Ignore:
Timestamp:
Nov 14, 2012, 12:59:34 PM (13 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: update vendor to 3.6.0

File:
1 edited

Legend:

Unmodified
Added
Removed
  • vendor/current/docs/manpages/smb.conf.5

    r618 r740  
    33.\"    Author: [see the "AUTHOR" section]
    44.\" Generator: DocBook XSL Stylesheets v1.75.2 <http://docbook.sf.net/>
    5 .\"      Date: 08/02/2011
     5.\"      Date: 08/08/2011
    66.\"    Manual: File Formats and Conventions
    7 .\"    Source: Samba 3.5
     7.\"    Source: Samba 3.6
    88.\"  Language: English
    99.\"
    10 .TH "SMB\&.CONF" "5" "08/02/2011" "Samba 3\&.5" "File Formats and Conventions"
     10.TH "SMB\&.CONF" "5" "08/08/2011" "Samba 3\&.6" "File Formats and Conventions"
    1111.\" -----------------------------------------------------------------
    1212.\" * set default formatting
     
    149149.\}
    150150If no path was given, the path is set to the user\'s home directory\&.
     151.RE
    151152.sp
    152153.RE
     
    236237.\}
    237238If the share does not permit guest access and no username was given, the username is set to the located printer name\&.
     239.RE
    238240.sp
    239241.RE
     
    456458%a
    457459.RS 4
    458 The architecture of the remote machine\&. It currently recognizes Samba (\fBSamba\fR), the Linux CIFS file system (\fBCIFSFS\fR), OS/2, (\fBOS2\fR), Windows for Workgroups (\fBWfWg\fR), Windows 9x/ME (\fBWin95\fR), Windows NT (\fBWinNT\fR), Windows 2000 (\fBWin2K\fR), Windows XP (\fBWinXP\fR), Windows XP 64\-bit(\fBWinXP64\fR), Windows 2003 including 2003R2 (\fBWin2K3\fR), and Windows Vista (\fBVista\fR)\&. Anything else will be known as
     460The architecture of the remote machine\&. It currently recognizes Samba (\fBSamba\fR), the Linux CIFS file system (\fBCIFSFS\fR), OS/2, (\fBOS2\fR), Mac OS X (\fBOSX\fR), Windows for Workgroups (\fBWfWg\fR), Windows 9x/ME (\fBWin95\fR), Windows NT (\fBWinNT\fR), Windows 2000 (\fBWin2K\fR), Windows XP (\fBWinXP\fR), Windows XP 64\-bit(\fBWinXP64\fR), Windows 2003 including 2003R2 (\fBWin2K3\fR), and Windows Vista (\fBVista\fR)\&. Anything else will be known as
    459461\fBUNKNOWN\fR\&.
    460462.RE
     
    463465.RS 4
    464466the IP address of the client machine\&.
     467.sp
     468Before 3\&.6\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&.
    465469.RE
    466470.PP
     
    468472.RS 4
    469473the local IP address to which a client connected\&.
     474.sp
     475Before 3\&.6\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&.
    470476.RE
    471477.PP
     
    555561.RS 4
    556562controls what the default case is for new filenames (ie\&. files that don\'t currently exist in the filesystem)\&. Default
    557 \fIlower\fR\&. IMPORTANT NOTE: This option will be used to modify the case of
     563\fIlower\fR\&. IMPORTANT NOTE: As part of the optimizations for directories containing large numbers of files, the following special case applies\&. If the options
     564\m[blue]\fBcase sensitive = yes\fR\m[],
     565\m[blue]\fBpreserve case = No\fR\m[], and
     566\m[blue]\fBshort preserve case = No\fR\m[]
     567are set, then the case of
    558568\fIall\fR
    559 incoming client filenames, not just new filenames if the options
    560 \m[blue]\fBcase sensitive = yes\fR\m[],
    561 \m[blue]\fBpreserve case = No\fR\m[],
    562 \m[blue]\fBshort preserve case = No\fR\m[]
    563 are set\&. This change is needed as part of the optimisations for directories containing large numbers of files\&.
     569incoming client filenames, not just new filenames, will be modified\&. See additional notes below\&.
    564570.RE
    565571.PP
     
    909915.\}
    910916\fIdevice URI\fR
    911 .sp
    912 .RE
    913 The deviceURI is in the for of socket://<hostname>[:<portnumber>] or lpd://<hostname>/<queuename>\&.
     917.RE
     918.sp
     919.RE
     920The deviceURI is in the format of socket://<hostname>[:<portnumber>] or lpd://<hostname>/<queuename>\&.
    914921.sp
    915922Default:
     
    10011008.\}
    10021009\fIWindows 9x driver location\fR
     1010.RE
    10031011.sp
    10041012.RE
     
    11091117\fImax connections\fR
    11101118Number of maximum simultaneous connections to this share\&.
     1119.RE
    11111120.sp
    11121121.RE
     
    13971406Example:
    13981407\fI\fIannounce version\fR\fR\fI = \fR\fI2\&.0\fR\fI \fR
     1408.RE
     1409
     1410async smb echo handler (G)
     1411.\" async smb echo handler
     1412.PP
     1413.RS 4
     1414This parameter specifies whether Samba should fork the async smb echo handler\&. It can be beneficial if your file system can block syscalls for a very long time\&. In some circumstances, it prolongs the timeout that Windows uses to determine whether a connection is dead\&.
     1415.sp
     1416Default:
     1417\fI\fIasync smb echo handler\fR\fR\fI = \fR\fIno\fR\fI \fR
    13991418.RE
    14001419
     
    17421761\fImax connections\fR
    17431762Number of maximum simultaneous connections to this share\&.
     1763.RE
    17441764.sp
    17451765.RE
     
    18391859will attempt to authenticate itself to servers using the NTLMv2 encrypted password response\&.
    18401860.sp
    1841 If enabled, only an NTLMv2 and LMv2 response (both much more secure than earlier versions) will be sent\&. Many servers (including NT4 < SP4, Win9x and Samba 2\&.2) are not compatible with NTLMv2\&.
     1861If enabled, only an NTLMv2 and LMv2 response (both much more secure than earlier versions) will be sent\&. Older servers (including NT4 < SP4, Win9x and Samba 2\&.2) are not compatible with NTLMv2 when not in an NTLMv2 supporting domain
    18421862.sp
    18431863Similarly, if enabled, NTLMv1,
     
    18501870client lanman auth\&.
    18511871.sp
    1852 Note that some sites (particularly those following \'best practice\' security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM\&.
    1853 .sp
    1854 Default:
    1855 \fI\fIclient ntlmv2 auth\fR\fR\fI = \fR\fIno\fR\fI \fR
     1872Note that Windows Vista and later versions already use NTLMv2 by default, and some sites (particularly those following \'best practice\' security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM\&.
     1873.sp
     1874Default:
     1875\fI\fIclient ntlmv2 auth\fR\fR\fI = \fR\fIyes\fR\fI \fR
    18561876.RE
    18571877
     
    21202140.RE
    21212141
     2142ctdb locktime warn threshold (G)
     2143.\" ctdb locktime warn threshold
     2144.PP
     2145.RS 4
     2146In a cluster environment using Samba and ctdb it is critical that locks on central ctdb\-hosted databases like locking\&.tdb are not held for long\&. With the current Samba architecture it happens that Samba takes a lock and while holding that lock makes file system calls into the shared cluster file system\&. This option makes Samba warn if it detects that it has held locks for the specified number of milliseconds\&. If this happens,
     2147\fIsmbd\fR
     2148will emit a debug level 0 message into its logs and potentially into syslog\&. The most likely reason for such a log message is that an operation of the cluster file system Samba exports is taking longer than expected\&. The messages are meant as a debugging aid for potential cluster problems\&.
     2149.sp
     2150The default value of 0 disables this logging\&.
     2151.sp
     2152Default:
     2153\fI\fIctdb locktime warn threshold\fR\fR\fI = \fR\fI0\fR\fI \fR
     2154.RE
     2155
    21222156ctdb timeout (G)
    21232157.\" ctdb timeout
     
