For a printable service offering guest access, the service should be readonly and the path should be world\-writeable and have the sticky bit set\&. This is not mandatory of course, but you probably won\'t get the results you expect if you do otherwise\&. 6565 7524 .sp 6566 7525 Any occurrences of 6567 7526 \fI%u\fR 6568 in the path will be replaced with the UNIX username that the client is using on this connection\ . Any occurrences of7527 in the path will be replaced with the UNIX username that the client is using on this connection\&. Any occurrences of 6569 7528 \fI%m\fR 6570 will be replaced by the NetBIOS name of the machine they are connecting from\ . These replacements are very useful for setting up pseudo home directories for users\.7529 will be replaced by the NetBIOS name of the machine they are connecting from\&. These replacements are very useful for setting up pseudo home directories for users\&. 6571 7530 .sp 6572 7531 Note that this path will be based on 6573 \ fIroot dir\fR6574 if one was specified\ .6575 .sp 6576 Default: 6577 \fI\fIpath\fR\fR\fI = \fR\fI\ fR\fI \fR6578 .sp 6579 Example: 6580 \fI\fIpath\fR\fR\fI = \fR\fI /home/fred\fR\fI \fR7532 \m[blue]\fBroot dir\fR\m[] 7533 if one was specified\&. 7534 .sp 7535 Default: 7536 \fI\fIpath\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 7537 .sp 7538 Example: 7539 \fI\fIpath\fR\fR\fI = \fR\fI\FC/home/fred\F[]\fR\fI \fR 6581 7540 .RE 6582 7541 6583 7542 pid directory (G) 6584 .PP 6585 .RS 4 6586 This option specifies the directory where pid files will be placed\. 6587 .sp 6588 Default: 6589 \fI\fIpid directory\fR\fR\fI = \fR\fI${prefix}/var/locks\fR\fI \fR 6590 .sp 6591 Example: 6592 \fI\fIpid directory\fR\fR\fI = \fR\fIpid directory = /var/run/\fR\fI \fR 7543 .\" pid directory 7544 .PP 7545 .RS 4 7546 This option specifies the directory where pid files will be placed\&. 7547 .sp 7548 Default: 7549 \fI\fIpid directory\fR\fR\fI = \fR\fI\FC${prefix}/var/locks\F[]\fR\fI \fR 7550 .sp 7551 Example: 7552 \fI\fIpid directory\fR\fR\fI = \fR\fI\FCpid directory = /var/run/\F[]\fR\fI \fR 6593 7553 .RE 6594 7554 6595 7555 posix locking (S) 7556 .\" posix locking 6596 7557 .PP 6597 7558 .RS 4 6598 7559 The 6599 7560 \fBsmbd\fR(8) 6600 daemon maintains an database of file locks obtained by SMB clients\ . The default behavior is to map this internal database to POSIX locks\. This means that file locks obtained by SMB clients are consistent with those seen by POSIX compliant applications accessing the files via a non\-SMB method (e\.g\. NFS or local file access)\. You should never need to disable this parameter\.6601 .sp 6602 Default: 6603 \fI\fIposix locking\fR\fR\fI = \fR\fI yes\fR\fI \fR7561 daemon maintains an database of file locks obtained by SMB clients\&. The default behavior is to map this internal database to POSIX locks\&. This means that file locks obtained by SMB clients are consistent with those seen by POSIX compliant applications accessing the files via a non\-SMB method (e\&.g\&. NFS or local file access)\&. You should never need to disable this parameter\&. 7562 .sp 7563 Default: 7564 \fI\fIposix locking\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 6604 7565 .RE 6605 7566 6606 7567 postexec (S) 6607 .PP 6608 .RS 4 6609 This option specifies a command to be run whenever the service is disconnected\. It takes the usual substitutions\. The command may be run as the root on some systems\. 7568 .\" postexec 7569 .PP 7570 .RS 4 7571 This option specifies a command to be run whenever the service is disconnected\&. It takes the usual substitutions\&. The command may be run as the root on some systems\&. 6610 7572 .sp 6611 7573 An interesting example may be to unmount server resources: 6612 7574 .sp 6613 postexec = /etc/umount /cdrom 6614 .sp 6615 Default: 6616 \fI\fIpostexec\fR\fR\fI = \fR\fI\ fR\fI \fR6617 .sp 6618 Example: 6619 \fI\fIpostexec\fR\fR\fI = \fR\fI echo \e"%u disconnected from %S from %m (%I)\e" >> /tmp/log\fR\fI \fR7575 \FCpostexec = /etc/umount /cdrom\F[] 7576 .sp 7577 Default: 7578 \fI\fIpostexec\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 7579 .sp 7580 Example: 7581 \fI\fIpostexec\fR\fR\fI = \fR\fI\FCecho \e"%u disconnected from %S from %m (%I)\e" >> /tmp/log\F[]\fR\fI \fR 6620 7582 .RE 6621 7583 6622 7584 preexec close (S) 7585 .\" preexec close 6623 7586 .PP 6624 7587 .RS 4 6625 7588 This boolean option controls whether a non\-zero return code from 6626 \ fIpreexec\fR6627 should close the service being connected to\ .6628 .sp 6629 Default: 6630 \fI\fIpreexec close\fR\fR\fI = \fR\fI no\fR\fI \fR7589 \m[blue]\fBpreexec\fR\m[] 7590 should close the service being connected to\&. 7591 .sp 7592 Default: 7593 \fI\fIpreexec close\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 6631 7594 .RE 6632 7595 6633 7596 exec 7597 .\" exec 6634 7598 .PP 6635 7599 .RS 4 6636 7600 This parameter is a synonym for 6637 preexec\ .7601 preexec\&. 6638 7602 .RE 6639 7603 6640 7604 preexec (S) 6641 .PP 6642 .RS 4 6643 This option specifies a command to be run whenever the service is connected to\. It takes the usual substitutions\. 6644 .sp 6645 An interesting example is to send the users a welcome message every time they log in\. Maybe a message of the day? Here is an example: 6646 .sp 6647 6648 preexec = csh \-c \'echo \e"Welcome to %S!\e" | /usr/local/samba/bin/smbclient \-M %m \-I %I\' & 7605 .\" preexec 7606 .PP 7607 .RS 4 7608 This option specifies a command to be run whenever the service is connected to\&. It takes the usual substitutions\&. 7609 .sp 7610 An interesting example is to send the users a welcome message every time they log in\&. Maybe a message of the day? Here is an example: 7611 .sp 7612 7613 \FCpreexec = csh \-c \'echo \e"Welcome to %S!\e" | /usr/local/samba/bin/smbclient \-M %m \-I %I\' & \F[] 6649 7614 .sp 6650 7615 Of course, this could get annoying after a while :\-) 6651 7616 .sp 6652 7617 See also 6653 \ fIpreexec close\fR7618 \m[blue]\fBpreexec close\fR\m[] 6654 7619 and 6655 \ fIpostexec\fR\.6656 .sp 6657 Default: 6658 \fI\fIpreexec\fR\fR\fI = \fR\fI\ fR\fI \fR6659 .sp 6660 Example: 6661 \fI\fIpreexec\fR\fR\fI = \fR\fI echo \e"%u connected to %S from %m (%I)\e" >> /tmp/log\fR\fI \fR7620 \m[blue]\fBpostexec\fR\m[]\&. 7621 .sp 7622 Default: 7623 \fI\fIpreexec\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 7624 .sp 7625 Example: 7626 \fI\fIpreexec\fR\fR\fI = \fR\fI\FCecho \e"%u connected to %S from %m (%I)\e" >> /tmp/log\F[]\fR\fI \fR 6662 7627 .RE 6663 7628 6664 7629 prefered master 7630 .\" prefered master 6665 7631 .PP 6666 7632 .RS 4 6667 7633 This parameter is a synonym for 6668 preferred master\ .7634 preferred master\&. 6669 7635 .RE 6670 7636 6671 7637 preferred master (G) 7638 .\" preferred master 6672 7639 .PP 6673 7640 .RS 4 6674 7641 This boolean parameter controls if 6675 7642 \fBnmbd\fR(8) 6676 is a preferred master browser for its workgroup\ .7643 is a preferred master browser for its workgroup\&. 6677 7644 .sp 6678 7645 If this is set to 6679 7646 \fByes\fR, on startup, 6680 nmbd 6681 will force an election, and it will have a slight advantage in winning the election\ . It is recommended that this parameter is used in conjunction with6682 \ fIdomain master = yes\fR, so that6683 nmbd 6684 can guarantee becoming a domain master\ .6685 .sp 6686 Use this option with caution, because if there are several hosts (whether Samba servers, Windows 95 or NT) that are preferred master browsers on the same subnet, they will each periodically and continuously attempt to become the local master browser\ . This will result in unnecessary broadcast traffic and reduced browsing capabilities\.6687 .sp 6688 Default: 6689 \fI\fIpreferred master\fR\fR\fI = \fR\fI auto\fR\fI \fR7647 \FCnmbd\F[] 7648 will force an election, and it will have a slight advantage in winning the election\&. It is recommended that this parameter is used in conjunction with 7649 \m[blue]\fBdomain master = yes\fR\m[], so that 7650 \FCnmbd\F[] 7651 can guarantee becoming a domain master\&. 7652 .sp 7653 Use this option with caution, because if there are several hosts (whether Samba servers, Windows 95 or NT) that are preferred master browsers on the same subnet, they will each periodically and continuously attempt to become the local master browser\&. This will result in unnecessary broadcast traffic and reduced browsing capabilities\&. 7654 .sp 7655 Default: 7656 \fI\fIpreferred master\fR\fR\fI = \fR\fI\FCauto\F[]\fR\fI \fR 6690 7657 .RE 6691 7658 6692 7659 preload modules (G) 6693 .PP 6694 .RS 4 6695 This is a list of paths to modules that should be loaded into smbd before a client connects\. This improves the speed of smbd when reacting to new connections somewhat\. 6696 .sp 6697 Default: 6698 \fI\fIpreload modules\fR\fR\fI = \fR\fI\fR\fI \fR 6699 .sp 6700 Example: 6701 \fI\fIpreload modules\fR\fR\fI = \fR\fI/usr/lib/samba/passdb/mysql\.so\fR\fI \fR 7660 .\" preload modules 7661 .PP 7662 .RS 4 7663 This is a list of paths to modules that should be loaded into smbd before a client connects\&. This improves the speed of smbd when reacting to new connections somewhat\&. 7664 .sp 7665 Default: 7666 \fI\fIpreload modules\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 7667 .sp 7668 Example: 7669 \fI\fIpreload modules\fR\fR\fI = \fR\fI\FC/usr/lib/samba/passdb/mysql\&.so\F[]\fR\fI \fR 6702 7670 .RE 6703 7671 6704 7672 auto services 7673 .\" auto services 6705 7674 .PP 6706 7675 .RS 4 6707 7676 This parameter is a synonym for 6708 preload\ .7677 preload\&. 6709 7678 .RE 6710 7679 6711 7680 preload (G) 6712 .PP 6713 .RS 4 6714 This is a list of services that you want to be automatically added to the browse lists\. This is most useful for homes and printers services that would otherwise not be visible\. 7681 .\" preload 7682 .PP 7683 .RS 4 7684 This is a list of services that you want to be automatically added to the browse lists\&. This is most useful for homes and printers services that would otherwise not be visible\&. 6715 7685 .sp 6716 7686 Note that if you just want all printers in your printcap file loaded then the 6717 \ fIload printers\fR6718 option is easier\ .6719 .sp 6720 Default: 6721 \fI\fIpreload\fR\fR\fI = \fR\fI\ fR\fI \fR6722 .sp 6723 Example: 6724 \fI\fIpreload\fR\fR\fI = \fR\fI fred lp colorlp\fR\fI \fR7687 \m[blue]\fBload printers\fR\m[] 7688 option is easier\&. 7689 .sp 7690 Default: 7691 \fI\fIpreload\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 7692 .sp 7693 Example: 7694 \fI\fIpreload\fR\fR\fI = \fR\fI\FCfred lp colorlp\F[]\fR\fI \fR 6725 7695 .RE 6726 7696 6727 7697 preserve case (S) 7698 .\" preserve case 6728 7699 .PP 6729 7700 .RS 4 6730 7701 This controls if new filenames are created with the case that the client passes, or if they are forced to be the 6731 \ fIdefault case\fR\.7702 \m[blue]\fBdefault case\fR\m[]\&. 6732 7703 .sp 6733 7704 See the section on 6734 7705 NAME MANGLING 6735 for a fuller discussion\ .6736 .sp 6737 Default: 6738 \fI\fIpreserve case\fR\fR\fI = \fR\fI yes\fR\fI \fR7706 for a fuller discussion\&. 7707 .sp 7708 Default: 7709 \fI\fIpreserve case\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 6739 7710 .RE 6740 7711 6741 7712 print ok 7713 .\" print ok 6742 7714 .PP 6743 7715 .RS 4 6744 7716 This parameter is a synonym for 6745 printable\ .7717 printable\&. 6746 7718 .RE 6747 7719 6748 7720 printable (S) 7721 .\" printable 6749 7722 .PP 6750 7723 .RS 4 6751 7724 If this parameter is 6752 \fByes\fR, then clients may open, write to and submit spool files on the directory specified for the service\ .6753 .sp 6754 Note that a printable service will ALWAYS allow writing to the service path (user privileges permitting) via the spooling of print data\ . The6755 \ fIread only\fR6756 parameter controls only non\-printing access to the resource\ .6757 .sp 6758 Default: 6759 \fI\fIprintable\fR\fR\fI = \fR\fI no\fR\fI \fR7725 \fByes\fR, then clients may open, write to and submit spool files on the directory specified for the service\&. 7726 .sp 7727 Note that a printable service will ALWAYS allow writing to the service path (user privileges permitting) via the spooling of print data\&. The 7728 \m[blue]\fBread only\fR\m[] 7729 parameter controls only non\-printing access to the resource\&. 7730 .sp 7731 Default: 7732 \fI\fIprintable\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 6760 7733 .RE 6761 7734 6762 7735 printcap cache time (G) 6763 .PP 6764 .RS 4 6765 This option specifies the number of seconds before the printing subsystem is again asked for the known printers\. If the value is greater than 60 the initial waiting time is set to 60 seconds to allow an earlier first rescan of the printing subsystem\. 6766 .sp 6767 Setting this parameter to 0 disables any rescanning for new or removed printers after the initial startup\. 6768 .sp 6769 Default: 6770 \fI\fIprintcap cache time\fR\fR\fI = \fR\fI750\fR\fI \fR 6771 .sp 6772 Example: 6773 \fI\fIprintcap cache time\fR\fR\fI = \fR\fI600\fR\fI \fR 7736 .\" printcap cache time 7737 .PP 7738 .RS 4 7739 This option specifies the number of seconds before the printing subsystem is again asked for the known printers\&. If the value is greater than 60 the initial waiting time is set to 60 seconds to allow an earlier first rescan of the printing subsystem\&. 7740 .sp 7741 Setting this parameter to 0 disables any rescanning for new or removed printers after the initial startup\&. 7742 .sp 7743 Default: 7744 \fI\fIprintcap cache time\fR\fR\fI = \fR\fI\FC750\F[]\fR\fI \fR 7745 .sp 7746 Example: 7747 \fI\fIprintcap cache time\fR\fR\fI = \fR\fI\FC600\F[]\fR\fI \fR 6774 7748 .RE 6775 7749 6776 7750 printcap 7751 .\" printcap 6777 7752 .PP 6778 7753 .RS 4 6779 7754 This parameter is a synonym for 6780 printcap name\ .7755 printcap name\&. 6781 7756 .RE 6782 7757 6783 7758 printcap name (G) 7759 .\" printcap name 6784 7760 .PP 6785 7761 .RS 4 6786 7762 This parameter may be used to override the compiled\-in default printcap name used by the server (usually 6787 \ fI /etc/printcap\fR)\. See the discussion of the7763 \FC /etc/printcap\F[])\&. See the discussion of the 6788 7764 [printers] 6789 section above for reasons why you might want to do this\ .7765 section above for reasons why you might want to do this\&. 6790 7766 .sp 6791 7767 To use the CUPS printing interface set 6792 printcap name = cups\. This should be supplemented by an addtional setting6793 \ fIprinting = cups\fR6794 in the [global] section\ .6795 printcap name = cups 6796 will use the "dummy" printcap created by CUPS, as specified in your CUPS configuration file\ .7768 \FCprintcap name = cups \F[]\&. This should be supplemented by an addtional setting 7769 \m[blue]\fBprinting = cups\fR\m[] 7770 in the [global] section\&. 7771 \FCprintcap name = cups\F[] 7772 will use the "dummy" printcap created by CUPS, as specified in your CUPS configuration file\&. 6797 7773 .sp 6798 7774 On System V systems that use 6799 lpstat 7775 \FClpstat\F[] 6800 7776 to list available printers you can use 6801 printcap name = lpstat 6802 to automatically obtain lists of available printers\ . This is the default for systems that define SYSV at configure time in Samba (this includes most System V based systems)\. If7777 \FCprintcap name = lpstat \F[] 7778 to automatically obtain lists of available printers\&. This is the default for systems that define SYSV at configure time in Samba (this includes most System V based systems)\&. If 6803 7779 \fI printcap name\fR 6804 7780 is set to 6805 lpstat 7781 \FClpstat\F[] 6806 7782 on these systems then Samba will launch 6807 lpstat \-v 6808 and attempt to parse the output to obtain a printer list\ .7783 \FClpstat \-v\F[] 7784 and attempt to parse the output to obtain a printer list\&. 6809 7785 .sp 6810 7786 A minimal printcap file would look something like this: 6811 7787 .sp 6812 .RS 4 7788 .if n \{\ 7789 .RS 4 7790 .\} 7791 .fam C 7792 .ps -1 6813 7793 .nf 7794 .if t \{\ 7795 .sp -1 7796 .\} 7797 .BB lightgray adjust-for-leading-newline 7798 .sp -1 7799 6814 7800 print1|My Printer 1 6815 7801 print2|My Printer 2 … … 6817 7803 print4|My Printer 4 6818 7804 print5|My Printer 5 7805 .EB lightgray adjust-for-leading-newline 7806 .if t \{\ 7807 .sp 1 7808 .\} 6819 7809 .fi 6820 .RE 6821 .sp 6822 where the \'|\' separates aliases of a printer\. The fact that the second alias has a space in it gives a hint to Samba that it\'s a comment\. 6823 .sp 7810 .fam 7811 .ps +1 7812 .if n \{\ 7813 .RE 7814 .\} 7815 .sp 7816 where the \'|\' separates aliases of a printer\&. The fact that the second alias has a space in it gives a hint to Samba that it\'s a comment\&. 7817 .if n \{\ 7818 .sp 7819 .\} 7820 .RS 4 7821 .BM yellow 6824 7822 .it 1 an-trap 6825 7823 .nr an-no-space-flag 1 6826 7824 .nr an-break-flag 1 6827 7825 .br 6828 Note 7826 .ps +1 7827 \fBNote\fR 7828 .ps -1 7829 .br 6829 7830 Under AIX the default printcap name is 6830 \ fI/etc/qconfig\fR\. Samba will assume the file is in AIX6831 \ fIqconfig\fR7831 \FC/etc/qconfig\F[]\&. Samba will assume the file is in AIX 7832 \FCqconfig\F[] 6832 7833 format if the string 6833 \fIqconfig\fR 6834 appears in the printcap filename\. 6835 6836 Default: 6837 \fI\fIprintcap name\fR\fR\fI = \fR\fI/etc/printcap\fR\fI \fR 6838 .sp 6839 Example: 6840 \fI\fIprintcap name\fR\fR\fI = \fR\fI/etc/myprintcap\fR\fI \fR 7834 \FCqconfig\F[] 7835 appears in the printcap filename\&. 7836 .sp .5v 7837 .EM yellow 7838 .RE 7839 Default: 7840 \fI\fIprintcap name\fR\fR\fI = \fR\fI\FC/etc/printcap\F[]\fR\fI \fR 7841 .sp 7842 Example: 7843 \fI\fIprintcap name\fR\fR\fI = \fR\fI\FC/etc/myprintcap\F[]\fR\fI \fR 6841 7844 .RE 6842 7845 6843 7846 print command (S) 7847 .\" print command 6844 7848 .PP 6845 7849 .RS 4 6846 7850 After a print job has finished spooling to a service, this command will be used via a 6847 system() 6848 call to process the spool file\ . Typically the command specified will submit the spool file to the host\'s printing subsystem, but there is no requirement that this be the case\. The server will not remove the spool file, so whatever command you specify should remove the spool file when it has been processed, otherwise you will need to manually remove old spool files\.6849 .sp 6850 The print command is simply a text string\ . It will be used verbatim after macro substitutions have been made:7851 \FCsystem()\F[] 7852 call to process the spool file\&. Typically the command specified will submit the spool file to the host\'s printing subsystem, but there is no requirement that this be the case\&. The server will not remove the spool file, so whatever command you specify should remove the spool file when it has been processed, otherwise you will need to manually remove old spool files\&. 7853 .sp 7854 The print command is simply a text string\&. It will be used verbatim after macro substitutions have been made: 6851 7855 .sp 6852 7856 %s, %f \- the path to the spool file name … … 6854 7858 %p \- the appropriate printer name 6855 7859 .sp 6856 %J \- the job name as transmitted by the client\ .6857 .sp 6858 %c \- The number of printed pages of the spooled job (if known)\ .7860 %J \- the job name as transmitted by the client\&. 7861 .sp 7862 %c \- The number of printed pages of the spooled job (if known)\&. 6859 7863 .sp 6860 7864 %z \- the size of the spooled print job (in bytes) … … 6868 7872 \- the 6869 7873 \fI%p\fR 6870 is optional\ . At the time a job is submitted, if no printer name is supplied the7874 is optional\&. At the time a job is submitted, if no printer name is supplied the 6871 7875 \fI%p \fR 6872 will be silently removed from the printer command\ .6873 .sp 6874 If specified in the [global] section, the print command given will be used for any printable service that does not have its own print command specified\ .6875 .sp 6876 If there is neither a specified print command for a printable service nor a global print command, spool files will be created but not processed and (most importantly) not removed\ .7876 will be silently removed from the printer command\&. 7877 .sp 7878 If specified in the [global] section, the print command given will be used for any printable service that does not have its own print command specified\&. 7879 .sp 7880 If there is neither a specified print command for a printable service nor a global print command, spool files will be created but not processed and (most importantly) not removed\&. 6877 7881 .sp 6878 7882 Note that printing may fail on some UNIXes from the 6879 7883 \fBnobody\fR 6880 account\ . If this happens then create an alternative guest account that can print and set the6881 \ fIguest account\fR6882 in the [global] section\ .6883 .sp 6884 You can form quite complex print commands by realizing that they are just passed to a shell\ . For example the following will log a print job, print the file, then remove it\. Note that \';\' is the usual separator for command in shell scripts\.6885 .sp 6886 print command = echo Printing %s >> /tmp/print\.log; lpr \-P %p %s; rm %s 6887 .sp 6888 You may have to vary this command considerably depending on how you normally print files on your system\ . The default for the parameter varies depending on the setting of the6889 \ fIprinting\fR6890 parameter\ .7884 account\&. If this happens then create an alternative guest account that can print and set the 7885 \m[blue]\fBguest account\fR\m[] 7886 in the [global] section\&. 7887 .sp 7888 You can form quite complex print commands by realizing that they are just passed to a shell\&. For example the following will log a print job, print the file, then remove it\&. Note that \';\' is the usual separator for command in shell scripts\&. 7889 .sp 7890 \FCprint command = echo Printing %s >> /tmp/print\&.log; lpr \-P %p %s; rm %s\F[] 7891 .sp 7892 You may have to vary this command considerably depending on how you normally print files on your system\&. The default for the parameter varies depending on the setting of the 7893 \m[blue]\fBprinting\fR\m[] 7894 parameter\&. 6891 7895 .sp 6892 7896 Default: For 6893 printing = BSD, AIX, QNX, LPRNG or PLP : 6894 .sp 6895 print command = lpr \-r \-P%p %s 7897 \FCprinting = BSD, AIX, QNX, LPRNG or PLP :\F[] 7898 .sp 7899 \FCprint command = lpr \-r \-P%p %s\F[] 6896 7900 .sp 6897 7901 For 6898 printing = SYSV or HPUX : 6899 .sp 6900 print command = lp \-c \-d%p %s; rm %s 7902 \FCprinting = SYSV or HPUX :\F[] 7903 .sp 7904 \FCprint command = lp \-c \-d%p %s; rm %s\F[] 6901 7905 .sp 6902 7906 For 6903 printing = SOFTQ : 6904 .sp 6905 print command = lp \-d%p \-s %s; rm %s 7907 \FCprinting = SOFTQ :\F[] 7908 .sp 7909 \FCprint command = lp \-d%p \-s %s; rm %s\F[] 6906 7910 .sp 6907 7911 For printing = CUPS : If SAMBA is compiled against libcups, then 6908 \ fIprintcap = cups\fR6909 uses the CUPS API to submit jobs, etc\ . Otherwise it maps to the System V commands with the \-oraw option for printing, i\.e\. it uses6910 lp \-c \-d%p \-oraw; rm %s\. With6911 printing = cups, and if SAMBA is compiled against libcups, any manually set print command will be ignored\.7912 \m[blue]\fBprintcap = cups\fR\m[] 7913 uses the CUPS API to submit jobs, etc\&. Otherwise it maps to the System V commands with the \-oraw option for printing, i\&.e\&. it uses 7914 \FClp \-c \-d%p \-oraw; rm %s\F[]\&. With 7915 \FCprinting = cups\F[], and if SAMBA is compiled against libcups, any manually set print command will be ignored\&. 6912 7916 .sp 6913 7917 \fINo default\fR 6914 7918 .sp 6915 7919 Example: 6916 \fI\fIprint command\fR\fR\fI = \fR\fI /usr/local/samba/bin/myprintscript %p %s\fR\fI \fR7920 \fI\fIprint command\fR\fR\fI = \fR\fI\FC/usr/local/samba/bin/myprintscript %p %s\F[]\fR\fI \fR 6917 7921 .RE 6918 7922 6919 7923 printer admin (S) 6920 .PP 6921 .RS 4 6922 This lists users who can do anything to printers via the remote administration interfaces offered by MS\-RPC (usually using a NT workstation)\. This parameter can be set per\-share or globally\. Note: The root user always has admin rights\. Use caution with use in the global stanza as this can cause side effects\. 6923 .sp 6924 This parameter has been marked deprecated in favor of using the SePrintOperatorPrivilege and individual print security descriptors\. It will be removed in a future release\. 6925 .sp 6926 Default: 6927 \fI\fIprinter admin\fR\fR\fI = \fR\fI\fR\fI \fR 6928 .sp 6929 Example: 6930 \fI\fIprinter admin\fR\fR\fI = \fR\fIadmin, @staff\fR\fI \fR 7924 .\" printer admin 7925 .PP 7926 .RS 4 7927 This lists users who can do anything to printers via the remote administration interfaces offered by MS\-RPC (usually using a NT workstation)\&. This parameter can be set per\-share or globally\&. Note: The root user always has admin rights\&. Use caution with use in the global stanza as this can cause side effects\&. 7928 .sp 7929 This parameter has been marked deprecated in favor of using the SePrintOperatorPrivilege and individual print security descriptors\&. It will be removed in a future release\&. 7930 .sp 7931 Default: 7932 \fI\fIprinter admin\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 7933 .sp 7934 Example: 7935 \fI\fIprinter admin\fR\fR\fI = \fR\fI\FCadmin, @staff\F[]\fR\fI \fR 6931 7936 .RE 6932 7937 6933 7938 printer 7939 .\" printer 6934 7940 .PP 6935 7941 .RS 4 6936 7942 This parameter is a synonym for 6937 printer name\ .7943 printer name\&. 6938 7944 .RE 6939 7945 6940 7946 printer name (S) 6941 .PP 6942 .RS 4 6943 This parameter specifies the name of the printer to which print jobs spooled through a printable service will be sent\. 6944 .sp 6945 If specified in the [global] section, the printer name given will be used for any printable service that does not have its own printer name specified\. 7947 .\" printer name 7948 .PP 7949 .RS 4 7950 This parameter specifies the name of the printer to which print jobs spooled through a printable service will be sent\&. 7951 .sp 7952 If specified in the [global] section, the printer name given will be used for any printable service that does not have its own printer name specified\&. 6946 7953 .sp 6947 7954 The default value of the 6948 \ fIprinter name\fR7955 \m[blue]\fBprinter name\fR\m[] 6949 7956 may be 6950 lp 6951 on many systems\ .6952 .sp 6953 Default: 6954 \fI\fIprinter name\fR\fR\fI = \fR\fI none\fR\fI \fR6955 .sp 6956 Example: 6957 \fI\fIprinter name\fR\fR\fI = \fR\fI laserwriter\fR\fI \fR7957 \FClp\F[] 7958 on many systems\&. 7959 .sp 7960 Default: 7961 \fI\fIprinter name\fR\fR\fI = \fR\fI\FCnone\F[]\fR\fI \fR 7962 .sp 7963 Example: 7964 \fI\fIprinter name\fR\fR\fI = \fR\fI\FClaserwriter\F[]\fR\fI \fR 6958 7965 .RE 6959 7966 6960 7967 printing (S) 6961 .PP 6962 .RS 4 6963 This parameters controls how printer status information is interpreted on your system\. It also affects the default values for the 7968 .\" printing 7969 .PP 7970 .RS 4 7971 This parameters controls how printer status information is interpreted on your system\&. It also affects the default values for the 6964 7972 \fIprint command\fR, 6965 7973 \fIlpq command\fR, … … 6967 7975 \fIlpresume command\fR, and 6968 7976 \fIlprm command\fR 6969 if specified in the [global] section\ .6970 .sp 6971 Currently nine printing styles are supported\ . They are7977 if specified in the [global] section\&. 