Changeset 988 for vendor/current/docs


Ignore:
Timestamp:
Nov 24, 2016, 1:14:11 PM (9 years ago)
Author:
Silvan Scherrer
Message:

Samba Server: update vendor to version 4.4.3

Location:
vendor/current/docs
Files:
22 added
16 deleted
73 edited

Legend:

Unmodified
Added
Removed
  • vendor/current/docs/manpages/dbwrap_tool.1

    r860 r988  
    22.\"     Title: dbwrap_tool
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "DBWRAP_TOOL" "1" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "DBWRAP_TOOL" "1" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 dbwrap_tool {<database>} {<operation>} [<key>\ [<type>\ [<value>]\ ]]
     34dbwrap_tool [\-\-persistent] [\-\-non\-persistent] [\-d\ <debug\ level>] [\-s\ <config\ file>] [\-l\ <log\ file\ base>] [\-V] [\-\-option=<name>=<value>] {<database>} {<operation>} [<key>\ [<type>\ [<value>]]]
    3535.SH "DESCRIPTION"
    3636.PP
     
    8484.IP \(bu 2.3
    8585.\}
     86exists: test for existence of a record
     87.RE
     88.sp
     89.RS 4
     90.ie n \{\
     91\h'-04'\(bu\h'+03'\c
     92.\}
     93.el \{\
     94.sp -1
     95.IP \(bu 2.3
     96.\}
    8697erase: remove all records
    8798.RE
     
    98109.RE
    99110.sp
     111.RS 4
     112.ie n \{\
     113\h'-04'\(bu\h'+03'\c
     114.\}
     115.el \{\
     116.sp -1
     117.IP \(bu 2.3
     118.\}
     119listwatchers: list processes, which are waiting for changes in a record
     120.RE
     121.sp
    100122.RE
    101123.PP
     
    135157.RE
    136158.sp
     159.RS 4
     160.ie n \{\
     161\h'-04'\(bu\h'+03'\c
     162.\}
     163.el \{\
     164.sp -1
     165.IP \(bu 2.3
     166.\}
     167hex: hex strings like "68656C6C6F20776F726C6400" ("hello world")
     168.RE
     169.sp
    137170.RE
    138171.SH "OPTIONS"
    139172.PP
    140 None\&.
     173\-\-persistent
     174.RS 4
     175Open the database as a persistent database\&.
     176.sp
     177Exactly one of \-\-persistent and \-\-non\-persistent must be specified\&.
     178.RE
     179.PP
     180\-\-non\-persistent
     181.RS 4
     182Open the database as a non\-persistent database\&.
     183.sp
     184Caveat: opening a database as non\-persistent when there is currently no other opener will wipe the database\&.
     185.sp
     186Exactly one of \-\-persistent and \-\-non\-persistent must be specified\&.
     187.RE
    141188.SH "COMMANDS"
    142189.SS "fetch"
     
    152199dbwrap_tool <database> delete <key>
    153200               
     201.SS "exists"
     202.HP \w'\ 'u
     203dbwrap_tool <database> exists <key>
     204               
    154205.SS "erase"
    155206.HP \w'\ 'u
    156 dbwrap_tool <database> erase
    157                
     207dbwrap_tool <database> erase
    158208.SS "listkeys"
    159209.HP \w'\ 'u
    160210dbwrap_tool <database> listkeys
    161211               
     212.SS "listwatchers"
     213.HP \w'\ 'u
     214dbwrap_tool <database> listwatchers
     215               
    162216.SH "EXAMPLES"
    163217.PP
     
    165219.RS 4
    166220dbwrap_tool
    167 winbindd_idmap\&.tdb listkeys
     221\-\-persistent winbindd_idmap\&.tdb listkeys
    168222.RE
    169223.PP
     
    171225.RS 4
    172226dbwrap_tool
    173 winbindd_idmap\&.tdb fetch "USER HWM" uint32
     227\-\-persistent winbindd_idmap\&.tdb fetch "USER HWM" uint32
    174228.RE
    175229.PP
     
    177231.RS 4
    178232dbwrap_tool
    179 winbindd_idmap\&.tdb remove "USER HWM"
     233\-\-persistent winbindd_idmap\&.tdb remove "USER HWM"
    180234.RE
    181235.PP
    182236Store and overwrite record "USER HWM" with value 214
    183237.RS 4
    184 dbwrap_tool
    185 winbindd_idmap\&.tdb store "USER HWM" uint32 214
     238uint32:
     239dbwrap_tool
     240\-\-persistent winbindd_idmap\&.tdb store "USER HWM" uint32 214
     241hex:
     242dbwrap_tool
     243\-\-persistent winbindd_idmap\&.tdb store "USER HWM" hex D6000000
    186244.RE
    187245.SH "NOTES"
  • vendor/current/docs/manpages/eventlogadm.8

    r860 r988  
    22.\"     Title: eventlogadm
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "EVENTLOGADM" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "EVENTLOGADM" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    106106.IP \(bu 2.3
    107107.\}
    108 
    109108LEN
    110109\- This field should be 0, since
     
    121120.IP \(bu 2.3
    122121.\}
    123 
    124122RS1
    125123\- This must be the value 1699505740\&.
     
    134132.IP \(bu 2.3
    135133.\}
    136 
    137134RCN
    138135\- This field should be 0\&.
     
    147144.IP \(bu 2.3
    148145.\}
    149 
    150146TMG
    151147\- The time the eventlog record was generated; format is the number of seconds since 00:00:00 January 1, 1970, UTC\&.
     
    160156.IP \(bu 2.3
    161157.\}
    162 
    163158TMW
    164159\- The time the eventlog record was written; format is the number of seconds since 00:00:00 January 1, 1970, UTC\&.
     
    173168.IP \(bu 2.3
    174169.\}
    175 
    176170EID
    177171\- The eventlog ID\&.
     
    186180.IP \(bu 2.3
    187181.\}
    188 
    189182ETP
    190183\- The event type \-\- one of "INFO", "ERROR", "WARNING", "AUDIT SUCCESS" or "AUDIT FAILURE"\&.
     
    199192.IP \(bu 2.3
    200193.\}
    201 
    202194ECT
    203195\- The event category; this depends on the message file\&. It is primarily used as a means of filtering in the eventlog viewer\&.
     
    212204.IP \(bu 2.3
    213205.\}
    214 
    215206RS2
    216207\- This field should be 0\&.
     
    225216.IP \(bu 2.3
    226217.\}
    227 
    228218CRN
    229219\- This field should be 0\&.
     
    238228.IP \(bu 2.3
    239229.\}
    240 
    241230USL
    242231\- This field should be 0\&.
     
    251240.IP \(bu 2.3
    252241.\}
    253 
    254242SRC
    255243\- This field contains the source name associated with the event log\&. If a message file is used with an event log, there will be a registry entry for associating this source name with a message file DLL\&.
     
    264252.IP \(bu 2.3
    265253.\}
    266 
    267254SRN
    268255\- The name of the machine on which the eventlog was generated\&. This is typically the host name\&.
     
    277264.IP \(bu 2.3
    278265.\}
    279 
    280266STR
    281267\- The text associated with the eventlog\&. There may be more than one string in a record\&.
     
    290276.IP \(bu 2.3
    291277.\}
    292 
    293278DAT
    294279\- This field should be left unset\&.
  • vendor/current/docs/manpages/findsmb.1

    r860 r988  
    22.\"     Title: findsmb
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "FINDSMB" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "FINDSMB" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/idmap_ad.8

    r860 r988  
    22.\"     Title: idmap_ad
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "IDMAP_AD" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "IDMAP_AD" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3434The idmap_ad plugin provides a way for Winbind to read id mappings from an AD server that uses RFC2307/SFU schema extensions\&. This module implements only the "idmap" API, and is READONLY\&. Mappings must be provided in advance by the administrator by adding the uidNumber attributes for users and gidNumber attributes for groups in the AD\&. Winbind will only map users that have a uidNumber and whose primary group have a gidNumber attribute set\&. It is however recommended that all groups in use have gidNumber attributes assigned, otherwise they are not working\&.
    3535.PP
    36 Note that the idmap_ad module has changed considerably since Samba versions 3\&.0 and 3\&.2\&. Currently, the
     36Currently, the
    3737\fIad\fR
    38 backend does not work as the the default idmap backend, but one has to configure it separately for each domain for which one wants to use it, using disjoint ranges\&. One usually needs to configure a writeable default idmap range, using for example the
     38backend does not work as the default idmap backend, but one has to configure it separately for each domain for which one wants to use it, using disjoint ranges\&. One usually needs to configure a writeable default idmap range, using for example the
    3939\fItdb\fR
    4040or
     
    4949.RE
    5050.PP
    51 schema_mode = <rfc2307 | sfu >
     51schema_mode = <rfc2307 | sfu | sfu20>
    5252.RS 4
    53 Defines the schema that idmap_ad should use when querying Active Directory regarding user and group information\&. This can be either the RFC2307 schema support included in Windows 2003 R2 or the Service for Unix (SFU) schema\&.
     53Defines the schema that idmap_ad should use when querying Active Directory regarding user and group information\&. This can be either the RFC2307 schema support included in Windows 2003 R2 or the Service for Unix (SFU) schema\&. For SFU 3\&.0 or 3\&.5 please choose "sfu", for SFU 2\&.0 please choose "sfu20"\&. Please note that primary group membership is currently always calculated via the "primaryGroupID" LDAP attribute\&.
    5454.RE
    5555.SH "EXAMPLES"
     
    6262.nf
    6363        [global]
     64        workgroup = CORP
     65
    6466        idmap config * : backend = tdb
    6567        idmap config * : range = 1000000\-1999999
  • vendor/current/docs/manpages/idmap_autorid.8

    r860 r988  
    22.\"     Title: idmap_autorid
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "IDMAP_AUTORID" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "IDMAP_AUTORID" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    4141.SH "IDMAP OPTIONS"
    4242.PP
     43range = low \- high
     44.RS 4
     45Defines the available matching uid and gid range for which the backend is authoritative\&. Note that the range acts as a filter\&. If algorithmically determined UID or GID fall outside the range, they are ignored and the corresponding map is discarded\&. It is intended as a way to avoid accidental UID/GID overlaps between local and remotely defined IDs\&.
     46.RE
     47.PP
    4348rangesize = numberofidsperdomain
    4449.RS 4
    45 Defines the available number of uids/gids per domain\&. The minimum needed value is 2000\&. SIDs with RIDs larger than this value cannot be mapped, are ignored and the corresponding map is discarded\&. Choose this value carefully, as this should not be changed after the first ranges for domains have been defined, otherwise mappings between domains will get intermixed leading to unpredictable results\&. Please note that RIDs in Windows Domains usually start with 500 for builtin users and 1000 for regular users\&. As the parameter cannot be changed later, please plan accordingly for your expected number of users in a domain with safety margins\&.
     50Defines the number of uids/gids available per domain range\&. The minimum needed value is 2000\&. SIDs with RIDs larger than this value will be mapped into extension ranges depending upon number of available ranges\&. If the autorid backend runs out of available ranges, mapping requests for new domains (or new extension ranges for domains already known) are ignored and the corresponding map is discarded\&.
    4651.sp
    47 One range will be used for local users and groups\&. Thus the number of local users and groups that can be created is limited by this option as well\&. If you plan to create a large amount of local users or groups, you will need set this parameter accordingly\&.
     52Example: with rangesize set to 10000, users/groups with a RID up to 10000 will be put into the first range for the domain\&. When attempting to map the an object with a RID of 25000, an extension range will be allocated that will then be used to map all RIDs from 20000\-29999\&.
     53.sp
     54One range will be used for local users and groups and for non\-domain well\-known SIDs like Everyone (S\-1\-1\-0) or Creator Owner (S\-1\-3\-0)\&. A chosen list of well\-known SIDs will be preallocated on first start to create deterministic mappings for those\&.
     55.sp
     56Thus the number of local users and groups that can be created is limited by this option as well\&. If you plan to create a large amount of local users or groups, you will need set this parameter accordingly\&.
    4857.sp
    4958The default value is 100000\&.
     59.RE
     60.PP
     61read only = [ yes | no ]
     62.RS 4
     63Turn the module into read\-only mode\&. No new ranges will be allocated nor will new mappings be created in the idmap pool\&. Defaults to no\&.
     64.RE
     65.PP
     66ignore builtin = [ yes | no ]
     67.RS 4
     68Ignore any mapping requests for the BUILTIN domain\&. Defaults to no\&.
    5069.RE
    5170.SH "THE MAPPING FORMULAS"
     
    5776.\}
    5877.nf
    59                         ID = IDMAP UID LOW VALUE + DOMAINRANGENUMBER * RANGESIZE + RID
     78                        ID =  REDUCED RID + IDMAP RANGE LOW VALUE + RANGE NUMBER * RANGE SIZE
    6079               
    6180.fi
     
    6382.RE
    6483.\}
     84.sp
     85where REDUCED RID = RID % RANGE_SIZE and a DOMAIN RANGE INDEX = RID / RANGE_SIZE is used together with the domain sid to determine the RANGE NUMBER (stored in the database)\&.
    6586.PP
    6687Correspondingly, the formula for calculating the RID for a given Unix ID is this:
     
    7091.\}
    7192.nf
    72                         RID = ID \- IDMAP UID LOW VALUE \- DOMAINRANGENUMBER * RANGESIZE
     93                        RID = (ID \- LOW ID) % RANGE SIZE + DOMAIN RANGE INDEX * RANGE SIZE
    7394               
    7495.fi
     
    7798.\}
    7899.sp
     100Where the DOMAIN RANGE INDEX is retrieved from the database along with the domain sid by the RANGE NUMBER = (ID \- LOW ID) / RANGE SIZE \&.
    79101.SH "EXAMPLES"
    80102.PP
    81 This example shows you the minimal configuration that will work for the principial domain and 19 trusted domains\&.
     103This example shows you the minimal configuration that will work for the principal domain and 19 trusted domains / range extensions\&.
    82104.sp
    83105.if n \{\
  • vendor/current/docs/manpages/idmap_hash.8

    r860 r988  
    22.\"     Title: idmap_hash
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "IDMAP_HASH" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "IDMAP_HASH" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/idmap_ldap.8

    r860 r988  
    22.\"     Title: idmap_ldap
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "IDMAP_LDAP" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "IDMAP_LDAP" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/idmap_nss.8

    r860 r988  
    22.\"     Title: idmap_nss
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "IDMAP_NSS" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "IDMAP_NSS" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/idmap_rid.8

    r860 r988  
    22.\"     Title: idmap_rid
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "IDMAP_RID" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "IDMAP_RID" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3434The idmap_rid backend provides a way to use an algorithmic mapping scheme to map UIDs/GIDs and SIDs\&. No database is required in this case as the mapping is deterministic\&.
    3535.PP
    36 Note that the idmap_rid module has changed considerably since Samba versions 3\&.0\&. and 3\&.2\&. Currently, there should to be an explicit idmap configuration for each domain that should use the idmap_rid backend, using disjoint ranges\&. One usually needs to define a writeable default idmap range, using a backent like
     36Note that the idmap_rid module has changed considerably since Samba versions 3\&.0\&. and 3\&.2\&. Currently, there should to be an explicit idmap configuration for each domain that should use the idmap_rid backend, using disjoint ranges\&. One usually needs to define a writeable default idmap range, using a backend like
    3737\fItdb\fR
    3838or
     
    5252base_rid = INTEGER
    5353.RS 4
    54 Defines the base integer used to build SIDs out of a UID or a GID, and to rebase the UID or GID to be obtained from a SID\&. This means SIDs with a RID less than the base rid are filtered\&. The default is not to restrict the allowed rids at all, i\&.e\&. a base_rid value of 0\&. A good value for the base_rid can be 1000, since user RIDs by default start at 1000 (512 hexadecimal)\&.
     54Defines the base integer used to build SIDs out of a UID or a GID, and to rebase the UID or GID to be obtained from a SID\&. This means SIDs with a RID less than the base rid are filtered\&. The default is not to restrict the allowed rids at all, i\&.e\&. a base_rid value of 0\&.
    5555.sp
    5656Use of this parameter is deprecated\&.
     
    104104        idmap config TRUSTED : backend  = rid
    105105        idmap config TRUSTED : range    = 50000 \- 99999
    106         idmap config TRUSTED : base_rid = 1000
    107106       
    108107.fi
  • vendor/current/docs/manpages/idmap_tdb.8

    r860 r988  
    22.\"     Title: idmap_tdb
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "IDMAP_TDB" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "IDMAP_TDB" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/idmap_tdb2.8

    r860 r988  
    22.\"     Title: idmap_tdb2
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "IDMAP_TDB2" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "IDMAP_TDB2" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/libsmbclient.7

    r860 r988  
    22.\"     Title: libsmbclient
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: 7
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "LIBSMBCLIENT" "7" "09/18/2013" "Samba 3\&.6" "7"
     10.TH "LIBSMBCLIENT" "7" "05/02/2016" "Samba 4\&.4" "7"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    4141suite\&.
    4242.PP
    43 
    4443libsmbclient
    4544is a library toolset that permits applications to manipulate CIFS/SMB network resources using many of the standards POSIX functions available for manipulating local UNIX/Linux files\&. It permits much more than just browsing, files can be opened and read or written, permissions changed, file times modified, attributes and ACL\*(Aqs can be manipulated, and so on\&. Of course, its functionality includes all the capabilities commonly called browsing\&.
    4645.PP
    47 
    4846libsmbclient
    4947can not be used directly from the command line, instead it provides an extension of the capabilities of tools such as file managers and browsers\&. This man page describes the configuration options for this tool so that the user may obtain greatest utility of use\&.
     
    7876to it\&.
    7977.PP
    80 
    8178libsmbclient
    8279will check the users shell environment for the
  • vendor/current/docs/manpages/lmhosts.5

    r860 r988  
    22.\"     Title: lmhosts
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: File Formats and Conventions
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "LMHOSTS" "5" "09/18/2013" "Samba 3\&.6" "File Formats and Conventions"
     10.TH "LMHOSTS" "5" "05/02/2016" "Samba 4\&.4" "File Formats and Conventions"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/log2pcap.1

    r860 r988  
    22.\"     Title: log2pcap
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "LOG2PCAP" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "LOG2PCAP" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    7474Name of the output file to write the pcap (or hexdump) data to\&. If this argument is not specified, output data will be written to stdout\&.
    7575.RE
    76 .PP
    77 \-h|\-\-help
    78 .RS 4
    79 Print a summary of command line options\&.
    80 .RE
    8176.SH "EXAMPLES"
    8277.PP
  • vendor/current/docs/manpages/net.8

    r860 r988  
    22.\"     Title: net
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "NET" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "NET" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 net {<ads|rap|rpc>} [\-h] [\-w\ workgroup] [\-W\ myworkgroup] [\-U\ user] [\-I\ ip\-address] [\-p\ port] [\-n\ myname] [\-s\ conffile] [\-S\ server] [\-l] [\-P] [\-d\ debuglevel] [\-V] [\-\-request\-timeout\ seconds]
     34net {<ads|rap|rpc>} [\-h|\-\-help] [\-w|\-\-workgroup\ workgroup] [\-W|\-\-myworkgroup\ myworkgroup] [\-U|\-\-user\ user] [\-I|\-\-ipaddress\ ip\-address] [\-p|\-\-port\ port] [\-n\ myname] [\-s\ conffile] [\-S|\-\-server\ server] [\-l|\-\-long] [\-v|\-\-verbose] [\-f|\-\-force] [\-P|\-\-machine\-pass] [\-d\ debuglevel] [\-V] [\-\-request\-timeout\ seconds] [\-t|\-\-timeout\ seconds] [\-i|\-\-stdin] [\-\-tallocreport]
    3535.SH "DESCRIPTION"
    3636.PP
     
    4242.SH "OPTIONS"
    4343.PP
    44 \-h|\-\-help
    45 .RS 4
    46 Print a summary of command line options\&.
    47 .RE
    48 .PP
    49 \-k|\-\-kerberos
    50 .RS 4
    51 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&.
    52 .RE
    53 .PP
    54 \-w target\-workgroup
     44\-w|\-\-workgroup target\-workgroup
    5545.RS 4
    5646Sets target workgroup or domain\&. You have to specify either this option or the IP address or the name of a server\&.
    5747.RE
    5848.PP
    59 \-W workgroup
     49\-W|\-\-myworkgroup workgroup
    6050.RS 4
    6151Sets client workgroup or domain
    6252.RE
    6353.PP
    64 \-U user
     54\-U|\-\-user user
    6555.RS 4
    6656User name to use
    6757.RE
    6858.PP
    69 \-I ip\-address
     59\-I|\-\-ipaddress ip\-address
    7060.RS 4
    7161IP address of target server to use\&. You have to specify either this option or a target workgroup or a target server\&.
    7262.RE
    7363.PP
    74 \-p port
     64\-p|\-\-port port
    7565.RS 4
    7666Port on the target server to connect to (usually 139 or 445)\&. Defaults to trying 445 first, then 139\&.
    7767.RE
    7868.PP
    79 \-n|\-\-netbiosname <primary NetBIOS name>
    80 .RS 4
    81 This option allows you to override the NetBIOS name that Samba uses for itself\&. This is identical to setting the
    82 \m[blue]\fBnetbios name\fR\m[]
    83 parameter in the
    84 smb\&.conf
    85 file\&. However, a command line setting will take precedence over settings in
    86 smb\&.conf\&.
    87 .RE
    88 .PP
    89 \-s|\-\-configfile <configuration file>
    90 .RS 4
    91 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    92 smb\&.conf
    93 for more information\&. The default configuration file name is determined at compile time\&.
    94 .RE
    95 .PP
    96 \-S server
     69\-S|\-\-server server
    9770.RS 4
    9871Name of target server\&. You should specify either this option or a target workgroup or a target IP address\&.
    9972.RE
    10073.PP
    101 \-l
     74\-l|\-\-long
    10275.RS 4
    10376When listing data, give more information on each item\&.
    10477.RE
    10578.PP
    106 \-P
     79\-v|\-\-verbose
     80.RS 4
     81When listing data, give more verbose information on each item\&.
     82.RE
     83.PP
     84\-f|\-\-force
     85.RS 4
     86Enforcing a net command\&.
     87.RE
     88.PP
     89\-P|\-\-machine\-pass
    10790.RS 4
    10891Make queries to the external server using the machine account of the local server\&.
     
    11497.RE
    11598.PP
    116 \-d|\-\-debuglevel=level
    117 .RS 4
    118 \fIlevel\fR
    119 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    120 .sp
    121 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    122 .sp
    123 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    124 .sp
    125 Note that specifying this parameter here will override the
    126 \m[blue]\fBlog level\fR\m[]
    127 parameter in the
    128 smb\&.conf
    129 file\&.
     99\-t|\-\-timeout 30
     100.RS 4
     101Set timeout for client operations to 30 seconds\&.
     102.RE
     103.PP
     104\-\-use\-ccache
     105.RS 4
     106Try to use the credentials cached by winbind\&.
     107.RE
     108.PP
     109\-i|\-\-stdin
     110.RS 4
     111Take input for net commands from standard input\&.
     112.RE
     113.PP
     114\-\-tallocreport
     115.RS 4
     116Generate a talloc report while processing a net command\&.
     117.RE
     118.PP
     119\-T|\-\-test
     120.RS 4
     121Only test command sequence, dry\-run\&.
     122.RE
     123.PP
     124\-F|\-\-flags FLAGS
     125.RS 4
     126Pass down integer flags to a net subcommand\&.
     127.RE
     128.PP
     129\-C|\-\-comment COMMENT
     130.RS 4
     131Pass down a comment string to a net subcommand\&.
     132.RE
     133.PP
     134\-n|\-\-myname MYNAME
     135.RS 4
     136Use MYNAME as a requester name for a net subcommand\&.
     137.RE
     138.PP
     139\-c|\-\-container CONTAINER
     140.RS 4
     141Use a specific AD container for net ads operations\&.
     142.RE
     143.PP
     144\-M|\-\-maxusers MAXUSERS
     145.RS 4
     146Fill in the maxusers field in net rpc share operations\&.
     147.RE
     148.PP
     149\-r|\-\-reboot
     150.RS 4
     151Reboot a remote machine after a command has been successfully executed (e\&.g\&. in remote join operations)\&.
     152.RE
     153.PP
     154\-\-force\-full\-repl
     155.RS 4
     156When calling "net rpc vampire keytab" this option enforces a full re\-creation of the generated keytab file\&.
     157.RE
     158.PP
     159\-\-single\-obj\-repl
     160.RS 4
     161When calling "net rpc vampire keytab" this option allows one to replicate just a single object to the generated keytab file\&.
     162.RE
     163.PP
     164\-\-clean\-old\-entries
     165.RS 4
     166When calling "net rpc vampire keytab" this option allows one to cleanup old entries from the generated keytab file\&.
     167.RE
     168.PP
     169\-\-db
     170.RS 4
     171Define dbfile for "net idmap" commands\&.
     172.RE
     173.PP
     174\-\-lock
     175.RS 4
     176Activates locking of the dbfile for "net idmap check" command\&.
     177.RE
     178.PP
     179\-a|\-\-auto
     180.RS 4
     181Activates noninteractive mode in "net idmap check"\&.
     182.RE
     183.PP
     184\-\-repair
     185.RS 4
     186Activates repair mode in "net idmap check"\&.
     187.RE
     188.PP
     189\-\-acls
     190.RS 4
     191Includes ACLs to be copied in "net rpc share migrate"\&.
     192.RE
     193.PP
     194\-\-attrs
     195.RS 4
     196Includes file attributes to be copied in "net rpc share migrate"\&.
     197.RE
     198.PP
     199\-\-timestamps
     200.RS 4
     201Includes timestamps to be copied in "net rpc share migrate"\&.
     202.RE
     203.PP
     204\-X|\-\-exclude DIRECTORY
     205.RS 4
     206Allows one to exclude directories when copying with "net rpc share migrate"\&.
     207.RE
     208.PP
     209\-\-destination SERVERNAME
     210.RS 4
     211Defines the target servername of migration process (defaults to localhost)\&.
     212.RE
     213.PP
     214\-L|\-\-local
     215.RS 4
     216Sets the type of group mapping to local (used in "net groupmap set")\&.
     217.RE
     218.PP
     219\-D|\-\-domain
     220.RS 4
     221Sets the type of group mapping to domain (used in "net groupmap set")\&.
     222.RE
     223.PP
     224\-N|\-\-ntname NTNAME
     225.RS 4
     226Sets the ntname of a group mapping (used in "net groupmap set")\&.
     227.RE
     228.PP
     229\-R|\-\-rid RID
     230.RS 4
     231Sets the rid of a group mapping (used in "net groupmap set")\&.
     232.RE
     233.PP
     234\-\-reg\-version REG_VERSION
     235.RS 4
     236Assume database version {n|1,2,3} (used in "net registry check")\&.
     237.RE
     238.PP
     239\-o|\-\-output FILENAME
     240.RS 4
     241Output database file (used in "net registry check")\&.
     242.RE
     243.PP
     244\-\-wipe
     245.RS 4
     246Create a new database from scratch (used in "net registry check")\&.
     247.RE
     248.PP
     249\-\-precheck PRECHECK_DB_FILENAME
     250.RS 4
     251Defines filename for database prechecking (used in "net registry import")\&.
     252.RE
     253.PP
     254\-\-no\-dns\-updates
     255.RS 4
     256Do not perform DNS updates as part of "net ads join"\&.
    130257.RE
    131258.SH "COMMANDS"
     
    142269Without any options, the
    143270NET TIME
    144 command displays the time on the remote server\&.
     271command displays the time on the remote server\&. The remote server must be specified with the \-S option\&.
    145272.SS "TIME SYSTEM"
    146273.PP
    147274Displays the time on the remote server in a format ready for
    148 /bin/date\&.
     275/bin/date\&. The remote server must be specified with the \-S option\&.
    149276.SS "TIME SET"
    150277.PP
    151278Tries to set the date and time of the local server to that on the remote server using
    152 /bin/date\&.
     279/bin/date\&. The remote server must be specified with the \-S option\&.
    153280.SS "TIME ZONE"
    154281.PP
    155 Displays the timezone in hours from GMT on the remote computer\&.
    156 .SS "[RPC|ADS] JOIN [TYPE] [\-U username[%password]] [createupn=UPN] [createcomputer=OU] [options]"
     282Displays the timezone in hours from GMT on the remote server\&. The remote server must be specified with the \-S option\&.
     283.SS "[RPC|ADS] JOIN [TYPE] [\-\-no\-dns\-updates] [\-U username[%password]] [createupn=UPN] [createcomputer=OU] [machinepass=PASS] [osName=string osVer=string] [options]"
    157284.PP
    158285Join a domain\&. If the account already exists on the server, and [TYPE] is MEMBER, the machine will attempt to join automatically\&. (Assuming that the machine has been created in server manager) Otherwise, a password will be prompted for, and a new account may be created\&.
     
