Ignore:
Timestamp:
Jun 29, 2007, 1:34:14 PM (18 years ago)
Author:
Paul Smedley
Message:

Update source to 3.0.25b

File:
1 edited

Legend:

Unmodified
Added
Removed
  • trunk/samba/docs/manpages/smb.conf.5

    r39 r44  
    5151Only the first equals sign in a parameter is significant. Whitespace before or after the first equals sign is discarded. Leading, trailing and internal whitespace in section and parameter names is irrelevant. Leading and trailing whitespace in a parameter value is discarded. Internal whitespace within a parameter value is retained verbatim.
    5252.PP
    53 Any line beginning with a semicolon (“;”) or a hash (“#”) character is ignored, as are lines containing only whitespace.
     53Any line beginning with a semicolon (\fB;\fR) or a hash (\fB#\fR) character is ignored, as are lines containing only whitespace.
    5454.PP
    5555Any line ending in a
    56 “\”
     56\fB\\\fR
    5757is continued on the next line in the customary UNIX fashion.
    5858.PP
     
    6161.PP
    6262Each section in the configuration file (except for the [global] section) describes a shared resource (known as a
    63 “share”). The section name is the name of the shared resource and the parameters within the section define the shares attributes.
     63\fBshare\fR). The section name is the name of the shared resource and the parameters within the section define the shares attributes.
    6464.PP
    6565There are three special sections, [global], [homes] and [printers], which are described under
     
    125125Some modifications are then made to the newly created share:
    126126.TP 3n
    127 •
     127\(bu
    128128The share name is changed from homes to the located username.
    129129.TP 3n
    130 •
     130\(bu
    131131If no path was given, the path is set to the user's home directory.
    132132.PP
     
    147147.PP
    148148A similar process occurs if the requested section name is
    149 “homes”, except that the share name is not changed to that of the requesting user. This method of using the [homes] section works well if different users share a client PC.
     149\fBhomes\fR, except that the share name is not changed to that of the requesting user. This method of using the [homes] section works well if different users share a client PC.
    150150.PP
    151151The [homes] section can specify all the parameters a normal service section can specify, though some make more sense than others. The following is a typical and suitable [homes] section:
     
    180180A few modifications are then made to the newly created share:
    181181.TP 3n
    182 •
     182\(bu
    183183The share name is set to the located printer name
    184184.TP 3n
    185 •
     185\(bu
    186186If no printer name was given, the printer name is set to the located printer name
    187187.TP 3n
    188 •
     188\(bu
    189189If the share does not permit guest access and no username was given, the username is set to the located printer name.
    190190.PP
     
    336336.PP
    337337Many of the strings that are settable in the config file can take substitutions. For example the option
    338 “path = /tmp/%u”
     338\fBpath = /tmp/%u\fR
    339339is interpreted as
    340 “path = /tmp/john”
     340\fBpath = /tmp/john\fR
    341341if the user connected with the username john.
    342342.PP
     
    369369.RS 3n
    370370the NetBIOS name of the server. This allows you to change your config based on what the client calls you. Your server can have a
    371 “dual personality”.
     371\fBdual personality\fR.
    372372.RE
    373373.PP
     
    520520.PP
    521521If the service is marked
    522 “guest only = yes”
    523 and the server is running with share-level security (“security = share”, steps 1 to 5 are skipped.
     522\fBguest only = yes\fR
     523and the server is running with share-level security (\fBsecurity = share\fR, steps 1 to 5 are skipped.
    524524.TP 3n
    5255251.
    526526If the client has passed a username/password pair and that username/password pair is validated by the UNIX system's password programs, the connection is made as that username. This includes the
    527 \\server\service%\fIusername\fR
     527\\\\server\\service%\fIusername\fR
    528528method of passing a username.
    529529.TP 3n
     
    672672.RS 3n
    673673.TP 3n
    674 •
     674\(bu
    675675\fIport name\fR
    676676.TP 3n
    677 •
     677\(bu
    678678\fIdevice URI\fR
    679679.RE
     
    704704.RS 3n
    705705.TP 3n
    706 •
     706\(bu
    707707\fIprinter name\fR
    708708.TP 3n
    709 •
     709\(bu
    710710\fIshare name\fR
    711711.TP 3n
    712 •
     712\(bu
    713713\fIport name\fR
    714714.TP 3n
    715 •
     715\(bu
    716716\fIdriver name\fR
    717717.TP 3n
    718 •
     718\(bu
    719719\fIlocation\fR
    720720.TP 3n
    721 •
     721\(bu
    722722\fIWindows 9x driver location\fR
    723723.RE
     
    728728\fIaddprinter command\fR
    729729has been executed,
    730 \fBsmbd\fR
     730smbd
    731731will reparse the
    732732\fI smb.conf\fR
    733733to determine if the share defined by the APW exists. If the sharename is still invalid, then
    734 \fBsmbd \fR
     734smbd
    735735will return an ACCESS_DENIED error to the client.
    736736.sp
     
    751751\fIsmb.conf\fR. In order to successfully execute the
    752752\fIadd share command\fR,
    753 \fBsmbd\fR
     753smbd
    754754requires that the administrator be connected using a root account (i.e. uid == 0).
    755755.sp
    756756When executed,
    757 \fBsmbd\fR
     757smbd
    758758will automatically invoke the
    759759\fIadd share command\fR
     
    761761.RS 3n
    762762.TP 3n
    763 •
     763\(bu
    764764\fIconfigFile\fR
    765765- the location of the global
     
    767767file.
    768768.TP 3n
    769 •
     769\(bu
    770770\fIshareName\fR
    771771- the name of the new share.
    772772.TP 3n
    773 •
     773\(bu
    774774\fIpathName\fR
    775775- path to an **existing** directory on disk.
    776776.TP 3n
    777 •
     777\(bu
    778778\fIcomment\fR
    779779- comment string to associate with the new share.
    780780.TP 3n
    781 •
     781\(bu
    782782\fImax connections\fR
    783783Number of maximum simultaneous connections to this share.
     
    819819contacts the
    820820password server and attempts to authenticate the given user with the given password. If the authentication succeeds then
    821 \fBsmbd\fR
     821smbd
    822822attempts to find a UNIX user in the UNIX password database to map the Windows user into. If this lookup fails, and
    823823add user script is set then
    824 \fBsmbd\fR
     824smbd
    825825will call the specified script
    826826\fBAS ROOT\fR, expanding any
     
    829829.sp
    830830If this script successfully creates the user then
    831 \fBsmbd\fR
     831smbd
    832832will continue on as though the UNIX user already existed. In this way, UNIX users are dynamically created to match existing Windows NT accounts.
    833833.sp
     
    855855.sp
    856856Note that the
    857 \fBadduser\fR
     857adduser
    858858command used in the example below does not support the used syntax on all systems.
    859859.sp
     
    902902Example:
    903903\fB\fIafs username map\fR = %u@afs.samba.org \fR
     904.RE
     905.PP
     906aio read size (S)
     907.RS 3n
     908If Samba has been built with asynchronous I/O support and this integer parameter is set to non-zero value, Samba will read from file asynchronously when size of request is bigger than this value. Note that it happens only for non-chained and non-chaining reads and when not using write cache.
     909.sp
     910Current implementation of asynchronous I/O in Samba 3.0 does support only up to 10 outstanding asynchronous requests, read and write combined.
     911.sp
     912
     913
     914  write cache size
     915  aio write size
     916
     917Default:
     918\fB\fIaio read size\fR = 0 \fR
     919.sp
     920Example:
     921\fB\fIaio read size\fR = 16384 # Use asynchronous I/O for reads bigger than 16KB request size \fR
     922.RE
     923.PP
     924aio write size (S)
     925.RS 3n
     926If Samba has been built with asynchronous I/O support and this integer parameter is set to non-zero value, Samba will write to file asynchronously when size of request is bigger than this value. Note that it happens only for non-chained and non-chaining reads and when not using write cache.
     927.sp
     928Current implementation of asynchronous I/O in Samba 3.0 does support only up to 10 outstanding asynchronous requests, read and write combined.
     929.sp
     930
     931 
     932  write cache size
     933  aio read size
     934
     935Default:
     936\fB\fIaio write size\fR = 0 \fR
     937.sp
     938Example:
     939\fB\fIaio write size\fR = 16384 # Use asynchronous I/O for writes bigger than 16KB request size \fR
    904940.RE
    905941.PP
     
    9741010.RS 3n
    9751011This option allows the administrator to chose what authentication methods
    976 \fBsmbd\fR
     1012smbd
    9771013will use when authenticating a user. This option defaults to sensible values based on
    9781014security. This should be considered a developer option and used only in rare circumstances. In the majority (if not all) of production servers, the default setting should be adequate.
     
    10191055.sp
    10201056For name service it causes
    1021 \fBnmbd\fR
     1057nmbd
    10221058to bind to ports 137 and 138 on the interfaces listed in the
    10231059interfaces parameter.
    1024 \fBnmbd\fR
     1060nmbd
    10251061also binds to the "all addresses" interface (0.0.0.0) on ports 137 and 138 for the purposes of reading broadcast messages. If this option is not set then
    1026 \fBnmbd\fR
     1062nmbd
    10271063will service name requests on all of these sockets. If
    10281064bind interfaces only is set then
    1029 \fBnmbd\fR
     1065nmbd
    10301066will check the source address of any packets coming in on the broadcast sockets and discard any that don't match the broadcast addresses of the interfaces in the
    10311067interfaces parameter list. As unicast packets are received on the other sockets it allows
    1032 \fBnmbd\fR
     1068nmbd
    10331069to refuse to serve names to machines that send packets that arrive through any interfaces not listed in the
    10341070interfaces list. IP Source address spoofing does defeat this simple check, however, so it must not be used seriously as a security feature for
    1035 \fBnmbd\fR.
     1071nmbd.
    10361072.sp
    10371073For file service it causes
     
    10391075to bind only to the interface list given in the
    10401076interfaces parameter. This restricts the networks that
    1041 \fBsmbd\fR
     1077smbd
    10421078will serve to packets coming in those interfaces. Note that you should not use this parameter for machines that are serving PPP or other intermittent or non-broadcast network interfaces as it will not cope with non-permanent interfaces.
    10431079.sp
     
    10531089.sp
    10541090To change a users SMB password, the
    1055 \fBsmbpasswd\fR
     1091smbpasswd
    10561092by default connects to the
    10571093\fBlocalhost - 127.0.0.1\fR
     
    10611097is added to the
    10621098interfaces parameter list then
    1063 \fB smbpasswd\fR
     1099smbpasswd
    10641100will fail to connect in it's default mode.
    1065 \fBsmbpasswd\fR
     1101smbpasswd
    10661102can be forced to use the primary IP interface of the local host by using its
    10671103\fBsmbpasswd\fR(8)
     
    10721108.sp
    10731109The
    1074 \fBswat\fR
     1110swat
    10751111status page tries to connect with
    1076 \fBsmbd\fR
     1112smbd
    10771113and
    1078 \fBnmbd\fR
     1114nmbd
    10791115at the address
    10801116\fB127.0.0.1\fR
     
    10821118\fB127.0.0.1\fR
    10831119will cause
    1084 \fB smbd\fR
     1120smbd
    10851121and
    1086 \fBnmbd\fR
     1122nmbd
    10871123to always show "not running" even if they really are. This can prevent
    1088 \fB swat\fR
     1124swat
    10891125from starting/stopping/restarting
    1090 \fBsmbd\fR
     1126smbd
    10911127and
    1092 \fBnmbd\fR.
     1128nmbd.
    10931129.sp
    10941130Default:
     
    11461182\fBsmbd\fR(8)
    11471183will serve a browse list to a client doing a
    1148 \fBNetServerEnum\fR
     1184NetServerEnum
    11491185call. Normally set to
    11501186\fByes\fR. You should never need to change this.
     
