Ignore:
Timestamp:
Jun 17, 2009, 2:19:52 PM (16 years ago)
Author:
Herwig Bauernfeind
Message:

Update 3.3 branch to 3.3.5

File:
1 edited

Legend:

Unmodified
Added
Removed
  • branches/samba-3.3.x/docs/htmldocs/Samba3-ByExample/kerberos.html

    r218 r274  
    1 <html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Chapter 11. Active Directory, Kerberos, and Security</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.74.0"><link rel="home" href="index.html" title="Samba-3 by Example"><link rel="up" href="RefSection.html" title="Part III. Reference Section"><link rel="prev" href="RefSection.html" title="Part III. Reference Section"><link rel="next" href="DomApps.html" title="Chapter 12. Integrating Additional Services"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Chapter 11. Active Directory, Kerberos, and Security</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="RefSection.html">Prev</a> </td><th width="60%" align="center">Part III. Reference Section</th><td width="20%" align="right"> <a accesskey="n" href="DomApps.html">Next</a></td></tr></table><hr></div><div class="chapter" lang="en"><div class="titlepage"><div><div><h2 class="title"><a name="kerberos"></a>Chapter 11. Active Directory, Kerberos, and Security</h2></div></div></div><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="sect1"><a href="kerberos.html#id2610613">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2611264">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2611280">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2611677">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#ch10expl">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2613307">Share Access Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2613656">Share Definition Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2614269">Share Point Directory and File Permissions</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2614672">Managing Windows 200x ACLs</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2615399">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2615533">Questions and Answers</a></span></dt></dl></div><p><a class="indexterm" name="id2610549"></a>
     1<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Chapter 11. Active Directory, Kerberos, and Security</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.74.0"><link rel="home" href="index.html" title="Samba-3 by Example"><link rel="up" href="RefSection.html" title="Part III. Reference Section"><link rel="prev" href="RefSection.html" title="Part III. Reference Section"><link rel="next" href="DomApps.html" title="Chapter 12. Integrating Additional Services"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Chapter 11. Active Directory, Kerberos, and Security</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="RefSection.html">Prev</a> </td><th width="60%" align="center">Part III. Reference Section</th><td width="20%" align="right"> <a accesskey="n" href="DomApps.html">Next</a></td></tr></table><hr></div><div class="chapter" lang="en"><div class="titlepage"><div><div><h2 class="title"><a name="kerberos"></a>Chapter 11. Active Directory, Kerberos, and Security</h2></div></div></div><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="sect1"><a href="kerberos.html#id2610613">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2611264">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2611280">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2611677">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#ch10expl">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2613307">Share Access Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2613656">Share Definition Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2614269">Share Point Directory and File Permissions</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2614682">Managing Windows 200x ACLs</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2615408">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2615543">Questions and Answers</a></span></dt></dl></div><p><a class="indexterm" name="id2610549"></a>
    22        By this point in the book, you have been exposed to many Samba-3 features and capabilities.
    33        More importantly, if you have implemented the examples given, you are well on your way to becoming
     
    527527        Microsoft Office files (Word and Excel) to a network drive. Here is the typical sequence:
    528528        </p><div class="orderedlist"><ol type="1"><li><p>
    529                 A user opens a Work document from a network drive. The file was owned by user <code class="constant">janetp</code>
     529                A user opens a Word document from a network drive. The file was owned by user <code class="constant">janetp</code>
    530530                and  [users], and was set read/write-enabled for everyone.
     531                A user opens a Word document from a network drive. The file was owned by user <code class="constant">janetp</code>
     532                and <code class="constant">users</code>, and was set read/write-enabled for everyone.
    531533                </p></li><li><p>
    532534                File changes and edits are made.
     
    543545        want to know when this &#8220;<span class="quote">bug</span>&#8221; will be fixed. The fact is, this is not a bug in Samba at all.
    544546        Here is the real sequence of what happens in this case.
    545         </p><p><a class="indexterm" name="id2614430"></a><a class="indexterm" name="id2614438"></a><a class="indexterm" name="id2614446"></a>
     547        </p><p><a class="indexterm" name="id2614440"></a><a class="indexterm" name="id2614448"></a><a class="indexterm" name="id2614456"></a>
    546548        When the user saves a file, MS Word creates a new (temporary) file. This file is naturally owned
    547549        by the user who creates the file (<code class="constant">billc</code>) and has the permissions that follow
     