    163290.PP
    164291[OU] (ADS only) Precreate the computer account in a specific OU\&. The OU string reads from top to bottom without RDNs, and is delimited by a \*(Aq/\*(Aq\&. Please note that \*(Aq\e\*(Aq is used for escape by both the shell and ldap, so it may need to be doubled or quadrupled to pass through, and it is not used as a delimiter\&.
     292.PP
     293[PASS] (ADS only) Set a specific password on the computer account being created by the join\&.
     294.PP
     295[osName=string osVer=String] (ADS only) Set the operatingSystem and operatingSystemVersion attribute during the join\&. Both parameters must be specified for either to take effect\&.
    165296.SS "[RPC] OLDJOIN [options]"
    166297.PP
     
    249380.PP
    250381Validate whether the specified user can log in to the remote server\&. If the password is not specified on the commandline, it will be prompted\&.
    251 .if n \{\
    252 .sp
    253 .\}
    254 .RS 4
    255 .it 1 an-trap
    256 .nr an-no-space-flag 1
    257 .nr an-break-flag 1
    258 .br
    259 .ps +1
    260 \fBNote\fR
    261 .ps -1
    262 .br
    263 .PP
    264 Currently NOT implemented\&.
    265 .sp .5v
    266 .RE
    267382.SS "RAP GROUPMEMBER"
    268383.SS "RAP GROUPMEMBER LIST GROUP"
     
    280395\fIcommand\fR
    281396on the remote server\&. Only works with OS/2 servers\&.
    282 .if n \{\
    283 .sp
    284 .\}
    285 .RS 4
    286 .it 1 an-trap
    287 .nr an-no-space-flag 1
    288 .nr an-break-flag 1
    289 .br
    290 .ps +1
    291 \fBNote\fR
    292 .ps -1
    293 .br
    294 .PP
    295 Currently NOT implemented\&.
    296 .sp .5v
    297 .RE
    298397.SS "RAP SERVICE"
    299398.SS "RAP SERVICE START NAME [arguments...]"
    300399.PP
    301400Start the specified service on the remote server\&. Not implemented yet\&.
    302 .if n \{\
    303 .sp
    304 .\}
    305 .RS 4
    306 .it 1 an-trap
    307 .nr an-no-space-flag 1
    308 .nr an-break-flag 1
    309 .br
    310 .ps +1
    311 \fBNote\fR
    312 .ps -1
    313 .br
    314 .PP
    315 Currently NOT implemented\&.
    316 .sp .5v
    317 .RE
    318401.SS "RAP SERVICE STOP"
    319402.PP
    320403Stop the specified service on the remote server\&.
    321 .if n \{\
    322 .sp
    323 .\}
    324 .RS 4
    325 .it 1 an-trap
    326 .nr an-no-space-flag 1
    327 .nr an-break-flag 1
    328 .br
    329 .ps +1
    330 \fBNote\fR
    331 .ps -1
    332 .br
    333 .PP
    334 Currently NOT implemented\&.
    335 .sp .5v
    336 .RE
    337404.SS "RAP PASSWORD \fIUSER\fR \fIOLDPASS\fR \fINEWPASS\fR"
    338405.PP
     
    508575.SS "GROUPMAP MODIFY"
    509576.PP
    510 Update en existing group entry\&.
    511 .PP
    512 
    513 .sp
     577Update an existing group entry\&.
     578.PP
    514579.if n \{\
    515580.RS 4
     
    565630.PP
    566631List all interdomain trust relationships\&.
    567 .SS "RPC TRUSTDOM LIST"
    568 .PP
    569 List all interdomain trust relationships\&.
    570632.SS "RPC TRUST"
    571633.SS "RPC TRUST CREATE"
    572634.PP
    573 Create a trust trust object by calling lsaCreateTrustedDomainEx2\&. The can be done on a single server or on two servers at once with the possibility to use a random trust password\&.
     635Create a trust object by calling lsaCreateTrustedDomainEx2\&. The can be done on a single server or on two servers at once with the possibility to use a random trust password\&.
    574636.PP
    575637\fBOptions:\fR
     
    644706.SS "RPC TRUST DELETE"
    645707.PP
    646 Delete a trust trust object by calling lsaDeleteTrustedDomain\&. The can be done on a single server or on two servers at once\&.
     708Delete a trust object by calling lsaDeleteTrustedDomain\&. The can be done on a single server or on two servers at once\&.
    647709.PP
    648710\fBOptions:\fR
     
    735797.SS "RPC VAMPIRE"
    736798.PP
    737 Export users, aliases and groups from remote server to local server\&. You need to run this against the PDC, from a Samba machine joined as a BDC\&.
     799Export users, aliases and groups from remote server to local server\&. You need to run this against the PDC, from a Samba machine joined as a BDC\&. This vampire command cannot be used against an Active Directory, only against an NT4 Domain Controller\&.
    738800.SS "RPC VAMPIRE KEYTAB"
    739801.PP
     
    781843.PP
    782844Print out workgroup name for specified kerberos realm\&.
     845.SS "ADS ENCTYPES"
     846.PP
     847List, modify or delete the value of the "msDS\-SupportedEncryptionTypes" attribute of an account in AD\&.
     848.PP
     849This attribute allows one to control which Kerberos encryption types are used for the generation of initial and service tickets\&. The value consists of an integer bitmask with the following values:
     850.PP
     8510x00000001 DES\-CBC\-CRC
     852.PP
     8530x00000002 DES\-CBC\-MD5
     854.PP
     8550x00000004 RC4\-HMAC
     856.PP
     8570x00000008 AES128\-CTS\-HMAC\-SHA1\-96
     858.PP
     8590x00000010 AES256\-CTS\-HMAC\-SHA1\-96
     860.SS "ADS ENCTYPES LIST \fI<ACCOUNTNAME>\fR"
     861.PP
     862List the value of the "msDS\-SupportedEncryptionTypes" attribute of a given account\&.
     863.PP
     864Example:
     865\fBnet ads enctypes list Computername\fR
     866.SS "ADS ENCTYPES SET \fI<ACCOUNTNAME>\fR \fI[enctypes]\fR"
     867.PP
     868Set the value of the "msDS\-SupportedEncryptionTypes" attribute of the LDAP object of ACCOUNTNAME to a given value\&. If the value is omitted, the value is set to 31 which enables all the currently supported encryption types\&.
     869.PP
     870Example:
     871\fBnet ads enctypes set Computername 24\fR
     872.SS "ADS ENCTYPES DELETE \fI<ACCOUNTNAME>\fR"
     873.PP
     874Deletes the "msDS\-SupportedEncryptionTypes" attribute of the LDAP object of ACCOUNTNAME\&.
     875.PP
     876Example:
     877\fBnet ads enctypes set Computername 24\fR
    783878.SS "SAM CREATEBUILTINGROUP <NAME>"
    784879.PP
     
    874969.PP
    875970Restore the mappings from the specified file or stdin\&.
    876 .SS "IDMAP SECRET <DOMAIN> <secret>"
     971.SS "IDMAP SET SECRET <DOMAIN> <secret>"
    877972.PP
    878973Store a secret for the specified domain, used primarily for domains that use idmap_ldap as a backend\&. In this case the secret is used as the password for the user DN used to bind to the ldap server\&.
    879 .SS "IDMAP DELETE [\-f] [\-\-db=<DB>] <ID>"
     974.SS "IDMAP SET RANGE <RANGE> <SID> [index] [\-\-db=<DB>]"
     975.PP
     976Store a domain\-range mapping for a given domain (and index) in autorid database\&.
     977.SS "IDMAP SET CONFIG <config> [\-\-db=<DB>]"
     978.PP
     979Update CONFIG entry in autorid database\&.
     980.SS "IDMAP GET RANGE <SID> [index] [\-\-db=<DB>]"
     981.PP
     982Get the range for a given domain and index from autorid database\&.
     983.SS "IDMAP GET RANGES [<SID>] [\-\-db=<DB>]"
     984.PP
     985Get ranges for all domains or for one identified by given SID\&.
     986.SS "IDMAP GET CONFIG [\-\-db=<DB>]"
     987.PP
     988Get CONFIG entry from autorid database\&.
     989.SS "IDMAP DELETE MAPPING [\-f] [\-\-db=<DB>] <ID>"
    880990.PP
    881991Delete a mapping sid <\-> gid or sid <\-> uid from the IDMAP database\&. The mapping is given by <ID> which may either be a sid: S\-x\-\&.\&.\&., a gid: "GID number" or a uid: "UID number"\&. Use \-f to delete an invalid partial mapping <ID> \-> xx
     
    884994\fBsmbcontrol\fR(1)
    885995manpage for details\&.
     996.SS "IDMAP DELETE RANGE [\-f] [\-\-db=<TDB>] <RANGE>|(<SID> [<INDEX>])"
     997.PP
     998Delete a domain range mapping identified by \*(AqRANGE\*(Aq or "domain SID and INDEX" from autorid database\&. Use \-f to delete invalid mappings\&.
     999.SS "IDMAP DELETE RANGES [\-f] [\-\-db=<TDB>] <SID>"
     1000.PP
     1001Delete all domain range mappings for a domain identified by SID\&. Use \-f to delete invalid mappings\&.
    8861002.SS "IDMAP CHECK [\-v] [\-r] [\-a] [\-T] [\-f] [\-l] [\-\-db=<DB>]"
    8871003.PP
     
    10011117.PP
    10021118net usershare list on its own list out the names of the user defined shares that were created by the current user, or restricts the list to share names that match the given wildcard pattern (\*(Aq*\*(Aq matches one or more characters, \*(Aq?\*(Aq matches only one character)\&. If the \*(Aq\-l\*(Aq or \*(Aq\-\-long\*(Aq option is also given, it includes the names of user defined shares created by other users\&.
    1003 .SS "CONF"
    1004 .PP
    1005 Starting with version 3\&.2\&.0, a Samba server can be configured by data stored in registry\&. This configuration data can be edited with the new "net conf" commands\&.
     1119.SS "[RPC] CONF"
     1120.PP
     1121Starting with version 3\&.2\&.0, a Samba server can be configured by data stored in registry\&. This configuration data can be edited with the new "net conf" commands\&. There is also the possibility to configure a remote Samba server by enabling the RPC conf mode and specifying the address of the remote server\&.
    10061122.PP
    10071123The deployment of this configuration data can be activated in two levels from the
     
    10211137The conf commands are:
    10221138.RS 4
    1023 net conf list \- Dump the complete configuration in smb\&.conf like
     1139net [rpc] conf list \- Dump the complete configuration in smb\&.conf like
    10241140format\&.
    10251141.RE
    10261142.RS 4
    1027 net conf import \- Import configuration from file in smb\&.conf
     1143net [rpc] conf import \- Import configuration from file in smb\&.conf
    10281144format\&.
    10291145.RE
    10301146.RS 4
    1031 net conf listshares \- List the registry shares\&.
    1032 .RE
    1033 .RS 4
    1034 net conf drop \- Delete the complete configuration from
     1147net [rpc] conf listshares \- List the registry shares\&.
     1148.RE
     1149.RS 4
     1150net [rpc] conf drop \- Delete the complete configuration from
    10351151registry\&.
    10361152.RE
    10371153.RS 4
    1038 net conf showshare \- Show the definition of a registry share\&.
    1039 .RE
    1040 .RS 4
    1041 net conf addshare \- Create a new registry share\&.
    1042 .RE
    1043 .RS 4
    1044 net conf delshare \- Delete a registry share\&.
    1045 .RE
    1046 .RS 4
    1047 net conf setparm \- Store a parameter\&.
    1048 .RE
    1049 .RS 4
    1050 net conf getparm \- Retrieve the value of a parameter\&.
    1051 .RE
    1052 .RS 4
    1053 net conf delparm \- Delete a parameter\&.
    1054 .RE
    1055 .RS 4
    1056 net conf getincludes \- Show the includes of a share definition\&.
    1057 .RE
    1058 .RS 4
    1059 net conf setincludes \- Set includes for a share\&.
    1060 .RE
    1061 .RS 4
    1062 net conf delincludes \- Delete includes from a share definition\&.
    1063 .RE
    1064 .SS "CONF LIST"
     1154net [rpc] conf showshare \- Show the definition of a registry share\&.
     1155.RE
     1156.RS 4
     1157net [rpc] conf addshare \- Create a new registry share\&.
     1158.RE
     1159.RS 4
     1160net [rpc] conf delshare \- Delete a registry share\&.
     1161.RE
     1162.RS 4
     1163net [rpc] conf setparm \- Store a parameter\&.
     1164.RE
     1165.RS 4
     1166net [rpc] conf getparm \- Retrieve the value of a parameter\&.
     1167.RE
     1168.RS 4
     1169net [rpc] conf delparm \- Delete a parameter\&.
     1170.RE
     1171.RS 4
     1172net [rpc] conf getincludes \- Show the includes of a share definition\&.
     1173.RE
     1174.RS 4
     1175net [rpc] conf setincludes \- Set includes for a share\&.
     1176.RE
     1177.RS 4
     1178net [rpc] conf delincludes \- Delete includes from a share definition\&.
     1179.RE
     1180.SS "[RPC] CONF LIST"
    10651181.PP
    10661182Print the configuration data stored in the registry in a smb\&.conf\-like format to standard output\&.
    1067 .SS "CONF IMPORT [--test|-T] filename [section]"
     1183.SS "[RPC] CONF IMPORT [--test|-T] filename [section]"
    10681184.PP
    10691185This command imports configuration from a file in smb\&.conf format\&. If a section encountered in the input file is present in registry, its contents is replaced\&. Sections of registry configuration that have no counterpart in the input file are not affected\&. If you want to delete these, you will have to use the "net conf drop" or "net conf delshare" commands\&. Optionally, a section may be specified to restrict the effect of the import command to that specific section\&. A test mode is enabled by specifying the parameter "\-T" on the commandline\&. In test mode, no changes are made to the registry, and the resulting configuration is printed to standard output instead\&.
    1070 .SS "CONF LISTSHARES"
     1186.SS "[RPC] CONF LISTSHARES"
    10711187.PP
    10721188List the names of the shares defined in registry\&.
    1073 .SS "CONF DROP"
     1189.SS "[RPC] CONF DROP"
    10741190.PP
    10751191Delete the complete configuration data from registry\&.
    1076 .SS "CONF SHOWSHARE sharename"
     1192.SS "[RPC] CONF SHOWSHARE sharename"
    10771193.PP
    10781194Show the definition of the share or section specified\&. It is valid to specify "global" as sharename to retrieve the global configuration options from registry\&.
    1079 .SS "CONF ADDSHARE sharename path [writeable={y|N} [guest_ok={y|N} [comment]]] "
     1195.SS "[RPC] CONF ADDSHARE sharename path [writeable={y|N} [guest_ok={y|N} [comment]]] "
    10801196.PP
    10811197Create a new share definition in registry\&. The sharename and path have to be given\&. The share name may
    10821198\fInot\fR
    10831199be "global"\&. Optionally, values for the very common options "writeable", "guest ok" and a "comment" may be specified\&. The same result may be obtained by a sequence of "net conf setparm" commands\&.
    1084 .SS "CONF DELSHARE sharename"
     1200.SS "[RPC] CONF DELSHARE sharename"
    10851201.PP
    10861202Delete a share definition from registry\&.
    1087 .SS "CONF SETPARM section parameter value"
     1203.SS "[RPC] CONF SETPARM section parameter value"
    10881204.PP
    10891205Store a parameter in registry\&. The section may be global or a sharename\&. The section is created if it does not exist yet\&.
    1090 .SS "CONF GETPARM section parameter"
     1206.SS "[RPC] CONF GETPARM section parameter"
    10911207.PP
    10921208Show a parameter stored in registry\&.
    1093 .SS "CONF DELPARM section parameter"
     1209.SS "[RPC] CONF DELPARM section parameter"
    10941210.PP
    10951211Delete a parameter stored in registry\&.
    1096 .SS "CONF GETINCLUDES section"
     1212.SS "[RPC] CONF GETINCLUDES section"
    10971213.PP
    10981214Get the list of includes for the provided section (global or share)\&.
     
    11011217.PP
    11021218Further note that currently, only files can be included from registry configuration\&. In the future, there will be the ability to include configuration data from other registry keys\&.
    1103 .SS "CONF SETINCLUDES section [filename]+"
     1219.SS "[RPC] CONF SETINCLUDES section [filename]+"
    11041220.PP
    11051221Set the list of includes for the provided section (global or share) to the given list of one or more filenames\&. The filenames may contain the usual smb\&.conf macros like %I\&.
    1106 .SS "CONF DELINCLUDES section"
     1222.SS "[RPC] CONF DELINCLUDES section"
    11071223.PP
    11081224Delete the list of includes from the provided section (global or share)\&.
     
    11601276.RS 4
    11611277net registry convert     \- Convert a registration entries (\&.reg) file\&.
     1278.RE
     1279.RS 4
     1280net registry check       \- Check and repair a registry database\&.
    11621281.RE
    11631282.SS "REGISTRY ENUMERATE key "
     
    12091328or
    12101329\fIdword\fR\&. In case of
    1211 \fImulti_sz\fR
    1212 \fIvalue\fR
     1330\fImulti_sz\fR\fIvalue\fR
    12131331may be given multiple times\&.
    12141332.SS "REGISTRY INCREMENT key name [inc]"
     
    12441362from a Security Descriptor Definition Language (SDDL) string
    12451363\fIsd\fR\&.
    1246 .SS "REGISTRY IMPORT file[opt]"
     1364.SS "REGISTRY IMPORT file [--precheck <check-file>] [opt]"
    12471365.PP
    12481366Import a registration entries (\&.reg)
    12491367\fIfile\fR\&.
     1368.PP
     1369The following options are available:
     1370.PP
     1371\-\-precheck \fIcheck\-file\fR
     1372.RS 4
     1373This is a mechanism to check the existence or non\-existence of certain keys or values specified in a precheck file before applying the import file\&. The import file will only be applied if the precheck succeeds\&.
     1374.sp
     1375The check\-file follows the normal registry file syntax with the following semantics:
     1376.sp
     1377.RS 4
     1378.ie n \{\
     1379\h'-04'\(bu\h'+03'\c
     1380.\}
     1381.el \{\
     1382.sp -1
     1383.IP \(bu 2.3
     1384.\}
     1385<value name>=<value> checks whether the value exists and has the given value\&.
     1386.RE
     1387.sp
     1388.RS 4
     1389.ie n \{\
     1390\h'-04'\(bu\h'+03'\c
     1391.\}
     1392.el \{\
     1393.sp -1
     1394.IP \(bu 2.3
     1395.\}
     1396<value name>=\- checks whether the value does not exist\&.
     1397.RE
     1398.sp
     1399.RS 4
     1400.ie n \{\
     1401\h'-04'\(bu\h'+03'\c
     1402.\}
     1403.el \{\
     1404.sp -1
     1405.IP \(bu 2.3
     1406.\}
     1407[key] checks whether the key exists\&.
     1408.RE
     1409.sp
     1410.RS 4
     1411.ie n \{\
     1412\h'-04'\(bu\h'+03'\c
     1413.\}
     1414.el \{\
     1415.sp -1
     1416.IP \(bu 2.3
     1417.\}
     1418[\-key] checks whether the key does not exist\&.
     1419.RE
     1420.sp
     1421.RE
     1422.RE
    12501423.SS "REGISTRY EXPORT keyfile[opt]"
    12511424.PP
     
    12581431Convert a registration entries (\&.reg) file
    12591432\fIin\fR\&.
     1433.SS "REGISTRY CHECK [-ravTl] [-o <ODB>] [--wipe] [<DB>]"
     1434.PP
     1435Check and repair the registry database\&. If no option is given a read only check of the database is done\&. Among others an interactive or automatic repair mode may be chosen with one of the following options
     1436.PP
     1437\-r|\-\-repair
     1438.RS 4
     1439Interactive repair mode, ask a lot of questions\&.
     1440.RE
     1441.PP
     1442\-a|\-\-auto
     1443.RS 4
     1444Noninteractive repair mode, use default answers\&.
     1445.RE
     1446.PP
     1447\-v|\-\-verbose
     1448.RS 4
     1449Produce more output\&.
     1450.RE
     1451.PP
     1452\-T|\-\-test
     1453.RS 4
     1454Dry run, show what changes would be made but don\*(Aqt touch anything\&.
     1455.RE
     1456.PP
     1457\-l|\-\-lock
     1458.RS 4
     1459Lock the database while doing the check\&.
     1460.RE
     1461.PP
     1462\-\-reg\-version={1,2,3}
     1463.RS 4
     1464Specify the format of the registry database\&. If not given it defaults to the value of the binary or, if an registry\&.tdb is explizitly stated at the commandline, to the value found in the INFO/version record\&.
     1465.RE
     1466.PP
     1467[\-\-db] <DB>
     1468.RS 4
     1469Check the specified database\&.
     1470.RE
     1471.PP
     1472\-o|\-\-output <ODB>
     1473.RS 4
     1474Create a new registry database <ODB> instead of modifying the input\&. If <ODB> is already existing \-\-wipe may be used to overwrite it\&.
     1475.RE
     1476.PP
     1477\-\-wipe
     1478.RS 4
     1479Replace the registry database instead of modifying the input or overwrite an existing output database\&.
     1480.RE
     1481.PP
     1482.RS 4
     1483.RE
    12601484.SS "EVENTLOG"
    12611485.PP
  • vendor/current/docs/manpages/nmbd.8

    r860 r988  
    22.\"     Title: nmbd
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "NMBD" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "NMBD" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 nmbd [\-D] [\-F] [\-S] [\-a] [\-i] [\-o] [\-h] [\-V] [\-d\ <debug\ level>] [\-H\ <lmhosts\ file>] [\-l\ <log\ directory>] [\-p\ <port\ number>] [\-s\ <configuration\ file>]
     34nmbd [\-D|\-\-daemon] [\-F|\-\-foreground] [\-S|\-\-log\-stdout] [\-i|\-\-interactive] [\-V] [\-d\ <debug\ level>] [\-H|\-\-hosts\ <lmhosts\ file>] [\-l\ <log\ directory>] [\-p|\-\-port\ <port\ number>] [\-s\ <configuration\ file>] [\-\-no\-process\-group]
    3535.SH "DESCRIPTION"
    3636.PP
     
    4848will listen for such requests, and if its own NetBIOS name is specified it will respond with the IP number of the host it is running on\&. Its "own NetBIOS name" is by default the primary DNS name of the host it is running on, but this can be overridden by the
    4949\m[blue]\fBnetbios name\fR\m[]
    50 in
    51 smb\&.conf\&. Thus
     50in \&. Thus
    5251nmbd
    5352will reply to broadcast queries for its own name(s)\&. Additional names for
     
    6564.SH "OPTIONS"
    6665.PP
    67 \-D
     66\-D|\-\-daemon
    6867.RS 4
    6968If specified, this parameter causes
     
    7675.RE
    7776.PP
    78 \-F
     77\-F|\-\-foreground
    7978.RS 4
    8079If specified, this parameter causes the main
     
    9190.RE
    9291.PP
    93 \-S
     92\-S|\-\-log\-stdout
    9493.RS 4
    9594If specified, this parameter causes
     
    9897.RE
    9998.PP
    100 \-i
     99\-i|\-\-interactive
    101100.RS 4
    102101If this parameter is specified it causes the server to run "interactively", not as a daemon, even if the server is executed on the command line of a shell\&. Setting this parameter negates the implicit daemon mode when run from the command line\&.
     