    25452579\fIshareName\fR
    25462580\- the name of the existing service\&.
     2581.RE
    25472582.sp
    25482583.RE
     
    30113046.PP
    30123047.RS 4
    3013 This parameter controls whether or not smbd will honor privileges assigned to specific SIDs via either
     3048This deprecated parameter controls whether or not smbd will honor privileges assigned to specific SIDs via either
    30143049net rpc rights
    30153050or one of the Windows user and group manager tools\&. This parameter is enabled by default\&. It can be disabled to prevent members of the Domain Admins group from being able to assign privileges to users or groups which can then result in certain smbd operations running as root that would normally run under the context of the connected user\&.
     
    34153450.\}
    34163451uid of user or gid of group
     3452.RE
    34173453.sp
    34183454.RE
     
    34613497.\}
    346234984 \- group default quotas (gid = \-1)
     3499.RE
    34633500.sp
    34643501.RE
     
    35513588.\}
    35523589Arg 8(optional) \- the number of bytes in a block(default is 1024)
     3590.RE
    35533591.sp
    35543592.RE
     
    36143652\m[blue]\fBguest account\fR\m[]\&.
    36153653.sp
    3616 This paramater nullifies the benifits of setting
     3654This parameter nullifies the benefits of setting
    36173655\m[blue]\fBrestrict anonymous = 2\fR\m[]
    36183656.sp
     
    39083946.RE
    39093947
    3910 idmap alloc backend (G)
    3911 .\" idmap alloc backend
    3912 .PP
    3913 .RS 4
    3914 The idmap alloc backend provides a plugin interface for Winbind to use when allocating Unix uids/gids for Windows SIDs\&. This option refers to the name of the idmap module which will provide the id allocation functionality\&. Please refer to the man page for each idmap plugin to determine whether or not the module implements the allocation feature\&. The most common plugins are the tdb (\fBidmap_tdb\fR(8)) and ldap (\fBidmap_ldap\fR(8)) libraries\&.
    3915 .sp
    3916 This parameter defaults to the value
    3917 \m[blue]\fBidmap backend\fR\m[]
    3918 was set to, so by default winbind will allocate Unix IDs from the default backend\&. You will only need to set this parameter explicitly if you have an external source for Unix IDs, like a central database service somewhere in your company\&.
    3919 .sp
    3920 Also refer to the
    3921 \m[blue]\fBidmap alloc config\fR\m[]
    3922 option\&.
    3923 .sp
    3924 \fINo default\fR
    3925 .sp
    3926 Example:
    3927 \fI\fIidmap alloc backend\fR\fR\fI = \fR\fItdb\fR\fI \fR
    3928 .RE
    3929 
    3930 idmap alloc config (G)
    3931 .\" idmap alloc config
    3932 .PP
    3933 .RS 4
    3934 The idmap alloc config prefix provides a means of managing settings for the backend defined by the
    3935 \m[blue]\fBidmap alloc backend\fR\m[]
    3936 parameter\&. Refer to the man page for each idmap plugin regarding specific configuration details\&.
    3937 .sp
    3938 \fINo default\fR
    3939 .RE
    3940 
    39413948idmap backend (G)
    39423949.\" idmap backend
     
    39453952The idmap backend provides a plugin interface for Winbind to use varying backends to store SID/uid/gid mapping tables\&.
    39463953.sp
    3947 This option specifies the default backend that is used when no special configuration set by
    3948 \m[blue]\fBidmap config\fR\m[]
    3949 matches the specific request\&.
    3950 .sp
    3951 This default backend also specifies the place where winbind\-generated idmap entries will be stored\&. So it is highly recommended that you specify a writable backend like
    3952 \fBidmap_tdb\fR(8)
    3953 or
    3954 \fBidmap_ldap\fR(8)
    3955 as the idmap backend\&. The
    3956 \fBidmap_rid\fR(8)
    3957 and
    3958 \fBidmap_ad\fR(8)
    3959 backends are not writable and thus will generate unexpected results if set as idmap backend\&.
    3960 .sp
    3961 To use the rid and ad backends, please specify them via the
    3962 \m[blue]\fBidmap config\fR\m[]
    3963 parameter, possibly also for the domain your machine is member of, specified by
    3964 \m[blue]\fBworkgroup\fR\m[]\&.
    3965 .sp
    3966 Examples of SID/uid/gid backends include tdb (\fBidmap_tdb\fR(8)), ldap (\fBidmap_ldap\fR(8)), rid (\fBidmap_rid\fR(8)), and ad (\fBidmap_ad\fR(8))\&.
     3954This option specifies the default backend that is used when no special configuration set, but it is now deprecated in favour of the new spelling
     3955\m[blue]\fBidmap config * : backend\fR\m[]\&.
    39673956.sp
    39683957Default:
     
    39843973.PP
    39853974.RS 4
    3986 The idmap config prefix provides a means of managing each trusted domain separately\&. The idmap config prefix should be followed by the name of the domain, a colon, and a setting specific to the chosen backend\&. There are three options available for all domains:
     3975ID mapping in Samba is the mapping between Windows SIDs and Unix user and group IDs\&. This is performed by Winbindd with a configurable plugin interface\&. Samba\'s ID mapping is configured by options starting with the
     3976\m[blue]\fBidmap config\fR\m[]
     3977prefix\&. An idmap option consists of the
     3978\m[blue]\fBidmap config\fR\m[]
     3979prefix, followed by a domain name or the asterisk character (*), a colon, and the name of an idmap setting for the chosen domain\&.
     3980.sp
     3981The idmap configuration is hence divided into groups, one group for each domain to be configured, and one group with the the asterisk instead of a proper domain name, which speifies the default configuration that is used to catch all domains that do not have an explicit idmap configuration of their own\&.
     3982.sp
     3983There are three general options available:
    39873984.PP
    39883985backend = backend_name
    39893986.RS 4
    3990 Specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\&.
     3987This specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\&. The standard backends are tdb (\fBidmap_tdb\fR(8)), tdb2 (\fBidmap_tdb2\fR(8)), ldap (\fBidmap_ldap\fR(8)), , rid (\fBidmap_rid\fR(8)), , hash (\fBidmap_hash\fR(8)), , autorid (\fBidmap_autorid\fR(8)), , ad (\fBidmap_ad\fR(8)), , adex (\fBidmap_adex\fR(8)), , and nss\&. (\fBidmap_nss\fR(8)), The corresponding manual pages contain the details, but here is a summary\&.
     3988.sp
     3989The first three of these create mappings of their own using internal unixid counters and store the mappings in a database\&. These are suitable for use in the default idmap configuration\&. The rid and hash backends use a pure algorithmic calculation to determine the unixid for a SID\&. The autorid module is a mixture of the tdb and rid backend\&. It creates ranges for each domain encountered and then uses the rid algorithm for each of these automatically configured domains individually\&. The ad and adex backends both use unix IDs stored in Active Directory via the standard schema extensions\&. The nss backend reverses the standard winbindd setup and gets the unixids via names from nsswitch which can be useful in an ldap setup\&.
    39913990.RE
    39923991.PP
    39933992range = low \- high
    39943993.RS 4
    3995 Defines the available matching uid and gid range for which the backend is authoritative\&. Note that the range commonly matches the allocation range due to the fact that the same backend will store and retrieve SID/uid/gid mapping entries\&.
    3996 .sp
    3997 winbind uses this parameter to find the backend that is authoritative for a unix ID to SID mapping, so it must be set for each individually configured domain, and it must be disjoint from the ranges set via
    3998 \m[blue]\fBidmap uid\fR\m[]
    3999 and
    4000 \m[blue]\fBidmap gid\fR\m[]\&.
     3994Defines the available matching uid and gid range for which the backend is authoritative\&. For allocating backends, this also defines the start and the end of the range for allocating new unid IDs\&.
     3995.sp
     3996winbind uses this parameter to find the backend that is authoritative for a unix ID to SID mapping, so it must be set for each individually configured domain and for the default configuration\&. The configured ranges must be mutually disjoint\&.
     3997.RE
     3998.PP
     3999read only = yes|no
     4000.RS 4
     4001This option can be used to turn the writing backends tdb, tdb2, and ldap into read only mode\&. This can be useful e\&.g\&. in cases where a pre\-filled database exists that should not be extended automatically\&.
    40014002.RE
    40024003.sp
    40034004The following example illustrates how to configure the
    40044005\fBidmap_ad\fR(8)
    4005 for the CORP domain and the
     4006backend for the CORP domain and the
    40064007\fBidmap_tdb\fR(8)
    40074008backend for all other domains\&. This configuration assumes that the admin of CORP assigns unix ids below 1000000 via the SFU extensions, and winbind is supposed to use the next million entries for its own mappings from trusted domains and for local groups for example\&.
     