    11851221\fIsmb.conf\fR. In order to successfully execute the
    11861222\fIchange share command\fR,
    1187 \fBsmbd\fR
     1223smbd
    11881224requires that the administrator be connected using a root account (i.e. uid == 0).
    11891225.sp
    11901226When executed,
    1191 \fBsmbd\fR
     1227smbd
    11921228will automatically invoke the
    11931229\fIchange share command\fR
     
    11951231.RS 3n
    11961232.TP 3n
    1197 •
     1233\(bu
    11981234\fIconfigFile\fR
    11991235- the location of the global
     
    12011237file.
    12021238.TP 3n
    1203 •
     1239\(bu
    12041240\fIshareName\fR
    12051241- the name of the new share.
    12061242.TP 3n
    1207 •
     1243\(bu
    12081244\fIpathName\fR
    12091245- path to an **existing** directory on disk.
    12101246.TP 3n
    1211 •
     1247\(bu
    12121248\fIcomment\fR
    12131249- comment string to associate with the new share.
    12141250.TP 3n
    1215 •
     1251\(bu
    12161252\fImax connections\fR
    12171253Number of maximum simultaneous connections to this share.
     
    12541290.sp
    12551291Disabling this option will also disable the
    1256 \fBclient plaintext auth\fR
     1292client plaintext auth
    12571293option
    12581294.sp
    12591295Likewise, if the
    1260 \fBclient ntlmv2 auth\fR
     1296client ntlmv2 auth
    12611297parameter is enabled, then only NTLMv2 logins will be attempted.
    12621298.sp
     
    12741310.sp
    12751311Similarly, if enabled, NTLMv1,
    1276 \fBclient lanman auth\fR
     1312client lanman auth
    12771313and
    1278 \fBclient plaintext auth\fR
     1314client plaintext auth
    12791315authentication will be disabled. This also disables share-level authentication.
    12801316.sp
    12811317If disabled, an NTLM response (and possibly a LANMAN response) will be sent by the client, depending on the value of
    1282 \fBclient lanman auth\fR.
     1318client lanman auth.
    12831319.sp
    12841320Note that some sites (particularly those following 'best practice' security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM.
     
    13351371.RS 3n
    13361372This is a text field that is seen next to a share when a client does a queries the server, either via the network neighborhood or via
    1337 \fBnet view\fR
     1373net view
    13381374to list what shares are available.
    13391375.sp
     
    15681604.sp
    15691605This parameter should be used with care and tested with the printer driver in question. It is better to leave the device mode to NULL and let the Windows client set the correct values. Because drivers do not do this all the time, setting
    1570 \fBdefault devmode = yes\fR
     1606default devmode = yes
    15711607will instruct smbd to generate a default one.
    15721608.sp
     
    16471683Once the
    16481684deleteprinter command has been executed,
    1649 \fBsmbd\fR
     1685smbd
    16501686will reparse the
    16511687\fI smb.conf\fR
    16521688to associated printer no longer exists. If the sharename is still valid, then
    1653 \fBsmbd \fR
     1689smbd
    16541690will return an ACCESS_DENIED error to the client.
    16551691.sp
     
    16781714\fIsmb.conf\fR. In order to successfully execute the
    16791715\fIdelete share command\fR,
    1680 \fBsmbd\fR
     1716smbd
    16811717requires that the administrator be connected using a root account (i.e. uid == 0).
    16821718.sp
    16831719When executed,
    1684 \fBsmbd\fR
     1720smbd
    16851721will automatically invoke the
    16861722\fIdelete share command\fR
     
    16881724.RS 3n
    16891725.TP 3n
    1690 •
     1726\(bu
    16911727\fIconfigFile\fR
    16921728- the location of the global
     
    16941730file.
    16951731.TP 3n
    1696 •
     1732\(bu
    16971733\fIshareName\fR
    16981734- the name of the existing service.
     
    17331769.sp
    17341770This script is called when a remote client removes a user from the server, normally using 'User Manager for Domains' or
    1735 \fBrpcclient\fR.
     1771rpcclient.
    17361772.sp
    17371773This script should delete the given UNIX username.
     
    19321968Note that the maximum length for a NetBIOS name is 15 characters, so the DNS name (or DNS alias) can likewise only be 15 characters, maximum.
    19331969.sp
    1934 \fBnmbd\fR
     1970nmbd
    19351971spawns a second copy of itself to do the DNS name lookup requests, as doing a name lookup is a blocking action.
    19361972.sp
     
    19541990\fBsmbd\fR(8)
    19551991to enable WAN-wide browse list collation. Setting this option causes
    1956 \fBnmbd\fR
     1992nmbd
    19571993to claim a special domain specific NetBIOS name that identifies it as a domain master browser for its given
    19581994workgroup. Local master browsers in the same
    19591995workgroup on broadcast-isolated subnets will give this
    1960 \fBnmbd\fR
     1996nmbd
    19611997their local browse lists, and then ask
    19621998\fBsmbd\fR(8)
     
    19662002workgroup specific special NetBIOS name that identifies them as domain master browsers for that
    19672003workgroup by default (i.e. there is no way to prevent a Windows NT PDC from attempting to do this). This means that if this parameter is set and
    1968 \fBnmbd\fR
     2004nmbd
    19692005claims the special name for a
    19702006workgroup before a Windows NT PDC is able to do so then cross subnet browsing will behave strangely and may fail.
     
    20352071.RS 3n
    20362072Under DOS and Windows, if a user can write to a file they can change the timestamp on it. Under POSIX semantics, only the owner of the file or root may change the timestamp. By default, Samba runs with POSIX semantics and refuses to change the timestamp on a file if the user
    2037 \fBsmbd\fR
     2073smbd
    20382074is acting on behalf of is not the file owner. Setting this option to
    20392075\fB yes\fR
     
    20672103.RS 3n
    20682104This parameter controls whether or not smbd will honor privileges assigned to specific SIDs via either
    2069 \fBnet rpc rights\fR
     2105net rpc rights
    20702106or one of the Windows user and group manager tools. This parameter is enabled by default. It can be disabled to prevent members of the Domain Admins group from being able to assign privileges to users or groups which can then result in certain smbd operations running as root that would normally run under the context of the connected user.
    20712107.sp
     
    20942130program for information on how to set up and maintain this file), or set the
    20952131security = [server|domain|ads] parameter which causes
    2096 \fBsmbd\fR
     2132smbd
    20972133to authenticate against another server.
    20982134.sp
     
    21172153enumports command (G)
    21182154.RS 3n
    2119 The concept of a "port" is fairly foreign to UNIX hosts. Under Windows NT/2000 print servers, a port is associated with a port monitor and generally takes the form of a local port (i.e. LPT1:, COM1:, FILE:) or a remote port (i.e. LPD Port Monitor, etc...). By default, Samba has only one port defined--\fB"Samba Printer Port"\fR. Under Windows NT/2000, all printers must have a valid port name. If you wish to have a list of ports displayed (\fBsmbd \fR
     2155The concept of a "port" is fairly foreign to UNIX hosts. Under Windows NT/2000 print servers, a port is associated with a port monitor and generally takes the form of a local port (i.e. LPT1:, COM1:, FILE:) or a remote port (i.e. LPD Port Monitor, etc...). By default, Samba has only one port defined--\fB"Samba Printer Port"\fR. Under Windows NT/2000, all printers must have a valid port name. If you wish to have a list of ports displayed (smbd
    21202156does not use a port name for anything) other than the default
    21212157\fB"Samba Printer Port"\fR, you can define
     
    21632199.sp
    21642200When you set
    2165 \fBfake oplocks = yes\fR,
     2201fake oplocks = yes,
    21662202\fBsmbd\fR(8)
    21672203will always grant oplock requests no matter how many clients are using the file.
     
    21872223.sp
    21882224This option is enabled (i.e.
    2189 \fBsmbd\fR
     2225smbd
    21902226will follow symbolic links) by default.
    21912227.sp
     
    23672403.RS 3n
    23682404The
    2369 \fBget quota command\fR
     2405get quota command
    23702406should only be used whenever there is no operating system API available from the OS that samba can use.
    23712407.sp
    23722408This option is only available with
    2373 \fB./configure --with-sys-quotas\fR. Or on linux when
    2374 \fB./configure --with-quotas\fR
     2409./configure --with-sys-quotas. Or on linux when
     2410./configure --with-quotas
    23752411was used and a working quota api was found in the system.
    23762412.sp
     
    23802416.RS 3n
    23812417.TP 3n
    2382 •
     2418\(bu
    23832419directory
    23842420.TP 3n
    2385 •
     2421\(bu
    23862422type of query
    23872423.TP 3n
    2388 •
     2424\(bu
    23892425uid of user or gid of group
    23902426.RE
     
    23932429.RS 3n
    23942430.TP 3n
    2395 •
     2431\(bu
    239624321 - user quotas
    23972433.TP 3n
    2398 •
     2434\(bu
    239924352 - user default quotas (uid = -1)
    24002436.TP 3n
    2401 •
     2437\(bu
    240224383 - group quotas
    24032439.TP 3n
    2404 •
     2440\(bu
    240524414 - group default quotas (gid = -1)
    24062442.RE
     
    24092445.RS 3n
    24102446.TP 3n
    2411 •
     2447\(bu
    24122448Arg 1 - quota flags (0 = no quotas, 1 = quotas enabled, 2 = quotas enabled and enforced)
    24132449.TP 3n
    2414 •
     2450\(bu
    24152451Arg 2 - number of currently used blocks
    24162452.TP 3n
    2417 •
     2453\(bu
    24182454Arg 3 - the softlimit number of blocks
    24192455.TP 3n
    2420 •
     2456\(bu
    24212457Arg 4 - the hardlimit number of blocks
    24222458.TP 3n
    2423 •
     2459\(bu
    24242460Arg 5 - currently used number of inodes
    24252461.TP 3n
    2426 •
     2462\(bu
    24272463Arg 6 - the softlimit number of inodes
    24282464.TP 3n
    2429 •
     2465\(bu
    24302466Arg 7 - the hardlimit number of inodes
    24312467.TP 3n
    2432 •
     2468\(bu
    24332469Arg 8(optional) - the number of bytes in a block(default is 1024)
    24342470.RE
     
    24572493.sp
    24582494On some systems the default guest account "nobody" may not be able to print. Use another account in this case. You should test this by trying to log in as your guest user (perhaps by using the
    2459 \fBsu -\fR
     2495su -
    24602496command) and trying to print using the system print command such as
    2461 \fBlpr(1)\fR
     2497lpr(1)
    24622498or
    2463 \fB lp(1)\fR.
     2499lp(1).
    24642500.sp
    24652501This parameter does not accept % macros, because many parts of the system require this value to be constant for correct operation.
     