    107106.RE
    108107.PP
    109 \-h|\-\-help
    110 .RS 4
    111 Print a summary of command line options\&.
    112 .RE
    113 .PP
    114 \-H <filename>
     108\-H|\-\-hosts <filename>
    115109.RS 4
    116110NetBIOS lmhosts file\&. The lmhosts file is a list of NetBIOS names to IP addresses that is loaded by the nmbd server and used via the name resolution mechanism
     
    134128.RE
    135129.PP
    136 \-d|\-\-debuglevel=level
    137 .RS 4
    138 \fIlevel\fR
    139 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    140 .sp
    141 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    142 .sp
    143 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    144 .sp
    145 Note that specifying this parameter here will override the
    146 \m[blue]\fBlog level\fR\m[]
    147 parameter in the
    148 smb\&.conf
    149 file\&.
    150 .RE
    151 .PP
    152 \-V|\-\-version
    153 .RS 4
    154 Prints the program version number\&.
    155 .RE
    156 .PP
    157 \-s|\-\-configfile <configuration file>
    158 .RS 4
    159 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    160 smb\&.conf
    161 for more information\&. The default configuration file name is determined at compile time\&.
    162 .RE
    163 .PP
    164 \-l|\-\-log\-basename=logdirectory
    165 .RS 4
    166 Base directory name for log/debug files\&. The extension
    167 \fB"\&.progname"\fR
    168 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    169 .RE
    170 .PP
    171 \-p <UDP port number>
     130\-p|\-\-port <UDP port number>
    172131.RS 4
    173132UDP port number is a positive integer value\&. This option changes the default UDP port number (normally 137) that
    174133nmbd
    175134responds to name queries on\&. Don\*(Aqt use this option unless you are an expert, in which case you won\*(Aqt need help!
     135.RE
     136.PP
     137\-\-no\-process\-group
     138.RS 4
     139Do not create a new process group for nmbd\&.
    176140.RE
    177141.SH "FILES"
     
    265229.SH "SEE ALSO"
    266230.PP
    267 
    268231\fBinetd\fR(8),
    269232\fBsmbd\fR(8),
    270233\fBsmb.conf\fR(5),
    271234\fBsmbclient\fR(1),
    272 \fBtestparm\fR(1),
    273 \fBtestprns\fR(1), and the Internet RFC\*(Aqs
     235\fBtestparm\fR(1), and the Internet RFC\*(Aqs
    274236rfc1001\&.txt,
    275237rfc1002\&.txt\&. In addition the CIFS (formerly SMB) specification is available as a link from the Web page
  • vendor/current/docs/manpages/nmblookup.1

    r860 r988  
    22.\"     Title: nmblookup
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "NMBLOOKUP" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "NMBLOOKUP" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 nmblookup [\-M] [\-R] [\-S] [\-r] [\-A] [\-h] [\-B\ <broadcast\ address>] [\-U\ <unicast\ address>] [\-d\ <debug\ level>] [\-s\ <smb\ config\ file>] [\-i\ <NetBIOS\ scope>] [\-T] [\-f] {name}
     34nmblookup [\-M|\-\-master\-browser] [\-R|\-\-recursion] [\-S|\-\-status] [\-r|\-\-root\-port] [\-A|\-\-lookup\-by\-ip] [\-B|\-\-broadcast\ <broadcast\ address>] [\-U|\-\-unicast\ <unicast\ address>] [\-d\ <debug\ level>] [\-s\ <smb\ config\ file>] [\-i\ <NetBIOS\ scope>] [\-T|\-\-translate] [\-f|\-\-flags] {name}
    3535.SH "DESCRIPTION"
    3636.PP
     
    4343.SH "OPTIONS"
    4444.PP
    45 \-M
     45\-M|\-\-master\-browser
    4646.RS 4
    47 Searches for a master browser by looking up the NetBIOS name
     47Searches for a master browser by looking up the NetBIOS
    4848\fIname\fR
    4949with a type of
     
    5555.RE
    5656.PP
    57 \-R
     57\-R|\-\-recursion
    5858.RS 4
    5959Set the recursion desired bit in the packet to do a recursive lookup\&. This is used when sending a name query to a machine running a WINS server and the user wishes to query the names in the WINS server\&. If this bit is unset the normal (broadcast responding) NetBIOS processing code on a machine is used instead\&. See RFC1001, RFC1002 for details\&.
    6060.RE
    6161.PP
    62 \-S
     62\-S|\-\-status
    6363.RS 4
    6464Once the name query has returned an IP address then do a node status query as well\&. A node status query returns the NetBIOS names registered by a host\&.
    6565.RE
    6666.PP
    67 \-r
     67\-r|\-\-root\-port
    6868.RS 4
    6969Try and bind to UDP port 137 to send and receive UDP datagrams\&. The reason for this option is a bug in Windows 95 where it ignores the source port of the requesting packet and only replies to UDP port 137\&. Unfortunately, on most UNIX systems root privilege is needed to bind to this port, and in addition, if the
     
    7272.RE
    7373.PP
    74 \-A
     74\-A|\-\-lookup\-by\-ip
    7575.RS 4
    7676Interpret
     
    7979.RE
    8080.PP
    81 \-n|\-\-netbiosname <primary NetBIOS name>
    82 .RS 4
    83 This option allows you to override the NetBIOS name that Samba uses for itself\&. This is identical to setting the
    84 \m[blue]\fBnetbios name\fR\m[]
    85 parameter in the
    86 smb\&.conf
    87 file\&. However, a command line setting will take precedence over settings in
    88 smb\&.conf\&.
    89 .RE
    90 .PP
    91 \-i|\-\-scope <scope>
    92 .RS 4
    93 This specifies a NetBIOS scope that
    94 nmblookup
    95 will use to communicate with when generating NetBIOS names\&. For details on the use of NetBIOS scopes, see rfc1001\&.txt and rfc1002\&.txt\&. NetBIOS scopes are
    96 \fIvery\fR
    97 rarely used, only set this parameter if you are the system administrator in charge of all the NetBIOS systems you communicate with\&.
    98 .RE
    99 .PP
    100 \-W|\-\-workgroup=domain
    101 .RS 4
    102 Set the SMB domain of the username\&. This overrides the default domain which is the domain defined in smb\&.conf\&. If the domain specified is the same as the servers NetBIOS name, it causes the client to log on using the servers local SAM (as opposed to the Domain SAM)\&.
    103 .RE
    104 .PP
    105 \-O|\-\-socket\-options socket options
    106 .RS 4
    107 TCP socket options to set on the client socket\&. See the socket options parameter in the
    108 smb\&.conf
    109 manual page for the list of valid options\&.
    110 .RE
    111 .PP
    112 \-h|\-\-help
    113 .RS 4
    114 Print a summary of command line options\&.
    115 .RE
    116 .PP
    117 \-B <broadcast address>
     81\-B|\-\-broadcast <broadcast address>
    11882.RS 4
    11983Send the query to the given broadcast address\&. Without this option the default behavior of nmblookup is to send the query to the broadcast address of the network interfaces as either auto\-detected or defined in the
     
    12488.RE
    12589.PP
    126 \-U <unicast address>
     90\-U|\-\-unicast <unicast address>
    12791.RS 4
    12892Do a unicast query to the specified address or host
     
    13296.RE
    13397.PP
    134 \-d|\-\-debuglevel=level
    135 .RS 4
    136 \fIlevel\fR
    137 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    138 .sp
    139 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    140 .sp
    141 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    142 .sp
    143 Note that specifying this parameter here will override the
    144 \m[blue]\fBlog level\fR\m[]
    145 parameter in the
    146 smb\&.conf
    147 file\&.
    148 .RE
    149 .PP
    150 \-V|\-\-version
    151 .RS 4
    152 Prints the program version number\&.
    153 .RE
    154 .PP
    155 \-s|\-\-configfile <configuration file>
    156 .RS 4
    157 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    158 smb\&.conf
    159 for more information\&. The default configuration file name is determined at compile time\&.
    160 .RE
    161 .PP
    162 \-l|\-\-log\-basename=logdirectory
    163 .RS 4
    164 Base directory name for log/debug files\&. The extension
    165 \fB"\&.progname"\fR
    166 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    167 .RE
    168 .PP
    169 \-T
     98\-T|\-\-translate
    17099.RS 4
    171100This causes any IP addresses found in the lookup to be looked up via a reverse DNS lookup into a DNS name, and printed out before each
     
    176105.RE
    177106.PP
    178 \-f
     107\-f|\-\-flags
    179108.RS 4
    180109Show which flags apply to the name that has been looked up\&. Possible answers are zero or more of: Response, Authoritative, Truncated, Recursion_Desired, Recursion_Available, Broadcast\&.
  • vendor/current/docs/manpages/ntlm_auth.1

    r860 r988  
    22.\"     Title: ntlm_auth
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "NTLM_AUTH" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "NTLM_AUTH" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 ntlm_auth [\-d\ debuglevel] [\-l\ logdir] [\-s\ <smb\ config\ file>]
     34ntlm_auth
    3535.SH "DESCRIPTION"
    3636.PP
     
    313313.RE
    314314.PP
    315 \-d|\-\-debuglevel=level
    316 .RS 4
    317 \fIlevel\fR
    318 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    319 .sp
    320 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    321 .sp
    322 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    323 .sp
    324 Note that specifying this parameter here will override the
    325 \m[blue]\fBlog level\fR\m[]
    326 parameter in the
    327 smb\&.conf
    328 file\&.
    329 .RE
    330 .PP
    331 \-V|\-\-version
    332 .RS 4
    333 Prints the program version number\&.
    334 .RE
    335 .PP
    336 \-s|\-\-configfile <configuration file>
    337 .RS 4
    338 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    339 smb\&.conf
    340 for more information\&. The default configuration file name is determined at compile time\&.
    341 .RE
    342 .PP
    343 \-l|\-\-log\-basename=logdirectory
    344 .RS 4
    345 Base directory name for log/debug files\&. The extension
    346 \fB"\&.progname"\fR
    347 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    348 .RE
    349 .PP
    350 \-h|\-\-help
    351 .RS 4
    352 Print a summary of command line options\&.
     315\-\-pam\-winbind\-conf=FILENAME
     316.RS 4
     317Define the path to the pam_winbind\&.conf file\&.
     318.RE
     319.PP
     320\-\-target\-hostname=HOSTNAME
     321.RS 4
     322Define the target hostname\&.
     323.RE
     324.PP
     325\-\-target\-service=SERVICE
     326.RS 4
     327Define the target service\&.
     328.RE
     329.PP
     330\-\-use\-cached\-creds
     331.RS 4
     332Whether to use credentials cached by winbindd\&.
     333.RE
     334.PP
     335\-\-offline\-logon
     336.RS 4
     337Allow offline logons for plain text auth\&.
     338.RE
     339.PP
     340\-\-configfile=<configuration file>
     341.RS 4
     342The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See for more information\&. The default configuration file name is determined at compile time\&.
    353343.RE
    354344.SH "EXAMPLE SETUP"
  • vendor/current/docs/manpages/pam_winbind.8

    r860 r988  
    22.\"     Title: pam_winbind
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: 8
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "PAM_WINBIND" "8" "09/18/2013" "Samba 3\&.6" "8"
     10.TH "PAM_WINBIND" "8" "05/02/2016" "Samba 4\&.4" "8"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    8888\fIMYDOMAIN\e\emyuser\fR\&. pam_winbind will, in that case, lookup the SID internally\&. Note that NAME may not contain any spaces\&. It is thus recommended to only use SIDs\&. You can verify the list of SIDs a user is a member of with
    8989wbinfo \-\-user\-sids=SID\&.
     90.sp
     91This option must only be specified on a auth module declaration, as it only operates in conjunction with password authentication\&.
    9092.RE
    9193.PP
     
    121123cached_login
    122124.RS 4
    123 Winbind allows to logon using cached credentials when
     125Winbind allows one to logon using cached credentials when
    124126\fIwinbind offline logon\fR
    125127is enabled\&. To use this feature from the PAM module this option must be set\&.
  • vendor/current/docs/manpages/pam_winbind.conf.5

    r860 r988  
    22.\"     Title: pam_winbind.conf
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: 5
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "PAM_WINBIND\&.CONF" "5" "09/18/2013" "Samba 3\&.6" "5"
     10.TH "PAM_WINBIND\&.CONF" "5" "05/02/2016" "Samba 4\&.4" "5"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    6464\fIMYDOMAIN\e\emyuser\fR\&. pam_winbind will, in that case, lookup the SID internally\&. Note that NAME may not contain any spaces\&. It is thus recommended to only use SIDs\&. You can verify the list of SIDs a user is a member of with
    6565wbinfo \-\-user\-sids=SID\&. This setting is empty by default\&.
     66.sp
     67This option only operates during password authentication, and will not restrict access if a password is not required for any reason (such as SSH key\-based login)\&.
    6668.RE
    6769.PP
     
    8183When pam_winbind is configured to try kerberos authentication by enabling the
    8284\fIkrb5_auth\fR
    83 option, it can store the retrieved Ticket Granting Ticket (TGT) in a credential cache\&. The type of credential cache can be set with this option\&. Currently the only supported value is:
    84 \fIFILE\fR\&. In that case a credential cache in the form of /tmp/krb5cc_UID will be created, where UID is replaced with the numeric user id\&. Leave empty to just do kerberos authentication without having a ticket cache after the logon has succeeded\&. This setting is empty by default\&.
     85option, it can store the retrieved Ticket Granting Ticket (TGT) in a credential cache\&. The type of credential cache can be controlled with this option\&. The supported values are:
     86\fIKEYRING\fR
     87(when supported by the system\*(Aqs Kerberos library and Kernel),
     88\fIFILE\fR
     89and
     90\fIDIR\fR
     91(when the DIR type is supported by the system\*(Aqs Kerberos library)\&. In case of FILE a credential cache in the form of /tmp/krb5cc_UID will be created \- in case of DIR you NEED to specify a directory\&. UID is replaced with the numeric user id\&.
     92.sp
     93When using the KEYRING type, the supported mechanism is
     94\(lqKEYRING:persistent:UID\(rq, which uses the Linux kernel keyring to store credentials on a per\-UID basis\&. This is the recommended choice on latest Linux distributions, as it is the most secure and predictable method\&.
     95.sp
     96It is also possible to define custom filepaths and use the "%u" pattern in order to substitue the numeric user id\&. Examples:
     97.PP
     98krb5_ccache_type = DIR:/run/user/%u/krb5cc
     99.RS 4
     100This will create a credential cache file in the specified directory\&.
     101.RE
     102.PP
     103krb5_ccache_type = FILE:/tmp/krb5cc_%u
     104.RS 4
     105This will create a credential cache file\&.
     106.RE
     107.sp
     108Leave empty to just do kerberos authentication without having a ticket cache after the logon has succeeded\&. This setting is empty by default\&.
    85109.RE
    86110.PP
    87111cached_login = yes|no
    88112.RS 4
    89 Winbind allows to logon using cached credentials when
     113Winbind allows one to logon using cached credentials when
    90114\fIwinbind offline logon\fR
    91115is enabled\&. To use this feature from the PAM module this option must be set\&. Defaults to "no"\&.
  • vendor/current/docs/manpages/pdbedit.8

    r860 r988  
    22.\"     Title: pdbedit
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "PDBEDIT" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "PDBEDIT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 pdbedit [\-a] [\-b\ passdb\-backend] [\-c\ account\-control] [\-C\ value] [\-d\ debuglevel] [\-D\ drive] [\-e\ passdb\-backend] [\-f\ fullname] [\-\-force\-initialized\-passwords] [\-g] [\-h\ homedir] [\-i\ passdb\-backend] [\-I\ domain] [\-K] [\-L] [\-m] [\-M\ SID|RID] [\-N\ description] [\-P\ account\-policy] [\-p\ profile] [\-\-policies\-reset] [\-r] [\-s\ configfile] [\-S\ script] [\-t] [\-\-time\-format] [\-u\ username] [\-U\ SID|RID] [\-v] [\-V] [\-w] [\-x] [\-y] [\-z] [\-Z]
     34pdbedit [\-a] [\-b\ passdb\-backend] [\-c\ account\-control] [\-C\ value] [\-d\ debuglevel] [\-D\ drive] [\-e\ passdb\-backend] [\-f\ fullname] [\-\-force\-initialized\-passwords] [\-g] [\-h\ homedir] [\-i\ passdb\-backend] [\-I\ domain] [\-K] [\-L] [\-m] [\-M\ SID|RID] [\-N\ description] [\-P\ account\-policy] [\-p\ profile] [\-\-policies\-reset] [\-r] [\-s\ configfile] [\-S\ script] [\-\-set\-nt\-hash] [\-t] [\-\-time\-format] [\-u\ username] [\-U\ SID|RID] [\-v] [\-V] [\-w] [\-x] [\-y] [\-z] [\-Z]
    3535.SH "DESCRIPTION"
    3636.PP
     
    6767\-v|\-\-verbose
    6868.RS 4
    69 This option enables the verbose listing format\&. It causes pdbedit to list the users in the database, printing out the account fields in a descriptive format\&.
     69This option enables the verbose listing format\&. It causes pdbedit to list the users in the database, printing out the account fields in a descriptive format\&. Used together with \-w also shows passwords hashes\&.
    7070.sp
    7171Example:
     
    106106file format\&. (see the
    107107\fBsmbpasswd\fR(5)
    108 for details)
     108for details)\&. Instead used together with (\-v) displays the passwords hashes in verbose output\&.
    109109.sp
    110110Example:
     
    168168.RE
    169169.PP
     170\-\-set\-nt\-hash
     171.RS 4
     172This option can be used while modifying a user account\&. It will set the user\*(Aqs password using the nt\-hash value given as hexadecimal string\&. Useful to synchronize passwords\&.
     173.sp
     174Example:
     175\-\-set\-nt\-hash 8846F7EAEE8FB117AD06BDD830B7586C
     176.RE
     177.PP
    170178\-p|\-\-profile profile
    171179.RS 4
     
    204212.RS 4
    205213This option can be used while adding or modifying a user account\&. It will specify the users\*(Aq account control property\&. Possible flags are listed below\&.
    206 .sp
    207 
    208214.sp
    209215.RS 4
     
    372378.ps -1
    373379.br
    374 pdbedit does not call the unix password syncronisation script if
     380pdbedit does not call the unix password synchronization script if
    375381\m[blue]\fBunix password sync\fR\m[]
    376382has been set\&. It only updates the data in the Samba user database\&.
     
    500506applies to the account policies instead of the user database\&.
    501507.sp
    502 This option will allow to migrate account policies from their default tdb\-store into a passdb backend, e\&.g\&. an LDAP directory server\&.
     508This option will allow one to migrate account policies from their default tdb\-store into a passdb backend, e\&.g\&. an LDAP directory server\&.
    503509.sp
    504510Example:
     
    554560.RS 4
    555561This option is currently not being used\&.
    556 .RE
    557 .PP
    558 \-h|\-\-help
    559 .RS 4
    560 Print a summary of command line options\&.
    561 .RE
    562 .PP
    563 \-d|\-\-debuglevel=level
    564 .RS 4
    565 \fIlevel\fR
    566 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    567 .sp
    568 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    569 .sp
    570 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    571 .sp
    572 Note that specifying this parameter here will override the
    573 \m[blue]\fBlog level\fR\m[]
    574 parameter in the
    575 smb\&.conf
    576 file\&.
    577 .RE
    578 .PP
    579 \-V|\-\-version
    580 .RS 4
    581 Prints the program version number\&.
    582 .RE
    583 .PP
    584 \-s|\-\-configfile <configuration file>
    585 .RS 4
    586 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    587 smb\&.conf
    588 for more information\&. The default configuration file name is determined at compile time\&.
    589 .RE
    590 .PP
    591 \-l|\-\-log\-basename=logdirectory
    592 .RS 4
    593 Base directory name for log/debug files\&. The extension
    594 \fB"\&.progname"\fR
    595 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    596562.RE
    597563.SH "NOTES"
  • vendor/current/docs/manpages/profiles.1

    r860 r988  
    22.\"     Title: profiles
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "PROFILES" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "PROFILES" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 profiles [\-v] [\-c\ SID] [\-n\ SID] {file}
     34profiles [\-v] [\-c|\-\-change\-sid\ SID] [\-n|\-\-new\-sid\ SID] {file}
    3535.SH "DESCRIPTION"
    3636.PP
     
    5353.RE
    5454.PP
    55 \-c SID1 \-n SID2
     55\-c SID1 \-n SID2, \-\-change\-sid SID1 \-\-new\-sid SID2
    5656.RS 4
    5757Change all occurrences of SID1 in
    5858file
    5959by SID2\&.
    60 .RE
    61 .PP
    62 \-h|\-\-help
    63 .RS 4
    64 Print a summary of command line options\&.
    6560.RE
    6661.SH "VERSION"
  • vendor/current/docs/manpages/rpcclient.1

    r860 r988  
    22.\"     Title: rpcclient
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "RPCCLIENT" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "RPCCLIENT" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 rpcclient [\-A\ authfile] [\-c\ <command\ string>] [\-d\ debuglevel] [\-h] [\-l\ logdir] [\-N] [\-s\ <smb\ config\ file>] [\-U\ username[%password]] [\-W\ workgroup] [\-I\ destinationIP] {server}
     34rpcclient [\-A\ authfile] [\-c\ <command\ string>] [\-d\ debuglevel] [\-l\ logdir] [\-N] [\-s\ <smb\ config\ file>] [\-U\ username[%password]] [\-W\ workgroup] [\-I\ destinationIP] {server}
    3535.SH "DESCRIPTION"
    3636.PP
     
    7272This number is the TCP port number that will be used when making connections to the server\&. The standard (well\-known) TCP port number for an SMB/CIFS server is 139, which is the default\&.
    7373.RE
    74 .PP
    75 \-d|\-\-debuglevel=level
    76 .RS 4
    77 \fIlevel\fR
    78 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    79 .sp
    80 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    81 .sp
    82 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    83 .sp
    84 Note that specifying this parameter here will override the
    85 \m[blue]\fBlog level\fR\m[]
    86 parameter in the
    87 smb\&.conf
    88 file\&.
    89 .RE
    90 .PP
    91 \-V|\-\-version
    92 .RS 4
    93 Prints the program version number\&.
    94 .RE
    95 .PP
    96 \-s|\-\-configfile <configuration file>
    97 .RS 4
    98 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    99 smb\&.conf
    100 for more information\&. The default configuration file name is determined at compile time\&.
    101 .RE
    102 .PP
    103 \-l|\-\-log\-basename=logdirectory
    104 .RS 4
    105 Base directory name for log/debug files\&. The extension
    106 \fB"\&.progname"\fR
    107 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    108 .RE
    109 .PP
    110 \-N|\-\-no\-pass
    111 .RS 4
    112 If specified, this parameter suppresses the normal password prompt from the client to the user\&. This is useful when accessing a service that does not require a password\&.
    113 .sp
    114 Unless a password is specified on the command line or this parameter is specified, the client will request a password\&.
    115 .sp
    116 If a password is specified on the command line and this option is also defined the password on the command line will be silently ingnored and no password will be used\&.
    117 .RE
    118 .PP
    119 \-k|\-\-kerberos
    120 .RS 4
    121 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&.
    122 .RE
    123 .PP
    124 \-C|\-\-use\-ccache
    125 .RS 4
    126 Try to use the credentials cached by winbind\&.
    127 .RE
    128 .PP
    129 \-A|\-\-authentication\-file=filename
    130 .RS 4
    131 This option allows you to specify a file from which to read the username and password used in the connection\&. The format of the file is
    132 .sp
    133 .if n \{\
    134 .RS 4
    135 .\}
    136 .nf
    137 username = <value>
    138 password = <value>
    139 domain   = <value>
    140 .fi
    141 .if n \{\
    142 .RE
    143 .\}
    144 .sp
    145 Make certain that the permissions on the file restrict access from unwanted users\&.
    146 .RE
    147 .PP
    148 \-U|\-\-user=username[%password]
    149 .RS 4
    150 Sets the SMB username or username and password\&.
    151 .sp
    152 If %password is not specified, the user will be prompted\&. The client will first check the
    153 \fBUSER\fR
    154 environment variable, then the
    155 \fBLOGNAME\fR
    156 variable and if either exists, the string is uppercased\&. If these environmental variables are not found, the username
    157 \fBGUEST\fR
    158 is used\&.
    159 .sp
    160 A third option is to use a credentials file which contains the plaintext of the username and password\&. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables\&. If this method is used, make certain that the permissions on the file restrict access from unwanted users\&. See the
    161 \fI\-A\fR
    162 for more details\&.
    163 .sp
    164 Be cautious about including passwords in scripts\&. Also, on many systems the command line of a running process may be seen via the
    165 ps
    166 command\&. To be safe always allow
    167 rpcclient
    168 to prompt for a password and type it in directly\&.
    169 .RE
    170 .PP
    171 \-n|\-\-netbiosname <primary NetBIOS name>
    172 .RS 4
    173 This option allows you to override the NetBIOS name that Samba uses for itself\&. This is identical to setting the
    174 \m[blue]\fBnetbios name\fR\m[]
    175 parameter in the
    176 smb\&.conf
    177 file\&. However, a command line setting will take precedence over settings in
    178 smb\&.conf\&.
    179 .RE
    180 .PP
    181 \-i|\-\-scope <scope>
    182 .RS 4
    183 This specifies a NetBIOS scope that
    184 nmblookup
    185 will use to communicate with when generating NetBIOS names\&. For details on the use of NetBIOS scopes, see rfc1001\&.txt and rfc1002\&.txt\&. NetBIOS scopes are
    186 \fIvery\fR
    187 rarely used, only set this parameter if you are the system administrator in charge of all the NetBIOS systems you communicate with\&.
    188 .RE
    189 .PP
    190 \-W|\-\-workgroup=domain
    191 .RS 4
    192 Set the SMB domain of the username\&. This overrides the default domain which is the domain defined in smb\&.conf\&. If the domain specified is the same as the servers NetBIOS name, it causes the client to log on using the servers local SAM (as opposed to the Domain SAM)\&.
    193 .RE
    194 .PP
    195 \-O|\-\-socket\-options socket options
    196 .RS 4
    197 TCP socket options to set on the client socket\&. See the socket options parameter in the
    198 smb\&.conf
    199 manual page for the list of valid options\&.
    200 .RE
    201 .PP
    202 \-h|\-\-help
    203 .RS 4
    204 Print a summary of command line options\&.
    205 .RE
    20674.SH "COMMANDS"
    20775.SS "LSARPC"
     
    22290.RE
    22391.PP
    224 enumtrusts
     92enumtrust
    22593.RS 4
    22694Enumerate trusted domains
     
    333201.RE
    334202.PP
     203netshareenumall
     204.RS 4
     205Enumerate all shares
     206.RE
     207.PP
     208netsharegetinfo
     209.RS 4
     210Get Share Info
     211.RE
     212.PP
     213netsharesetinfo
     214.RS 4
     215Set Share Info
     216.RE
     217.PP
     218netsharesetdfsflags
     219.RS 4
     220Set DFS flags
     221.RE
     222.PP
    335223netfileenum
    336224.RS 4
     
    341229.RS 4
    342230Fetch remote time of day
     231.RE
     232.PP
     233netnamevalidate
     234.RS 4
     235Validate sharename
     236.RE
     237.PP
     238netfilegetsec
     239.RS 4
     240Get File security
     241.RE
     242.PP
     243netsessdel
     244.RS 4
     245Delete Session
     246.RE
     247.PP
     248netsessenum
     249.RS 4
     250Enumerate Sessions
     251.RE
     252.PP
     253netdiskenum
     254.RS 4
     255Enumerate Disks
     256.RE
     257.PP
     258netconnenum
     259.RS 4
     260Enumerate Connections
     261.RE
     262.PP
     263netshareadd
     264.RS 4
     265Add share
     266.RE
     267.PP
     268netsharedel
     269.RS 4
     270Delete share
    343271.RE
    344272.SS "SAMR"
     
    445373.\}
    446374.nf
    447 Long Printer Name:\e
     375Long Driver Name:\e
    448376Driver File Name:\e
    449377Data File Name:\e
     
    480408.RE
    481409.PP
    482 deldriverex <driver> [architecture] [version]
    483 .RS 4
    484 Delete the specified printer driver including driver files\&. You can limit this action to a specific architecture and a specific version\&. If no architecure is given, all driver files of that driver will be deleted\&.
     410deldriverex <driver> [architecture] [version] [flags]
     411.RS 4
     412Delete the specified printer driver and optionally files associated with the driver\&. You can limit this action to a specific architecture and a specific version\&. If no architecture is given, all driver files of that driver will be deleted\&.
     413\fIflags\fR
     414correspond to numeric DPD_* values, i\&.e\&. a value of 3 requests (DPD_DELETE_UNUSED_FILES | DPD_DELETE_SPECIFIC_VERSION)\&.
    485415.RE
    486416.PP
     
    640570Sam Logon
    641571.RE
     572.SS "FSRVP"
     573.PP
     574fss_is_path_sup <share>
     575.RS 4
     576Check whether a share supports shadow\-copy requests
     577.RE
     578.PP
     579fss_get_sup_version
     580.RS 4
     581Get supported FSRVP version from server
     582.RE
     583.PP
     584fss_create_expose <context> <[ro|rw]> <share1> [share2] \&.\&.\&. [shareN]
     585.RS 4
     586Request shadow\-copy creation and exposure as a new share
     587.RE
     588.PP
     589fss_delete <base_share> <shadow_copy_set_id> <shadow_copy_id>
     590.RS 4
     591Request shadow\-copy share deletion
     592.RE
     593.PP
     594fss_has_shadow_copy <base_share>
     595.RS 4
     596Check for an associated share shadow\-copy
     597.RE
     598.PP
     599fss_get_mapping <base_share> <shadow_copy_set_id> <shadow_copy_id>
     600.RS 4
     601Get shadow\-copy share mapping information
     602.RE
     603.PP
     604fss_recovery_complete <shadow_copy_set_id>
     605.RS 4
     606Flag read\-write shadow\-copy as recovery complete, allowing further shadow\-copy requests
     607.RE
    642608.SS "GENERAL COMMANDS"
    643609.PP
  • vendor/current/docs/manpages/samba.7

    r860 r988  
    22.\"     Title: samba
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: Miscellanea
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SAMBA" "7" "09/18/2013" "Samba 3\&.6" "Miscellanea"
     10.TH "SAMBA" "7" "05/02/2016" "Samba 4\&.4" "Miscellanea"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    2929.\" -----------------------------------------------------------------
    3030.SH "NAME"
    31 samba \- A Windows SMB/CIFS fileserver for UNIX
     31samba \- A Windows AD and SMB/CIFS fileserver for UNIX
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
     