    40114012.\}
    40124013.nf
    4013         idmap backend = tdb
    4014         idmap uid = 1000000\-1999999
    4015         idmap gid = 1000000\-1999999
     4014        idmap config * : backend = tdb
     4015        idmap config * : range = 1000000\-1999999
    40164016
    40174017        idmap config CORP : backend  = ad
     
    40384038.PP
    40394039.RS 4
    4040 The idmap gid parameter specifies the range of group ids that are allocated for the purpose of mapping UNX groups to NT group SIDs\&. This range of group ids should have no existing local or NIS groups within it as strange conflicts can occur otherwise\&.
    4041 .sp
    4042 See also the
    4043 \m[blue]\fBidmap backend\fR\m[], and
     4040The idmap gid parameter specifies the range of group ids for the default idmap configuration\&. It is now deprecated in favour of
     4041\m[blue]\fBidmap config * : range\fR\m[]\&.
     4042.sp
     4043See the
    40444044\m[blue]\fBidmap config\fR\m[]
    4045 options\&.
     4045option\&.
    40464046.sp
    40474047Default:
     
    40744074.PP
    40754075.RS 4
    4076 The idmap uid parameter specifies the range of user ids that are allocated for use in mapping UNIX users to NT user SIDs\&. This range of ids should have no existing local or NIS users within it as strange conflicts can occur otherwise\&.
    4077 .sp
    4078 See also the
    4079 \m[blue]\fBidmap backend\fR\m[]
    4080 and
     4076The idmap uid parameter specifies the range of user ids for the default idmap configuration\&. It is now deprecated in favour of
     4077\m[blue]\fBidmap config * : range\fR\m[]\&.
     4078.sp
     4079See the
    40814080\m[blue]\fBidmap config\fR\m[]
    4082 options\&.
     4081option\&.
    40834082.sp
    40844083Default:
     
    42474246.\}
    42484247a broadcast/mask pair\&.
     4248.RE
    42494249.sp
    42504250.RE
     
    43774377.\}
    43784378secrets and keytab \- use the secrets\&.tdb first, then the system keytab
     4379.RE
    43794380.sp
    43804381.RE
     
    46944695\fIOnly\fR
    46954696= Only update the LDAP password and let the LDAP server do the rest\&.
     4697.RE
    46964698.sp
    46974699.RE
     
    48904892\fIstart tls\fR
    48914893= Use the LDAPv3 StartTLS extended operation (RFC2830) for communicating with the directory server\&.
     4894.RE
    48924895.sp
    48934896.RE
     
    53925395.\}
    53935396\fIregistry\fR
     5397.RE
    53945398.sp
    53955399.RE
     
    55725576.RE
    55735577
     5578log writeable files on exit (G)
     5579.\" log writeable files on exit
     5580.PP
     5581.RS 4
     5582When the network connection between a CIFS client and Samba dies, Samba has no option but to simply shut down the server side of the network connection\&. If this happens, there is a risk of data corruption because the Windows client did not complete all write operations that the Windows application requested\&. Setting this option to "yes" makes smbd log with a level 0 message a list of all files that have been opened for writing when the network connection died\&. Those are the files that are potentially corrupted\&. It is meant as an aid for the administrator to give him a list of files to do consistency checks on\&.
     5583.sp
     5584Default:
     5585\fI\fIlog writeable files on exit\fR\fR\fI = \fR\fIno\fR\fI \fR
     5586.RE
     5587
    55745588lppause command (S)
    55755589.\" lppause command
     
    58725886.\}
    58735887Files whose UNIX name begins with a dot will be presented as DOS hidden files\&. The mangled name will be created as for other filenames, but with the leading dot removed and "___" as its extension regardless of actual original extension (that\'s three underscores)\&.
     5888.RE
    58745889.sp
    58755890.RE
     
    60326047\m[blue]\fBstore dos attributes\fR\m[]
    60336048method\&. This may be useful for exporting mounted CDs\&.
     6049.RE
    60346050.sp
    60356051.RE
     
    61266142\fBBad Uid\fR
    61276143\- Is only applicable when Samba is configured in some type of domain mode security (security = {domain|ads}) and means that user logins which are successfully authenticated but which have no valid Unix user account (and smbd is unable to create one) should be mapped to the defined guest account\&. This was the default behavior of Samba 2\&.x releases\&. Note that if a member server is running winbindd, this option should never be required because the nss_winbind library will export the Windows domain users and groups to the underlying OS via the Name Service Switch interface\&.
     6144.RE
    61286145.sp
    61296146.RE
     
    63426359.\}
    63436360\fBSMB2\fR: Re\-implementation of the SMB protocol\&. Used by Windows Vista and newer\&. The Samba implementation of SMB2 is currently marked experimental!
     6361.RE
    63446362.sp
    63456363.RE
     
    65046522\fI%f\fR
    65056523= who the message is from\&.
     6524.RE
    65066525.sp
    65076526.RE
     
    66366655.RE
    66376656
     6657multicast dns register (G)
     6658.\" multicast dns register
     6659.PP
     6660.RS 4
     6661If compiled with proper support for it, Samba will announce itself with multicast DNS services like for example provided by the Avahi daemon\&.
     6662.sp
     6663This parameter allows disabling Samba to register itself\&.
     6664.sp
     6665Default:
     6666\fI\fImulticast dns register\fR\fR\fI = \fR\fIyes\fR\fI \fR
     6667.RE
     6668
    66386669name cache timeout (G)
    66396670.\" name cache timeout
     
    67126743\m[blue]\fBinterfaces\fR\m[]
    67136744parameter\&. This is the least reliable of the name resolution methods as it depends on the target host being on a locally connected subnet\&.
     6745.RE
    67146746.sp
    67156747.RE
     
