Changeset 740 for vendor/current/docs/manpages/smb.conf.5
- Timestamp:
- Nov 14, 2012, 12:59:34 PM (13 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/docs/manpages/smb.conf.5
r618 r740 3 3 .\" Author: [see the "AUTHOR" section] 4 4 .\" Generator: DocBook XSL Stylesheets v1.75.2 <http://docbook.sf.net/> 5 .\" Date: 08/0 2/20115 .\" Date: 08/08/2011 6 6 .\" Manual: File Formats and Conventions 7 .\" Source: Samba 3. 57 .\" Source: Samba 3.6 8 8 .\" Language: English 9 9 .\" 10 .TH "SMB\&.CONF" "5" "08/0 2/2011" "Samba 3\&.5" "File Formats and Conventions"10 .TH "SMB\&.CONF" "5" "08/08/2011" "Samba 3\&.6" "File Formats and Conventions" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * set default formatting … … 149 149 .\} 150 150 If no path was given, the path is set to the user\'s home directory\&. 151 .RE 151 152 .sp 152 153 .RE … … 236 237 .\} 237 238 If the share does not permit guest access and no username was given, the username is set to the located printer name\&. 239 .RE 238 240 .sp 239 241 .RE … … 456 458 %a 457 459 .RS 4 458 The architecture of the remote machine\&. It currently recognizes Samba (\fBSamba\fR), the Linux CIFS file system (\fBCIFSFS\fR), OS/2, (\fBOS2\fR), Windows for Workgroups (\fBWfWg\fR), Windows 9x/ME (\fBWin95\fR), Windows NT (\fBWinNT\fR), Windows 2000 (\fBWin2K\fR), Windows XP (\fBWinXP\fR), Windows XP 64\-bit(\fBWinXP64\fR), Windows 2003 including 2003R2 (\fBWin2K3\fR), and Windows Vista (\fBVista\fR)\&. Anything else will be known as460 The architecture of the remote machine\&. It currently recognizes Samba (\fBSamba\fR), the Linux CIFS file system (\fBCIFSFS\fR), OS/2, (\fBOS2\fR), Mac OS X (\fBOSX\fR), Windows for Workgroups (\fBWfWg\fR), Windows 9x/ME (\fBWin95\fR), Windows NT (\fBWinNT\fR), Windows 2000 (\fBWin2K\fR), Windows XP (\fBWinXP\fR), Windows XP 64\-bit(\fBWinXP64\fR), Windows 2003 including 2003R2 (\fBWin2K3\fR), and Windows Vista (\fBVista\fR)\&. Anything else will be known as 459 461 \fBUNKNOWN\fR\&. 460 462 .RE … … 463 465 .RS 4 464 466 the IP address of the client machine\&. 467 .sp 468 Before 3\&.6\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&. 465 469 .RE 466 470 .PP … … 468 472 .RS 4 469 473 the local IP address to which a client connected\&. 474 .sp 475 Before 3\&.6\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&. 470 476 .RE 471 477 .PP … … 555 561 .RS 4 556 562 controls what the default case is for new filenames (ie\&. files that don\'t currently exist in the filesystem)\&. Default 557 \fIlower\fR\&. IMPORTANT NOTE: This option will be used to modify the case of 563 \fIlower\fR\&. IMPORTANT NOTE: As part of the optimizations for directories containing large numbers of files, the following special case applies\&. If the options 564 \m[blue]\fBcase sensitive = yes\fR\m[], 565 \m[blue]\fBpreserve case = No\fR\m[], and 566 \m[blue]\fBshort preserve case = No\fR\m[] 567 are set, then the case of 558 568 \fIall\fR 559 incoming client filenames, not just new filenames if the options 560 \m[blue]\fBcase sensitive = yes\fR\m[], 561 \m[blue]\fBpreserve case = No\fR\m[], 562 \m[blue]\fBshort preserve case = No\fR\m[] 563 are set\&. This change is needed as part of the optimisations for directories containing large numbers of files\&. 569 incoming client filenames, not just new filenames, will be modified\&. See additional notes below\&. 564 570 .RE 565 571 .PP … … 909 915 .\} 910 916 \fIdevice URI\fR 911 .sp 912 .RE 913 The deviceURI is in the for of socket://<hostname>[:<portnumber>] or lpd://<hostname>/<queuename>\&. 917 .RE 918 .sp 919 .RE 920 The deviceURI is in the format of socket://<hostname>[:<portnumber>] or lpd://<hostname>/<queuename>\&. 914 921 .sp 915 922 Default: … … 1001 1008 .\} 1002 1009 \fIWindows 9x driver location\fR 1010 .RE 1003 1011 .sp 1004 1012 .RE … … 1109 1117 \fImax connections\fR 1110 1118 Number of maximum simultaneous connections to this share\&. 1119 .RE 1111 1120 .sp 1112 1121 .RE … … 1397 1406 Example: 1398 1407 \fI\fIannounce version\fR\fR\fI = \fR\fI2\&.0\fR\fI \fR 1408 .RE 1409 1410 async smb echo handler (G) 1411 .\" async smb echo handler 1412 .PP 1413 .RS 4 1414 This parameter specifies whether Samba should fork the async smb echo handler\&. It can be beneficial if your file system can block syscalls for a very long time\&. In some circumstances, it prolongs the timeout that Windows uses to determine whether a connection is dead\&. 1415 .sp 1416 Default: 1417 \fI\fIasync smb echo handler\fR\fR\fI = \fR\fIno\fR\fI \fR 1399 1418 .RE 1400 1419 … … 1742 1761 \fImax connections\fR 1743 1762 Number of maximum simultaneous connections to this share\&. 1763 .RE 1744 1764 .sp 1745 1765 .RE … … 1839 1859 will attempt to authenticate itself to servers using the NTLMv2 encrypted password response\&. 1840 1860 .sp 1841 If enabled, only an NTLMv2 and LMv2 response (both much more secure than earlier versions) will be sent\&. Many servers (including NT4 < SP4, Win9x and Samba 2\&.2) are not compatible with NTLMv2\&.1861 If enabled, only an NTLMv2 and LMv2 response (both much more secure than earlier versions) will be sent\&. Older servers (including NT4 < SP4, Win9x and Samba 2\&.2) are not compatible with NTLMv2 when not in an NTLMv2 supporting domain 1842 1862 .sp 1843 1863 Similarly, if enabled, NTLMv1, … … 1850 1870 client lanman auth\&. 1851 1871 .sp 1852 Note that some sites (particularly those following \'best practice\' security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM\&.1853 .sp 1854 Default: 1855 \fI\fIclient ntlmv2 auth\fR\fR\fI = \fR\fI no\fR\fI \fR1872 Note that Windows Vista and later versions already use NTLMv2 by default, and some sites (particularly those following \'best practice\' security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM\&. 1873 .sp 1874 Default: 1875 \fI\fIclient ntlmv2 auth\fR\fR\fI = \fR\fIyes\fR\fI \fR 1856 1876 .RE 1857 1877 … … 2120 2140 .RE 2121 2141 2142 ctdb locktime warn threshold (G) 2143 .\" ctdb locktime warn threshold 2144 .PP 2145 .RS 4 2146 In a cluster environment using Samba and ctdb it is critical that locks on central ctdb\-hosted databases like locking\&.tdb are not held for long\&. With the current Samba architecture it happens that Samba takes a lock and while holding that lock makes file system calls into the shared cluster file system\&. This option makes Samba warn if it detects that it has held locks for the specified number of milliseconds\&. If this happens, 2147 \fIsmbd\fR 2148 will emit a debug level 0 message into its logs and potentially into syslog\&. The most likely reason for such a log message is that an operation of the cluster file system Samba exports is taking longer than expected\&. The messages are meant as a debugging aid for potential cluster problems\&. 2149 .sp 2150 The default value of 0 disables this logging\&. 2151 .sp 2152 Default: 2153 \fI\fIctdb locktime warn threshold\fR\fR\fI = \fR\fI0\fR\fI \fR 2154 .RE 2155 2122 2156 ctdb timeout (G) 2123 2157 .\" ctdb timeout … … 2545 2579 \fIshareName\fR 2546 2580 \- the name of the existing service\&. 