Changeset 44 for trunk/samba/docs/manpages/smb.conf.5
- Timestamp:
- Jun 29, 2007, 1:34:14 PM (18 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/samba/docs/manpages/smb.conf.5
r39 r44 51 51 Only the first equals sign in a parameter is significant. Whitespace before or after the first equals sign is discarded. Leading, trailing and internal whitespace in section and parameter names is irrelevant. Leading and trailing whitespace in a parameter value is discarded. Internal whitespace within a parameter value is retained verbatim. 52 52 .PP 53 Any line beginning with a semicolon ( “;”) or a hash (“#”) character is ignored, as are lines containing only whitespace.53 Any line beginning with a semicolon (\fB;\fR) or a hash (\fB#\fR) character is ignored, as are lines containing only whitespace. 54 54 .PP 55 55 Any line ending in a 56 “\” 56 \fB\\\fR 57 57 is continued on the next line in the customary UNIX fashion. 58 58 .PP … … 61 61 .PP 62 62 Each section in the configuration file (except for the [global] section) describes a shared resource (known as a 63 “share”). The section name is the name of the shared resource and the parameters within the section define the shares attributes.63 \fBshare\fR). The section name is the name of the shared resource and the parameters within the section define the shares attributes. 64 64 .PP 65 65 There are three special sections, [global], [homes] and [printers], which are described under … … 125 125 Some modifications are then made to the newly created share: 126 126 .TP 3n 127 • 127 \(bu 128 128 The share name is changed from homes to the located username. 129 129 .TP 3n 130 • 130 \(bu 131 131 If no path was given, the path is set to the user's home directory. 132 132 .PP … … 147 147 .PP 148 148 A similar process occurs if the requested section name is 149 “homes”, except that the share name is not changed to that of the requesting user. This method of using the [homes] section works well if different users share a client PC.149 \fBhomes\fR, except that the share name is not changed to that of the requesting user. This method of using the [homes] section works well if different users share a client PC. 150 150 .PP 151 151 The [homes] section can specify all the parameters a normal service section can specify, though some make more sense than others. The following is a typical and suitable [homes] section: … … 180 180 A few modifications are then made to the newly created share: 181 181 .TP 3n 182 • 182 \(bu 183 183 The share name is set to the located printer name 184 184 .TP 3n 185 • 185 \(bu 186 186 If no printer name was given, the printer name is set to the located printer name 187 187 .TP 3n 188 • 188 \(bu 189 189 If the share does not permit guest access and no username was given, the username is set to the located printer name. 190 190 .PP … … 336 336 .PP 337 337 Many of the strings that are settable in the config file can take substitutions. For example the option 338 “path = /tmp/%u” 338 \fBpath = /tmp/%u\fR 339 339 is interpreted as 340 “path = /tmp/john” 340 \fBpath = /tmp/john\fR 341 341 if the user connected with the username john. 342 342 .PP … … 369 369 .RS 3n 370 370 the NetBIOS name of the server. This allows you to change your config based on what the client calls you. Your server can have a 371 “dual personality”.371 \fBdual personality\fR. 372 372 .RE 373 373 .PP … … 520 520 .PP 521 521 If the service is marked 522 “guest only = yes” 523 and the server is running with share-level security ( “security = share”, steps 1 to 5 are skipped.522 \fBguest only = yes\fR 523 and the server is running with share-level security (\fBsecurity = share\fR, steps 1 to 5 are skipped. 524 524 .TP 3n 525 525 1. 526 526 If the client has passed a username/password pair and that username/password pair is validated by the UNIX system's password programs, the connection is made as that username. This includes the 527 \\ server\service%\fIusername\fR527 \\\\server\\service%\fIusername\fR 528 528 method of passing a username. 529 529 .TP 3n … … 672 672 .RS 3n 673 673 .TP 3n 674 • 674 \(bu 675 675 \fIport name\fR 676 676 .TP 3n 677 • 677 \(bu 678 678 \fIdevice URI\fR 679 679 .RE … … 704 704 .RS 3n 705 705 .TP 3n 706 • 706 \(bu 707 707 \fIprinter name\fR 708 708 .TP 3n 709 • 709 \(bu 710 710 \fIshare name\fR 711 711 .TP 3n 712 • 712 \(bu 713 713 \fIport name\fR 714 714 .TP 3n 715 • 715 \(bu 716 716 \fIdriver name\fR 717 717 .TP 3n 718 • 718 \(bu 719 719 \fIlocation\fR 720 720 .TP 3n 721 • 721 \(bu 722 722 \fIWindows 9x driver location\fR 723 723 .RE … … 728 728 \fIaddprinter command\fR 729 729 has been executed, 730 \fBsmbd\fR 730 smbd 731 731 will reparse the 732 732 \fI smb.conf\fR 733 733 to determine if the share defined by the APW exists. If the sharename is still invalid, then 734 \fBsmbd \fR 734 smbd 735 735 will return an ACCESS_DENIED error to the client. 736 736 .sp … … 751 751 \fIsmb.conf\fR. In order to successfully execute the 752 752 \fIadd share command\fR, 753 \fBsmbd\fR 753 smbd 754 754 requires that the administrator be connected using a root account (i.e. uid == 0). 755 755 .sp 756 756 When executed, 757 \fBsmbd\fR 757 smbd 758 758 will automatically invoke the 759 759 \fIadd share command\fR … … 761 761 .RS 3n 762 762 .TP 3n 763 • 763 \(bu 764 764 \fIconfigFile\fR 765 765 - the location of the global … … 767 767 file. 768 768 .TP 3n 769 • 769 \(bu 770 770 \fIshareName\fR 771 771 - the name of the new share. 772 772 .TP 3n 773 • 773 \(bu 774 774 \fIpathName\fR 775 775 - path to an **existing** directory on disk. 776 776 .TP 3n 777 • 777 \(bu 778 778 \fIcomment\fR 779 779 - comment string to associate with the new share. 780 780 .TP 3n 781 • 781 \(bu 782 782 \fImax connections\fR 783 783 Number of maximum simultaneous connections to this share. … … 819 819 contacts the 820 820 password server and attempts to authenticate the given user with the given password. If the authentication succeeds then 821 \fBsmbd\fR 821 smbd 822 822 attempts to find a UNIX user in the UNIX password database to map the Windows user into. If this lookup fails, and 823 823 add user script is set then 824 \fBsmbd\fR 824 smbd 825 825 will call the specified script 826 826 \fBAS ROOT\fR, expanding any … … 829 829 .sp 830 830 If this script successfully creates the user then 831 \fBsmbd\fR 831 smbd 832 832 will continue on as though the UNIX user already existed. In this way, UNIX users are dynamically created to match existing Windows NT accounts. 833 833 .sp … … 855 855 .sp 856 856 Note that the 857 \fBadduser\fR 857 adduser 858 858 command used in the example below does not support the used syntax on all systems. 859 859 .sp … … 902 902 Example: 903 903 \fB\fIafs username map\fR = %u@afs.samba.org \fR 904 .RE 905 .PP 906 aio read size (S) 907 .RS 3n 908 If Samba has been built with asynchronous I/O support and this integer parameter is set to non-zero value, Samba will read from file asynchronously when size of request is bigger than this value. Note that it happens only for non-chained and non-chaining reads and when not using write cache. 909 .sp 910 Current implementation of asynchronous I/O in Samba 3.0 does support only up to 10 outstanding asynchronous requests, read and write combined. 911 .sp 912 913 914 write cache size 915 aio write size 916 917 Default: 918 \fB\fIaio read size\fR = 0 \fR 919 .sp 920 Example: 921 \fB\fIaio read size\fR = 16384 # Use asynchronous I/O for reads bigger than 16KB request size \fR 922 .RE 923 .PP 924 aio write size (S) 925 .RS 3n 926 If Samba has been built with asynchronous I/O support and this integer parameter is set to non-zero value, Samba will write to file asynchronously when size of request is bigger than this value. Note that it happens only for non-chained and non-chaining reads and when not using write cache. 927 .sp 928 Current implementation of asynchronous I/O in Samba 3.0 does support only up to 10 outstanding asynchronous requests, read and write combined. 929 .sp 930 931 932 write cache size 933 aio read size 934 935 Default: 936 \fB\fIaio write size\fR = 0 \fR 937 .sp 938 Example: 939 \fB\fIaio write size\fR = 16384 # Use asynchronous I/O for writes bigger than 16KB request size \fR 904 940 .RE 905 941 .PP … … 974 1010 .RS 3n 975 1011 This option allows the administrator to chose what authentication methods 976 \fBsmbd\fR 1012 smbd 977 1013 will use when authenticating a user. This option defaults to sensible values based on 978 1014 security. This should be considered a developer option and used only in rare circumstances. In the majority (if not all) of production servers, the default setting should be adequate. … … 1019 1055 .sp 1020 1056 For name service it causes 1021 \fBnmbd\fR 1057 nmbd 1022 1058 to bind to ports 137 and 138 on the interfaces listed in the 1023 1059 interfaces parameter. 1024 \fBnmbd\fR 1060 nmbd 1025 1061 also binds to the "all addresses" interface (0.0.0.0) on ports 137 and 138 for the purposes of reading broadcast messages. If this option is not set then 1026 \fBnmbd\fR 1062 nmbd 1027 1063 will service name requests on all of these sockets. If 1028 1064 bind interfaces only is set then 1029 \fBnmbd\fR 1065 nmbd 1030 1066 will check the source address of any packets coming in on the broadcast sockets and discard any that don't match the broadcast addresses of the interfaces in the 1031 1067 interfaces parameter list. As unicast packets are received on the other sockets it allows 1032 \fBnmbd\fR 1068 nmbd 1033 1069 to refuse to serve names to machines that send packets that arrive through any interfaces not listed in the 1034 1070 interfaces list. IP Source address spoofing does defeat this simple check, however, so it must not be used seriously as a security feature for 1035 \fBnmbd\fR.1071 nmbd. 1036 1072 .sp 1037 1073 For file service it causes … … 1039 1075 to bind only to the interface list given in the 1040 1076 interfaces parameter. This restricts the networks that 1041 \fBsmbd\fR 1077 smbd 1042 1078 will serve to packets coming in those interfaces. Note that you should not use this parameter for machines that are serving PPP or other intermittent or non-broadcast network interfaces as it will not cope with non-permanent interfaces. 