    67286760Example:
    67296761\fI\fIname resolve order\fR\fR\fI = \fR\fIlmhosts bcast host\fR\fI \fR
     6762.RE
     6763
     6764ncalrpc dir (G)
     6765.\" ncalrpc dir
     6766.PP
     6767.RS 4
     6768This directory will hold a series of named pipes to allow RPC over inter\-process communication\&.
     6769.sp
     6770\&.
     6771        This will allow Samba and other unix processes to interact over DCE/RPC without using TCP/IP\&. Additionally a sub\-directory \'np\' has restricted permissions, and allows a trusted communication channel between Samba processes
     6772.sp
     6773Default:
     6774\fI\fIncalrpc dir\fR\fR\fI = \fR\fI${prefix}/var/ncalrpc\fR\fI \fR
     6775.sp
     6776Example:
     6777\fI\fIncalrpc dir\fR\fR\fI = \fR\fI/var/run/samba/ncalrpc\fR\fI \fR
    67306778.RE
    67316779
     
    71167164.sp
    71177165Multiple servers may also be specified in double\-quotes\&. Whether multiple servers are supported or not and the exact syntax depends on the LDAP library you use\&.
     7166.RE
    71187167.sp
    71197168.RE
     
    72797328Some client/server combinations have difficulty with mixed\-case passwords\&. One offending client is Windows for Workgroups, which for some reason forces passwords to upper case when using the LANMAN1 protocol, but leaves them alone when using COREPLUS! Another problem child is the Windows 95/98 family of operating systems\&. These clients upper case clear text passwords even when NT LM 0\&.12 selected by the protocol negotiation request/response\&.
    72807329.sp
    7281 This parameter defines the maximum number of characters that may be upper case in passwords\&.
     7330This deprecated parameter defines the maximum number of characters that may be upper case in passwords\&.
    72827331.sp
    72837332For example, say the password given was "FRED"\&. If
     
    73167365security = [ads|domain|server]
    73177366it is possible to get Samba to do all its username/password validation using a specific remote server\&.
    7318 .sp
    7319 This option sets the name or IP address of the password server to use\&. New syntax has been added to support defining the port to use when connecting to the server the case of an ADS realm\&. To define a port other than the default LDAP port of 389, add the port number using a colon after the name or IP address (e\&.g\&. 192\&.168\&.1\&.100:389)\&. If you do not specify a port, Samba will use the standard LDAP port of tcp/389\&. Note that port numbers have no effect on password servers for Windows NT 4\&.0 domains or netbios connections\&.
    7320 .sp
    7321 If parameter is a name, it is looked up using the parameter
    7322 \m[blue]\fBname resolve order\fR\m[]
    7323 and so may resolved by any method and order described in that parameter\&.
    7324 .sp
    7325 The password server must be a machine capable of using the "LM1\&.2X002" or the "NT LM 0\&.12" protocol, and it must be in user level security mode\&.
    7326 .if n \{\
    7327 .sp
    7328 .\}
    7329 .RS 4
    7330 .it 1 an-trap
    7331 .nr an-no-space-flag 1
    7332 .nr an-break-flag 1
    7333 .br
    7334 .ps +1
    7335 \fBNote\fR
    7336 .ps -1
    7337 .br
    7338 Using a password server means your UNIX box (running Samba) is only as secure as your password server\&.
    7339 \fIDO NOT CHOOSE A PASSWORD SERVER THAT YOU DON\'T COMPLETELY TRUST\fR\&.
    7340 .sp .5v
    7341 .RE
    7342 Never point a Samba server at itself for password serving\&. This will cause a loop and could lock up your Samba server!
    7343 .sp
    7344 The name of the password server takes the standard substitutions, but probably the only useful one is
    7345 \fI%m \fR, which means the Samba server will use the incoming client as the password server\&. If you use this then you better trust your clients, and you had better restrict them with hosts allow!
    73467367.sp
    73477368If the
     
    73507371\fBdomain\fR
    73517372or
    7352 \fBads\fR, then the list of machines in this option must be a list of Primary or Backup Domain controllers for the Domain or the character \'*\', as the Samba server is effectively in that domain, and will use cryptographically authenticated RPC calls to authenticate the user logging on\&. The advantage of using
    7353 security = domain
    7354 is that if you list several hosts in the
     7373\fBads\fR, then this option
     7374\fIshould not\fR
     7375be used, as the default \'*\' indicates to Samba to determine the best DC to contact dynamically, just as all other hosts in an AD domain do\&. This allows the domain to be maintained without modification to the smb\&.conf file\&. The cryptograpic protection on the authenticated RPC calls used to verify passwords ensures that this default is safe\&.
     7376.sp
     7377\fIIt is strongly recommended that you use the default of \'*\'\fR, however if in your particular environment you have reason to specify a particular DC list, then the list of machines in this option must be a list of names or IP addresses of Domain controllers for the Domain\&. If you use the default of \'*\', or list several hosts in the
    73557378\fIpassword server\fR
    73567379option then
     
    73587381will try each in turn till it finds one that responds\&. This is useful in case your primary server goes down\&.
    73597382.sp
    7360 If the
    7361 \fIpassword server\fR
    7362 option is set to the character \'*\', then Samba will attempt to auto\-locate the Primary or Backup Domain controllers to authenticate against by doing a query for the name
    7363 \fBWORKGROUP<1C>\fR
    7364 and then contacting each server returned in the list of IP addresses from the name resolution source\&.
    7365 .sp
    73667383If the list of servers contains both names/IP\'s and the \'*\' character, the list is treated as a list of preferred domain controllers, but an auto lookup of all remaining DC\'s will be added to the list as well\&. Samba will not attempt to optimize this list by locating the closest DC\&.
     7384.sp
     7385If parameter is a name, it is looked up using the parameter
     7386\m[blue]\fBname resolve order\fR\m[]
     7387and so may resolved by any method and order described in that parameter\&.
    73677388.sp
    73687389If the
    73697390\fIsecurity\fR
    73707391parameter is set to
    7371 \fBserver\fR, then there are different restrictions that
    7372 security = domain
    7373 doesn\'t suffer from:
     7392\fBserver\fR, these additional restrictions apply:
    73747393.sp
    73757394.RS 4
     
    73997418.IP \(bu 2.3
    74007419.\}
    7401 If you are using a Windows NT server as your password server then you will have to ensure that your users are able to login from the Samba server, as when in
     7420You will have to ensure that your users are able to login from the Samba server, as when in
    74027421security = server
    7403 mode the network logon will appear to come from there rather than from the users workstation\&.
     7422mode the network logon will appear to come from the Samba server rather than from the users workstation\&.
     7423.RE
     7424.sp
     7425.RS 4
     7426.ie n \{\
     7427\h'-04'\(bu\h'+03'\c
     7428.\}
     7429.el \{\
     7430.sp -1
     7431.IP \(bu 2.3
     7432.\}
     7433The client must not select NTLMv2 authentication\&.
     7434.RE
     7435.sp
     7436.RS 4
     7437.ie n \{\
     7438\h'-04'\(bu\h'+03'\c
     7439.\}
     7440.el \{\
     7441.sp -1
     7442.IP \(bu 2.3
     7443.\}
     7444The password server must be a machine capable of using the "LM1\&.2X002" or the "NT LM 0\&.12" protocol, and it must be in user level security mode\&.
     7445.RE
     7446.sp
     7447.RS 4
     7448.ie n \{\
     7449\h'-04'\(bu\h'+03'\c
     7450.\}
     7451.el \{\
     7452.sp -1
     7453.IP \(bu 2.3
     7454.\}
     7455Using a password server means your UNIX box (running Samba) is only as secure as (a host masqurading as) your password server\&.
     7456\fIDO NOT CHOOSE A PASSWORD SERVER THAT YOU DON\'T COMPLETELY TRUST\fR\&.
     7457.RE
     7458.sp
     7459.RS 4
     7460.ie n \{\
     7461\h'-04'\(bu\h'+03'\c
     7462.\}
     7463.el \{\
     7464.sp -1
     7465.IP \(bu 2.3
     7466.\}
     7467Never point a Samba server at itself for password serving\&. This will cause a loop and could lock up your Samba server!
     7468.RE
     7469.sp
     7470.RS 4
     7471.ie n \{\
     7472\h'-04'\(bu\h'+03'\c
     7473.\}
     7474.el \{\
     7475.sp -1
     7476.IP \(bu 2.3
     7477.\}
     7478The name of the password server takes the standard substitutions, but probably the only useful one is
     7479\fI%m \fR, which means the Samba server will use the incoming client as the password server\&. If you use this then you better trust your clients, and you had better restrict them with hosts allow!
     7480.RE
    74047481.sp
    74057482.RE
     