    3535.SH "DESCRIPTION"
    3636.PP
    37 The Samba software suite is a collection of programs that implements the Server Message Block (commonly abbreviated as SMB) protocol for UNIX systems\&. This protocol is sometimes also referred to as the Common Internet File System (CIFS)\&. For a more thorough description, see
     37The Samba software suite is a collection of programs that implements the Server Message Block (commonly abbreviated as SMB) protocol for UNIX systems and provides Active Directory services\&. This protocol is sometimes also referred to as the Common Internet File System (CIFS)\&. For a more thorough description, see
    3838http://www\&.ubiqx\&.org/cifs/\&. Samba also implements the NetBIOS protocol in nmbd\&.
     39.PP
     40\fBsamba\fR(8)
     41.RS 4
     42The
     43samba
     44daemon provides the Active Directory services and file and print services to SMB clients\&. The configuration file for this daemon is described in
     45\fBsmb.conf\fR(5)\&.
     46.RE
    3947.PP
    4048\fBsmbd\fR(8)
     
    4351smbd
    4452daemon provides the file and print services to SMB clients, such as Windows 95/98, Windows NT, Windows for Workgroups or LanManager\&. The configuration file for this daemon is described in
    45 \fBsmb.conf\fR(5)
     53\fBsmb.conf\fR(5)\&.
    4654.RE
    4755.PP
     
    5159nmbd
    5260daemon provides NetBIOS nameservice and browsing support\&. The configuration file for this daemon is described in
    53 \fBsmb.conf\fR(5)
     61\fBsmb.conf\fR(5)\&.
     62.RE
     63.PP
     64\fBwinbindd\fR(8)
     65.RS 4
     66winbindd
     67is a daemon that is used for integrating authentication and the user database into unix\&.
    5468.RE
    5569.PP
     
    5973smbclient
    6074program implements a simple ftp\-like client\&. This is useful for accessing SMB shares on other compatible servers (such as Windows NT), and can also be used to allow a UNIX box to print to a printer attached to any SMB server (such as a PC running Windows NT)\&.
     75.RE
     76.PP
     77\fBsamba-tool\fR(8)
     78.RS 4
     79The
     80samba\-tool
     81is the main Samba Administration tool regarding Active Directory services\&.
    6182.RE
    6283.PP
     
    7091.RE
    7192.PP
    72 \fBtestprns\fR(1)
    73 .RS 4
    74 The
    75 testprns
    76 utility supports testing printer names defined in your
    77 printcap
    78 file used by Samba\&.
    79 .RE
    80 .PP
    8193\fBsmbstatus\fR(1)
    8294.RS 4
     
    108120.RE
    109121.PP
    110 \fBsmbsh\fR(1)
    111 .RS 4
    112 The
    113 smbsh
    114 command is a program that allows you to run a unix shell with with an overloaded VFS\&.
    115 .RE
    116 .PP
    117122\fBsmbtree\fR(1)
    118123.RS 4
     
    138143.RS 4
    139144smbcontrol
    140 is a utility that can change the behaviour of running samba daemons\&.
     145is a utility that can change the behaviour of running
     146smbd,
     147nmbd
     148and
     149winbindd
     150daemons\&.
    141151.RE
    142152.PP
     
    168178.RE
    169179.PP
    170 \fBswat\fR(8)
    171 .RS 4
    172 swat
    173 is a web\-based interface to configuring
    174 smb\&.conf\&.
    175 .RE
    176 .PP
    177 \fBwinbindd\fR(8)
    178 .RS 4
    179 winbindd
    180 is a daemon that is used for integrating authentication and the user database into unix\&.
    181 .RE
    182 .PP
    183180\fBwbinfo\fR(1)
    184181.RS 4
     
    209206ntlm_auth
    210207is a helper\-utility for external programs wanting to do NTLM\-authentication\&.
    211 .RE
    212 .PP
    213 \fBsmbmount\fR(8), \fBsmbumount\fR(8), \fBsmbmnt\fR(8)
    214 .RS 4
    215 smbmount,smbumount
    216 and
    217 smbmnt
    218 are commands that can be used to mount CIFS/SMB shares on Linux\&.
    219208.RE
    220209.PP
     
    247236.SH "VERSION"
    248237.PP
    249 This man page is correct for version 3 of the Samba suite\&.
     238This man page is correct for version 4 of the Samba suite\&.
    250239.SH "CONTRIBUTIONS"
    251240.PP
     
    256245http://devel\&.samba\&.org/
    257246for information on how to do it properly\&. We prefer patches in
    258 diff \-u
     247git format\-patch
    259248format\&.
    260249.SH "CONTRIBUTORS"
     
    263252change\-log
    264253in the source package for the pre\-CVS changes and at
    265 http://cvs\&.samba\&.org/
    266 for the contributors to Samba post\-CVS\&. CVS is the Open Source source code control system used by the Samba Team to develop Samba\&. The project would have been unmanageable without it\&.
     254http://git\&.samba\&.org/
     255for the contributors to Samba post\-GIT\&. GIT is the Open Source source code control system used by the Samba Team to develop Samba\&. The project would have been unmanageable without it\&.
    267256.SH "AUTHOR"
    268257.PP
  • vendor/current/docs/manpages/sharesec.1

    r860 r988  
    22.\"     Title: sharesec
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SHARESEC" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "SHARESEC" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 sharesec {sharename} [\-r,\ \-\-remove=ACL] [\-m,\ \-\-modify=ACL] [\-a,\ \-\-add=ACL] [\-R,\ \-\-replace=ACLs] [\-D,\ \-\-delete] [\-v,\ \-\-view] [\-M,\ \-\-machine\-sid] [\-F,\ \-\-force] [\-d,\ \-\-debuglevel=DEBUGLEVEL] [\-s,\ \-\-configfile=CONFIGFILE] [\-l,\ \-\-log\-basename=LOGFILEBASE] [\-V,\ \-\-version] [\-?,\ \-\-help] [\-\-usage]
     34sharesec {sharename} [\-r,\ \-\-remove=ACL] [\-m,\ \-\-modify=ACL] [\-a,\ \-\-add=ACL] [\-R,\ \-\-replace=ACLs] [\-D,\ \-\-delete] [\-v,\ \-\-view] [\-\-view\-all] [\-M,\ \-\-machine\-sid] [\-F,\ \-\-force] [\-d,\ \-\-debuglevel=DEBUGLEVEL] [\-s,\ \-\-configfile=CONFIGFILE] [\-l,\ \-\-log\-basename=LOGFILEBASE] [\-\-version] [\-?,\ \-\-help] [\-\-usage] [\-S,\ \-\-setsddl=STRING] [\-V,\ \-\-viewsddl]
    3535.SH "DESCRIPTION"
    3636.PP
     
    8383.RE
    8484.PP
    85 \-h|\-\-help
    86 .RS 4
    87 Print a summary of command line options\&.
    88 .RE
    89 .PP
    90 \-d|\-\-debuglevel=level
    91 .RS 4
    92 \fIlevel\fR
    93 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    94 .sp
    95 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    96 .sp
    97 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    98 .sp
    99 Note that specifying this parameter here will override the
    100 \m[blue]\fBlog level\fR\m[]
    101 parameter in the
    102 smb\&.conf
    103 file\&.
    104 .RE
    105 .PP
    106 \-V|\-\-version
    107 .RS 4
    108 Prints the program version number\&.
    109 .RE
    110 .PP
    111 \-s|\-\-configfile <configuration file>
    112 .RS 4
    113 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    114 smb\&.conf
    115 for more information\&. The default configuration file name is determined at compile time\&.
    116 .RE
    117 .PP
    118 \-l|\-\-log\-basename=logdirectory
    119 .RS 4
    120 Base directory name for log/debug files\&. The extension
    121 \fB"\&.progname"\fR
    122 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
     85\-v|\-\-view
     86.RS 4
     87List a share acl
     88.RE
     89.PP
     90\-\-view\-all
     91.RS 4
     92List all share acls
     93.RE
     94.PP
     95\-S|\-\-setsddl=STRING
     96.RS 4
     97Set security descriptor by providing ACL in SDDL format\&.
     98.RE
     99.PP
     100\-V|\-\-viewsddl
     101.RS 4
     102List a share acl in SDDL format\&.
    123103.RE
    124104.SH "ACL FORMAT"
     
    142122The revision of the ACL specifies the internal Windows NT ACL revision for the security descriptor\&. If not specified it defaults to 1\&. Using values other than 1 may cause strange behaviour\&.
    143123.PP
    144 The owner and group specify the owner and group SIDs for the object\&. If a SID in the format S\-1\-x\-y\-z is specified this is used, otherwise the name specified is resolved using the server on which the file or directory resides\&.
     124The owner and group specify the owner and group SIDs for the object\&. Share ACLs do not specify an owner or a group, so these fields are empty\&.
    145125.PP
    146126ACLs specify permissions granted to the SID\&. This SID can be specified in S\-1\-x\-y\-z format or as a name in which case it is resolved against the server on which the file or directory resides\&. The type, flags and mask values determine the type of access granted to the SID\&.
     
    297277        host:~ # sharesec share \-v
    298278        REVISION:1
    299         OWNER:(NULL SID)
    300         GROUP:(NULL SID)
    301         ACL:S\-1\-1\-0:ALLOWED/0/0x101f01ff
    302         ACL:S\-1\-5\-21\-1866488690\-1365729215\-3963860297\-17724:ALLOWED/0/FULL
     279        CONTROL:SR|DP
     280        OWNER:
     281        GROUP:
     282        ACL:S\-1\-1\-0:ALLOWED/0x0/FULL
     283        ACL:S\-1\-5\-21\-1866488690\-1365729215\-3963860297\-17724:ALLOWED/0x0/FULL
    303284       
    304285.fi
  • vendor/current/docs/manpages/smb.conf.5

    r860 r988  
    22.\"     Title: smb.conf
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: File Formats and Conventions
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMB\&.CONF" "5" "09/18/2013" "Samba 3\&.6" "File Formats and Conventions"
     10.TH "SMB\&.CONF" "5" "05/02/2016" "Samba 4\&.4" "File Formats and Conventions"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3636file is a configuration file for the Samba suite\&.
    3737smb\&.conf
    38 contains runtime configuration information for the Samba programs\&. The
    39 smb\&.conf
    40 file is designed to be configured and administered by the
    41 \fBswat\fR(8)
    42 program\&. The complete description of the file format and possible parameters held within are here for reference purposes\&.
     38contains runtime configuration information for the Samba programs\&. The complete description of the file format and possible parameters held within are here for reference purposes\&.
    4339.SH "FILE FORMAT"
    4440.PP
     
    457453%R
    458454.RS 4
    459 the selected protocol level after protocol negotiation\&. It can be one of CORE, COREPLUS, LANMAN1, LANMAN2 or NT1\&.
     455the selected protocol level after protocol negotiation\&. It can be one of CORE, COREPLUS, LANMAN1, LANMAN2, NT1, SMB2_02, SMB2_10, SMB2_22, SMB2_24, SMB3_00, SMB3_02, SMB3_10, SMB3_11 or SMB2_FF\&.
    460456.RE
    461457.PP
     
    475471the IP address of the client machine\&.
    476472.sp
    477 Before 3\&.6\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&.
     473Before 4\&.0\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&.
    478474.RE
    479475.PP
     
    482478the local IP address to which a client connected\&.
    483479.sp
    484 Before 3\&.6\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&.
     480Before 4\&.0\&.0 it could contain IPv4 mapped IPv6 addresses, now it only contains IPv4 or IPv6 addresses\&.
    485481.RE
    486482.PP
     
    598594.PP
    599595By default, Samba 3\&.0 has the same semantics as a Windows NT server, in that it is case insensitive but case preserving\&. As a special case for directories with large numbers of files, if the case options are set as follows, "case sensitive = yes", "case preserve = no", "short preserve case = no" then the "default case" option will be applied and will modify all filenames sent from the client when accessing this share\&.
    600 .SH "NOTE ABOUT USERNAME/PASSWORD VALIDATION"
    601 .PP
    602 There are a number of ways in which a user can connect to a service\&. The server uses the following steps in determining if it will allow a connection to a specified service\&. If all the steps fail, the connection request is rejected\&. However, if one of the steps succeeds, the following steps are not checked\&.
    603 .PP
    604 If the service is marked
    605 \(lqguest only = yes\(rq
    606 and the server is running with share\-level security (\(lqsecurity = share\(rq, steps 1 to 5 are skipped\&.
    607 .sp
    608 .RS 4
    609 .ie n \{\
    610 \h'-04' 1.\h'+01'\c
    611 .\}
    612 .el \{\
    613 .sp -1
    614 .IP "  1." 4.2
    615 .\}
    616 If the client has passed a username/password pair and that username/password pair is validated by the UNIX system\*(Aqs password programs, the connection is made as that username\&. This includes the
    617 \e\eserver\eservice%\fIusername\fR
    618 method of passing a username\&.
    619 .RE
    620 .sp
    621 .RS 4
    622 .ie n \{\
    623 \h'-04' 2.\h'+01'\c
    624 .\}
    625 .el \{\
    626 .sp -1
    627 .IP "  2." 4.2
    628 .\}
    629 If the client has previously registered a username with the system and now supplies a correct password for that username, the connection is allowed\&.
    630 .RE
    631 .sp
    632 .RS 4
    633 .ie n \{\
    634 \h'-04' 3.\h'+01'\c
    635 .\}
    636 .el \{\
    637 .sp -1
    638 .IP "  3." 4.2
    639 .\}
    640 The client\*(Aqs NetBIOS name and any previously used usernames are checked against the supplied password\&. If they match, the connection is allowed as the corresponding user\&.
    641 .RE
    642 .sp
    643 .RS 4
    644 .ie n \{\
    645 \h'-04' 4.\h'+01'\c
    646 .\}
    647 .el \{\
    648 .sp -1
    649 .IP "  4." 4.2
    650 .\}
    651 If the client has previously validated a username/password pair with the server and the client has passed the validation token, that username is used\&.
    652 .RE
    653 .sp
    654 .RS 4
    655 .ie n \{\
    656 \h'-04' 5.\h'+01'\c
    657 .\}
    658 .el \{\
    659 .sp -1
    660 .IP "  5." 4.2
    661 .\}
    662 If a
    663 user =
    664 field is given in the
    665 smb\&.conf
    666 file for the service and the client has supplied a password, and that password matches (according to the UNIX system\*(Aqs password checking) with one of the usernames from the
    667 user =
    668 field, the connection is made as the username in the
    669 user =
    670 line\&. If one of the usernames in the
    671 user =
    672 list begins with a
    673 @, that name expands to a list of names in the group of the same name\&.
    674 .RE
    675 .sp
    676 .RS 4
    677 .ie n \{\
    678 \h'-04' 6.\h'+01'\c
    679 .\}
    680 .el \{\
    681 .sp -1
    682 .IP "  6." 4.2
    683 .\}
    684 If the service is a guest service, a connection is made as the username given in the
    685 guest account =
    686 for the service, irrespective of the supplied password\&.
    687 .RE
    688596.SH "REGISTRY-BASED CONFIGURATION"
    689597.PP
     
    769677\m[blue]\fBshutdown script\fR\m[]\&.
    770678.sp
    771 If the connected user posseses the
     679If the connected user possesses the
    772680\fBSeRemoteShutdownPrivilege\fR, right, this command will be run as root\&.
    773681.sp
     
    785693If this parameter is
    786694\fByes\fR
    787 for a service, then the share hosted by the service will only be visible to users who have read or write access to the share during share enumeration (for example net view \e\esambaserver)\&. This has parallels to access based enumeration, the main difference being that only share permissions are evaluated, and security descriptors on files contained on the share are not used in computing enumeration access rights\&.
     695for a service, then the share hosted by the service will only be visible to users who have read or write access to the share during share enumeration (for example net view \e\esambaserver)\&. The share ACLs which allow or deny the access to the share can be modified using for example the
     696sharesec
     697command or using the appropriate Windows tools\&. This has parallels to access based enumeration, the main difference being that only share permissions are evaluated, and security descriptors on files contained on the share are not used in computing enumeration access rights\&.
    788698.sp
    789699Default:
    790700\fI\fIaccess based share enum\fR\fR\fI = \fR\fIno\fR\fI \fR
     701.RE
     702
     703acl allow execute always (S)
     704.\" acl allow execute always
     705.PP
     706.RS 4
     707This boolean parameter controls the behaviour of
     708\fBsmbd\fR(8)
     709when receiving a protocol request of "open for execution" from a Windows client\&. With Samba 3\&.6 and older, the execution right in the ACL was not checked, so a client could execute a file even if it did not have execute rights on the file\&. In Samba 4\&.0, this has been fixed, so that by default, i\&.e\&. when this parameter is set to "False", "open for execution" is now denied when execution permissions are not present\&.
     710.sp
     711If this parameter is set to "True", Samba does not check execute permissions on "open for execution", thus re\-establishing the behaviour of Samba 3\&.6\&. This can be useful to smoothen upgrades from older Samba versions to 4\&.0 and newer\&. This setting is not meant to be used as a permanent setting, but as a temporary relief: It is recommended to fix the permissions in the ACLs and reset this parameter to the default after a certain transition period\&.
     712.sp
     713Default:
     714\fI\fIacl allow execute always\fR\fR\fI = \fR\fIno\fR\fI \fR
    791715.RE
    792716
     
    795719.PP
    796720.RS 4
     721Please note this parameter is now deprecated in Samba 3\&.6\&.2 and will be removed in a future version of Samba\&.
     722.sp
    797723This boolean parameter controls what
    798 \fBsmbd\fR(8)does on receiving a protocol request of "open for delete" from a Windows client\&. If a Windows client doesn\*(Aqt have permissions to delete a file then they expect this to be denied at open time\&. POSIX systems normally only detect restrictions on delete by actually attempting to delete the file or directory\&. As Windows clients can (and do) "back out" a delete request by unsetting the "delete on close" bit Samba cannot delete the file immediately on "open for delete" request as we cannot restore such a deleted file\&. With this parameter set to true (the default) then smbd checks the file system permissions directly on "open for delete" and denies the request without actually deleting the file if the file system permissions would seem to deny it\&. This is not perfect, as it\*(Aqs possible a user could have deleted a file without Samba being able to check the permissions correctly, but it is close enough to Windows semantics for mostly correct behaviour\&. Samba will correctly check POSIX ACL semantics in this case\&.
     724\fBsmbd\fR(8)
     725does on receiving a protocol request of "open for delete" from a Windows client\&. If a Windows client doesn\*(Aqt have permissions to delete a file then they expect this to be denied at open time\&. POSIX systems normally only detect restrictions on delete by actually attempting to delete the file or directory\&. As Windows clients can (and do) "back out" a delete request by unsetting the "delete on close" bit Samba cannot delete the file immediately on "open for delete" request as we cannot restore such a deleted file\&. With this parameter set to true (the default) then smbd checks the file system permissions directly on "open for delete" and denies the request without actually deleting the file if the file system permissions would seem to deny it\&. This is not perfect, as it\*(Aqs possible a user could have deleted a file without Samba being able to check the permissions correctly, but it is close enough to Windows semantics for mostly correct behaviour\&. Samba will correctly check POSIX ACL semantics in this case\&.
    799726.sp
    800727If this parameter is set to "false" Samba doesn\*(Aqt check permissions on "open for delete" and allows the open\&. If the user doesn\*(Aqt have permission to delete the file this will only be discovered at close time, which is too late for the Windows user tools to display an error message to the user\&. The symptom of this is files that appear to have been deleted "magically" re\-appearing on a Windows explorer refresh\&. This is an extremely advanced protocol option which should not need to be changed\&. This parameter was introduced in its final form in 3\&.0\&.21, an earlier version with slightly different semantics was introduced in 3\&.0\&.20\&. That older version is not documented here\&.
    801728.sp
    802729Default:
    803 \fI\fIacl check permissions\fR\fR\fI = \fR\fITrue\fR\fI \fR
    804 .RE
    805 
    806 acl compatibility (G)
    807 .\" acl compatibility
    808 .PP
    809 .RS 4
    810 This parameter specifies what OS ACL semantics should be compatible with\&. Possible values are
    811 \fIwinnt\fR
    812 for Windows NT 4,
    813 \fIwin2k\fR
    814 for Windows 2000 and above and
    815 \fIauto\fR\&. If you specify
    816 \fIauto\fR, the value for this parameter will be based upon the version of the client\&. There should be no reason to change this parameter from the default\&.
    817 .sp
    818 Default:
    819 \fI\fIacl compatibility\fR\fR\fI = \fR\fIAuto\fR\fI \fR
    820 .sp
    821 Example:
    822 \fI\fIacl compatibility\fR\fR\fI = \fR\fIwin2k\fR\fI \fR
     730\fI\fIacl check permissions\fR\fR\fI = \fR\fIyes\fR\fI \fR
    823731.RE
    824732
     
    831739of a file or directory to modify the permissions and ACLs on that file\&.
    832740.sp
    833 On a Windows server, groups may be the owner of a file or directory \- thus allowing anyone in that group to modify the permissions on it\&. This allows the delegation of security controls on a point in the filesystem to the group owner of a directory and anything below it also owned by that group\&. This means there are multiple people with permissions to modify ACLs on a file or directory, easing managability\&.
     741On a Windows server, groups may be the owner of a file or directory \- thus allowing anyone in that group to modify the permissions on it\&. This allows the delegation of security controls on a point in the filesystem to the group owner of a directory and anything below it also owned by that group\&. This means there are multiple people with permissions to modify ACLs on a file or directory, easing manageability\&.
    834742.sp
    835743This parameter allows Samba to also permit delegation of the control over a point in the exported directory hierarchy in much the same way as Windows\&. This allows all members of a UNIX group to control the permissions on a file or directory they have group ownership on\&.
     
    837745This parameter is best used with the
    838746\m[blue]\fBinherit owner\fR\m[]
    839 option and also on on a share containing directories with the UNIX
     747option and also on a share containing directories with the UNIX
    840748\fIsetgid bit\fR
    841749set on them, which causes new files and directories created within it to inherit the group ownership from the containing directory\&.
    842750.sp
    843 This is parameter has been was deprecated in Samba 3\&.0\&.23, but re\-activated in Samba 3\&.0\&.31 and above, as it now only controls permission changes if the user is in the owning primary group\&. It is now no longer equivalent to the
     751This parameter was deprecated in Samba 3\&.0\&.23, but re\-activated in Samba 3\&.0\&.31 and above, as it now only controls permission changes if the user is in the owning primary group\&. It is now no longer equivalent to the
    844752\fIdos filemode\fR
    845753option\&.
     
    858766.sp
    859767Default:
    860 \fI\fIacl map full control\fR\fR\fI = \fR\fITrue\fR\fI \fR
     768\fI\fIacl map full control\fR\fR\fI = \fR\fIyes\fR\fI \fR
    861769.RE
    862770
     
    898806.RE
    899807
    900 add port command (G)
    901 .\" add port command
     808addport command (G)
     809.\" addport command
    902810.PP
    903811.RS 4
     
    930838.sp
    931839Default:
    932 \fI\fIadd port command\fR\fR\fI = \fR\fI\fR\fI \fR
    933 .sp
    934 Example:
    935 \fI\fIadd port command\fR\fR\fI = \fR\fI/etc/samba/scripts/addport\&.sh\fR\fI \fR
     840\fI\fIaddport command\fR\fR\fI = \fR\fI\fR\fI \fR
     841.sp
     842Example:
     843\fI\fIaddport command\fR\fR\fI = \fR\fI/etc/samba/scripts/addport\&.sh\fR\fI \fR
    936844.RE
    937845
     
    11521060\fION DEMAND\fR
    11531061when a user accesses the Samba server\&.
    1154 .sp
    1155 In order to use this option,
    1156 \fBsmbd\fR(8)
    1157 must
    1158 \fINOT\fR
    1159 be set to
    1160 \m[blue]\fBsecurity = share\fR\m[]
    1161 and
    1162 \m[blue]\fBadd user script\fR\m[]
    1163 must be set to a full pathname for a script that will create a UNIX user given one argument of
    1164 \fI%u\fR, which expands into the UNIX user name to create\&.
    11651062.sp
    11661063When the Windows user attempts to access the Samba server, at login (session setup in the SMB protocol) time,
     
    12001097.RS 4
    12011098Full path to the script that will be called when a user is added to a group using the Windows NT domain administration tools\&. It will be run by
    1202 \fBsmbd\fR(8)
    1203 \fIAS ROOT\fR\&. Any
     1099\fBsmbd\fR(8)\fIAS ROOT\fR\&. Any
    12041100\fI%g\fR
    12051101will be replaced with the group name and any
     
    12421138You should use this option very carefully, as any user in this list will be able to do anything they like on the share, irrespective of file permissions\&.
    12431139.sp
    1244 This parameter will not work with the
    1245 \m[blue]\fBsecurity = share\fR\m[]
    1246 in Samba 3\&.0\&. This is by design\&.
    1247 .sp
    12481140Default:
    12491141\fI\fIadmin users\fR\fR\fI = \fR\fI\fR\fI \fR
     
    12651157.RE
    12661158
     1159afs token lifetime (G)
     1160.\" afs token lifetime
     1161.PP
     1162.RS 4
     1163This parameter controls the lifetime of tokens that the AFS fake\-kaserver claims\&. In reality these never expire but this lifetime controls when the afs client will forget the token\&.
     1164.sp
     1165Set this parameter to 0 to get
     1166\fBNEVERDATE\fR\&.
     1167.sp
     1168Default:
     1169\fI\fIafs token lifetime\fR\fR\fI = \fR\fI604800\fR\fI \fR
     1170.RE
     1171
    12671172afs username map (G)
    12681173.\" afs username map
     
    12781183Example:
    12791184\fI\fIafs username map\fR\fR\fI = \fR\fI%u@afs\&.samba\&.org\fR\fI \fR
     1185.RE
     1186
     1187aio max threads (G)
     1188.\" aio max threads
     1189.PP
     1190.RS 4
     1191The integer parameter specifies the maximum number of threads each smbd process will create when doing parallel asynchronous IO calls\&. If the number of outstanding calls is greater than this number the requests will not be refused but go onto a queue and will be scheduled in turn as outstanding requests complete\&.
     1192.sp
     1193Related command:
     1194\m[blue]\fBaio read size\fR\m[]
     1195.sp
     1196Related command:
     1197\m[blue]\fBaio write size\fR\m[]
     1198.sp
     1199Default:
     1200\fI\fIaio max threads\fR\fR\fI = \fR\fI100\fR\fI \fR
    12801201.RE
    12811202
     
    13451266This determines how Samba will use its algorithmic mapping from uids/gid to the RIDs needed to construct NT Security Identifiers\&.
    13461267.sp
    1347 Setting this option to a larger value could be useful to sites transitioning from WinNT and Win2k, as existing user and group rids would otherwise clash with sytem users etc\&.
     1268Setting this option to a larger value could be useful to sites transitioning from WinNT and Win2k, as existing user and group rids would otherwise clash with system users etc\&.
    13481269.sp
    13491270All UIDs and GIDs must be able to be resolved into SIDs for the correct operation of ACLs on the server\&. As such the algorithmic mapping can\*(Aqt be \*(Aqturned off\*(Aq, but pushing it \*(Aqout of the way\*(Aq should resolve the issues\&. Users and groups can then be assigned \*(Aqlow\*(Aq RIDs in arbitrary\-rid supporting backends\&.
     