7978 .sp 7979 Currently nine printing styles are supported\&. They are 6972 7980 \fBBSD\fR, 6973 7981 \fBAIX\fR, … … 6978 7986 \fBQNX\fR, 6979 7987 \fBSOFTQ\fR, and 6980 \fBCUPS\fR\ .7988 \fBCUPS\fR\&. 6981 7989 .sp 6982 7990 To see what the defaults are for the other print commands when using the various options use the 6983 7991 \fBtestparm\fR(1) 6984 program\ .6985 .sp 6986 This option can be set on a per printer basis\ . Please be aware however, that you must place any of the various printing commands (e\.g\. print command, lpq command, etc\.\.\.) after defining the value for the7992 program\&. 7993 .sp 7994 This option can be set on a per printer basis\&. Please be aware however, that you must place any of the various printing commands (e\&.g\&. print command, lpq command, etc\&.\&.\&.) after defining the value for the 6987 7995 \fIprinting\fR 6988 option since it will reset the printing commands to default values\ .7996 option since it will reset the printing commands to default values\&. 6989 7997 .sp 6990 7998 See also the discussion in the 6991 7999 [printers] 6992 section\. 6993 .sp 6994 \fINo default\fR 8000 section\&. 8001 .sp 8002 Default: 8003 \fI\fIprinting\fR\fR\fI = \fR\fI\FCDepends on the operating system, see \FCtestparm \-v\&.\F[]\F[]\fR\fI \fR 6995 8004 .RE 6996 8005 6997 8006 printjob username (S) 6998 .PP 6999 .RS 4 7000 This parameter specifies which user information will be passed to the printing system\. Usually, the username is sent, but in some cases, e\.g\. the domain prefix is useful, too\. 7001 .sp 7002 Default: 7003 \fI\fIprintjob username\fR\fR\fI = \fR\fI%U\fR\fI \fR 7004 .sp 7005 Example: 7006 \fI\fIprintjob username\fR\fR\fI = \fR\fI%D\e%U\fR\fI \fR 8007 .\" printjob username 8008 .PP 8009 .RS 4 8010 This parameter specifies which user information will be passed to the printing system\&. Usually, the username is sent, but in some cases, e\&.g\&. the domain prefix is useful, too\&. 8011 .sp 8012 Default: 8013 \fI\fIprintjob username\fR\fR\fI = \fR\fI\FC%U\F[]\fR\fI \fR 8014 .sp 8015 Example: 8016 \fI\fIprintjob username\fR\fR\fI = \fR\fI\FC%D\e%U\F[]\fR\fI \fR 7007 8017 .RE 7008 8018 7009 8019 private dir (G) 8020 .\" private dir 7010 8021 .PP 7011 8022 .RS 4 7012 8023 This parameters defines the directory smbd will use for storing such files as 7013 \ fIsmbpasswd\fR8024 \FCsmbpasswd\F[] 7014 8025 and 7015 \ fIsecrets\.tdb\fR\.7016 .sp 7017 Default: 7018 \fI\fIprivate dir\fR\fR\fI = \fR\fI ${prefix}/private\fR\fI \fR8026 \FCsecrets\&.tdb\F[]\&. 8027 .sp 8028 Default: 8029 \fI\fIprivate dir\fR\fR\fI = \fR\fI\FC${prefix}/private\F[]\fR\fI \fR 7019 8030 .RE 7020 8031 7021 8032 profile acls (S) 7022 .PP 7023 .RS 4 7024 This boolean parameter was added to fix the problems that people have been having with storing user profiles on Samba shares from Windows 2000 or Windows XP clients\. New versions of Windows 2000 or Windows XP service packs do security ACL checking on the owner and ability to write of the profile directory stored on a local workstation when copied from a Samba share\. 7025 .sp 7026 When not in domain mode with winbindd then the security info copied onto the local workstation has no meaning to the logged in user (SID) on that workstation so the profile storing fails\. Adding this parameter onto a share used for profile storage changes two things about the returned Windows ACL\. Firstly it changes the owner and group owner of all reported files and directories to be BUILTIN\e\eAdministrators, BUILTIN\e\eUsers respectively (SIDs S\-1\-5\-32\-544, S\-1\-5\-32\-545)\. Secondly it adds an ACE entry of "Full Control" to the SID BUILTIN\e\eUsers to every returned ACL\. This will allow any Windows 2000 or XP workstation user to access the profile\. 7027 .sp 7028 Note that if you have multiple users logging on to a workstation then in order to prevent them from being able to access each others profiles you must remove the "Bypass traverse checking" advanced user right\. This will prevent access to other users profile directories as the top level profile directory (named after the user) is created by the workstation profile code and has an ACL restricting entry to the directory tree to the owning user\. 7029 .sp 7030 Default: 7031 \fI\fIprofile acls\fR\fR\fI = \fR\fIno\fR\fI \fR 8033 .\" profile acls 8034 .PP 8035 .RS 4 8036 This boolean parameter was added to fix the problems that people have been having with storing user profiles on Samba shares from Windows 2000 or Windows XP clients\&. New versions of Windows 2000 or Windows XP service packs do security ACL checking on the owner and ability to write of the profile directory stored on a local workstation when copied from a Samba share\&. 8037 .sp 8038 When not in domain mode with winbindd then the security info copied onto the local workstation has no meaning to the logged in user (SID) on that workstation so the profile storing fails\&. Adding this parameter onto a share used for profile storage changes two things about the returned Windows ACL\&. Firstly it changes the owner and group owner of all reported files and directories to be BUILTIN\e\eAdministrators, BUILTIN\e\eUsers respectively (SIDs S\-1\-5\-32\-544, S\-1\-5\-32\-545)\&. Secondly it adds an ACE entry of "Full Control" to the SID BUILTIN\e\eUsers to every returned ACL\&. This will allow any Windows 2000 or XP workstation user to access the profile\&. 8039 .sp 8040 Note that if you have multiple users logging on to a workstation then in order to prevent them from being able to access each others profiles you must remove the "Bypass traverse checking" advanced user right\&. This will prevent access to other users profile directories as the top level profile directory (named after the user) is created by the workstation profile code and has an ACL restricting entry to the directory tree to the owning user\&. 8041 .sp 8042 Default: 8043 \fI\fIprofile acls\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 7032 8044 .RE 7033 8045 7034 8046 queuepause command (S) 7035 .PP 7036 .RS 4 7037 This parameter specifies the command to be executed on the server host in order to pause the printer queue\. 7038 .sp 7039 This command should be a program or script which takes a printer name as its only parameter and stops the printer queue, such that no longer jobs are submitted to the printer\. 7040 .sp 7041 This command is not supported by Windows for Workgroups, but can be issued from the Printers window under Windows 95 and NT\. 8047 .\" queuepause command 8048 .PP 8049 .RS 4 8050 This parameter specifies the command to be executed on the server host in order to pause the printer queue\&. 8051 .sp 8052 This command should be a program or script which takes a printer name as its only parameter and stops the printer queue, such that no longer jobs are submitted to the printer\&. 8053 .sp 8054 This command is not supported by Windows for Workgroups, but can be issued from the Printers window under Windows 95 and NT\&. 7042 8055 .sp 7043 8056 If a 7044 8057 \fI%p\fR 7045 is given then the printer name is put in its place\ . Otherwise it is placed at the end of the command\.7046 .sp 7047 Note that it is good practice to include the absolute path in the command as the PATH may not be available to the server\ .8058 is given then the printer name is put in its place\&. Otherwise it is placed at the end of the command\&. 8059 .sp 8060 Note that it is good practice to include the absolute path in the command as the PATH may not be available to the server\&. 7048 8061 .sp 7049 8062 \fINo default\fR 7050 8063 .sp 7051 8064 Example: 7052 \fI\fIqueuepause command\fR\fR\fI = \fR\fI disable %p\fR\fI \fR8065 \fI\fIqueuepause command\fR\fR\fI = \fR\fI\FCdisable %p\F[]\fR\fI \fR 7053 8066 .RE 7054 8067 7055 8068 queueresume command (S) 7056 .PP 7057 .RS 4 7058 This parameter specifies the command to be executed on the server host in order to resume the printer queue\. It is the command to undo the behavior that is caused by the previous parameter (\fIqueuepause command\fR)\. 7059 .sp 7060 This command should be a program or script which takes a printer name as its only parameter and resumes the printer queue, such that queued jobs are resubmitted to the printer\. 7061 .sp 7062 This command is not supported by Windows for Workgroups, but can be issued from the Printers window under Windows 95 and NT\. 8069 .\" queueresume command 8070 .PP 8071 .RS 4 8072 This parameter specifies the command to be executed on the server host in order to resume the printer queue\&. It is the command to undo the behavior that is caused by the previous parameter (\m[blue]\fBqueuepause command\fR\m[])\&. 8073 .sp 8074 This command should be a program or script which takes a printer name as its only parameter and resumes the printer queue, such that queued jobs are resubmitted to the printer\&. 8075 .sp 8076 This command is not supported by Windows for Workgroups, but can be issued from the Printers window under Windows 95 and NT\&. 7063 8077 .sp 7064 8078 If a 7065 8079 \fI%p\fR 7066 is given then the printer name is put in its place\ . Otherwise it is placed at the end of the command\.7067 .sp 7068 Note that it is good practice to include the absolute path in the command as the PATH may not be available to the server\ .7069 .sp 7070 Default: 7071 \fI\fIqueueresume command\fR\fR\fI = \fR\fI\ fR\fI \fR7072 .sp 7073 Example: 7074 \fI\fIqueueresume command\fR\fR\fI = \fR\fI enable %p\fR\fI \fR8080 is given then the printer name is put in its place\&. Otherwise it is placed at the end of the command\&. 8081 .sp 8082 Note that it is good practice to include the absolute path in the command as the PATH may not be available to the server\&. 8083 .sp 8084 Default: 8085 \fI\fIqueueresume command\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 8086 .sp 8087 Example: 8088 \fI\fIqueueresume command\fR\fR\fI = \fR\fI\FCenable %p\F[]\fR\fI \fR 7075 8089 .RE 7076 8090 7077 8091 read list (S) 7078 .PP 7079 .RS 4 7080 This is a list of users that are given read\-only access to a service\. If the connecting user is in this list then they will not be given write access, no matter what the 7081 \fIread only\fR 7082 option is set to\. The list can include group names using the syntax described in the 7083 \fIinvalid users\fR 7084 parameter\. 8092 .\" read list 8093 .PP 8094 .RS 4 8095 This is a list of users that are given read\-only access to a service\&. If the connecting user is in this list then they will not be given write access, no matter what the 8096 \m[blue]\fBread only\fR\m[] 8097 option is set to\&. The list can include group names using the syntax described in the 8098 \m[blue]\fBinvalid users\fR\m[] 8099 parameter\&. 7085 8100 .sp 7086 8101 This parameter will not work with the 7087 \ fIsecurity = share\fR7088 in Samba 3\ .0\. This is by design\.7089 .sp 7090 Default: 7091 \fI\fIread list\fR\fR\fI = \fR\fI\ fR\fI \fR7092 .sp 7093 Example: 7094 \fI\fIread list\fR\fR\fI = \fR\fI mary, @students\fR\fI \fR8102 \m[blue]\fBsecurity = share\fR\m[] 8103 in Samba 3\&.0\&. This is by design\&. 8104 .sp 8105 Default: 8106 \fI\fIread list\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 8107 .sp 8108 Example: 8109 \fI\fIread list\fR\fR\fI = \fR\fI\FCmary, @students\F[]\fR\fI \fR 7095 8110 .RE 7096 8111 7097 8112 read only (S) 8113 .\" read only 7098 8114 .PP 7099 8115 .RS 4 7100 8116 An inverted synonym is 7101 \ fIwriteable\fR\.8117 \m[blue]\fBwriteable\fR\m[]\&. 7102 8118 .sp 7103 8119 If this parameter is 7104 \fByes\fR, then users of a service may not create or modify files in the service\'s directory\ .7105 .sp 7106 Note that a printable service ( printable = yes) will8120 \fByes\fR, then users of a service may not create or modify files in the service\'s directory\&. 8121 .sp 8122 Note that a printable service (\FCprintable = yes\F[]) will 7107 8123 \fIALWAYS\fR 7108 allow writing to the directory (user privileges permitting), but only via spooling operations\ .7109 .sp 7110 Default: 7111 \fI\fIread only\fR\fR\fI = \fR\fI yes\fR\fI \fR8124 allow writing to the directory (user privileges permitting), but only via spooling operations\&. 8125 .sp 8126 Default: 8127 \fI\fIread only\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 7112 8128 .RE 7113 8129 7114 8130 read raw (G) 7115 .PP 7116 .RS 4 7117 This parameter controls whether or not the server will support the raw read SMB requests when transferring data to clients\. 7118 .sp 7119 If enabled, raw reads allow reads of 65535 bytes in one packet\. This typically provides a major performance benefit\. 7120 .sp 7121 However, some clients either negotiate the allowable block size incorrectly or are incapable of supporting larger block sizes, and for these clients you may need to disable raw reads\. 7122 .sp 7123 In general this parameter should be viewed as a system tuning tool and left severely alone\. 7124 .sp 7125 Default: 7126 \fI\fIread raw\fR\fR\fI = \fR\fIyes\fR\fI \fR 8131 .\" read raw 8132 .PP 8133 .RS 4 8134 This parameter controls whether or not the server will support the raw read SMB requests when transferring data to clients\&. 8135 .sp 8136 If enabled, raw reads allow reads of 65535 bytes in one packet\&. This typically provides a major performance benefit\&. 8137 .sp 8138 However, some clients either negotiate the allowable block size incorrectly or are incapable of supporting larger block sizes, and for these clients you may need to disable raw reads\&. 8139 .sp 8140 In general this parameter should be viewed as a system tuning tool and left severely alone\&. 8141 .sp 8142 Default: 8143 \fI\fIread raw\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 7127 8144 .RE 7128 8145 7129 8146 realm (G) 7130 .PP 7131 .RS 4 7132 This option specifies the kerberos realm to use\. The realm is used as the ADS equivalent of the NT4 7133 domain\. It is usually set to the DNS name of the kerberos server\. 7134 .sp 7135 Default: 7136 \fI\fIrealm\fR\fR\fI = \fR\fI\fR\fI \fR 7137 .sp 7138 Example: 7139 \fI\fIrealm\fR\fR\fI = \fR\fImysambabox\.mycompany\.com\fR\fI \fR 8147 .\" realm 8148 .PP 8149 .RS 4 8150 This option specifies the kerberos realm to use\&. The realm is used as the ADS equivalent of the NT4 8151 \FCdomain\F[]\&. It is usually set to the DNS name of the kerberos server\&. 8152 .sp 8153 Default: 8154 \fI\fIrealm\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 8155 .sp 8156 Example: 8157 \fI\fIrealm\fR\fR\fI = \fR\fI\FCmysambabox\&.mycompany\&.com\F[]\fR\fI \fR 7140 8158 .RE 7141 8159 7142 8160 registry shares (G) 7143 .PP 7144 .RS 4 7145 This turns on or off support for share definitions read from registry\. Shares defined in 7146 \fIsmb\.conf\fR 7147 take precedence over shares with the same name defined in registry\. See the section on registry\-based configuration for details\. 8161 .\" registry shares 8162 .PP 8163 .RS 4 8164 This turns on or off support for share definitions read from registry\&. Shares defined in 8165 \fIsmb\&.conf\fR 8166 take precedence over shares with the same name defined in registry\&. See the section on registry\-based configuration for details\&. 7148 8167 .sp 7149 8168 Note that this parameter defaults to … … 7153 8172 \fIconfig backend\fR 7154 8173 is set to 7155 \fIregistry\fR\ .7156 .sp 7157 Default: 7158 \fI\fIregistry shares\fR\fR\fI = \fR\fI no\fR\fI \fR7159 .sp 7160 Example: 7161 \fI\fIregistry shares\fR\fR\fI = \fR\fI yes\fR\fI \fR8174 \fIregistry\fR\&. 8175 .sp 8176 Default: 8177 \fI\fIregistry shares\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 8178 .sp 8179 Example: 8180 \fI\fIregistry shares\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 7162 8181 .RE 7163 8182 7164 8183 remote announce (G) 8184 .\" remote announce 7165 8185 .PP 7166 8186 .RS 4 7167 8187 This option allows you to setup 7168 \fBnmbd\fR(8)to periodically announce itself to arbitrary IP addresses with an arbitrary workgroup name\ .7169 .sp 7170 This is useful if you want your Samba server to appear in a remote workgroup for which the normal browse propagation rules don\'t work\ . The remote workgroup can be anywhere that you can send IP packets to\.8188 \fBnmbd\fR(8)to periodically announce itself to arbitrary IP addresses with an arbitrary workgroup name\&. 8189 .sp 8190 This is useful if you want your Samba server to appear in a remote workgroup for which the normal browse propagation rules don\'t work\&. The remote workgroup can be anywhere that you can send IP packets to\&. 7171 8191 .sp 7172 8192 For example: 7173 8193 .sp 7174 .RS 4 8194 .if n \{\ 8195 .RS 4 8196 .\} 8197 .fam C 8198 .ps -1 7175 8199 .nf 7176 remote announce = 192\.168\.2\.255/SERVERS 192\.168\.4\.255/STAFF 8200 .if t \{\ 8201 .sp -1 8202 .\} 8203 .BB lightgray adjust-for-leading-newline 8204 .sp -1 8205 8206 \FCremote announce = 192\&.168\&.2\&.255/SERVERS 192\&.168\&.4\&.255/STAFF\F[] 8207 .EB lightgray adjust-for-leading-newline 8208 .if t \{\ 8209 .sp 1 8210 .\} 7177 8211 .fi 7178 .RE 8212 .fam 8213 .ps +1 8214 .if n \{\ 8215 .RE 8216 .\} 7179 8217 .sp 7180 8218 the above line would cause 7181 nmbd 7182 to announce itself to the two given IP addresses using the given workgroup names\ . If you leave out the workgroup name then the one given in the7183 \ fIworkgroup\fR7184 parameter is used instead\ .7185 .sp 7186 The IP addresses you choose would normally be the broadcast addresses of the remote networks, but can also be the IP addresses of known browse masters if your network config is that stable\ .7187 .sp 7188 See the chapter on Network Browsing in the Samba\-HOWTO book\ .7189 .sp 7190 Default: 7191 \fI\fIremote announce\fR\fR\fI = \fR\fI\ fR\fI \fR8219 \FCnmbd\F[] 8220 to announce itself to the two given IP addresses using the given workgroup names\&. If you leave out the workgroup name then the one given in the 8221 \m[blue]\fBworkgroup\fR\m[] 8222 parameter is used instead\&. 8223 .sp 8224 The IP addresses you choose would normally be the broadcast addresses of the remote networks, but can also be the IP addresses of known browse masters if your network config is that stable\&. 8225 .sp 8226 See the chapter on Network Browsing in the Samba\-HOWTO book\&. 8227 .sp 8228 Default: 8229 \fI\fIremote announce\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 7192 8230 .RE 7193 8231 7194 8232 remote browse sync (G) 8233 .\" remote browse sync 7195 8234 .PP 7196 8235 .RS 4 7197 8236 This option allows you to setup 7198 8237 \fBnmbd\fR(8) 7199 to periodically request synchronization of browse lists with the master browser of a Samba server that is on a remote segment\ . This option will allow you to gain browse lists for multiple workgroups across routed networks\. This is done in a manner that does not work with any non\-Samba servers\.7200 .sp 7201 This is useful if you want your Samba server and all local clients to appear in a remote workgroup for which the normal browse propagation rules don\'t work\ . The remote workgroup can be anywhere that you can send IP packets to\.8238 to periodically request synchronization of browse lists with the master browser of a Samba server that is on a remote segment\&. This option will allow you to gain browse lists for multiple workgroups across routed networks\&. This is done in a manner that does not work with any non\-Samba servers\&. 8239 .sp 8240 This is useful if you want your Samba server and all local clients to appear in a remote workgroup for which the normal browse propagation rules don\'t work\&. The remote workgroup can be anywhere that you can send IP packets to\&. 7202 8241 .sp 7203 8242 For example: 7204 8243 .sp 7205 .RS 4 8244 .if n \{\ 8245 .RS 4 8246 .\} 8247 .fam C 8248 .ps -1 7206 8249 .nf 7207 \fIremote browse sync = 192\.168\.2\.255 192\.168\.4\.255\fR 8250 .if t \{\ 8251 .sp -1 8252 .\} 8253 .BB lightgray adjust-for-leading-newline 8254 .sp -1 8255 8256 \fIremote browse sync = 192\&.168\&.2\&.255 192\&.168\&.4\&.255\fR 8257 .EB lightgray adjust-for-leading-newline 8258 .if t \{\ 8259 .sp 1 8260 .\} 7208 8261 .fi 7209 .RE 8262 .fam 8263 .ps +1 8264 .if n \{\ 8265 .RE 8266 .\} 7210 8267 .sp 7211 8268 the above line would cause 7212 nmbd 7213 to request the master browser on the specified subnets or addresses to synchronize their browse lists with the local server\ .7214 .sp 7215 The IP addresses you choose would normally be the broadcast addresses of the remote networks, but can also be the IP addresses of known browse masters if your network config is that stable\ . If a machine IP address is given Samba makes NO attempt to validate that the remote machine is available, is listening, nor that it is in fact the browse master on its segment\.8269 \FCnmbd\F[] 8270 to request the master browser on the specified subnets or addresses to synchronize their browse lists with the local server\&. 8271 .sp 8272 The IP addresses you choose would normally be the broadcast addresses of the remote networks, but can also be the IP addresses of known browse masters if your network config is that stable\&. If a machine IP address is given Samba makes NO attempt to validate that the remote machine is available, is listening, nor that it is in fact the browse master on its segment\&. 7216 8273 .sp 7217 8274 The 7218 \ fIremote browse sync\fR7219 may be used on networks where there is no WINS server, and may be used on disjoint networks where each network has its own WINS server\ .7220 .sp 7221 Default: 7222 \fI\fIremote browse sync\fR\fR\fI = \fR\fI\ fR\fI \fR8275 \m[blue]\fBremote browse sync\fR\m[] 8276 may be used on networks where there is no WINS server, and may be used on disjoint networks where each network has its own WINS server\&. 8277 .sp 8278 Default: 8279 \fI\fIremote browse sync\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 7223 8280 .RE 7224 8281 7225 8282 rename user script (G) 8283 .\" rename user script 7226 8284 .PP 7227 8285 .RS 4 7228 8286 This is the full pathname to a script that will be run as root by 7229 8287 \fBsmbd\fR(8) 7230 under special circumstances described below\ .7231 .sp 7232 When a user with admin authority or SeAddUserPrivilege rights renames a user (e\ .g\.: from the NT4 User Manager for Domains), this script will be run to rename the POSIX user\. Two variables,7233 %uold 8288 under special circumstances described below\&. 8289 .sp 8290 When a user with admin authority or SeAddUserPrivilege rights renames a user (e\&.g\&.: from the NT4 User Manager for Domains), this script will be run to rename the POSIX user\&. Two variables, 8291 \FC%uold\F[] 7234 8292 and 7235 %unew, will be substituted with the old and new usernames, respectively\. The script should return 0 upon successful completion, and nonzero otherwise\. 7236 .sp 8293 \FC%unew\F[], will be substituted with the old and new usernames, respectively\&. The script should return 0 upon successful completion, and nonzero otherwise\&. 8294 .if n \{\ 8295 .sp 8296 .\} 8297 .RS 4 8298 .BM yellow 7237 8299 .it 1 an-trap 7238 8300 .nr an-no-space-flag 1 7239 8301 .nr an-break-flag 1 7240 8302 .br 7241 Note 7242 The script has all responsibility to rename all the necessary data that is accessible in this posix method\. This can mean different requirements for different backends\. The tdbsam and smbpasswd backends will take care of the contents of their respective files, so the script is responsible only for changing the POSIX username, and other data that may required for your circumstances, such as home directory\. Please also consider whether or not you need to rename the actual home directories themselves\. The ldapsam backend will not make any changes, because of the potential issues with renaming the LDAP naming attribute\. In this case the script is responsible for changing the attribute that samba uses (uid) for locating users, as well as any data that needs to change for other applications using the same directory\. 7243 7244 Default: 7245 \fI\fIrename user script\fR\fR\fI = \fR\fIno\fR\fI \fR 8303 .ps +1 8304 \fBNote\fR 8305 .ps -1 8306 .br 8307 The script has all responsibility to rename all the necessary data that is accessible in this posix method\&. This can mean different requirements for different backends\&. The tdbsam and smbpasswd backends will take care of the contents of their respective files, so the script is responsible only for changing the POSIX username, and other data that may required for your circumstances, such as home directory\&. Please also consider whether or not you need to rename the actual home directories themselves\&. The ldapsam backend will not make any changes, because of the potential issues with renaming the LDAP naming attribute\&. In this case the script is responsible for changing the attribute that samba uses (uid) for locating users, as well as any data that needs to change for other applications using the same directory\&. 8308 .sp .5v 8309 .EM yellow 8310 .RE 8311 Default: 8312 \fI\fIrename user script\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 7246 8313 .RE 7247 8314 7248 8315 reset on zero vc (G) 7249 .PP 7250 .RS 4 7251 This boolean option controls whether an incoming session setup should kill other connections coming from the same IP\. This matches the default Windows 2003 behaviour\. Setting this parameter to yes becomes necessary when you have a flaky network and windows decides to reconnect while the old connection still has files with share modes open\. These files become inaccessible over the new connection\. The client sends a zero VC on the new connection, and Windows 2003 kills all other connections coming from the same IP\. This way the locked files are accessible again\. Please be aware that enabling this option will kill connections behind a masquerading router\. 7252 .sp 7253 Default: 7254 \fI\fIreset on zero vc\fR\fR\fI = \fR\fIno\fR\fI \fR 8316 .\" reset on zero vc 8317 .PP 8318 .RS 4 8319 This boolean option controls whether an incoming session setup should kill other connections coming from the same IP\&. This matches the default Windows 2003 behaviour\&. Setting this parameter to yes becomes necessary when you have a flaky network and windows decides to reconnect while the old connection still has files with share modes open\&. These files become inaccessible over the new connection\&. The client sends a zero VC on the new connection, and Windows 2003 kills all other connections coming from the same IP\&. This way the locked files are accessible again\&. Please be aware that enabling this option will kill connections behind a masquerading router\&. 8320 .sp 8321 Default: 8322 \fI\fIreset on zero vc\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 7255 8323 .RE 7256 8324 7257 8325 restrict anonymous (G) 7258 .PP 7259 .RS 4 7260 The setting of this parameter determines whether user and group list information is returned for an anonymous connection\. and mirrors the effects of the 7261 .sp 7262 .RS 4 8326 .\" restrict anonymous 8327 .PP 8328 .RS 4 8329 The setting of this parameter determines whether user and group list information is returned for an anonymous connection\&. and mirrors the effects of the 8330 .sp 8331 .if n \{\ 8332 .RS 4 8333 .