    74757552The
    74767553\fBsmbd\fR(8)
    7477 daemon maintains an database of file locks obtained by SMB clients\&. The default behavior is to map this internal database to POSIX locks\&. This means that file locks obtained by SMB clients are consistent with those seen by POSIX compliant applications accessing the files via a non\-SMB method (e\&.g\&. NFS or local file access)\&. You should never need to disable this parameter\&.
     7554daemon maintains an database of file locks obtained by SMB clients\&. The default behavior is to map this internal database to POSIX locks\&. This means that file locks obtained by SMB clients are consistent with those seen by POSIX compliant applications accessing the files via a non\-SMB method (e\&.g\&. NFS or local file access)\&. It is very unlikely that you need to set this parameter to "no", unless you are sharing from an NFS mount, which is not a good idea in the first place\&.
    74787555.sp
    74797556Default:
     
    76537730.PP
    76547731.RS 4
    7655 This option specifies the number of seconds before the printing subsystem is again asked for the known printers\&. If the value is greater than 60 the initial waiting time is set to 60 seconds to allow an earlier first rescan of the printing subsystem\&.
     7732This option specifies the number of seconds before the printing subsystem is again asked for the known printers\&.
    76567733.sp
    76577734Setting this parameter to 0 disables any rescanning for new or removed printers after the initial startup\&.
     
    79177994.RE
    79187995
     7996print notify backchannel (S)
     7997.\" print notify backchannel
     7998.PP
     7999.RS 4
     8000Windows print clients can update print queue status by expecting the server to open a backchannel SMB connection to them\&. Due to client firewall settings this can cause considerable timeouts and will often fail, as there is no guarantee the client is even running an SMB server\&. By setting this parameter to
     8001\fBno\fR
     8002the Samba print server will not try to connect back to clients and treat corresponding requests as if the connection back to the client failed\&. The default setting of
     8003\fByes\fR
     8004causes smbd to attempt this connection\&.
     8005.sp
     8006Default:
     8007\fI\fIprint notify backchannel\fR\fR\fI = \fR\fIyes\fR\fI \fR
     8008.RE
     8009
    79198010private dir (G)
    79208011.\" private dir
     
    83168407.RE
    83178408
     8409rpc_server (G)
     8410.\" rpc_server
     8411.PP
     8412.RS 4
     8413Defines what kind of rpc server to use for a named pipe\&. The rpc_server prefix must be followed by the pipe name, and a value\&.
     8414.sp
     8415Three possible values are currently supported:
     8416embedded
     8417daemon
     8418external
     8419.sp
     8420The classic method is to run every pipe as an internal function
     8421\fIembedded\fR
     8422in smbd\&.
     8423.sp
     8424An alternative method is to fork a
     8425\fIdaemon\fR
     8426early on at smbd startup time\&. This is supported only for selected pipes\&.
     8427.sp
     8428Choosing the
     8429\fIexternal\fR
     8430option allows to run a completely independent (3rd party) server capable of interfacing with samba via the MS\-RPC interface over named pipes\&.
     8431.sp
     8432Currently only the spoolss pipe can be configured in
     8433\fIdaemon\fR
     8434mode like this:
     8435.sp
     8436.if n \{\
     8437.RS 4
     8438.\}
     8439.nf
     8440        rpc_server:spoolss = daemon
     8441       
     8442.fi
     8443.if n \{\
     8444.RE
     8445.\}
     8446.sp
     8447Default:
     8448\fI\fIrpc_server\fR\fR\fI = \fR\fInone\fR\fI \fR
     8449.RE
     8450
    83188451security mask (S)
    83198452.\" security mask
     
    83568489.sp
    83578490The alternatives are
    8358 security = share,
    8359 security = server
     8491security = ads
    83608492or
    8361 security = domain\&.
     8493security = domain, which support joining Samba to a Windows domain, along with
     8494security = share
     8495and
     8496security = server, both of which are deprecated\&.
    83628497.sp
    83638498In versions of Samba prior to 2\&.0\&.0, the default was
     
    83658500mainly because that was the only option at one stage\&.
    83668501.sp
    8367 There is a bug in WfWg that has relevance to this setting\&. When in user or server level security a WfWg client will totally ignore the username and password you type in the "connect drive" dialog box\&. This makes it very difficult (if not impossible) to connect to a Samba service as anyone except the user that you are logged into WfWg as\&.
    8368 .sp
    8369 If your PCs use usernames that are the same as their usernames on the UNIX machine then you will want to use
    8370 security = user\&. If you mostly use usernames that don\'t exist on the UNIX box then use
    8371 security = share\&.
    8372 .sp
    8373 You should also use
    8374 security = share
    8375 if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&. It is more difficult to setup guest shares with
    8376 security = user, see the
     8502You should use
     8503security = user
     8504and
    83778505\m[blue]\fBmap to guest\fR\m[]
    8378 parameter for details\&.
     8506if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&.
    83798507.sp
    83808508It is possible to use
     