2581 .RE 2547 2582 .sp 2548 2583 .RE … … 3011 3046 .PP 3012 3047 .RS 4 3013 This parameter controls whether or not smbd will honor privileges assigned to specific SIDs via either3048 This deprecated parameter controls whether or not smbd will honor privileges assigned to specific SIDs via either 3014 3049 net rpc rights 3015 3050 or one of the Windows user and group manager tools\&. This parameter is enabled by default\&. It can be disabled to prevent members of the Domain Admins group from being able to assign privileges to users or groups which can then result in certain smbd operations running as root that would normally run under the context of the connected user\&. … … 3415 3450 .\} 3416 3451 uid of user or gid of group 3452 .RE 3417 3453 .sp 3418 3454 .RE … … 3461 3497 .\} 3462 3498 4 \- group default quotas (gid = \-1) 3499 .RE 3463 3500 .sp 3464 3501 .RE … … 3551 3588 .\} 3552 3589 Arg 8(optional) \- the number of bytes in a block(default is 1024) 3590 .RE 3553 3591 .sp 3554 3592 .RE … … 3614 3652 \m[blue]\fBguest account\fR\m[]\&. 3615 3653 .sp 3616 This param ater nullifies the benifits of setting3654 This parameter nullifies the benefits of setting 3617 3655 \m[blue]\fBrestrict anonymous = 2\fR\m[] 3618 3656 .sp … … 3908 3946 .RE 3909 3947 3910 idmap alloc backend (G)3911 .\" idmap alloc backend3912 .PP3913 .RS 43914 The idmap alloc backend provides a plugin interface for Winbind to use when allocating Unix uids/gids for Windows SIDs\&. This option refers to the name of the idmap module which will provide the id allocation functionality\&. Please refer to the man page for each idmap plugin to determine whether or not the module implements the allocation feature\&. The most common plugins are the tdb (\fBidmap_tdb\fR(8)) and ldap (\fBidmap_ldap\fR(8)) libraries\&.3915 .sp3916 This parameter defaults to the value3917 \m[blue]\fBidmap backend\fR\m[]3918 was set to, so by default winbind will allocate Unix IDs from the default backend\&. You will only need to set this parameter explicitly if you have an external source for Unix IDs, like a central database service somewhere in your company\&.3919 .sp3920 Also refer to the3921 \m[blue]\fBidmap alloc config\fR\m[]3922 option\&.3923 .sp3924 \fINo default\fR3925 .sp3926 Example:3927 \fI\fIidmap alloc backend\fR\fR\fI = \fR\fItdb\fR\fI \fR3928 .RE3929 3930 idmap alloc config (G)3931 .\" idmap alloc config3932 .PP3933 .RS 43934 The idmap alloc config prefix provides a means of managing settings for the backend defined by the3935 \m[blue]\fBidmap alloc backend\fR\m[]3936 parameter\&. Refer to the man page for each idmap plugin regarding specific configuration details\&.3937 .sp3938 \fINo default\fR3939 .RE3940 3941 3948 idmap backend (G) 3942 3949 .\" idmap backend … … 3945 3952 The idmap backend provides a plugin interface for Winbind to use varying backends to store SID/uid/gid mapping tables\&. 3946 3953 .sp 3947 This option specifies the default backend that is used when no special configuration set by 3948 \m[blue]\fBidmap config\fR\m[] 3949 matches the specific request\&. 3950 .sp 3951 This default backend also specifies the place where winbind\-generated idmap entries will be stored\&. So it is highly recommended that you specify a writable backend like 3952 \fBidmap_tdb\fR(8) 3953 or 3954 \fBidmap_ldap\fR(8) 3955 as the idmap backend\&. The 3956 \fBidmap_rid\fR(8) 3957 and 3958 \fBidmap_ad\fR(8) 3959 backends are not writable and thus will generate unexpected results if set as idmap backend\&. 3960 .sp 3961 To use the rid and ad backends, please specify them via the 3962 \m[blue]\fBidmap config\fR\m[] 3963 parameter, possibly also for the domain your machine is member of, specified by 3964 \m[blue]\fBworkgroup\fR\m[]\&. 3965 .sp 3966 Examples of SID/uid/gid backends include tdb (\fBidmap_tdb\fR(8)), ldap (\fBidmap_ldap\fR(8)), rid (\fBidmap_rid\fR(8)), and ad (\fBidmap_ad\fR(8))\&. 3954 This option specifies the default backend that is used when no special configuration set, but it is now deprecated in favour of the new spelling 3955 \m[blue]\fBidmap config * : backend\fR\m[]\&. 3967 3956 .sp 3968 3957 Default: … … 3984 3973 .PP 3985 3974 .RS 4 3986 The idmap config prefix provides a means of managing each trusted domain separately\&. The idmap config prefix should be followed by the name of the domain, a colon, and a setting specific to the chosen backend\&. There are three options available for all domains: 3975 ID mapping in Samba is the mapping between Windows SIDs and Unix user and group IDs\&. This is performed by Winbindd with a configurable plugin interface\&. Samba\'s ID mapping is configured by options starting with the 3976 \m[blue]\fBidmap config\fR\m[] 3977 prefix\&. An idmap option consists of the 3978 \m[blue]\fBidmap config\fR\m[] 3979 prefix, followed by a domain name or the asterisk character (*), a colon, and the name of an idmap setting for the chosen domain\&. 3980 .sp 3981 The idmap configuration is hence divided into groups, one group for each domain to be configured, and one group with the the asterisk instead of a proper domain name, which speifies the default configuration that is used to catch all domains that do not have an explicit idmap configuration of their own\&. 3982 .sp 3983 There are three general options available: 3987 3984 .PP 3988 3985 backend = backend_name 3989 3986 .RS 4 3990 Specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\&. 3987 This specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\&. The standard backends are tdb (\fBidmap_tdb\fR(8)), tdb2 (\fBidmap_tdb2\fR(8)), ldap (\fBidmap_ldap\fR(8)), , rid (\fBidmap_rid\fR(8)), , hash (\fBidmap_hash\fR(8)), , autorid (\fBidmap_autorid\fR(8)), , ad (\fBidmap_ad\fR(8)), , adex (\fBidmap_adex\fR(8)), , and nss\&. (\fBidmap_nss\fR(8)), The corresponding manual pages contain the details, but here is a summary\&. 3988 .sp 3989 The first three of these create mappings of their own using internal unixid counters and store the mappings in a database\&. These are suitable for use in the default idmap configuration\&. The rid and hash backends use a pure algorithmic calculation to determine the unixid for a SID\&. The autorid module is a mixture of the tdb and rid backend\&. It creates ranges for each domain encountered and then uses the rid algorithm for each of these automatically configured domains individually\&. The ad and adex backends both use unix IDs stored in Active Directory via the standard schema extensions\&. The nss backend reverses the standard winbindd setup and gets the unixids via names from nsswitch which can be useful in an ldap setup\&. 3991 3990 .RE 3992 3991 .PP 3993 3992 range = low \- high 3994 3993 .RS 4 3995 Defines the available matching uid and gid range for which the backend is authoritative\&. Note that the range commonly matches the allocation range due to the fact that the same backend will store and retrieve SID/uid/gid mapping entries\&. 