1043 1079 .sp … … 1053 1089 .sp 1054 1090 To change a users SMB password, the 1055 \fBsmbpasswd\fR 1091 smbpasswd 1056 1092 by default connects to the 1057 1093 \fBlocalhost - 127.0.0.1\fR … … 1061 1097 is added to the 1062 1098 interfaces parameter list then 1063 \fB smbpasswd\fR 1099 smbpasswd 1064 1100 will fail to connect in it's default mode. 1065 \fBsmbpasswd\fR 1101 smbpasswd 1066 1102 can be forced to use the primary IP interface of the local host by using its 1067 1103 \fBsmbpasswd\fR(8) … … 1072 1108 .sp 1073 1109 The 1074 \fBswat\fR 1110 swat 1075 1111 status page tries to connect with 1076 \fBsmbd\fR 1112 smbd 1077 1113 and 1078 \fBnmbd\fR 1114 nmbd 1079 1115 at the address 1080 1116 \fB127.0.0.1\fR … … 1082 1118 \fB127.0.0.1\fR 1083 1119 will cause 1084 \fB smbd\fR 1120 smbd 1085 1121 and 1086 \fBnmbd\fR 1122 nmbd 1087 1123 to always show "not running" even if they really are. This can prevent 1088 \fB swat\fR 1124 swat 1089 1125 from starting/stopping/restarting 1090 \fBsmbd\fR 1126 smbd 1091 1127 and 1092 \fBnmbd\fR.1128 nmbd. 1093 1129 .sp 1094 1130 Default: … … 1146 1182 \fBsmbd\fR(8) 1147 1183 will serve a browse list to a client doing a 1148 \fBNetServerEnum\fR 1184 NetServerEnum 1149 1185 call. Normally set to 1150 1186 \fByes\fR. You should never need to change this. … … 1185 1221 \fIsmb.conf\fR. In order to successfully execute the 1186 1222 \fIchange share command\fR, 1187 \fBsmbd\fR 1223 smbd 1188 1224 requires that the administrator be connected using a root account (i.e. uid == 0). 1189 1225 .sp 1190 1226 When executed, 1191 \fBsmbd\fR 1227 smbd 1192 1228 will automatically invoke the 1193 1229 \fIchange share command\fR … … 1195 1231 .RS 3n 1196 1232 .TP 3n 1197 • 1233 \(bu 1198 1234 \fIconfigFile\fR 1199 1235 - the location of the global … … 1201 1237 file. 1202 1238 .TP 3n 1203 • 1239 \(bu 1204 1240 \fIshareName\fR 1205 1241 - the name of the new share. 1206 1242 .TP 3n 1207 • 1243 \(bu 1208 1244 \fIpathName\fR 1209 1245 - path to an **existing** directory on disk. 1210 1246 .TP 3n 1211 • 1247 \(bu 1212 1248 \fIcomment\fR 1213 1249 - comment string to associate with the new share. 1214 1250 .TP 3n 1215 • 1251 \(bu 1216 1252 \fImax connections\fR 1217 1253 Number of maximum simultaneous connections to this share. … … 1254 1290 .sp 1255 1291 Disabling this option will also disable the 1256 \fBclient plaintext auth\fR 1292 client plaintext auth 1257 1293 option 1258 1294 .sp 1259 1295 Likewise, if the 1260 \fBclient ntlmv2 auth\fR 1296 client ntlmv2 auth 1261 1297 parameter is enabled, then only NTLMv2 logins will be attempted. 1262 1298 .sp … … 1274 1310 .sp 1275 1311 Similarly, if enabled, NTLMv1, 1276 \fBclient lanman auth\fR 1312 client lanman auth 1277 1313 and 1278 \fBclient plaintext auth\fR 1314 client plaintext auth 1279 1315 authentication will be disabled. This also disables share-level authentication. 1280 1316 .sp 1281 1317 If disabled, an NTLM response (and possibly a LANMAN response) will be sent by the client, depending on the value of 1282 \fBclient lanman auth\fR.1318 client lanman auth. 1283 1319 .sp 1284 1320 Note that some sites (particularly those following 'best practice' security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM. … … 1335 1371 .RS 3n 1336 1372 This is a text field that is seen next to a share when a client does a queries the server, either via the network neighborhood or via 1337 \fBnet view\fR 1373 net view 1338 1374 to list what shares are available. 1339 1375 .sp … … 1568 1604 .sp 1569 1605 This parameter should be used with care and tested with the printer driver in question. It is better to leave the device mode to NULL and let the Windows client set the correct values. Because drivers do not do this all the time, setting 1570 \fBdefault devmode = yes\fR 1606 default devmode = yes 1571 1607 will instruct smbd to generate a default one. 1572 1608 .sp … … 1647 1683 Once the 1648 1684 deleteprinter command has been executed, 1649 \fBsmbd\fR 1685 smbd 1650 1686 will reparse the 1651 1687 \fI smb.conf\fR 1652 1688 to associated printer no longer exists. If the sharename is still valid, then 1653 \fBsmbd \fR 1689 smbd 1654 1690 will return an ACCESS_DENIED error to the client. 1655 1691 .sp … … 1678 1714 \fIsmb.conf\fR. In order to successfully execute the 1679 1715 \fIdelete share command\fR, 1680 \fBsmbd\fR 1716 smbd 1681 1717 requires that the administrator be connected using a root account (i.e. uid == 0). 1682 1718 .sp 1683 1719 When executed, 1684 \fBsmbd\fR 1720 smbd 1685 1721 will automatically invoke the 1686 1722 \fIdelete share command\fR … … 1688 1724 .RS 3n 1689 1725 .TP 3n 1690 • 1726 \(bu 1691 1727 \fIconfigFile\fR 1692 1728 - the location of the global … … 1694 1730 file. 1695 1731 .TP 3n 1696 • 1732 \(bu 1697 1733 \fIshareName\fR 1698 1734 - the name of the existing service. … … 1733 1769 .sp 1734 1770 This script is called when a remote client removes a user from the server, normally using 'User Manager for Domains' or 1735 \fBrpcclient\fR.1771 rpcclient. 1736 1772 .sp 1737 1773 This script should delete the given UNIX username. … … 1932 1968 Note that the maximum length for a NetBIOS name is 15 characters, so the DNS name (or DNS alias) can likewise only be 15 characters, maximum. 1933 1969 .sp 1934 \fBnmbd\fR 1970 nmbd 1935 1971 spawns a second copy of itself to do the DNS name lookup requests, as doing a name lookup is a blocking action. 1936 1972 .sp … … 1954 1990 \fBsmbd\fR(8) 1955 1991 to enable WAN-wide browse list collation. Setting this option causes 1956 \fBnmbd\fR 1992 nmbd 1957 1993 to claim a special domain specific NetBIOS name that identifies it as a domain master browser for its given 1958 1994 workgroup. Local master browsers in the same 1959 1995 workgroup on broadcast-isolated subnets will give this 1960 \fBnmbd\fR 1996 nmbd 1961 1997 their local browse lists, and then ask 1962 1998 \fBsmbd\fR(8) … … 1966 2002 workgroup specific special NetBIOS name that identifies them as domain master browsers for that 1967 2003 workgroup by default (i.e. there is no way to prevent a Windows NT PDC from attempting to do this). This means that if this parameter is set and 1968 \fBnmbd\fR 2004 nmbd 1969 2005 claims the special name for a 1970 2006 workgroup before a Windows NT PDC is able to do so then cross subnet browsing will behave strangely and may fail. … … 2035 2071 .RS 3n 2036 2072 Under DOS and Windows, if a user can write to a file they can change the timestamp on it. Under POSIX semantics, only the owner of the file or root may change the timestamp. By default, Samba runs with POSIX semantics and refuses to change the timestamp on a file if the user 2037 \fBsmbd\fR 2073 smbd 2038 2074 is acting on behalf of is not the file owner. Setting this option to 2039 2075 \fB yes\fR … … 2067 2103 .RS 3n 2068 2104 This parameter controls whether or not smbd will honor privileges assigned to specific SIDs via either 2069 \fBnet rpc rights\fR 2105 net rpc rights 2070 2106 or one of the Windows user and group manager tools. This parameter is enabled by default. It can be disabled to prevent members of the Domain Admins group from being able to assign privileges to users or groups which can then result in certain smbd operations running as root that would normally run under the context of the connected user. 2071 2107 .sp … … 2094 2130 program for information on how to set up and maintain this file), or set the 2095 2131 security = [server|domain|ads] parameter which causes 2096 \fBsmbd\fR 2132 smbd 2097 2133 to authenticate against another server. 2098 2134 .sp … … 2117 2153 enumports command (G) 2118 2154 .RS 3n 2119 The concept of a "port" is fairly foreign to UNIX hosts. Under Windows NT/2000 print servers, a port is associated with a port monitor and generally takes the form of a local port (i.e. LPT1:, COM1:, FILE:) or a remote port (i.e. LPD Port Monitor, etc...). By default, Samba has only one port defined--\fB"Samba Printer Port"\fR. Under Windows NT/2000, all printers must have a valid port name. If you wish to have a list of ports displayed ( \fBsmbd \fR2155 The concept of a "port" is fairly foreign to UNIX hosts. Under Windows NT/2000 print servers, a port is associated with a port monitor and generally takes the form of a local port (i.e. LPT1:, COM1:, FILE:) or a remote port (i.e. LPD Port Monitor, etc...). By default, Samba has only one port defined--\fB"Samba Printer Port"\fR. Under Windows NT/2000, all printers must have a valid port name. If you wish to have a list of ports displayed (smbd 2120 2156 does not use a port name for anything) other than the default 2121 2157 \fB"Samba Printer Port"\fR, you can define … … 2163 2199 .sp 2164 2200 When you set 2165 \fBfake oplocks = yes\fR,2201 fake oplocks = yes, 2166 2202 \fBsmbd\fR(8) 2167 2203 will always grant oplock requests no matter how many clients are using the file. … … 2187 2223 .sp 2188 2224 This option is enabled (i.e. 2189 \fBsmbd\fR 2225 smbd 2190 2226 will follow symbolic links) by default. 2191 2227 .sp … … 2367 2403 .RS 3n 2368 2404 The 2369 \fBget quota command\fR 2405 get quota command 2370 2406 should only be used whenever there is no operating system API available from the OS that samba can use. 2371 2407 .sp 2372 2408 This option is only available with 2373 \fB./configure --with-sys-quotas\fR. Or on linux when2374 \fB./configure --with-quotas\fR 2409 ./configure --with-sys-quotas. Or on linux when 2410 ./configure --with-quotas 2375 2411 was used and a working quota api was found in the system. 2376 2412 .sp … … 2380 2416 .RS 3n 2381 2417 .TP 3n 2382 • 2418 \(bu 2383 2419 directory 2384 2420 .TP 3n 2385 • 2421 \(bu 2386 2422 type of query 2387 2423 .TP 3n 2388 • 2424 \(bu 2389 2425 uid of user or gid of group 2390 2426 .RE … … 2393 2429 .RS 3n 2394 2430 .TP 3n 2395 • 2431 \(bu 2396 2432 1 - user quotas 2397 2433 .TP 3n 2398 • 2434 \(bu 2399 2435 2 - user default quotas (uid = -1) 2400 2436 .TP 3n 2401 • 2437 \(bu 2402 2438 3 - group quotas 2403 2439 .TP 3n 2404 • 2440 \(bu 2405 2441 4 - group default quotas (gid = -1) 2406 2442 .RE … … 2409 2445 .RS 3n 2410 2446 .TP 3n 2411 • 2447 \(bu 2412 2448 Arg 1 - quota flags (0 = no quotas, 1 = quotas enabled, 2 = quotas enabled and enforced) 2413 2449 .TP 3n 2414 • 2450 \(bu 2415 2451 Arg 2 - number of currently used blocks 2416 2452 .TP 3n 2417 • 2453 \(bu 2418 2454 Arg 3 - the softlimit number of blocks 2419 2455 .TP 3n 2420 • 2456 \(bu 2421 2457 Arg 4 - the hardlimit number of blocks 2422 2458 .TP 3n 2423 • 2459 \(bu 2424 2460 Arg 5 - currently used number of inodes 2425 2461 .TP 3n 2426 • 2462 \(bu 2427 2463 Arg 6 - the softlimit number of inodes 2428 2464 .TP 3n 2429 • 2465 \(bu 2430 2466 Arg 7 - the hardlimit number of inodes 2431 2467 .TP 3n 2432 • 2468 \(bu 2433 2469 Arg 8(optional) - the number of bytes in a block(default is 1024) 2434 2470 .RE … … 2457 2493 .sp 2458 2494 On some systems the default guest account "nobody" may not be able to print. Use another account in this case. You should test this by trying to log in as your guest user (perhaps by using the 2459 \fBsu -\fR 2495 su - 2460 2496 command) and trying to print using the system print command such as 2461 \fBlpr(1)\fR 2497 lpr(1) 2462 2498 or 2463 \fB lp(1)\fR.2499 lp(1). 2464 2500 .sp 2465 2501 This parameter does not accept % macros, because many parts of the system require this value to be constant for correct operation. … … 2590 2626 .nf 2591 2627 2592 \fBusername server:/some/file/system\fR 2628 username server:/some/file/system 2593 2629 2594 2630 .fi … … 2623 2659 .RS 3n 2624 2660 Specifies whether samba should use (expensive) hostname lookups or use the ip addresses instead. An example place where hostname lookups are currently used is when checking the 2625 \fBhosts deny\fR 2661 hosts deny 2626 2662 and 2627 \fBhosts allow\fR.2663 hosts allow. 