    83878515The different settings will now be explained\&.
    83888516.sp
    8389 \fISECURITY = SHARE\fR
    8390 .sp
    8391 When clients connect to a share level security server, they need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a
    8392 security = share
    8393 server)\&. Instead, the clients send authentication information (passwords) on a per\-share basis, at the time they attempt to connect to that share\&.
    8394 .sp
    8395 Note that
    8396 smbd
    8397 \fIALWAYS\fR
    8398 uses a valid UNIX user to act on behalf of the client, even in
    8399 security = share
    8400 level security\&.
    8401 .sp
    8402 As clients are not required to send a username to the server in share level security,
    8403 smbd
    8404 uses several techniques to determine the correct UNIX user to use on behalf of the client\&.
    8405 .sp
    8406 A list of possible UNIX usernames to match with the given client password is constructed using the following methods :
    8407 .sp
    8408 .RS 4
    8409 .ie n \{\
    8410 \h'-04'\(bu\h'+03'\c
    8411 .\}
    8412 .el \{\
    8413 .sp -1
    8414 .IP \(bu 2.3
    8415 .\}
    8416 If the
    8417 \m[blue]\fBguest only\fR\m[]
    8418 parameter is set, then all the other stages are missed and only the
    8419 \m[blue]\fBguest account\fR\m[]
    8420 username is checked\&.
    8421 .RE
    8422 .sp
    8423 .RS 4
    8424 .ie n \{\
    8425 \h'-04'\(bu\h'+03'\c
    8426 .\}
    8427 .el \{\
    8428 .sp -1
    8429 .IP \(bu 2.3
    8430 .\}
    8431 Is a username is sent with the share connection request, then this username (after mapping \- see
    8432 \m[blue]\fBusername map\fR\m[]), is added as a potential username\&.
    8433 .RE
    8434 .sp
    8435 .RS 4
    8436 .ie n \{\
    8437 \h'-04'\(bu\h'+03'\c
    8438 .\}
    8439 .el \{\
    8440 .sp -1
    8441 .IP \(bu 2.3
    8442 .\}
    8443 If the client did a previous
    8444 \fIlogon \fR
    8445 request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username\&.
    8446 .RE
    8447 .sp
    8448 .RS 4
    8449 .ie n \{\
    8450 \h'-04'\(bu\h'+03'\c
    8451 .\}
    8452 .el \{\
    8453 .sp -1
    8454 .IP \(bu 2.3
    8455 .\}
    8456 The name of the service the client requested is added as a potential username\&.
    8457 .RE
    8458 .sp
    8459 .RS 4
    8460 .ie n \{\
    8461 \h'-04'\(bu\h'+03'\c
    8462 .\}
    8463 .el \{\
    8464 .sp -1
    8465 .IP \(bu 2.3
    8466 .\}
    8467 The NetBIOS name of the client is added to the list as a potential username\&.
    8468 .RE
    8469 .sp
    8470 .RS 4
    8471 .ie n \{\
    8472 \h'-04'\(bu\h'+03'\c
    8473 .\}
    8474 .el \{\
    8475 .sp -1
    8476 .IP \(bu 2.3
    8477 .\}
    8478 Any users on the
    8479 \m[blue]\fBuser\fR\m[]
    8480 list are added as potential usernames\&.
    8481 .sp
    8482 .RE
    8483 If the
    8484 \fIguest only\fR
    8485 parameter is not set, then this list is then tried with the supplied password\&. The first user for whom the password matches will be used as the UNIX user\&.
    8486 .sp
    8487 If the
    8488 \fIguest only\fR
    8489 parameter is set, or no username can be determined then if the share is marked as available to the
    8490 \fIguest account\fR, then this guest user will be used, otherwise access is denied\&.
    8491 .sp
    8492 Note that it can be
    8493 \fIvery\fR
    8494 confusing in share\-level security as to which UNIX username will eventually be used in granting access\&.
    8495 .sp
    8496 See also the section
    8497 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.
    8498 .sp
    84998517\fISECURITY = USER\fR
    85008518.sp
    8501 This is the default security setting in Samba 3\&.0\&. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the
     8519This is the default security setting in Samba\&. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the
    85028520\m[blue]\fBusername map\fR\m[]
    85038521parameter)\&. Encrypted passwords (see the
     
    85558573parameter\&.
    85568574.sp
    8557 \fISECURITY = SERVER\fR
    8558 .sp
    8559 In this mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box\&. If this fails it will revert to
    8560 security = user\&. It expects the
    8561 \m[blue]\fBencrypted passwords\fR\m[]
    8562 parameter to be set to
    8563 \fByes\fR, unless the remote server does not support them\&. However note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid
    8564 smbpasswd
    8565 file to check users against\&. See the chapter about the User Database in the Samba HOWTO Collection for details on how to set this up\&.
     8575\fISECURITY = SHARE\fR
    85668576.if n \{\
    85678577.sp
     
    85768586.ps -1
    85778587.br
    8578 This mode of operation has significant pitfalls since it is more vulnerable to man\-in\-the\-middle attacks and server impersonation\&. In particular, this mode of operation can cause significant resource consuption on the PDC, as it must maintain an active connection for the duration of the user\'s session\&. Furthermore, if this connection is lost, there is no way to reestablish it, and futher authentications to the Samba server may fail (from a single client, till it disconnects)\&.
     8588This option is deprecated as it is incompatible with SMB2
     8589.sp .5v
     8590.RE
     8591When clients connect to a share level security server, they need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a
     8592security = share
     8593server)\&. Instead, the clients send authentication information (passwords) on a per\-share basis, at the time they attempt to connect to that share\&.
     8594.sp
     8595Note that
     8596smbd
     8597\fIALWAYS\fR
     8598uses a valid UNIX user to act on behalf of the client, even in
     8599security = share
     8600level security\&.
     8601.sp
     8602As clients are not required to send a username to the server in share level security,
     8603smbd
     8604uses several techniques to determine the correct UNIX user to use on behalf of the client\&.
     8605.sp
     8606A list of possible UNIX usernames to match with the given client password is constructed using the following methods :
     8607.sp
     8608.RS 4
     8609.ie n \{\
     8610\h'-04'\(bu\h'+03'\c
     8611.\}
     8612.el \{\
     8613.sp -1
     8614.IP \(bu 2.3
     8615.\}
     8616If the
     8617\m[blue]\fBguest only\fR\m[]
     8618parameter is set, then all the other stages are missed and only the
     8619\m[blue]\fBguest account\fR\m[]
     8620username is checked\&.
     8621.RE
     8622.sp
     8623.RS 4
     8624.ie n \{\
     8625\h'-04'\(bu\h'+03'\c
     8626.\}
     8627.el \{\
     8628.sp -1
     8629.IP \(bu 2.3
     8630.\}
     8631Is a username is sent with the share connection request, then this username (after mapping \- see
     8632\m[blue]\fBusername map\fR\m[]), is added as a potential username\&.
     8633.RE
     8634.sp
     8635.RS 4
     8636.ie n \{\
     8637\h'-04'\(bu\h'+03'\c
     8638.\}
     8639.el \{\
     8640.sp -1
     8641.IP \(bu 2.3
     8642.\}
     8643If the client did a previous
     8644\fIlogon \fR
     8645request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username\&.
     8646.RE
     8647.sp
     8648.RS 4
     8649.ie n \{\
     8650\h'-04'\(bu\h'+03'\c
     8651.\}
     8652.el \{\
     8653.sp -1
     8654.IP \(bu 2.3
     8655.\}
     8656The name of the service the client requested is added as a potential username\&.
     8657.RE
     8658.sp
     8659.RS 4
     8660.ie n \{\
     8661\h'-04'\(bu\h'+03'\c
     8662.\}
     8663.el \{\
     8664.sp -1
     8665.IP \(bu 2.3
     8666.\}
     8667The NetBIOS name of the client is added to the list as a potential username\&.
     8668.RE
     8669.sp
     8670.RS 4
     8671.ie n \{\
     8672\h'-04'\(bu\h'+03'\c
     8673.\}
     8674.el \{\
     8675.sp -1
     8676.IP \(bu 2.3
     8677.\}
     8678Any users on the
     8679\m[blue]\fBuser\fR\m[]
     8680list are added as potential usernames\&.
     8681.RE
     8682.sp
     8683.RE
     8684If the
     8685\fIguest only\fR
     8686parameter is not set, then this list is then tried with the supplied password\&. The first user for whom the password matches will be used as the UNIX user\&.
     8687.sp
     8688If the
     8689\fIguest only\fR
     8690parameter is set, or no username can be determined then if the share is marked as available to the
     8691\fIguest account\fR, then this guest user will be used, otherwise access is denied\&.
     8692.sp
     8693Note that it can be
     8694\fIvery\fR
     8695confusing in share\-level security as to which UNIX username will eventually be used in granting access\&.
     8696.sp
     8697See also the section
     8698NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.
     8699.sp
     8700\fISECURITY = SERVER\fR
     8701.sp
     8702In this depicted mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box\&. If this fails it will revert to
     8703security = user\&. It expects the
     8704\m[blue]\fBencrypted passwords\fR\m[]
     8705parameter to be set to
     8706\fByes\fR, unless the remote server does not support them\&. However note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid
     8707smbpasswd
     8708file to check users against\&. See the chapter about the User Database in the Samba HOWTO Collection for details on how to set this up\&.
     8709.if n \{\
     8710.sp
     8711.\}
     8712.RS 4
     8713.it 1 an-trap
     8714.nr an-no-space-flag 1
     8715.nr an-break-flag 1
     8716.br
     8717.ps +1
     8718\fBNote\fR
     8719.ps -1
     8720.br
     8721This mode of operation has significant pitfalls since it is more vulnerable to man\-in\-the\-middle attacks and server impersonation\&. In particular, this mode of operation can cause significant resource consumption on the PDC, as it must maintain an active connection for the duration of the user\'s session\&. Furthermore, if this connection is lost, there is no way to reestablish it, and further authentications to the Samba server may fail (from a single client, till it disconnects)\&.
     8722.sp .5v
     8723.RE
     8724.if n \{\
     8725.sp
     8726.\}
     8727.RS 4
     8728.it 1 an-trap
     8729.nr an-no-space-flag 1
     8730.nr an-break-flag 1
     8731.br
     8732.ps +1
     8733\fBNote\fR
     8734.ps -1
     8735.br
     8736If the client selects NTLMv2 authentication, then this mode of operation
     8737\fIwill fail\fR
    85798738.sp .5v
    85808739.RE
     
