Changeset 862 for trunk/server/docs/manpages/ntlm_auth.1
- Timestamp:
- May 13, 2014, 11:39:04 AM (11 years ago)
- Location:
- trunk/server
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/server
- Property svn:mergeinfo changed
/vendor/current merged: 860
- Property svn:mergeinfo changed
-
trunk/server/docs/manpages/ntlm_auth.1
r752 r862 2 2 .\" Title: ntlm_auth 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 5.2<http://docbook.sf.net/>5 .\" Date: 10/29/20124 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/> 5 .\" Date: 09/18/2013 6 6 .\" Manual: User Commands 7 7 .\" Source: Samba 3.6 8 8 .\" Language: English 9 9 .\" 10 .TH "NTLM_AUTH" "1" "10/29/2012" "Samba 3\&.6" "User Commands" 10 .TH "NTLM_AUTH" "1" "09/18/2013" "Samba 3\&.6" "User Commands" 11 .\" ----------------------------------------------------------------- 12 .\" * Define some portability stuff 13 .\" ----------------------------------------------------------------- 14 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 15 .\" http://bugs.debian.org/507673 16 .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html 17 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 18 .ie \n(.g .ds Aq \(aq 19 .el .ds Aq ' 11 20 .\" ----------------------------------------------------------------- 12 21 .\" * set default formatting … … 20 29 .\" ----------------------------------------------------------------- 21 30 .SH "NAME" 22 ntlm_auth \- tool to allow external access to Winbind\ 's NTLM authentication function31 ntlm_auth \- tool to allow external access to Winbind\*(Aqs NTLM authentication function 23 32 .SH "SYNOPSIS" 24 33 .HP \w'\ 'u … … 55 64 squid\-2\&.4\-basic 56 65 .RS 4 57 Server\-side helper for use with Squid 2\&.4\ 's basic (plaintext) authentication\&.66 Server\-side helper for use with Squid 2\&.4\*(Aqs basic (plaintext) authentication\&. 58 67 .RE 59 68 .PP 60 69 squid\-2\&.5\-basic 61 70 .RS 4 62 Server\-side helper for use with Squid 2\&.5\ 's basic (plaintext) authentication\&.71 Server\-side helper for use with Squid 2\&.5\*(Aqs basic (plaintext) authentication\&. 63 72 .RE 64 73 .PP 65 74 squid\-2\&.5\-ntlmssp 66 75 .RS 4 67 Server\-side helper for use with Squid 2\&.5\ 's NTLMSSP authentication\&.76 Server\-side helper for use with Squid 2\&.5\*(Aqs NTLMSSP authentication\&. 68 77 .sp 69 78 Requires access to the directory … … 78 87 ntlmssp\-client\-1 79 88 .RS 4 80 Client\-side helper for use with arbitrary external programs that may wish to use Samba\ 's NTLMSSP authentication knowledge\&.89 Client\-side helper for use with arbitrary external programs that may wish to use Samba\*(Aqs NTLMSSP authentication knowledge\&. 81 90 .sp 82 91 This helper is a client, and as such may be run by any user\&. The protocol used is effectively the reverse of the previous protocol\&. A … … 103 112 ntlm\-server\-1 104 113 .RS 4 105 Server\-side helper protocol, intended for use by a RADIUS server or the \ 'winbind\'plugin for pppd, for the provision of MSCHAP and MSCHAPv2 authentication\&.114 Server\-side helper protocol, intended for use by a RADIUS server or the \*(Aqwinbind\*(Aq plugin for pppd, for the provision of MSCHAP and MSCHAPv2 authentication\&. 106 115 .sp 107 116 This protocol consists of lines in the form: … … 116 125 Username 117 126 .RS 4 118 The username, expected to be in Samba\ 's127 The username, expected to be in Samba\*(Aqs 119 128 \m[blue]\fBunix charset\fR\m[]\&. 120 .PP \fBExample\ \&1.\ \&\fR Username: bob 121 .PP \fBExample\ \&2.\ \&\fR Username:: Ym9i 129 .PP 130 Examples: 131 .RS 4 132 Username: bob 133 .sp 134 Username:: Ym9i 135 .RE 122 136 .RE 123 137 .PP 124 138 NT\-Domain 125 139 .RS 4 126 The user\ 's domain, expected to be in Samba\'s140 The user\*(Aqs domain, expected to be in Samba\*(Aqs 127 141 \m[blue]\fBunix charset\fR\m[]\&. 128 .PP \fBExample\ \&3.\ \&\fR NT\-Domain: WORKGROUP 129 .PP \fBExample\ \&4.\ \&\fR NT\-Domain:: V09SS0dST1VQ 142 .PP 143 Examples: 144 .RS 4 145 NT\-Domain: WORKGROUP 146 .sp 147 NT\-Domain:: V09SS0dST1VQ 148 .RE 130 149 .RE 131 150 .PP 132 151 Full\-Username 133 152 .RS 4 134 The fully qualified username, expected to be in Samba\ 's153 The fully qualified username, expected to be in Samba\*(Aqs 135 154 \m[blue]\fBunix charset\fR\m[] 136 155 and qualified with the 137 156 \m[blue]\fBwinbind separator\fR\m[]\&. 138 .PP \fBExample\ \&5.\ \&\fR Full\-Username: WORKGROUP\ebob 139 .PP \fBExample\ \&6.\ \&\fR Full\-Username:: V09SS0dST1VQYm9i 157 .PP 158 Examples: 159 .RS 4 160 Full\-Username: WORKGROUP\ebob 161 .sp 162 Full\-Username:: V09SS0dST1VQYm9i 163 .RE 140 164 .RE 141 165 .PP … … 145 169 LANMAN Challenge 146 170 value, generated randomly by the server, or (in cases such as MSCHAPv2) generated in some way by both the server and the client\&. 