2628 2664 .sp 2629 2665 Default: … … 2649 2685 .sp 2650 2686 You can specify the hosts by name or IP number. For example, you could restrict access to only the hosts on a Class C subnet with something like 2651 \fBallow hosts = 150.203.5.\fR. The full syntax of the list is described in the man page2687 allow hosts = 150.203.5.. The full syntax of the list is described in the man page 2652 2688 \fIhosts_access(5)\fR. Note that this man page may not be present on your system, so a brief description will be given here also. 2653 2689 .sp … … 2661 2697 Example 1: allow all IPs in 150.203.*.*; except one 2662 2698 .sp 2663 \fBhosts allow = 150.203. EXCEPT 150.203.6.66\fR 2699 hosts allow = 150.203. EXCEPT 150.203.6.66 2664 2700 .sp 2665 2701 Example 2: allow hosts that match the given network/netmask 2666 2702 .sp 2667 \fBhosts allow = 150.203.15.0/255.255.255.0\fR 2703 hosts allow = 150.203.15.0/255.255.255.0 2668 2704 .sp 2669 2705 Example 3: allow a couple of hosts 2670 2706 .sp 2671 \fBhosts allow = lapland, arvidsjaur\fR 2707 hosts allow = lapland, arvidsjaur 2672 2708 .sp 2673 2709 Example 4: allow only hosts in NIS netgroup "foonet", but deny access from one particular host 2674 2710 .sp 2675 \fBhosts allow = @foonet\fR 2676 .sp 2677 \fBhosts deny = pirate\fR 2711 hosts allow = @foonet 2712 .sp 2713 hosts deny = pirate 2678 2714 .sp 2679 2715 .it 1 an-trap … … 2939 2975 .RS 3n 2940 2976 .TP 3n 2941 • 2977 \(bu 2942 2978 a network interface name (such as eth0). This may include shell-like wildcards so eth* will match any interface starting with the substring "eth" 2943 2979 .TP 3n 2944 • 2980 \(bu 2945 2981 an IP address. In this case the netmask is determined from the list of interfaces obtained from the kernel 2946 2982 .TP 3n 2947 • 2983 \(bu 2948 2984 an IP/mask pair. 2949 2985 .TP 3n 2950 • 2986 \(bu 2951 2987 a broadcast/mask pair. 2952 2988 .RE … … 3062 3098 .sp 3063 3099 Unlike the 3064 \fBencrypt passwords\fR 3100 encrypt passwords 3065 3101 option, this parameter cannot alter client behaviour, and the LANMAN response will still be sent over the network. See the 3066 \fBclient lanman auth\fR 3102 client lanman auth 3067 3103 to disable this for Samba's clients (such as smbclient) 3068 3104 .sp 3069 3105 If this option, and 3070 \fBntlm auth\fR 3106 ntlm auth 3071 3107 are both disabled, then only NTLMv2 logins will be permited. Not all clients support NTLMv2, and most will require special configuration to use it. 3072 3108 .sp … … 3158 3194 .RS 3n 3159 3195 .TP 3n 3160 • 3196 \(bu 3161 3197 \fIYes\fR 3162 3198 = Try to update the LDAP, NT and LM passwords and update the pwdLastSet time. 3163 3199 .TP 3n 3164 • 3200 \(bu 3165 3201 \fINo\fR 3166 3202 = Update NT and LM passwords and update the pwdLastSet time. 3167 3203 .TP 3n 3168 • 3204 \(bu 3169 3205 \fIOnly\fR 3170 3206 = Only update the LDAP password and let the LDAP server do the rest. … … 3192 3228 .sp 3193 3229 To use this option, a basic ldap tree must be provided and the ldap suffix parameters must be properly configured. On virgin servers the default users and groups (Administrator, Guest, Domain Users, Domain Admins, Domain Guests) can be precreated with the command 3194 \fBnet sam provision\fR. To run this command the ldap server must be running, Winindd must be running and the smb.conf ldap options must be properly configured. The tipical ldap setup used with the3230 net sam provision. To run this command the ldap server must be running, Winindd must be running and the smb.conf ldap options must be properly configured. The typical ldap setup used with the 3195 3231 ldapsam:trusted = yes option is usually sufficient to use 3196 3232 ldapsam:editposix = yes as well. … … 3286 3322 \fBNOT\fR 3287 3323 related to Samba's previous SSL support which was enabled by specifying the 3288 \fB--with-ssl\fR 3324 --with-ssl 3289 3325 option to the 3290 3326 \fIconfigure\fR … … 3295 3331 .RS 3n 3296 3332 .TP 3n 3297 • 3333 \(bu 3298 3334 \fIOff\fR 3299 3335 = Never use SSL when querying the directory. 3300 3336 .TP 3n 3301 • 3337 \(bu 3302 3338 \fIStart_tls\fR 3303 3339 = Use the LDAPv3 StartTLS extended operation (RFC2830) for communicating with the directory server. 3304 3340 .TP 3n 3305 • 3341 \(bu 3306 3342 \fIOn\fR 3307 3343 = Use SSL on the ldaps port when contacting the 3308 3344 \fIldap server\fR. Only available when the backwards-compatiblity 3309 \fB--with-ldapsam\fR 3345 --with-ldapsam 3310 3346 option is specified to configure. See 3311 3347 passdb backend … … 3433 3469 \fBno\fR 3434 3470 then 3435 \fB nmbd\fR 3471 nmbd 3436 3472 will not attempt to become a local master browser on a subnet and will also lose in all browsing elections. By default this value is set to 3437 3473 \fByes\fR. Setting this value to … … 3440 3476 \fBbecome\fR 3441 3477 the local master browser on a subnet, just that 3442 \fBnmbd\fR 3478 nmbd 3443 3479 will 3444 3480 \fBparticipate\fR … … 3448 3484 \fBno\fR 3449 3485 will cause 3450 \fBnmbd\fR 3486 nmbd 3451 3487 \fBnever\fR 3452 3488 to become a local master browser. … … 3478 3514 .sp 3479 3515 If 3480 \fBlocking = no\fR, all lock and unlock requests will appear to succeed and all lock queries will report that the file in question is available for locking.3516 locking = no, all lock and unlock requests will appear to succeed and all lock queries will report that the file in question is available for locking. 3481 3517 .sp 3482 3518 If 3483 \fBlocking = yes\fR, real locking will be performed by the server.3519 locking = yes, real locking will be performed by the server. 3484 3520 .sp 3485 3521 This option … … 3573 3609 .sp 3574 3610 3575 \fBlogon home = \\%N\%U\profile\fR 3611 logon home = \\\\%N\\%U\\profile 3576 3612 .sp 3577 3613 This tells Samba to return the above string, with substitutions made when a client requests the info, generally in a NetUserGetInfo request. Win9X clients truncate the info to \\server\share when a user does 3578 \fBnet use /home\fR 3614 net use /home 3579 3615 but use the whole string when dealing with profiles. 3580 3616 .sp … … 3582 3618 logon path was returned rather than 3583 3619 \fIlogon home\fR. This broke 3584 \fBnet use /home\fR 3620 net use /home 3585 3621 but allowed profiles outside the home directory. The current implementation is correct, and can be used for profiles if you use the above trick. 3586 3622 .sp … … 3591 3627 .sp 3592 3628 Default: 3593 \fB\fIlogon home\fR = \\ %N\%U \fR3594 .sp 3595 Example: 3596 \fB\fIlogon home\fR = \\ remote_smb_server\%U \fR3629 \fB\fIlogon home\fR = \\\\%N\\%U \fR 3630 .sp 3631 Example: 3632 \fB\fIlogon home\fR = \\\\remote_smb_server\\%U \fR 3597 3633 .RE 3598 3634 .PP … … 3622 3658 \fBWarning\fR 3623 3659 Do not quote the value. Setting this as 3624 “\\%N\profile\%U” 3660 \fB\\%N\profile\%U\fR 3625 3661 will break profile handling. Where the tdbsam or ldapsam passdb backend is used, at the time the user account is created the value configured for this parameter is written to the passdb backend and that value will over-ride the parameter value present in the smb.conf file. Any error present in the passdb backend account record must be editted using the appropriate tool (pdbedit on the command-line, or any other locally provided system tool). 3626 3662 Note that this option is only useful if Samba is set up as a domain controller. … … 3641 3677 .sp 3642 3678 Default: 3643 \fB\fIlogon path\fR = \\ %N\%U\profile \fR3679 \fB\fIlogon path\fR = \\\\%N\\%U\\profile \fR 3644 3680 .RE 3645 3681 .PP … … 3665 3701 .sp 3666 3702 The contents of the batch file are entirely your choice. A suggested command would be to add 3667 \fBNET TIME \\SERVER /SET /YES\fR, to force every machine to synchronize clocks with the same time server. Another use would be to add3668 \fBNET USE U: \\SERVER\UTILS\fR 3703 NET TIME \\\\SERVER /SET /YES, to force every machine to synchronize clocks with the same time server. Another use would be to add 3704 NET USE U: \\\\SERVER\\UTILS 3669 3705 for commonly used utilities, or 3670 3706 … … 3688 3724 .sp 3689 3725 Example: 3690 \fB\fIlogon script\fR = scripts\ %U.bat \fR3726 \fB\fIlogon script\fR = scripts\\%U.bat \fR 3691 3727 .RE 3692 3728 .PP … … 3709 3745 .sp 3710 3746 Default: 3711 \fB\fIlppause command\fR = # Currently no default value is given to this string, unless the value of the printing parameter is \ fBSYSV\fR, in which case the default is : \fBlp -i %p-%j -H hold\fR or if the value of the \fIprinting\fR parameter is \fBSOFTQ\fR, then the default is: \fBqstat -s -j%j -h\fR. \fR3747 \fB\fIlppause command\fR = # Currently no default value is given to this string, unless the value of the printing parameter is \\fBSYSV\\fR, in which case the default is : lp -i %p-%j -H hold or if the value of the \\fIprinting\\fR parameter is \\fBSOFTQ\\fR, then the default is: qstat -s -j%j -h. \fR 3712 3748 .sp 3713 3749 Example: … … 3718 3754 .RS 3n 3719 3755 This controls how long lpq info will be cached for to prevent the 3720 \fBlpq\fR 3756 lpq 3721 3757 command being called too often. A separate cache is kept for each variation of the 3722 \fB lpq\fR 3758 lpq 3723 3759 command used by the system, so if you use different 3724 \fBlpq\fR 3760 lpq 3725 3761 commands for different users then they won't share cache information. 3726 3762 .sp … … 3728 3764 \fI/tmp/lpq.xxxx\fR 3729 3765 where xxxx is a hash of the 3730 \fBlpq\fR 3766 lpq 3731 3767 command in use. 3732 3768 .sp 3733 3769 The default is 30 seconds, meaning that the cached results of a previous identical 3734 \fBlpq\fR 3770 lpq 3735 3771 command will be used if the cached data is less than 30 seconds old. A large value may be advisable if your 3736 \fBlpq\fR 3772 lpq 3737 3773 command is very slow. 3738 3774 .sp … … 3749 3785 .RS 3n 3750 3786 This parameter specifies the command to be executed on the server host in order to obtain 3751 \fBlpq \fR-style printer status information.3787 lpq-style printer status information. 3752 3788 .sp 3753 3789 This command should be a program or script which takes a printer name as its only parameter and outputs printer status information. … … 3803 3839 \fBSYSV\fR, in which case the default is : 3804 3840 .sp 3805 \fBlp -i %p-%j -H resume\fR 3841 lp -i %p-%j -H resume 3806 3842 .sp 3807 3843 or if the value of the … … 3810 3846 \fBSOFTQ\fR, then the default is: 3811 3847 .sp 3812 \fBqstat -s -j%j -r\fR 3848 qstat -s -j%j -r 3813 3849 .sp 3814 3850 Default: … … 3949 3985 .RS 3n 3950 3986 .TP 3n 3951 • 3987 \(bu 3952 3988 The first (up to) five alphanumeric characters before the rightmost dot of the filename are preserved, forced to upper case, and appear as the first (up to) five characters of the mangled name. 3953 3989 .TP 3n 3954 • 3990 \(bu 3955 3991 A tilde "~" is appended to the first part of the mangled name, followed by a two-character unique sequence, based on the original root name (i.e., the original filename minus its final extension). The final extension is included in the hash calculation only if it contains any upper case characters or is longer than three characters. 