    85978756.sp .5v
    85988757.RE
     8758.if n \{\
     8759.sp
     8760.\}
     8761.RS 4
     8762.it 1 an-trap
     8763.nr an-no-space-flag 1
     8764.nr an-break-flag 1
     8765.br
     8766.ps +1
     8767\fBNote\fR
     8768.ps -1
     8769.br
     8770This option is deprecated, and may be removed in future
     8771.sp .5v
     8772.RE
    85998773\fINote\fR
    86008774that the name of the resource being requested is
     
    86298803.RE
    86308804
     8805send spnego principal (G)
     8806.\" send spnego principal
     8807.PP
     8808.RS 4
     8809This parameter determines whether or not
     8810\fBsmbd\fR(8)
     8811will send the server\-supplied principal sometimes given in the SPNEGO exchange\&.
     8812.sp
     8813If enabled, Samba can attempt to help clients to use Kerberos to contact it, even when known only by IP address or a name not registered with our KDC as a service principal name\&. Kerberos relies on names, so ordinarily cannot function in this situation\&.
     8814.sp
     8815If disabled, Samba will send the string not_defined_in_RFC4178@please_ignore as the \'rfc4178 hint\', following the updated RFC and Windows 2008 behaviour in this area\&.
     8816.sp
     8817Note that Windows XP SP2 and later versions already ignored this value in all circumstances\&.
     8818.sp
     8819Default:
     8820\fI\fIsend spnego principal\fR\fR\fI = \fR\fIno\fR\fI \fR
     8821.RE
     8822
    86318823server schannel (G)
    86328824.\" server schannel
     
    87968988.\}
    879789894 \- group default quotas (gid = \-1)
     8990.RE
    87988991.sp
    87998992.RE
     
    88759068.\}
    887690698(optional) \- block size, defaults to 1024
     9070.RE
    88779071.sp
    88789072.RE
     
    90319225will be substituted with the switch
    90329226\fI\-f\fR\&. It means force the shutdown even if applications do not respond for NT\&.
     9227.RE
    90339228.sp
    90349229.RE
     
    90599254Example:
    90609255\fI\fIshutdown script\fR\fR\fI = \fR\fI/usr/local/samba/sbin/shutdown %m %t %r %f\fR\fI \fR
     9256.RE
     9257
     9258smb2 max credits (G)
     9259.\" smb2 max credits
     9260.PP
     9261.RS 4
     9262This option controls the maximum number of outstanding simultaneous SMB2 operations that Samba tells the client it will allow\&. This is similar to the
     9263\m[blue]\fBmax mux\fR\m[]
     9264parameter for SMB1\&. You should never need to set this parameter\&.
     9265.sp
     9266The default is 8192 credits, which is the same as a Windows 2008R2 SMB2 server\&.
     9267.sp
     9268Default:
     9269\fI\fIsmb2 max credits\fR\fR\fI = \fR\fI128\fR\fI \fR
     9270.RE
     9271
     9272smb2 max read (G)
     9273.\" smb2 max read
     9274.PP
     9275.RS 4
     9276This option specifies the protocol value that
     9277\fBsmbd\fR(8)
     9278will return to a client, informing the client of the largest size that may be returned by a single SMB2 read call\&.
     9279.sp
     9280The default is 1048576 bytes (1MB), which is the same as a Windows7 SMB2 server\&.
     9281.sp
     9282Default:
     9283\fI\fIsmb2 max read\fR\fR\fI = \fR\fI1048576\fR\fI \fR
     9284.RE
     9285
     9286smb2 max trans (G)
     9287.\" smb2 max trans
     9288.PP
     9289.RS 4
     9290This option specifies the protocol value that
     9291\fBsmbd\fR(8)
     9292will return to a client, informing the client of the largest size of buffer that may be used in querying file meta\-data via QUERY_INFO and related SMB2 calls\&.
     9293.sp
     9294The default is 1048576 bytes (1MB), which is the same as a Windows7 SMB2 server\&.
     9295.sp
     9296Default:
     9297\fI\fIsmb2 max trans\fR\fR\fI = \fR\fI1048576\fR\fI \fR
     9298.RE
     9299
     9300smb2 max write (G)
     9301.\" smb2 max write
     9302.PP
     9303.RS 4
     9304This option specifies the protocol value that
     9305\fBsmbd\fR(8)
     9306will return to a client, informing the client of the largest size that may be sent to the server by a single SMB2 write call\&.
     9307.sp
     9308The default is 1048576 bytes (1MB), which is the same as a Windows7 SMB2 server\&.
     9309.sp
     9310Default:
     9311\fI\fIsmb2 max write\fR\fR\fI = \fR\fI1048576\fR\fI \fR
    90619312.RE
    90629313
     
    92619512.\}
    92629513SO_RCVLOWAT *
     9514.RE
    92639515.sp
    92649516.RE
     
    93469598This is a boolean that controls the handling of disk space allocation in the server\&. When this is set to
    93479599\fByes\fR
    9348 the server will change from UNIX behaviour of not committing real disk storage blocks when a file is extended to the Windows behaviour of actually forcing the disk system to allocate real storage blocks when a file is created or extended to be a given size\&. In UNIX terminology this means that Samba will stop creating sparse files\&. This can be slow on some systems\&. When you work with large files like >100MB or so you may even run into problems with clients running into timeouts\&.
     9600the server will change from UNIX behaviour of not committing real disk storage blocks when a file is extended to the Windows behaviour of actually forcing the disk system to allocate real storage blocks when a file is created or extended to be a given size\&. In UNIX terminology this means that Samba will stop creating sparse files\&.
     9601.sp
     9602This option is really desgined for file systems that support fast allocation of large numbers of blocks such as extent\-based file systems\&. On file systems that don\'t support extents (most notably ext3) this can make Samba slower\&. When you work with large files over >100MB on file systems without extents you may even run into problems with clients running into timeouts\&.
    93499603.sp
    93509604When you have an extent based filesystem it\'s likely that we can make use of unwritten extents which allows Samba to allocate even large amounts of space very fast and you will not see any timeout problems caused by strict allocate\&. With strict allocate in use you will also get much better out of quota messages in case you use quotas\&. Another advantage of activating this setting is that it will help to reduce file fragmentation\&.
     
