Ignore:
Timestamp:
Nov 27, 2012, 4:43:17 PM (13 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: updated trunk to 3.6.0

Location:
trunk/server
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • trunk/server

  • trunk/server/docs/htmldocs/Samba3-HOWTO/securing-samba.html

    r599 r745  
    44<a class="indexterm" name="id385281"></a>
    55<a class="indexterm" name="id385288"></a>
    6 <a class="indexterm" name="id385294"></a>
     6<a class="indexterm" name="id385295"></a>
    77<a class="indexterm" name="id385301"></a>
    88<a class="indexterm" name="id385308"></a>
     
    2727<a class="indexterm" name="id385368"></a>
    2828<a class="indexterm" name="id385375"></a>
    29 <a class="indexterm" name="id385381"></a>
     29<a class="indexterm" name="id385382"></a>
    3030There are three levels at which security principles must be observed in order to render a site
    3131at least moderately secure. They are the perimeter firewall, the configuration of the host
     
    6767        </p><p>
    6868<a class="indexterm" name="id385535"></a>
    69 <a class="indexterm" name="id385541"></a>
     69<a class="indexterm" name="id385542"></a>
    7070        One of the simplest fixes in this case is to use the <a class="link" href="smb.conf.5.html#HOSTSALLOW" target="_top">hosts allow</a> and
    7171        <a class="link" href="smb.conf.5.html#HOSTSDENY" target="_top">hosts deny</a> options in the Samba <code class="filename">smb.conf</code> configuration file to
    7272        allow access to your server only from a specific range of hosts. An example might be:
    73         </p><table border="0" summary="Simple list" class="simplelist"><tr><td><a class="indexterm" name="id385585"></a><em class="parameter"><code>hosts allow = 127.0.0.1 192.168.2.0/24 192.168.3.0/24</code></em></td></tr><tr><td><a class="indexterm" name="id385597"></a><em class="parameter"><code>hosts deny = 0.0.0.0/0</code></em></td></tr></table><p>
     73        </p><table border="0" summary="Simple list" class="simplelist"><tr><td><a class="indexterm" name="id385586"></a><em class="parameter"><code>hosts allow = 127.0.0.1 192.168.2.0/24 192.168.3.0/24</code></em></td></tr><tr><td><a class="indexterm" name="id385597"></a><em class="parameter"><code>hosts deny = 0.0.0.0/0</code></em></td></tr></table><p>
    7474        </p><p>
    7575<a class="indexterm" name="id385612"></a>
    7676<a class="indexterm" name="id385619"></a>
    77 <a class="indexterm" name="id385625"></a>
     77<a class="indexterm" name="id385626"></a>
    7878        The above will allow SMB connections only from <code class="constant">localhost</code> (your own
    7979        computer) and from the two private networks 192.168.2 and 192.168.3. All other
     
    9090        </p></div><div class="sect2" title="Using Interface Protection"><div class="titlepage"><div><div><h3 class="title"><a name="id385704"></a>Using Interface Protection</h3></div></div></div><p>
    9191<a class="indexterm" name="id385712"></a>
    92 <a class="indexterm" name="id385718"></a>
     92<a class="indexterm" name="id385719"></a>
    9393<a class="indexterm" name="id385725"></a>
    9494        By default, Samba accepts connections on any network interface that
     
    109109        the common name for Ethernet adapters on Linux.
    110110        </p><p>
    111 <a class="indexterm" name="id385817"></a>
     111<a class="indexterm" name="id385818"></a>
    112112<a class="indexterm" name="id385824"></a>
    113 <a class="indexterm" name="id385830"></a>
     113<a class="indexterm" name="id385831"></a>
    114114<a class="indexterm" name="id385837"></a>
    115115        If you use the above and someone tries to make an SMB connection to your host over a PPP interface called
     
    120120        </p><p>
    121121<a class="indexterm" name="id385855"></a>
    122 <a class="indexterm" name="id385861"></a>
     122<a class="indexterm" name="id385862"></a>
    123123<a class="indexterm" name="id385868"></a>
    124124<a class="indexterm" name="id385875"></a>
     
    150150        </p><p>
    151151<a class="indexterm" name="id386006"></a>
    152 <a class="indexterm" name="id386012"></a>
     152<a class="indexterm" name="id386013"></a>
    153153<a class="indexterm" name="id386019"></a>
    154154        When configuring a firewall, the high order ports (1024-65535) are often used for outgoing connections and
     
    156156        ports except for established connections.
    157157        </p></div><div class="sect2" title="Using IPC$ Share-Based Denials"><div class="titlepage"><div><div><h3 class="title"><a name="id386031"></a>Using IPC$ Share-Based Denials </h3></div></div></div><p>
    158 <a class="indexterm" name="id386038"></a>
     158<a class="indexterm" name="id386039"></a>
    159159<a class="indexterm" name="id386045"></a>
    160160<a class="indexterm" name="id386052"></a>
     
    167167        </p><p>
    168168<a class="indexterm" name="id386106"></a>
    169 <a class="indexterm" name="id386112"></a>
    170 <a class="indexterm" name="id386119"></a>
     169<a class="indexterm" name="id386113"></a>
     170<a class="indexterm" name="id386120"></a>
    171171        This instructs Samba that IPC$ connections are not allowed from anywhere except the two listed network
    172172        addresses (localhost and the 192.168.115 subnet). Connections to other shares are still allowed. Because the
     
    176176<a class="indexterm" name="id386133"></a>
    177177<a class="indexterm" name="id386140"></a>
    178 <a class="indexterm" name="id386146"></a>
     178<a class="indexterm" name="id386147"></a>
    179179        If you use this method, then clients will be given an <code class="literal">`access denied'</code> reply when they try
    180180        to access the IPC$ share. Those clients will not be able to browse shares and may also be unable to access
     
    234234        User xyzzy can map his home directory. Once mapped, user xyzzy can also map anyone else's home directory.
    235235        </span>&#8221;</span></p><p>
    236 <a class="indexterm" name="id386328"></a>
     236<a class="indexterm" name="id386329"></a>
    237237<a class="indexterm" name="id386335"></a>
    238238        This is not a security flaw, it is by design. Samba allows users to have exactly the same access to the UNIX
     
    241241        </p><p>
    242242<a class="indexterm" name="id386348"></a>
    243 <a class="indexterm" name="id386354"></a>
     243<a class="indexterm" name="id386355"></a>
    244244        If your UNIX home directories are set up so that one user can happily <code class="literal">cd</code>
    245245        into another user's directory and execute <code class="literal">ls</code>, the UNIX security solution is to change file
Note: See TracChangeset for help on using the changeset viewer.