\} 8334 .fam C 8335 .ps -1 7263 8336 .nf 8337 .if t \{\ 8338 .sp -1 8339 .\} 8340 .BB lightgray adjust-for-leading-newline 8341 .sp -1 8342 7264 8343 HKEY_LOCAL_MACHINE\eSYSTEM\eCurrentControlSet\e 7265 8344 Control\eLSA\eRestrictAnonymous 8345 .EB lightgray adjust-for-leading-newline 8346 .if t \{\ 8347 .sp 1 8348 .\} 7266 8349 .fi 7267 .RE 7268 .sp 7269 registry key in Windows 2000 and Windows NT\. When set to 0, user and group list information is returned to anyone who asks\. When set to 1, only an authenticated user can retrive user and group list information\. For the value 2, supported by Windows 2000/XP and Samba, no anonymous connections are allowed at all\. This can break third party and Microsoft applications which expect to be allowed to perform operations anonymously\. 7270 .sp 7271 The security advantage of using restrict anonymous = 1 is dubious, as user and group list information can be obtained using other means\. 7272 .sp 8350 .fam 8351 .ps +1 8352 .if n \{\ 8353 .RE 8354 .\} 8355 .sp 8356 registry key in Windows 2000 and Windows NT\&. When set to 0, user and group list information is returned to anyone who asks\&. When set to 1, only an authenticated user can retrive user and group list information\&. For the value 2, supported by Windows 2000/XP and Samba, no anonymous connections are allowed at all\&. This can break third party and Microsoft applications which expect to be allowed to perform operations anonymously\&. 8357 .sp 8358 The security advantage of using restrict anonymous = 1 is dubious, as user and group list information can be obtained using other means\&. 8359 .if n \{\ 8360 .sp 8361 .\} 8362 .RS 4 8363 .BM yellow 7273 8364 .it 1 an-trap 7274 8365 .nr an-no-space-flag 1 7275 8366 .nr an-break-flag 1 7276 8367 .br 7277 Note 8368 .ps +1 8369 \fBNote\fR 8370 .ps -1 8371 .br 7278 8372 The security advantage of using restrict anonymous = 2 is removed by setting 7279 \fIguest ok = yes\fR 7280 on any share\. 7281 7282 Default: 7283 \fI\fIrestrict anonymous\fR\fR\fI = \fR\fI0\fR\fI \fR 8373 \m[blue]\fBguest ok = yes\fR\m[] 8374 on any share\&. 8375 .sp .5v 8376 .EM yellow 8377 .RE 8378 Default: 8379 \fI\fIrestrict anonymous\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 7284 8380 .RE 7285 8381 7286 8382 root 8383 .\" root 7287 8384 .PP 7288 8385 .RS 4 7289 8386 This parameter is a synonym for 7290 root directory\ .8387 root directory\&. 7291 8388 .RE 7292 8389 7293 8390 root dir 8391 .\" root dir 7294 8392 .PP 7295 8393 .RS 4 7296 8394 This parameter is a synonym for 7297 root directory\ .8395 root directory\&. 7298 8396 .RE 7299 8397 7300 8398 root directory (G) 8399 .\" root directory 7301 8400 .PP 7302 8401 .RS 4 7303 8402 The server will 7304 chroot() 7305 (i\ .e\. Change its root directory) to this directory on startup\. This is not strictly necessary for secure operation\. Even without it the server will deny access to files not in one of the service entries\. It may also check for, and deny access to, soft links to other parts of the filesystem, or attempts to use "\.\." in file names to access other directories (depending on the setting of the7306 \ fIwide smbconfoptions\fR7307 parameter)\ .8403 \FCchroot()\F[] 8404 (i\&.e\&. Change its root directory) to this directory on startup\&. This is not strictly necessary for secure operation\&. Even without it the server will deny access to files not in one of the service entries\&. It may also check for, and deny access to, soft links to other parts of the filesystem, or attempts to use "\&.\&." in file names to access other directories (depending on the setting of the 8405 \m[blue]\fBwide smbconfoptions\fR\m[] 8406 parameter)\&. 7308 8407 .sp 7309 8408 Adding a 7310 8409 \fIroot directory\fR 7311 entry other than "/" adds an extra level of security, but at a price\ . It absolutely ensures that no access is given to files not in the sub\-tree specified in the8410 entry other than "/" adds an extra level of security, but at a price\&. It absolutely ensures that no access is given to files not in the sub\-tree specified in the 7312 8411 \fIroot directory\fR 7313 8412 option, 7314 8413 \fIincluding\fR 7315 some files needed for complete operation of the server\ . To maintain full operability of the server you will need to mirror some system files into the8414 some files needed for complete operation of the server\&. To maintain full operability of the server you will need to mirror some system files into the 7316 8415 \fIroot directory\fR 7317 tree\ . In particular you will need to mirror7318 \ fI/etc/passwd\fR7319 (or a subset of it), and any binaries or configuration files needed for printing (if required)\ . The set of files that must be mirrored is operating system dependent\.7320 .sp 7321 Default: 7322 \fI\fIroot directory\fR\fR\fI = \fR\fI /\fR\fI \fR7323 .sp 7324 Example: 7325 \fI\fIroot directory\fR\fR\fI = \fR\fI /homes/smb\fR\fI \fR8416 tree\&. In particular you will need to mirror 8417 \FC/etc/passwd\F[] 8418 (or a subset of it), and any binaries or configuration files needed for printing (if required)\&. The set of files that must be mirrored is operating system dependent\&. 8419 .sp 8420 Default: 8421 \fI\fIroot directory\fR\fR\fI = \fR\fI\FC/\F[]\fR\fI \fR 8422 .sp 8423 Example: 8424 \fI\fIroot directory\fR\fR\fI = \fR\fI\FC/homes/smb\F[]\fR\fI \fR 7326 8425 .RE 7327 8426 7328 8427 root postexec (S) 8428 .\" root postexec 7329 8429 .PP 7330 8430 .RS 4 7331 8431 This is the same as the 7332 8432 \fIpostexec\fR 7333 parameter except that the command is run as root\ . This is useful for unmounting filesystems (such as CDROMs) after a connection is closed\.7334 .sp 7335 Default: 7336 \fI\fIroot postexec\fR\fR\fI = \fR\fI\ fR\fI \fR8433 parameter except that the command is run as root\&. This is useful for unmounting filesystems (such as CDROMs) after a connection is closed\&. 8434 .sp 8435 Default: 8436 \fI\fIroot postexec\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 7337 8437 .RE 7338 8438 7339 8439 root preexec close (S) 8440 .\" root preexec close 7340 8441 .PP 7341 8442 .RS 4 7342 8443 This is the same as the 7343 8444 \fIpreexec close \fR 7344 parameter except that the command is run as root\ .7345 .sp 7346 Default: 7347 \fI\fIroot preexec close\fR\fR\fI = \fR\fI no\fR\fI \fR8445 parameter except that the command is run as root\&. 8446 .sp 8447 Default: 8448 \fI\fIroot preexec close\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 7348 8449 .RE 7349 8450 7350 8451 root preexec (S) 8452 .\" root preexec 7351 8453 .PP 7352 8454 .RS 4 7353 8455 This is the same as the 7354 8456 \fIpreexec\fR 7355 parameter except that the command is run as root\ . This is useful for mounting filesystems (such as CDROMs) when a connection is opened\.7356 .sp 7357 Default: 7358 \fI\fIroot preexec\fR\fR\fI = \fR\fI\ fR\fI \fR8457 parameter except that the command is run as root\&. This is useful for mounting filesystems (such as CDROMs) when a connection is opened\&. 8458 .sp 8459 Default: 8460 \fI\fIroot preexec\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 7359 8461 .RE 7360 8462 7361 8463 security mask (S) 7362 .PP 7363 .RS 4 7364 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box\. 7365 .sp 7366 This parameter is applied as a mask (AND\'ed with) to the incoming permission bits, thus resetting any bits not in this mask\. Make sure not to mix up this parameter with 7367 \fIforce security mode\fR, which works in a manner similar to this one but uses a logical OR instead of an AND\. 7368 .sp 7369 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the file permissions regardless of the previous status of this bits on the file\. 7370 .sp 7371 If not set explicitly this parameter is 0777, allowing a user to set all the user/group/world permissions on a file\. 8464 .\" security mask 8465 .PP 8466 .RS 4 8467 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box\&. 8468 .sp 8469 This parameter is applied as a mask (AND\'ed with) to the incoming permission bits, thus resetting any bits not in this mask\&. Make sure not to mix up this parameter with 8470 \m[blue]\fBforce security mode\fR\m[], which works in a manner similar to this one but uses a logical OR instead of an AND\&. 8471 .sp 8472 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the file permissions regardless of the previous status of this bits on the file\&. 8473 .sp 8474 If not set explicitly this parameter is 0777, allowing a user to set all the user/group/world permissions on a file\&. 7372 8475 .sp 7373 8476 \fI Note\fR 7374 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\ . Administrators of most normal systems will probably want to leave it set to7375 \fB0777\fR\ .7376 .sp 7377 Default: 7378 \fI\fIsecurity mask\fR\fR\fI = \fR\fI 0777\fR\fI \fR7379 .sp 7380 Example: 7381 \fI\fIsecurity mask\fR\fR\fI = \fR\fI 0770\fR\fI \fR8477 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it set to 8478 \fB0777\fR\&. 8479 .sp 8480 Default: 8481 \fI\fIsecurity mask\fR\fR\fI = \fR\fI\FC0777\F[]\fR\fI \fR 8482 .sp 8483 Example: 8484 \fI\fIsecurity mask\fR\fR\fI = \fR\fI\FC0770\F[]\fR\fI \fR 7382 8485 .RE 7383 8486 7384 8487 security (G) 8488 .\" security 7385 8489 .PP 7386 8490 .RS 4 7387 8491 This option affects how clients respond to Samba and is one of the most important settings in the 7388 \ fI smb\.conf\fR7389 file\ .8492 \FC smb\&.conf\F[] 8493 file\&. 7390 8494 .sp 7391 8495 The option sets the "security mode bit" in replies to protocol negotiations with 7392 8496 \fBsmbd\fR(8) 7393 to turn share level security on or off\ . Clients decide based on this bit whether (and how) to transfer user and password information to the server\.8497 to turn share level security on or off\&. Clients decide based on this bit whether (and how) to transfer user and password information to the server\&. 7394 8498 .sp 7395 8499 The default is 7396 security = user, as this is the most common setting needed when talking to Windows 98 and Windows NT\.8500 \FCsecurity = user\F[], as this is the most common setting needed when talking to Windows 98 and Windows NT\&. 7397 8501 .sp 7398 8502 The alternatives are 7399 security = share,7400 security = server 8503 \FCsecurity = share\F[], 8504 \FCsecurity = server\F[] 7401 8505 or 7402 security = domain\.7403 .sp 7404 In versions of Samba prior to 2\ .0\.0, the default was7405 security = share 7406 mainly because that was the only option at one stage\ .7407 .sp 7408 There is a bug in WfWg that has relevance to this setting\ . When in user or server level security a WfWg client will totally ignore the username and password you type in the "connect drive" dialog box\. This makes it very difficult (if not impossible) to connect to a Samba service as anyone except the user that you are logged into WfWg as\.8506 \FCsecurity = domain \F[]\&. 8507 .sp 8508 In versions of Samba prior to 2\&.0\&.0, the default was 8509 \FCsecurity = share\F[] 8510 mainly because that was the only option at one stage\&. 8511 .sp 8512 There is a bug in WfWg that has relevance to this setting\&. When in user or server level security a WfWg client will totally ignore the username and password you type in the "connect drive" dialog box\&. This makes it very difficult (if not impossible) to connect to a Samba service as anyone except the user that you are logged into WfWg as\&. 7409 8513 .sp 7410 8514 If your PCs use usernames that are the same as their usernames on the UNIX machine then you will want to use 7411 security = user\. If you mostly use usernames that don\'t exist on the UNIX box then use7412 security = share\.8515 \FCsecurity = user\F[]\&. If you mostly use usernames that don\'t exist on the UNIX box then use 8516 \FCsecurity = share\F[]\&. 7413 8517 .sp 7414 8518 You should also use 7415 security = share 7416 if you want to mainly setup shares without a password (guest shares)\ . This is commonly used for a shared printer server\. It is more difficult to setup guest shares with7417 security = user, see the7418 \ fImap to guest\fRparameter for details\.8519 \FCsecurity = share\F[] 8520 if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&. It is more difficult to setup guest shares with 8521 \FCsecurity = user\F[], see the 8522 \m[blue]\fBmap to guest\fR\m[]parameter for details\&. 7419 8523 .sp 7420 8524 It is possible to use 7421 smbd 8525 \FCsmbd\F[] 7422 8526 in a 7423 8527 \fI hybrid mode\fR 7424 8528 where it is offers both user and share level security under different 7425 \ fINetBIOS aliases\fR\.7426 .sp 7427 The different settings will now be explained\ .8529 \m[blue]\fBNetBIOS aliases\fR\m[]\&. 8530 .sp 8531 The different settings will now be explained\&. 7428 8532 .sp 7429 8533 \fISECURITY = SHARE\fR 7430 8534 .sp 7431 8535 When clients connect to a share level security server they need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a 7432 security = share 7433 server)\ . Instead, the clients send authentication information (passwords) on a per\-share basis, at the time they attempt to connect to that share\.8536 \FCsecurity = share \F[] 8537 server)\&. Instead, the clients send authentication information (passwords) on a per\-share basis, at the time they attempt to connect to that share\&. 7434 8538 .sp 7435 8539 Note that 7436 smbd 8540 \FCsmbd\F[] 7437 8541 \fIALWAYS\fR 7438 8542 uses a valid UNIX user to act on behalf of the client, even in 7439 security = share 7440 level security\ .8543 \FCsecurity = share\F[] 8544 level security\&. 7441 8545 .sp 7442 8546 As clients are not required to send a username to the server in share level security, 7443 smbd 7444 uses several techniques to determine the correct UNIX user to use on behalf of the client\ .8547 \FCsmbd\F[] 8548 uses several techniques to determine the correct UNIX user to use on behalf of the client\&. 7445 8549 .sp 7446 8550 A list of possible UNIX usernames to match with the given client password is constructed using the following methods : … … 7454 8558 .IP \(bu 2.3 7455 8559 .\} 8560 If the 8561 \m[blue]\fBguest only\fR\m[] 8562 parameter is set, then all the other stages are missed and only the 8563 \m[blue]\fBguest account\fR\m[] 8564 username is checked\&. 8565 .RE 8566 .sp 8567 .RS 4 8568 .ie n \{\ 8569 \h'-04'\(bu\h'+03'\c 8570 .\} 8571 .el \{\ 8572 .sp -1 8573 .IP \(bu 2.3 8574 .\} 8575 Is a username is sent with the share connection request, then this username (after mapping \- see 8576 \m[blue]\fBusername map\fR\m[]), is added as a potential username\&. 8577 .RE 8578 .sp 8579 .RS 4 8580 .ie n \{\ 8581 \h'-04'\(bu\h'+03'\c 8582 .\} 8583 .el \{\ 8584 .sp -1 8585 .IP \(bu 2.3 8586 .\} 8587 If the client did a previous 8588 \fIlogon \fR 8589 request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username\&. 8590 .RE 8591 .sp 8592 .RS 4 8593 .ie n \{\ 8594 \h'-04'\(bu\h'+03'\c 8595 .\} 8596 .el \{\ 8597 .sp -1 8598 .IP \(bu 2.3 8599 .\} 8600 The name of the service the client requested is added as a potential username\&. 8601 .RE 8602 .sp 8603 .RS 4 8604 .ie n \{\ 8605 \h'-04'\(bu\h'+03'\c 8606 .\} 8607 .el \{\ 8608 .sp -1 8609 .IP \(bu 2.3 8610 .\} 8611 The NetBIOS name of the client is added to the list as a potential username\&. 8612 .RE 8613 .sp 8614 .RS 4 8615 .ie n \{\ 8616 \h'-04'\(bu\h'+03'\c 8617 .\} 8618 .el \{\ 8619 .sp -1 8620 .IP \(bu 2.3 8621 .\} 8622 Any users on the 8623 \m[blue]\fBuser\fR\m[] 8624 list are added as potential usernames\&. 8625 .sp 8626 .RE 7456 8627 If the 7457 8628 \fIguest only\fR 7458 parameter is set, then all the other stages are missed and only the 7459 \fIguest account\fR 7460 username is checked\. 7461 .RE 7462 .sp 7463 .RS 4 7464 .ie n \{\ 7465 \h'-04'\(bu\h'+03'\c 7466 .\} 7467 .el \{\ 7468 .sp -1 7469 .IP \(bu 2.3 7470 .\} 7471 Is a username is sent with the share connection request, then this username (after mapping \- see 7472 \fIusername map\fR), is added as a potential username\. 7473 .RE 7474 .sp 7475 .RS 4 7476 .ie n \{\ 7477 \h'-04'\(bu\h'+03'\c 7478 .\} 7479 .el \{\ 7480 .sp -1 7481 .IP \(bu 2.3 7482 .\} 7483 If the client did a previous 7484 \fIlogon \fR 7485 request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username\. 7486 .RE 7487 .sp 7488 .RS 4 7489 .ie n \{\ 7490 \h'-04'\(bu\h'+03'\c 7491 .\} 7492 .el \{\ 7493 .sp -1 7494 .IP \(bu 2.3 7495 .\} 7496 The name of the service the client requested is added as a potential username\. 7497 .RE 7498 .sp 7499 .RS 4 7500 .ie n \{\ 7501 \h'-04'\(bu\h'+03'\c 7502 .\} 7503 .el \{\ 7504 .sp -1 7505 .IP \(bu 2.3 7506 .\} 7507 The NetBIOS name of the client is added to the list as a potential username\. 7508 .RE 7509 .sp 7510 .RS 4 7511 .ie n \{\ 7512 \h'-04'\(bu\h'+03'\c 7513 .\} 7514 .el \{\ 7515 .sp -1 7516 .IP \(bu 2.3 7517 .\} 7518 Any users on the 7519 \fIuser\fR 7520 list are added as potential usernames\. 7521 .sp 7522 .RE 7523 If the 7524 \fIguest only\fR 7525 parameter is not set, then this list is then tried with the supplied password\. The first user for whom the password matches will be used as the UNIX user\. 8629 parameter is not set, then this list is then tried with the supplied password\&. The first user for whom the password matches will be used as the UNIX user\&. 7526 8630 .sp 7527 8631 If the 7528 8632 \fIguest only\fR 7529 8633 parameter is set, or no username can be determined then if the share is marked as available to the 7530 \fIguest account\fR, then this guest user will be used, otherwise access is denied\ .8634 \fIguest account\fR, then this guest user will be used, otherwise access is denied\&. 7531 8635 .sp 7532 8636 Note that it can be 7533 8637 \fIvery\fR 7534 confusing in share\-level security as to which UNIX username will eventually be used in granting access\ .8638 confusing in share\-level security as to which UNIX username will eventually be used in granting access\&. 7535 8639 .sp 7536 8640 See also the section 7537 NOTE ABOUT USERNAME/PASSWORD VALIDATION\ .8641 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&. 7538 8642 .sp 7539 8643 \fISECURITY = USER\fR 7540 8644 .sp 7541 This is the default security setting in Samba 3\ .0\. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the7542 \ fIusername map\fR7543 parameter)\ . Encrypted passwords (see the7544 \ fIencrypted passwords\fR7545 parameter) can also be used in this security mode\ . Parameters such as7546 \ fIuser\fR8645 This is the default security setting in Samba 3\&.0\&. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the 8646 \m[blue]\fBusername map\fR\m[] 8647 parameter)\&. Encrypted passwords (see the 8648 \m[blue]\fBencrypted passwords\fR\m[] 8649 parameter) can also be used in this security mode\&. Parameters such as 8650 \m[blue]\fBuser\fR\m[] 7547 8651 and 7548 \ fIguest only\fR7549 if set are then applied and may change the UNIX user to use on this connection, but only after the user has been successfully authenticated\ .8652 \m[blue]\fBguest only\fR\m[] 8653 if set are then applied and may change the UNIX user to use on this connection, but only after the user has been successfully authenticated\&. 7550 8654 .sp 7551 8655 \fINote\fR 7552 8656 that the name of the resource being requested is 7553 8657 \fInot\fR 7554 sent to the server until after the server has successfully authenticated the client\ . This is why guest shares don\'t work in user level security without allowing the server to automatically map unknown users into the7555 \ fIguest account\fR\. See the7556 \ fImap to guest\fR7557 parameter for details on doing this\ .8658 sent to the server until after the server has successfully authenticated the client\&. This is why guest shares don\'t work in user level security without allowing the server to automatically map unknown users into the 8659 \m[blue]\fBguest account\fR\m[]\&. See the 8660 \m[blue]\fBmap to guest\fR\m[] 8661 parameter for details on doing this\&. 7558 8662 .sp 7559 8663 See also the section 7560 NOTE ABOUT USERNAME/PASSWORD VALIDATION\ .8664 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&. 7561 8665 .sp 7562 8666 \fISECURITY = DOMAIN\fR … … 7564 8668 This mode will only work correctly if 7565 8669 \fBnet\fR(8) 7566 has been used to add this machine into a Windows NT Domain\ . It expects the7567 \ fIencrypted passwords\fR8670 has been used to add this machine into a Windows NT Domain\&. It expects the 8671 \m[blue]\fBencrypted passwords\fR\m[] 7568 8672 parameter to be set to 7569 \fByes\fR\ . In this mode Samba will try to validate the username/password by passing it to a Windows NT Primary or Backup Domain Controller, in exactly the same way that a Windows NT Server would do\.8673 \fByes\fR\&. In this mode Samba will try to validate the username/password by passing it to a Windows NT Primary or Backup Domain Controller, in exactly the same way that a Windows NT Server would do\&. 7570 8674 .sp 7571 8675 \fINote\fR 7572 that a valid UNIX user must still exist as well as the account on the Domain Controller to allow Samba to have a valid UNIX account to map file access to\ .8676 that a valid UNIX user must still exist as well as the account on the Domain Controller to allow Samba to have a valid UNIX account to map file access to\&. 7573 8677 .sp 7574 8678 \fINote\fR 7575 8679 that from the client\'s point of view 7576 security = domain 8680 \FCsecurity = domain\F[] 7577 8681 is the same as 7578 security = user\. It only affects how the server deals with the authentication, it does not in any way affect what the client sees\.8682 \FCsecurity = user\F[]\&. It only affects how the server deals with the authentication, it does not in any way affect what the client sees\&. 7579 8683 .sp 7580 8684 \fINote\fR 7581 8685 that the name of the resource being requested is 7582 8686 \fInot\fR 7583 sent to the server until after the server has successfully authenticated the client\ . This is why guest shares don\'t work in user level security without allowing the server to automatically map unknown users into the7584 \ fIguest account\fR\. See the7585 \ fImap to guest\fR7586 parameter for details on doing this\ .8687 sent to the server until after the server has successfully authenticated the client\&. This is why guest shares don\'t work in user level security without allowing the server to automatically map unknown users into the 8688 \m[blue]\fBguest account\fR\m[]\&. See the 8689 \m[blue]\fBmap to guest\fR\m[] 8690 parameter for details on doing this\&. 7587 8691 .sp 7588 8692 See also the section 7589 NOTE ABOUT USERNAME/PASSWORD VALIDATION\ .8693 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&. 7590 8694 .sp 7591 8695 See also the 7592 \ fIpassword server\fR8696 \m[blue]\fBpassword server\fR\m[] 7593 8697 parameter and the 7594 \ fIencrypted passwords\fR7595 parameter\ .8698 \m[blue]\fBencrypted passwords\fR\m[] 8699 parameter\&. 7596 8700 .sp 7597 8701 \fISECURITY = SERVER\fR 7598 8702 .sp 7599 In this mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box\ . If this fails it will revert to7600 security = user\. It expects the7601 \ fIencrypted passwords\fR8703 In this mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box\&. If this fails it will revert to 8704 \FCsecurity = user\F[]\&. It expects the 8705 \m[blue]\fBencrypted passwords\fR\m[] 7602 8706 parameter to be set to 7603 \fByes\fR, unless the remote server does not support them\. However note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid 7604 \fIsmbpasswd\fR 7605 file to check users against\. See the chapter about the User Database in the Samba HOWTO Collection for details on how to set this up\. 7606 .sp 8707 \fByes\fR, unless the remote server does not support them\&. However note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid 8708 \FCsmbpasswd\F[] 8709 file to check users against\&. See the chapter about the User Database in the Samba HOWTO Collection for details on how to set this up\&. 8710 .if n \{\ 8711 .sp 8712 .\} 8713 .RS 4 8714 .BM yellow 7607 8715 .it 1 an-trap 7608 8716 .nr an-no-space-flag 1 7609 8717 .nr an-break-flag 1 7610 8718 .br 7611 Note 7612 This mode of operation has significant pitfalls since it is more vulnerable to man\-in\-the\-middle attacks and server impersonation\. In particular, this mode of operation can cause significant resource consuption on the PDC, as it must maintain an active connection for the duration of the user\'s session\. Furthermore, if this connection is lost, there is no way to reestablish it, and futher authentications to the Samba server may fail (from a single client, till it disconnects)\. 7613 .sp 8719 .ps +1 8720 \fBNote\fR 8721 .ps -1 8722 .br 8723 This mode of operation has significant pitfalls since it is more vulnerable to man\-in\-the\-middle attacks and server impersonation\&. In particular, this mode of operation can cause significant resource consuption on the PDC, as it must maintain an active connection for the duration of the user\'s session\&. Furthermore, if this connection is lost, there is no way to reestablish it, and futher authentications to the Samba server may fail (from a single client, till it disconnects)\&. 8724 .sp .5v 8725 .EM yellow 8726 .RE 8727 .if n \{\ 8728 .sp 8729 .\} 8730 .RS 4 8731 .BM yellow 7614 8732 .it 1 an-trap 7615 8733 .nr an-no-space-flag 1 7616 8734 .nr an-break-flag 1 7617 8735 .br 7618 Note 8736 .ps +1 8737 \fBNote\fR 8738 .ps -1 8739 .br 7619 8740 From the client\'s point of view 7620 security = server 8741 \FCsecurity = server\F[] 7621 8742 is the same as 7622 security = user\. It only affects how the server deals with the authentication, it does not in any way affect what the client sees\. 7623 8743 \FCsecurity = user\F[]\&. It only affects how the server deals with the authentication, it does not in any way affect what the client sees\&. 8744 .sp .5v 8745 .EM yellow 8746 .RE 7624 8747 \fINote\fR 7625 8748 that the name of the resource being requested is 7626 8749 \fInot\fR 7627 sent to the server until after the server has successfully authenticated the client\ . This is why guest shares don\'t work in user level security without allowing the server to automatically map unknown users into the7628 \ fIguest account\fR\. See the7629 \ fImap to guest\fR7630 parameter for details on doing this\ .8750 sent to the server until after the server has successfully authenticated the client\&. This is why guest shares don\'t work in user level security without allowing the server to automatically map unknown users into the 8751 \m[blue]\fBguest account\fR\m[]\&. See the 8752 \m[blue]\fBmap to guest\fR\m[] 8753 parameter for details on doing this\&. 7631 8754 .sp 7632 8755 See also the section 7633 NOTE ABOUT USERNAME/PASSWORD VALIDATION\ .8756 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&. 7634 8757 .sp 7635 8758 See also the 7636 \ fIpassword server\fR8759 \m[blue]\fBpassword server\fR\m[] 7637 8760 parameter and the 7638 \ fIencrypted passwords\fR7639 parameter\ .8761 \m[blue]\fBencrypted passwords\fR\m[] 8762 parameter\&. 