Ignore:
Timestamp:
May 27, 2009, 11:39:15 AM (16 years ago)
Author:
Herwig Bauernfeind
Message:

Update 3.2 branch to 3.2.9

Location:
branches/samba-3.2.x/docs-xml
Files:
20 edited

Legend:

Unmodified
Added
Removed
  • branches/samba-3.2.x/docs-xml/archives/THANKS

    r203 r233  
    8787    with a variety of environments (such as Windows, Windows NT and
    8888    Unix), tools and application areas, and can provide assistance for
    89     development work ranging from a few days to to multiple man-year
     89    development work ranging from a few days to multiple man-year
    9090    projects.  You can find more information at http://www.metrics.com/.
    9191   
  • branches/samba-3.2.x/docs-xml/manpages-3/mount.cifs.8.xml

    r232 r233  
    141141                the server supports the Unix Extensions then the uid
    142142                and gid can be retrieved from the server (and uid
    143                 and gid would not have to be specifed on the mount.
     143                and gid would not have to be specified on the mount.
    144144                For servers which do not support the CIFS Unix
    145145                extensions, the default uid (and gid) returned on lookup
     
    373373                <listitem><para>Do not allow POSIX ACL operations even if server would support them.</para><para>
    374374                The CIFS client can get and set POSIX ACLs (getfacl, setfacl) to Samba servers
    375                 version 3.10 and later.  Setting POSIX ACLs requires enabling both XATTR and
     375                version 3.0.10 and later.  Setting POSIX ACLs requires enabling both XATTR and
    376376                then POSIX support in the CIFS configuration options when building the cifs
    377                 module.  POSIX ACL support can be disabled on a per mount basic by specifying
     377                module.  POSIX ACL support can be disabled on a per mount basis by specifying
    378378                "noacl" on mount.</para>
    379379                </listitem>
  • branches/samba-3.2.x/docs-xml/smbdotconf/browse/enhancedbrowsing.xml

    r203 r233  
    1818        <para>You may wish to disable this option if you have a problem with empty
    1919        workgroups not disappearing from browse lists. Due to the restrictions
    20         of the browse protocols these enhancements can cause a empty workgroup
     20        of the browse protocols, these enhancements can cause a empty workgroup
    2121        to stay around forever which can be annoying.</para>
    2222
  • branches/samba-3.2.x/docs-xml/smbdotconf/locking/strictlocking.xml

    r203 r233  
    1313        When strict locking is set to Auto (the default), the server performs file lock checks only on non-oplocked files.
    1414        As most Windows redirectors perform file locking checks locally on oplocked files this is a good trade off for
    15         inproved performance.
     15        improved performance.
    1616        </para>
    1717
  • branches/samba-3.2.x/docs-xml/smbdotconf/misc/remoteannounce.xml

    r203 r233  
    77        <para>
    88        This option allows you to setup <citerefentry><refentrytitle>nmbd</refentrytitle>
    9         <manvolnum>8</manvolnum></citerefentry>to periodically announce itself
     9        <manvolnum>8</manvolnum></citerefentry> to periodically announce itself
    1010        to arbitrary IP addresses with an arbitrary workgroup name.
    1111        </para>
     
    2424        the above line would cause <command moreinfo="none">nmbd</command> to announce itself
    2525        to the two given IP addresses using the given workgroup names. If you leave out the
    26         workgroup name then the one given in the <smbconfoption name="workgroup"/> parameter
     26        workgroup name, then the one given in the <smbconfoption name="workgroup"/> parameter
    2727        is used instead.
    2828        </para>
  • branches/samba-3.2.x/docs-xml/smbdotconf/misc/usershareallowguests.xml

    r203 r233  
    99        of allowing people who can create a share the option of setting
    1010        <parameter moreinfo="none">guest ok = yes</parameter> in a share
    11         definition. Due to the security sensitive nature of this the default
     11        definition. Due to its security sensitive nature, the default
    1212        is set to off.</para>
    1313
  • branches/samba-3.2.x/docs-xml/smbdotconf/misc/usershareprefixallowlist.xml