3956 3992 .sp … … 3958 3994 mangling char option, if you don't like '~'. 3959 3995 .TP 3n 3960 • 3996 \(bu 3961 3997 Files whose UNIX name begins with a dot will be presented as DOS hidden files. The mangled name will be created as for other filenames, but with the leading dot removed and "___" as its extension regardless of actual original extension (that's three underscores). 3962 3998 .RE … … 4060 4096 .RS 3n 4061 4097 .TP 3n 4062 • 4098 \(bu 4063 4099 4064 4100 \fBYes\fR 4065 4101 - The read only DOS attribute is mapped to the inverse of the user or owner write bit in the unix permission mode set. If the owner write bit is not set, the read only attribute is reported as being set on the file. 4066 4102 .TP 3n 4067 • 4103 \(bu 4068 4104 4069 4105 \fBPermissions\fR … … 4072 4108 by reading the unix permissions and POSIX ACL (if present). If the connecting user does not have permission to modify the file, the read only attribute is reported as being set on the file. 4073 4109 .TP 3n 4074 • 4110 \(bu 4075 4111 4076 4112 \fBNo\fR … … 4113 4149 .RS 3n 4114 4150 .TP 3n 4115 • 4151 \(bu 4116 4152 \fBNever\fR 4117 4153 - Means user login requests with an invalid password are rejected. This is the default. 4118 4154 .TP 3n 4119 • 4155 \(bu 4120 4156 \fBBad User\fR 4121 4157 - Means user logins with an invalid password are rejected, unless the username does not exist, in which case it is treated as a guest login and mapped into the 4122 4158 guest account. 4123 4159 .TP 3n 4124 • 4160 \(bu 4125 4161 \fBBad Password\fR 4126 4162 - Means user logins with an invalid password are treated as a guest login and mapped into the … … 4131 4167 parameter this way :-). 4132 4168 .TP 3n 4133 • 4169 \(bu 4134 4170 \fBBad Uid\fR 4135 4171 - Is only applicable when Samba is configured in some type of domain mode security (security = {domain|ads}) and means that user logins which are successfully authenticated but which have no valid Unix user account (and smbd is unable to create one) should be mapped to the defined guest account. This was the default behavior of Samba 2.x releases. Note that if a member server is running winbindd, this option should never be required because the nss_winbind library will export the Windows domain users and groups to the underlying OS via the Name Service Switch interface. … … 4251 4287 .RS 3n 4252 4288 .TP 3n 4253 • 4289 \(bu 4254 4290 \fBCORE\fR: Earliest version. No concept of user names. 4255 4291 .TP 3n 4256 • 4292 \(bu 4257 4293 \fBCOREPLUS\fR: Slight improvements on CORE for efficiency. 4258 4294 .TP 3n 4259 • 4295 \(bu 4260 4296 \fBLANMAN1\fR: First 4261 4297 \fB modern\fR 4262 4298 version of the protocol. Long filename support. 4263 4299 .TP 3n 4264 • 4300 \(bu 4265 4301 \fBLANMAN2\fR: Updates to Lanman1 protocol. 4266 4302 .TP 3n 4267 • 4303 \(bu 4268 4304 \fBNT1\fR: Current up to date version of the protocol. Used by Windows NT. Known as CIFS. 4269 4305 .RE … … 4322 4358 \fBnmbd\fR(8) 4323 4359 what the default 'time to live' of NetBIOS names should be (in seconds) when 4324 \fBnmbd\fR 4360 nmbd 4325 4361 is requesting a name using either a broadcast packet or from a WINS server. You should never need to change this parameter. The default is 3 days. 4326 4362 .sp … … 4334 4370 \fBsmbd\fR(8) 4335 4371 when acting as a WINS server (wins support = yes) what the maximum 'time to live' of NetBIOS names that 4336 \fBnmbd\fR 4372 nmbd 4337 4373 will grant will be (in seconds). You should never need to change this parameter. The default is 6 days (518400 seconds). 4338 4374 .sp … … 4364 4400 .nf 4365 4401 4366 \fBmessage command = csh -c 'xedit %s;rm %s' &\fR 4402 message command = csh -c 'xedit %s;rm %s' & 4367 4403 4368 4404 .fi … … 4370 4406 .sp 4371 4407 This delivers the message using 4372 \fBxedit\fR, then removes it afterwards.4408 xedit, then removes it afterwards. 4373 4409 \fBNOTE THAT IT IS VERY IMPORTANT THAT THIS COMMAND RETURN IMMEDIATELY\fR. That's why I have the '&' on the end. If it doesn't return immediately then your PCs may freeze when sending messages (they should recover after 30 seconds, hopefully). 4374 4410 .sp … … 4381 4417 .RS 3n 4382 4418 .TP 3n 4383 • 4419 \(bu 4384 4420 \fI%s\fR 4385 4421 = the filename containing the message. 4386 4422 .TP 3n 4387 • 4423 \(bu 4388 4424 \fI%t\fR 4389 4425 = the destination that the message was sent to (probably the server name). 4390 4426 .TP 3n 4391 • 4427 \(bu 4392 4428 \fI%f\fR 4393 4429 = who the message is from. … … 4402 4438 .nf 4403 4439 4404 \fBmessage command = /bin/mail -s 'message from %f on %m' root < %s; rm %s\fR 4440 message command = /bin/mail -s 'message from %f on %m' root < %s; rm %s 4405 4441 4406 4442 .fi … … 4415 4451 .nf 4416 4452 4417 \fBmessage command = rm %s\fR 4453 message command = rm %s 4418 4454 4419 4455 .fi … … 4460 4496 \fBnmbd\fR(8) 4461 4497 when acting as a WINS server (wins support = yes) what the minimum 'time to live' of NetBIOS names that 4462 \fBnmbd\fR 4498 nmbd 4463 4499 will grant will be (in seconds). You should never need to change this parameter. The default is 6 hours (21600 seconds). 4464 4500 .sp … … 4478 4514 .sp 4479 4515 Example: 4480 \fB\fImsdfs proxy\fR = \\ otherserver\someshare \fR4516 \fB\fImsdfs proxy\fR = \\\\otherserver\\someshare \fR 4481 4517 .RE 4482 4518 .PP … … 4510 4546 .RS 3n 4511 4547 .TP 3n 4512 • 4548 \(bu 4513 4549 4514 4550 \fBlmhosts\fR 4515 4551 : Lookup an IP address in the Samba lmhosts file. If the line in lmhosts has no name type attached to the NetBIOS name (see the manpage for lmhosts for details) then any name type matches for lookup. 4516 4552 .TP 3n 4517 • 4553 \(bu 4518 4554 4519 4555 \fBhost\fR … … 4523 4559 file. Note that this method is used only if the NetBIOS name type being queried is the 0x20 (server) name type or 0x1c (domain controllers). The latter case is only useful for active directory domains and results in a DNS query for the SRV RR entry matching _ldap._tcp.domain. 4524 4560 .TP 3n 4525 • 4561 \(bu 4526 4562 \fBwins\fR 4527 4563 : Query a name with the IP address listed in the 4528 4564 WINSSERVER parameter. If no WINS server has been specified this method will be ignored. 4529 4565 .TP 3n 4530 • 4566 \(bu 4531 4567 \fBbcast\fR 4532 4568 : Do a broadcast on each of the known local interfaces listed in the … … 4536 4572 The example below will cause the local lmhosts file to be examined first, followed by a broadcast attempt, followed by a normal system hostname lookup. 4537 4573 .sp 4538 When Samba is functioning in ADS security mode ( \fBsecurity = ads\fR) it is advised to use following settings for4574 When Samba is functioning in ADS security mode (security = ads) it is advised to use following settings for 4539 4575 \fIname resolve order\fR: 4540 4576 .sp 4541 \fBname resolve order = wins bcast\fR 4577 name resolve order = wins bcast 4542 4578 .sp 4543 4579 DC lookups will still be done via DNS, but fallbacks to netbios names will not inundate your DNS servers with needless querys for DOMAIN<0x1c> lookups. … … 4616 4652 .sp 4617 4653 If this option, and 4618 \fBlanman auth\fR 4654 lanman auth 4619 4655 are both disabled, then only NTLMv2 logins will be permited. Not all clients support NTLMv2, and most will require special configuration to us it. 4620 4656 .sp … … 4679 4715 .sp 4680 4716 Note that this also means Samba won't try to deduce usernames from the service name. This can be annoying for the [homes] section. To get around this you could use 4681 \fBuser = %S\fR 4717 user = %S 4682 4718 which means your 4683 4719 \fIuser\fR … … 4723 4759 In brief it specifies a number, which causes 4724 4760 \fBsmbd\fR(8)not to grant an oplock even when requested if the approximate number of clients contending for an oplock on the same file goes over this limit. This causes 4725 \fBsmbd\fR 4761 smbd 4726 4762 to behave in a similar way to Windows NT. 4727 4763 .sp … … 4739 4775 .RS 3n 4740 4776 This boolean option tells 4741 \fBsmbd\fR 4777 smbd 4742 4778 whether to issue oplocks (opportunistic locks) to file open requests on this share. The oplock code can dramatically (approx. 30% or more) improve the speed of access to files on Samba servers. It allows the clients to aggressively cache files locally and you may want to disable this option for unreliable network environments (it is turned on by default in Windows NT Servers). For more information see the file 4743 4779 \fISpeed.txt\fR … … 4761 4797 .sp 4762 4798 For example, a valid entry using the HP LaserJet 5 printer driver would appear as 4763 \fBHP LaserJet 5L = LASERJET.HP LaserJet 5L\fR.4799 HP LaserJet 5L = LASERJET.HP LaserJet 5L. 4764 4800 .sp 4765 4801 The need for the file is due to the printer driver namespace problem described in the chapter on Classical Printing in the Samba3-HOWTO book. For more details on OS/2 clients, please refer to chapter on other clients in the Samba3-HOWTO book. … … 4829 4865 .RS 3n 4830 4866 .TP 3n 4831 • 4832 \fBsmbpasswd\fR 4867 \(bu 4868 smbpasswd 4833 4869 - The default smbpasswd backend. Takes a path to the smbpasswd file as an optional argument. 4834 4870 .TP 3n 4835 • 4836 \fBtdbsam\fR 4871 \(bu 4872 tdbsam 4837 4873 - The TDB based password storage backend. Takes a path to the TDB as an optional argument (defaults to passdb.tdb in the 4838 4874 private dir directory. 