7640 8763 .sp 7641 8764 \fISECURITY = ADS\fR 7642 8765 .sp 7643 In this mode, Samba will act as a domain member in an ADS realm\ . To operate in this mode, the machine running Samba will need to have Kerberos installed and configured and Samba will need to be joined to the ADS realm using the net utility\.7644 .sp 7645 Note that this mode does NOT make Samba operate as a Active Directory Domain Controller\ .7646 .sp 7647 Read the chapter about Domain Membership in the HOWTO for details\ .7648 .sp 7649 Default: 7650 \fI\fIsecurity\fR\fR\fI = \fR\fI USER\fR\fI \fR7651 .sp 7652 Example: 7653 \fI\fIsecurity\fR\fR\fI = \fR\fI DOMAIN\fR\fI \fR8766 In this mode, Samba will act as a domain member in an ADS realm\&. To operate in this mode, the machine running Samba will need to have Kerberos installed and configured and Samba will need to be joined to the ADS realm using the net utility\&. 8767 .sp 8768 Note that this mode does NOT make Samba operate as a Active Directory Domain Controller\&. 8769 .sp 8770 Read the chapter about Domain Membership in the HOWTO for details\&. 8771 .sp 8772 Default: 8773 \fI\fIsecurity\fR\fR\fI = \fR\fI\FCUSER\F[]\fR\fI \fR 8774 .sp 8775 Example: 8776 \fI\fIsecurity\fR\fR\fI = \fR\fI\FCDOMAIN\F[]\fR\fI \fR 7654 8777 .RE 7655 8778 7656 8779 server schannel (G) 7657 .PP 7658 .RS 4 7659 This controls whether the server offers or even demands the use of the netlogon schannel\. 7660 \fIserver schannel = no\fR 8780 .\" server schannel 8781 .PP 8782 .RS 4 8783 This controls whether the server offers or even demands the use of the netlogon schannel\&. 8784 \m[blue]\fBserver schannel = no\fR\m[] 7661 8785 does not offer the schannel, 7662 \ fIserver schannel = auto\fR8786 \m[blue]\fBserver schannel = auto\fR\m[] 7663 8787 offers the schannel but does not enforce it, and 7664 \ fIserver schannel = yes\fR7665 denies access if the client is not able to speak netlogon schannel\ . This is only the case for Windows NT4 before SP4\.8788 \m[blue]\fBserver schannel = yes\fR\m[] 8789 denies access if the client is not able to speak netlogon schannel\&. This is only the case for Windows NT4 before SP4\&. 7666 8790 .sp 7667 8791 Please note that with this set to 7668 no 8792 \FCno\F[] 7669 8793 you will have to apply the WindowsXP 7670 \ fIWinXP_SignOrSeal\.reg\fR7671 registry patch found in the docs/registry subdirectory of the Samba distribution tarball\ .7672 .sp 7673 Default: 7674 \fI\fIserver schannel\fR\fR\fI = \fR\fI auto\fR\fI \fR7675 .sp 7676 Example: 7677 \fI\fIserver schannel\fR\fR\fI = \fR\fI yes\fR\fI \fR8794 \FCWinXP_SignOrSeal\&.reg\F[] 8795 registry patch found in the docs/registry subdirectory of the Samba distribution tarball\&. 8796 .sp 8797 Default: 8798 \fI\fIserver schannel\fR\fR\fI = \fR\fI\FCauto\F[]\fR\fI \fR 8799 .sp 8800 Example: 8801 \fI\fIserver schannel\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 7678 8802 .RE 7679 8803 7680 8804 server signing (G) 7681 .PP 7682 .RS 4 7683 This controls whether the server offers or requires the client it talks to to use SMB signing\. Possible values are 8805 .\" server signing 8806 .PP 8807 .RS 4 8808 This controls whether the server offers or requires the client it talks to to use SMB signing\&. Possible values are 7684 8809 \fIauto\fR, 7685 8810 \fImandatory\fR 7686 8811 and 7687 \fIdisabled\fR\ .7688 .sp 7689 When set to auto, SMB signing is offered, but not enforced\ . When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either\.7690 .sp 7691 Default: 7692 \fI\fIserver signing\fR\fR\fI = \fR\fI Disabled\fR\fI \fR8812 \fIdisabled\fR\&. 8813 .sp 8814 When set to auto, SMB signing is offered, but not enforced\&. When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either\&. 8815 .sp 8816 Default: 8817 \fI\fIserver signing\fR\fR\fI = \fR\fI\FCDisabled\F[]\fR\fI \fR 7693 8818 .RE 7694 8819 7695 8820 server string (G) 8821 .\" server string 7696 8822 .PP 7697 8823 .RS 4 7698 8824 This controls what string will show up in the printer comment box in print manager and next to the IPC connection in 7699 net view\. It can be any string that you wish to show to your users\.7700 .sp 7701 It also sets what will appear in browse lists next to the machine name\ .8825 \FCnet view\F[]\&. It can be any string that you wish to show to your users\&. 8826 .sp 8827 It also sets what will appear in browse lists next to the machine name\&. 7702 8828 .sp 7703 8829 A 7704 8830 \fI%v\fR 7705 will be replaced with the Samba version number\ .8831 will be replaced with the Samba version number\&. 7706 8832 .sp 7707 8833 A 7708 8834 \fI%h\fR 7709 will be replaced with the hostname\ .7710 .sp 7711 Default: 7712 \fI\fIserver string\fR\fR\fI = \fR\fI Samba %v\fR\fI \fR7713 .sp 7714 Example: 7715 \fI\fIserver string\fR\fR\fI = \fR\fI University of GNUs Samba Server\fR\fI \fR8835 will be replaced with the hostname\&. 8836 .sp 8837 Default: 8838 \fI\fIserver string\fR\fR\fI = \fR\fI\FCSamba %v\F[]\fR\fI \fR 8839 .sp 8840 Example: 8841 \fI\fIserver string\fR\fR\fI = \fR\fI\FCUniversity of GNUs Samba Server\F[]\fR\fI \fR 7716 8842 .RE 7717 8843 7718 8844 set directory (S) 8845 .\" set directory 7719 8846 .PP 7720 8847 .RS 4 7721 8848 If 7722 set directory = no, then users of the service may not use the setdir command to change directory\.8849 \FCset directory = no\F[], then users of the service may not use the setdir command to change directory\&. 7723 8850 .sp 7724 8851 The 7725 setdir 7726 command is only implemented in the Digital Pathworks client\ . See the Pathworks documentation for details\.7727 .sp 7728 Default: 7729 \fI\fIset directory\fR\fR\fI = \fR\fI no\fR\fI \fR8852 \FCsetdir\F[] 8853 command is only implemented in the Digital Pathworks client\&. See the Pathworks documentation for details\&. 8854 .sp 8855 Default: 8856 \fI\fIset directory\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 7730 8857 .RE 7731 8858 7732 8859 set primary group script (G) 7733 .PP 7734 .RS 4 7735 Thanks to the Posix subsystem in NT a Windows User has a primary group in addition to the auxiliary groups\. This script sets the primary group in the unix userdatase when an administrator sets the primary group from the windows user manager or when fetching a SAM with 7736 net rpc vampire\. 8860 .\" set primary group script 8861 .PP 8862 .RS 4 8863 Thanks to the Posix subsystem in NT a Windows User has a primary group in addition to the auxiliary groups\&. This script sets the primary group in the unix userdatase when an administrator sets the primary group from the windows user manager or when fetching a SAM with 8864 \FCnet rpc vampire\F[]\&. 7737 8865 \fI%u\fR 7738 will be replaced with the user whose primary group is to be set\ .8866 will be replaced with the user whose primary group is to be set\&. 7739 8867 \fI%g\fR 7740 will be replaced with the group to set\ .7741 .sp 7742 Default: 7743 \fI\fIset primary group script\fR\fR\fI = \fR\fI\ fR\fI \fR7744 .sp 7745 Example: 7746 \fI\fIset primary group script\fR\fR\fI = \fR\fI /usr/sbin/usermod \-g \'%g\' \'%u\'\fR\fI \fR8868 will be replaced with the group to set\&. 8869 .sp 8870 Default: 8871 \fI\fIset primary group script\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 8872 .sp 8873 Example: 8874 \fI\fIset primary group script\fR\fR\fI = \fR\fI\FC/usr/sbin/usermod \-g \'%g\' \'%u\'\F[]\fR\fI \fR 7747 8875 .RE 7748 8876 7749 8877 set quota command (G) 8878 .\" set quota command 7750 8879 .PP 7751 8880 .RS 4 7752 8881 The 7753 set quota command 7754 should only be used whenever there is no operating system API available from the OS that samba can use\ .8882 \FCset quota command\F[] 8883 should only be used whenever there is no operating system API available from the OS that samba can use\&. 7755 8884 .sp 7756 8885 This option is only available if Samba was configured with the argument 7757 \ -\-with\-sys\-quotas8886 \FC\-\-with\-sys\-quotas\F[] 7758 8887 or on linux when 7759 \ ./configure \-\-with\-quotas7760 was used and a working quota api was found in the system\ . Most packages are configured with these options already\.7761 .sp 7762 This parameter should specify the path to a script that can set quota for the specified arguments\ .8888 \FC\&./configure \-\-with\-quotas\F[] 8889 was used and a working quota api was found in the system\&. Most packages are configured with these options already\&. 8890 .sp 8891 This parameter should specify the path to a script that can set quota for the specified arguments\&. 7763 8892 .sp 7764 8893 The specified script should take the following arguments: … … 7897 9026 .sp 7898 9027 .RE 7899 The script should output at least one line of data on success\ . And nothing on failure\.7900 .sp 7901 Default: 7902 \fI\fIset quota command\fR\fR\fI = \fR\fI\ fR\fI \fR7903 .sp 7904 Example: 7905 \fI\fIset quota command\fR\fR\fI = \fR\fI /usr/local/sbin/set_quota\fR\fI \fR9028 The script should output at least one line of data on success\&. And nothing on failure\&. 9029 .sp 9030 Default: 9031 \fI\fIset quota command\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 9032 .sp 9033 Example: 9034 \fI\fIset quota command\fR\fR\fI = \fR\fI\FC/usr/local/sbin/set_quota\F[]\fR\fI \fR 7906 9035 .RE 7907 9036 7908 9037 share modes (S) 9038 .\" share modes 7909 9039 .PP 7910 9040 .RS 4 7911 9041 This enables or disables the honoring of the 7912 9042 \fIshare modes\fR 7913 during a file open\ . These modes are used by clients to gain exclusive read or write access to a file\.7914 .sp 7915 These open modes are not directly supported by UNIX, so they are simulated using shared memory, or lock files if your UNIX doesn\'t support shared memory (almost all do)\ .9043 during a file open\&. These modes are used by clients to gain exclusive read or write access to a file\&. 9044 .sp 9045 These open modes are not directly supported by UNIX, so they are simulated using shared memory, or lock files if your UNIX doesn\'t support shared memory (almost all do)\&. 7916 9046 .sp 7917 9047 The share modes that are enabled by this option are … … 7922 9052 \fBDENY_NONE\fR 7923 9053 and 7924 \fBDENY_FCB\fR\ .7925 .sp 7926 This option gives full share compatibility and enabled by default\ .9054 \fBDENY_FCB\fR\&. 9055 .sp 9056 This option gives full share compatibility and enabled by default\&. 7927 9057 .sp 7928 9058 You should 7929 9059 \fINEVER\fR 7930 turn this parameter off as many Windows applications will break if you do so\ .7931 .sp 7932 Default: 7933 \fI\fIshare modes\fR\fR\fI = \fR\fI yes\fR\fI \fR9060 turn this parameter off as many Windows applications will break if you do so\&. 9061 .sp 9062 Default: 9063 \fI\fIshare modes\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 7934 9064 .RE 7935 9065 7936 9066 short preserve case (S) 7937 .PP 7938 .RS 4 7939 This boolean parameter controls if new files which conform to 8\.3 syntax, that is all in upper case and of suitable length, are created upper case, or if they are forced to be the 7940 \fIdefault case\fR\. This option can be use with 7941 \fIpreserve case = yes\fR 7942 to permit long filenames to retain their case, while short names are lowered\. 9067 .\" short preserve case 9068 .PP 9069 .RS 4 9070 This boolean parameter controls if new files which conform to 8\&.3 syntax, that is all in upper case and of suitable length, are created upper case, or if they are forced to be the 9071 \m[blue]\fBdefault case\fR\m[]\&. This option can be use with 9072 \m[blue]\fBpreserve case = yes\fR\m[] 9073 to permit long filenames to retain their case, while short names are lowered\&. 7943 9074 .sp 7944 9075 See the section on 7945 NAME MANGLING\ .7946 .sp 7947 Default: 7948 \fI\fIshort preserve case\fR\fR\fI = \fR\fI yes\fR\fI \fR9076 NAME MANGLING\&. 9077 .sp 9078 Default: 9079 \fI\fIshort preserve case\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 7949 9080 .RE 7950 9081 7951 9082 show add printer wizard (G) 7952 .PP 7953 .RS 4 7954 With the introduction of MS\-RPC based printing support for Windows NT/2000 client in Samba 2\.2, a "Printers\.\.\." folder will appear on Samba hosts in the share listing\. Normally this folder will contain an icon for the MS Add Printer Wizard (APW)\. However, it is possible to disable this feature regardless of the level of privilege of the connected user\. 7955 .sp 7956 Under normal circumstances, the Windows NT/2000 client will open a handle on the printer server with OpenPrinterEx() asking for Administrator privileges\. If the user does not have administrative access on the print server (i\.e is not root or a member of the 9083 .\" show add printer wizard 9084 .PP 9085 .RS 4 9086 With the introduction of MS\-RPC based printing support for Windows NT/2000 client in Samba 2\&.2, a "Printers\&.\&.\&." folder will appear on Samba hosts in the share listing\&. Normally this folder will contain an icon for the MS Add Printer Wizard (APW)\&. However, it is possible to disable this feature regardless of the level of privilege of the connected user\&. 9087 .sp 9088 Under normal circumstances, the Windows NT/2000 client will open a handle on the printer server with OpenPrinterEx() asking for Administrator privileges\&. If the user does not have administrative access on the print server (i\&.e is not root or a member of the 7957 9089 \fIprinter admin\fR 7958 group), the OpenPrinterEx() call fails and the client makes another open call with a request for a lower privilege level\ . This should succeed, however the APW icon will not be displayed\.9090 group), the OpenPrinterEx() call fails and the client makes another open call with a request for a lower privilege level\&. This should succeed, however the APW icon will not be displayed\&. 7959 9091 .sp 7960 9092 Disabling the 7961 9093 \fIshow add printer wizard\fR 7962 parameter will always cause the OpenPrinterEx() on the server to fail\. Thus the APW icon will never be displayed\. 7963 .sp 9094 parameter will always cause the OpenPrinterEx() on the server to fail\&. Thus the APW icon will never be displayed\&. 9095 .if n \{\ 9096 .sp 9097 .\} 9098 .RS 4 9099 .BM yellow 7964 9100 .it 1 an-trap 7965 9101 .nr an-no-space-flag 1 7966 9102 .nr an-break-flag 1 7967 9103 .br 7968 Note 7969 This does not prevent the same user from having administrative privilege on an individual printer\. 7970 7971 Default: 7972 \fI\fIshow add printer wizard\fR\fR\fI = \fR\fIyes\fR\fI \fR 9104 .ps +1 9105 \fBNote\fR 9106 .ps -1 9107 .br 9108 This does not prevent the same user from having administrative privilege on an individual printer\&. 9109 .sp .5v 9110 .EM yellow 9111 .RE 9112 Default: 9113 \fI\fIshow add printer wizard\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 7973 9114 .RE 7974 9115 7975 9116 shutdown script (G) 9117 .\" shutdown script 7976 9118 .PP 7977 9119 .RS 4 7978 9120 This a full path name to a script called by 7979 9121 \fBsmbd\fR(8) 7980 that should start a shutdown procedure\ .9122 that should start a shutdown procedure\&. 7981 9123 .sp 7982 9124 If the connected user posseses the 7983 \fBSeRemoteShutdownPrivilege\fR, right, this command will be run as user\ .9125 \fBSeRemoteShutdownPrivilege\fR, right, this command will be run as user\&. 7984 9126 .sp 7985 9127 The %z %t %r %f variables are expanded as follows: … … 7994 9136 .\} 7995 9137 \fI%z\fR 7996 will be substituted with the shutdown message sent to the server\ .9138 will be substituted with the shutdown message sent to the server\&. 7997 9139 .RE 7998 9140 .sp … … 8006 9148 .\} 8007 9149 \fI%t\fR 8008 will be substituted with the number of seconds to wait before effectively starting the shutdown procedure\ .9150 will be substituted with the number of seconds to wait before effectively starting the shutdown procedure\&. 8009 9151 .RE 8010 9152 .sp … … 8019 9161 \fI%r\fR 8020 9162 will be substituted with the switch 8021 \fI\-r\fR\ . It means reboot after shutdown for NT\.9163 \fI\-r\fR\&. It means reboot after shutdown for NT\&. 8022 9164 .RE 8023 9165 .sp … … 8032 9174 \fI%f\fR 8033 9175 will be substituted with the switch 8034 \fI\-f\fR\ . It means force the shutdown even if applications do not respond for NT\.9176 \fI\-f\fR\&. It means force the shutdown even if applications do not respond for NT\&. 8035 9177 .sp 8036 9178 .RE 8037 9179 Shutdown script example: 8038 9180 .sp 8039 .RS 4 9181 .if n \{\ 9182 .RS 4 9183 .\} 9184 .fam C 9185 .ps -1 8040 9186 .nf 9187 .if t \{\ 9188 .sp -1 9189 .\} 9190 .BB lightgray adjust-for-leading-newline 9191 .sp -1 9192 8041 9193 #!/bin/bash 8042 9194 … … 8046 9198 8047 9199 /sbin/shutdown $3 $4 +$time $1 & 9200 .EB lightgray adjust-for-leading-newline 9201 .if t \{\ 9202 .sp 1 9203 .\} 8048 9204 .fi 8049 .RE 8050 .sp 8051 Shutdown does not return so we need to launch it in background\. 8052 .sp 8053 Default: 8054 \fI\fIshutdown script\fR\fR\fI = \fR\fI\fR\fI \fR 8055 .sp 8056 Example: 8057 \fI\fIshutdown script\fR\fR\fI = \fR\fI/usr/local/samba/sbin/shutdown %m %t %r %f\fR\fI \fR 9205 .fam 9206 .ps +1 9207 .if n \{\ 9208 .RE 9209 .\} 9210 .sp 9211 Shutdown does not return so we need to launch it in background\&. 9212 .sp 9213 Default: 9214 \fI\fIshutdown script\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 9215 .sp 9216 Example: 9217 \fI\fIshutdown script\fR\fR\fI = \fR\fI\FC/usr/local/samba/sbin/shutdown %m %t %r %f\F[]\fR\fI \fR 8058 9218 .RE 8059 9219 8060 9220 smb encrypt (S) 8061 .PP 8062 .RS 4 8063 This is a new feature introduced with Samba 3\.2 and above\. It is an extension to the SMB/CIFS protocol negotiated as part of the UNIX extensions\. SMB encryption uses the GSSAPI (SSPI on Windows) ability to encrypt and sign every request/response in a SMB protocol stream\. When enabled it provides a secure method of SMB/CIFS communication, similar to an ssh protected session, but using SMB/CIFS authentication to negotiate encryption and signing keys\. Currently this is only supported by Samba 3\.2 smbclient, and hopefully soon Linux CIFSFS and MacOS/X clients\. Windows clients do not support this feature\. 8064 .sp 8065 This controls whether the server offers or requires the client it talks to to use SMB encryption\. Possible values are 9221 .\" smb encrypt 9222 .PP 9223 .RS 4 9224 This is a new feature introduced with Samba 3\&.2 and above\&. It is an extension to the SMB/CIFS protocol negotiated as part of the UNIX extensions\&. SMB encryption uses the GSSAPI (SSPI on Windows) ability to encrypt and sign every request/response in a SMB protocol stream\&. When enabled it provides a secure method of SMB/CIFS communication, similar to an ssh protected session, but using SMB/CIFS authentication to negotiate encryption and signing keys\&. Currently this is only supported by Samba 3\&.2 smbclient, and hopefully soon Linux CIFSFS and MacOS/X clients\&. Windows clients do not support this feature\&. 9225 .sp 9226 This controls whether the server offers or requires the client it talks to to use SMB encryption\&. Possible values are 8066 9227 \fIauto\fR, 8067 9228 \fImandatory\fR 8068 9229 and 8069 \fIdisabled\fR\ . This may be set on a per\-share basis, but clients may chose to encrypt the entire session, not just traffic to a specific share\. If this is set to mandatory then all traffic to a share9230 \fIdisabled\fR\&. This may be set on a per\-share basis, but clients may chose to encrypt the entire session, not just traffic to a specific share\&. If this is set to mandatory then all traffic to a share 8070 9231 \fImust\fR 8071 must be encrypted once the connection has been made to the share\ . The server would return "access denied" to all non\-encrypted requests on such a share\. Selecting encrypted traffic reduces throughput as smaller packet sizes must be used (no huge UNIX style read/writes allowed) as well as the overhead of encrypting and signing all the data\.9232 must be encrypted once the connection has been made to the share\&. The server would return "access denied" to all non\-encrypted requests on such a share\&. Selecting encrypted traffic reduces throughput as smaller packet sizes must be used (no huge UNIX style read/writes allowed) as well as the overhead of encrypting and signing all the data\&. 8072 9233 .sp 8073 9234 If SMB encryption is selected, Windows style SMB signing (see the 8074 \ fIserver signing\fR8075 option) is no longer necessary, as the GSSAPI flags use select both signing and sealing of the data\ .8076 .sp 8077 When set to auto, SMB encryption is offered, but not enforced\ . When set to mandatory, SMB encryption is required and if set to disabled, SMB encryption can not be negotiated\.8078 .sp 8079 Default: 8080 \fI\fIsmb encrypt\fR\fR\fI = \fR\fI auto\fR\fI \fR9235 \m[blue]\fBserver signing\fR\m[] 9236 option) is no longer necessary, as the GSSAPI flags use select both signing and sealing of the data\&. 9237 .sp 9238 When set to auto, SMB encryption is offered, but not enforced\&. When set to mandatory, SMB encryption is required and if set to disabled, SMB encryption can not be negotiated\&. 9239 .sp 9240 Default: 9241 \fI\fIsmb encrypt\fR\fR\fI = \fR\fI\FCauto\F[]\fR\fI \fR 8081 9242 .RE 8082 9243 8083 9244 smb passwd file (G) 8084 .PP 8085 .RS 4 8086 This option sets the path to the encrypted smbpasswd file\. By default the path to the smbpasswd file is compiled into Samba\. 9245 .\" smb passwd file 9246 .PP 9247 .RS 4 9248 This option sets the path to the encrypted smbpasswd file\&. By default the path to the smbpasswd file is compiled into Samba\&. 8087 9249 .sp 8088 9250 An example of use is: 8089 9251 .sp 8090 .RS 4 9252 .if n \{\ 9253 .RS 4 9254 .\} 9255 .fam C 9256 .ps -1 8091 9257 .nf 9258 .if t \{\ 9259 .sp -1 9260 .\} 9261 .BB lightgray adjust-for-leading-newline 9262 .sp -1 9263 8092 9264 smb passwd file = /etc/samba/smbpasswd 9265 .EB lightgray adjust-for-leading-newline 9266 .if t \{\ 9267 .sp 1 9268 .\} 8093 9269 .fi 8094 .RE 8095 .sp 8096 .sp 8097 Default: 8098 \fI\fIsmb passwd file\fR\fR\fI = \fR\fI${prefix}/private/smbpasswd\fR\fI \fR 9270 .fam 9271 .ps +1 9272 .if n \{\ 9273 .RE 9274 .\} 9275 .sp 9276 Default: 9277 \fI\fIsmb passwd file\fR\fR\fI = \fR\fI\FC${prefix}/private/smbpasswd\F[]\fR\fI \fR 8099 9278 .RE 8100 9279 8101 9280 smb ports (G) 8102 .PP 8103 .RS 4 8104 Specifies which ports the server should listen on for SMB traffic\. 8105 .sp 8106 Default: 8107 \fI\fIsmb ports\fR\fR\fI = \fR\fI445 139\fR\fI \fR 9281 .\" smb ports 9282 .PP 9283 .RS 4 9284 Specifies which ports the server should listen on for SMB traffic\&. 9285 .sp 9286 Default: 9287 \fI\fIsmb ports\fR\fR\fI = \fR\fI\FC445 139\F[]\fR\fI \fR 8108 9288 .RE 8109 9289 8110 9290 socket address (G) 8111 .PP 8112 .RS 4 8113 This option allows you to control what address Samba will listen for connections on\. This is used to support multiple virtual interfaces on the one server, each with a different configuration\. 8114 .sp 8115 By default Samba will accept connections on any address\. 8116 .sp 8117 Default: 8118 \fI\fIsocket address\fR\fR\fI = \fR\fI\fR\fI \fR 8119 .sp 8120 Example: 8121 \fI\fIsocket address\fR\fR\fI = \fR\fI192\.168\.2\.20\fR\fI \fR 9291 .\" socket address 9292 .PP 9293 .RS 4 9294 This option allows you to control what address Samba will listen for connections on\&. This is used to support multiple virtual interfaces on the one server, each with a different configuration\&. 9295 .sp 9296 Setting this option should never be necessary on usual Samba servers running only one nmbd\&. 9297 .sp 9298 By default Samba will accept connections on any address\&. 9299 .sp 9300 Default: 9301 \fI\fIsocket address\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 9302 .sp 9303 Example: 9304 \fI\fIsocket address\fR\fR\fI = \fR\fI\FC192\&.168\&.2\&.20\F[]\fR\fI \fR 8122 9305 .RE 8123 9306 8124 9307 socket options (G) 8125 .PP 8126 .RS 4 8127 This option allows you to set socket options to be used when talking with the client\. 8128 .sp 8129 Socket options are controls on the networking layer of the operating systems which allow the connection to be tuned\. 8130 .sp 8131 This option will typically be used to tune your Samba server for optimal performance for your local network\. There is no way that Samba can know what the optimal parameters are for your net, so you must experiment and choose them yourself\. We strongly suggest you read the appropriate documentation for your operating system first (perhaps 8132 man setsockopt 8133 will help)\. 8134 .sp 8135 You may find that on some systems Samba will say "Unknown socket option" when you supply an option\. This means you either incorrectly typed it or you need to add an include file to includes\.h for your OS\. If the latter is the case please send the patch to 8136 samba\-technical@samba\.org\. 8137 .sp 8138 Any of the supported socket options may be combined in any way you like, as long as your OS allows it\. 9308 .\" socket options 9309 .PP 9310 .RS 4 9311 This option allows you to set socket options to be used when talking with the client\&. 9312 .sp 9313 Socket options are controls on the networking layer of the operating systems which allow the connection to be tuned\&. 9314 .sp 9315 This option will typically be used to tune your Samba server for optimal performance for your local network\&. There is no way that Samba can know what the optimal parameters are for your net, so you must experiment and choose them yourself\&. We strongly suggest you read the appropriate documentation for your operating system first (perhaps 9316 \FCman setsockopt\F[] 9317 will help)\&. 9318 .sp 9319 You may find that on some systems Samba will say "Unknown socket option" when you supply an option\&. This means you either incorrectly typed it or you need to add an include file to includes\&.h for your OS\&. If the latter is the case please send the patch to 9320 samba\-technical@samba\&.org\&. 9321 .sp 9322 Any of the supported socket options may be combined in any way you like, as long as your OS allows it\&. 8139 9323 .sp 8140 9324 This is the list of socket options currently settable using this option: … … 8252 9436 Those marked with a 8253 9437 \fI\'*\'\fR 8254 take an integer argument\ . The others can optionally take a 1 or 0 argument to enable or disable the option, by default they will be enabled if you don\'t specify 1 or 0\.9438 take an integer argument\&. The others can optionally take a 1 or 0 argument to enable or disable the option, by default they will be enabled if you don\'t specify 1 or 0\&. 8255 9439 .sp 8256 9440 To specify an argument use the syntax SOME_OPTION = VALUE for example 8257 SO_SNDBUF = 8192\. Note that you must not have any spaces before or after the = sign\.9441 \FCSO_SNDBUF = 8192\F[]\&. Note that you must not have any spaces before or after the = sign\&. 8258 9442 .sp 8259 9443 If you are on a local network then a sensible option might be: 8260 9444 .sp 8261 socket options = IPTOS_LOWDELAY 9445 \FCsocket options = IPTOS_LOWDELAY\F[] 8262 9446 .sp 8263 9447 If you have a local network then you could try: 8264 9448 .sp 8265 socket options = IPTOS_LOWDELAY TCP_NODELAY 8266 .sp 8267 If you are on a wide area network then perhaps try setting IPTOS_THROUGHPUT\ .8268 .sp 8269 Note that several of the options may cause your Samba server to fail completely\ . Use these options with caution!8270 .sp 8271 Default: 8272 \fI\fIsocket options\fR\fR\fI = \fR\fI TCP_NODELAY\fR\fI \fR8273 .sp 8274 Example: 8275 \fI\fIsocket options\fR\fR\fI = \fR\fI IPTOS_LOWDELAY\fR\fI \fR9449 \FCsocket options = IPTOS_LOWDELAY TCP_NODELAY\F[] 9450 .sp 9451 If you are on a wide area network then perhaps try setting IPTOS_THROUGHPUT\&. 