    561563        simple steps to create a share in which all files will consistently be owned by the same user and the
    562564        same group:
    563         </p><div class="procedure"><a name="id2614493"></a><p class="title"><b>Procedure 11.2. Using Directory Permissions to Force File User and Group Ownership</b></p><ol type="1"><li><p>
     565        </p><div class="procedure"><a name="id2614502"></a><p class="title"><b>Procedure 11.2. Using Directory Permissions to Force File User and Group Ownership</b></p><ol type="1"><li><p>
    564566                Change your share definition so that it matches this pattern:
    565567</p><pre class="screen">
     
    569571        read only = No
    570572</pre><p>
    571                 </p></li><li><p><a class="indexterm" name="id2614519"></a><a class="indexterm" name="id2614530"></a>
     573                </p></li><li><p><a class="indexterm" name="id2614528"></a><a class="indexterm" name="id2614539"></a>
    572574                Set consistent user and group permissions recursively down the directory tree as shown here:
    573575</p><pre class="screen">
    574576<code class="prompt">root# </code> chown -R janetp.users /usr/data/finance
    575577</pre><p>
    576                 </p></li><li><p><a class="indexterm" name="id2614562"></a>
     578                </p></li><li><p><a class="indexterm" name="id2614571"></a>
    577579                Set the files and directory permissions to be read/write for owner and group, and not accessible
    578580                to others (everyone), using the following command:
     
    580582<code class="prompt">root# </code> chmod ug+rwx,o-rwx /usr/data/finance
    581583</pre><p>
    582                 </p></li><li><p><a class="indexterm" name="id2614591"></a>
     584                </p></li><li><p><a class="indexterm" name="id2614600"></a>
    583585                Set the SGID (supergroup) bit on all directories from the top down. This means all files
    584586                can be created with the permissions of the group set on the directory. It means all users
     
    590592</pre><p>
    591593
    592                 </p></li><li><p><a class="indexterm" name="id2614631"></a><a class="indexterm" name="id2614639"></a><a class="indexterm" name="id2614647"></a>
     594                </p></li><li><p><a class="indexterm" name="id2614641"></a><a class="indexterm" name="id2614649"></a><a class="indexterm" name="id2614657"></a>
    593595                Make sure all users that must have read/write access to the directory have
    594596                <code class="constant">finance</code> group membership as their primary group,
    595597                for example, the group they belong to in <code class="filename">/etc/passwd</code>.
    596                 </p></li></ol></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2614672"></a>Managing Windows 200x ACLs</h3></div></div></div><p><a class="indexterm" name="id2614679"></a><a class="indexterm" name="id2614687"></a><a class="indexterm" name="id2614695"></a><a class="indexterm" name="id2614703"></a>
     598                </p></li></ol></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2614682"></a>Managing Windows 200x ACLs</h3></div></div></div><p><a class="indexterm" name="id2614688"></a><a class="indexterm" name="id2614696"></a><a class="indexterm" name="id2614704"></a><a class="indexterm" name="id2614712"></a>
    597599        Samba must translate Windows 2000 ACLs to UNIX POSIX ACLs. This has some interesting side effects because
    598600        there is not a one-to-one equivalence between them. The as-close-as-possible ACLs match means
     
    602604        There are two possible ways to set ACLs on UNIX/Linux file systems from a Windows network workstation,
    603605        either via File Manager or via the Microsoft Management Console (MMC) Computer Management interface.
    604         </p><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2614727"></a>Using the MMC Computer Management Interface</h4></div></div></div><div class="procedure"><ol type="1"><li><p>
     606        </p><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2614736"></a>Using the MMC Computer Management Interface</h4></div></div></div><div class="procedure"><ol type="1"><li><p>
    605607                From a Windows 200x/XP Professional workstation, log on to the domain using the Domain Administrator
    606608                account (on Samba domains, this is usually the account called <code class="constant">root</code>).
     