4839 4875 .TP 3n 4840 • 4841 \fBldapsam\fR 4876 \(bu 4877 ldapsam 4842 4878 - The LDAP based passdb backend. Takes an LDAP URL as an optional argument (defaults to 4843 \fBldap://localhost\fR)4879 ldap://localhost) 4844 4880 .sp 4845 4881 LDAP connections should be secured where possible. This may be done using either Start-TLS (see … … 4874 4910 Default: 4875 4911 \fB\fIpassdb expand explicit\fR = no \fR 4876 .RE4877 .PP4878 passwd chat debug (G)4879 .RS 3n4880 This boolean specifies if the passwd chat script parameter is run in4881 \fBdebug\fR4882 mode. In this mode the strings passed to and received from the passwd chat are printed in the4883 \fBsmbd\fR(8)4884 log with a4885 debug level of 100. This is a dangerous option as it will allow plaintext passwords to be seen in the4886 \fBsmbd\fR4887 log. It is available to help Samba admins debug their4888 \fIpasswd chat\fR4889 scripts when calling the4890 \fIpasswd program\fR4891 and should be turned off after this has been done. This option has no effect if the4892 pam password change paramter is set. This parameter is off by default.4893 .sp4894 Default:4895 \fB\fIpasswd chat debug\fR = no \fR4896 .RE4897 .PP4898 passwd chat timeout (G)4899 .RS 3n4900 This integer specifies the number of seconds smbd will wait for an initial answer from a passwd chat script being run. Once the initial answer is received the subsequent answers must be received in one tenth of this time. The default it two seconds.4901 .sp4902 Default:4903 \fB\fIpasswd chat timeout\fR = 2 \fR4904 4912 .RE 4905 4913 .PP … … 4935 4943 .sp 4936 4944 Default: 4937 \fB\fIpasswd chat\fR = *new*password* %n\n*new*password* %n\n *changed* \fR 4938 .sp 4939 Example: 4940 \fB\fIpasswd chat\fR = "*Enter OLD password*" %o\n "*Enter NEW password*" %n\n "*Reenter NEW password*" %n\n "*Password changed*" \fR 4945 \fB\fIpasswd chat\fR = *new*password* %n\\n*new*password* %n\\n *changed* \fR 4946 .sp 4947 Example: 4948 \fB\fIpasswd chat\fR = "*Enter OLD password*" %o\\n "*Enter NEW password*" %n\\n "*Reenter NEW password*" %n\\n "*Password changed*" \fR 4949 .RE 4950 .PP 4951 passwd chat debug (G) 4952 .RS 3n 4953 This boolean specifies if the passwd chat script parameter is run in 4954 \fBdebug\fR 4955 mode. In this mode the strings passed to and received from the passwd chat are printed in the 4956 \fBsmbd\fR(8) 4957 log with a 4958 debug level of 100. This is a dangerous option as it will allow plaintext passwords to be seen in the 4959 smbd 4960 log. It is available to help Samba admins debug their 4961 \fIpasswd chat\fR 4962 scripts when calling the 4963 \fIpasswd program\fR 4964 and should be turned off after this has been done. This option has no effect if the 4965 pam password change paramter is set. This parameter is off by default. 4966 .sp 4967 Default: 4968 \fB\fIpasswd chat debug\fR = no \fR 4969 .RE 4970 .PP 4971 passwd chat timeout (G) 4972 .RS 3n 4973 This integer specifies the number of seconds smbd will wait for an initial answer from a passwd chat script being run. Once the initial answer is received the subsequent answers must be received in one tenth of this time. The default it two seconds. 4974 .sp 4975 Default: 4976 \fB\fIpasswd chat timeout\fR = 2 \fR 4941 4977 .RE 4942 4978 .PP … … 4959 4995 \fBAS ROOT\fR 4960 4996 before the SMB password in the smbpasswd file is changed. If this UNIX password change fails, then 4961 \fBsmbd\fR 4997 smbd 4962 4998 will fail to change the SMB password also (this is by design). 4963 4999 .sp … … 5017 5053 .RS 3n 5018 5054 By specifying the name of another SMB server or Active Directory domain controller with this option, and using 5019 \fBsecurity = [ads|domain|server]\fR 5055 security = [ads|domain|server] 5020 5056 it is possible to get Samba to to do all its username/password validation using a specific remote server. 5021 5057 .sp … … 5045 5081 or 5046 5082 \fBads\fR, then the list of machines in this option must be a list of Primary or Backup Domain controllers for the Domain or the character '*', as the Samba server is effectively in that domain, and will use cryptographically authenticated RPC calls to authenticate the user logging on. The advantage of using 5047 \fB security = domain\fR 5083 security = domain 5048 5084 is that if you list several hosts in the 5049 5085 \fIpassword server\fR 5050 5086 option then 5051 \fBsmbd \fR 5087 smbd 5052 5088 will try each in turn till it finds one that responds. This is useful in case your primary server goes down. 5053 5089 .sp … … 5064 5100 parameter is set to 5065 5101 \fBserver\fR, then there are different restrictions that 5066 \fBsecurity = domain\fR 5102 security = domain 5067 5103 doesn't suffer from: 5068 5104 .RS 3n 5069 5105 .TP 3n 5070 • 5106 \(bu 5071 5107 You may list several password servers in the 5072 5108 \fIpassword server\fR 5073 5109 parameter, however if an 5074 \fBsmbd\fR 5110 smbd 5075 5111 makes a connection to a password server, and then the password server fails, no more users will be able to be authenticated from this 5076 \fBsmbd\fR. This is a restriction of the SMB/CIFS protocol when in5077 \fBsecurity = server \fR 5112 smbd. This is a restriction of the SMB/CIFS protocol when in 5113 security = server 5078 5114 mode and cannot be fixed in Samba. 5079 5115 .TP 3n 5080 • 5116 \(bu 5081 5117 If you are using a Windows NT server as your password server then you will have to ensure that your users are able to login from the Samba server, as when in 5082 \fB security = server\fR 5118 security = server 5083 5119 mode the network logon will appear to come from there rather than from the users workstation. 5084 5120 .RE … … 5151 5187 An interesting example may be to unmount server resources: 5152 5188 .sp 5153 \fBpostexec = /etc/umount /cdrom\fR 5189 postexec = /etc/umount /cdrom 5154 5190 .sp 5155 5191 Default: … … 5157 5193 .sp 5158 5194 Example: 5159 \fB\fIpostexec\fR = echo \"%u disconnected from %S from %m (%I)\" >> /tmp/log \fR 5160 .RE 5161 .PP 5162 preexec close (S) 5163 .RS 3n 5164 This boolean option controls whether a non-zero return code from 5165 preexec should close the service being connected to. 5166 .sp 5167 Default: 5168 \fB\fIpreexec close\fR = no \fR 5195 \fB\fIpostexec\fR = echo \\"%u disconnected from %S from %m (%I)\\" >> /tmp/log \fR 5169 5196 .RE 5170 5197 .PP … … 5181 5208 .sp 5182 5209 5183 \fBpreexec = csh -c 'echo \"Welcome to %S!\" | /usr/local/samba/bin/smbclient -M %m -I %I' & \fR 5210 preexec = csh -c 'echo \\"Welcome to %S!\\" | /usr/local/samba/bin/smbclient -M %m -I %I' & 5184 5211 .sp 5185 5212 Of course, this could get annoying after a while :-) … … 5193 5220 .sp 5194 5221 Example: 5195 \fB\fIpreexec\fR = echo \"%u connected to %S from %m (%I)\" >> /tmp/log \fR 5222 \fB\fIpreexec\fR = echo \\"%u connected to %S from %m (%I)\\" >> /tmp/log \fR 5223 .RE 5224 .PP 5225 preexec close (S) 5226 .RS 3n 5227 This boolean option controls whether a non-zero return code from 5228 preexec should close the service being connected to. 5229 .sp 5230 Default: 5231 \fB\fIpreexec close\fR = no \fR 5196 5232 .RE 5197 5233 .PP … … 5209 5245 If this is set to 5210 5246 \fByes\fR, on startup, 5211 \fBnmbd\fR 5247 nmbd 5212 5248 will force an election, and it will have a slight advantage in winning the election. It is recommended that this parameter is used in conjunction with 5213 5249 domain master = yes, so that 5214 \fBnmbd\fR 5250 nmbd 5215 5251 can guarantee becoming a domain master. 5216 5252 .sp … … 5219 5255 Default: 5220 5256 \fB\fIpreferred master\fR = auto \fR 5221 .RE5222 .PP5223 preload modules (G)5224 .RS 3n5225 This is a list of paths to modules that should be loaded into smbd before a client connects. This improves the speed of smbd when reacting to new connections somewhat.5226 .sp5227 Default:5228 \fB\fIpreload modules\fR = \fR5229 .sp5230 Example:5231 \fB\fIpreload modules\fR = /usr/lib/samba/passdb/mysql.so \fR5232 5257 .RE 5233 5258 .PP … … 5249 5274 Example: 5250 5275 \fB\fIpreload\fR = fred lp colorlp \fR 5276 .RE 5277 .PP 5278 preload modules (G) 5279 .RS 3n 5280 This is a list of paths to modules that should be loaded into smbd before a client connects. This improves the speed of smbd when reacting to new connections somewhat. 5281 .sp 5282 Default: 5283 \fB\fIpreload modules\fR = \fR 5284 .sp 5285 Example: 5286 \fB\fIpreload modules\fR = /usr/lib/samba/passdb/mysql.so \fR 5251 5287 .RE 5252 5288 .PP … … 5307 5343 .sp 5308 5344 To use the CUPS printing interface set 5309 \fBprintcap name = cups \fR. This should be supplemented by an addtional setting5345 printcap name = cups. This should be supplemented by an addtional setting 5310 5346 printing = cups in the [global] section. 5311 \fBprintcap name = cups\fR 5347 printcap name = cups 5312 5348 will use the "dummy" printcap created by CUPS, as specified in your CUPS configuration file. 5313 5349 .sp 5314 5350 On System V systems that use 5315 \fBlpstat\fR 5351 lpstat 5316 5352 to list available printers you can use 5317 \fBprintcap name = lpstat \fR 5353 printcap name = lpstat 5318 5354 to automatically obtain lists of available printers. This is the default for systems that define SYSV at configure time in Samba (this includes most System V based systems). If 5319 5355 \fI printcap name\fR 5320 5356 is set to 5321 \fBlpstat\fR 5357 lpstat 5322 5358 on these systems then Samba will launch 5323 \fBlpstat -v\fR 5359 lpstat -v 5324 5360 and attempt to parse the output to obtain a printer list. 5325 5361 .sp … … 5360 5396 .RS 3n 5361 5397 After a print job has finished spooling to a service, this command will be used via a 5362 \fBsystem()\fR 5398 system() 5363 5399 call to process the spool file. Typically the command specified will submit the spool file to the host's printing subsystem, but there is no requirement that this be the case. The server will not remove the spool file, so whatever command you specify should remove the spool file when it has been processed, otherwise you will need to manually remove old spool files. 5364 5400 .sp … … 5398 5434 You can form quite complex print commands by realizing that they are just passed to a shell. For example the following will log a print job, print the file, then remove it. Note that ';' is the usual separator for command in shell scripts. 5399 5435 .sp 5400 \fBprint command = echo Printing %s >> /tmp/print.log; lpr -P %p %s; rm %s\fR 5436 print command = echo Printing %s >> /tmp/print.log; lpr -P %p %s; rm %s 5401 5437 .sp 5402 5438 You may have to vary this command considerably depending on how you normally print files on your system. The default for the parameter varies depending on the setting of the … … 5404 5440 .sp 5405 5441 Default: For 5406 \fBprinting = BSD, AIX, QNX, LPRNG or PLP :\fR 5407 .sp 5408 \fBprint command = lpr -r -P%p %s\fR 5442 printing = BSD, AIX, QNX, LPRNG or PLP : 5443 .sp 5444 print command = lpr -r -P%p %s 5409 5445 .sp 5410 5446 For 5411 \fBprinting = SYSV or HPUX :\fR 5412 .sp 5413 \fBprint command = lp -c -d%p %s; rm %s\fR 5447 printing = SYSV or HPUX : 5448 .sp 5449 print command = lp -c -d%p %s; rm %s 5414 5450 .sp 5415 5451 For 5416 \fBprinting = SOFTQ :\fR 5417 .sp 5418 \fBprint command = lp -d%p -s %s; rm %s\fR 5452 printing = SOFTQ : 5453 .sp 5454 print command = lp -d%p -s %s; rm %s 5419 5455 .sp 5420 5456 For printing = CUPS : If SAMBA is compiled against libcups, then 5421 5457 printcap = cups uses the CUPS API to submit jobs, etc. Otherwise it maps to the System V commands with the -oraw option for printing, i.e. it uses 5422 \fBlp -c -d%p -oraw; rm %s\fR. With5423 \fBprinting = cups\fR, and if SAMBA is compiled against libcups, any manually set print command will be ignored.5458 lp -c -d%p -oraw; rm %s. With 5459 printing = cups, and if SAMBA is compiled against libcups, any manually set print command will be ignored. 5424 5460 .sp 5425 5461 \fBNo default\fR … … 5509 5545 .sp 5510 5546 Example: 5511 \fB\fIprintjob username\fR = %D\ %U \fR5547 \fB\fIprintjob username\fR = %D\\%U \fR 5512 5548 .RE 5513 5549 .PP … … 5611 5647 \fByes\fR, then users of a service may not create or modify files in the service's directory. 