    r203 r233  
    77        <para>This parameter specifies a list of absolute pathnames
    88        the root of which are allowed to be exported by user defined share definitions.
    9         If the pathname exported doesn't start with one of the strings in this
    10         list the user defined share will not be allowed. This allows the Samba
     9        If the pathname to be exported doesn't start with one of the strings in this
     10        list, the user defined share will not be allowed. This allows the Samba
    1111        administrator to restrict the directories on the system that can be
    1212        exported by user defined shares.
  • branches/samba-3.2.x/docs-xml/smbdotconf/misc/usersharetemplateshare.xml

    r203 r233  
    66<description>
    77        <para>User defined shares only have limited possible parameters
    8         such as path, guest ok etc. This parameter allows usershares to
     8        such as path, guest ok, etc. This parameter allows usershares to
    99        "cloned" from an existing share. If "usershare template share"
    1010        is set to the name of an existing share, then all usershares
  • branches/samba-3.2.x/docs-xml/smbdotconf/printing/useclientdriver.xml

    r203 r233  
    3030    to open the printer with the PRINTER_ACCESS_ADMINISTER right is mapped
    3131    to PRINTER_ACCESS_USE instead.  Thus allowing the OpenPrinterEx()
    32     call to succeed.  <emphasis>This parameter MUST not be able enabled
     32    call to succeed.  <emphasis>This parameter MUST not be enabled
    3333    on a print share which has valid print driver installed on the Samba
    3434        server.</emphasis></para>
  • branches/samba-3.2.x/docs-xml/smbdotconf/protocol/aclcheckpermissions.xml

    r203 r233  
    2222    discovered at close time, which is too late for the Windows user tools to display an error message
    2323    to the user. The symptom of this is files that appear to have been deleted "magically" re-appearing
    24     on a Windows explorer refersh. This is an extremely advanced protocol option which should not
     24    on a Windows explorer refresh. This is an extremely advanced protocol option which should not
    2525    need to be changed. This parameter was introduced in its final form in 3.0.21, an earlier version
    2626    with slightly different semantics was introduced in 3.0.20. That older version is not documented here.
  • branches/samba-3.2.x/docs-xml/smbdotconf/protocol/enableasusupport.xml

    r203 r233  
    66<description>
    77    <para>Hosts running the "Advanced Server for Unix (ASU)" product
    8     require some special accomodations such as creating a builting [ADMIN$]
     8    require some special accomodations such as creating a builtin [ADMIN$]
    99    share that only supports IPC connections.  The has been the default
    1010    behavior in smbd for many years.  However, certain Microsoft applications
  • branches/samba-3.2.x/docs-xml/smbdotconf/security/clientlanmanauth.xml

    r203 r233  
    1212    Windows 95/98) will be able to be connected from the Samba client.</para>
    1313
    14     <para>The LANMAN encrypted response is easily broken, due to it's
     14    <para>The LANMAN encrypted response is easily broken, due to its
    1515    case-insensitive nature, and the choice of algorithm.  Clients
    1616    without Windows 95/98 servers are advised to disable
     
    1818
    1919    <para>Disabling this option will also disable the <command
    20     moreinfo="none">client plaintext auth</command> option</para>
     20    moreinfo="none">client plaintext auth</command> option.</para>
    2121
    2222    <para>Likewise, if the <command moreinfo="none">client ntlmv2
  • branches/samba-3.2.x/docs-xml/smbdotconf/security/clientsigning.xml

    r203 r233  
    55                 xmlns:samba="http://www.samba.org/samba/DTD/samba-doc">
    66<description>
    7     <para>This controls whether the client offers or requires
    8     the server it talks to to use SMB signing. Possible values
     7    <para>This controls whether the client is allowed or required to use SMB signing. Possible values
    98    are <emphasis>auto</emphasis>, <emphasis>mandatory</emphasis>
    109    and <emphasis>disabled</emphasis>.
  • branches/samba-3.2.x/docs-xml/smbdotconf/security/lanmanauth.xml

    r203 r233  
    1313    connect to the Samba host.</para>
    1414
    15     <para>The LANMAN encrypted response is easily broken, due to it's
     15    <para>The LANMAN encrypted response is easily broken, due to its
    1616    case-insensitive nature, and the choice of algorithm.  Servers
    1717    without Windows 95/98/ME or MS DOS clients are advised to disable
  • branches/samba-3.2.x/docs-xml/smbdotconf/security/passwordserver.xml