    13691290Example:
    13701291\fI\fIallocation roundup size\fR\fR\fI = \fR\fI0 # (to disable roundups)\fR\fI \fR
     1292.RE
     1293
     1294allow dcerpc auth level connect (G)
     1295.\" allow dcerpc auth level connect
     1296.PP
     1297.RS 4
     1298This option controls whether DCERPC services are allowed to be used with DCERPC_AUTH_LEVEL_CONNECT, which provides authentication, but no per message integrity nor privacy protection\&.
     1299.sp
     1300Some interfaces like samr, lsarpc and netlogon have a hard\-coded default of
     1301\fBno\fR
     1302and epmapper, mgmt and rpcecho have a hard\-coded default of
     1303\fByes\fR\&.
     1304.sp
     1305The behavior can be overwritten per interface name (e\&.g\&. lsarpc, netlogon, samr, srvsvc, winreg, wkssvc \&.\&.\&.) by using \*(Aqallow dcerpc auth level connect:interface = yes\*(Aq as option\&.
     1306.sp
     1307This option yields precedence to the implementation specific restrictions\&. E\&.g\&. the drsuapi and backupkey protocols require DCERPC_AUTH_LEVEL_PRIVACY\&. The dnsserver protocol requires DCERPC_AUTH_LEVEL_INTEGRITY\&.
     1308.sp
     1309Default:
     1310\fI\fIallow dcerpc auth level connect\fR\fR\fI = \fR\fIno\fR\fI \fR
     1311.sp
     1312Example:
     1313\fI\fIallow dcerpc auth level connect\fR\fR\fI = \fR\fIyes\fR\fI \fR
     1314.RE
     1315
     1316allow dns updates (G)
     1317.\" allow dns updates
     1318.PP
     1319.RS 4
     1320This option determines what kind of updates to the DNS are allowed\&.
     1321.sp
     1322DNS updates can either be disallowed completely by setting it to
     1323\fBdisabled\fR, enabled over secure connections only by setting it to
     1324\fBsecure only\fR
     1325or allowed in all cases by setting it to
     1326\fBnonsecure\fR\&.
     1327.sp
     1328Default:
     1329\fI\fIallow dns updates\fR\fR\fI = \fR\fIsecure only\fR\fI \fR
     1330.sp
     1331Example:
     1332\fI\fIallow dns updates\fR\fR\fI = \fR\fIdisabled\fR\fI \fR
    13711333.RE
    13721334
     
    13971359.RE
    13981360
     1361allow nt4 crypto (G)
     1362.\" allow nt4 crypto
     1363.PP
     1364.RS 4
     1365This option controls whether the netlogon server (currently only in \*(Aqactive directory domain controller\*(Aq mode), will reject clients which does not support NETLOGON_NEG_STRONG_KEYS nor NETLOGON_NEG_SUPPORTS_AES\&.
     1366.sp
     1367This option was added with Samba 4\&.2\&.0\&. It may lock out clients which worked fine with Samba versions up to 4\&.1\&.x\&. as the effective default was "yes" there, while it is "no" now\&.
     1368.sp
     1369If you have clients without RequireStrongKey = 1 in the registry, you may need to set "allow nt4 crypto = yes", until you have fixed all clients\&.
     1370.sp
     1371"allow nt4 crypto = yes" allows weak crypto to be negotiated, maybe via downgrade attacks\&.
     1372.sp
     1373This option yields precedence to the \*(Aqreject md5 clients\*(Aq option\&.
     1374.sp
     1375Default:
     1376\fI\fIallow nt4 crypto\fR\fR\fI = \fR\fIno\fR\fI \fR
     1377.RE
     1378
    13991379allow trusted domains (G)
    14001380.\" allow trusted domains
     
    14131393Default:
    14141394\fI\fIallow trusted domains\fR\fR\fI = \fR\fIyes\fR\fI \fR
    1415 .RE
    1416 
    1417 announce as (G)
    1418 .\" announce as
    1419 .PP
    1420 .RS 4
    1421 This specifies what type of server
    1422 \fBnmbd\fR(8)
    1423 will announce itself as, to a network neighborhood browse list\&. By default this is set to Windows NT\&. The valid options are : "NT Server" (which can also be written as "NT"), "NT Workstation", "Win95" or "WfW" meaning Windows NT Server, Windows NT Workstation, Windows 95 and Windows for Workgroups respectively\&. Do not change this parameter unless you have a specific need to stop Samba appearing as an NT server as this may prevent Samba servers from participating as browser servers correctly\&.
    1424 .sp
    1425 Default:
    1426 \fI\fIannounce as\fR\fR\fI = \fR\fINT Server\fR\fI \fR
    1427 .sp
    1428 Example:
    1429 \fI\fIannounce as\fR\fR\fI = \fR\fIWin95\fR\fI \fR
    1430 .RE
    1431 
    1432 announce version (G)
    1433 .\" announce version
    1434 .PP
    1435 .RS 4
    1436 This specifies the major and minor version numbers that nmbd will use when announcing itself as a server\&. The default is 4\&.9\&. Do not change this parameter unless you have a specific need to set a Samba server to be a downlevel server\&.
    1437 .sp
    1438 Default:
    1439 \fI\fIannounce version\fR\fR\fI = \fR\fI4\&.9\fR\fI \fR
    1440 .sp
    1441 Example:
    1442 \fI\fIannounce version\fR\fR\fI = \fR\fI2\&.0\fR\fI \fR
    14431395.RE
    14441396
     
    14811433Example:
    14821434\fI\fIauth methods\fR\fR\fI = \fR\fIguest sam winbind\fR\fI \fR
     1435.RE
     1436
     1437preload
     1438.\" preload
     1439.PP
     1440.RS 4
     1441This parameter is a synonym for
     1442auto services\&.
     1443.RE
     1444
     1445auto services (G)
     1446.\" auto services
     1447.PP
     1448.RS 4
     1449This is a list of services that you want to be automatically added to the browse lists\&. This is most useful for homes and printers services that would otherwise not be visible\&.
     1450.sp
     1451Note that if you just want all printers in your printcap file loaded then the
     1452\m[blue]\fBload printers\fR\m[]
     1453option is easier\&.
     1454.sp
     1455Default:
     1456\fI\fIauto services\fR\fR\fI = \fR\fI\fR\fI \fR
     1457.sp
     1458Example:
     1459\fI\fIauto services\fR\fR\fI = \fR\fIfred lp colorlp\fR\fI \fR
    14831460.RE
    14841461
     
    15431520parameter list
    15441521\fBsmbpasswd\fR(8)
    1545 and
    1546 \fBswat\fR(8)
    15471522may not work as expected due to the reasons covered below\&.
    15481523.sp
     
    15621537smbpasswd
    15631538can be forced to use the primary IP interface of the local host by using its
    1564 \fBsmbpasswd\fR(8)
    1565 \fI\-r \fR\fI\fIremote machine\fR\fR
     1539\fBsmbpasswd\fR(8)\fI\-r \fR\fI\fIremote machine\fR\fR
    15661540parameter, with
    15671541\fIremote machine\fR
    15681542set to the IP name of the primary interface of the local host\&.
    1569 .sp
    1570 The
    1571 swat
    1572 status page tries to connect with
    1573 smbd
    1574 and
    1575 nmbd
    1576 at the address
    1577 \fI127\&.0\&.0\&.1\fR
    1578 to determine if they are running\&. Not adding
    1579 \fI127\&.0\&.0\&.1\fR
    1580 will cause
    1581 smbd
    1582 and
    1583 nmbd
    1584 to always show "not running" even if they really are\&. This can prevent
    1585 swat
    1586 from starting/stopping/restarting
    1587 smbd
    1588 and
    1589 nmbd\&.
    15901543.sp
    15911544Default:
     
    16761629.sp
    16771630Default:
    1678 \fI\fIcache directory\fR\fR\fI = \fR\fI${prefix}/var/locks\fR\fI \fR
     1631\fI\fIcache directory\fR\fR\fI = \fR\fI${prefix}/var/cache\fR\fI \fR
    16791632.sp
    16801633Example:
     
    17011654.RE
    17021655
    1703 change notify (S)
     1656change notify (G)
    17041657.\" change notify
    17051658.PP
     
    17341687will automatically invoke the
    17351688\fIchange share command\fR
    1736 with five parameters\&.
     1689with six parameters\&.
    17371690.sp
    17381691.RS 4
     
    17981751.RE
    17991752.sp
     1753.RS 4
     1754.ie n \{\
     1755\h'-04'\(bu\h'+03'\c
     1756.\}
     1757.el \{\
     1758.sp -1
     1759.IP \(bu 2.3
     1760.\}
     1761\fICSC policy\fR
     1762\- client side caching policy in string form\&. Valid values are: manual, documents, programs, disable\&.
     1763.RE
     1764.sp
    18001765.RE
    18011766This parameter is only used to modify existing file share definitions\&. To modify printer shares, use the "Printers\&.\&.\&." folder as seen when browsing the Samba host\&.
     
    18211786.sp
    18221787Default:
    1823 \fI\fIcheck password script\fR\fR\fI = \fR\fIDisabled\fR\fI \fR
     1788\fI\fIcheck password script\fR\fR\fI = \fR\fI # Disabled\fR\fI \fR
    18241789.sp
    18251790Example:
    18261791\fI\fIcheck password script\fR\fR\fI = \fR\fI/usr/local/sbin/crackcheck\fR\fI \fR
     1792.RE
     1793
     1794cldap port (G)
     1795.\" cldap port
     1796.PP
     1797.RS 4
     1798This option controls the port used by the CLDAP protocol\&.
     1799.sp
     1800Default:
     1801\fI\fIcldap port\fR\fR\fI = \fR\fI389\fR\fI \fR
     1802.sp
     1803Example:
     1804\fI\fIcldap port\fR\fR\fI = \fR\fI3389\fR\fI \fR
     1805.RE
     1806
     1807client ipc max protocol (G)
     1808.\" client ipc max protocol
     1809.PP
     1810.RS 4
     1811The value of the parameter (a string) is the highest protocol level that will be supported for IPC$ connections as DCERPC transport\&.
     1812.sp
     1813Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.
     1814.sp
     1815The value
     1816\fBdefault\fR
     1817refers to the latest supported protocol, currently
     1818\fBSMB3_11\fR\&.
     1819.sp
     1820See
     1821\m[blue]\fBclient max protocol\fR\m[]
     1822for a full list of available protocols\&. The values CORE, COREPLUS, LANMAN1, LANMAN2 are silently upgraded to NT1\&.
     1823.sp
     1824Default:
     1825\fI\fIclient ipc max protocol\fR\fR\fI = \fR\fIdefault\fR\fI \fR
     1826.sp
     1827Example:
     1828\fI\fIclient ipc max protocol\fR\fR\fI = \fR\fISMB2_10\fR\fI \fR
     1829.RE
     1830
     1831client ipc min protocol (G)
     1832.\" client ipc min protocol
     1833.PP
     1834.RS 4
     1835This setting controls the minimum protocol version that the will be attempted to use for IPC$ connections as DCERPC transport\&.
     1836.sp
     1837Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.
     1838.sp
     1839The value
     1840\fBdefault\fR
     1841refers to the higher value of
     1842\fBNT1\fR
     1843and the effective value of
     1844\m[blue]\fBclient min protocol\fR\m[]\&.
     1845.sp
     1846See
     1847\m[blue]\fBclient max protocol\fR\m[]
     1848for a full list of available protocols\&. The values CORE, COREPLUS, LANMAN1, LANMAN2 are silently upgraded to NT1\&.
     1849.sp
     1850Default:
     1851\fI\fIclient ipc min protocol\fR\fR\fI = \fR\fIdefault\fR\fI \fR
     1852.sp
     1853Example:
     1854\fI\fIclient ipc min protocol\fR\fR\fI = \fR\fISMB3_11\fR\fI \fR
     1855.RE
     1856
     1857client ipc signing (G)
     1858.\" client ipc signing
     1859.PP
     1860.RS 4
     1861This controls whether the client is allowed or required to use SMB signing for IPC$ connections as DCERPC transport\&. Possible values are
     1862\fIauto\fR,
     1863\fImandatory\fR
     1864and
     1865\fIdisabled\fR\&.
     1866.sp
     1867When set to mandatory or default, SMB signing is required\&.
     1868.sp
     1869When set to auto, SMB signing is offered, but not enforced and if set to disabled, SMB signing is not offered either\&.
     1870.sp
     1871Connections from winbindd to Active Directory Domain Controllers always enforce signing\&.
     1872.sp
     1873Default:
     1874\fI\fIclient ipc signing\fR\fR\fI = \fR\fIdefault\fR\fI \fR
    18271875.RE
    18281876
     
    18671915are only available if Samba has been compiled against a modern OpenLDAP version (2\&.3\&.x or higher)\&.
    18681916.sp
    1869 This option is needed in the case of Domain Controllers enforcing the usage of signed LDAP connections (e\&.g\&. Windows 2000 SP3 or higher)\&. LDAP sign and seal can be controlled with the registry key "HKLM\eSystem\eCurrentControlSet\eServices\e
    1870 NTDS\eParameters\eLDAPServerIntegrity" on the Windows server side\&.
     1917This option is needed in the case of Domain Controllers enforcing the usage of signed LDAP connections (e\&.g\&. Windows 2000 SP3 or higher)\&. LDAP sign and seal can be controlled with the registry key "HKLM\eSystem\eCurrentControlSet\eServices\eNTDS\eParameters\eLDAPServerIntegrity" on the Windows server side\&.
    18711918.sp
    18721919Depending on the used KRB5 library (MIT and older Heimdal versions) it is possible that the message "integrity only" is not supported\&. In this case,
     
    18761923.sp
    18771924The default value is
    1878 \fIplain\fR
    1879 which is not irritable to KRB5 clock skew errors\&. That implies synchronizing the time with the KDC in the case of using
    1880 \fIsign\fR
    1881 or
    1882 \fIseal\fR\&.
    1883 .sp
    1884 Default:
    1885 \fI\fIclient ldap sasl wrapping\fR\fR\fI = \fR\fIplain\fR\fI \fR
    1886 .RE
    1887 
    1888 client ntlmv2 auth (G)
    1889 .\" client ntlmv2 auth
     1925\fIsign\fR\&. That implies synchronizing the time with the KDC in the case of using
     1926\fIKerberos\fR\&.
     1927.sp
     1928Default:
     1929\fI\fIclient ldap sasl wrapping\fR\fR\fI = \fR\fIsign\fR\fI \fR
     1930.RE
     1931
     1932client max protocol (G)
     1933.\" client max protocol
     1934.PP
     1935.RS 4
     1936The value of the parameter (a string) is the highest protocol level that will be supported by the client\&.
     1937.sp
     1938Possible values are :
     1939.sp
     1940.RS 4
     1941.ie n \{\
     1942\h'-04'\(bu\h'+03'\c
     1943.\}
     1944.el \{\
     1945.sp -1
     1946.IP \(bu 2.3
     1947.\}
     1948\fBCORE\fR: Earliest version\&. No concept of user names\&.
     1949.RE
     1950.sp
     1951.RS 4
     1952.ie n \{\
     1953\h'-04'\(bu\h'+03'\c
     1954.\}
     1955.el \{\
     1956.sp -1
     1957.IP \(bu 2.3
     1958.\}
     1959\fBCOREPLUS\fR: Slight improvements on CORE for efficiency\&.
     1960.RE
     1961.sp
     1962.RS 4
     1963.ie n \{\
     1964\h'-04'\(bu\h'+03'\c
     1965.\}
     1966.el \{\
     1967.sp -1
     1968.IP \(bu 2.3
     1969.\}
     1970\fBLANMAN1\fR: First
     1971\fImodern\fR
     1972version of the protocol\&. Long filename support\&.
     1973.RE
     1974.sp
     1975.RS 4
     1976.ie n \{\
     1977\h'-04'\(bu\h'+03'\c
     1978.\}
     1979.el \{\
     1980.sp -1
     1981.IP \(bu 2.3
     1982.\}
     1983\fBLANMAN2\fR: Updates to Lanman1 protocol\&.
     1984.RE
     1985.sp
     1986.RS 4
     1987.ie n \{\
     1988\h'-04'\(bu\h'+03'\c
     1989.\}
     1990.el \{\
     1991.sp -1
     1992.IP \(bu 2.3
     1993.\}
     1994\fBNT1\fR: Current up to date version of the protocol\&. Used by Windows NT\&. Known as CIFS\&.
     1995.RE
     1996.sp
     1997.RS 4
     1998.ie n \{\
     1999\h'-04'\(bu\h'+03'\c
     2000.\}
     2001.el \{\
     2002.sp -1
     2003.IP \(bu 2.3
     2004.\}
     2005\fBSMB2\fR: Re\-implementation of the SMB protocol\&. Used by Windows Vista and later versions of Windows\&. SMB2 has sub protocols available\&.
     2006.sp
     2007.RS 4
     2008.ie n \{\
     2009\h'-04'\(bu\h'+03'\c
     2010.\}
     2011.el \{\
     2012.sp -1
     2013.IP \(bu 2.3
     2014.\}
     2015\fBSMB2_02\fR: The earliest SMB2 version\&.
     2016.RE
     2017.sp
     2018.RS 4
     2019.ie n \{\
     2020\h'-04'\(bu\h'+03'\c
     2021.\}
     2022.el \{\
     2023.sp -1
     2024.IP \(bu 2.3
     2025.\}
     2026\fBSMB2_10\fR: Windows 7 SMB2 version\&.
     2027.RE
     2028.sp
     2029.RS 4
     2030.ie n \{\
     2031\h'-04'\(bu\h'+03'\c
     2032.\}
     2033.el \{\
     2034.sp -1
     2035.IP \(bu 2.3
     2036.\}
     2037\fBSMB2_22\fR: Early Windows 8 SMB2 version\&.
     2038.RE
     2039.sp
     2040.RS 4
     2041.ie n \{\
     2042\h'-04'\(bu\h'+03'\c
     2043.\}
     2044.el \{\
     2045.sp -1
     2046.IP \(bu 2.3
     2047.\}
     2048\fBSMB2_24\fR: Windows 8 beta SMB2 version\&.
     2049.RE
     2050.sp
     2051.RE
     2052By default SMB2 selects the SMB2_10 variant\&.
     2053.RE
     2054.sp
     2055.RS 4
     2056.ie n \{\
     2057\h'-04'\(bu\h'+03'\c
     2058.\}
     2059.el \{\
     2060.sp -1
     2061.IP \(bu 2.3
     2062.\}
     2063\fBSMB3\fR: The same as SMB2\&. Used by Windows 8\&. SMB3 has sub protocols available\&.
     2064.sp
     2065.RS 4
     2066.ie n \{\
     2067\h'-04'\(bu\h'+03'\c
     2068.\}
     2069.el \{\
     2070.sp -1
     2071.IP \(bu 2.3
     2072.\}
     2073\fBSMB3_00\fR: Windows 8 SMB3 version\&. (mostly the same as SMB2_24)
     2074.RE
     2075.sp
     2076.RS 4
     2077.ie n \{\
     2078\h'-04'\(bu\h'+03'\c
     2079.\}
     2080.el \{\
     2081.sp -1
     2082.IP \(bu 2.3
     2083.\}
     2084\fBSMB3_02\fR: Windows 8\&.1 SMB3 version\&.
     2085.RE
     2086.sp
     2087.RS 4
     2088.ie n \{\
     2089\h'-04'\(bu\h'+03'\c
     2090.\}
     2091.el \{\
     2092.sp -1
     2093.IP \(bu 2.3
     2094.\}
     2095\fBSMB3_10\fR: early Windows 10 technical preview SMB3 version\&.
     2096.RE
     2097.sp
     2098.RS 4
     2099.ie n \{\
     2100\h'-04'\(bu\h'+03'\c
     2101.\}
     2102.el \{\
     2103.sp -1
     2104.IP \(bu 2.3
     2105.\}
     2106\fBSMB3_11\fR: Windows 10 technical preview SMB3 version (maybe final)\&.
     2107.RE
     2108.sp
     2109.RE
     2110By default SMB3 selects the SMB3_11 variant\&.
     2111.RE
     2112.sp
     2113.RE
     2114Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.
     2115.sp
     2116The value
     2117\fBdefault\fR
     2118refers to
     2119\fBNT1\fR\&.
     2120.sp
     2121IPC$ connections for DCERPC e\&.g\&. in winbindd, are handled by the
     2122\m[blue]\fBclient ipc max protocol\fR\m[]
     2123option\&.
     2124.sp
     2125Default:
     2126\fI\fIclient max protocol\fR\fR\fI = \fR\fIdefault\fR\fI \fR
     2127.sp
     2128Example:
     2129\fI\fIclient max protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR
     2130.RE
     2131
     2132client min protocol (G)
     2133.\" client min protocol
     2134.PP
     2135.RS 4
     2136This setting controls the minimum protocol version that the client will attempt to use\&.
     2137.sp
     2138Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.
     2139.sp
     2140See
     2141Related command: \m[blue]\fBclient max protocol\fR\m[]
     2142for a full list of available protocols\&.
     2143.sp
     2144IPC$ connections for DCERPC e\&.g\&. in winbindd, are handled by the
     2145\m[blue]\fBclient ipc min protocol\fR\m[]
     2146option\&.
     2147.sp
     2148Default:
     2149\fI\fIclient min protocol\fR\fR\fI = \fR\fICORE\fR\fI \fR
     2150.sp
     2151Example:
     2152\fI\fIclient min protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR
     2153.RE
     2154
     2155client NTLMv2 auth (G)
     2156.\" client NTLMv2 auth
    18902157.PP
    18912158.RS 4
     
    19072174Note that Windows Vista and later versions already use NTLMv2 by default, and some sites (particularly those following \*(Aqbest practice\*(Aq security polices) only allow NTLMv2 responses, and not the weaker LM or NTLM\&.
    19082175.sp
    1909 Default:
    1910 \fI\fIclient ntlmv2 auth\fR\fR\fI = \fR\fIyes\fR\fI \fR
     2176When
     2177\m[blue]\fBclient use spnego\fR\m[]
     2178is also set to
     2179\fByes\fR
     2180extended security (SPNEGO) is required in order to use NTLMv2 only within NTLMSSP\&. This behavior was introduced with the patches for CVE\-2016\-2111\&.
     2181.sp
     2182Default:
     2183\fI\fIclient NTLMv2 auth\fR\fR\fI = \fR\fIyes\fR\fI \fR
    19112184.RE
    19122185
     
    19332206denies access if the server is not able to speak netlogon schannel\&.
    19342207.sp
     2208Note that for active directory domains this is hardcoded to
     2209\m[blue]\fBclient schannel = yes\fR\m[]\&.
     2210.sp
     2211This option yields precedence to the
     2212\m[blue]\fBrequire strong key\fR\m[]
     2213option\&.
     2214.sp
    19352215Default:
    19362216\fI\fIclient schannel\fR\fR\fI = \fR\fIauto\fR\fI \fR
     
    19502230\fIdisabled\fR\&.
    19512231.sp
    1952 When set to auto, SMB signing is offered, but not enforced\&. When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either\&.
    1953 .sp
    1954 Default:
    1955 \fI\fIclient signing\fR\fR\fI = \fR\fIauto\fR\fI \fR
     2232When set to auto or default, SMB signing is offered, but not enforced\&.
     2233.sp
     2234When set to mandatory, SMB signing is required and if set to disabled, SMB signing is not offered either\&.
     2235.sp
     2236IPC$ connections for DCERPC e\&.g\&. in winbindd, are handled by the
     2237\m[blue]\fBclient ipc signing\fR\m[]
     2238option\&.
     2239.sp
     2240Default:
     2241\fI\fIclient signing\fR\fR\fI = \fR\fIdefault\fR\fI \fR
    19562242.RE
    19572243
     
    19662252If enabled, Samba can attempt to use Kerberos to contact servers known only by IP address\&. Kerberos relies on names, so ordinarily cannot function in this situation\&.
    19672253.sp
     2254This is a VERY BAD IDEA for security reasons, and so this parameter SHOULD NOT BE USED\&. It will be removed in a future version of Samba\&.
     2255.sp
    19682256If disabled, Samba will use the name used to look up the server when asking the KDC for a ticket\&. This avoids situations where a server may impersonate another, soliciting authentication as one principal while being known on the network as another\&.
    19692257.sp
    19702258Note that Windows XP SP2 and later versions already follow this behaviour, and Windows Vista and later servers no longer supply this \*(Aqrfc4178 hint\*(Aq principal on the server side\&.
     2259.sp
     2260This parameter is deprecated in Samba 4\&.2\&.1 and will be removed (along with the functionality) in a later release of Samba\&.
    19712261.sp
    19722262Default:
     
    19792269.RS 4
    19802270This variable controls whether Samba clients will try to use Simple and Protected NEGOciation (as specified by rfc2478) with supporting servers (including WindowsXP, Windows2000 and Samba 3\&.0) to agree upon an authentication mechanism\&. This enables Kerberos authentication in particular\&.
     2271.sp
     2272When
     2273\m[blue]\fBclient NTLMv2 auth\fR\m[]
     2274is also set to
     2275\fByes\fR
     2276extended security (SPNEGO) is required in order to use NTLMv2 only within NTLMSSP\&. This behavior was introduced with the patches for CVE\-2016\-2111\&.
    19812277.sp
    19822278Default:
     
    20922388.PP
    20932389.RS 4
    2094 Setting this paramter to
     2390Setting this parameter to
    20952391no
    20962392prevents winbind from creating custom krb5\&.conf files\&. Winbind normally does this because the krb5 libraries are not AD\-site\-aware and thus would pick any domain controller out of potentially very many\&. Winbind is site\-aware and makes the krb5 libraries use a local DC by creating its own krb5\&.conf files\&.
     