    617619                </p></li><li><p>
    618620                In the left panel, click <span class="guimenu">Computer Management (FRODO)</span> &#8594; <span class="guimenuitem">[+] Shared Folders</span> &#8594; <span class="guimenuitem">Shares</span>.
    619                 </p></li><li><p><a class="indexterm" name="id2614910"></a><a class="indexterm" name="id2614918"></a><a class="indexterm" name="id2614925"></a><a class="indexterm" name="id2614933"></a>
     621                </p></li><li><p><a class="indexterm" name="id2614919"></a><a class="indexterm" name="id2614927"></a><a class="indexterm" name="id2614935"></a><a class="indexterm" name="id2614943"></a>
    620622                In the right panel, double-click on the share on which you wish to set/edit ACLs. This
    621623                brings up the Properties panel. Click the <span class="guimenu">Security</span> tab. It is best
     
    624626                functionality under the <code class="constant">Permissions</code> tab can be utilized with respect
    625627                to a Samba domain server.
    626                 </p></li><li><p><a class="indexterm" name="id2614973"></a><a class="indexterm" name="id2614981"></a>
     628                </p></li><li><p><a class="indexterm" name="id2614982"></a><a class="indexterm" name="id2614990"></a>
    627629                You may now edit/add/remove access control settings. Be very careful. Many problems have been
    628630                created by people who decided that everyone should be rejected but one particular group should
     
    633635                When you are done with editing, close all panels by clicking through the <span class="guimenu">OK</span>
    634636                buttons until the last panel closes.
    635                 </p></li></ol></div></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2615018"></a>Using MS Windows Explorer (File Manager)</h4></div></div></div><p>
     637                </p></li></ol></div></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2615027"></a>Using MS Windows Explorer (File Manager)</h4></div></div></div><p>
    636638        The following alternative method may be used from a Windows workstation. In this example we work
    637639        with a domain called <code class="constant">MEGANET</code>, a server called <code class="constant">MASSIVE</code>, and a
     
    641643                Click <span class="guimenu">Start</span> &#8594; <span class="guimenuitem">[right-click] My Computer</span> &#8594; <span class="guimenuitem">Explore</span> &#8594; <span class="guimenuitem">[left panel] [+] My Network Places</span> &#8594; <span class="guimenuitem">[+] Entire Network</span> &#8594; <span class="guimenuitem">[+] Microsoft Windows Network</span> &#8594; <span class="guimenuitem">[+] Meganet</span> &#8594; <span class="guimenuitem">[+] Massive</span> &#8594; <span class="guimenuitem">[right-click] Apps</span> &#8594; <span class="guimenuitem">Properties</span> &#8594; <span class="guimenuitem">Security</span> &#8594; <span class="guimenuitem">Advanced</span>. This opens a panel that has four tabs. Only the functionality under the
    642644                <code class="constant">Permissions</code> tab can be utilized for a Samba domain server.
    643                 </p></li><li><p><a class="indexterm" name="id2615142"></a><a class="indexterm" name="id2615150"></a>
     645                </p></li><li><p><a class="indexterm" name="id2615152"></a><a class="indexterm" name="id2615160"></a>
    644646                You may now edit/add/remove access control settings. Be very careful. Many problems have been
    645647                created by people who decided that everyone should be rejected but one particular group should
     
    650652                When you are done with editing, close all panels by clicking through the <span class="guimenu">OK</span>
    651653                buttons until the last panel closes.
    652                 </p></li></ol></div></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2615189"></a>Setting Posix ACLs in UNIX/Linux</h4></div></div></div><p><a class="indexterm" name="id2615196"></a><a class="indexterm" name="id2615204"></a>
     654                </p></li></ol></div></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2615198"></a>Setting Posix ACLs in UNIX/Linux</h4></div></div></div><p><a class="indexterm" name="id2615205"></a><a class="indexterm" name="id2615213"></a>
    653655        Yet another alternative method for setting desired security settings on the shared resource files and
    654656        directories can be achieved by logging into UNIX/Linux and setting POSIX ACLs directly using command-line
     
    673675other::r-x
    674676</pre><p>
    675                 </p></li><li><p><a class="indexterm" name="id2615278"></a>
     677                </p></li><li><p><a class="indexterm" name="id2615287"></a>
    676678                You want to add permission for <code class="constant">AppsMgrs</code> to enable them to
    677679                manage the applications (apps) share. It is important to set the ACL recursively
     