147 .PP \fBExample\ \&7.\ \&\fR LANMAN\-Challenge: 0102030405060708 171 .PP 172 Examples: 173 .RS 4 174 LANMAN\-Challenge: 0102030405060708 175 .RE 148 176 .RE 149 177 .PP … … 152 180 The 24 byte 153 181 LANMAN Response 154 value, calculated from the user\ 's password and the supplied182 value, calculated from the user\*(Aqs password and the supplied 155 183 LANMAN Challenge\&. Typically, this is provided over the network by a client wishing to authenticate\&. 156 .PP \fBExample\ \&8.\ \&\fR LANMAN\-Response: 0102030405060708090A0B0C0D0E0F101112131415161718 184 .PP 185 Examples: 186 .RS 4 187 LANMAN\-Response: 0102030405060708090A0B0C0D0E0F101112131415161718 188 .RE 157 189 .RE 158 190 .PP … … 161 193 The >= 24 byte 162 194 NT Response 163 calculated from the user\ 's password and the supplied195 calculated from the user\*(Aqs password and the supplied 164 196 LANMAN Challenge\&. Typically, this is provided over the network by a client wishing to authenticate\&. 165 .PP \fBExample\ \&9.\ \&\fR NT\-Response: 0102030405060708090A0B0C0D0E0F101112131415161718 197 .PP 198 Examples: 199 .RS 4 200 NT\-Response: 0102030405060708090A0B0C0D0E0F10111213141516171 201 .RE 166 202 .RE 167 203 .PP 168 204 Password 169 205 .RS 4 170 The user\'s password\&. This would be provided by a network client, if the helper is being used in a legacy situation that exposes plaintext passwords in this way\&. 171 .PP \fBExample\ \&10.\ \&\fR Password: samba2 172 .PP \fBExample\ \&11.\ \&\fR Password:: c2FtYmEy 206 The user\*(Aqs password\&. This would be provided by a network client, if the helper is being used in a legacy situation that exposes plaintext passwords in this way\&. 207 .PP 208 Examples: 209 .RS 4 210 Password: samba2 211 .sp 212 Password:: c2FtYmEy 213 .RE 173 214 .RE 174 215 .PP … … 176 217 .RS 4 177 218 Upon successful authenticaiton, return the user session key associated with the login\&. 178 .PP \fBExample\ \&12.\ \&\fR Request\-User\-Session\-Key: Yes 219 .PP 220 Examples: 221 .RS 4 222 Request\-User\-Session\-Key: Yes 223 .RE 179 224 .RE 180 225 .PP … … 182 227 .RS 4 183 228 Upon successful authenticaiton, return the LANMAN session key associated with the login\&. 184 .PP \fBExample\ \&13.\ \&\fR Request\-LanMan\-Session\-Key: Yes 185 .RE 229 .PP 230 Examples: 231 .RS 4 232 Request\-LanMan\-Session\-Key: Yes 233 .RE 234 .RE 235 .RE 236 .sp 186 237 .if n \{\ 187 238 .sp … … 196 247 .ps -1 197 248 .br 198 Implementers should take care to base64 encode 199 any data (such as usernames/passwords) that may contain malicous user data, such as 200 a newline\&. They may also need to decode strings from 201 the helper, which likewise may have been base64 encoded\&..sp .5v 202 .RE 249 Implementers should take care to base64 encode any data (such as usernames/passwords) that may contain malicous user data, such as a newline\&. They may also need to decode strings from the helper, which likewise may have been base64 encoded\&. 250 .sp .5v 203 251 .RE 204 252 .RE … … 236 284 \-\-password=PASSWORD 237 285 .RS 4 238 User\ 's plaintext password286 User\*(Aqs plaintext password 239 287 .sp 240 288 If not specified on the command line, this is prompted for when required\&. … … 275 323 .sp 276 324 Note that specifying this parameter here will override the 277 \m[blue]\fB \%smb.conf.5.html#\fR\m[]325 \m[blue]\fBlog level\fR\m[] 278 326 parameter in the 279 327 smb\&.conf … … 350 398 .\} 351 399 .nf 352 auth_param ntlm program ntlm_auth \-\-helper\-protocol=squid\-2\&.5\-ntlmssp \-\-require\-membership\-of=\ 'WORKGROUP\eDomain Users\'353 auth_param basic program ntlm_auth \-\-helper\-protocol=squid\-2\&.5\-basic \-\-require\-membership\-of=\ 'WORKGROUP\eDomain Users\'400 auth_param ntlm program ntlm_auth \-\-helper\-protocol=squid\-2\&.5\-ntlmssp \-\-require\-membership\-of=\*(AqWORKGROUP\eDomain Users\*(Aq 401 auth_param basic program ntlm_auth \-\-helper\-protocol=squid\-2\&.5\-basic \-\-require\-membership\-of=\*(AqWORKGROUP\eDomain Users\*(Aq 354 402 .fi 355 403 .if n \{\ … … 358 406 .SH "TROUBLESHOOTING" 359 407 .PP 360 If you\ 're experiencing problems with authenticating Internet Explorer running under MS Windows 9X or Millennium Edition against ntlm_auth\'s NTLMSSP authentication helper (\-\-helper\-protocol=squid\-2\&.5\-ntlmssp), then please read408 If you\*(Aqre experiencing problems with authenticating Internet Explorer running under MS Windows 9X or Millennium Edition against ntlm_auth\*(Aqs NTLMSSP authentication helper (\-\-helper\-protocol=squid\-2\&.5\-ntlmssp), then please read 361 409 the Microsoft Knowledge Base article #239869 and follow instructions described there\&. 362 410 .SH "VERSION"
Note:
See TracChangeset
for help on using the changeset viewer.