    25902626.nf
    25912627
    2592 \fBusername server:/some/file/system\fR
     2628username server:/some/file/system
    25932629
    25942630.fi
     
    26232659.RS 3n
    26242660Specifies whether samba should use (expensive) hostname lookups or use the ip addresses instead. An example place where hostname lookups are currently used is when checking the
    2625 \fBhosts deny\fR
     2661hosts deny
    26262662and
    2627 \fBhosts allow\fR.
     2663hosts allow.
    26282664.sp
    26292665Default:
     
    26492685.sp
    26502686You can specify the hosts by name or IP number. For example, you could restrict access to only the hosts on a Class C subnet with something like
    2651 \fBallow hosts = 150.203.5.\fR. The full syntax of the list is described in the man page
     2687allow hosts = 150.203.5.. The full syntax of the list is described in the man page
    26522688\fIhosts_access(5)\fR. Note that this man page may not be present on your system, so a brief description will be given here also.
    26532689.sp
     
    26612697Example 1: allow all IPs in 150.203.*.*; except one
    26622698.sp
    2663 \fBhosts allow = 150.203. EXCEPT 150.203.6.66\fR
     2699hosts allow = 150.203. EXCEPT 150.203.6.66
    26642700.sp
    26652701Example 2: allow hosts that match the given network/netmask
    26662702.sp
    2667 \fBhosts allow = 150.203.15.0/255.255.255.0\fR
     2703hosts allow = 150.203.15.0/255.255.255.0
    26682704.sp
    26692705Example 3: allow a couple of hosts
    26702706.sp
    2671 \fBhosts allow = lapland, arvidsjaur\fR
     2707hosts allow = lapland, arvidsjaur
    26722708.sp
    26732709Example 4: allow only hosts in NIS netgroup "foonet", but deny access from one particular host
    26742710.sp
    2675 \fBhosts allow = @foonet\fR
    2676 .sp
    2677 \fBhosts deny = pirate\fR
     2711hosts allow = @foonet
     2712.sp
     2713hosts deny = pirate
    26782714.sp
    26792715.it 1 an-trap
     
    29392975.RS 3n
    29402976.TP 3n
    2941 •
     2977\(bu
    29422978a network interface name (such as eth0). This may include shell-like wildcards so eth* will match any interface starting with the substring "eth"
    29432979.TP 3n
    2944 •
     2980\(bu
    29452981an IP address. In this case the netmask is determined from the list of interfaces obtained from the kernel
    29462982.TP 3n
    2947 •
     2983\(bu
    29482984an IP/mask pair.
    29492985.TP 3n
    2950 •
     2986\(bu
    29512987a broadcast/mask pair.
    29522988.RE
     
    30623098.sp
    30633099Unlike the
    3064 \fBencrypt passwords\fR
     3100encrypt passwords
    30653101option, this parameter cannot alter client behaviour, and the LANMAN response will still be sent over the network. See the
    3066 \fBclient lanman auth\fR
     3102client lanman auth
    30673103to disable this for Samba's clients (such as smbclient)
    30683104.sp
    30693105If this option, and
    3070 \fBntlm auth\fR
     3106ntlm auth
    30713107are both disabled, then only NTLMv2 logins will be permited. Not all clients support NTLMv2, and most will require special configuration to use it.
    30723108.sp
     
    31583194.RS 3n
    31593195.TP 3n
    3160 •
     3196\(bu
    31613197\fIYes\fR
    31623198= Try to update the LDAP, NT and LM passwords and update the pwdLastSet time.
    31633199.TP 3n
    3164 •
     3200\(bu
    31653201\fINo\fR
    31663202= Update NT and LM passwords and update the pwdLastSet time.
    31673203.TP 3n
    3168 •
     3204\(bu
    31693205\fIOnly\fR
    31703206= Only update the LDAP password and let the LDAP server do the rest.
     
    31923228.sp
    31933229To use this option, a basic ldap tree must be provided and the ldap suffix parameters must be properly configured. On virgin servers the default users and groups (Administrator, Guest, Domain Users, Domain Admins, Domain Guests) can be precreated with the command
    3194 \fBnet sam provision\fR. To run this command the ldap server must be running, Winindd must be running and the smb.conf ldap options must be properly configured. The tipical ldap setup used with the
     3230net sam provision. To run this command the ldap server must be running, Winindd must be running and the smb.conf ldap options must be properly configured. The typical ldap setup used with the
    31953231ldapsam:trusted = yes option is usually sufficient to use
    31963232ldapsam:editposix = yes as well.
     
    32863322\fBNOT\fR
    32873323related to Samba's previous SSL support which was enabled by specifying the
    3288 \fB--with-ssl\fR
     3324--with-ssl
    32893325option to the
    32903326\fIconfigure\fR
     
    32953331.RS 3n
    32963332.TP 3n
    3297 •
     3333\(bu
    32983334\fIOff\fR
    32993335= Never use SSL when querying the directory.
    33003336.TP 3n
    3301 •
     3337\(bu
    33023338\fIStart_tls\fR
    33033339= Use the LDAPv3 StartTLS extended operation (RFC2830) for communicating with the directory server.
    33043340.TP 3n
    3305 •
     3341\(bu
    33063342\fIOn\fR
    33073343= Use SSL on the ldaps port when contacting the
    33083344\fIldap server\fR. Only available when the backwards-compatiblity
    3309 \fB--with-ldapsam\fR
     3345--with-ldapsam
    33103346option is specified to configure. See
    33113347passdb backend
     
    34333469\fBno\fR
    34343470then
    3435 \fB nmbd\fR
     3471nmbd
    34363472will not attempt to become a local master browser on a subnet and will also lose in all browsing elections. By default this value is set to
    34373473\fByes\fR. Setting this value to
     
    34403476\fBbecome\fR
    34413477the local master browser on a subnet, just that
    3442 \fBnmbd\fR
     3478nmbd
    34433479will
    34443480\fBparticipate\fR
     
    34483484\fBno\fR
    34493485will cause
    3450 \fBnmbd\fR
     3486nmbd
    34513487\fBnever\fR
    34523488to become a local master browser.
     
    34783514.sp
    34793515If
    3480 \fBlocking = no\fR, all lock and unlock requests will appear to succeed and all lock queries will report that the file in question is available for locking.
     3516locking = no, all lock and unlock requests will appear to succeed and all lock queries will report that the file in question is available for locking.
    34813517.sp
    34823518If
    3483 \fBlocking = yes\fR, real locking will be performed by the server.
     3519locking = yes, real locking will be performed by the server.
    34843520.sp
    34853521This option
     
    35733609.sp
    35743610
    3575 \fBlogon home = \\%N\%U\profile\fR
     3611logon home = \\\\%N\\%U\\profile
    35763612.sp
    35773613This tells Samba to return the above string, with substitutions made when a client requests the info, generally in a NetUserGetInfo request. Win9X clients truncate the info to \\server\share when a user does
    3578 \fBnet use /home\fR
     3614net use /home
    35793615but use the whole string when dealing with profiles.
    35803616.sp
     
    35823618logon path was returned rather than
    35833619\fIlogon home\fR. This broke
    3584 \fBnet use /home\fR
     3620net use /home
    35853621but allowed profiles outside the home directory. The current implementation is correct, and can be used for profiles if you use the above trick.
    35863622.sp
     
    35913627.sp
    35923628Default:
    3593 \fB\fIlogon home\fR = \\%N\%U \fR
    3594 .sp
    3595 Example:
    3596 \fB\fIlogon home\fR = \\remote_smb_server\%U \fR
     3629\fB\fIlogon home\fR = \\\\%N\\%U \fR
     3630.sp
     3631Example:
     3632\fB\fIlogon home\fR = \\\\remote_smb_server\\%U \fR
    35973633.RE
    35983634.PP
     
    36223658\fBWarning\fR
    36233659Do not quote the value. Setting this as
    3624 “\\%N\profile\%U”
     3660\fB\\%N\profile\%U\fR
    36253661will break profile handling. Where the tdbsam or ldapsam passdb backend is used, at the time the user account is created the value configured for this parameter is written to the passdb backend and that value will over-ride the parameter value present in the smb.conf file. Any error present in the passdb backend account record must be editted using the appropriate tool (pdbedit on the command-line, or any other locally provided system tool).
    36263662Note that this option is only useful if Samba is set up as a domain controller.
     
    36413677.sp
    36423678Default:
    3643 \fB\fIlogon path\fR = \\%N\%U\profile \fR
     3679\fB\fIlogon path\fR = \\\\%N\\%U\\profile \fR
    36443680.RE
    36453681.PP
     
    36653701.sp
    36663702The contents of the batch file are entirely your choice. A suggested command would be to add
    3667 \fBNET TIME \\SERVER /SET /YES\fR, to force every machine to synchronize clocks with the same time server. Another use would be to add
    3668 \fBNET USE U: \\SERVER\UTILS\fR
     3703NET TIME \\\\SERVER /SET /YES, to force every machine to synchronize clocks with the same time server. Another use would be to add
     3704NET USE U: \\\\SERVER\\UTILS
    36693705for commonly used utilities, or
    36703706
     
    36883724.sp
    36893725Example:
    3690 \fB\fIlogon script\fR = scripts\%U.bat \fR
     3726\fB\fIlogon script\fR = scripts\\%U.bat \fR
    36913727.RE
    36923728.PP
     
    37093745.sp
    37103746Default:
    3711 \fB\fIlppause command\fR = # Currently no default value is given to this string, unless the value of the printing parameter is \fBSYSV\fR, in which case the default is : \fBlp -i %p-%j -H hold\fR or if the value of the \fIprinting\fR parameter is \fBSOFTQ\fR, then the default is: \fBqstat -s -j%j -h\fR. \fR
     3747\fB\fIlppause command\fR = # Currently no default value is given to this string, unless the value of the printing parameter is \\fBSYSV\\fR, in which case the default is : lp -i %p-%j -H hold or if the value of the \\fIprinting\\fR parameter is \\fBSOFTQ\\fR, then the default is: qstat -s -j%j -h. \fR
    37123748.sp
    37133749Example:
     
    37183754.RS 3n
    37193755This controls how long lpq info will be cached for to prevent the
    3720 \fBlpq\fR
     3756lpq
    37213757command being called too often. A separate cache is kept for each variation of the
    3722 \fB lpq\fR
     3758lpq
    37233759command used by the system, so if you use different
    3724 \fBlpq\fR
     3760lpq
    37253761commands for different users then they won't share cache information.
    37263762.sp
     
    37283764\fI/tmp/lpq.xxxx\fR
    37293765where xxxx is a hash of the
    3730 \fBlpq\fR
     3766lpq
    37313767command in use.
    37323768.sp
    37333769The default is 30 seconds, meaning that the cached results of a previous identical
    3734 \fBlpq\fR
     3770lpq
    37353771command will be used if the cached data is less than 30 seconds old. A large value may be advisable if your
    3736 \fBlpq\fR
     3772lpq
    37373773command is very slow.
    37383774.sp
     
    37493785.RS 3n
    37503786This parameter specifies the command to be executed on the server host in order to obtain
    3751 \fBlpq \fR-style printer status information.
     3787lpq-style printer status information.
    37523788.sp
    37533789This command should be a program or script which takes a printer name as its only parameter and outputs printer status information.
     