    696698</pre><p>
    697699                This confirms that the change of POSIX ACL permissions has been effective.
    698                 </p></li><li><p><a class="indexterm" name="id2615334"></a><a class="indexterm" name="id2615341"></a><a class="indexterm" name="id2615349"></a><a class="indexterm" name="id2615357"></a><a class="indexterm" name="id2615365"></a>
     700                </p></li><li><p><a class="indexterm" name="id2615343"></a><a class="indexterm" name="id2615351"></a><a class="indexterm" name="id2615359"></a><a class="indexterm" name="id2615367"></a><a class="indexterm" name="id2615375"></a>
    699701                It is highly recommended that you read the online manual page for the <code class="literal">setfacl</code>
    700702                and <code class="literal">getfacl</code> commands. This provides information regarding how to set/read the default
    701703                ACLs and how that may be propagated through the directory tree. In Windows ACLs terms, this is the equivalent
    702704                of setting <code class="constant">inheritance</code> properties.
    703                 </p></li></ol></div></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2615399"></a>Key Points Learned</h3></div></div></div><p>
     705                </p></li></ol></div></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2615408"></a>Key Points Learned</h3></div></div></div><p>
    704706                The mish-mash of issues were thrown together into one chapter because it seemed like a good idea.
    705707                Looking back, this chapter could be broken into two, but it's too late now. It has been done.
    706708                The highlights covered are as follows:
    707                 </p><div class="itemizedlist"><ul type="disc"><li><p><a class="indexterm" name="id2615416"></a><a class="indexterm" name="id2615424"></a><a class="indexterm" name="id2615432"></a><a class="indexterm" name="id2615440"></a>
     709                </p><div class="itemizedlist"><ul type="disc"><li><p><a class="indexterm" name="id2615426"></a><a class="indexterm" name="id2615434"></a><a class="indexterm" name="id2615442"></a><a class="indexterm" name="id2615450"></a>
    708710                        Winbind honors and does not override account controls set in Active Directory.
    709711                        This means that password change, logon hours, and so on, are (or soon will be) enforced
     
    711713                        change is enforced. At this time, if logon hours expire, the user is not forcibly
    712714                        logged off. That may be implemented at some later date.
    713                         </p></li><li><p><a class="indexterm" name="id2615459"></a><a class="indexterm" name="id2615467"></a>
     715                        </p></li><li><p><a class="indexterm" name="id2615468"></a><a class="indexterm" name="id2615476"></a>
    714716                        Sign'n'seal (plus schannel support) has been implemented in Samba-3. Beware of potential
    715717                        problems acknowledged by Microsoft as having been fixed but reported by some as still
    716718                        possibly an open issue.
    717                         </p></li><li><p><a class="indexterm" name="id2615483"></a><a class="indexterm" name="id2615491"></a><a class="indexterm" name="id2615498"></a><a class="indexterm" name="id2615506"></a>
     719                        </p></li><li><p><a class="indexterm" name="id2615492"></a><a class="indexterm" name="id2615500"></a><a class="indexterm" name="id2615508"></a><a class="indexterm" name="id2615516"></a>
    718720                        The combination of Kerberos 5, plus OpenLDAP, plus Samba, cannot replace Microsoft
    719721                        Active Directory. The possibility to do this is not planned in the current Samba-3
     