    r203 r233  
    88    or Active Directory domain controller with this option,
    99    and using <command moreinfo="none">security = [ads|domain|server]</command>
    10     it is possible to get Samba to
     10    it is possible to get Samba
    1111    to do all its username/password validation using a specific remote server.</para>
    1212
  • branches/samba-3.2.x/docs-xml/smbdotconf/security/security.xml

    r203 r233  
    4848    is commonly used for a shared printer server. It is more difficult
    4949    to setup guest shares with <command moreinfo="none">security = user</command>, see
    50     the <smbconfoption name="map to guest"/>parameter for details.</para>
     50    the <smbconfoption name="map to guest"/> parameter for details.</para>
    5151               
    5252    <para>It is possible to use <command moreinfo="none">smbd</command> in a <emphasis>
     
    5959    <para><anchor id="SECURITYEQUALSSHARE"/><emphasis>SECURITY = SHARE</emphasis></para>
    6060               
    61     <para>When clients connect to a share level security server they
     61    <para>When clients connect to a share level security server, they
    6262    need not log onto the server with a valid username and password before
    6363    attempting to connect to a shared resource (although modern clients
     
    212212
    213213        <note><para>From the client's point of
    214     view <command moreinfo="none">security = server</command> is the
     214    view, <command moreinfo="none">security = server</command> is the
    215215    same as <command moreinfo="none">security = user</command>.  It
    216216    only affects how the server deals  with the authentication, it does
  • branches/samba-3.2.x/docs-xml/smbdotconf/security/serverschannel.xml

    r203 r233  
    1414
    1515    <para>
    16         Please note that with this set to <literal>no</literal> you will have to apply the WindowsXP
     16        Please note that with this set to <literal>no</literal>, you will have to apply the WindowsXP
    1717        <filename>WinXP_SignOrSeal.reg</filename> registry patch found in the docs/registry subdirectory of the Samba distribution tarball.
    1818        </para>
  • branches/samba-3.2.x/docs-xml/smbdotconf/security/serversigning.xml

    r203 r233  
    66<description>
    77
    8     <para>This controls whether the server offers or requires
    9     the client it talks to to use SMB signing. Possible values
     8    <para>This controls whether the client is allowed or required to use SMB signing. Possible values
    109    are <emphasis>auto</emphasis>, <emphasis>mandatory</emphasis>
    1110    and <emphasis>disabled</emphasis>.
  • branches/samba-3.2.x/docs-xml/smbdotconf/security/smbencrypt.xml

    r203 r233  
    1717    </para>
    1818
    19     <para>This controls whether the server offers or requires
    20     the client it talks to to use SMB encryption. Possible values
     19    <para>This controls whether the remote client is allowed or required to use SMB encryption. Possible values
    2120    are <emphasis>auto</emphasis>, <emphasis>mandatory</emphasis>
    2221    and <emphasis>disabled</emphasis>. This may be set on a per-share
  • branches/samba-3.2.x/docs-xml/smbdotconf/security/updateencrypted.xml

    r203 r233  
    1010        password in the smbpasswd file to be updated automatically as they log on. This option allows a site to
    1111        migrate from plaintext password authentication (users authenticate with plaintext password over the
    12         wire, and are checked against a UNIX account atabase) to encrypted password authentication (the SMB
     12        wire, and are checked against a UNIX account database) to encrypted password authentication (the SMB
    1313        challenge/response authentication mechanism) without forcing all users to re-enter their passwords via
    1414        smbpasswd at the time the change is made. This is a convenience option to allow the change over to encrypted
     
    2525
    2626    <para>
    27         Note that even when this parameter is set a user authenticating to <command moreinfo="none">smbd</command>
     27        Note that even when this parameter is set, a user authenticating to <command moreinfo="none">smbd</command>
    2828        must still enter a valid password in order to connect correctly, and to update their hashed (smbpasswd)
    2929        passwords.
Note: See TracChangeset for help on using the changeset viewer.