    38033839\fBSYSV\fR, in which case the default is :
    38043840.sp
    3805 \fBlp -i %p-%j -H resume\fR
     3841lp -i %p-%j -H resume
    38063842.sp
    38073843or if the value of the
     
    38103846\fBSOFTQ\fR, then the default is:
    38113847.sp
    3812 \fBqstat -s -j%j -r\fR
     3848qstat -s -j%j -r
    38133849.sp
    38143850Default:
     
    39493985.RS 3n
    39503986.TP 3n
    3951 •
     3987\(bu
    39523988The first (up to) five alphanumeric characters before the rightmost dot of the filename are preserved, forced to upper case, and appear as the first (up to) five characters of the mangled name.
    39533989.TP 3n
    3954 •
     3990\(bu
    39553991A tilde "~" is appended to the first part of the mangled name, followed by a two-character unique sequence, based on the original root name (i.e., the original filename minus its final extension). The final extension is included in the hash calculation only if it contains any upper case characters or is longer than three characters.
    39563992.sp
     
    39583994mangling char option, if you don't like '~'.
    39593995.TP 3n
    3960 •
     3996\(bu
    39613997Files whose UNIX name begins with a dot will be presented as DOS hidden files. The mangled name will be created as for other filenames, but with the leading dot removed and "___" as its extension regardless of actual original extension (that's three underscores).
    39623998.RE
     
    40604096.RS 3n
    40614097.TP 3n
    4062 •
     4098\(bu
    40634099
    40644100\fBYes\fR
    40654101- The read only DOS attribute is mapped to the inverse of the user or owner write bit in the unix permission mode set. If the owner write bit is not set, the read only attribute is reported as being set on the file.
    40664102.TP 3n
    4067 •
     4103\(bu
    40684104
    40694105\fBPermissions\fR
     
    40724108by reading the unix permissions and POSIX ACL (if present). If the connecting user does not have permission to modify the file, the read only attribute is reported as being set on the file.
    40734109.TP 3n
    4074 •
     4110\(bu
    40754111
    40764112\fBNo\fR
     
    41134149.RS 3n
    41144150.TP 3n
    4115 •
     4151\(bu
    41164152\fBNever\fR
    41174153- Means user login requests with an invalid password are rejected. This is the default.
    41184154.TP 3n
    4119 •
     4155\(bu
    41204156\fBBad User\fR
    41214157- Means user logins with an invalid password are rejected, unless the username does not exist, in which case it is treated as a guest login and mapped into the
    41224158guest account.
    41234159.TP 3n
    4124 •
     4160\(bu
    41254161\fBBad Password\fR
    41264162- Means user logins with an invalid password are treated as a guest login and mapped into the
     
    41314167parameter this way :-).
    41324168.TP 3n
    4133 •
     4169\(bu
    41344170\fBBad Uid\fR
    41354171- Is only applicable when Samba is configured in some type of domain mode security (security = {domain|ads}) and means that user logins which are successfully authenticated but which have no valid Unix user account (and smbd is unable to create one) should be mapped to the defined guest account. This was the default behavior of Samba 2.x releases. Note that if a member server is running winbindd, this option should never be required because the nss_winbind library will export the Windows domain users and groups to the underlying OS via the Name Service Switch interface.
     
    42514287.RS 3n
    42524288.TP 3n
    4253 •
     4289\(bu
    42544290\fBCORE\fR: Earliest version. No concept of user names.
    42554291.TP 3n
    4256 •
     4292\(bu
    42574293\fBCOREPLUS\fR: Slight improvements on CORE for efficiency.
    42584294.TP 3n
    4259 •
     4295\(bu
    42604296\fBLANMAN1\fR: First
    42614297\fB modern\fR
    42624298version of the protocol. Long filename support.
    42634299.TP 3n
    4264 •
     4300\(bu
    42654301\fBLANMAN2\fR: Updates to Lanman1 protocol.
    42664302.TP 3n
    4267 •
     4303\(bu
    42684304\fBNT1\fR: Current up to date version of the protocol. Used by Windows NT. Known as CIFS.
    42694305.RE
     
    43224358\fBnmbd\fR(8)
    43234359what the default 'time to live' of NetBIOS names should be (in seconds) when
    4324 \fBnmbd\fR
     4360nmbd
    43254361is requesting a name using either a broadcast packet or from a WINS server. You should never need to change this parameter. The default is 3 days.
    43264362.sp
     
    43344370\fBsmbd\fR(8)
    43354371when acting as a WINS server (wins support = yes) what the maximum 'time to live' of NetBIOS names that
    4336 \fBnmbd\fR
     4372nmbd
    43374373will grant will be (in seconds). You should never need to change this parameter. The default is 6 days (518400 seconds).
    43384374.sp
     
    43644400.nf
    43654401
    4366 \fBmessage command = csh -c 'xedit %s;rm %s' &\fR
     4402message command = csh -c 'xedit %s;rm %s' &
    43674403
    43684404.fi
     
    43704406.sp
    43714407This delivers the message using
    4372 \fBxedit\fR, then removes it afterwards.
     4408xedit, then removes it afterwards.
    43734409\fBNOTE THAT IT IS VERY IMPORTANT THAT THIS COMMAND RETURN IMMEDIATELY\fR. That's why I have the '&' on the end. If it doesn't return immediately then your PCs may freeze when sending messages (they should recover after 30 seconds, hopefully).
    43744410.sp
     
    43814417.RS 3n
    43824418.TP 3n
    4383 •
     4419\(bu
    43844420\fI%s\fR
    43854421= the filename containing the message.
    43864422.TP 3n
    4387 •
     4423\(bu
    43884424\fI%t\fR
    43894425= the destination that the message was sent to (probably the server name).
    43904426.TP 3n
    4391 •
     4427\(bu
    43924428\fI%f\fR
    43934429= who the message is from.
     
    44024438.nf
    44034439
    4404 \fBmessage command = /bin/mail -s 'message from %f on %m' root < %s; rm %s\fR
     4440message command = /bin/mail -s 'message from %f on %m' root < %s; rm %s
    44054441
    44064442.fi
     
    44154451.nf
    44164452
    4417 \fBmessage command = rm %s\fR
     4453message command = rm %s
    44184454
    44194455.fi
     
    44604496\fBnmbd\fR(8)
    44614497when acting as a WINS server (wins support = yes) what the minimum 'time to live' of NetBIOS names that
    4462 \fBnmbd\fR
     4498nmbd
    44634499will grant will be (in seconds). You should never need to change this parameter. The default is 6 hours (21600 seconds).
    44644500.sp
     
    44784514.sp
    44794515Example:
    4480 \fB\fImsdfs proxy\fR = \\otherserver\someshare \fR
     4516\fB\fImsdfs proxy\fR = \\\\otherserver\\someshare \fR
    44814517.RE
    44824518.PP
     
    45104546.RS 3n
    45114547.TP 3n
    4512 &#8226;
     4548\(bu
    45134549
    45144550\fBlmhosts\fR
    45154551: Lookup an IP address in the Samba lmhosts file. If the line in lmhosts has no name type attached to the NetBIOS name (see the manpage for lmhosts for details) then any name type matches for lookup.
    45164552.TP 3n
    4517 &#8226;
     4553\(bu
    45184554
    45194555\fBhost\fR
     
    45234559file. Note that this method is used only if the NetBIOS name type being queried is the 0x20 (server) name type or 0x1c (domain controllers). The latter case is only useful for active directory domains and results in a DNS query for the SRV RR entry matching _ldap._tcp.domain.
    45244560.TP 3n
    4525 &#8226;
     4561\(bu
    45264562\fBwins\fR
    45274563: Query a name with the IP address listed in the
    45284564WINSSERVER parameter. If no WINS server has been specified this method will be ignored.
    45294565.TP 3n
    4530 &#8226;
     4566\(bu
    45314567\fBbcast\fR
    45324568: Do a broadcast on each of the known local interfaces listed in the
     
    45364572The example below will cause the local lmhosts file to be examined first, followed by a broadcast attempt, followed by a normal system hostname lookup.
    45374573.sp
    4538 When Samba is functioning in ADS security mode (\fBsecurity = ads\fR) it is advised to use following settings for
     4574When Samba is functioning in ADS security mode (security = ads) it is advised to use following settings for
    45394575\fIname resolve order\fR:
    45404576.sp
    4541 \fBname resolve order = wins bcast\fR
     4577name resolve order = wins bcast
    45424578.sp
    45434579DC lookups will still be done via DNS, but fallbacks to netbios names will not inundate your DNS servers with needless querys for DOMAIN<0x1c> lookups.
     
    46164652.sp
    46174653If this option, and
    4618 \fBlanman auth\fR
     4654lanman auth
    46194655are both disabled, then only NTLMv2 logins will be permited. Not all clients support NTLMv2, and most will require special configuration to us it.
    46204656.sp
     
    46794715.sp
    46804716Note that this also means Samba won't try to deduce usernames from the service name. This can be annoying for the [homes] section. To get around this you could use
    4681 \fBuser = %S\fR
     4717user = %S
    46824718which means your
    46834719\fIuser\fR
     
    47234759In brief it specifies a number, which causes
    47244760\fBsmbd\fR(8)not to grant an oplock even when requested if the approximate number of clients contending for an oplock on the same file goes over this limit. This causes
    4725 \fBsmbd\fR
     4761smbd
    47264762to behave in a similar way to Windows NT.
    47274763.sp
     
    47394775.RS 3n
    47404776This boolean option tells
    4741 \fBsmbd\fR
     4777smbd
    47424778whether to issue oplocks (opportunistic locks) to file open requests on this share. The oplock code can dramatically (approx. 30% or more) improve the speed of access to files on Samba servers. It allows the clients to aggressively cache files locally and you may want to disable this option for unreliable network environments (it is turned on by default in Windows NT Servers). For more information see the file
    47434779\fISpeed.txt\fR
     
    47614797.sp
    47624798For example, a valid entry using the HP LaserJet 5 printer driver would appear as
    4763 \fBHP LaserJet 5L = LASERJET.HP LaserJet 5L\fR.
     4799HP LaserJet 5L = LASERJET.HP LaserJet 5L.
    47644800.sp
    47654801The need for the file is due to the printer driver namespace problem described in the chapter on Classical Printing in the Samba3-HOWTO book. For more details on OS/2 clients, please refer to chapter on other clients in the Samba3-HOWTO book.
     