    21322428for details\&.
    21332429.sp
    2134 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors\&. If the administrator wishes to enforce a mask on access control lists also, they need to set the
    2135 \m[blue]\fBsecurity mask\fR\m[]\&.
    2136 .sp
    21372430Default:
    21382431\fI\fIcreate mask\fR\fR\fI = \fR\fI0744\fR\fI \fR
     
    21932486.PP
    21942487.RS 4
    2195 This parameter specifies a timeout in seconds for the connection between Samba and ctdb\&. It is only valid if you have compiled Samba with clustering and if you have set
     2488This parameter specifies a timeout in milliseconds for the connection between Samba and ctdb\&. It is only valid if you have compiled Samba with clustering and if you have set
    21962489\fIclustering=yes\fR\&.
    21972490.sp
    21982491When something in the cluster blocks, it can happen that we wait indefinitely long for ctdb, just adding to the blocking condition\&. In a well\-running cluster this should never happen, but there are too many components in a cluster that might have hickups\&. Choosing the right balance for this value is very tricky, because on a busy cluster long service times to transfer something across the cluster might be valid\&. Setting it too short will degrade the service your cluster presents, setting it too long might make the cluster itself not recover from something severely broken for too long\&.
    21992492.sp
    2200 Be aware that if you set this parameter, this needs to be in the file smb\&.conf, it is not really helpful to put this into a registry configuration (typical on a cluster), because to access the registry contact to ctdb is requred\&.
     2493Be aware that if you set this parameter, this needs to be in the file smb\&.conf, it is not really helpful to put this into a registry configuration (typical on a cluster), because to access the registry contact to ctdb is required\&.
    22012494.sp
    22022495Setting
    22032496\fIctdb timeout\fR
    2204 to n makes any process waiting longer than n seconds for a reply by the cluster panic\&. Setting it to 0 (the default) makes Samba block forever, which is the highly recommended default\&.
     2497to n makes any process waiting longer than n milliseconds for a reply by the cluster panic\&. Setting it to 0 (the default) makes Samba block forever, which is the highly recommended default\&.
    22052498.sp
    22062499Default:
     
    22432536.sp
    22442537Default:
    2245 \fI\fIcups encrypt\fR\fR\fI = \fR\fI"no"\fR\fI \fR
     2538\fI\fIcups encrypt\fR\fR\fI = \fR\fIno\fR\fI \fR
    22462539.RE
    22472540
     
    22952588.RE
    22962589
     2590dcerpc endpoint servers (G)
     2591.\" dcerpc endpoint servers
     2592.PP
     2593.RS 4
     2594Specifies which DCE/RPC endpoint servers should be run\&.
     2595.sp
     2596Default:
     2597\fI\fIdcerpc endpoint servers\fR\fR\fI = \fR\fIepmapper, wkssvc, rpcecho, samr, netlogon, lsarpc, spoolss, drsuapi, dssetup, unixinfo, browser, eventlog6, backupkey, dnsserver\fR\fI \fR
     2598.sp
     2599Example:
     2600\fI\fIdcerpc endpoint servers\fR\fR\fI = \fR\fIrpcecho\fR\fI \fR
     2601.RE
     2602
    22972603deadtime (G)
    22982604.\" deadtime
     
    23722678Default:
    23732679\fI\fIdebug prefix timestamp\fR\fR\fI = \fR\fIno\fR\fI \fR
    2374 .RE
    2375 
    2376 timestamp logs
    2377 .\" timestamp logs
    2378 .PP
    2379 .RS 4
    2380 This parameter is a synonym for
    2381 debug timestamp\&.
    2382 .RE
    2383 
    2384 debug timestamp (G)
    2385 .\" debug timestamp
    2386 .PP
    2387 .RS 4
    2388 Samba debug log messages are timestamped by default\&. If you are running at a high
    2389 \m[blue]\fBdebug level\fR\m[]
    2390 these timestamps can be distracting\&. This boolean parameter allows timestamping to be turned off\&.
    2391 .sp
    2392 Default:
    2393 \fI\fIdebug timestamp\fR\fR\fI = \fR\fIyes\fR\fI \fR
    23942680.RE
    23952681
     
    25042790.sp
    25052791Default:
    2506 \fI\fIdefer sharing violations\fR\fR\fI = \fR\fITrue\fR\fI \fR
     2792\fI\fIdefer sharing violations\fR\fR\fI = \fR\fIyes\fR\fI \fR
    25072793.RE
    25082794
     
    25122798.RS 4
    25132799This is the full pathname to a script that will be run
    2514 \fIAS ROOT\fR
    2515 \fBsmbd\fR(8)
     2800\fIAS ROOT\fR\fBsmbd\fR(8)
    25162801when a group is requested to be deleted\&. It will expand any
    25172802\fI%g\fR
     
    26322917.RS 4
    26332918Full path to the script that will be called when a user is removed from a group using the Windows NT domain administration tools\&. It will be run by
    2634 \fBsmbd\fR(8)
    2635 \fIAS ROOT\fR\&. Any
     2919\fBsmbd\fR(8)\fIAS ROOT\fR\&. Any
    26362920\fI%g\fR
    26372921will be replaced with the group name and any
     
    27052989.sp
    27062990Example:
    2707 \fI\fIdfree cache time\fR\fR\fI = \fR\fIdfree cache time = 60\fR\fI \fR
     2991\fI\fIdfree cache time\fR\fR\fI = \fR\fI60\fR\fI \fR
    27082992.RE
    27092993
     
    27673051.RE
    27683052
     3053dgram port (G)
     3054.\" dgram port
     3055.PP
     3056.RS 4
     3057Specifies which ports the server should listen on for NetBIOS datagram traffic\&.
     3058.sp
     3059Default:
     3060\fI\fIdgram port\fR\fR\fI = \fR\fI138\fR\fI \fR
     3061.RE
     3062
    27693063directory mode
    27703064.\" directory mode
     
    27913085parameter\&. This parameter is set to 000 by default (i\&.e\&. no extra mode bits are added)\&.
    27923086.sp
    2793 Note that this parameter does not apply to permissions set by Windows NT/2000 ACL editors\&. If the administrator wishes to enforce a mask on access control lists also, they need to set the
    2794 \m[blue]\fBdirectory security mask\fR\m[]\&.
    2795 .sp
    27963087Default:
    27973088\fI\fIdirectory mask\fR\fR\fI = \fR\fI0755\fR\fI \fR
     
    28053096.PP
    28063097.RS 4
    2807 This parameter specifies the the size of the directory name cache\&. It will be needed to turn this off for *BSD systems\&.
     3098This parameter specifies the size of the directory name cache\&. It will be needed to turn this off for *BSD systems\&.
    28083099.sp
    28093100Default:
     
    28153106.PP
    28163107.RS 4
    2817 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box\&.
    2818 .sp
    2819 This parameter is applied as a mask (AND\*(Aqed with) to the incoming permission bits, thus resetting any bits not in this mask\&. Make sure not to mix up this parameter with
    2820 \m[blue]\fBforce directory security mode\fR\m[], which works similar like this one but uses logical OR instead of AND\&. Essentially, zero bits in this mask are a set of bits that will always be set to zero\&.
    2821 .sp
    2822 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the file permissions regardless of the previous status of this bits on the file\&.
    2823 .sp
    2824 If not set explicitly this parameter is set to 0777 meaning a user is allowed to set all the user/group/world permissions on a directory\&.
    2825 .sp
    2826 \fINote\fR
    2827 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it as the default of
    2828 \fB0777\fR\&.
    2829 .sp
    2830 Default:
    2831 \fI\fIdirectory security mask\fR\fR\fI = \fR\fI0777\fR\fI \fR
    2832 .sp
    2833 Example:
    2834 \fI\fIdirectory security mask\fR\fR\fI = \fR\fI0700\fR\fI \fR
     3108This parameter has been removed for Samba 4\&.0\&.0\&.
     3109.sp
     3110\fINo default\fR
    28353111.RE
    28363112
     
    28703146.RE
    28713147
    2872 display charset (G)
    2873 .\" display charset
    2874 .PP
    2875 .RS 4
    2876 Specifies the charset that samba will use to print messages to stdout and stderr\&. The default value is "LOCALE", which means automatically set, depending on the current locale\&. The value should generally be the same as the value of the parameter
    2877 \m[blue]\fBunix charset\fR\m[]\&.
    2878 .sp
    2879 Default:
    2880 \fI\fIdisplay charset\fR\fR\fI = \fR\fI"LOCALE" or "ASCII" (depending on the system)\fR\fI \fR
    2881 .sp
    2882 Example:
    2883 \fI\fIdisplay charset\fR\fR\fI = \fR\fIUTF8\fR\fI \fR
    2884 .RE
    2885 
    28863148dmapi support (S)
    28873149.\" dmapi support
     
    28963158Default:
    28973159\fI\fIdmapi support\fR\fR\fI = \fR\fIno\fR\fI \fR
     3160.RE
     3161
     3162dns forwarder (G)
     3163.\" dns forwarder
     3164.PP
     3165.RS 4
     3166This option specifies the DNS server that DNS requests will be forwarded to if they can not be handled by Samba itself\&.
     3167.sp
     3168The DNS forwarder is only used if the internal DNS server in Samba is used\&.
     3169.sp
     3170Default:
     3171\fI\fIdns forwarder\fR\fR\fI = \fR\fI\fR\fI \fR
     3172.sp
     3173Example:
     3174\fI\fIdns forwarder\fR\fR\fI = \fR\fI192\&.168\&.0\&.1\fR\fI \fR
    28983175.RE
    28993176
     
    29133190Default:
    29143191\fI\fIdns proxy\fR\fR\fI = \fR\fIyes\fR\fI \fR
     3192.RE
     3193
     3194dns update command (G)
     3195.\" dns update command
     3196.PP
     3197.RS 4
     3198This option sets the command that is called when there are DNS updates\&. It should update the local machines DNS names using TSIG\-GSS\&.
     3199.sp
     3200Default:
     3201\fI\fIdns update command\fR\fR\fI = \fR\fI${prefix}/sbin/samba_dnsupdate\fR\fI \fR
     3202.sp
     3203Example:
     3204\fI\fIdns update command\fR\fR\fI = \fR\fI/usr/local/sbin/dnsupdate\fR\fI \fR
    29153205.RE
    29163206
     
    30333323.PP
    30343324.RS 4
    3035 Under DOS and Windows, if a user can write to a file they can change the timestamp on it\&. Under POSIX semantics, only the owner of the file or root may change the timestamp\&. By default, Samba emulates the DOS semantics and allows to change the timestamp on a file if the user
     3325Under DOS and Windows, if a user can write to a file they can change the timestamp on it\&. Under POSIX semantics, only the owner of the file or root may change the timestamp\&. By default, Samba emulates the DOS semantics and allows one to change the timestamp on a file if the user
    30363326smbd
    30373327is acting on behalf has write permissions\&. Due to changes in Microsoft Office 2000 and beyond, the default for this parameter has been changed from "no" to "yes" in Samba 3\&.0\&.14 and above\&. Microsoft Excel will display dialog box warnings about the file being changed by another user if this parameter is not set to "yes" and files are being shared between users\&.
     
    30393329Default:
    30403330\fI\fIdos filetimes\fR\fR\fI = \fR\fIyes\fR\fI \fR
     3331.RE
     3332
     3333durable handles (S)
     3334.\" durable handles
     3335.PP
     3336.RS 4
     3337This boolean parameter controls whether Samba can grant SMB2 durable file handles on a share\&.
     3338.sp
     3339Note that durable handles are only enabled if
     3340\m[blue]\fBkernel oplocks = no\fR\m[],
     3341\m[blue]\fBkernel share modes = no\fR\m[], and
     3342\m[blue]\fBposix locking = no\fR\m[], i\&.e\&. if the share is configured for CIFS/SMB2 only access, not supporting interoperability features with local UNIX processes or NFS operations\&.
     3343.sp
     3344Also note that, for the time being, durability is not granted for a handle that has the delete on close flag set\&.
     3345.sp
     3346Default:
     3347\fI\fIdurable handles\fR\fR\fI = \fR\fIyes\fR\fI \fR
    30413348.RE
    30423349
     
    30573364.PP
    30583365.RS 4
    3059 Hosts running the "Advanced Server for Unix (ASU)" product require some special accomodations such as creating a builtin [ADMIN$] share that only supports IPC connections\&. The has been the default behavior in smbd for many years\&. However, certain Microsoft applications such as the Print Migrator tool require that the remote server support an [ADMIN$} file share\&. Disabling this parameter allows for creating an [ADMIN$] file share in smb\&.conf\&.
     3366Hosts running the "Advanced Server for Unix (ASU)" product require some special accomodations such as creating a builtin [ADMIN$] share that only supports IPC connections\&. The has been the default behavior in smbd for many years\&. However, certain Microsoft applications such as the Print Migrator tool require that the remote server support an [ADMIN$] file share\&. Disabling this parameter allows for creating an [ADMIN$] file share in smb\&.conf\&.
    30603367.sp
    30613368Default:
     
    31213428\fBsmbpasswd\fR(8)
    31223429program for information on how to set up and maintain this file), or set the
    3123 \m[blue]\fBsecurity = [server|domain|ads]\fR\m[]
     3430\m[blue]\fBsecurity = [domain|ads]\fR\m[]
    31243431parameter which causes
    31253432smbd
     
    31683475.RS 4
    31693476This option defines a list of log names that Samba will report to the Microsoft EventViewer utility\&. The listed eventlogs will be associated with tdb file on disk in the
    3170 $(lockdir)/eventlog\&.
     3477$(statedir)/eventlog\&.
    31713478.sp
    31723479The administrator must use an external process to parse the normal Unix logs such as
     
    31893496This option is mainly used as a compatibility option for Visual C++ when used against Samba shares\&. Visual C++ generated makefiles have the object directory as a dependency for each object file, and a make rule to create the directory\&. Also, when NMAKE compares timestamps it uses the creation time when examining a directory\&. Thus the object directory will be created if it does not exist, but once it does exist it will always have an earlier timestamp than the object files it contains\&.
    31903497.sp
    3191 However, Unix time semantics mean that the create time reported by Samba will be updated whenever a file is created or or deleted in the directory\&. NMAKE finds all object files in the object directory\&. The timestamp of the last one built is then compared to the timestamp of the object directory\&. If the directory\*(Aqs timestamp if newer, then all object files will be rebuilt\&. Enabling this option ensures directories always predate their contents and an NMAKE build will proceed as expected\&.
     3498However, Unix time semantics mean that the create time reported by Samba will be updated whenever a file is created or deleted in the directory\&. NMAKE finds all object files in the object directory\&. The timestamp of the last one built is then compared to the timestamp of the object directory\&. If the directory\*(Aqs timestamp if newer, then all object files will be rebuilt\&. Enabling this option ensures directories always predate their contents and an NMAKE build will proceed as expected\&.
    31923499.sp
    31933500Default:
     
    32493556.sp
    32503557Default:
    3251 \fI\fIforce create mode\fR\fR\fI = \fR\fI000\fR\fI \fR
     3558\fI\fIforce create mode\fR\fR\fI = \fR\fI0000\fR\fI \fR
    32523559.sp
    32533560Example:
     
    32683575.sp
    32693576Default:
    3270 \fI\fIforce directory mode\fR\fR\fI = \fR\fI000\fR\fI \fR
     3577\fI\fIforce directory mode\fR\fR\fI = \fR\fI0000\fR\fI \fR
    32713578.sp
    32723579Example:
     
    32783585.PP
    32793586.RS 4
    3280 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box\&.
    3281 .sp
    3282 This parameter is applied as a mask (OR\*(Aqed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on\&. Make sure not to mix up this parameter with
    3283 \m[blue]\fBdirectory security mask\fR\m[], which works in a similar manner to this one, but uses a logical AND instead of an OR\&.
    3284 .sp
    3285 Essentially, this mask may be treated as a set of bits that, when modifying security on a directory, to will enable (1) any flags that are off (0) but which the mask has set to on (1)\&.
    3286 .sp
    3287 If not set explicitly this parameter is 0000, which allows a user to modify all the user/group/world permissions on a directory without restrictions\&.
    3288 .if n \{\
    3289 .sp
    3290 .\}
    3291 .RS 4
    3292 .it 1 an-trap
    3293 .nr an-no-space-flag 1
    3294 .nr an-break-flag 1
    3295 .br
    3296 .ps +1
    3297 \fBNote\fR
    3298 .ps -1
    3299 .br
    3300 Users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it set as 0000\&.
    3301 .sp .5v
    3302 .RE
    3303 Default:
    3304 \fI\fIforce directory security mode\fR\fR\fI = \fR\fI0\fR\fI \fR
    3305 .sp
    3306 Example:
    3307 \fI\fIforce directory security mode\fR\fR\fI = \fR\fI700\fR\fI \fR
     3587This parameter has been removed for Samba 4\&.0\&.0\&.
     3588.sp
     3589\fINo default\fR
    33083590.RE
    33093591
     
    33653647.PP
    33663648.RS 4
    3367 This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box\&.
    3368 .sp
    3369 This parameter is applied as a mask (OR\*(Aqed with) to the changed permission bits, thus forcing any bits in this mask that the user may have modified to be on\&. Make sure not to mix up this parameter with
    3370 \m[blue]\fBsecurity mask\fR\m[], which works similar like this one but uses logical AND instead of OR\&.
    3371 .sp
    3372 Essentially, one bits in this mask may be treated as a set of bits that, when modifying security on a file, the user has always set to be on\&.
    3373 .sp
    3374 If not set explicitly this parameter is set to 0, and allows a user to modify all the user/group/world permissions on a file, with no restrictions\&.
    3375 .sp
    3376 \fI Note\fR
    3377 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave this set to 0000\&.
    3378 .sp
    3379 Default:
    3380 \fI\fIforce security mode\fR\fR\fI = \fR\fI0\fR\fI \fR
    3381 .sp
    3382 Example:
    3383 \fI\fIforce security mode\fR\fR\fI = \fR\fI700\fR\fI \fR
     3649This parameter has been removed for Samba 4\&.0\&.0\&.
     3650.sp
     3651\fINo default\fR
    33843652.RE
    33853653
     
    34133681Example:
    34143682\fI\fIforce user\fR\fR\fI = \fR\fIauser\fR\fI \fR
     3683.RE
     3684
     3685fss: prune stale (G)
     3686.\" fss: prune stale
     3687.PP
     3688.RS 4
     3689When enabled, Samba\*(Aqs File Server Remove VSS Protocol (FSRVP) server checks all FSRVP initiated snapshots on startup, and removes any corresponding state (including share definitions) for nonexistent snapshot paths\&.
     3690.sp
     3691Default:
     3692\fI\fIfss: prune stale\fR\fR\fI = \fR\fIno\fR\fI \fR
     3693.sp
     3694Example:
     3695\fI\fIfss: prune stale\fR\fR\fI = \fR\fIyes\fR\fI \fR
     3696.RE
     3697
     3698fss: sequence timeout (G)
     3699.\" fss: sequence timeout
     3700.PP
     3701.RS 4
     3702The File Server Remove VSS Protocol (FSRVP) server includes a message sequence timer to ensure cleanup on unexpected client disconnect\&. This parameter overrides the default timeout between FSRVP operations\&. FSRVP timeouts can be completely disabled via a value of 0\&.
     3703.sp
     3704Default:
     3705\fI\fIfss: sequence timeout\fR\fR\fI = \fR\fI180 or 1800, depending on operation\fR\fI \fR
     3706.sp
     3707Example:
     3708\fI\fIfss: sequence timeout\fR\fR\fI = \fR\fI0\fR\fI \fR
    34153709.RE
    34163710
     
    34443738should only be used whenever there is no operating system API available from the OS that samba can use\&.
    34453739.sp
    3446 This option is only available you have compiled Samba with the
    3447 \-\-with\-sys\-quotas
    3448 option or on Linux with
    3449 \-\-with\-quotas
    3450 and a working quota api was found in the system\&.
     3740This option is only available Samba was compiled with quotas support\&.
    34513741.sp
    34523742This parameter should specify the path to a script that queries the quota information for the specified user/group for the partition that the specified directory is on\&.
    34533743.sp
    3454 Such a script should take 3 arguments:
     3744Such a script is being given 3 arguments:
    34553745.sp
    34563746.RS 4
     
    34883778.sp
    34893779.RE
    3490 The type of query can be one of :
     3780The directory is actually mostly just "\&." \- It needs to be treated relatively to the current working directory that the script can also query\&.
     3781.sp
     3782The type of query can be one of:
    34913783.sp
    34923784.RS 4
     
    35353827.sp
    35363828.RE
    3537 This script should print one line as output with spaces between the arguments\&. The arguments are:
    3538 .sp
    3539 .RS 4
    3540 .ie n \{\
    3541 \h'-04'\(bu\h'+03'\c
    3542 .\}
    3543 .el \{\
    3544 .sp -1
    3545 .IP \(bu 2.3
    3546 .\}
    3547 Arg 1 \- quota flags (0 = no quotas, 1 = quotas enabled, 2 = quotas enabled and enforced)
    3548 .RE
    3549 .sp
    3550 .RS 4
    3551 .ie n \{\
    3552 \h'-04'\(bu\h'+03'\c
    3553 .\}
    3554 .el \{\
    3555 .sp -1
    3556 .IP \(bu 2.3
    3557 .\}
    3558 Arg 2 \- number of currently used blocks
    3559 .RE
    3560 .sp
    3561 .RS 4
    3562 .ie n \{\
    3563 \h'-04'\(bu\h'+03'\c
    3564 .\}
    3565 .el \{\
    3566 .sp -1
    3567 .IP \(bu 2.3
    3568 .\}
    3569 Arg 3 \- the softlimit number of blocks
    3570 .RE
    3571 .sp
    3572 .RS 4
    3573 .ie n \{\
    3574 \h'-04'\(bu\h'+03'\c
    3575 .\}
    3576 .el \{\
    3577 .sp -1
    3578 .IP \(bu 2.3
    3579 .\}
    3580 Arg 4 \- the hardlimit number of blocks
    3581 .RE
    3582 .sp
    3583 .RS 4
    3584 .ie n \{\
    3585 \h'-04'\(bu\h'+03'\c
    3586 .\}
    3587 .el \{\
    3588 .sp -1
    3589 .IP \(bu 2.3
    3590 .\}
    3591 Arg 5 \- currently used number of inodes
    3592 .RE
    3593 .sp
    3594 .RS 4
    3595 .ie n \{\
    3596 \h'-04'\(bu\h'+03'\c
    3597 .\}
    3598 .el \{\
    3599 .sp -1
    3600 .IP \(bu 2.3
    3601 .\}
    3602 Arg 6 \- the softlimit number of inodes
    3603 .RE
    3604 .sp
    3605 .RS 4
    3606 .ie n \{\
    3607 \h'-04'\(bu\h'+03'\c
    3608 .\}
    3609 .el \{\
    3610 .sp -1
    3611 .IP \(bu 2.3
    3612 .\}
    3613 Arg 7 \- the hardlimit number of inodes
    3614 .RE
    3615 .sp
    3616 .RS 4
    3617 .ie n \{\
    3618 \h'-04'\(bu\h'+03'\c
    3619 .\}
    3620 .el \{\
    3621 .sp -1
    3622 .IP \(bu 2.3
    3623 .\}
    3624 Arg 8(optional) \- the number of bytes in a block(default is 1024)
     3829This script should print one line as output with spaces between the columns\&. The printed columns should be:
     3830.sp
     3831.RS 4
     3832.ie n \{\
     3833\h'-04'\(bu\h'+03'\c
     3834.\}
     3835.el \{\
     3836.sp -1
     3837.IP \(bu 2.3
     3838.\}
     38391 \- quota flags (0 = no quotas, 1 = quotas enabled, 2 = quotas enabled and enforced)
     3840.RE
     3841.sp
     3842.RS 4
     3843.ie n \{\
     3844\h'-04'\(bu\h'+03'\c
     3845.\}
     3846.el \{\
     3847.sp -1
     3848.IP \(bu 2.3
     3849.\}
     38502 \- number of currently used blocks
     3851.RE
     3852.sp
     3853.RS 4
     3854.ie n \{\
     3855\h'-04'\(bu\h'+03'\c
     3856.\}
     3857.el \{\
     3858.sp -1
     3859.IP \(bu 2.3
     3860.\}
     38613 \- the softlimit number of blocks
     3862.RE
     3863.sp
     3864.RS 4
     3865.ie n \{\
     3866\h'-04'\(bu\h'+03'\c
     3867.\}
     3868.el \{\
     3869.sp -1
     3870.IP \(bu 2.3
     3871.\}
     38724 \- the hardlimit number of blocks
     3873.RE
     3874.sp
     3875.RS 4
     3876.ie n \{\
     3877\h'-04'\(bu\h'+03'\c
     3878.\}
     3879.el \{\
     3880.sp -1
     3881.IP \(bu 2.3
     3882.\}
     38835 \- currently used number of inodes
     3884.RE
     3885.sp
     3886.RS 4
     3887.ie n \{\
     3888\h'-04'\(bu\h'+03'\c
     3889.\}
     3890.el \{\
     3891.sp -1
     3892.IP \(bu 2.3
     3893.\}
     38946 \- the softlimit number of inodes
     3895.RE
     3896.sp
     3897.RS 4
     3898.ie n \{\
     3899\h'-04'\(bu\h'+03'\c
     3900.\}
     3901.el \{\
     3902.sp -1
     3903.IP \(bu 2.3
     3904.\}
     39057 \- the hardlimit number of inodes
     3906.RE
     3907.sp
     3908.RS 4
     3909.ie n \{\
     3910\h'-04'\(bu\h'+03'\c
     3911.\}
     3912.el \{\
     3913.sp -1
     3914.IP \(bu 2.3
     3915.\}
     39168 (optional) \- the number of bytes in a block(default is 1024)
    36253917.RE
    36263918.sp
     
    37844076This parameter prevents clients from seeing the existance of files that cannot be read\&. Defaults to off\&.
    37854077.sp
     4078Please note that enabling this can slow down listing large directories significantly\&. Samba has to evaluate the ACLs of all directory members, which can be a lot of effort\&.
     4079.sp
    37864080Default:
    37874081\fI\fIhide unreadable\fR\fR\fI = \fR\fIno\fR\fI \fR
     
    37934087.RS 4
    37944088This parameter prevents clients from seeing the existance of files that cannot be written to\&. Defaults to off\&. Note that unwriteable directories are shown as usual\&.
     4089.sp
     4090Please note that enabling this can slow down listing large directories significantly\&. Samba has to evaluate the ACLs of all directory members, which can be a lot of effort\&.
    37954091.sp
    37964092Default:
     
    39984294.PP
    39994295.RS 4
    4000 This parameter specifies the number of seconds that Winbind\*(Aqs idmap interface will cache positive SID/uid/gid query results\&.
    4001 .sp
    4002 Default:
    4003 \fI\fIidmap cache time\fR\fR\fI = \fR\fI604800 (one week)\fR\fI \fR
    4004 .RE
    4005 
    4006 idmap config (G)
    4007 .\" idmap config
     4296This parameter specifies the number of seconds that Winbind\*(Aqs idmap interface will cache positive SID/uid/gid query results\&. By default, Samba will cache these results for one week\&.
     4297.sp
     4298Default:
     4299\fI\fIidmap cache time\fR\fR\fI = \fR\fI604800\fR\fI \fR
     4300.RE
     4301
     4302idmap config DOMAIN : OPTION (G)
     4303.\" idmap config DOMAIN : OPTION
    40084304.PP
    40094305.RS 4
     
    40144310prefix, followed by a domain name or the asterisk character (*), a colon, and the name of an idmap setting for the chosen domain\&.
    40154311.sp
    4016 The idmap configuration is hence divided into groups, one group for each domain to be configured, and one group with the the asterisk instead of a proper domain name, which speifies the default configuration that is used to catch all domains that do not have an explicit idmap configuration of their own\&.
     4312The idmap configuration is hence divided into groups, one group for each domain to be configured, and one group with the asterisk instead of a proper domain name, which specifies the default configuration that is used to catch all domains that do not have an explicit idmap configuration of their own\&.
    40174313.sp
    40184314There are three general options available:
     
    40204316backend = backend_name
    40214317.RS 4
    4022 This specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\&. The standard backends are tdb (\fBidmap_tdb\fR(8)), tdb2 (\fBidmap_tdb2\fR(8)), ldap (\fBidmap_ldap\fR(8)), , rid (\fBidmap_rid\fR(8)), , hash (\fBidmap_hash\fR(8)), , autorid (\fBidmap_autorid\fR(8)), , ad (\fBidmap_ad\fR(8)), , adex (\fBidmap_adex\fR(8)), , and nss\&. (\fBidmap_nss\fR(8)), The corresponding manual pages contain the details, but here is a summary\&.
    4023 .sp
    4024 The first three of these create mappings of their own using internal unixid counters and store the mappings in a database\&. These are suitable for use in the default idmap configuration\&. The rid and hash backends use a pure algorithmic calculation to determine the unixid for a SID\&. The autorid module is a mixture of the tdb and rid backend\&. It creates ranges for each domain encountered and then uses the rid algorithm for each of these automatically configured domains individually\&. The ad and adex backends both use unix IDs stored in Active Directory via the standard schema extensions\&. The nss backend reverses the standard winbindd setup and gets the unixids via names from nsswitch which can be useful in an ldap setup\&.
     4318This specifies the name of the idmap plugin to use as the SID/uid/gid backend for this domain\&. The standard backends are tdb (\fBidmap_tdb\fR(8)), tdb2 (\fBidmap_tdb2\fR(8)), ldap (\fBidmap_ldap\fR(8)), rid (\fBidmap_rid\fR(8)), hash (\fBidmap_hash\fR(8)), autorid (\fBidmap_autorid\fR(8)), ad (\fBidmap_ad\fR(8)) and nss (\fBidmap_nss\fR(8))\&. The corresponding manual pages contain the details, but here is a summary\&.
     4319.sp
     4320The first three of these create mappings of their own using internal unixid counters and store the mappings in a database\&. These are suitable for use in the default idmap configuration\&. The rid and hash backends use a pure algorithmic calculation to determine the unixid for a SID\&. The autorid module is a mixture of the tdb and rid backend\&. It creates ranges for each domain encountered and then uses the rid algorithm for each of these automatically configured domains individually\&. The ad backend uses unix ids stored in Active Directory via the standard schema extensions\&. The nss backend reverses the standard winbindd setup and gets the unix ids via names from nsswitch which can be useful in an ldap setup\&.
    40254321.RE
    40264322.PP
    40274323range = low \- high
    40284324.RS 4
    4029 Defines the available matching uid and gid range for which the backend is authoritative\&. For allocating backends, this also defines the start and the end of the range for allocating new unid IDs\&.
     4325Defines the available matching uid and gid range for which the backend is authoritative\&. For allocating backends, this also defines the start and the end of the range for allocating new unique IDs\&.
    40304326.sp
    40314327winbind uses this parameter to find the backend that is authoritative for a unix ID to SID mapping, so it must be set for each individually configured domain and for the default configuration\&. The configured ranges must be mutually disjoint\&.
     