3996 .sp 3997 winbind uses this parameter to find the backend that is authoritative for a unix ID to SID mapping, so it must be set for each individually configured domain, and it must be disjoint from the ranges set via 3998 \m[blue]\fBidmap uid\fR\m[] 3999 and 4000 \m[blue]\fBidmap gid\fR\m[]\&. 3994 Defines the available matching uid and gid range for which the backend is authoritative\&. For allocating backends, this also defines the start and the end of the range for allocating new unid IDs\&. 3995 .sp 3996 winbind uses this parameter to find the backend that is authoritative for a unix ID to SID mapping, so it must be set for each individually configured domain and for the default configuration\&. The configured ranges must be mutually disjoint\&. 3997 .RE 3998 .PP 3999 read only = yes|no 4000 .RS 4 4001 This option can be used to turn the writing backends tdb, tdb2, and ldap into read only mode\&. This can be useful e\&.g\&. in cases where a pre\-filled database exists that should not be extended automatically\&. 4001 4002 .RE 4002 4003 .sp 4003 4004 The following example illustrates how to configure the 4004 4005 \fBidmap_ad\fR(8) 4005 for the CORP domain and the4006 backend for the CORP domain and the 4006 4007 \fBidmap_tdb\fR(8) 4007 4008 backend for all other domains\&. This configuration assumes that the admin of CORP assigns unix ids below 1000000 via the SFU extensions, and winbind is supposed to use the next million entries for its own mappings from trusted domains and for local groups for example\&. … … 4011 4012 .\} 4012 4013 .nf 4013 idmap backend = tdb 4014 idmap uid = 1000000\-1999999 4015 idmap gid = 1000000\-1999999 4014 idmap config * : backend = tdb 4015 idmap config * : range = 1000000\-1999999 4016 4016 4017 4017 idmap config CORP : backend = ad … … 4038 4038 .PP 4039 4039 .RS 4 4040 The idmap gid parameter specifies the range of group ids that are allocated for the purpose of mapping UNX groups to NT group SIDs\&. This range of group ids should have no existing local or NIS groups within it as strange conflicts can occur otherwise\&.4041 .sp 4042 See also the 4043 \m[blue]\fBidmap backend\fR\m[], and 4040 The idmap gid parameter specifies the range of group ids for the default idmap configuration\&. It is now deprecated in favour of 4041 \m[blue]\fBidmap config * : range\fR\m[]\&. 4042 .sp 4043 See the 4044 4044 \m[blue]\fBidmap config\fR\m[] 4045 option s\&.4045 option\&. 4046 4046 .sp 4047 4047 Default: … … 4074 4074 .PP 4075 4075 .RS 4 4076 The idmap uid parameter specifies the range of user ids that are allocated for use in mapping UNIX users to NT user SIDs\&. This range of ids should have no existing local or NIS users within it as strange conflicts can occur otherwise\&. 4077 .sp 4078 See also the 4079 \m[blue]\fBidmap backend\fR\m[] 4080 and 4076 The idmap uid parameter specifies the range of user ids for the default idmap configuration\&. It is now deprecated in favour of 4077 \m[blue]\fBidmap config * : range\fR\m[]\&. 4078 .sp 4079 See the 4081 4080 \m[blue]\fBidmap config\fR\m[] 4082 option s\&.4081 option\&. 4083 4082 .sp 4084 4083 Default: … … 4247 4246 .\} 4248 4247 a broadcast/mask pair\&. 4248 .RE 4249 4249 .sp 4250 4250 .RE … … 4377 4377 .\} 4378 4378 secrets and keytab \- use the secrets\&.tdb first, then the system keytab 4379 .RE 4379 4380 .sp 4380 4381 .RE … … 4694 4695 \fIOnly\fR 4695 4696 = Only update the LDAP password and let the LDAP server do the rest\&. 4697 .RE 4696 4698 .sp 4697 4699 .RE … … 4890 4892 \fIstart tls\fR 4891 4893 = Use the LDAPv3 StartTLS extended operation (RFC2830) for communicating with the directory server\&. 4894 .RE 4892 4895 .sp 4893 4896 .RE … … 5392 5395 .\} 5393 5396 \fIregistry\fR 5397 .RE 5394 5398 .sp 5395 5399 .RE … … 5572 5576 .RE 5573 5577 5578 log writeable files on exit (G) 5579 .\" log writeable files on exit 5580 .PP 5581 .RS 4 5582 When the network connection between a CIFS client and Samba dies, Samba has no option but to simply shut down the server side of the network connection\&. If this happens, there is a risk of data corruption because the Windows client did not complete all write operations that the Windows application requested\&. Setting this option to "yes" makes smbd log with a level 0 message a list of all files that have been opened for writing when the network connection died\&. Those are the files that are potentially corrupted\&. It is meant as an aid for the administrator to give him a list of files to do consistency checks on\&. 5583 .sp 5584 Default: 5585 \fI\fIlog writeable files on exit\fR\fR\fI = \fR\fIno\fR\fI \fR 5586 .RE 5587 5574 5588 lppause command (S) 5575 5589 .\" lppause command … … 5872 5886 .\} 5873 5887 Files whose UNIX name begins with a dot will be presented as DOS hidden files\&. The mangled name will be created as for other filenames, but with the leading dot removed and "___" as its extension regardless of actual original extension (that\'s three underscores)\&. 5888 .RE 5874 5889 .sp 5875 5890 .RE … … 6032 6047 \m[blue]\fBstore dos attributes\fR\m[] 6033 6048 method\&. This may be useful for exporting mounted CDs\&. 6049 .RE 6034 6050 .sp 6035 6051 .RE … … 6126 6142 \fBBad Uid\fR 6127 6143 \- Is only applicable when Samba is configured in some type of domain mode security (security = {domain|ads}) and means that user logins which are successfully authenticated but which have no valid Unix user account (and smbd is unable to create one) should be mapped to the defined guest account\&. This was the default behavior of Samba 2\&.x releases\&. Note that if a member server is running winbindd, this option should never be required because the nss_winbind library will export the Windows domain users and groups to the underlying OS via the Name Service Switch interface\&. 6144 .RE 6128 6145 .sp 6129 6146 .RE … … 6342 6359 .\} 6343 6360 \fBSMB2\fR: Re\-implementation of the SMB protocol\&. Used by Windows Vista and newer\&. The Samba implementation of SMB2 is currently marked experimental! 6361 .RE 6344 6362 .sp 6345 6363 .RE … … 6504 6522 \fI%f\fR 6505 6523 = who the message is from\&. 6524 .RE 6506 6525 .sp 6507 6526 .RE … … 6636 6655 .RE 6637 6656 6657 multicast dns register (G) 6658 .\" multicast dns register 6659 .PP 6660 .RS 4 6661 If compiled with proper support for it, Samba will announce itself with multicast DNS services like for example provided by the Avahi daemon\&. 6662 .sp 6663 This parameter allows disabling Samba to register itself\&. 6664 .sp 6665 Default: 6666 \fI\fImulticast dns register\fR\fR\fI = \fR\fIyes\fR\fI \fR 6667 .RE 6668 6638 6669 name cache timeout (G) 6639 6670 .\" name cache timeout … … 6712 6743 \m[blue]\fBinterfaces\fR\m[] 6713 6744 parameter\&. This is the least reliable of the name resolution methods as it depends on the target host being on a locally connected subnet\&. 6745 .RE 6714 6746 .sp 6715 6747 .RE … … 6728 6760 Example: 6729 6761 \fI\fIname resolve order\fR\fR\fI = \fR\fIlmhosts bcast host\fR\fI \fR 6762 .RE 6763 6764 ncalrpc dir (G) 6765 .