    48294865.RS 3n
    48304866.TP 3n
    4831 &#8226;
    4832 \fBsmbpasswd\fR
     4867\(bu
     4868smbpasswd
    48334869- The default smbpasswd backend. Takes a path to the smbpasswd file as an optional argument.
    48344870.TP 3n
    4835 &#8226;
    4836 \fBtdbsam\fR
     4871\(bu
     4872tdbsam
    48374873- The TDB based password storage backend. Takes a path to the TDB as an optional argument (defaults to passdb.tdb in the
    48384874private dir directory.
    48394875.TP 3n
    4840 &#8226;
    4841 \fBldapsam\fR
     4876\(bu
     4877ldapsam
    48424878- The LDAP based passdb backend. Takes an LDAP URL as an optional argument (defaults to
    4843 \fBldap://localhost\fR)
     4879ldap://localhost)
    48444880.sp
    48454881LDAP connections should be secured where possible. This may be done using either Start-TLS (see
     
    48744910Default:
    48754911\fB\fIpassdb expand explicit\fR = no \fR
    4876 .RE
    4877 .PP
    4878 passwd chat debug (G)
    4879 .RS 3n
    4880 This boolean specifies if the passwd chat script parameter is run in
    4881 \fBdebug\fR
    4882 mode. In this mode the strings passed to and received from the passwd chat are printed in the
    4883 \fBsmbd\fR(8)
    4884 log with a
    4885 debug level of 100. This is a dangerous option as it will allow plaintext passwords to be seen in the
    4886 \fBsmbd\fR
    4887 log. It is available to help Samba admins debug their
    4888 \fIpasswd chat\fR
    4889 scripts when calling the
    4890 \fIpasswd program\fR
    4891 and should be turned off after this has been done. This option has no effect if the
    4892 pam password change paramter is set. This parameter is off by default.
    4893 .sp
    4894 Default:
    4895 \fB\fIpasswd chat debug\fR = no \fR
    4896 .RE
    4897 .PP
    4898 passwd chat timeout (G)
    4899 .RS 3n
    4900 This integer specifies the number of seconds smbd will wait for an initial answer from a passwd chat script being run. Once the initial answer is received the subsequent answers must be received in one tenth of this time. The default it two seconds.
    4901 .sp
    4902 Default:
    4903 \fB\fIpasswd chat timeout\fR = 2 \fR
    49044912.RE
    49054913.PP
     
    49354943.sp
    49364944Default:
    4937 \fB\fIpasswd chat\fR = *new*password* %n\n*new*password* %n\n *changed* \fR
    4938 .sp
    4939 Example:
    4940 \fB\fIpasswd chat\fR = "*Enter OLD password*" %o\n "*Enter NEW password*" %n\n "*Reenter NEW password*" %n\n "*Password changed*" \fR
     4945\fB\fIpasswd chat\fR = *new*password* %n\\n*new*password* %n\\n *changed* \fR
     4946.sp
     4947Example:
     4948\fB\fIpasswd chat\fR = "*Enter OLD password*" %o\\n "*Enter NEW password*" %n\\n "*Reenter NEW password*" %n\\n "*Password changed*" \fR
     4949.RE
     4950.PP
     4951passwd chat debug (G)
     4952.RS 3n
     4953This boolean specifies if the passwd chat script parameter is run in
     4954\fBdebug\fR
     4955mode. In this mode the strings passed to and received from the passwd chat are printed in the
     4956\fBsmbd\fR(8)
     4957log with a
     4958debug level of 100. This is a dangerous option as it will allow plaintext passwords to be seen in the
     4959smbd
     4960log. It is available to help Samba admins debug their
     4961\fIpasswd chat\fR
     4962scripts when calling the
     4963\fIpasswd program\fR
     4964and should be turned off after this has been done. This option has no effect if the
     4965pam password change paramter is set. This parameter is off by default.
     4966.sp
     4967Default:
     4968\fB\fIpasswd chat debug\fR = no \fR
     4969.RE
     4970.PP
     4971passwd chat timeout (G)
     4972.RS 3n
     4973This integer specifies the number of seconds smbd will wait for an initial answer from a passwd chat script being run. Once the initial answer is received the subsequent answers must be received in one tenth of this time. The default it two seconds.
     4974.sp
     4975Default:
     4976\fB\fIpasswd chat timeout\fR = 2 \fR
    49414977.RE
    49424978.PP
     
    49594995\fBAS ROOT\fR
    49604996before the SMB password in the smbpasswd file is changed. If this UNIX password change fails, then
    4961 \fBsmbd\fR
     4997smbd
    49624998will fail to change the SMB password also (this is by design).
    49634999.sp
     
    50175053.RS 3n
    50185054By specifying the name of another SMB server or Active Directory domain controller with this option, and using
    5019 \fBsecurity = [ads|domain|server]\fR
     5055security = [ads|domain|server]
    50205056it is possible to get Samba to to do all its username/password validation using a specific remote server.
    50215057.sp
     
    50455081or
    50465082\fBads\fR, then the list of machines in this option must be a list of Primary or Backup Domain controllers for the Domain or the character '*', as the Samba server is effectively in that domain, and will use cryptographically authenticated RPC calls to authenticate the user logging on. The advantage of using
    5047 \fB security = domain\fR
     5083security = domain
    50485084is that if you list several hosts in the
    50495085\fIpassword server\fR
    50505086option then
    5051 \fBsmbd \fR
     5087smbd
    50525088will try each in turn till it finds one that responds. This is useful in case your primary server goes down.
    50535089.sp
     
    50645100parameter is set to
    50655101\fBserver\fR, then there are different restrictions that
    5066 \fBsecurity = domain\fR
     5102security = domain
    50675103doesn't suffer from:
    50685104.RS 3n
    50695105.TP 3n
    5070 &#8226;
     5106\(bu
    50715107You may list several password servers in the
    50725108\fIpassword server\fR
    50735109parameter, however if an
    5074 \fBsmbd\fR
     5110smbd
    50755111makes a connection to a password server, and then the password server fails, no more users will be able to be authenticated from this
    5076 \fBsmbd\fR. This is a restriction of the SMB/CIFS protocol when in
    5077 \fBsecurity = server \fR
     5112smbd. This is a restriction of the SMB/CIFS protocol when in
     5113security = server
    50785114mode and cannot be fixed in Samba.
    50795115.TP 3n
    5080 &#8226;
     5116\(bu
    50815117If you are using a Windows NT server as your password server then you will have to ensure that your users are able to login from the Samba server, as when in
    5082 \fB security = server\fR
     5118security = server
    50835119mode the network logon will appear to come from there rather than from the users workstation.
    50845120.RE
     
    51515187An interesting example may be to unmount server resources:
    51525188.sp
    5153 \fBpostexec = /etc/umount /cdrom\fR
     5189postexec = /etc/umount /cdrom
    51545190.sp
    51555191Default:
     
    51575193.sp
    51585194Example:
    5159 \fB\fIpostexec\fR = echo \"%u disconnected from %S from %m (%I)\" >> /tmp/log \fR
    5160 .RE
    5161 .PP
    5162 preexec close (S)
    5163 .RS 3n
    5164 This boolean option controls whether a non-zero return code from
    5165 preexec should close the service being connected to.
    5166 .sp
    5167 Default:
    5168 \fB\fIpreexec close\fR = no \fR
     5195\fB\fIpostexec\fR = echo \\"%u disconnected from %S from %m (%I)\\" >> /tmp/log \fR
    51695196.RE
    51705197.PP
     
    51815208.sp
    51825209
    5183 \fBpreexec = csh -c 'echo \"Welcome to %S!\" | /usr/local/samba/bin/smbclient -M %m -I %I' & \fR
     5210preexec = csh -c 'echo \\"Welcome to %S!\\" | /usr/local/samba/bin/smbclient -M %m -I %I' &
    51845211.sp
    51855212Of course, this could get annoying after a while :-)
     
    51935220.sp
    51945221Example:
    5195 \fB\fIpreexec\fR = echo \"%u connected to %S from %m (%I)\" >> /tmp/log \fR
     5222\fB\fIpreexec\fR = echo \\"%u connected to %S from %m (%I)\\" >> /tmp/log \fR
     5223.RE
     5224.PP
     5225preexec close (S)
     5226.RS 3n
     5227This boolean option controls whether a non-zero return code from
     5228preexec should close the service being connected to.
     5229.sp
     5230Default:
     5231\fB\fIpreexec close\fR = no \fR
    51965232.RE
    51975233.PP
     
    52095245If this is set to
    52105246\fByes\fR, on startup,
    5211 \fBnmbd\fR
     5247nmbd
    52125248will force an election, and it will have a slight advantage in winning the election. It is recommended that this parameter is used in conjunction with
    52135249domain master = yes, so that
    5214 \fBnmbd\fR
     5250nmbd
    52155251can guarantee becoming a domain master.
    52165252.sp
     
    52195255Default:
    52205256\fB\fIpreferred master\fR = auto \fR
    5221 .RE
    5222 .PP
    5223 preload modules (G)
    5224 .RS 3n
    5225 This is a list of paths to modules that should be loaded into smbd before a client connects. This improves the speed of smbd when reacting to new connections somewhat.
    5226 .sp
    5227 Default:
    5228 \fB\fIpreload modules\fR = \fR
    5229 .sp
    5230 Example:
    5231 \fB\fIpreload modules\fR = /usr/lib/samba/passdb/mysql.so \fR
    52325257.RE
    52335258.PP
     
    52495274Example:
    52505275\fB\fIpreload\fR = fred lp colorlp \fR
     5276.RE
     5277.PP
     5278preload modules (G)
     5279.RS 3n
     5280This is a list of paths to modules that should be loaded into smbd before a client connects. This improves the speed of smbd when reacting to new connections somewhat.
     5281.sp
     5282Default:
     5283\fB\fIpreload modules\fR = \fR
     5284.sp
     5285Example:
     5286\fB\fIpreload modules\fR = /usr/lib/samba/passdb/mysql.so \fR
    52515287.RE
    52525288.PP
     
    53075343.sp
    53085344To use the CUPS printing interface set
    5309 \fBprintcap name = cups \fR. This should be supplemented by an addtional setting
     5345printcap name = cups. This should be supplemented by an addtional setting
    53105346printing = cups in the [global] section.
    5311 \fBprintcap name = cups\fR
     5347printcap name = cups
    53125348will use the "dummy" printcap created by CUPS, as specified in your CUPS configuration file.
    53135349.sp
    53145350On System V systems that use
    5315 \fBlpstat\fR
     5351lpstat
    53165352to list available printers you can use
    5317 \fBprintcap name = lpstat \fR
     5353printcap name = lpstat
    53185354to automatically obtain lists of available printers. This is the default for systems that define SYSV at configure time in Samba (this includes most System V based systems). If
    53195355\fI printcap name\fR
    53205356is set to
    5321 \fBlpstat\fR
     5357lpstat
    53225358on these systems then Samba will launch
    5323 \fBlpstat -v\fR
     5359lpstat -v
    53245360and attempt to parse the output to obtain a printer list.
    53255361.sp
     
    53605396.RS 3n
    53615397After a print job has finished spooling to a service, this command will be used via a
    5362 \fBsystem()\fR
     5398system()
    53635399call to process the spool file. Typically the command specified will submit the spool file to the host's printing subsystem, but there is no requirement that this be the case. The server will not remove the spool file, so whatever command you specify should remove the spool file when it has been processed, otherwise you will need to manually remove old spool files.
    53645400.sp
     
    53985434You can form quite complex print commands by realizing that they are just passed to a shell. For example the following will log a print job, print the file, then remove it. Note that ';' is the usual separator for command in shell scripts.
    53995435.sp
    5400 \fBprint command = echo Printing %s >> /tmp/print.log; lpr -P %p %s; rm %s\fR
     5436print command = echo Printing %s >> /tmp/print.log; lpr -P %p %s; rm %s
    54015437.sp
    54025438You may have to vary this command considerably depending on how you normally print files on your system. The default for the parameter varies depending on the setting of the
     
    54045440.sp
    54055441Default: For
    5406 \fBprinting = BSD, AIX, QNX, LPRNG or PLP :\fR
    5407 .sp
    5408 \fBprint command = lpr -r -P%p %s\fR
     5442printing = BSD, AIX, QNX, LPRNG or PLP :
     5443.sp
     5444print command = lpr -r -P%p %s
    54095445.sp
    54105446For
    5411 \fBprinting = SYSV or HPUX :\fR
    5412 .sp
    5413 \fBprint command = lp -c -d%p %s; rm %s\fR
     5447printing = SYSV or HPUX :
     5448.sp
     5449print command = lp -c -d%p %s; rm %s
    54145450.sp
    54155451For
    5416 \fBprinting = SOFTQ :\fR
    5417 .sp
    5418 \fBprint command = lp -d%p -s %s; rm %s\fR
     5452printing = SOFTQ :
     5453.sp
     5454print command = lp -d%p -s %s; rm %s
    54195455.sp
    54205456For printing = CUPS : If SAMBA is compiled against libcups, then
    54215457printcap = cups uses the CUPS API to submit jobs, etc. Otherwise it maps to the System V commands with the -oraw option for printing, i.e. it uses
    5422 \fBlp -c -d%p -oraw; rm %s\fR. With
    5423 \fBprinting = cups\fR, and if SAMBA is compiled against libcups, any manually set print command will be ignored.
     5458lp -c -d%p -oraw; rm %s. With
     5459printing = cups, and if SAMBA is compiled against libcups, any manually set print command will be ignored.
    54245460.sp
    54255461\fBNo default\fR
     
    55095545.sp
    55105546Example:
    5511 \fB\fIprintjob username\fR = %D\%U \fR
     5547\fB\fIprintjob username\fR = %D\\%U \fR
    55125548.RE
    55135549.PP
     
    56115647\fByes\fR, then users of a service may not create or modify files in the service's directory.
    56125648.sp
    5613 Note that a printable service (\fBprintable = yes\fR) will
     5649Note that a printable service (printable = yes) will
    56145650\fBALWAYS\fR
    56155651allow writing to the directory (user privileges permitting), but only via spooling operations.
     