    94919745.PP
    94929746.RS 4
    9493 This parameter is a setting in minutes to add to the normal GMT to local time conversion\&. This is useful if you are serving a lot of PCs that have incorrect daylight saving time handling\&.
    9494 .sp
     9747This deprecated parameter is a setting in minutes to add to the normal GMT to local time conversion\&. This is useful if you are serving a lot of PCs that have incorrect daylight saving time handling\&.
     9748.if n \{\
     9749.sp
     9750.\}
     9751.RS 4
     9752.it 1 an-trap
     9753.nr an-no-space-flag 1
     9754.nr an-break-flag 1
     9755.br
     9756.ps +1
     9757\fBNote\fR
     9758.ps -1
     9759.br
     9760This option is deprecated, and will be removed in the next major release
     9761.sp .5v
     9762.RE
    94959763Default:
    94969764\fI\fItime offset\fR\fR\fI = \fR\fI0\fR\fI \fR
     
    95579825.RE
    95589826
    9559 update encrypted (G)
    9560 .\" update encrypted
    9561 .PP
    9562 .RS 4
    9563 This boolean parameter allows a user logging on with a plaintext password to have their encrypted (hashed) password in the smbpasswd file to be updated automatically as they log on\&. This option allows a site to migrate from plaintext password authentication (users authenticate with plaintext password over the wire, and are checked against a UNIX account database) to encrypted password authentication (the SMB challenge/response authentication mechanism) without forcing all users to re\-enter their passwords via smbpasswd at the time the change is made\&. This is a convenience option to allow the change over to encrypted passwords to be made over a longer period\&. Once all users have encrypted representations of their passwords in the smbpasswd file this parameter should be set to
    9564 \fBno\fR\&.
    9565 .sp
    9566 In order for this parameter to be operative the
    9567 \m[blue]\fBencrypt passwords\fR\m[]
    9568 parameter must be set to
    9569 \fBno\fR\&. The default value of
    9570 \m[blue]\fBencrypt passwords = Yes\fR\m[]\&. Note: This must be set to
    9571 \fBno\fR
    9572 for this
    9573 \m[blue]\fBupdate encrypted\fR\m[]
    9574 to work\&.
    9575 .sp
    9576 Note that even when this parameter is set, a user authenticating to
    9577 smbd
    9578 must still enter a valid password in order to connect correctly, and to update their hashed (smbpasswd) passwords\&.
    9579 .sp
    9580 Default:
    9581 \fI\fIupdate encrypted\fR\fR\fI = \fR\fIno\fR\fI \fR
    9582 .RE
    9583 
    95849827use client driver (S)
    95859828.\" use client driver
     
    96269869Example:
    96279870\fI\fIusername level\fR\fR\fI = \fR\fI5\fR\fI \fR
     9871.RE
     9872
     9873username map cache time (G)
     9874.\" username map cache time
     9875.PP
     9876.RS 4
     9877Mapping usernames with the
     9878\m[blue]\fBusername map\fR\m[]
     9879or
     9880\m[blue]\fBusername map script\fR\m[]
     9881features of Samba can be relatively expensive\&. During login of a user, the mapping is done several times\&. In particular, calling the
     9882\m[blue]\fBusername map script\fR\m[]
     9883can slow down logins if external databases have to be queried from the script being called\&.
     9884.sp
     9885The parameter
     9886\m[blue]\fBusername map cache time\fR\m[]
     9887controls a mapping cache\&. It specifies the number of seconds a mapping from the username map file or script is to be efficiently cached\&. The default of 0 means no caching is done\&.
     9888.sp
     9889Default:
     9890\fI\fIusername map cache time\fR\fR\fI = \fR\fI0\fR\fI \fR
     9891.sp
     9892Example:
     9893\fI\fIusername map cache time\fR\fR\fI = \fR\fI60\fR\fI \fR
    96289894.RE
    96299895
     
    978810054Multiple users may be specified in a comma\-delimited list, in which case the supplied password will be tested against each username in turn (left to right)\&.
    978910055.sp
    9790 The
     10056The deprecated
    979110057\fIusername\fR
    979210058line is needed only when the PC is unable to supply its own username\&. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames\&. In both these cases you may also be better using the \e\eserver\eshare%user syntax instead\&.
     
    994510211.PP
    994610212.RS 4
    9947 This variable controls controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\&.
     10213This deprecated variable controls controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\&.
    994810214.sp
    994910215Unless further issues are discovered with our SPNEGO implementation, there is no reason this should ever be disabled\&.
     
    1024010506.RE
    1024110507
     10508winbind max clients (G)
     10509.\" winbind max clients
     10510.PP
     10511.RS 4
     10512This parameter specifies the maximum number of clients the
     10513\fBwinbindd\fR(8)
     10514daemon can connect with\&.
     10515.sp
     10516Default:
     10517\fI\fIwinbind max clients\fR\fR\fI = \fR\fI200\fR\fI \fR
     10518.RE
     10519
     10520winbind max domain connections (G)
     10521.\" winbind max domain connections
     10522.PP
     10523.RS 4
     10524This parameter specifies the maximum number of simultaneous connections that the
     10525\fBwinbindd\fR(8)
     10526daemon should open to the domain controller of one domain\&. Setting this parameter to a value greater than 1 can improve scalability with many simultaneous winbind requests, some of which might be slow\&.
     10527.sp
     10528Note that if
     10529\m[blue]\fBwinbind offline logon\fR\m[]
     10530is set to
     10531\fBYes\fR, then only one DC connection is allowed per domain, regardless of this setting\&.
     10532.sp
     10533Default:
     10534\fI\fIwinbind max domain connections\fR\fR\fI = \fR\fI1\fR\fI \fR
     10535.sp
     10536Example:
     10537\fI\fIwinbind max domain connections\fR\fR\fI = \fR\fI10\fR\fI \fR
     10538.RE
     10539
    1024210540winbind nested groups (G)
    1024310541.\" winbind nested groups
     
    1029810596\fIidmap config DOMAIN:backend\fR
    1029910597= ad as well\&.
     10598.RE
    1030010599.sp
    1030110600.RE
     
    1040410703This parameter specifies whether the
    1040510704\fBwinbindd\fR(8)
    10406 daemon should operate on users without domain component in their username\&. Users without a domain component are treated as is part of the winbindd server\'s own domain\&. While this does not benifit Windows users, it makes SSH, FTP and e\-mail function in a way much closer to the way they would in a native unix system\&.
     10705daemon should operate on users without domain component in their username\&. Users without a domain component are treated as is part of the winbindd server\'s own domain\&. While this does not benefit Windows users, it makes SSH, FTP and e\-mail function in a way much closer to the way they would in a native unix system\&.
     10706.sp
     10707This option should be avoided if possible\&. It can cause confusion about responsibilities for a user or group\&. In many situations it is not clear whether winbind or /etc/passwd should be seen as authoritative for a user, likewise for groups\&.
    1040710708.sp
    1040810709Default:
     
    1047610777.\}
    1047710778The fifth and subsequent arguments are the IP addresses currently registered for that name\&. If this list is empty then the name should be deleted\&.
     10779.RE
    1047810780.sp
    1047910781.RE
Note: See TracChangeset for help on using the changeset viewer.