\" ncalrpc dir 6766 .PP 6767 .RS 4 6768 This directory will hold a series of named pipes to allow RPC over inter\-process communication\&. 6769 .sp 6770 \&. 6771 This will allow Samba and other unix processes to interact over DCE/RPC without using TCP/IP\&. Additionally a sub\-directory \'np\' has restricted permissions, and allows a trusted communication channel between Samba processes 6772 .sp 6773 Default: 6774 \fI\fIncalrpc dir\fR\fR\fI = \fR\fI${prefix}/var/ncalrpc\fR\fI \fR 6775 .sp 6776 Example: 6777 \fI\fIncalrpc dir\fR\fR\fI = \fR\fI/var/run/samba/ncalrpc\fR\fI \fR 6730 6778 .RE 6731 6779 … … 7116 7164 .sp 7117 7165 Multiple servers may also be specified in double\-quotes\&. Whether multiple servers are supported or not and the exact syntax depends on the LDAP library you use\&. 7166 .RE 7118 7167 .sp 7119 7168 .RE … … 7279 7328 Some client/server combinations have difficulty with mixed\-case passwords\&. One offending client is Windows for Workgroups, which for some reason forces passwords to upper case when using the LANMAN1 protocol, but leaves them alone when using COREPLUS! Another problem child is the Windows 95/98 family of operating systems\&. These clients upper case clear text passwords even when NT LM 0\&.12 selected by the protocol negotiation request/response\&. 7280 7329 .sp 7281 This parameter defines the maximum number of characters that may be upper case in passwords\&.7330 This deprecated parameter defines the maximum number of characters that may be upper case in passwords\&. 7282 7331 .sp 7283 7332 For example, say the password given was "FRED"\&. If … … 7316 7365 security = [ads|domain|server] 7317 7366 it is possible to get Samba to do all its username/password validation using a specific remote server\&. 7318 .sp7319 This option sets the name or IP address of the password server to use\&. New syntax has been added to support defining the port to use when connecting to the server the case of an ADS realm\&. To define a port other than the default LDAP port of 389, add the port number using a colon after the name or IP address (e\&.g\&. 192\&.168\&.1\&.100:389)\&. If you do not specify a port, Samba will use the standard LDAP port of tcp/389\&. Note that port numbers have no effect on password servers for Windows NT 4\&.0 domains or netbios connections\&.7320 .sp7321 If parameter is a name, it is looked up using the parameter7322 \m[blue]\fBname resolve order\fR\m[]7323 and so may resolved by any method and order described in that parameter\&.7324 .sp7325 The password server must be a machine capable of using the "LM1\&.2X002" or the "NT LM 0\&.12" protocol, and it must be in user level security mode\&.7326 .if n \{\7327 .sp7328 .\}7329 .RS 47330 .it 1 an-trap7331 .nr an-no-space-flag 17332 .nr an-break-flag 17333 .br7334 .ps +17335 \fBNote\fR7336 .ps -17337 .br7338 Using a password server means your UNIX box (running Samba) is only as secure as your password server\&.7339 \fIDO NOT CHOOSE A PASSWORD SERVER THAT YOU DON\'T COMPLETELY TRUST\fR\&.7340 .sp .5v7341 .RE7342 Never point a Samba server at itself for password serving\&. This will cause a loop and could lock up your Samba server!7343 .sp7344 The name of the password server takes the standard substitutions, but probably the only useful one is7345 \fI%m \fR, which means the Samba server will use the incoming client as the password server\&. If you use this then you better trust your clients, and you had better restrict them with hosts allow!7346 7367 .sp 7347 7368 If the … … 7350 7371 \fBdomain\fR 7351 7372 or 7352 \fBads\fR, then the list of machines in this option must be a list of Primary or Backup Domain controllers for the Domain or the character \'*\', as the Samba server is effectively in that domain, and will use cryptographically authenticated RPC calls to authenticate the user logging on\&. The advantage of using 7353 security = domain 7354 is that if you list several hosts in the 7373 \fBads\fR, then this option 7374 \fIshould not\fR 7375 be used, as the default \'*\' indicates to Samba to determine the best DC to contact dynamically, just as all other hosts in an AD domain do\&. This allows the domain to be maintained without modification to the smb\&.conf file\&. The cryptograpic protection on the authenticated RPC calls used to verify passwords ensures that this default is safe\&. 7376 .sp 7377 \fIIt is strongly recommended that you use the default of \'*\'\fR, however if in your particular environment you have reason to specify a particular DC list, then the list of machines in this option must be a list of names or IP addresses of Domain controllers for the Domain\&. If you use the default of \'*\', or list several hosts in the 7355 7378 \fIpassword server\fR 7356 7379 option then … … 7358 7381 will try each in turn till it finds one that responds\&. This is useful in case your primary server goes down\&. 7359 7382 .sp 7360 If the7361 \fIpassword server\fR7362 option is set to the character \'*\', then Samba will attempt to auto\-locate the Primary or Backup Domain controllers to authenticate against by doing a query for the name7363 \fBWORKGROUP<1C>\fR7364 and then contacting each server returned in the list of IP addresses from the name resolution source\&.7365 .sp7366 7383 If the list of servers contains both names/IP\'s and the \'*\' character, the list is treated as a list of preferred domain controllers, but an auto lookup of all remaining DC\'s will be added to the list as well\&. Samba will not attempt to optimize this list by locating the closest DC\&. 7384 .sp 7385 If parameter is a name, it is looked up using the parameter 7386 \m[blue]\fBname resolve order\fR\m[] 7387 and so may resolved by any method and order described in that parameter\&. 7367 7388 .sp 7368 7389 If the 7369 7390 \fIsecurity\fR 7370 7391 parameter is set to 7371 \fBserver\fR, then there are different restrictions that 7372 security = domain 7373 doesn\'t suffer from: 7392 \fBserver\fR, these additional restrictions apply: 7374 7393 .sp 7375 7394 .RS 4 … … 7399 7418 .IP \(bu 2.3 7400 7419 .\} 7401 If you are using a Windows NT server as your password server then you will have to ensure that your users are able to login from the Samba server, as when in7420 You will have to ensure that your users are able to login from the Samba server, as when in 7402 7421 security = server 7403 mode the network logon will appear to come from there rather than from the users workstation\&. 7422 mode the network logon will appear to come from the Samba server rather than from the users workstation\&. 7423 .RE 7424 .sp 7425 .RS 4 7426 .ie n \{\ 7427 \h'-04'\(bu\h'+03'\c 7428 .\} 7429 .el \{\ 7430 .sp -1 7431 .IP \(bu 2.3 7432 .\} 7433 The client must not select NTLMv2 authentication\&. 7434 .RE 7435 .sp 7436 .RS 4 7437 .ie n \{\ 7438 \h'-04'\(bu\h'+03'\c 7439 .\} 7440 .el \{\ 7441 .sp -1 7442 .IP \(bu 2.3 7443 .\} 7444 The password server must be a machine capable of using the "LM1\&.2X002" or the "NT LM 0\&.12" protocol, and it must be in user level security mode\&. 