    56365672.RS 3n
    56375673This option specifies the kerberos realm to use. The realm is used as the ADS equivalent of the NT4
    5638 \fBdomain\fR. It is usually set to the DNS name of the kerberos server.
     5674domain. It is usually set to the DNS name of the kerberos server.
    56395675.sp
    56405676Default:
     
    56585694.nf
    56595695
    5660 \fBremote announce = 192.168.2.255/SERVERS 192.168.4.255/STAFF\fR
     5696remote announce = 192.168.2.255/SERVERS 192.168.4.255/STAFF
    56615697
    56625698.fi
    56635699the above line would cause
    5664 \fBnmbd\fR
     5700nmbd
    56655701to announce itself to the two given IP addresses using the given workgroup names. If you leave out the workgroup name then the one given in the
    56665702workgroup parameter is used instead.
     
    56925728.fi
    56935729the above line would cause
    5694 \fBnmbd\fR
     5730nmbd
    56955731to request the master browser on the specified subnets or addresses to synchronize their browse lists with the local server.
    56965732.sp
     
    57735809.RS 3n
    57745810The server will
    5775 \fBchroot()\fR
     5811chroot()
    57765812(i.e. Change its root directory) to this directory on startup. This is not strictly necessary for secure operation. Even without it the server will deny access to files not in one of the service entries. It may also check for, and deny access to, soft links to other parts of the filesystem, or attempts to use ".." in file names to access other directories (depending on the setting of the
    57775813wide smbconfoptions parameter).
     
    58065842.RE
    58075843.PP
     5844root preexec (S)
     5845.RS 3n
     5846This is the same as the
     5847\fIpreexec\fR
     5848parameter except that the command is run as root. This is useful for mounting filesystems (such as CDROMs) when a connection is opened.
     5849.sp
     5850Default:
     5851\fB\fIroot preexec\fR = \fR
     5852.RE
     5853.PP
    58085854root preexec close (S)
    58095855.RS 3n
     
    58165862.RE
    58175863.PP
    5818 root preexec (S)
    5819 .RS 3n
    5820 This is the same as the
    5821 \fIpreexec\fR
    5822 parameter except that the command is run as root. This is useful for mounting filesystems (such as CDROMs) when a connection is opened.
    5823 .sp
    5824 Default:
    5825 \fB\fIroot preexec\fR = \fR
    5826 .RE
    5827 .PP
    5828 security mask (S)
    5829 .RS 3n
    5830 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box.
    5831 .sp
    5832 This parameter is applied as a mask (AND'ed with) to the changed permission bits, thus preventing any bits not in this mask from being modified. Make sure not to mix up this parameter with
    5833 force security mode, which works in a manner similar to this one but uses a logical OR instead of an AND.
    5834 .sp
    5835 Essentially, zero bits in this mask may be treated as a set of bits the user is not allowed to change.
    5836 .sp
    5837 If not set explicitly this parameter is 0777, allowing a user to modify all the user/group/world permissions on a file.
    5838 .sp
    5839 \fB Note\fR
    5840 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems. Administrators of most normal systems will probably want to leave it set to
    5841 \fB0777\fR.
    5842 .sp
    5843 Default:
    5844 \fB\fIsecurity mask\fR = 0777 \fR
    5845 .sp
    5846 Example:
    5847 \fB\fIsecurity mask\fR = 0770 \fR
    5848 .RE
    5849 .PP
    58505864security (G)
    58515865.RS 3n
     
    58595873.sp
    58605874The default is
    5861 \fBsecurity = user\fR, as this is the most common setting needed when talking to Windows 98 and Windows NT.
     5875security = user, as this is the most common setting needed when talking to Windows 98 and Windows NT.
    58625876.sp
    58635877The alternatives are
    5864 \fBsecurity = share\fR,
    5865 \fBsecurity = server\fR
     5878security = share,
     5879security = server
    58665880or
    5867 \fBsecurity = domain \fR.
     5881security = domain.
    58685882.sp
    58695883In versions of Samba prior to 2.0.0, the default was
    5870 \fBsecurity = share\fR
     5884security = share
    58715885mainly because that was the only option at one stage.
    58725886.sp
     
    58745888.sp
    58755889If your PCs use usernames that are the same as their usernames on the UNIX machine then you will want to use
    5876 \fBsecurity = user\fR. If you mostly use usernames that don't exist on the UNIX box then use
    5877 \fBsecurity = share\fR.
     5890security = user. If you mostly use usernames that don't exist on the UNIX box then use
     5891security = share.
    58785892.sp
    58795893You should also use
    5880 \fBsecurity = share\fR
     5894security = share
    58815895if you want to mainly setup shares without a password (guest shares). This is commonly used for a shared printer server. It is more difficult to setup guest shares with
    5882 \fBsecurity = user\fR, see the
     5896security = user, see the
    58835897map to guestparameter for details.
    58845898.sp
    58855899It is possible to use
    5886 \fBsmbd\fR
     5900smbd
    58875901in a
    58885902\fB hybrid mode\fR
     
    58955909.sp
    58965910When clients connect to a share level security server they need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a
    5897 \fBsecurity = share \fR
     5911security = share
    58985912server). Instead, the clients send authentication information (passwords) on a per-share basis, at the time they attempt to connect to that share.
    58995913.sp
    59005914Note that
    5901 \fBsmbd\fR
     5915smbd
    59025916\fBALWAYS\fR
    59035917uses a valid UNIX user to act on behalf of the client, even in
    5904 \fBsecurity = share\fR
     5918security = share
    59055919level security.
    59065920.sp
    59075921As clients are not required to send a username to the server in share level security,
    5908 \fBsmbd\fR
     5922smbd
    59095923uses several techniques to determine the correct UNIX user to use on behalf of the client.
    59105924.sp
     
    59125926.RS 3n
    59135927.TP 3n
    5914 &#8226;
     5928\(bu
    59155929If the
    59165930guest only parameter is set, then all the other stages are missed and only the
    59175931guest account username is checked.
    59185932.TP 3n
    5919 &#8226;
     5933\(bu
    59205934Is a username is sent with the share connection request, then this username (after mapping - see
    59215935username map), is added as a potential username.
    59225936.TP 3n
    5923 &#8226;
     5937\(bu
    59245938If the client did a previous
    59255939\fBlogon \fR
    59265940request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username.
    59275941.TP 3n
    5928 &#8226;
     5942\(bu
    59295943The name of the service the client requested is added as a potential username.
    59305944.TP 3n
    5931 &#8226;
     5945\(bu
    59325946The NetBIOS name of the client is added to the list as a potential username.
    59335947.TP 3n
    5934 &#8226;
     5948\(bu
    59355949Any users on the
    59365950user list are added as potential usernames.
     
    59845998\fBNote\fR
    59855999that from the client's point of view
    5986 \fBsecurity = domain\fR
     6000security = domain
    59876001is the same as
    5988 \fBsecurity = user\fR. It only affects how the server deals with the authentication, it does not in any way affect what the client sees.
     6002security = user. It only affects how the server deals with the authentication, it does not in any way affect what the client sees.
    59896003.sp
    59906004\fBNote\fR
     
    60056019.sp
    60066020In this mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box. If this fails it will revert to
    6007 \fBsecurity = user\fR. It expects the
     6021security = user. It expects the
    60086022encrypted passwords parameter to be set to
    60096023\fByes\fR, unless the remote server does not support them. However note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid
     
    60246038\fBNote\fR
    60256039From the client's point of view
    6026 \fBsecurity = server\fR
     6040security = server
    60276041is the same as
    6028 \fBsecurity = user\fR. It only affects how the server deals with the authentication, it does not in any way affect what the client sees.
     6042security = user. It only affects how the server deals with the authentication, it does not in any way affect what the client sees.
    60296043\fBNote\fR
    60306044that the name of the resource being requested is
     
    60566070.RE
    60576071.PP
     6072security mask (S)
     6073.RS 3n
     6074This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box.
     6075.sp
     6076This parameter is applied as a mask (AND'ed with) to the changed permission bits, thus preventing any bits not in this mask from being modified. Make sure not to mix up this parameter with
     6077force security mode, which works in a manner similar to this one but uses a logical OR instead of an AND.
     6078.sp
     6079Essentially, zero bits in this mask may be treated as a set of bits the user is not allowed to change.
     6080.sp
     6081If not set explicitly this parameter is 0777, allowing a user to modify all the user/group/world permissions on a file.
     6082.sp
     6083\fB Note\fR
     6084that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems. Administrators of most normal systems will probably want to leave it set to
     6085\fB0777\fR.
     6086.sp
     6087Default:
     6088\fB\fIsecurity mask\fR = 0777 \fR
     6089.sp
     6090Example:
     6091\fB\fIsecurity mask\fR = 0770 \fR
     6092.RE
     6093.PP
    60586094server schannel (G)
    60596095.RS 3n
     
    60936129.RS 3n
    60946130This controls what string will show up in the printer comment box in print manager and next to the IPC connection in
    6095 \fBnet view\fR. It can be any string that you wish to show to your users.
     6131net view. It can be any string that you wish to show to your users.
    60966132.sp
    60976133It also sets what will appear in browse lists next to the machine name.
     
    61156151.RS 3n
    61166152If
    6117 \fBset directory = no\fR, then users of the service may not use the setdir command to change directory.
     6153set directory = no, then users of the service may not use the setdir command to change directory.
    61186154.sp
    61196155The
    6120 \fBsetdir\fR
     6156setdir
    61216157command is only implemented in the Digital Pathworks client. See the Pathworks documentation for details.
    61226158.sp
     
    61286164.RS 3n
    61296165Thanks to the Posix subsystem in NT a Windows User has a primary group in addition to the auxiliary groups. This script sets the primary group in the unix userdatase when an administrator sets the primary group from the windows user manager or when fetching a SAM with
    6130 \fBnet rpc vampire\fR.
     6166net rpc vampire.
    61316167\fI%u\fR
    61326168will be replaced with the user whose primary group is to be set.
     