    41234419.RE
    41244420
    4125 include (G)
     4421include (S)
    41264422.\" include
    41274423.PP
     
    41664462The ownership of new files and directories is normally governed by effective uid of the connected user\&. This option allows the Samba administrator to specify that the ownership for new files and directories should be controlled by the ownership of the parent directory\&.
    41674463.sp
    4168 Common scenarios where this behavior is useful is in implementing drop\-boxes where users can create and edit files but not delete them and to ensure that newly create files in a user\*(Aqs roaming profile directory are actually owner by the user\&.
     4464Common scenarios where this behavior is useful is in implementing drop\-boxes, where users can create and edit files but not delete them and ensuring that newly created files in a user\*(Aqs roaming profile directory are actually owned by the user\&.
    41694465.sp
    41704466Default:
     
    42034499.RE
    42044500
     4501init logon delay (G)
     4502.\" init logon delay
     4503.PP
     4504.RS 4
     4505This parameter specifies a delay in milliseconds for the hosts configured for delayed initial samlogon with
     4506\m[blue]\fBinit logon delayed hosts\fR\m[]\&.
     4507.sp
     4508Default:
     4509\fI\fIinit logon delay\fR\fR\fI = \fR\fI100\fR\fI \fR
     4510.RE
     4511
    42054512init logon delayed hosts (G)
    42064513.\" init logon delayed hosts
     
    42204527.RE
    42214528
    4222 init logon delay (G)
    4223 .\" init logon delay
    4224 .PP
    4225 .RS 4
    4226 This parameter specifies a delay in milliseconds for the hosts configured for delayed initial samlogon with
    4227 \m[blue]\fBinit logon delayed hosts\fR\m[]\&.
    4228 .sp
    4229 Default:
    4230 \fI\fIinit logon delay\fR\fR\fI = \fR\fI100\fR\fI \fR
    4231 .RE
    4232 
    42334529interfaces (G)
    42344530.\" interfaces
     
    42894585.sp
    42904586By default Samba enables all active interfaces that are broadcast capable except the loopback adaptor (IP address 127\&.0\&.0\&.1)\&.
     4587.sp
     4588In order to support SMB3 multi\-channel configurations, smbd understands some extra data that can be appended after the actual interface with this extended syntax:
     4589.sp
     4590interface[;key1=value1[,key2=value2[\&.\&.\&.]]]
     4591.sp
     4592Known keys are speed, capability, and if_index\&. Speed is specified in bits per second\&. Known capabilities are RSS and RDMA\&. The if_index should be used with care: the values must not coincide with indexes used by the kernel\&. Note that these options are mainly intended for testing and development rather than for production use\&. At least on Linux systems, these values should be auto\-detected, but the settings can serve as last a resort when autodetection is not working or is not available\&.
    42914593.sp
    42924594The example below configures three network interfaces corresponding to the eth0 device and IP addresses 192\&.168\&.2\&.10 and 192\&.168\&.3\&.10\&. The netmasks of the latter two interfaces would be set to 255\&.255\&.255\&.0\&.
     
    43554657\m[blue]\fBsocket options\fR\m[])\&. Basically you should only use this option if you strike difficulties\&.
    43564658.sp
     4659Please note this option only applies to SMB1 client connections, and has no effect on SMB2 clients\&.
     4660.sp
    43574661Default:
    43584662\fI\fIkeepalive\fR\fR\fI = \fR\fI300\fR\fI \fR
     
    44224726.sp
    44234727Default:
    4424 \fI\fIkerberos method\fR\fR\fI = \fR\fIsecrets only\fR\fI \fR
    4425 .RE
    4426 
    4427 kernel change notify (S)
     4728\fI\fIkerberos method\fR\fR\fI = \fR\fIdefault\fR\fI \fR
     4729.RE
     4730
     4731kernel change notify (G)
    44284732.\" kernel change notify
    44294733.PP
     
    44374741.RE
    44384742
    4439 kernel oplocks (G)
     4743kernel oplocks (S)
    44404744.\" kernel oplocks
    44414745.PP
     
    44434747For UNIXes that support kernel based
    44444748\m[blue]\fBoplocks\fR\m[]
    4445 (currently only IRIX and the Linux 2\&.4 kernel), this parameter allows the use of them to be turned on or off\&.
     4749(currently only IRIX and the Linux 2\&.4 kernel), this parameter allows the use of them to be turned on or off\&. However, this disables Level II oplocks for clients as the Linux and IRIX kernels do not support them properly\&.
    44464750.sp
    44474751Kernel oplocks support allows Samba
     
    44534757cool feature :\-)\&.
    44544758.sp
     4759If you do not need this interaction, you should disable the parameter on Linux and IRIX to get Level II oplocks and the associated performance benefit\&.
     4760.sp
    44554761This parameter defaults to
    4456 \fBon\fR, but is translated to a no\-op on systems that no not have the necessary kernel support\&. You should never need to touch this parameter\&.
    4457 .sp
    4458 Default:
    4459 \fI\fIkernel oplocks\fR\fR\fI = \fR\fIyes\fR\fI \fR
     4762\fBno\fR
     4763and is translated to a no\-op on systems that do not have the necessary kernel support\&.
     4764.sp
     4765Default:
     4766\fI\fIkernel oplocks\fR\fR\fI = \fR\fIno\fR\fI \fR
     4767.RE
     4768
     4769kernel share modes (S)
     4770.\" kernel share modes
     4771.PP
     4772.RS 4
     4773This parameter controls whether SMB share modes are translated into UNIX flocks\&.
     4774.sp
     4775Kernel share modes provide a minimal level of interoperability with local UNIX processes and NFS operations by preventing access with flocks corresponding to the SMB share modes\&. Generally, it is very desirable to leave this enabled\&.
     4776.sp
     4777Note that in order to use SMB2 durable file handles on a share, you have to turn kernel share modes off\&.
     4778.sp
     4779This parameter defaults to
     4780\fByes\fR
     4781and is translated to a no\-op on systems that do not have the necessary kernel flock support\&.
     4782.sp
     4783Default:
     4784\fI\fIkernel share modes\fR\fR\fI = \fR\fIyes\fR\fI \fR
     4785.RE
     4786
     4787kpasswd port (G)
     4788.\" kpasswd port
     4789.PP
     4790.RS 4
     4791Specifies which ports the Kerberos server should listen on for password changes\&.
     4792.sp
     4793Default:
     4794\fI\fIkpasswd port\fR\fR\fI = \fR\fI464\fR\fI \fR
     4795.RE
     4796
     4797krb5 port (G)
     4798.\" krb5 port
     4799.PP
     4800.RS 4
     4801Specifies which port the KDC should listen on for Kerberos traffic\&.
     4802.sp
     4803Default:
     4804\fI\fIkrb5 port\fR\fR\fI = \fR\fI88\fR\fI \fR
    44604805.RE
    44614806
     
    44724817When this parameter is set to
    44734818no
    4474 this will also result in sambaLMPassword in Samba\*(Aqs passdb being blanked after the next password change\&. As a result of that lanman clients won\*(Aqt be able to authenticate, even if lanman auth is reenabled later on\&.
     4819this will also result in sambaLMPassword in Samba\*(Aqs passdb being blanked after the next password change\&. As a result of that lanman clients won\*(Aqt be able to authenticate, even if lanman auth is re\-enabled later on\&.
    44754820.sp
    44764821Unlike the
     
    45484893for tracing function calls\&.
    45494894.sp
    4550 The debug ouput from the LDAP libraries appears with the prefix [LDAP] in Samba\*(Aqs logging output\&. The level at which LDAP logging is printed is controlled by the parameter
     4895The debug output from the LDAP libraries appears with the prefix [LDAP] in Samba\*(Aqs logging output\&. The level at which LDAP logging is printed is controlled by the parameter
    45514896\fIldap debug threshold\fR\&.
    45524897.sp
     
    46805025.sp
    46815026Default:
    4682 \fI\fIldap page size\fR\fR\fI = \fR\fI1024\fR\fI \fR
     5027\fI\fIldap page size\fR\fR\fI = \fR\fI1000\fR\fI \fR
    46835028.sp
    46845029Example:
    46855030\fI\fIldap page size\fR\fR\fI = \fR\fI512\fR\fI \fR
     5031.RE
     5032
     5033ldap password sync
     5034.\" ldap password sync
     5035.PP
     5036.RS 4
     5037This parameter is a synonym for
     5038ldap passwd sync\&.
    46865039.RE
    46875040
     
    47585111.sp
    47595112To use this option, a basic ldap tree must be provided and the ldap suffix parameters must be properly configured\&. On virgin servers the default users and groups (Administrator, Guest, Domain Users, Domain Admins, Domain Guests) can be precreated with the command
    4760 net sam provision\&. To run this command the ldap server must be running, Winindd must be running and the smb\&.conf ldap options must be properly configured\&. The typical ldap setup used with the
     5113net sam provision\&. To run this command the ldap server must be running, Winbindd must be running and the smb\&.conf ldap options must be properly configured\&. The typical ldap setup used with the
    47615114\m[blue]\fBldapsam:trusted = yes\fR\m[]
    47625115option is usually sufficient to use
     
    48595212.RE
    48605213
    4861 ldap ssl ads (G)
    4862 .\" ldap ssl ads
    4863 .PP
    4864 .RS 4
    4865 This option is used to define whether or not Samba should use SSL when connecting to the ldap server using
    4866 \fIads\fR
    4867 methods\&. Rpc methods are not affected by this parameter\&. Please note, that this parameter won\*(Aqt have any effect if
    4868 \m[blue]\fBldap ssl\fR\m[]
    4869 is set to
    4870 \fIno\fR\&.
    4871 .sp
    4872 See
    4873 smb\&.conf(5)
    4874 for more information on
    4875 \m[blue]\fBldap ssl\fR\m[]\&.
    4876 .sp
    4877 Default:
    4878 \fI\fIldap ssl ads\fR\fR\fI = \fR\fIno\fR\fI \fR
     5214ldap server require strong auth (G)
     5215.\" ldap server require strong auth
     5216.PP
     5217.RS 4
     5218The
     5219\m[blue]\fBldap server require strong auth\fR\m[]
     5220defines whether the ldap server requires ldap traffic to be signed or signed and encrypted (sealed)\&. Possible values are
     5221\fIno\fR,
     5222\fIallow_sasl_over_tls\fR
     5223and
     5224\fIyes\fR\&.
     5225.sp
     5226A value of
     5227\fIno\fR
     5228allows simple and sasl binds over all transports\&.
     5229.sp
     5230A value of
     5231\fIallow_sasl_over_tls\fR
     5232allows simple and sasl binds (without sign or seal) over TLS encrypted connections\&. Unencrypted connections only allow sasl binds with sign or seal\&.
     5233.sp
     5234A value of
     5235\fIyes\fR
     5236allows only simple binds over TLS encrypted connections\&. Unencrypted connections only allow sasl binds with sign or seal\&.
     5237.sp
     5238Default:
     5239\fI\fIldap server require strong auth\fR\fR\fI = \fR\fIyes\fR\fI \fR
    48795240.RE
    48805241
     
    48945255\fIeither\fR
    48955256this parameter to
    4896 \fIStart_tls\fR
    4897 \fIor\fR
     5257\fIStart_tls\fR\fIor\fR
    48985258by specifying
    48995259\fIldaps://\fR
     
    49345294methods\&. To enable the LDAPv3 StartTLS extended operation (RFC2830) for
    49355295\fIads\fR, set
    4936 \m[blue]\fBldap ssl = yes\fR\m[]
    4937 \fIand\fR
    4938 \m[blue]\fBldap ssl ads = yes\fR\m[]\&. See
     5296\m[blue]\fBldap ssl = yes\fR\m[]\fIand\fR\m[blue]\fBldap ssl ads = yes\fR\m[]\&. See
    49395297smb\&.conf(5)
    49405298for more information on
     
    49435301Default:
    49445302\fI\fIldap ssl\fR\fR\fI = \fR\fIstart tls\fR\fI \fR
     5303.RE
     5304
     5305ldap ssl ads (G)
     5306.\" ldap ssl ads
     5307.PP
     5308.RS 4
     5309This option is used to define whether or not Samba should use SSL when connecting to the ldap server using
     5310\fIads\fR
     5311methods\&. Rpc methods are not affected by this parameter\&. Please note, that this parameter won\*(Aqt have any effect if
     5312\m[blue]\fBldap ssl\fR\m[]
     5313is set to
     5314\fIno\fR\&.
     5315.sp
     5316See
     5317smb\&.conf(5)
     5318for more information on
     5319\m[blue]\fBldap ssl\fR\m[]\&.
     5320.sp
     5321Default:
     5322\fI\fIldap ssl ads\fR\fR\fI = \fR\fIno\fR\fI \fR
    49455323.RE
    49465324
     
    50995477\fBno\fR
    51005478will cause
    5101 nmbd
    5102 \fInever\fR
     5479nmbd\fInever\fR
    51035480to become a local master browser\&.
    51045481.sp
     
    51265503.sp
    51275504Default:
    5128 \fI\fIlock directory\fR\fR\fI = \fR\fI${prefix}/var/locks\fR\fI \fR
     5505\fI\fIlock directory\fR\fR\fI = \fR\fI${prefix}/var/lock\fR\fI \fR
    51295506.sp
    51305507Example:
     
    51545531Be careful about disabling locking either globally or in a specific service, as lack of locking may result in data corruption\&. You should never need to set this parameter\&.
    51555532.sp
    5156 \fINo default\fR
    5157 .RE
    5158 
    5159 lock spin count (G)
    5160 .\" lock spin count
    5161 .PP
    5162 .RS 4
    5163 This parameter has been made inoperative in Samba 3\&.0\&.24\&. The functionality it contolled is now controlled by the parameter
    5164 \m[blue]\fBlock spin time\fR\m[]\&.
    5165 .sp
    5166 Default:
    5167 \fI\fIlock spin count\fR\fR\fI = \fR\fI0\fR\fI \fR
     5533Default:
     5534\fI\fIlocking\fR\fR\fI = \fR\fIyes\fR\fI \fR
    51685535.RE
    51695536
     
    51945561.RE
    51955562
     5563logging (G)
     5564.\" logging
     5565.PP
     5566.RS 4
     5567This parameter configures logging backends\&. Multiple backends can be specified at the same time, with different log levels for each backend\&. The parameter is a list of backends, where each backend is specified as backend[:option][@loglevel]\&.
     5568.sp
     5569The \*(Aqoption\*(Aq parameter can be used to pass backend\-specific options\&.
     5570.sp
     5571The log level for a backend is optional, if it is not set for a backend, all messages are sent to this backend\&. The parameter
     5572\m[blue]\fBlog level\fR\m[]
     5573determines overall log levels, while the log levels specified here define what is sent to the individual backends\&.
     5574.sp
     5575When
     5576\m[blue]\fBlogging\fR\m[]
     5577is set, it overrides the
     5578\m[blue]\fBsyslog\fR\m[]
     5579and
     5580\m[blue]\fBsyslog only\fR\m[]
     5581parameters\&.
     5582.sp
     5583Some backends are only available when Samba has been compiled with the additional libraries\&. The overall list of logging backends:
     5584.sp
     5585.RS 4
     5586.ie n \{\
     5587\h'-04'\(bu\h'+03'\c
     5588.\}
     5589.el \{\
     5590.sp -1
     5591.IP \(bu 2.3
     5592.\}
     5593\fIsyslog\fR
     5594.RE
     5595.sp
     5596.RS 4
     5597.ie n \{\
     5598\h'-04'\(bu\h'+03'\c
     5599.\}
     5600.el \{\
     5601.sp -1
     5602.IP \(bu 2.3
     5603.\}
     5604\fIfile\fR
     5605.RE
     5606.sp
     5607.RS 4
     5608.ie n \{\
     5609\h'-04'\(bu\h'+03'\c
     5610.\}
     5611.el \{\
     5612.sp -1
     5613.IP \(bu 2.3
     5614.\}
     5615\fIsystemd\fR
     5616.RE
     5617.sp
     5618.RS 4
     5619.ie n \{\
     5620\h'-04'\(bu\h'+03'\c
     5621.\}
     5622.el \{\
     5623.sp -1
     5624.IP \(bu 2.3
     5625.\}
     5626\fIlttng\fR
     5627.RE
     5628.sp
     5629.RS 4
     5630.ie n \{\
     5631\h'-04'\(bu\h'+03'\c
     5632.\}
     5633.el \{\
     5634.sp -1
     5635.IP \(bu 2.3
     5636.\}
     5637\fIgpfs\fR
     5638.RE
     5639.sp
     5640.RE
     5641Default:
     5642\fI\fIlogging\fR\fR\fI = \fR\fI\fR\fI \fR
     5643.sp
     5644Example:
     5645\fI\fIlogging\fR\fR\fI = \fR\fIsyslog@1 file\fR\fI \fR
     5646.RE
     5647
    51965648debuglevel
    51975649.\" debuglevel
     
    52105662file\&.
    52115663.sp
    5212 This parameter has been extended since the 2\&.2\&.x series, now it allows to specify the debug level for multiple debug classes\&. This is to give greater flexibility in the configuration of the system\&. The following debug classes are currently implemented:
     5664This parameter has been extended since the 2\&.2\&.x series, now it allows one to specify the debug level for multiple debug classes\&. This is to give greater flexibility in the configuration of the system\&. The following debug classes are currently implemented:
    52135665.sp
    52145666.RS 4
     
    54385890Example:
    54395891\fI\fIlog level\fR\fR\fI = \fR\fI3 passdb:5 auth:10 winbind:2\fR\fI \fR
     5892.RE
     5893
     5894log nt token command (G)
     5895.\" log nt token command
     5896.PP
     5897.RS 4
     5898This option can be set to a command that will be called when new nt tokens are created\&.
     5899.sp
     5900This is only useful for development purposes\&.
     5901.sp
     5902Default:
     5903\fI\fIlog nt token command\fR\fR\fI = \fR\fI\fR\fI \fR
    54405904.RE
    54415905
     
    54625926This parameter specifies the home directory location when a Win95/98 or NT Workstation logs into a Samba PDC\&. It allows you to do
    54635927.sp
    5464 
    54655928C:\e>\fBNET USE H: /HOME\fR
    54665929.sp
     
    54715934This parameter can be used with Win9X workstations to ensure that roaming profiles are stored in a subdirectory of the user\*(Aqs home directory\&. This is done in the following way:
    54725935.sp
    5473 
    54745936logon home = \e\e%N\e%U\eprofile
    54755937.sp
     
    56406102Note that it is good practice to include the absolute path in the lppause command as the PATH may not be available to the server\&.
    56416103.sp
    5642 Default:
    5643 \fI\fIlppause command\fR\fR\fI = \fR\fI # Currently no default value is given to this string, unless the value of the \m[blue]\fBprinting\fR\m[] parameter is \fBSYSV\fR, in which case the default is : lp \-i %p\-%j \-H hold or if the value of the \fIprinting\fR parameter is \fBSOFTQ\fR, then the default is: qstat \-s \-j%j \-h\&. \fR\fI \fR
     6104Currently no default value is given to this string, unless the value of the
     6105\m[blue]\fBprinting\fR\m[]
     6106parameter is
     6107\fBSYSV\fR, in which case the default is :
     6108lp \-i %p\-%j \-H hold
     6109or if the value of the
     6110\fIprinting\fR
     6111parameter is
     6112\fBSOFTQ\fR, then the default is:
     6113qstat \-s \-j%j \-h\&.
     6114.sp
     6115Default:
     6116\fI\fIlppause command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR
    56446117.sp
    56456118Example:
     
    57086181.sp
    57096182Default:
    5710 \fI\fIlpq command\fR\fR\fI = \fR\fI\fR\fI \fR
     6183\fI\fIlpq command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR
    57116184.sp
    57126185Example:
     
    57526225qstat \-s \-j%j \-r
    57536226.sp
    5754 \fINo default\fR
     6227Default:
     6228\fI\fIlpresume command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR
    57556229.sp
    57566230Example:
     
    57936267.sp
    57946268Default:
    5795 \fI\fIlprm command\fR\fR\fI = \fR\fI determined by printing parameter\fR\fI \fR
     6269\fI\fIlprm command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR
    57966270.RE
    57976271
     
    58006274.PP
    58016275.RS 4
    5802 If a Samba server is a member of a Windows NT Domain (see the
     6276If a Samba server is a member of a Windows NT or Active Directory Domain (see the
    58036277\m[blue]\fBsecurity = domain\fR\m[]
    5804 parameter) then periodically a running smbd process will try and change the MACHINE ACCOUNT PASSWORD stored in the TDB called
    5805 private/secrets\&.tdb\&. This parameter specifies how often this password will be changed, in seconds\&. The default is one week (expressed in seconds), the same as a Windows NT Domain member server\&.
     6278and
     6279\m[blue]\fBsecurity = ads\fR\m[]
     6280parameters), then periodically a running winbindd process will try and change the MACHINE ACCOUNT PASSWORD stored in the TDB called
     6281secrets\&.tdb\&. This parameter specifies how often this password will be changed, in seconds\&. The default is one week (expressed in seconds), the same as a Windows NT Domain member server\&.
    58066282.sp
    58076283See also
    58086284\fBsmbpasswd\fR(8), and the
    58096285\m[blue]\fBsecurity = domain\fR\m[]
    5810 parameter\&.
     6286and
     6287\m[blue]\fBsecurity = ads\fR\m[]
     6288parameters\&.
    58116289.sp
    58126290Default:
     
    58396317.RE
    58406318Default:
    5841 \fI\fImagic output\fR\fR\fI = \fR\fI<magic script name>\&.out\fR\fI \fR
     6319\fI\fImagic output\fR\fR\fI = \fR\fI # <magic script name>\&.out\fR\fI \fR
    58426320.sp
    58436321Example:
     
    59696447.PP
    59706448.RS 4
    5971 controls the algorithm used for the generating the mangled names\&. Can take two different values, "hash" and "hash2"\&. "hash" is the algorithm that was used used in Samba for many years and was the default in Samba 2\&.2\&.x "hash2" is now the default and is newer and considered a better algorithm (generates less collisions) in the names\&. Many Win32 applications store the mangled names and so changing to algorithms must not be done lightly as these applications may break unless reinstalled\&.
     6449controls the algorithm used for the generating the mangled names\&. Can take two different values, "hash" and "hash2"\&. "hash" is the algorithm that was used in Samba for many years and was the default in Samba 2\&.2\&.x "hash2" is now the default and is newer and considered a better algorithm (generates less collisions) in the names\&. Many Win32 applications store the mangled names and so changing to algorithms must not be done lightly as these applications may break unless reinstalled\&.
    59726450.sp
    59736451Default:
     
    59956473.RS 4
    59966474This controls whether the DOS archive attribute should be mapped to the UNIX owner execute bit\&. The DOS archive bit is set when a file has been modified since its last backup\&. One motivation for this option is to keep Samba/your PC from making any file it touches from becoming executable under UNIX\&. This can be quite annoying for shared source code, documents, etc\&.\&.\&.
     6475.sp
     6476Note that this parameter will be ignored if the
     6477\m[blue]\fBstore dos attributes\fR\m[]
     6478parameter is set, as the DOS archive attribute will then be stored inside a UNIX extended attribute\&.
    59976479.sp
    59986480Note that this requires the
     
    60126494This controls whether DOS style hidden files should be mapped to the UNIX world execute bit\&.
    60136495.sp
     6496Note that this parameter will be ignored if the
     6497\m[blue]\fBstore dos attributes\fR\m[]
     6498parameter is set, as the DOS hidden attribute will then be stored inside a UNIX extended attribute\&.
     6499.sp
    60146500Note that this requires the
    60156501\m[blue]\fBcreate mask\fR\m[]
     
    60186504for details\&.
    60196505.sp
    6020 \fINo default\fR
     6506Default:
     6507\fI\fImap hidden\fR\fR\fI = \fR\fIno\fR\fI \fR
    60216508.RE
    60226509
     
    60496536.IP \(bu 2.3
    60506537.\}
    6051 
    60526538\fBYes\fR
    60536539\- The read only DOS attribute is mapped to the inverse of the user or owner write bit in the unix permission mode set\&. If the owner write bit is not set, the read only attribute is reported as being set on the file\&. If the read only DOS attribute is set, Samba sets the owner, group and others write bits to zero\&. Write bits set in an ACL are ignored by Samba\&. If the read only DOS attribute is unset, Samba simply sets the write bit of the owner to one\&.
     