9452 .sp 9453 Note that several of the options may cause your Samba server to fail completely\&. Use these options with caution! 9454 .sp 9455 Default: 9456 \fI\fIsocket options\fR\fR\fI = \fR\fI\FCTCP_NODELAY\F[]\fR\fI \fR 9457 .sp 9458 Example: 9459 \fI\fIsocket options\fR\fR\fI = \fR\fI\FCIPTOS_LOWDELAY\F[]\fR\fI \fR 8276 9460 .RE 8277 9461 8278 9462 stat cache (G) 9463 .\" stat cache 8279 9464 .PP 8280 9465 .RS 4 8281 9466 This parameter determines if 8282 9467 \fBsmbd\fR(8) 8283 will use a cache in order to speed up case insensitive name mappings\ . You should never need to change this parameter\.8284 .sp 8285 Default: 8286 \fI\fIstat cache\fR\fR\fI = \fR\fI yes\fR\fI \fR9468 will use a cache in order to speed up case insensitive name mappings\&. You should never need to change this parameter\&. 9469 .sp 9470 Default: 9471 \fI\fIstat cache\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 8287 9472 .RE 8288 9473 8289 9474 store dos attributes (S) 9475 .\" store dos attributes 8290 9476 .PP 8291 9477 .RS 4 8292 9478 If this parameter is set Samba attempts to first read DOS attributes (SYSTEM, HIDDEN, ARCHIVE or READ\-ONLY) from a filesystem extended attribute, before mapping DOS attributes to UNIX permission bits (such as occurs with 8293 \ fImap hidden\fR9479 \m[blue]\fBmap hidden\fR\m[] 8294 9480 and 8295 \ fImap readonly\fR)\. When set, DOS attributes will be stored onto an extended attribute in the UNIX filesystem, associated with the file or directory\. For no other mapping to occur as a fall\-back, the parameters8296 \ fImap hidden\fR,8297 \ fImap system\fR,8298 \ fImap archive\fR9481 \m[blue]\fBmap readonly\fR\m[])\&. When set, DOS attributes will be stored onto an extended attribute in the UNIX filesystem, associated with the file or directory\&. For no other mapping to occur as a fall\-back, the parameters 9482 \m[blue]\fBmap hidden\fR\m[], 9483 \m[blue]\fBmap system\fR\m[], 9484 \m[blue]\fBmap archive\fR\m[] 8299 9485 and 8300 \ fImap readonly\fR8301 must be set to off\ . This parameter writes the DOS attributes as a string into the extended attribute named "user\.DOSATTRIB"\. This extended attribute is explicitly hidden from smbd clients requesting an EA list\. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel\.8302 .sp 8303 Default: 8304 \fI\fIstore dos attributes\fR\fR\fI = \fR\fI no\fR\fI \fR9486 \m[blue]\fBmap readonly\fR\m[] 9487 must be set to off\&. This parameter writes the DOS attributes as a string into the extended attribute named "user\&.DOSATTRIB"\&. This extended attribute is explicitly hidden from smbd clients requesting an EA list\&. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel\&. 9488 .sp 9489 Default: 9490 \fI\fIstore dos attributes\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 8305 9491 .RE 8306 9492 8307 9493 strict allocate (S) 8308 .PP 8309 .RS 4 8310 This is a boolean that controls the handling of disk space allocation in the server\. When this is set to 9494 .\" strict allocate 9495 .PP 9496 .RS 4 9497 This is a boolean that controls the handling of disk space allocation in the server\&. When this is set to 8311 9498 \fByes\fR 8312 the server will change from UNIX behaviour of not committing real disk storage blocks when a file is extended to the Windows behaviour of actually forcing the disk system to allocate real storage blocks when a file is created or extended to be a given size\ . In UNIX terminology this means that Samba will stop creating sparse files\. This can be slow on some systems\.9499 the server will change from UNIX behaviour of not committing real disk storage blocks when a file is extended to the Windows behaviour of actually forcing the disk system to allocate real storage blocks when a file is created or extended to be a given size\&. In UNIX terminology this means that Samba will stop creating sparse files\&. This can be slow on some systems\&. 8313 9500 .sp 8314 9501 When strict allocate is 8315 9502 \fBno\fR 8316 the server does sparse disk block allocation when a file is extended\ .9503 the server does sparse disk block allocation when a file is extended\&. 8317 9504 .sp 8318 9505 Setting this to 8319 9506 \fByes\fR 8320 can help Samba return out of quota messages on systems that are restricting the disk quota of users\ .8321 .sp 8322 Default: 8323 \fI\fIstrict allocate\fR\fR\fI = \fR\fI no\fR\fI \fR9507 can help Samba return out of quota messages on systems that are restricting the disk quota of users\&. 9508 .sp 9509 Default: 9510 \fI\fIstrict allocate\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 8324 9511 .RE 8325 9512 8326 9513 strict locking (S) 8327 .PP 8328 .RS 4 8329 This is an enumerated type that controls the handling of file locking in the server\. When this is set to 8330 \fByes\fR, the server will check every read and write access for file locks, and deny access if locks exist\. This can be slow on some systems\. 8331 .sp 8332 When strict locking is set to Auto (the default), the server performs file lock checks only on non\-oplocked files\. As most Windows redirectors perform file locking checks locally on oplocked files this is a good trade off for inproved performance\. 8333 .sp 8334 When strict locking is disabled, the server performs file lock checks only when the client explicitly asks for them\. 8335 .sp 8336 Well\-behaved clients always ask for lock checks when it is important\. So in the vast majority of cases, 8337 strict locking = Auto 9514 .\" strict locking 9515 .PP 9516 .RS 4 9517 This is an enumerated type that controls the handling of file locking in the server\&. When this is set to 9518 \fByes\fR, the server will check every read and write access for file locks, and deny access if locks exist\&. This can be slow on some systems\&. 9519 .sp 9520 When strict locking is set to Auto (the default), the server performs file lock checks only on non\-oplocked files\&. As most Windows redirectors perform file locking checks locally on oplocked files this is a good trade off for inproved performance\&. 9521 .sp 9522 When strict locking is disabled, the server performs file lock checks only when the client explicitly asks for them\&. 9523 .sp 9524 Well\-behaved clients always ask for lock checks when it is important\&. So in the vast majority of cases, 9525 \FCstrict locking = Auto\F[] 8338 9526 or 8339 strict locking = no 8340 is acceptable\ .8341 .sp 8342 Default: 8343 \fI\fIstrict locking\fR\fR\fI = \fR\fI Auto\fR\fI \fR9527 \FCstrict locking = no\F[] 9528 is acceptable\&. 9529 .sp 9530 Default: 9531 \fI\fIstrict locking\fR\fR\fI = \fR\fI\FCAuto\F[]\fR\fI \fR 8344 9532 .RE 8345 9533 8346 9534 strict sync (S) 8347 .PP 8348 .RS 4 8349 Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk\. Under UNIX, a sync call forces the process to be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storage\. This is very slow and should only be done rarely\. Setting this parameter to 9535 .\" strict sync 9536 .PP 9537 .RS 4 9538 Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk\&. Under UNIX, a sync call forces the process to be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storage\&. This is very slow and should only be done rarely\&. Setting this parameter to 8350 9539 \fBno\fR 8351 9540 (the default) means that 8352 9541 \fBsmbd\fR(8) 8353 ignores the Windows applications requests for a sync call\ . There is only a possibility of losing data if the operating system itself that Samba is running on crashes, so there is little danger in this default setting\. In addition, this fixes many performance problems that people have reported with the new Windows98 explorer shell file copies\.8354 .sp 8355 Default: 8356 \fI\fIstrict sync\fR\fR\fI = \fR\fI no\fR\fI \fR9542 ignores the Windows applications requests for a sync call\&. There is only a possibility of losing data if the operating system itself that Samba is running on crashes, so there is little danger in this default setting\&. In addition, this fixes many performance problems that people have reported with the new Windows98 explorer shell file copies\&. 9543 .sp 9544 Default: 9545 \fI\fIstrict sync\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 8357 9546 .RE 8358 9547 8359 9548 svcctl list (G) 8360 .PP 8361 .RS 4 8362 This option defines a list of init scripts that smbd will use for starting and stopping Unix services via the Win32 ServiceControl API\. This allows Windows administrators to utilize the MS Management Console plug\-ins to manage a Unix server running Samba\. 9549 .\" svcctl list 9550 .PP 9551 .RS 4 9552 This option defines a list of init scripts that smbd will use for starting and stopping Unix services via the Win32 ServiceControl API\&. This allows Windows administrators to utilize the MS Management Console plug\-ins to manage a Unix server running Samba\&. 8363 9553 .sp 8364 9554 The administrator must create a directory name 8365 \ fIsvcctl\fR9555 \FCsvcctl\F[] 8366 9556 in Samba\'s $(libdir) and create symbolic links to the init scripts in 8367 \ fI/etc/init\.d/\fR\. The name of the links must match the names given as part of the8368 \fIsvcctl list\fR\ .8369 .sp 8370 Default: 8371 \fI\fIsvcctl list\fR\fR\fI = \fR\fI\ fR\fI \fR8372 .sp 8373 Example: 8374 \fI\fIsvcctl list\fR\fR\fI = \fR\fI cups postfix portmap httpd\fR\fI \fR9557 \FC/etc/init\&.d/\F[]\&. The name of the links must match the names given as part of the 9558 \fIsvcctl list\fR\&. 9559 .sp 9560 Default: 9561 \fI\fIsvcctl list\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 9562 .sp 9563 Example: 9564 \fI\fIsvcctl list\fR\fR\fI = \fR\fI\FCcups postfix portmap httpd\F[]\fR\fI \fR 8375 9565 .RE 8376 9566 8377 9567 sync always (S) 8378 .PP 8379 .RS 4 8380 This is a boolean parameter that controls whether writes will always be written to stable storage before the write call returns\. If this is 9568 .\" sync always 9569 .PP 9570 .RS 4 9571 This is a boolean parameter that controls whether writes will always be written to stable storage before the write call returns\&. If this is 8381 9572 \fBno\fR 8382 then the server will be guided by the client\'s request in each write call (clients can set a bit indicating that a particular write should be synchronous)\ . If this is9573 then the server will be guided by the client\'s request in each write call (clients can set a bit indicating that a particular write should be synchronous)\&. If this is 8383 9574 \fByes\fR 8384 9575 then every write will be followed by a 8385 fsync() 8386 call to ensure the data is written to disk\ . Note that the9576 \FCfsync() \F[] 9577 call to ensure the data is written to disk\&. Note that the 8387 9578 \fIstrict sync\fR 8388 9579 parameter must be set to 8389 9580 \fByes\fR 8390 in order for this parameter to have any affect\ .8391 .sp 8392 Default: 8393 \fI\fIsync always\fR\fR\fI = \fR\fI no\fR\fI \fR9581 in order for this parameter to have any affect\&. 9582 .sp 9583 Default: 9584 \fI\fIsync always\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 8394 9585 .RE 8395 9586 8396 9587 syslog only (G) 8397 .PP 8398 .RS 4 8399 If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files\. There still will be some logging to log\.[sn]mbd even if 9588 .\" syslog only 9589 .PP 9590 .RS 4 9591 If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files\&. There still will be some logging to log\&.[sn]mbd even if 8400 9592 \fIsyslog only\fR 8401 is enabled\ .8402 .sp 8403 Default: 8404 \fI\fIsyslog only\fR\fR\fI = \fR\fI no\fR\fI \fR9593 is enabled\&. 9594 .sp 9595 Default: 9596 \fI\fIsyslog only\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 8405 9597 .RE 8406 9598 8407 9599 syslog (G) 8408 .PP 8409 .RS 4 8410 This parameter maps how Samba debug messages are logged onto the system syslog logging levels\. Samba debug level zero maps onto syslog 9600 .\" syslog 9601 .PP 9602 .RS 4 9603 This parameter maps how Samba debug messages are logged onto the system syslog logging levels\&. Samba debug level zero maps onto syslog 8411 9604 \fBLOG_ERR\fR, debug level one maps onto 8412 9605 \fBLOG_WARNING\fR, debug level two maps onto 8413 \fBLOG_NOTICE\fR, debug level three maps onto LOG_INFO\ . All higher levels are mapped to8414 \fBLOG_DEBUG\fR\ .8415 .sp 8416 This parameter sets the threshold for sending messages to syslog\ . Only messages with debug level less than this value will be sent to syslog\. There still will be some logging to log\.[sn]mbd even if9606 \fBLOG_NOTICE\fR, debug level three maps onto LOG_INFO\&. All higher levels are mapped to 9607 \fBLOG_DEBUG\fR\&. 9608 .sp 9609 This parameter sets the threshold for sending messages to syslog\&. Only messages with debug level less than this value will be sent to syslog\&. There still will be some logging to log\&.[sn]mbd even if 8417 9610 \fIsyslog only\fR 8418 is enabled\ .8419 .sp 8420 Default: 8421 \fI\fIsyslog\fR\fR\fI = \fR\fI 1\fR\fI \fR9611 is enabled\&. 9612 .sp 9613 Default: 9614 \fI\fIsyslog\fR\fR\fI = \fR\fI\FC1\F[]\fR\fI \fR 8422 9615 .RE 8423 9616 8424 9617 template homedir (G) 9618 .\" template homedir 8425 9619 .PP 8426 9620 .RS 4 8427 9621 When filling out the user information for a Windows NT user, the 8428 9622 \fBwinbindd\fR(8) 8429 daemon uses this parameter to fill in the home directory for that user\ . If the string9623 daemon uses this parameter to fill in the home directory for that user\&. If the string 8430 9624 \fI%D\fR 8431 is present it is substituted with the user\'s Windows NT domain name\ . If the string9625 is present it is substituted with the user\'s Windows NT domain name\&. If the string 8432 9626 \fI%U\fR 8433 is present it is substituted with the user\'s Windows NT user name\ .8434 .sp 8435 Default: 8436 \fI\fItemplate homedir\fR\fR\fI = \fR\fI /home/%D/%U\fR\fI \fR9627 is present it is substituted with the user\'s Windows NT user name\&. 9628 .sp 9629 Default: 9630 \fI\fItemplate homedir\fR\fR\fI = \fR\fI\FC/home/%D/%U\F[]\fR\fI \fR 8437 9631 .RE 8438 9632 8439 9633 template shell (G) 9634 .\" template shell 8440 9635 .PP 8441 9636 .RS 4 8442 9637 When filling out the user information for a Windows NT user, the 8443 9638 \fBwinbindd\fR(8) 8444 daemon uses this parameter to fill in the login shell for that user\ .9639 daemon uses this parameter to fill in the login shell for that user\&. 8445 9640 .sp 8446 9641 \fINo default\fR … … 8448 9643 8449 9644 time offset (G) 8450 .PP 8451 .RS 4 8452 This parameter is a setting in minutes to add to the normal GMT to local time conversion\. This is useful if you are serving a lot of PCs that have incorrect daylight saving time handling\. 8453 .sp 8454 Default: 8455 \fI\fItime offset\fR\fR\fI = \fR\fI0\fR\fI \fR 8456 .sp 8457 Example: 8458 \fI\fItime offset\fR\fR\fI = \fR\fI60\fR\fI \fR 9645 .\" time offset 9646 .PP 9647 .RS 4 9648 This parameter is a setting in minutes to add to the normal GMT to local time conversion\&. This is useful if you are serving a lot of PCs that have incorrect daylight saving time handling\&. 9649 .sp 9650 Default: 9651 \fI\fItime offset\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 9652 .sp 9653 Example: 9654 \fI\fItime offset\fR\fR\fI = \fR\fI\FC60\F[]\fR\fI \fR 8459 9655 .RE 8460 9656 8461 9657 time server (G) 9658 .\" time server 8462 9659 .PP 8463 9660 .RS 4 8464 9661 This parameter determines if 8465 9662 \fBnmbd\fR(8) 8466 advertises itself as a time server to Windows clients\ .8467 .sp 8468 Default: 8469 \fI\fItime server\fR\fR\fI = \fR\fI no\fR\fI \fR9663 advertises itself as a time server to Windows clients\&. 9664 .sp 9665 Default: 9666 \fI\fItime server\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 8470 9667 .RE 8471 9668 8472 9669 unix charset (G) 8473 .PP 8474 .RS 4 8475 Specifies the charset the unix machine Samba runs on uses\. Samba needs to know this in order to be able to convert text to the charsets other SMB clients use\. 8476 .sp 8477 This is also the charset Samba will use when specifying arguments to scripts that it invokes\. 8478 .sp 8479 Default: 8480 \fI\fIunix charset\fR\fR\fI = \fR\fIUTF8\fR\fI \fR 8481 .sp 8482 Example: 8483 \fI\fIunix charset\fR\fR\fI = \fR\fIASCII\fR\fI \fR 9670 .\" unix charset 9671 .PP 9672 .RS 4 9673 Specifies the charset the unix machine Samba runs on uses\&. Samba needs to know this in order to be able to convert text to the charsets other SMB clients use\&. 9674 .sp 9675 This is also the charset Samba will use when specifying arguments to scripts that it invokes\&. 9676 .sp 9677 Default: 9678 \fI\fIunix charset\fR\fR\fI = \fR\fI\FCUTF8\F[]\fR\fI \fR 9679 .sp 9680 Example: 9681 \fI\fIunix charset\fR\fR\fI = \fR\fI\FCASCII\F[]\fR\fI \fR 8484 9682 .RE 8485 9683 8486 9684 unix extensions (G) 8487 .PP 8488 .RS 4 8489 This boolean parameter controls whether Samba implments the CIFS UNIX extensions, as defined by HP\. These extensions enable Samba to better serve UNIX CIFS clients by supporting features such as symbolic links, hard links, etc\.\.\. These extensions require a similarly enabled client, and are of no current use to Windows clients\. 8490 .sp 8491 Default: 8492 \fI\fIunix extensions\fR\fR\fI = \fR\fIyes\fR\fI \fR 9685 .\" unix extensions 9686 .PP 9687 .RS 4 9688 This boolean parameter controls whether Samba implments the CIFS UNIX extensions, as defined by HP\&. These extensions enable Samba to better serve UNIX CIFS clients by supporting features such as symbolic links, hard links, etc\&.\&.\&. These extensions require a similarly enabled client, and are of no current use to Windows clients\&. 9689 .sp 9690 Default: 9691 \fI\fIunix extensions\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 8493 9692 .RE 8494 9693 8495 9694 unix password sync (G) 8496 .PP 8497 .RS 4 8498 This boolean parameter controls whether Samba attempts to synchronize the UNIX password with the SMB password when the encrypted SMB password in the smbpasswd file is changed\. If this is set to 9695 .\" unix password sync 9696 .PP 9697 .RS 4 9698 This boolean parameter controls whether Samba attempts to synchronize the UNIX password with the SMB password when the encrypted SMB password in the smbpasswd file is changed\&. If this is set to 8499 9699 \fByes\fR 8500 9700 the program specified in the … … 8502 9702 parameter is called 8503 9703 \fIAS ROOT\fR 8504 \- to allow the new UNIX password to be set without access to the old UNIX password (as the SMB password change code has no access to the old password cleartext, only the new)\ .8505 .sp 8506 Default: 8507 \fI\fIunix password sync\fR\fR\fI = \fR\fI no\fR\fI \fR9704 \- to allow the new UNIX password to be set without access to the old UNIX password (as the SMB password change code has no access to the old password cleartext, only the new)\&. 9705 .sp 9706 Default: 9707 \fI\fIunix password sync\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 8508 9708 .RE 8509 9709 8510 9710 update encrypted (G) 8511 .PP 8512 .RS 4 8513 This boolean parameter allows a user logging on with a plaintext password to have their encrypted (hashed) password in the smbpasswd file to be updated automatically as they log on\. This option allows a site to migrate from plaintext password authentication (users authenticate with plaintext password over the wire, and are checked against a UNIX account atabase) to encrypted password authentication (the SMB challenge/response authentication mechanism) without forcing all users to re\-enter their passwords via smbpasswd at the time the change is made\. This is a convenience option to allow the change over to encrypted passwords to be made over a longer period\. Once all users have encrypted representations of their passwords in the smbpasswd file this parameter should be set to 8514 \fBno\fR\. 9711 .\" update encrypted 9712 .PP 9713 .RS 4 9714 This boolean parameter allows a user logging on with a plaintext password to have their encrypted (hashed) password in the smbpasswd file to be updated automatically as they log on\&. This option allows a site to migrate from plaintext password authentication (users authenticate with plaintext password over the wire, and are checked against a UNIX account atabase) to encrypted password authentication (the SMB challenge/response authentication mechanism) without forcing all users to re\-enter their passwords via smbpasswd at the time the change is made\&. This is a convenience option to allow the change over to encrypted passwords to be made over a longer period\&. Once all users have encrypted representations of their passwords in the smbpasswd file this parameter should be set to 9715 \fBno\fR\&. 8515 9716 .sp 8516 9717 In order for this parameter to be operative the 8517 \ fIencrypt passwords\fR9718 \m[blue]\fBencrypt passwords\fR\m[] 8518 9719 parameter must be set to 8519 \fBno\fR\ . The default value of8520 \ fIencrypt passwords = Yes\fR\. Note: This must be set to9720 \fBno\fR\&. The default value of 9721 \m[blue]\fBencrypt passwords = Yes\fR\m[]\&. Note: This must be set to 8521 9722 \fBno\fR 8522 9723 for this 8523 \ fIupdate encrypted\fR8524 to work\ .9724 \m[blue]\fBupdate encrypted\fR\m[] 9725 to work\&. 8525 9726 .sp 8526 9727 Note that even when this parameter is set a user authenticating to 8527 smbd 8528 must still enter a valid password in order to connect correctly, and to update their hashed (smbpasswd) passwords\ .8529 .sp 8530 Default: 8531 \fI\fIupdate encrypted\fR\fR\fI = \fR\fI no\fR\fI \fR9728 \FCsmbd\F[] 9729 must still enter a valid password in order to connect correctly, and to update their hashed (smbpasswd) passwords\&. 9730 .sp 9731 Default: 9732 \fI\fIupdate encrypted\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 8532 9733 .RE 8533 9734 8534 9735 use client driver (S) 8535 .PP 8536 .RS 4 8537 This parameter applies only to Windows NT/2000 clients\. It has no effect on Windows 95/98/ME clients\. When serving a printer to Windows NT/2000 clients without first installing a valid printer driver on the Samba host, the client will be required to install a local printer driver\. From this point on, the client will treat the print as a local printer and not a network printer connection\. This is much the same behavior that will occur when 8538 disable spoolss = yes\. 8539 .sp 8540 The differentiating factor is that under normal circumstances, the NT/2000 client will attempt to open the network printer using MS\-RPC\. The problem is that because the client considers the printer to be local, it will attempt to issue the OpenPrinterEx() call requesting access rights associated with the logged on user\. If the user possesses local administator rights but not root privilege on the Samba host (often the case), the OpenPrinterEx() call will fail\. The result is that the client will now display an "Access Denied; Unable to connect" message in the printer queue window (even though jobs may successfully be printed)\. 8541 .sp 8542 If this parameter is enabled for a printer, then any attempt to open the printer with the PRINTER_ACCESS_ADMINISTER right is mapped to PRINTER_ACCESS_USE instead\. Thus allowing the OpenPrinterEx() call to succeed\. 8543 \fIThis parameter MUST not be able enabled on a print share which has valid print driver installed on the Samba server\.\fR 8544 .sp 8545 Default: 8546 \fI\fIuse client driver\fR\fR\fI = \fR\fIno\fR\fI \fR 9736 .\" use client driver 9737 .PP 9738 .RS 4 9739 This parameter applies only to Windows NT/2000 clients\&. It has no effect on Windows 95/98/ME clients\&. When serving a printer to Windows NT/2000 clients without first installing a valid printer driver on the Samba host, the client will be required to install a local printer driver\&. From this point on, the client will treat the print as a local printer and not a network printer connection\&. This is much the same behavior that will occur when 9740 \FCdisable spoolss = yes\F[]\&. 9741 .sp 9742 The differentiating factor is that under normal circumstances, the NT/2000 client will attempt to open the network printer using MS\-RPC\&. The problem is that because the client considers the printer to be local, it will attempt to issue the OpenPrinterEx() call requesting access rights associated with the logged on user\&. If the user possesses local administator rights but not root privilege on the Samba host (often the case), the OpenPrinterEx() call will fail\&. The result is that the client will now display an "Access Denied; Unable to connect" message in the printer queue window (even though jobs may successfully be printed)\&. 9743 .sp 9744 If this parameter is enabled for a printer, then any attempt to open the printer with the PRINTER_ACCESS_ADMINISTER right is mapped to PRINTER_ACCESS_USE instead\&. Thus allowing the OpenPrinterEx() call to succeed\&. 9745 \fIThis parameter MUST not be able enabled on a print share which has valid print driver installed on the Samba server\&.\fR 9746 .sp 9747 Default: 9748 \fI\fIuse client driver\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 8547 9749 .RE 8548 9750 8549 9751 use kerberos keytab (G) 9752 .\" use kerberos keytab 8550 9753 .PP 8551 9754 .RS 4 … … 8553 9756 \fBhost/FQDN\fR 8554 9757 and 8555 \fBcifs/FQDN\fR\ .9758 \fBcifs/FQDN\fR\&. 8556 9759 .sp 8557 9760 When you are using the heimdal Kerberos libraries, you must also specify the following in 8558 \fI/etc/krb5\.conf\fR: 8559 .sp 8560 .RS 4 9761 \FC/etc/krb5\&.conf\F[]: 9762 .sp 9763 .if n \{\ 9764 .RS 4 9765 .\} 9766 .fam C 9767 .ps -1 8561 9768 .nf 9769 .if t \{\ 9770 .sp -1 9771 .\} 9772 .BB lightgray adjust-for-leading-newline 9773 .sp -1 9774 8562 9775 [libdefaults] 8563 default_keytab_name = FILE:/etc/krb5\.keytab 9776 default_keytab_name = FILE:/etc/krb5\&.keytab 9777 .EB lightgray adjust-for-leading-newline 9778 .if t \{\ 9779 .sp 1 9780 .\} 8564 9781 .fi 8565 .RE 8566 .sp 8567 .sp 8568 Default: 8569 \fI\fIuse kerberos keytab\fR\fR\fI = \fR\fIFalse\fR\fI \fR 9782 .fam 9783 .ps +1 9784 .if n \{\ 9785 .RE 9786 .\} 9787 .sp 9788 Default: 9789 \fI\fIuse kerberos keytab\fR\fR\fI = \fR\fI\FCFalse\F[]\fR\fI \fR 8570 9790 .RE 8571 9791 8572 9792 use mmap (G) 8573 .PP 8574 .RS 4 8575 This global parameter determines if the tdb internals of Samba can depend on mmap working correctly on the running system\. Samba requires a coherent mmap/read\-write system memory cache\. Currently only HPUX does not have such a coherent cache, and so this parameter is set to 9793 .\" use mmap 9794 .PP 9795 .RS 4 9796 This global parameter determines if the tdb internals of Samba can depend on mmap working correctly on the running system\&. Samba requires a coherent mmap/read\-write system memory cache\&. Currently only HPUX does not have such a coherent cache, and so this parameter is set to 8576 9797 \fBno\fR 8577 by default on HPUX\ . On all other systems this parameter should be left alone\. This parameter is provided to help the Samba developers track down problems with the tdb internal code\.8578 .sp 8579 Default: 8580 \fI\fIuse mmap\fR\fR\fI = \fR\fI yes\fR\fI \fR9798 by default on HPUX\&. On all other systems this parameter should be left alone\&. This parameter is provided to help the Samba developers track down problems with the tdb internal code\&. 