    61446180.RS 3n
    61456181The
    6146 \fBset quota command\fR
     6182set quota command
    61476183should only be used whenever there is no operating system API available from the OS that samba can use.
    61486184.sp
    61496185This option is only available if Samba was configured with the argument
    6150 \fB--with-sys-quotas\fR
     6186--with-sys-quotas
    61516187or on linux when
    6152 \fB./configure --with-quotas\fR
     6188./configure --with-quotas
    61536189was used and a working quota api was found in the system. Most packages are configured with these options already.
    61546190.sp
     
    61586194.RS 3n
    61596195.TP 3n
    6160 &#8226;
     6196\(bu
    616161971 - quota type
    61626198.RS 3n
    61636199.TP 3n
    6164 &#8226;
     6200\(bu
    616562011 - user quotas
    61666202.TP 3n
    6167 &#8226;
     6203\(bu
    616862042 - user default quotas (uid = -1)
    61696205.TP 3n
    6170 &#8226;
     6206\(bu
    617162073 - group quotas
    61726208.TP 3n
    6173 &#8226;
     6209\(bu
    617462104 - group default quotas (gid = -1)
    61756211.RE
     
    61776213
    61786214.TP 3n
    6179 &#8226;
     6215\(bu
    618062162 - id (uid for user, gid for group, -1 if N/A)
    61816217.TP 3n
    6182 &#8226;
     6218\(bu
    618362193 - quota state (0 = disable, 1 = enable, 2 = enable and enforce)
    61846220.TP 3n
    6185 &#8226;
     6221\(bu
    618662224 - block softlimit
    61876223.TP 3n
    6188 &#8226;
     6224\(bu
    618962255 - block hardlimit
    61906226.TP 3n
    6191 &#8226;
     6227\(bu
    619262286 - inode softlimit
    61936229.TP 3n
    6194 &#8226;
     6230\(bu
    619562317 - inode hardlimit
    61966232.TP 3n
    6197 &#8226;
     6233\(bu
    619862348(optional) - block size, defaults to 1024
    61996235.RE
     
    62826318.RS 3n
    62836319.TP 3n
    6284 &#8226;
     6320\(bu
    62856321\fI%z\fR
    62866322will be substituted with the shutdown message sent to the server.
    62876323.TP 3n
    6288 &#8226;
     6324\(bu
    62896325\fI%t\fR
    62906326will be substituted with the number of seconds to wait before effectively starting the shutdown procedure.
    62916327.TP 3n
    6292 &#8226;
     6328\(bu
    62936329\fI%r\fR
    62946330will be substituted with the switch
    62956331\fB-r\fR. It means reboot after shutdown for NT.
    62966332.TP 3n
    6297 &#8226;
     6333\(bu
    62986334\fI%f\fR
    62996335will be substituted with the switch
     
    63726408.sp
    63736409This option will typically be used to tune your Samba server for optimal performance for your local network. There is no way that Samba can know what the optimal parameters are for your net, so you must experiment and choose them yourself. We strongly suggest you read the appropriate documentation for your operating system first (perhaps
    6374 \fBman setsockopt\fR
     6410man setsockopt
    63756411will help).
    63766412.sp
     
    63836419.RS 3n
    63846420.TP 3n
    6385 &#8226;
     6421\(bu
    63866422SO_KEEPALIVE
    63876423.TP 3n
    6388 &#8226;
     6424\(bu
    63896425SO_REUSEADDR
    63906426.TP 3n
    6391 &#8226;
     6427\(bu
    63926428SO_BROADCAST
    63936429.TP 3n
    6394 &#8226;
     6430\(bu
    63956431TCP_NODELAY
    63966432.TP 3n
    6397 &#8226;
     6433\(bu
    63986434IPTOS_LOWDELAY
    63996435.TP 3n
    6400 &#8226;
     6436\(bu
    64016437IPTOS_THROUGHPUT
    64026438.TP 3n
    6403 &#8226;
     6439\(bu
    64046440SO_SNDBUF *
    64056441.TP 3n
    6406 &#8226;
     6442\(bu
    64076443SO_RCVBUF *
    64086444.TP 3n
    6409 &#8226;
     6445\(bu
    64106446SO_SNDLOWAT *
    64116447.TP 3n
    6412 &#8226;
     6448\(bu
    64136449SO_RCVLOWAT *
    64146450.RE
     
    64196455.sp
    64206456To specify an argument use the syntax SOME_OPTION = VALUE for example
    6421 \fBSO_SNDBUF = 8192\fR. Note that you must not have any spaces before or after the = sign.
     6457SO_SNDBUF = 8192. Note that you must not have any spaces before or after the = sign.
    64226458.sp
    64236459If you are on a local network then a sensible option might be:
    64246460.sp
    6425 \fBsocket options = IPTOS_LOWDELAY\fR
     6461socket options = IPTOS_LOWDELAY
    64266462.sp
    64276463If you have a local network then you could try:
    64286464.sp
    6429 \fBsocket options = IPTOS_LOWDELAY TCP_NODELAY\fR
     6465socket options = IPTOS_LOWDELAY TCP_NODELAY
    64306466.sp
    64316467If you are on a wide area network then perhaps try setting IPTOS_THROUGHPUT.
     
    64616497.sp
    64626498Default:
    6463 \fB\fIstore dos attributes\fR = yes \fR
     6499\fB\fIstore dos attributes\fR = no \fR
    64646500.RE
    64656501.PP
     
    64926528.sp
    64936529Well-behaved clients always ask for lock checks when it is important. So in the vast majority of cases,
    6494 \fBstrict locking = Auto\fR
     6530strict locking = Auto
    64956531or
    6496 \fBstrict locking = no\fR
     6532strict locking = no
    64976533is acceptable.
    64986534.sp
     
    65376573\fByes\fR
    65386574then every write will be followed by a
    6539 \fBfsync() \fR
     6575fsync()
    65406576call to ensure the data is written to disk. Note that the
    65416577\fIstrict sync\fR
     
    65486584.RE
    65496585.PP
    6550 syslog only (G)
    6551 .RS 3n
    6552 If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files.
    6553 .sp
    6554 Default:
    6555 \fB\fIsyslog only\fR = no \fR
    6556 .RE
    6557 .PP
    65586586syslog (G)
    65596587.RS 3n
     
    65686596Default:
    65696597\fB\fIsyslog\fR = 1 \fR
     6598.RE
     6599.PP
     6600syslog only (G)
     6601.RS 3n
     6602If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files.
     6603.sp
     6604Default:
     6605\fB\fIsyslog only\fR = no \fR
    65706606.RE
    65716607.PP
     
    66626698.sp
    66636699Note that even when this parameter is set a user authenticating to
    6664 \fBsmbd\fR
     6700smbd
    66656701must still enter a valid password in order to connect correctly, and to update their hashed (smbpasswd) passwords.
    66666702.sp
     
    66726708.RS 3n
    66736709This parameter applies only to Windows NT/2000 clients. It has no effect on Windows 95/98/ME clients. When serving a printer to Windows NT/2000 clients without first installing a valid printer driver on the Samba host, the client will be required to install a local printer driver. From this point on, the client will treat the print as a local printer and not a network printer connection. This is much the same behavior that will occur when
    6674 \fBdisable spoolss = yes\fR.
     6710disable spoolss = yes.
    66756711.sp
    66766712The differentiating factor is that under normal circumstances, the NT/2000 client will attempt to open the network printer using MS-RPC. The problem is that because the client considers the printer to be local, it will attempt to issue the OpenPrinterEx() call requesting access rights associated with the logged on user. If the user possesses local administator rights but not root privilege on the Samba host (often the case), the OpenPrinterEx() call will fail. The result is that the client will now display an "Access Denied; Unable to connect" message in the printer queue window (even though jobs may successfully be printed).
     
    67176753.RE
    67186754.PP
     6755user
     6756.RS 3n
     6757This parameter is a synonym for username.
     6758.RE
     6759.PP
     6760users
     6761.RS 3n
     6762This parameter is a synonym for username.
     6763.RE
     6764.PP
     6765username (S)
     6766.RS 3n
     6767Multiple users may be specified in a comma-delimited list, in which case the supplied password will be tested against each username in turn (left to right).
     6768.sp
     6769The
     6770\fIusername\fR
     6771line is needed only when the PC is unable to supply its own username. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames. In both these cases you may also be better using the \\server\share%user syntax instead.
     6772.sp
     6773The
     6774\fIusername\fR
     6775line is not a great solution in many cases as it means Samba will try to validate the supplied password against each of the usernames in the
     6776\fIusername\fR
     6777line in turn. This is slow and a bad idea for lots of users in case of duplicate passwords. You may get timeouts or security breaches using this parameter unwisely.
     6778.sp
     6779Samba relies on the underlying UNIX security. This parameter does not restrict who can login, it just offers hints to the Samba server as to what usernames might correspond to the supplied password. Users can login as whoever they please and they will be able to do no more damage than if they started a telnet session. The daemon runs as the user that they log in as, so they cannot do anything that user cannot do.
     6780.sp
     6781To restrict a service to a particular set of users you can use the
     6782valid users parameter.
     6783.sp
     6784If any of the usernames begin with a '@' then the name will be looked up first in the NIS netgroups list (if Samba is compiled with netgroup support), followed by a lookup in the UNIX groups database and will expand to a list of all users in the group of that name.
     6785.sp
     6786If any of the usernames begin with a '+' then the name will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name.
     6787.sp
     6788If any of the usernames begin with a '&' then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name.
     6789.sp
     6790Note that searching though a groups database can take quite some time, and some clients may time out during the search.
     6791.sp
     6792See the section
     6793NOTE ABOUT USERNAME/PASSWORD VALIDATION
     6794for more information on how this parameter determines access to the services.
     6795.sp
     6796Default:
     6797\fB\fIusername\fR = # The guest account if a guest service, else <empty string>. \fR
     6798.sp
     6799Example:
     6800\fB\fIusername\fR = fred, mary, jack, jane, @users, @pcgroup \fR
     6801.RE
     6802.PP
    67196803username level (G)
    67206804.RS 3n
     
    67316815Example:
    67326816\fB\fIusername level\fR = 5 \fR
    6733 .RE
    6734 .PP
    6735 username map script (G)
    6736 .RS 3n
    6737 This script is a mutually exclusive alternative to the
    6738 username map parameter. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line line on standard output (the name to which the account should mapped). In this way, it is possible to store username map tables in an LDAP or NIS directory services.
    6739 .sp
    6740 Default:
    6741 \fB\fIusername map script\fR = \fR
    6742 .sp
    6743 Example:
    6744 \fB\fIusername map script\fR = /etc/samba/scripts/mapusers.sh \fR
    67456817.RE
    67466818.PP
     
    67716843.nf
    67726844
    6773 \fBroot = admin administrator\fR
     6845root = admin administrator
    67746846
    67756847.fi
     
    67846856.nf
    67856857
    6786 \fBsys = @system\fR
     6858sys = @system
    67876859
    67886860.fi
     
    68016873.nf
    68026874
    6803 \fBtridge = "Andrew Tridgell"\fR
     6875tridge = "Andrew Tridgell"
    68046876
    68056877.fi
     