7445 .RE 7446 .sp 7447 .RS 4 7448 .ie n \{\ 7449 \h'-04'\(bu\h'+03'\c 7450 .\} 7451 .el \{\ 7452 .sp -1 7453 .IP \(bu 2.3 7454 .\} 7455 Using a password server means your UNIX box (running Samba) is only as secure as (a host masqurading as) your password server\&. 7456 \fIDO NOT CHOOSE A PASSWORD SERVER THAT YOU DON\'T COMPLETELY TRUST\fR\&. 7457 .RE 7458 .sp 7459 .RS 4 7460 .ie n \{\ 7461 \h'-04'\(bu\h'+03'\c 7462 .\} 7463 .el \{\ 7464 .sp -1 7465 .IP \(bu 2.3 7466 .\} 7467 Never point a Samba server at itself for password serving\&. This will cause a loop and could lock up your Samba server! 7468 .RE 7469 .sp 7470 .RS 4 7471 .ie n \{\ 7472 \h'-04'\(bu\h'+03'\c 7473 .\} 7474 .el \{\ 7475 .sp -1 7476 .IP \(bu 2.3 7477 .\} 7478 The name of the password server takes the standard substitutions, but probably the only useful one is 7479 \fI%m \fR, which means the Samba server will use the incoming client as the password server\&. If you use this then you better trust your clients, and you had better restrict them with hosts allow! 7480 .RE 7404 7481 .sp 7405 7482 .RE … … 7475 7552 The 7476 7553 \fBsmbd\fR(8) 7477 daemon maintains an database of file locks obtained by SMB clients\&. The default behavior is to map this internal database to POSIX locks\&. This means that file locks obtained by SMB clients are consistent with those seen by POSIX compliant applications accessing the files via a non\-SMB method (e\&.g\&. NFS or local file access)\&. You should never need to disable this parameter\&.7554 daemon maintains an database of file locks obtained by SMB clients\&. The default behavior is to map this internal database to POSIX locks\&. This means that file locks obtained by SMB clients are consistent with those seen by POSIX compliant applications accessing the files via a non\-SMB method (e\&.g\&. NFS or local file access)\&. It is very unlikely that you need to set this parameter to "no", unless you are sharing from an NFS mount, which is not a good idea in the first place\&. 7478 7555 .sp 7479 7556 Default: … … 7653 7730 .PP 7654 7731 .RS 4 7655 This option specifies the number of seconds before the printing subsystem is again asked for the known printers\&. If the value is greater than 60 the initial waiting time is set to 60 seconds to allow an earlier first rescan of the printing subsystem\&.7732 This option specifies the number of seconds before the printing subsystem is again asked for the known printers\&. 7656 7733 .sp 7657 7734 Setting this parameter to 0 disables any rescanning for new or removed printers after the initial startup\&. … … 7917 7994 .RE 7918 7995 7996 print notify backchannel (S) 7997 .\" print notify backchannel 7998 .PP 7999 .RS 4 8000 Windows print clients can update print queue status by expecting the server to open a backchannel SMB connection to them\&. Due to client firewall settings this can cause considerable timeouts and will often fail, as there is no guarantee the client is even running an SMB server\&. By setting this parameter to 8001 \fBno\fR 8002 the Samba print server will not try to connect back to clients and treat corresponding requests as if the connection back to the client failed\&. The default setting of 8003 \fByes\fR 8004 causes smbd to attempt this connection\&. 8005 .sp 8006 Default: 8007 \fI\fIprint notify backchannel\fR\fR\fI = \fR\fIyes\fR\fI \fR 8008 .RE 8009 7919 8010 private dir (G) 7920 8011 .\" private dir … … 8316 8407 .RE 8317 8408 8409 rpc_server (G) 8410 .\" rpc_server 8411 .PP 8412 .RS 4 8413 Defines what kind of rpc server to use for a named pipe\&. The rpc_server prefix must be followed by the pipe name, and a value\&. 8414 .sp 8415 Three possible values are currently supported: 8416 embedded 8417 daemon 8418 external 8419 .sp 8420 The classic method is to run every pipe as an internal function 8421 \fIembedded\fR 8422 in smbd\&. 8423 .sp 8424 An alternative method is to fork a 8425 \fIdaemon\fR 8426 early on at smbd startup time\&. This is supported only for selected pipes\&. 8427 .sp 8428 Choosing the 8429 \fIexternal\fR 8430 option allows to run a completely independent (3rd party) server capable of interfacing with samba via the MS\-RPC interface over named pipes\&. 8431 .sp 8432 Currently only the spoolss pipe can be configured in 8433 \fIdaemon\fR 8434 mode like this: 8435 .sp 8436 .if n \{\ 8437 .RS 4 8438 .\} 8439 .nf 8440 rpc_server:spoolss = daemon 8441 8442 .fi 8443 .if n \{\ 8444 .RE 8445 .\} 8446 .sp 8447 Default: 8448 \fI\fIrpc_server\fR\fR\fI = \fR\fInone\fR\fI \fR 8449 .RE 8450 8318 8451 security mask (S) 8319 8452 .\" security mask … … 8356 8489 .sp 8357 8490 The alternatives are 8358 security = share, 8359 security = server 8491 security = ads 8360 8492 or 8361 security = domain\&. 8493 security = domain, which support joining Samba to a Windows domain, along with 8494 security = share 8495 and 8496 security = server, both of which are deprecated\&. 8362 8497 .sp 8363 8498 In versions of Samba prior to 2\&.0\&.0, the default was … … 8365 8500 mainly because that was the only option at one stage\&. 8366 8501 .sp 8367 There is a bug in WfWg that has relevance to this setting\&. When in user or server level security a WfWg client will totally ignore the username and password you type in the "connect drive" dialog box\&. This makes it very difficult (if not impossible) to connect to a Samba service as anyone except the user that you are logged into WfWg as\&. 8368 .sp 8369 If your PCs use usernames that are the same as their usernames on the UNIX machine then you will want to use 8370 security = user\&. If you mostly use usernames that don\'t exist on the UNIX box then use 8371 security = share\&. 8372 .sp 8373 You should also use 8374 security = share 8375 if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&. It is more difficult to setup guest shares with 8376 security = user, see the 8502 You should use 8503 security = user 8504 and 8377 8505 \m[blue]\fBmap to guest\fR\m[] 8378 parameter for details\&.8506 if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&. 8379 8507 .sp 8380 8508 It is possible to use … … 8387 8515 The different settings will now be explained\&. 8388 8516 .sp 8389 \fISECURITY = SHARE\fR8390 .sp8391 When clients connect to a share level security server, they need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a8392 security = share8393 server)\&. Instead, the clients send authentication information (passwords) on a per\-share basis, at the time they attempt to connect to that share\&.8394 .sp8395 Note that8396 smbd8397 \fIALWAYS\fR8398 uses a valid UNIX user to act on behalf of the client, even in8399 security = share8400 level security\&.8401 .sp8402 As clients are not required to send a username to the server in share level security,8403 smbd8404 uses several techniques to determine the correct UNIX user to use on behalf of the client\&.8405 .sp8406 A list of possible UNIX usernames to match with the given client password is constructed using the following methods :8407 .sp8408 .RS 48409 .ie n \{\8410 \h'-04'\(bu\h'+03'\c8411 .