5612 5648 .sp 5613 Note that a printable service ( \fBprintable = yes\fR) will5649 Note that a printable service (printable = yes) will 5614 5650 \fBALWAYS\fR 5615 5651 allow writing to the directory (user privileges permitting), but only via spooling operations. … … 5636 5672 .RS 3n 5637 5673 This option specifies the kerberos realm to use. The realm is used as the ADS equivalent of the NT4 5638 \fBdomain\fR. It is usually set to the DNS name of the kerberos server.5674 domain. It is usually set to the DNS name of the kerberos server. 5639 5675 .sp 5640 5676 Default: … … 5658 5694 .nf 5659 5695 5660 \fBremote announce = 192.168.2.255/SERVERS 192.168.4.255/STAFF\fR 5696 remote announce = 192.168.2.255/SERVERS 192.168.4.255/STAFF 5661 5697 5662 5698 .fi 5663 5699 the above line would cause 5664 \fBnmbd\fR 5700 nmbd 5665 5701 to announce itself to the two given IP addresses using the given workgroup names. If you leave out the workgroup name then the one given in the 5666 5702 workgroup parameter is used instead. … … 5692 5728 .fi 5693 5729 the above line would cause 5694 \fBnmbd\fR 5730 nmbd 5695 5731 to request the master browser on the specified subnets or addresses to synchronize their browse lists with the local server. 5696 5732 .sp … … 5773 5809 .RS 3n 5774 5810 The server will 5775 \fBchroot()\fR 5811 chroot() 5776 5812 (i.e. Change its root directory) to this directory on startup. This is not strictly necessary for secure operation. Even without it the server will deny access to files not in one of the service entries. It may also check for, and deny access to, soft links to other parts of the filesystem, or attempts to use ".." in file names to access other directories (depending on the setting of the 5777 5813 wide smbconfoptions parameter). … … 5806 5842 .RE 5807 5843 .PP 5844 root preexec (S) 5845 .RS 3n 5846 This is the same as the 5847 \fIpreexec\fR 5848 parameter except that the command is run as root. This is useful for mounting filesystems (such as CDROMs) when a connection is opened. 5849 .sp 5850 Default: 5851 \fB\fIroot preexec\fR = \fR 5852 .RE 5853 .PP 5808 5854 root preexec close (S) 5809 5855 .RS 3n … … 5816 5862 .RE 5817 5863 .PP 5818 root preexec (S)5819 .RS 3n5820 This is the same as the5821 \fIpreexec\fR5822 parameter except that the command is run as root. This is useful for mounting filesystems (such as CDROMs) when a connection is opened.5823 .sp5824 Default:5825 \fB\fIroot preexec\fR = \fR5826 .RE5827 .PP5828 security mask (S)5829 .RS 3n5830 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box.5831 .sp5832 This parameter is applied as a mask (AND'ed with) to the changed permission bits, thus preventing any bits not in this mask from being modified. Make sure not to mix up this parameter with5833 force security mode, which works in a manner similar to this one but uses a logical OR instead of an AND.5834 .sp5835 Essentially, zero bits in this mask may be treated as a set of bits the user is not allowed to change.5836 .sp5837 If not set explicitly this parameter is 0777, allowing a user to modify all the user/group/world permissions on a file.5838 .sp5839 \fB Note\fR5840 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems. Administrators of most normal systems will probably want to leave it set to5841 \fB0777\fR.5842 .sp5843 Default:5844 \fB\fIsecurity mask\fR = 0777 \fR5845 .sp5846 Example:5847 \fB\fIsecurity mask\fR = 0770 \fR5848 .RE5849 .PP5850 5864 security (G) 5851 5865 .RS 3n … … 5859 5873 .sp 5860 5874 The default is 5861 \fBsecurity = user\fR, as this is the most common setting needed when talking to Windows 98 and Windows NT.5875 security = user, as this is the most common setting needed when talking to Windows 98 and Windows NT. 5862 5876 .sp 5863 5877 The alternatives are 5864 \fBsecurity = share\fR,5865 \fBsecurity = server\fR 5878 security = share, 5879 security = server 5866 5880 or 5867 \fBsecurity = domain \fR.5881 security = domain. 5868 5882 .sp 5869 5883 In versions of Samba prior to 2.0.0, the default was 5870 \fBsecurity = share\fR 5884 security = share 5871 5885 mainly because that was the only option at one stage. 5872 5886 .sp … … 5874 5888 .sp 5875 5889 If your PCs use usernames that are the same as their usernames on the UNIX machine then you will want to use 5876 \fBsecurity = user\fR. If you mostly use usernames that don't exist on the UNIX box then use5877 \fBsecurity = share\fR.5890 security = user. If you mostly use usernames that don't exist on the UNIX box then use 5891 security = share. 5878 5892 .sp 5879 5893 You should also use 5880 \fBsecurity = share\fR 5894 security = share 5881 5895 if you want to mainly setup shares without a password (guest shares). This is commonly used for a shared printer server. It is more difficult to setup guest shares with 5882 \fBsecurity = user\fR, see the5896 security = user, see the 5883 5897 map to guestparameter for details. 5884 5898 .sp 5885 5899 It is possible to use 5886 \fBsmbd\fR 5900 smbd 5887 5901 in a 5888 5902 \fB hybrid mode\fR … … 5895 5909 .sp 5896 5910 When clients connect to a share level security server they need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a 5897 \fBsecurity = share \fR 5911 security = share 5898 5912 server). Instead, the clients send authentication information (passwords) on a per-share basis, at the time they attempt to connect to that share. 5899 5913 .sp 5900 5914 Note that 5901 \fBsmbd\fR 5915 smbd 5902 5916 \fBALWAYS\fR 5903 5917 uses a valid UNIX user to act on behalf of the client, even in 5904 \fBsecurity = share\fR 5918 security = share 5905 5919 level security. 5906 5920 .sp 5907 5921 As clients are not required to send a username to the server in share level security, 5908 \fBsmbd\fR 5922 smbd 5909 5923 uses several techniques to determine the correct UNIX user to use on behalf of the client. 5910 5924 .sp … … 5912 5926 .RS 3n 5913 5927 .TP 3n 5914 • 5928 \(bu 5915 5929 If the 5916 5930 guest only parameter is set, then all the other stages are missed and only the 5917 5931 guest account username is checked. 5918 5932 .TP 3n 5919 • 5933 \(bu 5920 5934 Is a username is sent with the share connection request, then this username (after mapping - see 5921 5935 username map), is added as a potential username. 5922 5936 .TP 3n 5923 • 5937 \(bu 5924 5938 If the client did a previous 5925 5939 \fBlogon \fR 5926 5940 request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username. 5927 5941 .TP 3n 5928 • 5942 \(bu 5929 5943 The name of the service the client requested is added as a potential username. 5930 5944 .TP 3n 5931 • 5945 \(bu 5932 5946 The NetBIOS name of the client is added to the list as a potential username. 5933 5947 .TP 3n 5934 • 5948 \(bu 5935 5949 Any users on the 5936 5950 user list are added as potential usernames. … … 5984 5998 \fBNote\fR 5985 5999 that from the client's point of view 5986 \fBsecurity = domain\fR 6000 security = domain 5987 6001 is the same as 5988 \fBsecurity = user\fR. It only affects how the server deals with the authentication, it does not in any way affect what the client sees.6002 security = user. It only affects how the server deals with the authentication, it does not in any way affect what the client sees. 5989 6003 .sp 5990 6004 \fBNote\fR … … 6005 6019 .sp 6006 6020 In this mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box. If this fails it will revert to 6007 \fBsecurity = user\fR. It expects the6021 security = user. It expects the 6008 6022 encrypted passwords parameter to be set to 6009 6023 \fByes\fR, unless the remote server does not support them. However note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid … … 6024 6038 \fBNote\fR 6025 6039 From the client's point of view 6026 \fBsecurity = server\fR 6040 security = server 6027 6041 is the same as 6028 \fBsecurity = user\fR. It only affects how the server deals with the authentication, it does not in any way affect what the client sees.6042 security = user. It only affects how the server deals with the authentication, it does not in any way affect what the client sees. 6029 6043 \fBNote\fR 6030 6044 that the name of the resource being requested is … … 6056 6070 .RE 6057 6071 .PP 6072 security mask (S) 6073 .RS 3n 6074 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box. 6075 .sp 6076 This parameter is applied as a mask (AND'ed with) to the changed permission bits, thus preventing any bits not in this mask from being modified. Make sure not to mix up this parameter with 6077 force security mode, which works in a manner similar to this one but uses a logical OR instead of an AND. 6078 .sp 6079 Essentially, zero bits in this mask may be treated as a set of bits the user is not allowed to change. 6080 .sp 6081 If not set explicitly this parameter is 0777, allowing a user to modify all the user/group/world permissions on a file. 6082 .sp 6083 \fB Note\fR 6084 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems. Administrators of most normal systems will probably want to leave it set to 6085 \fB0777\fR. 6086 .sp 6087 Default: 6088 \fB\fIsecurity mask\fR = 0777 \fR 6089 .sp 6090 Example: 6091 \fB\fIsecurity mask\fR = 0770 \fR 6092 .RE 6093 .PP 6058 6094 server schannel (G) 6059 6095 .RS 3n … … 6093 6129 .RS 3n 6094 6130 This controls what string will show up in the printer comment box in print manager and next to the IPC connection in 6095 \fBnet view\fR. It can be any string that you wish to show to your users.6131 net view. It can be any string that you wish to show to your users. 6096 6132 .sp 6097 6133 It also sets what will appear in browse lists next to the machine name. … … 6115 6151 .RS 3n 6116 6152 If 6117 \fBset directory = no\fR, then users of the service may not use the setdir command to change directory.6153 set directory = no, then users of the service may not use the setdir command to change directory. 6118 6154 .sp 6119 6155 The 6120 \fBsetdir\fR 6156 setdir 6121 6157 command is only implemented in the Digital Pathworks client. See the Pathworks documentation for details. 6122 6158 .sp … … 6128 6164 .RS 3n 6129 6165 Thanks to the Posix subsystem in NT a Windows User has a primary group in addition to the auxiliary groups. This script sets the primary group in the unix userdatase when an administrator sets the primary group from the windows user manager or when fetching a SAM with 6130 \fBnet rpc vampire\fR.6166 net rpc vampire. 6131 6167 \fI%u\fR 6132 6168 will be replaced with the user whose primary group is to be set. … … 6144 6180 .RS 3n 6145 6181 The 6146 \fBset quota command\fR 6182 set quota command 6147 6183 should only be used whenever there is no operating system API available from the OS that samba can use. 6148 6184 .sp 6149 6185 This option is only available if Samba was configured with the argument 6150 \fB--with-sys-quotas\fR 6186 --with-sys-quotas 6151 6187 or on linux when 6152 \fB./configure --with-quotas\fR 6188 ./configure --with-quotas 6153 6189 was used and a working quota api was found in the system. Most packages are configured with these options already. 