    724726                        the four key methodologies was reviewed with specific reference to example deployment
    725727                        techniques.
    726                         </p></li></ul></div></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2615533"></a>Questions and Answers</h2></div></div></div><p>
    727         </p><div class="qandaset"><dl><dt> <a href="kerberos.html#id2615549">
     728                        </p></li></ul></div></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2615543"></a>Questions and Answers</h2></div></div></div><p>
     729        </p><div class="qandaset"><dl><dt> <a href="kerberos.html#id2615558">
    728730                Does Samba-3 require the Sign'n'seal registry hacks needed by Samba-2?
    729                 </a></dt><dt> <a href="kerberos.html#id2615619">
     731                </a></dt><dt> <a href="kerberos.html#id2615629">
    730732                Does Samba-3 support Active Directory?
    731                 </a></dt><dt> <a href="kerberos.html#id2615650">
     733                </a></dt><dt> <a href="kerberos.html#id2615660">
    732734                When Samba-3 is used with Active Directory, is it necessary to run mixed-mode operation, as was
    733735                necessary with Samba-2?
    734                 </a></dt><dt> <a href="kerberos.html#id2615689">
     736                </a></dt><dt> <a href="kerberos.html#id2615698">
    735737                Is it safe to set share-level access controls in Samba?
    736                 </a></dt><dt> <a href="kerberos.html#id2615718">
     738                </a></dt><dt> <a href="kerberos.html#id2615728">
    737739                Is it mandatory to set share ACLs to get a secure Samba-3 server?
    738                 </a></dt><dt> <a href="kerberos.html#id2615795">
     740                </a></dt><dt> <a href="kerberos.html#id2615804">
    739741                The valid users did not work on the [homes].
    740742                Has this functionality been restored yet?
    741                 </a></dt><dt> <a href="kerberos.html#id2615861">
     743                </a></dt><dt> <a href="kerberos.html#id2615870">
    742744                Is the bias against use of the force user and force group
    743745                really warranted?
    744                 </a></dt><dt> <a href="kerberos.html#id2615924">
     746                </a></dt><dt> <a href="kerberos.html#id2615934">
    745747                The example given for file and directory access control forces all files to be owned by one
    746748                particular user. I do not like that. Is there any way I can see who created the file?
    747                 </a></dt><dt> <a href="kerberos.html#id2615972">
     749                </a></dt><dt> <a href="kerberos.html#id2615982">
    748750                In the book, &#8220;The Official Samba-3 HOWTO and Reference Guide&#8221;, you recommended use
    749751                of the Windows NT4 Server Manager (part of the SRVTOOLS.EXE) utility. Why
    750752                have you mentioned only the use of the Windows 200x/XP MMC Computer Management utility?
    751                 </a></dt><dt> <a href="kerberos.html#id2616039">
     753                </a></dt><dt> <a href="kerberos.html#id2616048">
    752754                I tried to set valid users = @Engineers, but it does not work. My Samba
    753755                server is an Active Directory domain member server. Has this been fixed now?
    754                 </a></dt></dl><table border="0" summary="Q and A Set"><col align="left" width="1%"><tbody><tr class="question"><td align="left" valign="top"><a name="id2615549"></a><a name="id2615551"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2615554"></a><a class="indexterm" name="id2615562"></a>
     756                </a></dt></dl><table border="0" summary="Q and A Set"><col align="left" width="1%"><tbody><tr class="question"><td align="left" valign="top"><a name="id2615558"></a><a name="id2615561"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2615564"></a><a class="indexterm" name="id2615572"></a>
    755757                Does Samba-3 require the <code class="constant">Sign'n'seal</code> registry hacks needed by Samba-2?
    756                 </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2615582"></a><a class="indexterm" name="id2615589"></a><a class="indexterm" name="id2615597"></a>
     758                </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2615591"></a><a class="indexterm" name="id2615599"></a><a class="indexterm" name="id2615607"></a>
    757759                No. Samba-3 fully supports <code class="constant">Sign'n'seal</code> as well as <code class="constant">schannel</code>
    758760                operation. The registry change should not be applied when Samba-3 is used as a domain controller.
    759                 </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615619"></a><a name="id2615622"></a></td><td align="left" valign="top"><p>
     761                </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615629"></a><a name="id2615631"></a></td><td align="left" valign="top"><p>
    760762                Does Samba-3 support Active Directory?
    761                 </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2615632"></a>
     763                </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2615642"></a>
    762764                Yes. Samba-3 can be a fully participating native mode Active Directory client. Samba-3 does not
    763765                provide Active Directory services. It cannot be used to replace a Microsoft Active Directory
    764766                server implementation. Samba-3 can function as an Active Directory client (workstation) toolkit,
    765767                and it can function as an Active Directory domain member server.
    766                 </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615650"></a><a name="id2615653"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2615656"></a>
     768                </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615660"></a><a name="id2615662"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2615665"></a>
    767769                When Samba-3 is used with Active Directory, is it necessary to run mixed-mode operation, as was
    768770                necessary with Samba-2?
    769                 </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2615672"></a>
     771                </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2615682"></a>
    770772                No. Samba-3 can be used with NetBIOS over TCP/IP disabled, just as can be done with Windows 200x
    771773                Server and 200x/XPPro client products. It is no longer necessary to run mixed-mode operation,
    772774                because Samba-3 can join a native Windows 2003 Server ADS domain.
    773                 </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615689"></a><a name="id2615691"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2615694"></a>
     775                </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615698"></a><a name="id2615701"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2615704"></a>
    774776                Is it safe to set share-level access controls in Samba?
    775777                </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p>
     