\}8412 .el \{\8413 .sp -18414 .IP \(bu 2.38415 .\}8416 If the8417 \m[blue]\fBguest only\fR\m[]8418 parameter is set, then all the other stages are missed and only the8419 \m[blue]\fBguest account\fR\m[]8420 username is checked\&.8421 .RE8422 .sp8423 .RS 48424 .ie n \{\8425 \h'-04'\(bu\h'+03'\c8426 .\}8427 .el \{\8428 .sp -18429 .IP \(bu 2.38430 .\}8431 Is a username is sent with the share connection request, then this username (after mapping \- see8432 \m[blue]\fBusername map\fR\m[]), is added as a potential username\&.8433 .RE8434 .sp8435 .RS 48436 .ie n \{\8437 \h'-04'\(bu\h'+03'\c8438 .\}8439 .el \{\8440 .sp -18441 .IP \(bu 2.38442 .\}8443 If the client did a previous8444 \fIlogon \fR8445 request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username\&.8446 .RE8447 .sp8448 .RS 48449 .ie n \{\8450 \h'-04'\(bu\h'+03'\c8451 .\}8452 .el \{\8453 .sp -18454 .IP \(bu 2.38455 .\}8456 The name of the service the client requested is added as a potential username\&.8457 .RE8458 .sp8459 .RS 48460 .ie n \{\8461 \h'-04'\(bu\h'+03'\c8462 .\}8463 .el \{\8464 .sp -18465 .IP \(bu 2.38466 .\}8467 The NetBIOS name of the client is added to the list as a potential username\&.8468 .RE8469 .sp8470 .RS 48471 .ie n \{\8472 \h'-04'\(bu\h'+03'\c8473 .\}8474 .el \{\8475 .sp -18476 .IP \(bu 2.38477 .\}8478 Any users on the8479 \m[blue]\fBuser\fR\m[]8480 list are added as potential usernames\&.8481 .sp8482 .RE8483 If the8484 \fIguest only\fR8485 parameter is not set, then this list is then tried with the supplied password\&. The first user for whom the password matches will be used as the UNIX user\&.8486 .sp8487 If the8488 \fIguest only\fR8489 parameter is set, or no username can be determined then if the share is marked as available to the8490 \fIguest account\fR, then this guest user will be used, otherwise access is denied\&.8491 .sp8492 Note that it can be8493 \fIvery\fR8494 confusing in share\-level security as to which UNIX username will eventually be used in granting access\&.8495 .sp8496 See also the section8497 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.8498 .sp8499 8517 \fISECURITY = USER\fR 8500 8518 .sp 8501 This is the default security setting in Samba 3\&.0\&. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the8519 This is the default security setting in Samba\&. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the 8502 8520 \m[blue]\fBusername map\fR\m[] 8503 8521 parameter)\&. Encrypted passwords (see the … … 8555 8573 parameter\&. 8556 8574 .sp 8557 \fISECURITY = SERVER\fR 8558 .sp 8559 In this mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box\&. If this fails it will revert to 8560 security = user\&. It expects the 8561 \m[blue]\fBencrypted passwords\fR\m[] 8562 parameter to be set to 8563 \fByes\fR, unless the remote server does not support them\&. However note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid 8564 smbpasswd 8565 file to check users against\&. See the chapter about the User Database in the Samba HOWTO Collection for details on how to set this up\&. 8575 \fISECURITY = SHARE\fR 8566 8576 .if n \{\ 8567 8577 .sp … … 8576 8586 .ps -1 8577 8587 .br 8578 This mode of operation has significant pitfalls since it is more vulnerable to man\-in\-the\-middle attacks and server impersonation\&. In particular, this mode of operation can cause significant resource consuption on the PDC, as it must maintain an active connection for the duration of the user\'s session\&. Furthermore, if this connection is lost, there is no way to reestablish it, and futher authentications to the Samba server may fail (from a single client, till it disconnects)\&. 8588 This option is deprecated as it is incompatible with SMB2 8589 .sp .5v 8590 .RE 8591 When clients connect to a share level security server, they need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a 8592 security = share 8593 server)\&. Instead, the clients send authentication information (passwords) on a per\-share basis, at the time they attempt to connect to that share\&. 8594 .sp 8595 Note that 8596 smbd 8597 \fIALWAYS\fR 8598 uses a valid UNIX user to act on behalf of the client, even in 8599 security = share 8600 level security\&. 8601 .sp 8602 As clients are not required to send a username to the server in share level security, 8603 smbd 8604 uses several techniques to determine the correct UNIX user to use on behalf of the client\&. 8605 .sp 8606 A list of possible UNIX usernames to match with the given client password is constructed using the following methods : 8607 .sp 8608 .RS 4 8609 .ie n \{\ 8610 \h'-04'\(bu\h'+03'\c 8611 .\} 8612 .el \{\ 8613 .sp -1 8614 .IP \(bu 2.3 8615 .\} 8616 If the 8617 \m[blue]\fBguest only\fR\m[] 8618 parameter is set, then all the other stages are missed and only the 8619 \m[blue]\fBguest account\fR\m[] 8620 username is checked\&. 8621 .RE 8622 .sp 8623 .RS 4 8624 .ie n \{\ 8625 \h'-04'\(bu\h'+03'\c 8626 .\} 8627 .el \{\ 8628 .sp -1 8629 .IP \(bu 2.3 8630 .\} 8631 Is a username is sent with the share connection request, then this username (after mapping \- see 8632 \m[blue]\fBusername map\fR\m[]), is added as a potential username\&. 8633 .RE 8634 .sp 8635 .RS 4 8636 .ie n \{\ 8637 \h'-04'\(bu\h'+03'\c 8638 .\} 8639 .el \{\ 8640 .sp -1 8641 .IP \(bu 2.3 8642 .\} 8643 If the client did a previous 8644 \fIlogon \fR 8645 request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username\&. 8646 .RE 8647 .sp 8648 .RS 4 8649 .ie n \{\ 8650 \h'-04'\(bu\h'+03'\c 8651 .\} 8652 .el \{\ 8653 .sp -1 8654 .IP \(bu 2.3 8655 .\} 8656 The name of the service the client requested is added as a potential username\&. 8657 .RE 8658 .sp 8659 .RS 4 8660 .ie n \{\ 8661 \h'-04'\(bu\h'+03'\c 8662 .\} 8663 .el \{\ 8664 .sp -1 8665 .IP \(bu 2.3 8666 .\} 8667 The NetBIOS name of the client is added to the list as a potential username\&. 8668 .RE 8669 .sp 8670 .RS 4 8671 .ie n \{\ 8672 \h'-04'\(bu\h'+03'\c 8673 .\} 8674 .el \{\ 8675 .sp -1 8676 .IP \(bu 2.3 8677 .\} 8678 Any users on the 8679 \m[blue]\fBuser\fR\m[] 8680 list are added as potential usernames\&. 8681 .RE 8682 .sp 8683 .RE 8684 If the 8685 \fIguest only\fR 8686 parameter is not set, then this list is then tried with the supplied password\&. The first user for whom the password matches will be used as the UNIX user\&. 8687 .sp 8688 If the 8689 \fIguest only\fR 8690 parameter is set, or no username can be determined then if the share is marked as available to the 8691 \fIguest account\fR, then this guest user will be used, otherwise access is denied\&. 8692 .sp 8693 Note that it can be 8694 \fIvery\fR 8695 confusing in share\-level security as to which UNIX username will eventually be used in granting access\&. 8696 .sp 8697 See also the section 8698 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&. 