6154 6190 .sp … … 6158 6194 .RS 3n 6159 6195 .TP 3n 6160 • 6196 \(bu 6161 6197 1 - quota type 6162 6198 .RS 3n 6163 6199 .TP 3n 6164 • 6200 \(bu 6165 6201 1 - user quotas 6166 6202 .TP 3n 6167 • 6203 \(bu 6168 6204 2 - user default quotas (uid = -1) 6169 6205 .TP 3n 6170 • 6206 \(bu 6171 6207 3 - group quotas 6172 6208 .TP 3n 6173 • 6209 \(bu 6174 6210 4 - group default quotas (gid = -1) 6175 6211 .RE … … 6177 6213 6178 6214 .TP 3n 6179 • 6215 \(bu 6180 6216 2 - id (uid for user, gid for group, -1 if N/A) 6181 6217 .TP 3n 6182 • 6218 \(bu 6183 6219 3 - quota state (0 = disable, 1 = enable, 2 = enable and enforce) 6184 6220 .TP 3n 6185 • 6221 \(bu 6186 6222 4 - block softlimit 6187 6223 .TP 3n 6188 • 6224 \(bu 6189 6225 5 - block hardlimit 6190 6226 .TP 3n 6191 • 6227 \(bu 6192 6228 6 - inode softlimit 6193 6229 .TP 3n 6194 • 6230 \(bu 6195 6231 7 - inode hardlimit 6196 6232 .TP 3n 6197 • 6233 \(bu 6198 6234 8(optional) - block size, defaults to 1024 6199 6235 .RE … … 6282 6318 .RS 3n 6283 6319 .TP 3n 6284 • 6320 \(bu 6285 6321 \fI%z\fR 6286 6322 will be substituted with the shutdown message sent to the server. 6287 6323 .TP 3n 6288 • 6324 \(bu 6289 6325 \fI%t\fR 6290 6326 will be substituted with the number of seconds to wait before effectively starting the shutdown procedure. 6291 6327 .TP 3n 6292 • 6328 \(bu 6293 6329 \fI%r\fR 6294 6330 will be substituted with the switch 6295 6331 \fB-r\fR. It means reboot after shutdown for NT. 6296 6332 .TP 3n 6297 • 6333 \(bu 6298 6334 \fI%f\fR 6299 6335 will be substituted with the switch … … 6372 6408 .sp 6373 6409 This option will typically be used to tune your Samba server for optimal performance for your local network. There is no way that Samba can know what the optimal parameters are for your net, so you must experiment and choose them yourself. We strongly suggest you read the appropriate documentation for your operating system first (perhaps 6374 \fBman setsockopt\fR 6410 man setsockopt 6375 6411 will help). 6376 6412 .sp … … 6383 6419 .RS 3n 6384 6420 .TP 3n 6385 • 6421 \(bu 6386 6422 SO_KEEPALIVE 6387 6423 .TP 3n 6388 • 6424 \(bu 6389 6425 SO_REUSEADDR 6390 6426 .TP 3n 6391 • 6427 \(bu 6392 6428 SO_BROADCAST 6393 6429 .TP 3n 6394 • 6430 \(bu 6395 6431 TCP_NODELAY 6396 6432 .TP 3n 6397 • 6433 \(bu 6398 6434 IPTOS_LOWDELAY 6399 6435 .TP 3n 6400 • 6436 \(bu 6401 6437 IPTOS_THROUGHPUT 6402 6438 .TP 3n 6403 • 6439 \(bu 6404 6440 SO_SNDBUF * 6405 6441 .TP 3n 6406 • 6442 \(bu 6407 6443 SO_RCVBUF * 6408 6444 .TP 3n 6409 • 6445 \(bu 6410 6446 SO_SNDLOWAT * 6411 6447 .TP 3n 6412 • 6448 \(bu 6413 6449 SO_RCVLOWAT * 6414 6450 .RE … … 6419 6455 .sp 6420 6456 To specify an argument use the syntax SOME_OPTION = VALUE for example 6421 \fBSO_SNDBUF = 8192\fR. Note that you must not have any spaces before or after the = sign.6457 SO_SNDBUF = 8192. Note that you must not have any spaces before or after the = sign. 6422 6458 .sp 6423 6459 If you are on a local network then a sensible option might be: 6424 6460 .sp 6425 \fBsocket options = IPTOS_LOWDELAY\fR 6461 socket options = IPTOS_LOWDELAY 6426 6462 .sp 6427 6463 If you have a local network then you could try: 6428 6464 .sp 6429 \fBsocket options = IPTOS_LOWDELAY TCP_NODELAY\fR 6465 socket options = IPTOS_LOWDELAY TCP_NODELAY 6430 6466 .sp 6431 6467 If you are on a wide area network then perhaps try setting IPTOS_THROUGHPUT. … … 6461 6497 .sp 6462 6498 Default: 6463 \fB\fIstore dos attributes\fR = yes\fR6499 \fB\fIstore dos attributes\fR = no \fR 6464 6500 .RE 6465 6501 .PP … … 6492 6528 .sp 6493 6529 Well-behaved clients always ask for lock checks when it is important. So in the vast majority of cases, 6494 \fBstrict locking = Auto\fR 6530 strict locking = Auto 6495 6531 or 6496 \fBstrict locking = no\fR 6532 strict locking = no 6497 6533 is acceptable. 6498 6534 .sp … … 6537 6573 \fByes\fR 6538 6574 then every write will be followed by a 6539 \fBfsync() \fR 6575 fsync() 6540 6576 call to ensure the data is written to disk. Note that the 6541 6577 \fIstrict sync\fR … … 6548 6584 .RE 6549 6585 .PP 6550 syslog only (G)6551 .RS 3n6552 If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files.6553 .sp6554 Default:6555 \fB\fIsyslog only\fR = no \fR6556 .RE6557 .PP6558 6586 syslog (G) 6559 6587 .RS 3n … … 6568 6596 Default: 6569 6597 \fB\fIsyslog\fR = 1 \fR 6598 .RE 6599 .PP 6600 syslog only (G) 6601 .RS 3n 6602 If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files. 6603 .sp 6604 Default: 6605 \fB\fIsyslog only\fR = no \fR 6570 6606 .RE 6571 6607 .PP … … 6662 6698 .sp 6663 6699 Note that even when this parameter is set a user authenticating to 6664 \fBsmbd\fR 6700 smbd 6665 6701 must still enter a valid password in order to connect correctly, and to update their hashed (smbpasswd) passwords. 6666 6702 .sp … … 6672 6708 .RS 3n 6673 6709 This parameter applies only to Windows NT/2000 clients. It has no effect on Windows 95/98/ME clients. When serving a printer to Windows NT/2000 clients without first installing a valid printer driver on the Samba host, the client will be required to install a local printer driver. From this point on, the client will treat the print as a local printer and not a network printer connection. This is much the same behavior that will occur when 6674 \fBdisable spoolss = yes\fR.6710 disable spoolss = yes. 6675 6711 .sp 6676 6712 The differentiating factor is that under normal circumstances, the NT/2000 client will attempt to open the network printer using MS-RPC. The problem is that because the client considers the printer to be local, it will attempt to issue the OpenPrinterEx() call requesting access rights associated with the logged on user. If the user possesses local administator rights but not root privilege on the Samba host (often the case), the OpenPrinterEx() call will fail. The result is that the client will now display an "Access Denied; Unable to connect" message in the printer queue window (even though jobs may successfully be printed). … … 6717 6753 .RE 6718 6754 .PP 6755 user 6756 .RS 3n 6757 This parameter is a synonym for username. 6758 .RE 6759 .PP 6760 users 6761 .RS 3n 6762 This parameter is a synonym for username. 6763 .RE 6764 .PP 6765 username (S) 6766 .RS 3n 6767 Multiple users may be specified in a comma-delimited list, in which case the supplied password will be tested against each username in turn (left to right). 6768 .sp 6769 The 6770 \fIusername\fR 6771 line is needed only when the PC is unable to supply its own username. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames. In both these cases you may also be better using the \\server\share%user syntax instead. 6772 .sp 6773 The 6774 \fIusername\fR 6775 line is not a great solution in many cases as it means Samba will try to validate the supplied password against each of the usernames in the 6776 \fIusername\fR 6777 line in turn. This is slow and a bad idea for lots of users in case of duplicate passwords. You may get timeouts or security breaches using this parameter unwisely. 6778 .sp 6779 Samba relies on the underlying UNIX security. This parameter does not restrict who can login, it just offers hints to the Samba server as to what usernames might correspond to the supplied password. Users can login as whoever they please and they will be able to do no more damage than if they started a telnet session. The daemon runs as the user that they log in as, so they cannot do anything that user cannot do. 6780 .sp 6781 To restrict a service to a particular set of users you can use the 6782 valid users parameter. 6783 .sp 6784 If any of the usernames begin with a '@' then the name will be looked up first in the NIS netgroups list (if Samba is compiled with netgroup support), followed by a lookup in the UNIX groups database and will expand to a list of all users in the group of that name. 6785 .sp 6786 If any of the usernames begin with a '+' then the name will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name. 6787 .sp 6788 If any of the usernames begin with a '&' then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name. 6789 .sp 6790 Note that searching though a groups database can take quite some time, and some clients may time out during the search. 6791 .sp 6792 See the section 6793 NOTE ABOUT USERNAME/PASSWORD VALIDATION 6794 for more information on how this parameter determines access to the services. 6795 .sp 6796 Default: 6797 \fB\fIusername\fR = # The guest account if a guest service, else <empty string>. \fR 6798 .sp 6799 Example: 6800 \fB\fIusername\fR = fred, mary, jack, jane, @users, @pcgroup \fR 6801 .RE 6802 .PP 6719 6803 username level (G) 6720 6804 .RS 3n … … 6731 6815 Example: 6732 6816 \fB\fIusername level\fR = 5 \fR 6733 .RE6734 .PP6735 username map script (G)6736 .RS 3n6737 This script is a mutually exclusive alternative to the6738 username map parameter. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line line on standard output (the name to which the account should mapped). In this way, it is possible to store username map tables in an LDAP or NIS directory services.6739 .sp6740 Default:6741 \fB\fIusername map script\fR = \fR6742 .sp6743 Example:6744 \fB\fIusername map script\fR = /etc/samba/scripts/mapusers.sh \fR6745 6817 .RE 6746 6818 .PP … … 6771 6843 .nf 6772 6844 6773 \fBroot = admin administrator\fR 6845 root = admin administrator 6774 6846 6775 6847 .fi … … 6784 6856 .nf 6785 6857 6786 \fBsys = @system\fR 6858 sys = @system 6787 6859 6788 6860 .fi … … 6801 6873 .nf 6802 6874 6803 \fBtridge = "Andrew Tridgell"\fR 6875 tridge = "Andrew Tridgell" 6804 6876 6805 6877 .fi … … 6853 6925 .RE 6854 6926 .PP 6855 user 6856 .RS 3n 6857 This parameter is a synonym for username. 6858 .RE 6859 .PP 6860 users 6861 .RS 3n 6862 This parameter is a synonym for username. 6863 .RE 6864 .PP 6865 username (S) 6866 .RS 3n 6867 Multiple users may be specified in a comma-delimited list, in which case the supplied password will be tested against each username in turn (left to right). 6868 .sp 6869 The 6870 \fIusername\fR 6871 line is needed only when the PC is unable to supply its own username. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames. In both these cases you may also be better using the \\server\share%user syntax instead. 6872 .sp 6873 The 6874 \fIusername\fR 6875 line is not a great solution in many cases as it means Samba will try to validate the supplied password against each of the usernames in the 6876 \fIusername\fR 6877 line in turn. This is slow and a bad idea for lots of users in case of duplicate passwords. You may get timeouts or security breaches using this parameter unwisely. 