9799 .sp 9800 Default: 9801 \fI\fIuse mmap\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 8581 9802 .RE 8582 9803 8583 9804 username level (G) 8584 .PP 8585 .RS 4 8586 This option helps Samba to try and \'guess\' at the real UNIX username, as many DOS clients send an all\-uppercase username\. By default Samba tries all lowercase, followed by the username with the first letter capitalized, and fails if the username is not found on the UNIX machine\. 8587 .sp 8588 If this parameter is set to non\-zero the behavior changes\. This parameter is a number that specifies the number of uppercase combinations to try while trying to determine the UNIX user name\. The higher the number the more combinations will be tried, but the slower the discovery of usernames will be\. Use this parameter when you have strange usernames on your UNIX machine, such as 8589 \fBAstrangeUser \fR\. 8590 .sp 8591 This parameter is needed only on UNIX systems that have case sensitive usernames\. 8592 .sp 8593 Default: 8594 \fI\fIusername level\fR\fR\fI = \fR\fI0\fR\fI \fR 8595 .sp 8596 Example: 8597 \fI\fIusername level\fR\fR\fI = \fR\fI5\fR\fI \fR 9805 .\" username level 9806 .PP 9807 .RS 4 9808 This option helps Samba to try and \'guess\' at the real UNIX username, as many DOS clients send an all\-uppercase username\&. By default Samba tries all lowercase, followed by the username with the first letter capitalized, and fails if the username is not found on the UNIX machine\&. 9809 .sp 9810 If this parameter is set to non\-zero the behavior changes\&. This parameter is a number that specifies the number of uppercase combinations to try while trying to determine the UNIX user name\&. The higher the number the more combinations will be tried, but the slower the discovery of usernames will be\&. Use this parameter when you have strange usernames on your UNIX machine, such as 9811 \fBAstrangeUser \fR\&. 9812 .sp 9813 This parameter is needed only on UNIX systems that have case sensitive usernames\&. 9814 .sp 9815 Default: 9816 \fI\fIusername level\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 9817 .sp 9818 Example: 9819 \fI\fIusername level\fR\fR\fI = \fR\fI\FC5\F[]\fR\fI \fR 8598 9820 .RE 8599 9821 8600 9822 username map script (G) 9823 .\" username map script 8601 9824 .PP 8602 9825 .RS 4 8603 9826 This script is a mutually exclusive alternative to the 8604 \ fIusername map\fR8605 parameter\ . This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line line on standard output (the name to which the account should mapped)\. In this way, it is possible to store username map tables in an LDAP or NIS directory services\.8606 .sp 8607 Default: 8608 \fI\fIusername map script\fR\fR\fI = \fR\fI\ fR\fI \fR8609 .sp 8610 Example: 8611 \fI\fIusername map script\fR\fR\fI = \fR\fI /etc/samba/scripts/mapusers\.sh\fR\fI \fR9827 \m[blue]\fBusername map\fR\m[] 9828 parameter\&. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line line on standard output (the name to which the account should mapped)\&. In this way, it is possible to store username map tables in an LDAP or NIS directory services\&. 9829 .sp 9830 Default: 9831 \fI\fIusername map script\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 9832 .sp 9833 Example: 9834 \fI\fIusername map script\fR\fR\fI = \fR\fI\FC/etc/samba/scripts/mapusers\&.sh\F[]\fR\fI \fR 8612 9835 .RE 8613 9836 8614 9837 username map (G) 8615 .PP 8616 .RS 4 8617 This option allows you to specify a file containing a mapping of usernames from the clients to the server\. This can be used for several purposes\. The most common is to map usernames that users use on DOS or Windows machines to those that the UNIX box uses\. The other is to map multiple users to a single username so that they can more easily share files\. 8618 .sp 8619 Please note that for user or share mode security, the username map is applied prior to validating the user credentials\. Domain member servers (domain or ads) apply the username map after the user has been successfully authenticated by the domain controller and require fully qualified enties in the map table (e\.g\. biddle = 8620 DOMAIN\efoo)\. 8621 .sp 8622 The map file is parsed line by line\. Each line should contain a single UNIX username on the left then a \'=\' followed by a list of usernames on the right\. The list of usernames on the right may contain names of the form @group in which case they will match any UNIX username in that group\. The special client name \'*\' is a wildcard and matches any name\. Each line of the map file may be up to 1023 characters long\. 8623 .sp 8624 The file is processed on each line by taking the supplied username and comparing it with each username on the right hand side of the \'=\' signs\. If the supplied name matches any of the names on the right hand side then it is replaced with the name on the left\. Processing then continues with the next line\. 8625 .sp 8626 If any line begins with a \'#\' or a \';\' then it is ignored\. 8627 .sp 8628 If any line begins with an \'!\' then the processing will stop after that line if a mapping was done by the line\. Otherwise mapping continues with every line being processed\. Using \'!\' is most useful when you have a wildcard mapping line later in the file\. 9838 .\" username map 9839 .PP 9840 .RS 4 9841 This option allows you to specify a file containing a mapping of usernames from the clients to the server\&. This can be used for several purposes\&. The most common is to map usernames that users use on DOS or Windows machines to those that the UNIX box uses\&. The other is to map multiple users to a single username so that they can more easily share files\&. 9842 .sp 9843 Please note that for user or share mode security, the username map is applied prior to validating the user credentials\&. Domain member servers (domain or ads) apply the username map after the user has been successfully authenticated by the domain controller and require fully qualified enties in the map table (e\&.g\&. biddle = 9844 \FCDOMAIN\efoo\F[])\&. 9845 .sp 9846 The map file is parsed line by line\&. Each line should contain a single UNIX username on the left then a \'=\' followed by a list of usernames on the right\&. The list of usernames on the right may contain names of the form @group in which case they will match any UNIX username in that group\&. The special client name \'*\' is a wildcard and matches any name\&. Each line of the map file may be up to 1023 characters long\&. 9847 .sp 9848 The file is processed on each line by taking the supplied username and comparing it with each username on the right hand side of the \'=\' signs\&. If the supplied name matches any of the names on the right hand side then it is replaced with the name on the left\&. Processing then continues with the next line\&. 9849 .sp 9850 If any line begins with a \'#\' or a \';\' then it is ignored\&. 9851 .sp 9852 If any line begins with an \'!\' then the processing will stop after that line if a mapping was done by the line\&. Otherwise mapping continues with every line being processed\&. Using \'!\' is most useful when you have a wildcard mapping line later in the file\&. 8629 9853 .sp 8630 9854 For example to map from the name … … 8636 9860 you would use: 8637 9861 .sp 8638 .RS 4 9862 .if n \{\ 9863 .RS 4 9864 .\} 9865 .fam C 9866 .ps -1 8639 9867 .nf 8640 root = admin administrator 9868 .if t \{\ 9869 .sp -1 9870 .\} 9871 .BB lightgray adjust-for-leading-newline 9872 .sp -1 9873 9874 \FCroot = admin administrator\F[] 9875 .EB lightgray adjust-for-leading-newline 9876 .if t \{\ 9877 .sp 1 9878 .\} 8641 9879 .fi 8642 .RE 9880 .fam 9881 .ps +1 9882 .if n \{\ 9883 .RE 9884 .\} 8643 9885 .sp 8644 9886 Or to map anyone in the UNIX group … … 8648 9890 you would use: 8649 9891 .sp 8650 .RS 4 9892 .if n \{\ 9893 .RS 4 9894 .\} 9895 .fam C 9896 .ps -1 8651 9897 .nf 8652 sys = @system 9898 .if t \{\ 9899 .sp -1 9900 .\} 9901 .BB lightgray adjust-for-leading-newline 9902 .sp -1 9903 9904 \FCsys = @system\F[] 9905 .EB lightgray adjust-for-leading-newline 9906 .if t \{\ 9907 .sp 1 9908 .\} 8653 9909 .fi 8654 .RE 8655 .sp 8656 .sp 8657 You can have as many mappings as you like in a username map file\. 9910 .fam 9911 .ps +1 9912 .if n \{\ 9913 .RE 9914 .\} 9915 .sp 9916 You can have as many mappings as you like in a username map file\&. 8658 9917 .sp 8659 9918 If your system supports the NIS NETGROUP option then the netgroup database is checked before the 8660 \fI/etc/group \fR 8661 database for matching groups\. 8662 .sp 8663 You can map Windows usernames that have spaces in them by using double quotes around the name\. For example: 8664 .sp 8665 .RS 4 9919 \FC/etc/group \F[] 9920 database for matching groups\&. 9921 .sp 9922 You can map Windows usernames that have spaces in them by using double quotes around the name\&. For example: 9923 .sp 9924 .if n \{\ 9925 .RS 4 9926 .\} 9927 .fam C 9928 .ps -1 8666 9929 .nf 8667 tridge = "Andrew Tridgell" 9930 .if t \{\ 9931 .sp -1 9932 .\} 9933 .BB lightgray adjust-for-leading-newline 9934 .sp -1 9935 9936 \FCtridge = "Andrew Tridgell"\F[] 9937 .EB lightgray adjust-for-leading-newline 9938 .if t \{\ 9939 .sp 1 9940 .\} 8668 9941 .fi 8669 .RE 8670 .sp 8671 would map the windows username "Andrew Tridgell" to the unix username "tridge"\. 8672 .sp 8673 The following example would map mary and fred to the unix user sys, and map the rest to guest\. Note the use of the \'!\' to tell Samba to stop processing if it gets a match on that line: 8674 .sp 8675 .RS 4 9942 .fam 9943 .ps +1 9944 .if n \{\ 9945 .RE 9946 .\} 9947 .sp 9948 would map the windows username "Andrew Tridgell" to the unix username "tridge"\&. 9949 .sp 9950 The following example would map mary and fred to the unix user sys, and map the rest to guest\&. Note the use of the \'!\' to tell Samba to stop processing if it gets a match on that line: 9951 .sp 9952 .if n \{\ 9953 .RS 4 9954 .\} 9955 .fam C 9956 .ps -1 8676 9957 .nf 9958 .if t \{\ 9959 .sp -1 9960 .\} 9961 .BB lightgray adjust-for-leading-newline 9962 .sp -1 9963 8677 9964 !sys = mary fred 8678 9965 guest = * 9966 .EB lightgray adjust-for-leading-newline 9967 .if t \{\ 9968 .sp 1 9969 .\} 8679 9970 .fi 8680 .RE 8681 .sp 8682 .sp 8683 Note that the remapping is applied to all occurrences of usernames\. Thus if you connect to \e\eserver\efred and 9971 .fam 9972 .ps +1 9973 .if n \{\ 9974 .RE 9975 .\} 9976 .sp 9977 Note that the remapping is applied to all occurrences of usernames\&. Thus if you connect to \e\eserver\efred and 8684 9978 \fBfred\fR 8685 9979 is remapped to … … 8688 9982 \fBmary\fR 8689 9983 not 8690 \fBfred\fR\ . The only exception to this is the username passed to the8691 \ fIpassword server\fR8692 (if you have one)\ . The password server will receive whatever username the client supplies without modification\.8693 .sp 8694 Also note that no reverse mapping is done\ . The main effect this has is with printing\. Users who have been mapped may have trouble deleting print jobs as PrintManager under WfWg will think they don\'t own the print job\.8695 .sp 8696 Samba versions prior to 3\ .0\.8 would only support reading the fully qualified username (e\.g\.:8697 DOMAIN\euser) from the username map when performing a kerberos login from a client\. However, when looking up a map entry for a user authenticated by NTLM[SSP], only the login name would be used for matches\. This resulted in inconsistent behavior sometimes even on the same server\.8698 .sp 8699 The following functionality is obeyed in version 3\ .0\.8 and later:8700 .sp 8701 When performing local authentication, the username map is applied to the login name before attempting to authenticate the connection\ .8702 .sp 8703 When relying upon a external domain controller for validating authentication requests, smbd will apply the username map to the fully qualified username (i\ .e\.8704 DOMAIN\euser) only after the user has been successfully authenticated\.9984 \fBfred\fR\&. The only exception to this is the username passed to the 9985 \m[blue]\fBpassword server\fR\m[] 9986 (if you have one)\&. The password server will receive whatever username the client supplies without modification\&. 9987 .sp 9988 Also note that no reverse mapping is done\&. The main effect this has is with printing\&. Users who have been mapped may have trouble deleting print jobs as PrintManager under WfWg will think they don\'t own the print job\&. 9989 .sp 9990 Samba versions prior to 3\&.0\&.8 would only support reading the fully qualified username (e\&.g\&.: 9991 \FCDOMAIN\euser\F[]) from the username map when performing a kerberos login from a client\&. However, when looking up a map entry for a user authenticated by NTLM[SSP], only the login name would be used for matches\&. This resulted in inconsistent behavior sometimes even on the same server\&. 9992 .sp 9993 The following functionality is obeyed in version 3\&.0\&.8 and later: 9994 .sp 9995 When performing local authentication, the username map is applied to the login name before attempting to authenticate the connection\&. 9996 .sp 9997 When relying upon a external domain controller for validating authentication requests, smbd will apply the username map to the fully qualified username (i\&.e\&. 9998 \FCDOMAIN\euser\F[]) only after the user has been successfully authenticated\&. 8705 9999 .sp 8706 10000 An example of use is: 8707 10001 .sp 8708 .RS 4 10002 .if n \{\ 10003 .RS 4 10004 .\} 10005 .fam C 10006 .ps -1 8709 10007 .nf 8710 username map = /usr/local/samba/lib/users\.map 10008 .if t \{\ 10009 .sp -1 10010 .\} 10011 .BB lightgray adjust-for-leading-newline 10012 .sp -1 10013 10014 username map = /usr/local/samba/lib/users\&.map 10015 .EB lightgray adjust-for-leading-newline 10016 .if t \{\ 10017 .sp 1 10018 .\} 8711 10019 .fi 8712 .RE 8713 .sp 8714 .sp 8715 Default: 8716 \fI\fIusername map\fR\fR\fI = \fR\fI # no username map\fR\fI \fR 10020 .fam 10021 .ps +1 10022 .if n \{\ 10023 .RE 10024 .\} 10025 .sp 10026 Default: 10027 \fI\fIusername map\fR\fR\fI = \fR\fI\FC # no username map\F[]\fR\fI \fR 8717 10028 .RE 8718 10029 8719 10030 user 10031 .\" user 8720 10032 .PP 8721 10033 .RS 4 8722 10034 This parameter is a synonym for 8723 username\ .10035 username\&. 8724 10036 .RE 8725 10037 8726 10038 users 10039 .\" users 8727 10040 .PP 8728 10041 .RS 4 8729 10042 This parameter is a synonym for 8730 username\ .10043 username\&. 8731 10044 .RE 8732 10045 8733 10046 username (S) 8734 .PP 8735 .RS 4 8736 Multiple users may be specified in a comma\-delimited list, in which case the supplied password will be tested against each username in turn (left to right)\. 10047 .\" username 10048 .PP 10049 .RS 4 10050 Multiple users may be specified in a comma\-delimited list, in which case the supplied password will be tested against each username in turn (left to right)\&. 8737 10051 .sp 8738 10052 The 8739 10053 \fIusername\fR 8740 line is needed only when the PC is unable to supply its own username\ . This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames\. In both these cases you may also be better using the \e\eserver\eshare%user syntax instead\.10054 line is needed only when the PC is unable to supply its own username\&. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames\&. In both these cases you may also be better using the \e\eserver\eshare%user syntax instead\&. 8741 10055 .sp 8742 10056 The … … 8744 10058 line is not a great solution in many cases as it means Samba will try to validate the supplied password against each of the usernames in the 8745 10059 \fIusername\fR 8746 line in turn\ . This is slow and a bad idea for lots of users in case of duplicate passwords\. You may get timeouts or security breaches using this parameter unwisely\.8747 .sp 8748 Samba relies on the underlying UNIX security\ . This parameter does not restrict who can login, it just offers hints to the Samba server as to what usernames might correspond to the supplied password\. Users can login as whoever they please and they will be able to do no more damage than if they started a telnet session\. The daemon runs as the user that they log in as, so they cannot do anything that user cannot do\.10060 line in turn\&. This is slow and a bad idea for lots of users in case of duplicate passwords\&. You may get timeouts or security breaches using this parameter unwisely\&. 10061 .sp 10062 Samba relies on the underlying UNIX security\&. This parameter does not restrict who can login, it just offers hints to the Samba server as to what usernames might correspond to the supplied password\&. Users can login as whoever they please and they will be able to do no more damage than if they started a telnet session\&. The daemon runs as the user that they log in as, so they cannot do anything that user cannot do\&. 8749 10063 .sp 8750 10064 To restrict a service to a particular set of users you can use the 8751 \ fIvalid users\fR8752 parameter\ .8753 .sp 8754 If any of the usernames begin with a \'@\' then the name will be looked up first in the NIS netgroups list (if Samba is compiled with netgroup support), followed by a lookup in the UNIX groups database and will expand to a list of all users in the group of that name\ .8755 .sp 8756 If any of the usernames begin with a \'+\' then the name will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name\ .8757 .sp 8758 If any of the usernames begin with a \'&\' then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name\ .8759 .sp 8760 Note that searching though a groups database can take quite some time, and some clients may time out during the search\ .10065 \m[blue]\fBvalid users\fR\m[] 10066 parameter\&. 10067 .sp 10068 If any of the usernames begin with a \'@\' then the name will be looked up first in the NIS netgroups list (if Samba is compiled with netgroup support), followed by a lookup in the UNIX groups database and will expand to a list of all users in the group of that name\&. 10069 .sp 10070 If any of the usernames begin with a \'+\' then the name will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name\&. 10071 .sp 10072 If any of the usernames begin with a \'&\' then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name\&. 10073 .sp 10074 Note that searching though a groups database can take quite some time, and some clients may time out during the search\&. 8761 10075 .sp 8762 10076 See the section 8763 10077 NOTE ABOUT USERNAME/PASSWORD VALIDATION 8764 for more information on how this parameter determines access to the services\ .8765 .sp 8766 Default: 8767 \fI\fIusername\fR\fR\fI = \fR\fI # The guest account if a guest service, else <empty string>\.\fR\fI \fR8768 .sp 8769 Example: 8770 \fI\fIusername\fR\fR\fI = \fR\fI fred, mary, jack, jane, @users, @pcgroup\fR\fI \fR10078 for more information on how this parameter determines access to the services\&. 10079 .sp 10080 Default: 10081 \fI\fIusername\fR\fR\fI = \fR\fI\FC # The guest account if a guest service, else <empty string>\&.\F[]\fR\fI \fR 10082 .sp 10083 Example: 10084 \fI\fIusername\fR\fR\fI = \fR\fI\FCfred, mary, jack, jane, @users, @pcgroup\F[]\fR\fI \fR 8771 10085 .RE 8772 10086 8773 10087 usershare allow guests (G) 8774 .PP 8775 .RS 4 8776 This parameter controls whether user defined shares are allowed to be accessed by non\-authenticated users or not\. It is the equivalent of allowing people who can create a share the option of setting 10088 .\" usershare allow guests 10089 .PP 10090 .RS 4 10091 This parameter controls whether user defined shares are allowed to be accessed by non\-authenticated users or not\&. It is the equivalent of allowing people who can create a share the option of setting 8777 10092 \fIguest ok = yes\fR 8778 in a share definition\ . Due to the security sensitive nature of this the default is set to off\.8779 .sp 8780 Default: 8781 \fI\fIusershare allow guests\fR\fR\fI = \fR\fI no\fR\fI \fR10093 in a share definition\&. Due to the security sensitive nature of this the default is set to off\&. 10094 .sp 10095 Default: 10096 \fI\fIusershare allow guests\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 8782 10097 .RE 8783 10098 8784 10099 usershare max shares (G) 8785 .PP 8786 .RS 4 8787 This parameter specifies the number of user defined shares that are allowed to be created by users belonging to the group owning the usershare directory\. If set to zero (the default) user defined shares are ignored\. 8788 .sp 8789 Default: 8790 \fI\fIusershare max shares\fR\fR\fI = \fR\fI0\fR\fI \fR 10100 .\" usershare max shares 10101 .PP 10102 .RS 4 10103 This parameter specifies the number of user defined shares that are allowed to be created by users belonging to the group owning the usershare directory\&. If set to zero (the default) user defined shares are ignored\&. 10104 .sp 10105 Default: 10106 \fI\fIusershare max shares\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 8791 10107 .RE 8792 10108 8793 10109 usershare owner only (G) 8794 .PP 8795 .RS 4 8796 This parameter controls whether the pathname exported by a user defined shares must be owned by the user creating the user defined share or not\. If set to True (the default) then smbd checks that the directory path being shared is owned by the user who owns the usershare file defining this share and refuses to create the share if not\. If set to False then no such check is performed and any directory path may be exported regardless of who owns it\. 8797 .sp 8798 Default: 8799 \fI\fIusershare owner only\fR\fR\fI = \fR\fITrue\fR\fI \fR 10110 .\" usershare owner only 10111 .PP 10112 .RS 4 10113 This parameter controls whether the pathname exported by a user defined shares must be owned by the user creating the user defined share or not\&. If set to True (the default) then smbd checks that the directory path being shared is owned by the user who owns the usershare file defining this share and refuses to create the share if not\&. If set to False then no such check is performed and any directory path may be exported regardless of who owns it\&. 10114 .sp 10115 Default: 10116 \fI\fIusershare owner only\fR\fR\fI = \fR\fI\FCTrue\F[]\fR\fI \fR 8800 10117 .RE 8801 10118 8802 10119 usershare path (G) 8803 .PP 8804 .RS 4 8805 This parameter specifies the absolute path of the directory on the filesystem used to store the user defined share definition files\. This directory must be owned by root, and have no access for other, and be writable only by the group owner\. In addition the "sticky" bit must also be set, restricting rename and delete to owners of a file (in the same way the /tmp directory is usually configured)\. Members of the group owner of this directory are the users allowed to create usershares\. If this parameter is undefined then no user defined shares are allowed\. 8806 .sp 8807 For example, a valid usershare directory might be /usr/local/samba/lib/usershares, set up as follows\. 8808 .sp 8809 8810 .sp 8811 .RS 4 10120 .\" usershare path 10121 .PP 10122 .RS 4 10123 This parameter specifies the absolute path of the directory on the filesystem used to store the user defined share definition files\&. This directory must be owned by root, and have no access for other, and be writable only by the group owner\&. In addition the "sticky" bit must also be set, restricting rename and delete to owners of a file (in the same way the /tmp directory is usually configured)\&. Members of the group owner of this directory are the users allowed to create usershares\&. If this parameter is undefined then no user defined shares are allowed\&. 10124 .sp 10125 For example, a valid usershare directory might be /usr/local/samba/lib/usershares, set up as follows\&. 10126 .sp 10127 10128 .sp 10129 .if n \{\ 10130 .RS 4 10131 .\} 10132 .fam C 10133 .ps -1 8812 10134 .nf 10135 .if t \{\ 10136 .sp -1 10137 .\} 10138 .BB lightgray adjust-for-leading-newline 10139 .sp -1 10140 8813 10141 ls \-ld /usr/local/samba/lib/usershares/ 8814 10142 drwxrwx\-\-T 2 root power_users 4096 2006\-05\-05 12:27 /usr/local/samba/lib/usershares/ 8815 10143 10144 .EB lightgray adjust-for-leading-newline 10145 .if t \{\ 10146 .sp 1 10147 .\} 8816 10148 .fi 8817 .RE 8818 .sp 8819 .sp 8820 In this case, only members of the group "power_users" can create user defined shares\. 8821 .sp 8822 Default: 8823 \fI\fIusershare path\fR\fR\fI = \fR\fINULL\fR\fI \fR 10149 .fam 10150 .ps +1 10151 .if n \{\ 10152 .RE 10153 .\} 10154 .sp 10155 In this case, only members of the group "power_users" can create user defined shares\&. 10156 .sp 10157 Default: 10158 \fI\fIusershare path\fR\fR\fI = \fR\fI\FCNULL\F[]\fR\fI \fR 8824 10159 .RE 8825 10160 8826 10161 usershare prefix allow list (G) 8827 .PP 8828 .RS 4 8829 This parameter specifies a list of absolute pathnames the root of which are allowed to be exported by user defined share definitions\. If the pathname exported doesn\'t start with one of the strings in this list the user defined share will not be allowed\. This allows the Samba administrator to restrict the directories on the system that can be exported by user defined shares\. 8830 .sp 8831 If there is a "usershare prefix deny list" and also a "usershare prefix allow list" the deny list is processed first, followed by the allow list, thus leading to the most restrictive interpretation\. 8832 .sp 8833 Default: 8834 \fI\fIusershare prefix allow list\fR\fR\fI = \fR\fINULL\fR\fI \fR 8835 .sp 8836 Example: 8837 \fI\fIusershare prefix allow list\fR\fR\fI = \fR\fI/home /data /space\fR\fI \fR 10162 .\" usershare prefix allow list 10163 .PP 10164 .RS 4 10165 This parameter specifies a list of absolute pathnames the root of which are allowed to be exported by user defined share definitions\&. If the pathname exported doesn\'t start with one of the strings in this list the user defined share will not be allowed\&. This allows the Samba administrator to restrict the directories on the system that can be exported by user defined shares\&. 10166 .sp 10167 If there is a "usershare prefix deny list" and also a "usershare prefix allow list" the deny list is processed first, followed by the allow list, thus leading to the most restrictive interpretation\&. 10168 .sp 10169 Default: 10170 \fI\fIusershare prefix allow list\fR\fR\fI = \fR\fI\FCNULL\F[]\fR\fI \fR 10171 .sp 10172 Example: 10173 \fI\fIusershare prefix allow list\fR\fR\fI = \fR\fI\FC/home /data /space\F[]\fR\fI \fR 8838 10174 .RE 8839 10175 8840 10176 usershare prefix deny list (G) 8841 .PP 8842 .RS 4 8843 This parameter specifies a list of absolute pathnames the root of which are NOT allowed to be exported by user defined share definitions\. If the pathname exported starts with one of the strings in this list the user defined share will not be allowed\. Any pathname not starting with one of these strings will be allowed to be exported as a usershare\. This allows the Samba administrator to restrict the directories on the system that can be exported by user defined shares\. 