8699 .sp 8700 \fISECURITY = SERVER\fR 8701 .sp 8702 In this depicted mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box\&. If this fails it will revert to 8703 security = user\&. It expects the 8704 \m[blue]\fBencrypted passwords\fR\m[] 8705 parameter to be set to 8706 \fByes\fR, unless the remote server does not support them\&. However note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid 8707 smbpasswd 8708 file to check users against\&. See the chapter about the User Database in the Samba HOWTO Collection for details on how to set this up\&. 8709 .if n \{\ 8710 .sp 8711 .\} 8712 .RS 4 8713 .it 1 an-trap 8714 .nr an-no-space-flag 1 8715 .nr an-break-flag 1 8716 .br 8717 .ps +1 8718 \fBNote\fR 8719 .ps -1 8720 .br 8721 This mode of operation has significant pitfalls since it is more vulnerable to man\-in\-the\-middle attacks and server impersonation\&. In particular, this mode of operation can cause significant resource consumption on the PDC, as it must maintain an active connection for the duration of the user\'s session\&. Furthermore, if this connection is lost, there is no way to reestablish it, and further authentications to the Samba server may fail (from a single client, till it disconnects)\&. 8722 .sp .5v 8723 .RE 8724 .if n \{\ 8725 .sp 8726 .\} 8727 .RS 4 8728 .it 1 an-trap 8729 .nr an-no-space-flag 1 8730 .nr an-break-flag 1 8731 .br 8732 .ps +1 8733 \fBNote\fR 8734 .ps -1 8735 .br 8736 If the client selects NTLMv2 authentication, then this mode of operation 8737 \fIwill fail\fR 8579 8738 .sp .5v 8580 8739 .RE … … 8597 8756 .sp .5v 8598 8757 .RE 8758 .if n \{\ 8759 .sp 8760 .\} 8761 .RS 4 8762 .it 1 an-trap 8763 .nr an-no-space-flag 1 8764 .nr an-break-flag 1 8765 .br 8766 .ps +1 8767 \fBNote\fR 8768 .ps -1 8769 .br 8770 This option is deprecated, and may be removed in future 8771 .sp .5v 8772 .RE 8599 8773 \fINote\fR 8600 8774 that the name of the resource being requested is … … 8629 8803 .RE 8630 8804 8805 send spnego principal (G) 8806 .\" send spnego principal 8807 .PP 8808 .RS 4 8809 This parameter determines whether or not 8810 \fBsmbd\fR(8) 8811 will send the server\-supplied principal sometimes given in the SPNEGO exchange\&. 8812 .sp 8813 If enabled, Samba can attempt to help clients to use Kerberos to contact it, even when known only by IP address or a name not registered with our KDC as a service principal name\&. Kerberos relies on names, so ordinarily cannot function in this situation\&. 8814 .sp 8815 If disabled, Samba will send the string not_defined_in_RFC4178@please_ignore as the \'rfc4178 hint\', following the updated RFC and Windows 2008 behaviour in this area\&. 8816 .sp 8817 Note that Windows XP SP2 and later versions already ignored this value in all circumstances\&. 8818 .sp 8819 Default: 8820 \fI\fIsend spnego principal\fR\fR\fI = \fR\fIno\fR\fI \fR 8821 .RE 8822 8631 8823 server schannel (G) 8632 8824 .\" server schannel … … 8796 8988 .\} 8797 8989 4 \- group default quotas (gid = \-1) 8990 .RE 8798 8991 .sp 8799 8992 .RE … … 8875 9068 .\} 8876 9069 8(optional) \- block size, defaults to 1024 9070 .RE 8877 9071 .sp 8878 9072 .RE … … 9031 9225 will be substituted with the switch 9032 9226 \fI\-f\fR\&. It means force the shutdown even if applications do not respond for NT\&. 9227 .RE 9033 9228 .sp 9034 9229 .RE … … 9059 9254 Example: 9060 9255 \fI\fIshutdown script\fR\fR\fI = \fR\fI/usr/local/samba/sbin/shutdown %m %t %r %f\fR\fI \fR 9256 .RE 9257 9258 smb2 max credits (G) 9259 .\" smb2 max credits 9260 .PP 9261 .RS 4 9262 This option controls the maximum number of outstanding simultaneous SMB2 operations that Samba tells the client it will allow\&. This is similar to the 9263 \m[blue]\fBmax mux\fR\m[] 9264 parameter for SMB1\&. You should never need to set this parameter\&. 9265 .sp 9266 The default is 8192 credits, which is the same as a Windows 2008R2 SMB2 server\&. 9267 .sp 9268 Default: 9269 \fI\fIsmb2 max credits\fR\fR\fI = \fR\fI128\fR\fI \fR 9270 .RE 9271 9272 smb2 max read (G) 9273 .\" smb2 max read 9274 .PP 9275 .RS 4 9276 This option specifies the protocol value that 9277 \fBsmbd\fR(8) 9278 will return to a client, informing the client of the largest size that may be returned by a single SMB2 read call\&. 9279 .sp 9280 The default is 1048576 bytes (1MB), which is the same as a Windows7 SMB2 server\&. 9281 .sp 9282 Default: 9283 \fI\fIsmb2 max read\fR\fR\fI = \fR\fI1048576\fR\fI \fR 9284 .RE 9285 9286 smb2 max trans (G) 9287 .\" smb2 max trans 9288 .PP 9289 .RS 4 9290 This option specifies the protocol value that 9291 \fBsmbd\fR(8) 9292 will return to a client, informing the client of the largest size of buffer that may be used in querying file meta\-data via QUERY_INFO and related SMB2 calls\&. 9293 .sp 9294 The default is 1048576 bytes (1MB), which is the same as a Windows7 SMB2 server\&. 9295 .sp 9296 Default: 9297 \fI\fIsmb2 max trans\fR\fR\fI = \fR\fI1048576\fR\fI \fR 9298 .RE 9299 9300 smb2 max write (G) 9301 .\" smb2 max write 9302 .PP 9303 .RS 4 9304 This option specifies the protocol value that 9305 \fBsmbd\fR(8) 9306 will return to a client, informing the client of the largest size that may be sent to the server by a single SMB2 write call\&. 9307 .sp 9308 The default is 1048576 bytes (1MB), which is the same as a Windows7 SMB2 server\&. 9309 .sp 9310 Default: 9311 \fI\fIsmb2 max write\fR\fR\fI = \fR\fI1048576\fR\fI \fR 9061 9312 .RE 9062 9313 … … 9261 9512 .\} 9262 9513 SO_RCVLOWAT * 9514 .RE 9263 9515 .sp 9264 9516 .RE … … 9346 9598 This is a boolean that controls the handling of disk space allocation in the server\&. When this is set to 9347 9599 \fByes\fR 9348 the server will change from UNIX behaviour of not committing real disk storage blocks when a file is extended to the Windows behaviour of actually forcing the disk system to allocate real storage blocks when a file is created or extended to be a given size\&. In UNIX terminology this means that Samba will stop creating sparse files\&. This can be slow on some systems\&. When you work with large files like >100MB or so you may even run into problems with clients running into timeouts\&. 9600 the server will change from UNIX behaviour of not committing real disk storage blocks when a file is extended to the Windows behaviour of actually forcing the disk system to allocate real storage blocks when a file is created or extended to be a given size\&. In UNIX terminology this means that Samba will stop creating sparse files\&. 9601 .sp 9602 This option is really desgined for file systems that support fast allocation of large numbers of blocks such as extent\-based file systems\&. On file systems that don\'t support extents (most notably ext3) this can make Samba slower\&. When you work with large files over >100MB on file systems without extents you may even run into problems with clients running into timeouts\&. 9349 9603 .sp 9350 9604 When you have an extent based filesystem it\'s likely that we can make use of unwritten extents which allows Samba to allocate even large amounts of space very fast and you will not see any timeout problems caused by strict allocate\&. With strict allocate in use you will also get much better out of quota messages in case you use quotas\&. Another advantage of activating this setting is that it will help to reduce file fragmentation\&. … … 9491 9745 .PP 9492 9746 .RS 4 9493 This parameter is a setting in minutes to add to the normal GMT to local time conversion\&. This is useful if you are serving a lot of PCs that have incorrect daylight saving time handling\&. 