    777779                very mature technology. Not enough sites make use of this powerful capability, neither on
    778780                Windows server or with Samba servers.
    779                 </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615718"></a><a name="id2615720"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2615724"></a>
     781                </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615728"></a><a name="id2615730"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2615733"></a>
    780782                Is it mandatory to set share ACLs to get a secure Samba-3 server?
    781                 </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2615739"></a><a class="indexterm" name="id2615747"></a><a class="indexterm" name="id2615755"></a><a class="indexterm" name="id2615764"></a><a class="indexterm" name="id2615772"></a>
     783                </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2615749"></a><a class="indexterm" name="id2615757"></a><a class="indexterm" name="id2615765"></a><a class="indexterm" name="id2615773"></a><a class="indexterm" name="id2615781"></a>
    782784                No. Samba-3 honors UNIX/Linux file system security, supports Windows 200x ACLs, and provides
    783785                means of securing shares through share definition controls in the <code class="filename">smb.conf</code> file. The additional
    784786                support for share-level ACLs is like frosting on the cake. It adds to security but is not essential
    785787                to it.
    786                 </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615795"></a><a name="id2615797"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2615800"></a>
     788                </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615804"></a><a name="id2615806"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2615810"></a>
    787789                The <em class="parameter"><code>valid users</code></em> did not work on the <em class="parameter"><code>[homes]</code></em>.
    788790                Has this functionality been restored yet?
    789                 </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2615828"></a>
     791                </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2615837"></a>
    790792                Yes. This was fixed in Samba-3.0.2. The use of this parameter is strongly recommended as a safeguard
    791793                on the <em class="parameter"><code>[homes]</code></em> meta-service. The correct way to specify this is:
    792794                <a class="link" href="smb.conf.5.html#VALIDUSERS" target="_top">valid users = %S</a>.
    793                 </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615861"></a><a name="id2615863"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2615866"></a><a class="indexterm" name="id2615874"></a><a class="indexterm" name="id2615882"></a>
     795                </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615870"></a><a name="id2615872"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2615876"></a><a class="indexterm" name="id2615883"></a><a class="indexterm" name="id2615891"></a>
    794796                Is the bias against use of the <em class="parameter"><code>force user</code></em> and <em class="parameter"><code>force group</code></em>
    795797                really warranted?
    796                 </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2615909"></a>
     798                </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2615918"></a>
    797799                There is no bias. There is a determination to recommend the right tool for the task at hand.
    798800                After all, it is better than putting users through performance problems, isn't it?
    799                 </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615924"></a><a name="id2615926"></a></td><td align="left" valign="top"><p>
     801                </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615934"></a><a name="id2615936"></a></td><td align="left" valign="top"><p>
    800802                The example given for file and directory access control forces all files to be owned by one
    801803                particular user. I do not like that. Is there any way I can see who created the file?
    802                 </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2615939"></a>
     804                </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2615948"></a>
    803805                Sure. You do not have to set the SUID bit on the directory. Simply execute the following command
    804806                to permit file ownership to be retained by the user who created it:
     
    808810                Note that this required no more than removing the <code class="constant">u</code> argument so that the
    809811                SUID bit is not set for the owner.
    810                 </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615972"></a><a name="id2615974"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2615978"></a>
     812                </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2615982"></a><a name="id2615984"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2615987"></a>
    811813                In the book, &#8220;<span class="quote">The Official Samba-3 HOWTO and Reference Guide</span>&#8221;, you recommended use
    812814                of the Windows NT4 Server Manager (part of the <code class="filename">SRVTOOLS.EXE</code>) utility. Why
    813815                have you mentioned only the use of the Windows 200x/XP MMC Computer Management utility?
    814                 </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2616006"></a><a class="indexterm" name="id2616013"></a>
     816                </p></td></tr><tr class="answer"><td align="left" valign="top"></td><td align="left" valign="top"><p><a class="indexterm" name="id2616015"></a><a class="indexterm" name="id2616023"></a>
    815817                Either tool can be used with equal effect. There is no benefit of one over the other, except that
    816818                the MMC utility is present on all Windows 200x/XP systems and does not require additional software
     
    818820                Samba-controlled domain, the only tool that permits that is the NT4 Domain User Manager, which
    819821                is provided as part of the <code class="filename">SRVTOOLS.EXE</code> utility.
    820                 </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2616039"></a><a name="id2616041"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2616044"></a><a class="indexterm" name="id2616052"></a><a class="indexterm" name="id2616060"></a>
     822                </p></td></tr><tr class="question"><td align="left" valign="top"><a name="id2616048"></a><a name="id2616051"></a></td><td align="left" valign="top"><p><a class="indexterm" name="id2616054"></a><a class="indexterm" name="id2616062"></a><a class="indexterm" name="id2616070"></a>
    821823                I tried to set <em class="parameter"><code>valid users = @Engineers</code></em>, but it does not work. My Samba
    822824                server is an Active Directory domain member server. Has this been fixed now?
Note: See TracChangeset for help on using the changeset viewer.