8844 .sp 8845 If there is a "usershare prefix deny list" and also a "usershare prefix allow list" the deny list is processed first, followed by the allow list, thus leading to the most restrictive interpretation\. 8846 .sp 8847 Default: 8848 \fI\fIusershare prefix deny list\fR\fR\fI = \fR\fINULL\fR\fI \fR 8849 .sp 8850 Example: 8851 \fI\fIusershare prefix deny list\fR\fR\fI = \fR\fI/etc /dev /private\fR\fI \fR 10177 .\" usershare prefix deny list 10178 .PP 10179 .RS 4 10180 This parameter specifies a list of absolute pathnames the root of which are NOT allowed to be exported by user defined share definitions\&. If the pathname exported starts with one of the strings in this list the user defined share will not be allowed\&. Any pathname not starting with one of these strings will be allowed to be exported as a usershare\&. This allows the Samba administrator to restrict the directories on the system that can be exported by user defined shares\&. 10181 .sp 10182 If there is a "usershare prefix deny list" and also a "usershare prefix allow list" the deny list is processed first, followed by the allow list, thus leading to the most restrictive interpretation\&. 10183 .sp 10184 Default: 10185 \fI\fIusershare prefix deny list\fR\fR\fI = \fR\fI\FCNULL\F[]\fR\fI \fR 10186 .sp 10187 Example: 10188 \fI\fIusershare prefix deny list\fR\fR\fI = \fR\fI\FC/etc /dev /private\F[]\fR\fI \fR 8852 10189 .RE 8853 10190 8854 10191 usershare template share (G) 8855 .PP 8856 .RS 4 8857 User defined shares only have limited possible parameters such as path, guest ok etc\. This parameter allows usershares to "cloned" from an existing share\. If "usershare template share" is set to the name of an existing share, then all usershares created have their defaults set from the parameters set on this share\. 8858 .sp 8859 The target share may be set to be invalid for real file sharing by setting the parameter "\-valid = False" on the template share definition\. This causes it not to be seen as a real exported share but to be able to be used as a template for usershares\. 8860 .sp 8861 Default: 8862 \fI\fIusershare template share\fR\fR\fI = \fR\fINULL\fR\fI \fR 8863 .sp 8864 Example: 8865 \fI\fIusershare template share\fR\fR\fI = \fR\fItemplate_share\fR\fI \fR 10192 .\" usershare template share 10193 .PP 10194 .RS 4 10195 User defined shares only have limited possible parameters such as path, guest ok etc\&. This parameter allows usershares to "cloned" from an existing share\&. If "usershare template share" is set to the name of an existing share, then all usershares created have their defaults set from the parameters set on this share\&. 10196 .sp 10197 The target share may be set to be invalid for real file sharing by setting the parameter "\-valid = False" on the template share definition\&. This causes it not to be seen as a real exported share but to be able to be used as a template for usershares\&. 10198 .sp 10199 Default: 10200 \fI\fIusershare template share\fR\fR\fI = \fR\fI\FCNULL\F[]\fR\fI \fR 10201 .sp 10202 Example: 10203 \fI\fIusershare template share\fR\fR\fI = \fR\fI\FCtemplate_share\F[]\fR\fI \fR 8866 10204 .RE 8867 10205 8868 10206 use sendfile (S) 10207 .\" use sendfile 8869 10208 .PP 8870 10209 .RS 4 … … 8872 10211 \fByes\fR, and the 8873 10212 \fBsendfile()\fR 8874 system call is supported by the underlying operating system, then some SMB read calls (mainly ReadAndX and ReadRaw) will use the more efficient sendfile system call for files that are exclusively oplocked\ . This may make more efficient use of the system CPU\'s and cause Samba to be faster\. Samba automatically turns this off for clients that use protocol levels lower than NT LM 0\.12 and when it detects a client is Windows 9x (using sendfile from Linux will cause these clients to fail)\.8875 .sp 8876 Default: 8877 \fI\fIuse sendfile\fR\fR\fI = \fR\fI false\fR\fI \fR10213 system call is supported by the underlying operating system, then some SMB read calls (mainly ReadAndX and ReadRaw) will use the more efficient sendfile system call for files that are exclusively oplocked\&. This may make more efficient use of the system CPU\'s and cause Samba to be faster\&. Samba automatically turns this off for clients that use protocol levels lower than NT LM 0\&.12 and when it detects a client is Windows 9x (using sendfile from Linux will cause these clients to fail)\&. 10214 .sp 10215 Default: 10216 \fI\fIuse sendfile\fR\fR\fI = \fR\fI\FCfalse\F[]\fR\fI \fR 8878 10217 .RE 8879 10218 8880 10219 use spnego (G) 8881 .PP 8882 .RS 4 8883 This variable controls controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\. 8884 .sp 8885 Unless further issues are discovered with our SPNEGO implementation, there is no reason this should ever be disabled\. 8886 .sp 8887 Default: 8888 \fI\fIuse spnego\fR\fR\fI = \fR\fIyes\fR\fI \fR 10220 .\" use spnego 10221 .PP 10222 .RS 4 10223 This variable controls controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\&. 10224 .sp 10225 Unless further issues are discovered with our SPNEGO implementation, there is no reason this should ever be disabled\&. 10226 .sp 10227 Default: 10228 \fI\fIuse spnego\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 8889 10229 .RE 8890 10230 8891 10231 utmp directory (G) 10232 .\" utmp directory 8892 10233 .PP 8893 10234 .RS 4 8894 10235 This parameter is only available if Samba has been configured and compiled with the option 8895 \ -\-with\-utmp\. It specifies a directory pathname that is used to store the utmp or utmpx files (depending on the UNIX system) that record user connections to a Samba server\. By default this is not set, meaning the system will use whatever utmp file the native system is set to use (usually8896 \ fI/var/run/utmp\fR8897 on Linux)\ .8898 .sp 8899 Default: 8900 \fI\fIutmp directory\fR\fR\fI = \fR\fI # Determined automatically\fR\fI \fR8901 .sp 8902 Example: 8903 \fI\fIutmp directory\fR\fR\fI = \fR\fI /var/run/utmp\fR\fI \fR10236 \FC \-\-with\-utmp\F[]\&. It specifies a directory pathname that is used to store the utmp or utmpx files (depending on the UNIX system) that record user connections to a Samba server\&. By default this is not set, meaning the system will use whatever utmp file the native system is set to use (usually 10237 \FC/var/run/utmp\F[] 10238 on Linux)\&. 10239 .sp 10240 Default: 10241 \fI\fIutmp directory\fR\fR\fI = \fR\fI\FC # Determined automatically\F[]\fR\fI \fR 10242 .sp 10243 Example: 10244 \fI\fIutmp directory\fR\fR\fI = \fR\fI\FC/var/run/utmp\F[]\fR\fI \fR 8904 10245 .RE 8905 10246 8906 10247 utmp (G) 10248 .\" utmp 8907 10249 .PP 8908 10250 .RS 4 8909 10251 This boolean parameter is only available if Samba has been configured and compiled with the option 8910 \ -\-with\-utmp\. If set to10252 \FC\-\-with\-utmp\F[]\&. If set to 8911 10253 \fByes\fR 8912 then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server\ . Sites may use this to record the user connecting to a Samba share\.8913 .sp 8914 Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user\ . Enabling this option creates an n^2 algorithm to find this number\. This may impede performance on large installations\.8915 .sp 8916 Default: 8917 \fI\fIutmp\fR\fR\fI = \fR\fI no\fR\fI \fR10254 then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server\&. Sites may use this to record the user connecting to a Samba share\&. 10255 .sp 10256 Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user\&. Enabling this option creates an n^2 algorithm to find this number\&. This may impede performance on large installations\&. 10257 .sp 10258 Default: 10259 \fI\fIutmp\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 8918 10260 .RE 8919 10261 8920 10262 valid users (S) 8921 .PP 8922 .RS 4 8923 This is a list of users that should be allowed to login to this service\. Names starting with \'@\', \'+\' and \'&\' are interpreted using the same rules as described in the 10263 .\" valid users 10264 .PP 10265 .RS 4 10266 This is a list of users that should be allowed to login to this service\&. Names starting with \'@\', \'+\' and \'&\' are interpreted using the same rules as described in the 8924 10267 \fIinvalid users\fR 8925 parameter\ .8926 .sp 8927 If this is empty (the default) then any user can login\ . If a username is in both this list and the10268 parameter\&. 10269 .sp 10270 If this is empty (the default) then any user can login\&. If a username is in both this list and the 8928 10271 \fIinvalid users\fR 8929 list then access is denied for that user\ .10272 list then access is denied for that user\&. 8930 10273 .sp 8931 10274 The current servicename is substituted for 8932 \fI%S\fR\ . This is useful in the [homes] section\.8933 .sp 8934 Default: 8935 \fI\fIvalid users\fR\fR\fI = \fR\fI # No valid users list (anyone can login)\fR\fI \fR8936 .sp 8937 Example: 8938 \fI\fIvalid users\fR\fR\fI = \fR\fI greg, @pcusers\fR\fI \fR10275 \fI%S\fR\&. This is useful in the [homes] section\&. 10276 .sp 10277 Default: 10278 \fI\fIvalid users\fR\fR\fI = \fR\fI\FC # No valid users list (anyone can login) \F[]\fR\fI \fR 10279 .sp 10280 Example: 10281 \fI\fIvalid users\fR\fR\fI = \fR\fI\FCgreg, @pcusers\F[]\fR\fI \fR 8939 10282 .RE 8940 10283 8941 10284 \-valid (S) 8942 .PP 8943 .RS 4 8944 This parameter indicates whether a share is valid and thus can be used\. When this parameter is set to false, the share will be in no way visible nor accessible\. 8945 .sp 8946 This option should not be used by regular users but might be of help to developers\. Samba uses this option internally to mark shares as deleted\. 8947 .sp 8948 Default: 8949 \fI\fI\-valid\fR\fR\fI = \fR\fIyes\fR\fI \fR 10285 .\" -valid 10286 .PP 10287 .RS 4 10288 This parameter indicates whether a share is valid and thus can be used\&. When this parameter is set to false, the share will be in no way visible nor accessible\&. 10289 .sp 10290 This option should not be used by regular users but might be of help to developers\&. Samba uses this option internally to mark shares as deleted\&. 10291 .sp 10292 Default: 10293 \fI\fI\-valid\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 8950 10294 .RE 8951 10295 8952 10296 veto files (S) 8953 .PP 8954 .RS 4 8955 This is a list of files and directories that are neither visible nor accessible\. Each entry in the list must be separated by a \'/\', which allows spaces to be included in the entry\. \'*\' and \'?\' can be used to specify multiple files or directories as in DOS wildcards\. 10297 .\" veto files 10298 .PP 10299 .RS 4 10300 This is a list of files and directories that are neither visible nor accessible\&. Each entry in the list must be separated by a \'/\', which allows spaces to be included in the entry\&. \'*\' and \'?\' can be used to specify multiple files or directories as in DOS wildcards\&. 8956 10301 .sp 8957 10302 Each entry must be a unix path, not a DOS path and must 8958 10303 \fInot\fR 8959 include the unix directory separator \'/\'\ .10304 include the unix directory separator \'/\'\&. 8960 10305 .sp 8961 10306 Note that the 8962 \ fIcase sensitive\fR8963 option is applicable in vetoing files\ .8964 .sp 8965 One feature of the veto files parameter that it is important to be aware of is Samba\'s behaviour when trying to delete a directory\ . If a directory that is to be deleted contains nothing but veto files this deletion will10307 \m[blue]\fBcase sensitive\fR\m[] 10308 option is applicable in vetoing files\&. 10309 .sp 10310 One feature of the veto files parameter that it is important to be aware of is Samba\'s behaviour when trying to delete a directory\&. If a directory that is to be deleted contains nothing but veto files this deletion will 8966 10311 \fIfail\fR 8967 10312 unless you also set the 8968 \ fIdelete veto files\fR10313 \m[blue]\fBdelete veto files\fR\m[] 8969 10314 parameter to 8970 \fIyes\fR\ .8971 .sp 8972 Setting this parameter will affect the performance of Samba, as it will be forced to check all files and directories for a match as they are scanned\ .10315 \fIyes\fR\&. 10316 .sp 10317 Setting this parameter will affect the performance of Samba, as it will be forced to check all files and directories for a match as they are scanned\&. 8973 10318 .sp 8974 10319 Examples of use include: 8975 10320 .sp 8976 .RS 4 10321 .if n \{\ 10322 .RS 4 10323 .\} 10324 .fam C 10325 .ps -1 8977 10326 .nf 10327 .if t \{\ 10328 .sp -1 10329 .\} 10330 .BB lightgray adjust-for-leading-newline 10331 .sp -1 10332 8978 10333 ; Veto any files containing the word Security, 8979 ; any ending in \ .tmp, and any directory containing the8980 ; word root\ .8981 veto files = /*Security*/*\ .tmp/*root*/10334 ; any ending in \&.tmp, and any directory containing the 10335 ; word root\&. 10336 veto files = /*Security*/*\&.tmp/*root*/ 8982 10337 8983 10338 ; Veto the Apple specific files that a NetAtalk server 8984 ; creates\. 8985 veto files = /\.AppleDouble/\.bin/\.AppleDesktop/Network Trash Folder/ 10339 ; creates\&. 10340 veto files = /\&.AppleDouble/\&.bin/\&.AppleDesktop/Network Trash Folder/ 10341 .EB lightgray adjust-for-leading-newline 10342 .if t \{\ 10343 .sp 1 10344 .\} 8986 10345 .fi 8987 .RE 8988 .sp 8989 .sp 8990 Default: 8991 \fI\fIveto files\fR\fR\fI = \fR\fINo files or directories are vetoed\.\fR\fI \fR 10346 .fam 10347 .ps +1 10348 .if n \{\ 10349 .RE 10350 .\} 10351 .sp 10352 Default: 10353 \fI\fIveto files\fR\fR\fI = \fR\fI\FCNo files or directories are vetoed\&.\F[]\fR\fI \fR 8992 10354 .RE 8993 10355 8994 10356 veto oplock files (S) 10357 .\" veto oplock files 8995 10358 .PP 8996 10359 .RS 4 8997 10360 This parameter is only valid when the 8998 \ fIoplocks\fR8999 parameter is turned on for a share\ . It allows the Samba administrator to selectively turn off the granting of oplocks on selected files that match a wildcarded list, similar to the wildcarded list used in the9000 \ fIveto files\fR9001 parameter\ .9002 .sp 9003 You might want to do this on files that you know will be heavily contended for by clients\ . A good example of this is in the NetBench SMB benchmark program, which causes heavy client contention for files ending in9004 \ fI\.SEM\fR\. To cause Samba not to grant oplocks on these files you would use the line (either in the [global] section or in the section for the particular NetBench share\.10361 \m[blue]\fBoplocks\fR\m[] 10362 parameter is turned on for a share\&. It allows the Samba administrator to selectively turn off the granting of oplocks on selected files that match a wildcarded list, similar to the wildcarded list used in the 10363 \m[blue]\fBveto files\fR\m[] 10364 parameter\&. 10365 .sp 10366 You might want to do this on files that you know will be heavily contended for by clients\&. A good example of this is in the NetBench SMB benchmark program, which causes heavy client contention for files ending in 10367 \FC\&.SEM\F[]\&. To cause Samba not to grant oplocks on these files you would use the line (either in the [global] section or in the section for the particular NetBench share\&. 9005 10368 .sp 9006 10369 An example of use is: 9007 10370 .sp 9008 .RS 4 10371 .if n \{\ 10372 .RS 4 10373 .\} 10374 .fam C 10375 .ps -1 9009 10376 .nf 9010 veto oplock files = /\.*SEM/ 10377 .if t \{\ 10378 .sp -1 10379 .\} 10380 .BB lightgray adjust-for-leading-newline 10381 .sp -1 10382 10383 veto oplock files = /\&.*SEM/ 10384 .EB lightgray adjust-for-leading-newline 10385 .if t \{\ 10386 .sp 1 10387 .\} 9011 10388 .fi 9012 .RE 9013 .sp 9014 .sp 9015 Default: 9016 \fI\fIveto oplock files\fR\fR\fI = \fR\fI # No files are vetoed for oplock grants\fR\fI \fR 10389 .fam 10390 .ps +1 10391 .if n \{\ 10392 .RE 10393 .\} 10394 .sp 10395 Default: 10396 \fI\fIveto oplock files\fR\fR\fI = \fR\fI\FC # No files are vetoed for oplock grants\F[]\fR\fI \fR 9017 10397 .RE 9018 10398 9019 10399 vfs object 10400 .\" vfs object 9020 10401 .PP 9021 10402 .RS 4 9022 10403 This parameter is a synonym for 9023 vfs objects\ .10404 vfs objects\&. 9024 10405 .RE 9025 10406 9026 10407 vfs objects (S) 9027 .PP 9028 .RS 4 9029 This parameter specifies the backend names which are used for Samba VFS I/O operations\. By default, normal disk I/O operations are used but these can be overloaded with one or more VFS objects\. 9030 .sp 9031 Default: 9032 \fI\fIvfs objects\fR\fR\fI = \fR\fI\fR\fI \fR 9033 .sp 9034 Example: 9035 \fI\fIvfs objects\fR\fR\fI = \fR\fIextd_audit recycle\fR\fI \fR 10408 .\" vfs objects 10409 .PP 10410 .RS 4 10411 This parameter specifies the backend names which are used for Samba VFS I/O operations\&. By default, normal disk I/O operations are used but these can be overloaded with one or more VFS objects\&. 10412 .sp 10413 Default: 10414 \fI\fIvfs objects\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 10415 .sp 10416 Example: 10417 \fI\fIvfs objects\fR\fR\fI = \fR\fI\FCextd_audit recycle\F[]\fR\fI \fR 9036 10418 .RE 9037 10419 9038 10420 volume (S) 9039 .PP 9040 .RS 4 9041 This allows you to override the volume label returned for a share\. Useful for CDROMs with installation programs that insist on a particular volume label\. 9042 .sp 9043 Default: 9044 \fI\fIvolume\fR\fR\fI = \fR\fI # the name of the share\fR\fI \fR 10421 .\" volume 10422 .PP 10423 .RS 4 10424 This allows you to override the volume label returned for a share\&. Useful for CDROMs with installation programs that insist on a particular volume label\&. 10425 .sp 10426 Default: 10427 \fI\fIvolume\fR\fR\fI = \fR\fI\FC # the name of the share\F[]\fR\fI \fR 9045 10428 .RE 9046 10429 9047 10430 wide links (S) 9048 .PP 9049 .RS 4 9050 This parameter controls whether or not links in the UNIX file system may be followed by the server\. Links that point to areas within the directory tree exported by the server are always allowed; this parameter controls access only to areas that are outside the directory tree being exported\. 9051 .sp 9052 Note that setting this parameter can have a negative effect on your server performance due to the extra system calls that Samba has to do in order to perform the link checks\. 9053 .sp 9054 Default: 9055 \fI\fIwide links\fR\fR\fI = \fR\fIyes\fR\fI \fR 10431 .\" wide links 10432 .PP 10433 .RS 4 10434 This parameter controls whether or not links in the UNIX file system may be followed by the server\&. Links that point to areas within the directory tree exported by the server are always allowed; this parameter controls access only to areas that are outside the directory tree being exported\&. 10435 .sp 10436 Note that setting this parameter can have a negative effect on your server performance due to the extra system calls that Samba has to do in order to perform the link checks\&. 10437 .sp 10438 Default: 10439 \fI\fIwide links\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 9056 10440 .RE 9057 10441 9058 10442 winbind cache time (G) 10443 .\" winbind cache time 9059 10444 .PP 9060 10445 .RS 4 9061 10446 This parameter specifies the number of seconds the 9062 10447 \fBwinbindd\fR(8) 9063 daemon will cache user and group information before querying a Windows NT server again\ .10448 daemon will cache user and group information before querying a Windows NT server again\&. 9064 10449 .sp 9065 10450 This does not apply to authentication requests, these are always evaluated in real time unless the 9066 \ fIwinbind offline logon\fR9067 option has been enabled\ .9068 .sp 9069 Default: 9070 \fI\fIwinbind cache time\fR\fR\fI = \fR\fI 300\fR\fI \fR10451 \m[blue]\fBwinbind offline logon\fR\m[] 10452 option has been enabled\&. 10453 .sp 10454 Default: 10455 \fI\fIwinbind cache time\fR\fR\fI = \fR\fI\FC300\F[]\fR\fI \fR 9071 10456 .RE 9072 10457 9073 10458 winbind enum groups (G) 10459 .\" winbind enum groups 9074 10460 .PP 9075 10461 .RS 4 … … 9077 10463 \fBwinbindd\fR(8) 9078 10464 it may be necessary to suppress the enumeration of groups through the 9079 setgrent(),9080 getgrent() 10465 \FCsetgrent()\F[], 10466 \FCgetgrent()\F[] 9081 10467 and 9082 endgrent() 9083 group of system calls\ . If the10468 \FCendgrent()\F[] 10469 group of system calls\&. If the 9084 10470 \fIwinbind enum groups\fR 9085 10471 parameter is 9086 10472 \fBno\fR, calls to the 9087 getgrent() 9088 system call will not return any data\. 9089 .sp 10473 \FCgetgrent()\F[] 10474 system call will not return any data\&. 10475 .if n \{\ 10476 .sp 10477 .\} 10478 .RS 4 10479 .BM yellow 9090 10480 .it 1 an-trap 9091 10481 .nr an-no-space-flag 1 9092 10482 .nr an-break-flag 1 9093 10483 .br 9094 Warning 9095 Turning off group enumeration may cause some programs to behave oddly\. 9096 9097 Default: 9098 \fI\fIwinbind enum groups\fR\fR\fI = \fR\fIno\fR\fI \fR 10484 .ps +1 10485 \fBWarning\fR 10486 .ps -1 10487 .br 10488 Turning off group enumeration may cause some programs to behave oddly\&. 10489 .sp .5v 10490 .EM yellow 10491 .RE 10492 Default: 10493 \fI\fIwinbind enum groups\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 9099 10494 .RE 9100 10495 9101 10496 winbind enum users (G) 10497 .\" winbind enum users 9102 10498 .PP 9103 10499 .RS 4 … … 9105 10501 \fBwinbindd\fR(8) 9106 10502 it may be necessary to suppress the enumeration of users through the 9107 setpwent(),9108 getpwent() 10503 \FCsetpwent()\F[], 10504 \FCgetpwent()\F[] 9109 10505 and 9110 endpwent() 9111 group of system calls\ . If the10506 \FCendpwent()\F[] 10507 group of system calls\&. If the 9112 10508 \fIwinbind enum users\fR 9113 10509 parameter is 9114 10510 \fBno\fR, calls to the 9115 getpwent 9116 system call will not return any data\. 9117 .sp 10511 \FCgetpwent\F[] 10512 system call will not return any data\&. 10513 .if n \{\ 10514 .sp 10515 .\} 10516 .RS 4 10517 .BM yellow 9118 10518 .it 1 an-trap 9119 10519 .nr an-no-space-flag 1 9120 10520 .nr an-break-flag 1 9121 10521 .br 9122 Warning 9123 Turning off user enumeration may cause some programs to behave oddly\. For example, the finger program relies on having access to the full user list when searching for matching usernames\. 9124 9125 Default: 9126 \fI\fIwinbind enum users\fR\fR\fI = \fR\fIno\fR\fI \fR 10522 .ps +1 10523 \fBWarning\fR 10524 .ps -1 10525 .br 10526 Turning off user enumeration may cause some programs to behave oddly\&. For example, the finger program relies on having access to the full user list when searching for matching usernames\&. 10527 .sp .5v 10528 .EM yellow 10529 .RE 10530 Default: 10531 \fI\fIwinbind enum users\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 9127 10532 .RE 9128 10533 9129 10534 winbind expand groups (G) 9130 .PP 9131 .RS 4 9132 This option controls the maximum depth that winbindd will traverse when flattening nested group memberships of Windows domain groups\. This is different from the 9133 \fIwinbind nested groups\fR 9134 option which implements the Windows NT4 model of local group nesting\. The "winbind expand groups" parameter specifically applies to the membership of domain groups\. 9135 .sp 9136 Be aware that a high value for this parameter can result in system slowdown as the main parent winbindd daemon must perform the group unrolling and will be unable to answer incoming NSS or authentication requests during this time\. 9137 .sp 9138 Default: 9139 \fI\fIwinbind expand groups\fR\fR\fI = \fR\fI1\fR\fI \fR 10535 .\" winbind expand groups 10536 .PP 10537 .RS 4 10538 This option controls the maximum depth that winbindd will traverse when flattening nested group memberships of Windows domain groups\&. This is different from the 10539 \m[blue]\fBwinbind nested groups\fR\m[] 10540 option which implements the Windows NT4 model of local group nesting\&. The "winbind expand groups" parameter specifically applies to the membership of domain groups\&. 10541 .sp 10542 Be aware that a high value for this parameter can result in system slowdown as the main parent winbindd daemon must perform the group unrolling and will be unable to answer incoming NSS or authentication requests during this time\&. 10543 .sp 10544 Default: 10545 \fI\fIwinbind expand groups\fR\fR\fI = \fR\fI\FC1\F[]\fR\fI \fR 9140 10546 .RE 9141 10547 9142 10548 winbind nested groups (G) 9143 .PP 9144 .RS 4 9145 If set to yes, this parameter activates the support for nested groups\. Nested groups are also called local groups or aliases\. They work like their counterparts in Windows: Nested groups are defined locally on any machine (they are shared between DC\'s through their SAM) and can contain users and global groups from any trusted SAM\. To be able to use nested groups, you need to run nss_winbind\. 9146 .sp 9147 Default: 9148 \fI\fIwinbind nested groups\fR\fR\fI = \fR\fIyes\fR\fI \fR 10549 .\" winbind nested groups 10550 .PP 10551 .RS 4 10552 If set to yes, this parameter activates the support for nested groups\&. Nested groups are also called local groups or aliases\&. They work like their counterparts in Windows: Nested groups are defined locally on any machine (they are shared between DC\'s through their SAM) and can contain users and global groups from any trusted SAM\&. To be able to use nested groups, you need to run nss_winbind\&. 10553 .sp 10554 Default: 10555 \fI\fIwinbind nested groups\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 9149 10556 .RE 9150 10557 9151 10558 winbind normalize names (G) 9152 .PP 9153 .RS 4 9154 This parameter controls whether winbindd will replace whitespace in user and group names with an underscore (_) character\. For example, whether the name "Space Kadet" should be replaced with the string "space_kadet"\. Frequently Unix shell scripts will have difficulty with usernames contains whitespace due to the default field separator in the shell\. Do not enable this option if the underscore character is used in account names within your domain 9155 .sp 9156 Default: 9157 \fI\fIwinbind normalize names\fR\fR\fI = \fR\fIno\fR\fI \fR 9158 .sp 9159 Example: 9160 \fI\fIwinbind normalize names\fR\fR\fI = \fR\fIyes\fR\fI \fR 10559 .\" winbind normalize names 10560 .PP 10561 .RS 4 10562 This parameter controls whether winbindd will replace whitespace in user and group names with an underscore (_) character\&. For example, whether the name "Space Kadet" should be replaced with the string "space_kadet"\&. Frequently Unix shell scripts will have difficulty with usernames contains whitespace due to the default field separator in the shell\&. Do not enable this option if the underscore character is used in account names within your domain 10563 .sp 10564 Default: 10565 \fI\fIwinbind normalize names\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 10566 .sp 10567 Example: 10568 \fI\fIwinbind normalize names\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 9161 10569 .RE 9162 10570 9163 10571 winbind nss info (G) 9164 .PP 9165 .RS 4 9166 This parameter is designed to control how Winbind retrieves Name Service Information to construct a user\'s home directory and login shell\. Currently the following settings are available: 10572 .