    68536925.RE
    68546926.PP
    6855 user
    6856 .RS 3n
    6857 This parameter is a synonym for username.
    6858 .RE
    6859 .PP
    6860 users
    6861 .RS 3n
    6862 This parameter is a synonym for username.
    6863 .RE
    6864 .PP
    6865 username (S)
    6866 .RS 3n
    6867 Multiple users may be specified in a comma-delimited list, in which case the supplied password will be tested against each username in turn (left to right).
    6868 .sp
    6869 The
    6870 \fIusername\fR
    6871 line is needed only when the PC is unable to supply its own username. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames. In both these cases you may also be better using the \\server\share%user syntax instead.
    6872 .sp
    6873 The
    6874 \fIusername\fR
    6875 line is not a great solution in many cases as it means Samba will try to validate the supplied password against each of the usernames in the
    6876 \fIusername\fR
    6877 line in turn. This is slow and a bad idea for lots of users in case of duplicate passwords. You may get timeouts or security breaches using this parameter unwisely.
    6878 .sp
    6879 Samba relies on the underlying UNIX security. This parameter does not restrict who can login, it just offers hints to the Samba server as to what usernames might correspond to the supplied password. Users can login as whoever they please and they will be able to do no more damage than if they started a telnet session. The daemon runs as the user that they log in as, so they cannot do anything that user cannot do.
    6880 .sp
    6881 To restrict a service to a particular set of users you can use the
    6882 valid users parameter.
    6883 .sp
    6884 If any of the usernames begin with a '@' then the name will be looked up first in the NIS netgroups list (if Samba is compiled with netgroup support), followed by a lookup in the UNIX groups database and will expand to a list of all users in the group of that name.
    6885 .sp
    6886 If any of the usernames begin with a '+' then the name will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name.
    6887 .sp
    6888 If any of the usernames begin with a '&' then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name.
    6889 .sp
    6890 Note that searching though a groups database can take quite some time, and some clients may time out during the search.
    6891 .sp
    6892 See the section
    6893 NOTE ABOUT USERNAME/PASSWORD VALIDATION
    6894 for more information on how this parameter determines access to the services.
    6895 .sp
    6896 Default:
    6897 \fB\fIusername\fR = # The guest account if a guest service, else <empty string>. \fR
    6898 .sp
    6899 Example:
    6900 \fB\fIusername\fR = fred, mary, jack, jane, @users, @pcgroup \fR
     6927username map script (G)
     6928.RS 3n
     6929This script is a mutually exclusive alternative to the
     6930username map parameter. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line line on standard output (the name to which the account should mapped). In this way, it is possible to store username map tables in an LDAP or NIS directory services.
     6931.sp
     6932Default:
     6933\fB\fIusername map script\fR = \fR
     6934.sp
     6935Example:
     6936\fB\fIusername map script\fR = /etc/samba/scripts/mapusers.sh \fR
    69016937.RE
    69026938.PP
     
    70117047.RE
    70127048.PP
     7049utmp (G)
     7050.RS 3n
     7051This boolean parameter is only available if Samba has been configured and compiled with the option
     7052--with-utmp. If set to
     7053\fByes\fR
     7054then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server. Sites may use this to record the user connecting to a Samba share.
     7055.sp
     7056Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user. Enabling this option creates an n^2 algorithm to find this number. This may impede performance on large installations.
     7057.sp
     7058Default:
     7059\fB\fIutmp\fR = no \fR
     7060.RE
     7061.PP
    70137062utmp directory (G)
    70147063.RS 3n
    70157064This parameter is only available if Samba has been configured and compiled with the option
    7016 \fB --with-utmp\fR. It specifies a directory pathname that is used to store the utmp or utmpx files (depending on the UNIX system) that record user connections to a Samba server. By default this is not set, meaning the system will use whatever utmp file the native system is set to use (usually
     7065--with-utmp. It specifies a directory pathname that is used to store the utmp or utmpx files (depending on the UNIX system) that record user connections to a Samba server. By default this is not set, meaning the system will use whatever utmp file the native system is set to use (usually
    70177066\fI/var/run/utmp\fR
    70187067on Linux).
     
    70257074.RE
    70267075.PP
    7027 utmp (G)
    7028 .RS 3n
    7029 This boolean parameter is only available if Samba has been configured and compiled with the option
    7030 \fB--with-utmp\fR. If set to
    7031 \fByes\fR
    7032 then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server. Sites may use this to record the user connecting to a Samba share.
    7033 .sp
    7034 Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user. Enabling this option creates an n^2 algorithm to find this number. This may impede performance on large installations.
    7035 .sp
    7036 Default:
    7037 \fB\fIutmp\fR = no \fR
     7076-valid (S)
     7077.RS 3n
     7078This parameter indicates whether a share is valid and thus can be used. When this parameter is set to false, the share will be in no way visible nor accessible.
     7079.sp
     7080This option should not be used by regular users but might be of help to developers. Samba uses this option internally to mark shares as deleted.
     7081.sp
     7082Default:
     7083\fB\fI-valid\fR = yes \fR
    70387084.RE
    70397085.PP
     
    70567102Example:
    70577103\fB\fIvalid users\fR = greg, @pcusers \fR
    7058 .RE
    7059 .PP
    7060 -valid (S)
    7061 .RS 3n
    7062 This parameter indicates whether a share is valid and thus can be used. When this parameter is set to false, the share will be in no way visible nor accessible.
    7063 .sp
    7064 This option should not be used by regular users but might be of help to developers. Samba uses this option internally to mark shares as deleted.
    7065 .sp
    7066 Default:
    7067 \fB\fI-valid\fR = yes \fR
    70687104.RE
    70697105.PP
     
    71857221\fBwinbindd\fR(8)
    71867222it may be necessary to suppress the enumeration of groups through the
    7187 \fBsetgrent()\fR,
    7188 \fBgetgrent()\fR
     7223setgrent(),
     7224getgrent()
    71897225and
    7190 \fBendgrent()\fR
     7226endgrent()
    71917227group of system calls. If the
    71927228\fIwinbind enum groups\fR
    71937229parameter is
    71947230\fBno\fR, calls to the
    7195 \fBgetgrent()\fR
     7231getgrent()
    71967232system call will not return any data.
    71977233.sp
     
    72117247\fBwinbindd\fR(8)
    72127248it may be necessary to suppress the enumeration of users through the
    7213 \fBsetpwent()\fR,
    7214 \fBgetpwent()\fR
     7249setpwent(),
     7250getpwent()
    72157251and
    7216 \fBendpwent()\fR
     7252endpwent()
    72177253group of system calls. If the
    72187254\fIwinbind enum users\fR
    72197255parameter is
    72207256\fBno\fR, calls to the
    7221 \fBgetpwent\fR
     7257getpwent
    72227258system call will not return any data.
    72237259.sp
     
    72327268.RE
    72337269.PP
     7270winbind expand groups (G)
     7271.RS 3n
     7272This option controls the maximum depth that winbindd will traverse when flattening nested group memberships of Windows domain groups. This is different from the
     7273winbind nested groups option which implements the Windows NT4 model of local group nesting. The "winbind expand groups" parameter specifically applies to the membership of domain groups.
     7274.sp
     7275Be aware that a high value for this parameter can result in system slowdown as the main parent winbindd daemon must perform the group unrolling and will be unable to answer incoming NSS or authentication requests during this time.
     7276.sp
     7277Default:
     7278\fB\fIwinbind expand groups\fR = 1 \fR
     7279.RE
     7280.PP
    72347281winbind nested groups (G)
    72357282.RS 3n
     
    72567303.RS 3n
    72577304.TP 3n
    7258 &#8226;
     7305\(bu
    72597306\fItemplate\fR
    72607307- The default, using the parameters of
     
    72637310\fItemplate homedir\fR)
    72647311.TP 3n
    7265 &#8226;
     7312\(bu
    72667313\fIsfu\fR
    72677314- When Samba is running in security = ads and your Active Directory Domain Controller does support the Microsoft "Services for Unix" (SFU) LDAP schema, winbind can retrieve the login shell and the home directory attributes directly from your Directory Server. Note that retrieving UID and GID from your ADS-Server requires to use
     
    73037350Example:
    73047351\fB\fIwinbind refresh tickets\fR = true \fR
     7352.RE
     7353.PP
     7354winbind rpc only (G)
     7355.RS 3n
     7356Setting this parameter to
     7357yes
     7358forces winbindd to use RPC instead of LDAP to retrieve information from Domain Controllers.
     7359.sp
     7360Default:
     7361\fB\fIwinbind rpc only\fR = no \fR
    73057362.RE
    73067363.PP
     
    73177374.sp
    73187375Default:
    7319 \fB\fIwinbind separator\fR = '\' \fR
     7376\fB\fIwinbind separator\fR = '\\' \fR
    73207377.sp
    73217378Example:
     
    73267383.RS 3n
    73277384This parameter is designed to allow Samba servers that are members of a Samba controlled domain to use UNIX accounts distributed via NIS, rsync, or LDAP as the uid's for winbindd users in the hosts primary domain. Therefore, the user
    7328 DOMAIN\user1
     7385DOMAIN\\user1
    73297386would be mapped to the account user1 in /etc/passwd instead of allocating a new uid for him or her.
    73307387.sp
    7331 This parameter is not deprecated in favor of the newer idmap_nss backend. Refer to the
     7388This parameter is now deprecated in favor of the newer idmap_nss backend. Refer to the
    73327389idmap domains smb.conf option and the
    73337390\fBidmap_nss\fR(8)
     
    73577414The wins hook parameter specifies the name of a script or executable that will be called as follows:
    73587415.sp
    7359 \fBwins_hook operation name nametype ttl IP_list\fR
    7360 .RS 3n
    7361 .TP 3n
    7362 &#8226;
     7416wins_hook operation name nametype ttl IP_list
     7417.RS 3n
     7418.TP 3n
     7419\(bu
    73637420The first argument is the operation and is one of "add", "delete", or "refresh". In most cases the operation can be ignored as the rest of the parameters provide sufficient information. Note that "refresh" may sometimes be called when the name has not previously been added, in that case it should be treated as an add.
    73647421.TP 3n
    7365 &#8226;
     7422\(bu
    73667423The second argument is the NetBIOS name. If the name is not a legal name then the wins hook is not called. Legal names contain only letters, digits, hyphens, underscores and periods.
    73677424.TP 3n
    7368 &#8226;
     7425\(bu
    73697426The third argument is the NetBIOS name type as a 2 digit hexadecimal number.
    73707427.TP 3n
    7371 &#8226;
     7428\(bu
    73727429The fourth argument is the TTL (time to live) for the name in seconds.
    73737430.TP 3n
    7374 &#8226;
     7431\(bu
    73757432The fifth and subsequent arguments are the IP addresses currently registered for that name. If this list is empty then the name should be deleted.
    73767433.RE
    73777434.IP "" 3n
    73787435An example script that calls the BIND dynamic DNS update program
    7379 \fBnsupdate\fR
     7436nsupdate
    73807437is provided in the examples directory of the Samba source code.
    73817438.sp
     
    74307487\fByes\fR
    74317488unless you have a multi-subnetted network and you wish a particular
    7432 \fBnmbd\fR
     7489nmbd
    74337490to be your WINS server. Note that you should
    74347491\fBNEVER\fR
     
    75117568.RS 3n
    75127569This parameter is only available if Samba has been configured and compiled with the option
    7513 \fB --with-utmp\fR. It specifies a directory pathname that is used to store the wtmp or wtmpx files (depending on the UNIX system) that record user connections to a Samba server. The difference with the utmp directory is the fact that user info is kept after a user has logged out.
     7570--with-utmp. It specifies a directory pathname that is used to store the wtmp or wtmpx files (depending on the UNIX system) that record user connections to a Samba server. The difference with the utmp directory is the fact that user info is kept after a user has logged out.
    75147571.sp
    75157572By default this is not set, meaning the system will use whatever utmp file the native system is set to use (usually
Note: See TracChangeset for help on using the changeset viewer.