6878 .sp 6879 Samba relies on the underlying UNIX security. This parameter does not restrict who can login, it just offers hints to the Samba server as to what usernames might correspond to the supplied password. Users can login as whoever they please and they will be able to do no more damage than if they started a telnet session. The daemon runs as the user that they log in as, so they cannot do anything that user cannot do. 6880 .sp 6881 To restrict a service to a particular set of users you can use the 6882 valid users parameter. 6883 .sp 6884 If any of the usernames begin with a '@' then the name will be looked up first in the NIS netgroups list (if Samba is compiled with netgroup support), followed by a lookup in the UNIX groups database and will expand to a list of all users in the group of that name. 6885 .sp 6886 If any of the usernames begin with a '+' then the name will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name. 6887 .sp 6888 If any of the usernames begin with a '&' then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name. 6889 .sp 6890 Note that searching though a groups database can take quite some time, and some clients may time out during the search. 6891 .sp 6892 See the section 6893 NOTE ABOUT USERNAME/PASSWORD VALIDATION 6894 for more information on how this parameter determines access to the services. 6895 .sp 6896 Default: 6897 \fB\fIusername\fR = # The guest account if a guest service, else <empty string>. \fR 6898 .sp 6899 Example: 6900 \fB\fIusername\fR = fred, mary, jack, jane, @users, @pcgroup \fR 6927 username map script (G) 6928 .RS 3n 6929 This script is a mutually exclusive alternative to the 6930 username map parameter. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line line on standard output (the name to which the account should mapped). In this way, it is possible to store username map tables in an LDAP or NIS directory services. 6931 .sp 6932 Default: 6933 \fB\fIusername map script\fR = \fR 6934 .sp 6935 Example: 6936 \fB\fIusername map script\fR = /etc/samba/scripts/mapusers.sh \fR 6901 6937 .RE 6902 6938 .PP … … 7011 7047 .RE 7012 7048 .PP 7049 utmp (G) 7050 .RS 3n 7051 This boolean parameter is only available if Samba has been configured and compiled with the option 7052 --with-utmp. If set to 7053 \fByes\fR 7054 then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server. Sites may use this to record the user connecting to a Samba share. 7055 .sp 7056 Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user. Enabling this option creates an n^2 algorithm to find this number. This may impede performance on large installations. 7057 .sp 7058 Default: 7059 \fB\fIutmp\fR = no \fR 7060 .RE 7061 .PP 7013 7062 utmp directory (G) 7014 7063 .RS 3n 7015 7064 This parameter is only available if Samba has been configured and compiled with the option 7016 \fB --with-utmp\fR. It specifies a directory pathname that is used to store the utmp or utmpx files (depending on the UNIX system) that record user connections to a Samba server. By default this is not set, meaning the system will use whatever utmp file the native system is set to use (usually7065 --with-utmp. It specifies a directory pathname that is used to store the utmp or utmpx files (depending on the UNIX system) that record user connections to a Samba server. By default this is not set, meaning the system will use whatever utmp file the native system is set to use (usually 7017 7066 \fI/var/run/utmp\fR 7018 7067 on Linux). … … 7025 7074 .RE 7026 7075 .PP 7027 utmp (G) 7028 .RS 3n 7029 This boolean parameter is only available if Samba has been configured and compiled with the option 7030 \fB--with-utmp\fR. If set to 7031 \fByes\fR 7032 then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server. Sites may use this to record the user connecting to a Samba share. 7033 .sp 7034 Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user. Enabling this option creates an n^2 algorithm to find this number. This may impede performance on large installations. 7035 .sp 7036 Default: 7037 \fB\fIutmp\fR = no \fR 7076 -valid (S) 7077 .RS 3n 7078 This parameter indicates whether a share is valid and thus can be used. When this parameter is set to false, the share will be in no way visible nor accessible. 7079 .sp 7080 This option should not be used by regular users but might be of help to developers. Samba uses this option internally to mark shares as deleted. 7081 .sp 7082 Default: 7083 \fB\fI-valid\fR = yes \fR 7038 7084 .RE 7039 7085 .PP … … 7056 7102 Example: 7057 7103 \fB\fIvalid users\fR = greg, @pcusers \fR 7058 .RE7059 .PP7060 -valid (S)7061 .RS 3n7062 This parameter indicates whether a share is valid and thus can be used. When this parameter is set to false, the share will be in no way visible nor accessible.7063 .sp7064 This option should not be used by regular users but might be of help to developers. Samba uses this option internally to mark shares as deleted.7065 .sp7066 Default:7067 \fB\fI-valid\fR = yes \fR7068 7104 .RE 7069 7105 .PP … … 7185 7221 \fBwinbindd\fR(8) 7186 7222 it may be necessary to suppress the enumeration of groups through the 7187 \fBsetgrent()\fR,7188 \fBgetgrent()\fR 7223 setgrent(), 7224 getgrent() 7189 7225 and 7190 \fBendgrent()\fR 7226 endgrent() 7191 7227 group of system calls. If the 7192 7228 \fIwinbind enum groups\fR 7193 7229 parameter is 7194 7230 \fBno\fR, calls to the 7195 \fBgetgrent()\fR 7231 getgrent() 7196 7232 system call will not return any data. 7197 7233 .sp … … 7211 7247 \fBwinbindd\fR(8) 7212 7248 it may be necessary to suppress the enumeration of users through the 7213 \fBsetpwent()\fR,7214 \fBgetpwent()\fR 7249 setpwent(), 7250 getpwent() 7215 7251 and 7216 \fBendpwent()\fR 7252 endpwent() 7217 7253 group of system calls. If the 7218 7254 \fIwinbind enum users\fR 7219 7255 parameter is 7220 7256 \fBno\fR, calls to the 7221 \fBgetpwent\fR 7257 getpwent 7222 7258 system call will not return any data. 7223 7259 .sp … … 7232 7268 .RE 7233 7269 .PP 7270 winbind expand groups (G) 7271 .RS 3n 7272 This option controls the maximum depth that winbindd will traverse when flattening nested group memberships of Windows domain groups. This is different from the 7273 winbind nested groups option which implements the Windows NT4 model of local group nesting. The "winbind expand groups" parameter specifically applies to the membership of domain groups. 7274 .sp 7275 Be aware that a high value for this parameter can result in system slowdown as the main parent winbindd daemon must perform the group unrolling and will be unable to answer incoming NSS or authentication requests during this time. 7276 .sp 7277 Default: 7278 \fB\fIwinbind expand groups\fR = 1 \fR 7279 .RE 7280 .PP 7234 7281 winbind nested groups (G) 7235 7282 .RS 3n … … 7256 7303 .RS 3n 7257 7304 .TP 3n 7258 • 7305 \(bu 7259 7306 \fItemplate\fR 7260 7307 - The default, using the parameters of … … 7263 7310 \fItemplate homedir\fR) 7264 7311 .TP 3n 7265 • 7312 \(bu 7266 7313 \fIsfu\fR 7267 7314 - When Samba is running in security = ads and your Active Directory Domain Controller does support the Microsoft "Services for Unix" (SFU) LDAP schema, winbind can retrieve the login shell and the home directory attributes directly from your Directory Server. Note that retrieving UID and GID from your ADS-Server requires to use … … 7303 7350 Example: 7304 7351 \fB\fIwinbind refresh tickets\fR = true \fR 7352 .RE 7353 .PP 7354 winbind rpc only (G) 7355 .RS 3n 7356 Setting this parameter to 7357 yes 7358 forces winbindd to use RPC instead of LDAP to retrieve information from Domain Controllers. 7359 .sp 7360 Default: 7361 \fB\fIwinbind rpc only\fR = no \fR 7305 7362 .RE 7306 7363 .PP … … 7317 7374 .sp 7318 7375 Default: 7319 \fB\fIwinbind separator\fR = '\ ' \fR7376 \fB\fIwinbind separator\fR = '\\' \fR 7320 7377 .sp 7321 7378 Example: … … 7326 7383 .RS 3n 7327 7384 This parameter is designed to allow Samba servers that are members of a Samba controlled domain to use UNIX accounts distributed via NIS, rsync, or LDAP as the uid's for winbindd users in the hosts primary domain. Therefore, the user 7328 DOMAIN\ user17385 DOMAIN\\user1 7329 7386 would be mapped to the account user1 in /etc/passwd instead of allocating a new uid for him or her. 7330 7387 .sp 7331 This parameter is no tdeprecated in favor of the newer idmap_nss backend. Refer to the7388 This parameter is now deprecated in favor of the newer idmap_nss backend. Refer to the 7332 7389 idmap domains smb.conf option and the 7333 7390 \fBidmap_nss\fR(8) … … 7357 7414 The wins hook parameter specifies the name of a script or executable that will be called as follows: 7358 7415 .sp 7359 \fBwins_hook operation name nametype ttl IP_list\fR 7360 .RS 3n 7361 .TP 3n 7362 • 7416 wins_hook operation name nametype ttl IP_list 7417 .RS 3n 7418 .TP 3n 7419 \(bu 7363 7420 The first argument is the operation and is one of "add", "delete", or "refresh". In most cases the operation can be ignored as the rest of the parameters provide sufficient information. Note that "refresh" may sometimes be called when the name has not previously been added, in that case it should be treated as an add. 7364 7421 .TP 3n 7365 • 7422 \(bu 7366 7423 The second argument is the NetBIOS name. If the name is not a legal name then the wins hook is not called. Legal names contain only letters, digits, hyphens, underscores and periods. 7367 7424 .TP 3n 7368 • 7425 \(bu 7369 7426 The third argument is the NetBIOS name type as a 2 digit hexadecimal number. 7370 7427 .TP 3n 7371 • 7428 \(bu 7372 7429 The fourth argument is the TTL (time to live) for the name in seconds. 7373 7430 .TP 3n 7374 • 7431 \(bu 7375 7432 The fifth and subsequent arguments are the IP addresses currently registered for that name. If this list is empty then the name should be deleted. 7376 7433 .RE 7377 7434 .IP "" 3n 7378 7435 An example script that calls the BIND dynamic DNS update program 7379 \fBnsupdate\fR 7436 nsupdate 7380 7437 is provided in the examples directory of the Samba source code. 7381 7438 .sp … … 7430 7487 \fByes\fR 7431 7488 unless you have a multi-subnetted network and you wish a particular 7432 \fBnmbd\fR 7489 nmbd 7433 7490 to be your WINS server. Note that you should 7434 7491 \fBNEVER\fR … … 7511 7568 .RS 3n 7512 7569 This parameter is only available if Samba has been configured and compiled with the option 7513 \fB --with-utmp\fR. It specifies a directory pathname that is used to store the wtmp or wtmpx files (depending on the UNIX system) that record user connections to a Samba server. The difference with the utmp directory is the fact that user info is kept after a user has logged out.7570 --with-utmp. It specifies a directory pathname that is used to store the wtmp or wtmpx files (depending on the UNIX system) that record user connections to a Samba server. The difference with the utmp directory is the fact that user info is kept after a user has logged out. 7514 7571 .sp 7515 7572 By default this is not set, meaning the system will use whatever utmp file the native system is set to use (usually
Note:
See TracChangeset
for help on using the changeset viewer.