\" winbind nss info 10573 .PP 10574 .RS 4 10575 This parameter is designed to control how Winbind retrieves Name Service Information to construct a user\'s home directory and login shell\&. Currently the following settings are available: 9167 10576 .sp 9168 10577 .RS 4 … … 9190 10599 .\} 9191 10600 \fI<sfu | rfc2307 >\fR 9192 \- When Samba is running in security = ads and your Active Directory Domain Controller does support the Microsoft "Services for Unix" (SFU) LDAP schema, winbind can retrieve the login shell and the home directory attributes directly from your Directory Server\ . Note that retrieving UID and GID from your ADS\-Server requires to use10601 \- When Samba is running in security = ads and your Active Directory Domain Controller does support the Microsoft "Services for Unix" (SFU) LDAP schema, winbind can retrieve the login shell and the home directory attributes directly from your Directory Server\&. Note that retrieving UID and GID from your ADS\-Server requires to use 9193 10602 \fIidmap backend\fR 9194 10603 = ad or 9195 10604 \fIidmap config DOMAIN:backend\fR 9196 = ad as well\ .9197 .sp 9198 .RE 9199 .sp 9200 Default: 9201 \fI\fIwinbind nss info\fR\fR\fI = \fR\fI template\fR\fI \fR9202 .sp 9203 Example: 9204 \fI\fIwinbind nss info\fR\fR\fI = \fR\fI template sfu\fR\fI \fR10605 = ad as well\&. 10606 .sp 10607 .RE 10608 .sp 10609 Default: 10610 \fI\fIwinbind nss info\fR\fR\fI = \fR\fI\FCtemplate\F[]\fR\fI \fR 10611 .sp 10612 Example: 10613 \fI\fIwinbind nss info\fR\fR\fI = \fR\fI\FCtemplate sfu\F[]\fR\fI \fR 9205 10614 .RE 9206 10615 9207 10616 winbind offline logon (G) 10617 .\" winbind offline logon 9208 10618 .PP 9209 10619 .RS 4 9210 10620 This parameter is designed to control whether Winbind should allow to login with the 9211 10621 \fIpam_winbind\fR 9212 module using Cached Credentials\ . If enabled, winbindd will store user credentials from successful logins encrypted in a local cache\.9213 .sp 9214 Default: 9215 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fI false\fR\fI \fR9216 .sp 9217 Example: 9218 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fI true\fR\fI \fR10622 module using Cached Credentials\&. If enabled, winbindd will store user credentials from successful logins encrypted in a local cache\&. 10623 .sp 10624 Default: 10625 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fI\FCfalse\F[]\fR\fI \fR 10626 .sp 10627 Example: 10628 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fI\FCtrue\F[]\fR\fI \fR 9219 10629 .RE 9220 10630 9221 10631 winbind refresh tickets (G) 10632 .\" winbind refresh tickets 9222 10633 .PP 9223 10634 .RS 4 9224 10635 This parameter is designed to control whether Winbind should refresh Kerberos Tickets retrieved using the 9225 10636 \fIpam_winbind\fR 9226 module\ .9227 .sp 9228 Default: 9229 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fI false\fR\fI \fR9230 .sp 9231 Example: 9232 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fI true\fR\fI \fR10637 module\&. 10638 .sp 10639 Default: 10640 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fI\FCfalse\F[]\fR\fI \fR 10641 .sp 10642 Example: 10643 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fI\FCtrue\F[]\fR\fI \fR 9233 10644 .RE 9234 10645 9235 10646 winbind rpc only (G) 10647 .\" winbind rpc only 9236 10648 .PP 9237 10649 .RS 4 9238 10650 Setting this parameter to 9239 yes 9240 forces winbindd to use RPC instead of LDAP to retrieve information from Domain Controllers\ .9241 .sp 9242 Default: 9243 \fI\fIwinbind rpc only\fR\fR\fI = \fR\fI no\fR\fI \fR10651 \FCyes\F[] 10652 forces winbindd to use RPC instead of LDAP to retrieve information from Domain Controllers\&. 10653 .sp 10654 Default: 10655 \fI\fIwinbind rpc only\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 9244 10656 .RE 9245 10657 9246 10658 winbind separator (G) 10659 .\" winbind separator 9247 10660 .PP 9248 10661 .RS 4 9249 10662 This parameter allows an admin to define the character used when listing a username of the form of 9250 \fIDOMAIN \fR\e\fIuser\fR\ . This parameter is only applicable when using the9251 \ fIpam_winbind\.so\fR10663 \fIDOMAIN \fR\e\fIuser\fR\&. This parameter is only applicable when using the 10664 \FCpam_winbind\&.so\F[] 9252 10665 and 9253 \ fInss_winbind\.so\fR9254 modules for UNIX services\ .9255 .sp 9256 Please note that setting this parameter to + causes problems with group membership at least on glibc systems, as the character + is used as a special character for NIS in /etc/group\ .9257 .sp 9258 Default: 9259 \fI\fIwinbind separator\fR\fR\fI = \fR\fI\ '\e\'\fR\fI \fR9260 .sp 9261 Example: 9262 \fI\fIwinbind separator\fR\fR\fI = \fR\fI +\fR\fI \fR10666 \FCnss_winbind\&.so\F[] 10667 modules for UNIX services\&. 10668 .sp 10669 Please note that setting this parameter to + causes problems with group membership at least on glibc systems, as the character + is used as a special character for NIS in /etc/group\&. 10670 .sp 10671 Default: 10672 \fI\fIwinbind separator\fR\fR\fI = \fR\fI\FC\'\e\'\F[]\fR\fI \fR 10673 .sp 10674 Example: 10675 \fI\fIwinbind separator\fR\fR\fI = \fR\fI\FC+\F[]\fR\fI \fR 9263 10676 .RE 9264 10677 9265 10678 winbind trusted domains only (G) 9266 .PP 9267 .RS 4 9268 This parameter is designed to allow Samba servers that are members of a Samba controlled domain to use UNIX accounts distributed via NIS, rsync, or LDAP as the uid\'s for winbindd users in the hosts primary domain\. Therefore, the user 9269 DOMAIN\euser1 9270 would be mapped to the account user1 in /etc/passwd instead of allocating a new uid for him or her\. 9271 .sp 9272 This parameter is now deprecated in favor of the newer idmap_nss backend\. Refer to the 9273 \fIidmap domains\fR 9274 smb\.conf option and the 10679 .\" winbind trusted domains only 10680 .PP 10681 .RS 4 10682 This parameter is designed to allow Samba servers that are members of a Samba controlled domain to use UNIX accounts distributed via NIS, rsync, or LDAP as the uid\'s for winbindd users in the hosts primary domain\&. Therefore, the user 10683 \FCDOMAIN\euser1\F[] 10684 would be mapped to the account user1 in /etc/passwd instead of allocating a new uid for him or her\&. 10685 .sp 10686 This parameter is now deprecated in favor of the newer idmap_nss backend\&. Refer to the 10687 \m[blue]\fBidmap domains\fR\m[] 10688 smb\&.conf option and the 9275 10689 \fBidmap_nss\fR(8) 9276 man page for more information\ .9277 .sp 9278 Default: 9279 \fI\fIwinbind trusted domains only\fR\fR\fI = \fR\fI no\fR\fI \fR10690 man page for more information\&. 10691 .sp 10692 Default: 10693 \fI\fIwinbind trusted domains only\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 9280 10694 .RE 9281 10695 9282 10696 winbind use default domain (G) 10697 .\" winbind use default domain 9283 10698 .PP 9284 10699 .RS 4 9285 10700 This parameter specifies whether the 9286 10701 \fBwinbindd\fR(8) 9287 daemon should operate on users without domain component in their username\ . Users without a domain component are treated as is part of the winbindd server\'s own domain\. While this does not benifit Windows users, it makes SSH, FTP and e\-mail function in a way much closer to the way they would in a native unix system\.9288 .sp 9289 Default: 9290 \fI\fIwinbind use default domain\fR\fR\fI = \fR\fI no\fR\fI \fR9291 .sp 9292 Example: 9293 \fI\fIwinbind use default domain\fR\fR\fI = \fR\fI yes\fR\fI \fR10702 daemon should operate on users without domain component in their username\&. Users without a domain component are treated as is part of the winbindd server\'s own domain\&. While this does not benifit Windows users, it makes SSH, FTP and e\-mail function in a way much closer to the way they would in a native unix system\&. 10703 .sp 10704 Default: 10705 \fI\fIwinbind use default domain\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 10706 .sp 10707 Example: 10708 \fI\fIwinbind use default domain\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 9294 10709 .RE 9295 10710 9296 10711 wins hook (G) 9297 .PP 9298 .RS 4 9299 When Samba is running as a WINS server this allows you to call an external program for all changes to the WINS database\. The primary use for this option is to allow the dynamic update of external name resolution databases such as dynamic DNS\. 10712 .\" wins hook 10713 .PP 10714 .RS 4 10715 When Samba is running as a WINS server this allows you to call an external program for all changes to the WINS database\&. The primary use for this option is to allow the dynamic update of external name resolution databases such as dynamic DNS\&. 9300 10716 .sp 9301 10717 The wins hook parameter specifies the name of a script or executable that will be called as follows: 9302 10718 .sp 9303 wins_hook operation name nametype ttl IP_list 9304 .sp 9305 .RS 4 9306 .ie n \{\ 9307 \h'-04'\(bu\h'+03'\c 9308 .\} 9309 .el \{\ 9310 .sp -1 9311 .IP \(bu 2.3 9312 .\} 9313 The first argument is the operation and is one of "add", "delete", or "refresh"\ . In most cases the operation can be ignored as the rest of the parameters provide sufficient information\. Note that "refresh" may sometimes be called when the name has not previously been added, in that case it should be treated as an add\.9314 .RE 9315 .sp 9316 .RS 4 9317 .ie n \{\ 9318 \h'-04'\(bu\h'+03'\c 9319 .\} 9320 .el \{\ 9321 .sp -1 9322 .IP \(bu 2.3 9323 .\} 9324 The second argument is the NetBIOS name\ . If the name is not a legal name then the wins hook is not called\. Legal names contain only letters, digits, hyphens, underscores and periods\.9325 .RE 9326 .sp 9327 .RS 4 9328 .ie n \{\ 9329 \h'-04'\(bu\h'+03'\c 9330 .\} 9331 .el \{\ 9332 .sp -1 9333 .IP \(bu 2.3 9334 .\} 9335 The third argument is the NetBIOS name type as a 2 digit hexadecimal number\ .9336 .RE 9337 .sp 9338 .RS 4 9339 .ie n \{\ 9340 \h'-04'\(bu\h'+03'\c 9341 .\} 9342 .el \{\ 9343 .sp -1 9344 .IP \(bu 2.3 9345 .\} 9346 The fourth argument is the TTL (time to live) for the name in seconds\ .9347 .RE 9348 .sp 9349 .RS 4 9350 .ie n \{\ 9351 \h'-04'\(bu\h'+03'\c 9352 .\} 9353 .el \{\ 9354 .sp -1 9355 .IP \(bu 2.3 9356 .\} 9357 The fifth and subsequent arguments are the IP addresses currently registered for that name\ . If this list is empty then the name should be deleted\.10719 \FCwins_hook operation name nametype ttl IP_list\F[] 10720 .sp 10721 .RS 4 10722 .ie n \{\ 10723 \h'-04'\(bu\h'+03'\c 10724 .\} 10725 .el \{\ 10726 .sp -1 10727 .IP \(bu 2.3 10728 .\} 10729 The first argument is the operation and is one of "add", "delete", or "refresh"\&. In most cases the operation can be ignored as the rest of the parameters provide sufficient information\&. Note that "refresh" may sometimes be called when the name has not previously been added, in that case it should be treated as an add\&. 10730 .RE 10731 .sp 10732 .RS 4 10733 .ie n \{\ 10734 \h'-04'\(bu\h'+03'\c 10735 .\} 10736 .el \{\ 10737 .sp -1 10738 .IP \(bu 2.3 10739 .\} 10740 The second argument is the NetBIOS name\&. If the name is not a legal name then the wins hook is not called\&. Legal names contain only letters, digits, hyphens, underscores and periods\&. 10741 .RE 10742 .sp 10743 .RS 4 10744 .ie n \{\ 10745 \h'-04'\(bu\h'+03'\c 10746 .\} 10747 .el \{\ 10748 .sp -1 10749 .IP \(bu 2.3 10750 .\} 10751 The third argument is the NetBIOS name type as a 2 digit hexadecimal number\&. 10752 .RE 10753 .sp 10754 .RS 4 10755 .ie n \{\ 10756 \h'-04'\(bu\h'+03'\c 10757 .\} 10758 .el \{\ 10759 .sp -1 10760 .IP \(bu 2.3 10761 .\} 10762 The fourth argument is the TTL (time to live) for the name in seconds\&. 10763 .RE 10764 .sp 10765 .RS 4 10766 .ie n \{\ 10767 \h'-04'\(bu\h'+03'\c 10768 .\} 10769 .el \{\ 10770 .sp -1 10771 .IP \(bu 2.3 10772 .\} 10773 The fifth and subsequent arguments are the IP addresses currently registered for that name\&. If this list is empty then the name should be deleted\&. 9358 10774 .sp 9359 10775 .RE 9360 10776 An example script that calls the BIND dynamic DNS update program 9361 nsupdate 9362 is provided in the examples directory of the Samba source code\ .10777 \FCnsupdate\F[] 10778 is provided in the examples directory of the Samba source code\&. 9363 10779 .sp 9364 10780 \fINo default\fR … … 9366 10782 9367 10783 wins proxy (G) 10784 .\" wins proxy 9368 10785 .PP 9369 10786 .RS 4 9370 10787 This is a boolean that controls if 9371 10788 \fBnmbd\fR(8) 9372 will respond to broadcast name queries on behalf of other hosts\ . You may need to set this to10789 will respond to broadcast name queries on behalf of other hosts\&. You may need to set this to 9373 10790 \fByes\fR 9374 for some older clients\ .9375 .sp 9376 Default: 9377 \fI\fIwins proxy\fR\fR\fI = \fR\fI no\fR\fI \fR10791 for some older clients\&. 10792 .sp 10793 Default: 10794 \fI\fIwins proxy\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 9378 10795 .RE 9379 10796 9380 10797 wins server (G) 10798 .\" wins server 9381 10799 .PP 9382 10800 .RS 4 9383 10801 This specifies the IP address (or DNS name: IP address for preference) of the WINS server that 9384 10802 \fBnmbd\fR(8) 9385 should register with\. If you have a WINS server on your network then you should set this to the WINS server\'s IP\. 9386 .sp 9387 You should point this at your WINS server if you have a multi\-subnetted network\. 9388 .sp 9389 If you want to work in multiple namespaces, you can give every wins server a \'tag\'\. For each tag, only one (working) server will be queried for a name\. The tag should be separated from the ip address by a colon\. 9390 .sp 10803 should register with\&. If you have a WINS server on your network then you should set this to the WINS server\'s IP\&. 10804 .sp 10805 You should point this at your WINS server if you have a multi\-subnetted network\&. 10806 .sp 10807 If you want to work in multiple namespaces, you can give every wins server a \'tag\'\&. For each tag, only one (working) server will be queried for a name\&. The tag should be separated from the ip address by a colon\&. 10808 .if n \{\ 10809 .sp 10810 .\} 10811 .RS 4 10812 .BM yellow 9391 10813 .it 1 an-trap 9392 10814 .nr an-no-space-flag 1 9393 10815 .nr an-break-flag 1 9394 10816 .br 9395 Note 9396 You need to set up Samba to point to a WINS server if you have multiple subnets and wish cross\-subnet browsing to work correctly\. 9397 9398 See the chapter in the Samba3\-HOWTO on Network Browsing\. 9399 .sp 9400 Default: 9401 \fI\fIwins server\fR\fR\fI = \fR\fI\fR\fI \fR 9402 .sp 9403 Example: 9404 \fI\fIwins server\fR\fR\fI = \fR\fImary:192\.9\.200\.1 fred:192\.168\.3\.199 mary:192\.168\.2\.61 # For this example when querying a certain name, 192\.19\.200\.1 will be asked first and if that doesn\'t respond 192\.168\.2\.61\. If either of those doesn\'t know the name 192\.168\.3\.199 will be queried\.\fR\fI \fR 9405 .sp 9406 Example: 9407 \fI\fIwins server\fR\fR\fI = \fR\fI192\.9\.200\.1 192\.168\.2\.61\fR\fI \fR 10817 .ps +1 10818 \fBNote\fR 10819 .ps -1 10820 .br 10821 You need to set up Samba to point to a WINS server if you have multiple subnets and wish cross\-subnet browsing to work correctly\&. 10822 .sp .5v 10823 .EM yellow 10824 .RE 10825 See the chapter in the Samba3\-HOWTO on Network Browsing\&. 10826 .sp 10827 Default: 10828 \fI\fIwins server\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 10829 .sp 10830 Example: 10831 \fI\fIwins server\fR\fR\fI = \fR\fI\FCmary:192\&.9\&.200\&.1 fred:192\&.168\&.3\&.199 mary:192\&.168\&.2\&.61 # For this example when querying a certain name, 192\&.19\&.200\&.1 will be asked first and if that doesn\'t respond 192\&.168\&.2\&.61\&. If either of those doesn\'t know the name 192\&.168\&.3\&.199 will be queried\&.\F[]\fR\fI \fR 10832 .sp 10833 Example: 10834 \fI\fIwins server\fR\fR\fI = \fR\fI\FC192\&.9\&.200\&.1 192\&.168\&.2\&.61\F[]\fR\fI \fR 9408 10835 .RE 9409 10836 9410 10837 wins support (G) 10838 .\" wins support 9411 10839 .PP 9412 10840 .RS 4 9413 10841 This boolean controls if the 9414 10842 \fBnmbd\fR(8) 9415 process in Samba will act as a WINS server\ . You should not set this to10843 process in Samba will act as a WINS server\&. You should not set this to 9416 10844 \fByes\fR 9417 10845 unless you have a multi\-subnetted network and you wish a particular 9418 nmbd 9419 to be your WINS server\ . Note that you should10846 \FCnmbd\F[] 10847 to be your WINS server\&. Note that you should 9420 10848 \fINEVER\fR 9421 10849 set this to 9422 10850 \fByes\fR 9423 on more than one machine in your network\ .9424 .sp 9425 Default: 9426 \fI\fIwins support\fR\fR\fI = \fR\fI no\fR\fI \fR10851 on more than one machine in your network\&. 10852 .sp 10853 Default: 10854 \fI\fIwins support\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 9427 10855 .RE 9428 10856 9429 10857 workgroup (G) 9430 .PP 9431 .RS 4 9432 This controls what workgroup your server will appear to be in when queried by clients\. Note that this parameter also controls the Domain name used with the 9433 \fIsecurity = domain\fR 9434 setting\. 9435 .sp 9436 Default: 9437 \fI\fIworkgroup\fR\fR\fI = \fR\fIWORKGROUP\fR\fI \fR 9438 .sp 9439 Example: 9440 \fI\fIworkgroup\fR\fR\fI = \fR\fIMYGROUP\fR\fI \fR 10858 .\" workgroup 10859 .PP 10860 .RS 4 10861 This controls what workgroup your server will appear to be in when queried by clients\&. Note that this parameter also controls the Domain name used with the 10862 \m[blue]\fBsecurity = domain\fR\m[] 10863 setting\&. 10864 .sp 10865 Default: 10866 \fI\fIworkgroup\fR\fR\fI = \fR\fI\FCWORKGROUP\F[]\fR\fI \fR 10867 .sp 10868 Example: 10869 \fI\fIworkgroup\fR\fR\fI = \fR\fI\FCMYGROUP\F[]\fR\fI \fR 9441 10870 .RE 9442 10871 9443 10872 writable 10873 .\" writable 9444 10874 .PP 9445 10875 .RS 4 9446 10876 This parameter is a synonym for 9447 writeable\ .10877 writeable\&. 9448 10878 .RE 9449 10879 9450 10880 writeable (S) 10881 .\" writeable 9451 10882 .PP 9452 10883 .RS 4 9453 10884 Inverted synonym for 9454 \ fIread only\fR\.9455 .sp 9456 Default: 9457 \fI\fIwriteable\fR\fR\fI = \fR\fI no\fR\fI \fR10885 \m[blue]\fBread only\fR\m[]\&. 10886 .sp 10887 Default: 10888 \fI\fIwriteable\fR\fR\fI = \fR\fI\FCno\F[]\fR\fI \fR 9458 10889 .RE 9459 10890 9460 10891 write cache size (S) 10892 .\" write cache size 9461 10893 .PP 9462 10894 .RS 4 9463 10895 If this integer parameter is set to non\-zero value, Samba will create an in\-memory cache for each oplocked file (it does 9464 10896 \fInot\fR 9465 do this for non\-oplocked files)\ . All writes that the client does not request to be flushed directly to disk will be stored in this cache if possible\. The cache is flushed onto disk when a write comes in whose offset would not fit into the cache or when the file is closed by the client\. Reads for the file are also served from this cache if the data is stored within it\.9466 .sp 9467 This cache allows Samba to batch client writes into a more efficient write size for RAID disks (i\ .e\. writes may be tuned to be the RAID stripe size) and can improve performance on systems where the disk subsystem is a bottleneck but there is free memory for userspace programs\.9468 .sp 9469 The integer parameter specifies the size of this cache (per oplocked file) in bytes\ .9470 .sp 9471 Default: 9472 \fI\fIwrite cache size\fR\fR\fI = \fR\fI 0\fR\fI \fR9473 .sp 9474 Example: 9475 \fI\fIwrite cache size\fR\fR\fI = \fR\fI 262144 # for a 256k cache size per file\fR\fI \fR10897 do this for non\-oplocked files)\&. All writes that the client does not request to be flushed directly to disk will be stored in this cache if possible\&. The cache is flushed onto disk when a write comes in whose offset would not fit into the cache or when the file is closed by the client\&. Reads for the file are also served from this cache if the data is stored within it\&. 10898 .sp 10899 This cache allows Samba to batch client writes into a more efficient write size for RAID disks (i\&.e\&. writes may be tuned to be the RAID stripe size) and can improve performance on systems where the disk subsystem is a bottleneck but there is free memory for userspace programs\&. 10900 .sp 10901 The integer parameter specifies the size of this cache (per oplocked file) in bytes\&. 10902 .sp 10903 Default: 10904 \fI\fIwrite cache size\fR\fR\fI = \fR\fI\FC0\F[]\fR\fI \fR 10905 .sp 10906 Example: 10907 \fI\fIwrite cache size\fR\fR\fI = \fR\fI\FC262144 # for a 256k cache size per file\F[]\fR\fI \fR 9476 10908 .RE 9477 10909 9478 10910 write list (S) 9479 .PP 9480 .RS 4 9481 This is a list of users that are given read\-write access to a service\. If the connecting user is in this list then they will be given write access, no matter what the 9482 \fIread only\fR 9483 option is set to\. The list can include group names using the @group syntax\. 9484 .sp 9485 Note that if a user is in both the read list and the write list then they will be given write access\. 10911 .\" write list 10912 .PP 10913 .RS 4 10914 This is a list of users that are given read\-write access to a service\&. If the connecting user is in this list then they will be given write access, no matter what the 10915 \m[blue]\fBread only\fR\m[] 10916 option is set to\&. The list can include group names using the @group syntax\&. 10917 .sp 10918 Note that if a user is in both the read list and the write list then they will be given write access\&. 9486 10919 .sp 9487 10920 By design, this parameter will not work with the 9488 \ fIsecurity = share\fR9489 in Samba 3\ .0\.9490 .sp 9491 Default: 9492 \fI\fIwrite list\fR\fR\fI = \fR\fI\ fR\fI \fR9493 .sp 9494 Example: 9495 \fI\fIwrite list\fR\fR\fI = \fR\fI admin, root, @staff\fR\fI \fR10921 \m[blue]\fBsecurity = share\fR\m[] 10922 in Samba 3\&.0\&. 10923 .sp 10924 Default: 10925 \fI\fIwrite list\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 10926 .sp 10927 Example: 10928 \fI\fIwrite list\fR\fR\fI = \fR\fI\FCadmin, root, @staff\F[]\fR\fI \fR 9496 10929 .RE 9497 10930 9498 10931 write raw (G) 9499 .PP 9500 .RS 4 9501 This parameter controls whether or not the server will support raw write SMB\'s when transferring data from clients\. You should never need to change this parameter\. 9502 .sp 9503 Default: 9504 \fI\fIwrite raw\fR\fR\fI = \fR\fIyes\fR\fI \fR 10932 .\" write raw 10933 .PP 10934 .RS 4 10935 This parameter controls whether or not the server will support raw write SMB\'s when transferring data from clients\&. You should never need to change this parameter\&. 10936 .sp 10937 Default: 10938 \fI\fIwrite raw\fR\fR\fI = \fR\fI\FCyes\F[]\fR\fI \fR 9505 10939 .RE 9506 10940 9507 10941 wtmp directory (G) 10942 .\" wtmp directory 9508 10943 .PP 9509 10944 .RS 4 9510 10945 This parameter is only available if Samba has been configured and compiled with the option 9511 \ -\-with\-utmp\. It specifies a directory pathname that is used to store the wtmp or wtmpx files (depending on the UNIX system) that record user connections to a Samba server\. The difference with the utmp directory is the fact that user info is kept after a user has logged out\.10946 \FC \-\-with\-utmp\F[]\&. It specifies a directory pathname that is used to store the wtmp or wtmpx files (depending on the UNIX system) that record user connections to a Samba server\&. The difference with the utmp directory is the fact that user info is kept after a user has logged out\&. 9512 10947 .sp 9513 10948 By default this is not set, meaning the system will use whatever utmp file the native system is set to use (usually 9514 \ fI/var/run/wtmp\fR9515 on Linux)\ .9516 .sp 9517 Default: 9518 \fI\fIwtmp directory\fR\fR\fI = \fR\fI\ fR\fI \fR9519 .sp 9520 Example: 9521 \fI\fIwtmp directory\fR\fR\fI = \fR\fI /var/log/wtmp\fR\fI \fR10949 \FC/var/run/wtmp\F[] 10950 on Linux)\&. 10951 .sp 10952 Default: 10953 \fI\fIwtmp directory\fR\fR\fI = \fR\fI\FC\F[]\fR\fI \fR 10954 .sp 10955 Example: 10956 \fI\fIwtmp directory\fR\fR\fI = \fR\fI\FC/var/log/wtmp\F[]\fR\fI \fR 9522 10957 .RE 9523 10958 .SH "WARNINGS" 9524 10959 .PP 9525 Although the configuration file permits service names to contain spaces, your client software may not\ . Spaces will be ignored in comparisons anyway, so it shouldn\'t be a problem \- but be aware of the possibility\.9526 .PP 9527 On a similar note, many clients \- especially DOS clients \- limit service names to eight characters\ .10960 Although the configuration file permits service names to contain spaces, your client software may not\&. Spaces will be ignored in comparisons anyway, so it shouldn\'t be a problem \- but be aware of the possibility\&. 10961 .PP 10962 On a similar note, many clients \- especially DOS clients \- limit service names to eight characters\&. 9528 10963 \fBsmbd\fR(8) 9529 has no such limitation, but attempts to connect from such clients will fail if they truncate the service names\ . For this reason you should probably keep your service names down to eight characters in length\.10964 has no such limitation, but attempts to connect from such clients will fail if they truncate the service names\&. For this reason you should probably keep your service names down to eight characters in length\&. 9530 10965 .PP 9531 10966 Use of the 9532 [homes]10967 \FC[homes]\F[] 9533 10968 and 9534 [printers]9535 special sections make life for an administrator easy, but the various combinations of default attributes can be tricky\ . Take extreme care when designing these sections\. In particular, ensure that the permissions on spool directories are correct\.10969 \FC[printers]\F[] 10970 special sections make life for an administrator easy, but the various combinations of default attributes can be tricky\&. Take extreme care when designing these sections\&. In particular, ensure that the permissions on spool directories are correct\&. 9536 10971 .SH "VERSION" 9537 10972 .PP 9538 This man page is correct for version 3 of the Samba suite\ .10973 This man page is correct for version 3 of the Samba suite\&. 9539 10974 .SH "SEE ALSO" 9540 10975 .PP … … 9548 10983 \fBnmblookup\fR(1), 9549 10984 \fBtestparm\fR(1), 9550 \fBtestprns\fR(1)\ .10985 \fBtestprns\fR(1)\&. 9551 10986 .SH "AUTHOR" 9552 10987 .PP 9553 The original Samba software and related utilities were created by Andrew Tridgell\ . Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed\.9554 .PP 9555 The original Samba man pages were written by Karl Auer\ . The man page sources were converted to YODL format (another excellent piece of Open Source software, available at9556 ftp://ftp\ .icce\.rug\.nl/pub/unix/) and updated for the Samba 2\.0 release by Jeremy Allison\. The conversion to DocBook for Samba 2\.2 was done by Gerald Carter\. The conversion to DocBook XML 4\.2 for Samba 3\.0 was done by Alexander Bokovoy\.10988 The original Samba software and related utilities were created by Andrew Tridgell\&. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed\&. 10989 .PP 10990 The original Samba man pages were written by Karl Auer\&. The man page sources were converted to YODL format (another excellent piece of Open Source software, available at 10991 ftp://ftp\&.icce\&.rug\&.nl/pub/unix/) and updated for the Samba 2\&.0 release by Jeremy Allison\&. The conversion to DocBook for Samba 2\&.2 was done by Gerald Carter\&. The conversion to DocBook XML 4\&.2 for Samba 3\&.0 was done by Alexander Bokovoy\&.
Note:
See TracChangeset
for help on using the changeset viewer.