9494 .sp 9747 This deprecated parameter is a setting in minutes to add to the normal GMT to local time conversion\&. This is useful if you are serving a lot of PCs that have incorrect daylight saving time handling\&. 9748 .if n \{\ 9749 .sp 9750 .\} 9751 .RS 4 9752 .it 1 an-trap 9753 .nr an-no-space-flag 1 9754 .nr an-break-flag 1 9755 .br 9756 .ps +1 9757 \fBNote\fR 9758 .ps -1 9759 .br 9760 This option is deprecated, and will be removed in the next major release 9761 .sp .5v 9762 .RE 9495 9763 Default: 9496 9764 \fI\fItime offset\fR\fR\fI = \fR\fI0\fR\fI \fR … … 9557 9825 .RE 9558 9826 9559 update encrypted (G)9560 .\" update encrypted9561 .PP9562 .RS 49563 This boolean parameter allows a user logging on with a plaintext password to have their encrypted (hashed) password in the smbpasswd file to be updated automatically as they log on\&. This option allows a site to migrate from plaintext password authentication (users authenticate with plaintext password over the wire, and are checked against a UNIX account database) to encrypted password authentication (the SMB challenge/response authentication mechanism) without forcing all users to re\-enter their passwords via smbpasswd at the time the change is made\&. This is a convenience option to allow the change over to encrypted passwords to be made over a longer period\&. Once all users have encrypted representations of their passwords in the smbpasswd file this parameter should be set to9564 \fBno\fR\&.9565 .sp9566 In order for this parameter to be operative the9567 \m[blue]\fBencrypt passwords\fR\m[]9568 parameter must be set to9569 \fBno\fR\&. The default value of9570 \m[blue]\fBencrypt passwords = Yes\fR\m[]\&. Note: This must be set to9571 \fBno\fR9572 for this9573 \m[blue]\fBupdate encrypted\fR\m[]9574 to work\&.9575 .sp9576 Note that even when this parameter is set, a user authenticating to9577 smbd9578 must still enter a valid password in order to connect correctly, and to update their hashed (smbpasswd) passwords\&.9579 .sp9580 Default:9581 \fI\fIupdate encrypted\fR\fR\fI = \fR\fIno\fR\fI \fR9582 .RE9583 9584 9827 use client driver (S) 9585 9828 .\" use client driver … … 9626 9869 Example: 9627 9870 \fI\fIusername level\fR\fR\fI = \fR\fI5\fR\fI \fR 9871 .RE 9872 9873 username map cache time (G) 9874 .\" username map cache time 9875 .PP 9876 .RS 4 9877 Mapping usernames with the 9878 \m[blue]\fBusername map\fR\m[] 9879 or 9880 \m[blue]\fBusername map script\fR\m[] 9881 features of Samba can be relatively expensive\&. During login of a user, the mapping is done several times\&. In particular, calling the 9882 \m[blue]\fBusername map script\fR\m[] 9883 can slow down logins if external databases have to be queried from the script being called\&. 9884 .sp 9885 The parameter 9886 \m[blue]\fBusername map cache time\fR\m[] 9887 controls a mapping cache\&. It specifies the number of seconds a mapping from the username map file or script is to be efficiently cached\&. The default of 0 means no caching is done\&. 9888 .sp 9889 Default: 9890 \fI\fIusername map cache time\fR\fR\fI = \fR\fI0\fR\fI \fR 9891 .sp 9892 Example: 9893 \fI\fIusername map cache time\fR\fR\fI = \fR\fI60\fR\fI \fR 9628 9894 .RE 9629 9895 … … 9788 10054 Multiple users may be specified in a comma\-delimited list, in which case the supplied password will be tested against each username in turn (left to right)\&. 9789 10055 .sp 9790 The 10056 The deprecated 9791 10057 \fIusername\fR 9792 10058 line is needed only when the PC is unable to supply its own username\&. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames\&. In both these cases you may also be better using the \e\eserver\eshare%user syntax instead\&. … … 9945 10211 .PP 9946 10212 .RS 4 9947 This variable controls controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\&.10213 This deprecated variable controls controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\&. 9948 10214 .sp 9949 10215 Unless further issues are discovered with our SPNEGO implementation, there is no reason this should ever be disabled\&. … … 10240 10506 .RE 10241 10507 10508 winbind max clients (G) 10509 .\" winbind max clients 10510 .PP 10511 .RS 4 10512 This parameter specifies the maximum number of clients the 10513 \fBwinbindd\fR(8) 10514 daemon can connect with\&. 10515 .sp 10516 Default: 10517 \fI\fIwinbind max clients\fR\fR\fI = \fR\fI200\fR\fI \fR 10518 .RE 10519 10520 winbind max domain connections (G) 10521 .\" winbind max domain connections 10522 .PP 10523 .RS 4 10524 This parameter specifies the maximum number of simultaneous connections that the 10525 \fBwinbindd\fR(8) 10526 daemon should open to the domain controller of one domain\&. Setting this parameter to a value greater than 1 can improve scalability with many simultaneous winbind requests, some of which might be slow\&. 10527 .sp 10528 Note that if 10529 \m[blue]\fBwinbind offline logon\fR\m[] 10530 is set to 10531 \fBYes\fR, then only one DC connection is allowed per domain, regardless of this setting\&. 10532 .sp 10533 Default: 10534 \fI\fIwinbind max domain connections\fR\fR\fI = \fR\fI1\fR\fI \fR 10535 .sp 10536 Example: 10537 \fI\fIwinbind max domain connections\fR\fR\fI = \fR\fI10\fR\fI \fR 10538 .RE 10539 10242 10540 winbind nested groups (G) 10243 10541 .\" winbind nested groups … … 10298 10596 \fIidmap config DOMAIN:backend\fR 10299 10597 = ad as well\&. 10598 .RE 10300 10599 .sp 10301 10600 .RE … … 10404 10703 This parameter specifies whether the 10405 10704 \fBwinbindd\fR(8) 10406 daemon should operate on users without domain component in their username\&. Users without a domain component are treated as is part of the winbindd server\'s own domain\&. While this does not benifit Windows users, it makes SSH, FTP and e\-mail function in a way much closer to the way they would in a native unix system\&. 10705 daemon should operate on users without domain component in their username\&. Users without a domain component are treated as is part of the winbindd server\'s own domain\&. While this does not benefit Windows users, it makes SSH, FTP and e\-mail function in a way much closer to the way they would in a native unix system\&. 10706 .sp 10707 This option should be avoided if possible\&. It can cause confusion about responsibilities for a user or group\&. In many situations it is not clear whether winbind or /etc/passwd should be seen as authoritative for a user, likewise for groups\&. 10407 10708 .sp 10408 10709 Default: … … 10476 10777 .\} 10477 10778 The fifth and subsequent arguments are the IP addresses currently registered for that name\&. If this list is empty then the name should be deleted\&. 10779 .RE 10478 10780 .sp 10479 10781 .RE
Note:
See TracChangeset
for help on using the changeset viewer.