    60626548.IP \(bu 2.3
    60636549.\}
    6064 
    60656550\fBPermissions\fR
    60666551\- The read only DOS attribute is mapped to the effective permissions of the connecting user, as evaluated by
     
    60776562.IP \(bu 2.3
    60786563.\}
    6079 
    60806564\fBNo\fR
    60816565\- The read only DOS attribute is unaffected by permissions, and can only be set by the
     
    60856569.sp
    60866570.RE
     6571Note that this parameter will be ignored if the
     6572\m[blue]\fBstore dos attributes\fR\m[]
     6573parameter is set, as the DOS \*(Aqread\-only\*(Aq attribute will then be stored inside a UNIX extended attribute\&.
     6574.sp
    60876575Default:
    60886576\fI\fImap readonly\fR\fR\fI = \fR\fIyes\fR\fI \fR
     
    60946582.RS 4
    60956583This controls whether DOS style system files should be mapped to the UNIX group execute bit\&.
     6584.sp
     6585Note that this parameter will be ignored if the
     6586\m[blue]\fBstore dos attributes\fR\m[]
     6587parameter is set, as the DOS system attribute will then be stored inside a UNIX extended attribute\&.
    60966588.sp
    60976589Note that this requires the
     
    61096601.PP
    61106602.RS 4
    6111 This parameter is only useful in
    6112 \m[blue]\fBSECURITY = security\fR\m[]
    6113 modes other than
    6114 \fIsecurity = share\fR
    6115 and
    6116 \fIsecurity = server\fR
    6117 \- i\&.e\&.
    6118 \fBuser\fR, and
    6119 \fBdomain\fR\&.
    6120 .sp
    61216603This parameter can take four different values, which tell
    61226604\fBsmbd\fR(8)
     
    61806662.sp
    61816663.RE
    6182 Note that this parameter is needed to set up "Guest" share services when using
    6183 \fIsecurity\fR
    6184 modes other than share and server\&. This is because in these modes the name of the resource being requested is
     6664Note that this parameter is needed to set up "Guest" share services\&. This is because in these modes the name of the resource being requested is
    61856665\fInot\fR
    6186 sent to the server until after the server has successfully authenticated the client so the server cannot make authentication decisions at the correct time (connection to the share) for "Guest" shares\&. This parameter is not useful with
    6187 \fIsecurity = server\fR
    6188 as in this security mode no information is returned about whether a user logon failed due to a bad username or bad password, the same error is returned from a modern server in both cases\&.
    6189 .sp
    6190 For people familiar with the older Samba releases, this parameter maps to the old compile\-time setting of the
    6191 \fB GUEST_SESSSETUP\fR
    6192 value in local\&.h\&.
     6666sent to the server until after the server has successfully authenticated the client so the server cannot make authentication decisions at the correct time (connection to the share) for "Guest" shares\&.
    61936667.sp
    61946668Default:
     
    62896763This parameter limits the maximum number of open files that one
    62906764\fBsmbd\fR(8)
    6291 file serving process may have open for a client at any one time\&. The This parameter can be set very high (16404) as Samba uses only one bit per unopened file\&. Setting this parameter lower than 16404 will cause Samba to complain and set this value back to the minimum of 16404, as Windows 7 depends on this number of open file handles being available\&.
     6765file serving process may have open for a client at any one time\&. This parameter can be set very high (16384) as Samba uses only one bit per unopened file\&. Setting this parameter lower than 16384 will cause Samba to complain and set this value back to the minimum of 16384, as Windows 7 depends on this number of open file handles being available\&.
    62926766.sp
    62936767The limit of the number of open files is usually set by the UNIX per\-process file descriptor limit rather than this parameter so you should never need to touch this parameter\&.
    62946768.sp
    62956769Default:
    6296 \fI\fImax open files\fR\fR\fI = \fR\fI16404\fR\fI \fR
     6770\fI\fImax open files\fR\fR\fI = \fR\fI16384\fR\fI \fR
    62976771.RE
    62986772
     
    63106784Example:
    63116785\fI\fImax print jobs\fR\fR\fI = \fR\fI5000\fR\fI \fR
    6312 .RE
    6313 
    6314 protocol
    6315 .\" protocol
    6316 .PP
    6317 .RS 4
    6318 This parameter is a synonym for
    6319 max protocol\&.
    6320 .RE
    6321 
    6322 max protocol (G)
    6323 .\" max protocol
    6324 .PP
    6325 .RS 4
    6326 The value of the parameter (a string) is the highest protocol level that will be supported by the server\&.
    6327 .sp
    6328 Possible values are :
    6329 .sp
    6330 .RS 4
    6331 .ie n \{\
    6332 \h'-04'\(bu\h'+03'\c
    6333 .\}
    6334 .el \{\
    6335 .sp -1
    6336 .IP \(bu 2.3
    6337 .\}
    6338 \fBCORE\fR: Earliest version\&. No concept of user names\&.
    6339 .RE
    6340 .sp
    6341 .RS 4
    6342 .ie n \{\
    6343 \h'-04'\(bu\h'+03'\c
    6344 .\}
    6345 .el \{\
    6346 .sp -1
    6347 .IP \(bu 2.3
    6348 .\}
    6349 \fBCOREPLUS\fR: Slight improvements on CORE for efficiency\&.
    6350 .RE
    6351 .sp
    6352 .RS 4
    6353 .ie n \{\
    6354 \h'-04'\(bu\h'+03'\c
    6355 .\}
    6356 .el \{\
    6357 .sp -1
    6358 .IP \(bu 2.3
    6359 .\}
    6360 \fBLANMAN1\fR: First
    6361 \fI modern\fR
    6362 version of the protocol\&. Long filename support\&.
    6363 .RE
    6364 .sp
    6365 .RS 4
    6366 .ie n \{\
    6367 \h'-04'\(bu\h'+03'\c
    6368 .\}
    6369 .el \{\
    6370 .sp -1
    6371 .IP \(bu 2.3
    6372 .\}
    6373 \fBLANMAN2\fR: Updates to Lanman1 protocol\&.
    6374 .RE
    6375 .sp
    6376 .RS 4
    6377 .ie n \{\
    6378 \h'-04'\(bu\h'+03'\c
    6379 .\}
    6380 .el \{\
    6381 .sp -1
    6382 .IP \(bu 2.3
    6383 .\}
    6384 \fBNT1\fR: Current up to date version of the protocol\&. Used by Windows NT\&. Known as CIFS\&.
    6385 .RE
    6386 .sp
    6387 .RS 4
    6388 .ie n \{\
    6389 \h'-04'\(bu\h'+03'\c
    6390 .\}
    6391 .el \{\
    6392 .sp -1
    6393 .IP \(bu 2.3
    6394 .\}
    6395 \fBSMB2\fR: Re\-implementation of the SMB protocol\&. Used by Windows Vista and newer\&.
    6396 .RE
    6397 .sp
    6398 .RE
    6399 Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.
    6400 .sp
    6401 Default:
    6402 \fI\fImax protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR
    6403 .sp
    6404 Example:
    6405 \fI\fImax protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR
    64066786.RE
    64076787
     
    66086988.RE
    66096989
    6610 min protocol (G)
    6611 .\" min protocol
    6612 .PP
    6613 .RS 4
    6614 The value of the parameter (a string) is the lowest SMB protocol dialect than Samba will support\&. Please refer to the
    6615 \m[blue]\fBmax protocol\fR\m[]
    6616 parameter for a list of valid protocol names and a brief description of each\&. You may also wish to refer to the C source code in
    6617 source/smbd/negprot\&.c
    6618 for a listing of known protocol dialects supported by clients\&.
    6619 .sp
    6620 If you are viewing this parameter as a security measure, you should also refer to the
    6621 \m[blue]\fBlanman auth\fR\m[]
    6622 parameter\&. Otherwise, you should never need to change this parameter\&.
    6623 .sp
    6624 Default:
    6625 \fI\fImin protocol\fR\fR\fI = \fR\fICORE\fR\fI \fR
    6626 .sp
    6627 Example:
    6628 \fI\fImin protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR
    6629 .RE
    6630 
    66316990min receivefile size (G)
    66326991.\" min receivefile size
     
    66396998Note this option will have NO EFFECT if set on a SMB signed connection\&.
    66406999.sp
    6641 The default is zero, which diables this option\&.
     7000The default is zero, which disables this option\&.
    66427001.sp
    66437002Default:
     
    66637022.PP
    66647023.RS 4
    6665 This parameter indicates that the share is a stand\-in for another CIFS share whose location is specified by the value of the parameter\&. When clients attempt to connect to this share, they are redirected to the proxied share using the SMB\-Dfs protocol\&.
     7024This parameter indicates that the share is a stand\-in for another CIFS share whose location is specified by the value of the parameter\&. When clients attempt to connect to this share, they are redirected to one or multiple, comma separated proxied shares using the SMB\-Dfs protocol\&.
    66667025.sp
    66677026Only Dfs roots can act as proxy shares\&. Take a look at the
     
    66747033.sp
    66757034Example:
    6676 \fI\fImsdfs proxy\fR\fR\fI = \fR\fI\eotherserver\esomeshare\fR\fI \fR
     7035\fI\fImsdfs proxy\fR\fR\fI = \fR\fI\eotherserver\esomeshare,\eotherserver2\esomeshare\fR\fI \fR
    66777036.RE
    66787037
     
    66907049.RE
    66917050
     7051msdfs shuffle referrals (S)
     7052.\" msdfs shuffle referrals
     7053.PP
     7054.RS 4
     7055If set to
     7056\fByes\fR, Samba will shuffle Dfs referrals for a given Dfs link if multiple are available, allowing for load balancing across clients\&. For more information on setting up a Dfs tree on Samba, refer to the MSDFS chapter in the Samba3\-HOWTO book\&.
     7057.sp
     7058Default:
     7059\fI\fImsdfs shuffle referrals\fR\fR\fI = \fR\fIno\fR\fI \fR
     7060.RE
     7061
    66927062multicast dns register (G)
    66937063.\" multicast dns register
     
    67317101.IP \(bu 2.3
    67327102.\}
    6733 
    67347103\fBlmhosts\fR
    67357104: Lookup an IP address in the Samba lmhosts file\&. If the line in lmhosts has no name type attached to the NetBIOS name (see the manpage for lmhosts for details) then any name type matches for lookup\&.
     
    67447113.IP \(bu 2.3
    67457114.\}
    6746 
    67477115\fBhost\fR
    67487116: Do a standard host name to IP address resolution, using the system
     
    67977165.RE
    67987166
     7167socket address
     7168.\" socket address
     7169.PP
     7170.RS 4
     7171This parameter is a synonym for
     7172nbt client socket address\&.
     7173.RE
     7174
     7175nbt client socket address (G)
     7176.\" nbt client socket address
     7177.PP
     7178.RS 4
     7179This option allows you to control what address Samba will send NBT client packets from, and process replies using, including in nmbd\&.
     7180.sp
     7181Setting this option should never be necessary on usual Samba servers running only one nmbd\&.
     7182.sp
     7183By default Samba will send UDP packets from the OS default address for the destination, and accept replies on 0\&.0\&.0\&.0\&.
     7184.sp
     7185This parameter is deprecated\&. See
     7186\m[blue]\fBbind interfaces only = Yes\fR\m[]
     7187and
     7188\m[blue]\fBinterfaces\fR\m[]
     7189for the previous behaviour of controlling the normal listening sockets\&.
     7190.sp
     7191Default:
     7192\fI\fInbt client socket address\fR\fR\fI = \fR\fI0\&.0\&.0\&.0\fR\fI \fR
     7193.sp
     7194Example:
     7195\fI\fInbt client socket address\fR\fR\fI = \fR\fI192\&.168\&.2\&.20\fR\fI \fR
     7196.RE
     7197
     7198nbt port (G)
     7199.\" nbt port
     7200.PP
     7201.RS 4
     7202Specifies which port the server should use for NetBIOS over IP name services traffic\&.
     7203.sp
     7204Default:
     7205\fI\fInbt port\fR\fR\fI = \fR\fI137\fR\fI \fR
     7206.RE
     7207
    67997208ncalrpc dir (G)
    68007209.\" ncalrpc dir
     
    68037212This directory will hold a series of named pipes to allow RPC over inter\-process communication\&.
    68047213.sp
    6805 \&.
    6806         This will allow Samba and other unix processes to interact over DCE/RPC without using TCP/IP\&. Additionally a sub\-directory \*(Aqnp\*(Aq has restricted permissions, and allows a trusted communication channel between Samba processes
    6807 .sp
    6808 Default:
    6809 \fI\fIncalrpc dir\fR\fR\fI = \fR\fI${prefix}/var/ncalrpc\fR\fI \fR
     7214This will allow Samba and other unix processes to interact over DCE/RPC without using TCP/IP\&. Additionally a sub\-directory \*(Aqnp\*(Aq has restricted permissions, and allows a trusted communication channel between Samba processes
     7215.sp
     7216Default:
     7217\fI\fIncalrpc dir\fR\fR\fI = \fR\fI${prefix}/var/run/ncalrpc\fR\fI \fR
    68107218.sp
    68117219Example:
     
    68327240This sets the NetBIOS name by which a Samba server is known\&. By default it is the same as the first component of the host\*(Aqs DNS name\&. If a machine is a browse server or logon server this name (or the first component of the hosts DNS name) will be the name that these services are advertised under\&.
    68337241.sp
    6834 There is a bug in Samba\-3 that breaks operation of browsing and access to shares if the netbios name is set to the literal name
    6835 PIPE\&. To avoid this problem, do not name your Samba\-3 server
     7242Note that the maximum length for a NetBIOS name is 15 charactars\&.
     7243.sp
     7244There is a bug in Samba that breaks operation of browsing and access to shares if the netbios name is set to the literal name
     7245PIPE\&. To avoid this problem, do not name your Samba server
    68367246PIPE\&.
    68377247.sp
     
    68537263.RE
    68547264
    6855 nis homedir (G)
    6856 .\" nis homedir
     7265neutralize nt4 emulation (G)
     7266.\" neutralize nt4 emulation
     7267.PP
     7268.RS 4
     7269This option controls whether winbindd sends the NETLOGON_NEG_NEUTRALIZE_NT4_EMULATION flag in order to bypass the NT4 emulation of a domain controller\&.
     7270.sp
     7271Typically you should not need set this\&. It can be useful for upgrades from NT4 to AD domains\&.
     7272.sp
     7273The behavior can be controlled per netbios domain by using \*(Aqneutralize nt4 emulation:NETBIOSDOMAIN = yes\*(Aq as option\&.
     7274.sp
     7275Default:
     7276\fI\fIneutralize nt4 emulation\fR\fR\fI = \fR\fIno\fR\fI \fR
     7277.RE
     7278
     7279NIS homedir (G)
     7280.\" NIS homedir
    68577281.PP
    68587282.RS 4
     
    68687292.sp
    68697293Default:
    6870 \fI\fInis homedir\fR\fR\fI = \fR\fIno\fR\fI \fR
     7294\fI\fINIS homedir\fR\fR\fI = \fR\fIno\fR\fI \fR
    68717295.RE
    68727296
     
    68857309.RE
    68867310
     7311nsupdate command (G)
     7312.\" nsupdate command
     7313.PP
     7314.RS 4
     7315This option sets the path to the
     7316nsupdate
     7317command which is used for GSS\-TSIG dynamic DNS updates\&.
     7318.sp
     7319Default:
     7320\fI\fInsupdate command\fR\fR\fI = \fR\fI/usr/bin/nsupdate \-g\fR\fI \fR
     7321.RE
     7322
    68877323nt acl support (S)
    68887324.\" nt acl support
     
    68917327This boolean parameter controls whether
    68927328\fBsmbd\fR(8)
    6893 will attempt to map UNIX permissions into Windows NT access control lists\&. The UNIX permissions considered are the the traditional UNIX owner and group permissions, as well as POSIX ACLs set on any files or directories\&. This parameter was formally a global parameter in releases prior to 2\&.2\&.2\&.
     7329will attempt to map UNIX permissions into Windows NT access control lists\&. The UNIX permissions considered are the traditional UNIX owner and group permissions, as well as POSIX ACLs set on any files or directories\&. This parameter was formally a global parameter in releases prior to 2\&.2\&.2\&.
    68947330.sp
    68957331Default:
     
    69277363.RE
    69287364
     7365ntp signd socket directory (G)
     7366.\" ntp signd socket directory
     7367.PP
     7368.RS 4
     7369This setting controls the location of the socket that the NTP daemon uses to communicate with Samba for signing packets\&.
     7370.sp
     7371If a non\-default path is specified here, then it is also necessary to make NTP aware of the new path using the
     7372\fBntpsigndsocket\fR
     7373directive in
     7374ntp\&.conf\&.
     7375.sp
     7376Default:
     7377\fI\fIntp signd socket directory\fR\fR\fI = \fR\fI${prefix}/var/lib/ntp_signd\fR\fI \fR
     7378.RE
     7379
    69297380nt status support (G)
    69307381.\" nt status support
     
    69437394.RE
    69447395
     7396ntvfs handler (S)
     7397.\" ntvfs handler
     7398.PP
     7399.RS 4
     7400This specifies the NTVFS handlers for this share\&.
     7401.sp
     7402.RS 4
     7403.ie n \{\
     7404\h'-04'\(bu\h'+03'\c
     7405.\}
     7406.el \{\
     7407.sp -1
     7408.IP \(bu 2.3
     7409.\}
     7410posix: Maps POSIX FS semantics to NT semantics
     7411.RE
     7412.sp
     7413.RS 4
     7414.ie n \{\
     7415\h'-04'\(bu\h'+03'\c
     7416.\}
     7417.el \{\
     7418.sp -1
     7419.IP \(bu 2.3
     7420.\}
     7421unixuid: Sets up user credentials based on POSIX gid/uid\&.
     7422.RE
     7423.sp
     7424.RS 4
     7425.ie n \{\
     7426\h'-04'\(bu\h'+03'\c
     7427.\}
     7428.el \{\
     7429.sp -1
     7430.IP \(bu 2.3
     7431.\}
     7432cifs: Proxies a remote CIFS FS\&. Mainly useful for testing\&.
     7433.RE
     7434.sp
     7435.RS 4
     7436.ie n \{\
     7437\h'-04'\(bu\h'+03'\c
     7438.\}
     7439.el \{\
     7440.sp -1
     7441.IP \(bu 2.3
     7442.\}
     7443nbench: Filter module that saves data useful to the nbench benchmark suite\&.
     7444.RE
     7445.sp
     7446.RS 4
     7447.ie n \{\
     7448\h'-04'\(bu\h'+03'\c
     7449.\}
     7450.el \{\
     7451.sp -1
     7452.IP \(bu 2.3
     7453.\}
     7454ipc: Allows using SMB for inter process communication\&. Only used for the IPC$ share\&.
     7455.RE
     7456.sp
     7457.RS 4
     7458.ie n \{\
     7459\h'-04'\(bu\h'+03'\c
     7460.\}
     7461.el \{\
     7462.sp -1
     7463.IP \(bu 2.3
     7464.\}
     7465posix: Maps POSIX FS semantics to NT semantics
     7466.RE
     7467.sp
     7468.RS 4
     7469.ie n \{\
     7470\h'-04'\(bu\h'+03'\c
     7471.\}
     7472.el \{\
     7473.sp -1
     7474.IP \(bu 2.3
     7475.\}
     7476print: Allows printing over SMB\&. This is LANMAN\-style printing, not the be confused with the spoolss DCE/RPC interface used by later versions of Windows\&.
     7477.RE
     7478.sp
     7479.RE
     7480Note that this option is only used when the NTVFS file server is in use\&. It is not used with the (default) s3fs file server\&.
     7481.sp
     7482Default:
     7483\fI\fIntvfs handler\fR\fR\fI = \fR\fIunixuid, default\fR\fI \fR
     7484.RE
     7485
    69457486null passwords (G)
    69467487.\" null passwords
     
    69677508.RE
    69687509
     7510old password allowed period (G)
     7511.\" old password allowed period
     7512.PP
     7513.RS 4
     7514Number of minutes to permit an NTLM login after a password change or reset using the old password\&. This allows the user to re\-cache the new password on multiple clients without disrupting a network reconnection in the meantime\&.
     7515.sp
     7516This parameter only applies when
     7517\m[blue]\fBserver role\fR\m[]
     7518is set to Active Directory Domain Controller
     7519.sp
     7520Default:
     7521\fI\fIold password allowed period\fR\fR\fI = \fR\fI60\fR\fI \fR
     7522.RE
     7523
    69697524only user (S)
    69707525.\" only user
    69717526.PP
    69727527.RS 4
    6973 This is a boolean option that controls whether connections with usernames not in the
    6974 \fIuser\fR
    6975 list will be allowed\&. By default this option is disabled so that a client can supply a username to be used by the server\&. Enabling this parameter will force the server to only use the login names from the
    6976 \fIuser\fR
    6977 list and is only really useful in
    6978 \m[blue]\fBsecurity = share\fR\m[]
    6979 level security\&.
    6980 .sp
    6981 Note that this also means Samba won\*(Aqt try to deduce usernames from the service name\&. This can be annoying for the [homes] section\&. To get around this you could use
    6982 user = %S
    6983 which means your
    6984 \fIuser\fR
    6985 list will be just the service name, which for home directories is the name of the user\&.
     7528To restrict a service to a particular set of users you can use the
     7529\m[blue]\fBvalid users\fR\m[]
     7530parameter\&.
     7531.sp
     7532This parameter is deprecated
     7533.sp
     7534However, it currently operates only in conjunction with
     7535\m[blue]\fBusername\fR\m[]\&. The supported way to restrict a service to a particular set of users is the
     7536\m[blue]\fBvalid users\fR\m[]
     7537parameter\&.
    69867538.sp
    69877539Default:
     
    71337685.RE
    71347686
    7135 paranoid server security (G)
    7136 .\" paranoid server security
    7137 .PP
    7138 .RS 4
    7139 Some version of NT 4\&.x allow non\-guest users with a bad passowrd\&. When this option is enabled, samba will not use a broken NT 4\&.x server as password server, but instead complain to the logs and exit\&.
    7140 .sp
    7141 Disabling this option prevents Samba from making this check, which involves deliberatly attempting a bad logon to the remote server\&.
    7142 .sp
    7143 Default:
    7144 \fI\fIparanoid server security\fR\fR\fI = \fR\fIyes\fR\fI \fR
    7145 .RE
    7146 
    71477687passdb backend (G)
    71487688.\" passdb backend
     
    72357775Default:
    72367776\fI\fIpassdb expand explicit\fR\fR\fI = \fR\fIno\fR\fI \fR
     7777.RE
     7778
     7779passwd chat (G)
     7780.\" passwd chat
     7781.PP
     7782.RS 4
     7783This string controls the
     7784\fI"chat"\fR
     7785conversation that takes places between
     7786\fBsmbd\fR(8)
     7787and the local password changing program to change the user\*(Aqs password\&. The string describes a sequence of response\-receive pairs that
     7788\fBsmbd\fR(8)
     7789uses to determine what to send to the
     7790\m[blue]\fBpasswd program\fR\m[]
     7791and what to expect back\&. If the expected output is not received then the password is not changed\&.
     7792.sp
     7793This chat sequence is often quite site specific, depending on what local methods are used for password control (such as NIS etc)\&.
     7794.sp
     7795Note that this parameter only is used if the
     7796\m[blue]\fBunix password sync\fR\m[]
     7797parameter is set to
     7798\fByes\fR\&. This sequence is then called
     7799\fIAS ROOT\fR
     7800when the SMB password in the smbpasswd file is being changed, without access to the old password cleartext\&. This means that root must be able to reset the user\*(Aqs password without knowing the text of the previous password\&. In the presence of NIS/YP, this means that the
     7801\m[blue]\fBpasswd program\fR\m[]
     7802must be executed on the NIS master\&.
     7803.sp
     7804The string can contain the macro
     7805\fI%n\fR
     7806which is substituted for the new password\&. The old passsword (\fI%o\fR) is only available when
     7807\m[blue]\fBencrypt passwords\fR\m[]
     7808has been disabled\&. The chat sequence can also contain the standard macros \en, \er, \et and \es to give line\-feed, carriage\-return, tab and space\&. The chat sequence string can also contain a \*(Aq*\*(Aq which matches any sequence of characters\&. Double quotes can be used to collect strings with spaces in them into a single string\&.
     7809.sp
     7810If the send string in any part of the chat sequence is a full stop "\&.", then no string is sent\&. Similarly, if the expect string is a full stop then no string is expected\&.
     7811.sp
     7812If the
     7813\m[blue]\fBpam password change\fR\m[]
     7814parameter is set to
     7815\fByes\fR, the chat pairs may be matched in any order, and success is determined by the PAM result, not any particular output\&. The \en macro is ignored for PAM conversions\&.
     7816.sp
     7817Default:
     7818\fI\fIpasswd chat\fR\fR\fI = \fR\fI*new*password* %n\en *new*password* %n\en *changed*\fR\fI \fR
     7819.sp
     7820Example:
     7821\fI\fIpasswd chat\fR\fR\fI = \fR\fI"*Enter NEW password*" %n\en "*Reenter NEW password*" %n\en "*Password changed*"\fR\fI \fR
    72377822.RE
    72387823
     
    72717856.RE
    72727857
    7273 passwd chat (G)
    7274 .\" passwd chat
    7275 .PP
    7276 .RS 4
    7277 This string controls the
    7278 \fI"chat"\fR
    7279 conversation that takes places between
    7280 \fBsmbd\fR(8)
    7281 and the local password changing program to change the user\*(Aqs password\&. The string describes a sequence of response\-receive pairs that
    7282 \fBsmbd\fR(8)
    7283 uses to determine what to send to the
    7284 \m[blue]\fBpasswd program\fR\m[]
    7285 and what to expect back\&. If the expected output is not received then the password is not changed\&.
    7286 .sp
    7287 This chat sequence is often quite site specific, depending on what local methods are used for password control (such as NIS etc)\&.
    7288 .sp
    7289 Note that this parameter only is used if the
    7290 \m[blue]\fBunix password sync\fR\m[]
    7291 parameter is set to
    7292 \fByes\fR\&. This sequence is then called
    7293 \fIAS ROOT\fR
    7294 when the SMB password in the smbpasswd file is being changed, without access to the old password cleartext\&. This means that root must be able to reset the user\*(Aqs password without knowing the text of the previous password\&. In the presence of NIS/YP, this means that the
    7295 \m[blue]\fBpasswd program\fR\m[]
    7296 must be executed on the NIS master\&.
    7297 .sp
    7298 The string can contain the macro
    7299 \fI%n\fR
    7300 which is substituted for the new password\&. The old passsword (\fI%o\fR) is only available when
    7301 \m[blue]\fBencrypt passwords\fR\m[]
    7302 has been disabled\&. The chat sequence can also contain the standard macros \en, \er, \et and \es to give line\-feed, carriage\-return, tab and space\&. The chat sequence string can also contain a \*(Aq*\*(Aq which matches any sequence of characters\&. Double quotes can be used to collect strings with spaces in them into a single string\&.
    7303 .sp
    7304 If the send string in any part of the chat sequence is a full stop "\&.", then no string is sent\&. Similarly, if the expect string is a full stop then no string is expected\&.
    7305 .sp
    7306 If the
    7307 \m[blue]\fBpam password change\fR\m[]
    7308 parameter is set to
    7309 \fByes\fR, the chat pairs may be matched in any order, and success is determined by the PAM result, not any particular output\&. The \en macro is ignored for PAM conversions\&.
    7310 .sp
    7311 Default:
    7312 \fI\fIpasswd chat\fR\fR\fI = \fR\fI*new*password* %n\en*new*password* %n\en *changed*\fR\fI \fR
    7313 .sp
    7314 Example:
    7315 \fI\fIpasswd chat\fR\fR\fI = \fR\fI"*Enter NEW password*" %n\en "*Reenter NEW password*" %n\en "*Password changed*"\fR\fI \fR
    7316 .RE
    7317 
    73187858passwd program (G)
    73197859.\" passwd program
     
    73577897.RE
    73587898
    7359 password level (G)
    7360 .\" password level
    7361 .PP
    7362 .RS 4
    7363 Some client/server combinations have difficulty with mixed\-case passwords\&. One offending client is Windows for Workgroups, which for some reason forces passwords to upper case when using the LANMAN1 protocol, but leaves them alone when using COREPLUS! Another problem child is the Windows 95/98 family of operating systems\&. These clients upper case clear text passwords even when NT LM 0\&.12 selected by the protocol negotiation request/response\&.
    7364 .sp
    7365 This deprecated parameter defines the maximum number of characters that may be upper case in passwords\&.
    7366 .sp
    7367 For example, say the password given was "FRED"\&. If
    7368 \fI password level\fR
    7369 is set to 1, the following combinations would be tried if "FRED" failed:
    7370 .sp
    7371 "Fred", "fred", "fRed", "frEd","freD"
    7372 .sp
    7373 If
    7374 \fIpassword level\fR
    7375 was set to 2, the following combinations would also be tried:
    7376 .sp
    7377 "FRed", "FrEd", "FreD", "fREd", "fReD", "frED", \&.\&.
    7378 .sp
    7379 And so on\&.
    7380 .sp
    7381 The higher value this parameter is set to the more likely it is that a mixed case password will be matched against a single case password\&. However, you should be aware that use of this parameter reduces security and increases the time taken to process a new connection\&.
    7382 .sp
    7383 A value of zero will cause only two attempts to be made \- the password as is and the password in all\-lower case\&.
    7384 .sp
    7385 This parameter is used only when using plain\-text passwords\&. It is not at all used when encrypted passwords as in use (that is the default since samba\-3\&.0\&.0)\&. Use this only when
    7386 \m[blue]\fBencrypt passwords = No\fR\m[]\&.
    7387 .sp
    7388 Default:
    7389 \fI\fIpassword level\fR\fR\fI = \fR\fI0\fR\fI \fR
    7390 .sp
    7391 Example:
    7392 \fI\fIpassword level\fR\fR\fI = \fR\fI4\fR\fI \fR
    7393 .RE
    7394 
    73957899password server (G)
    73967900.\" password server
    73977901.PP
    73987902.RS 4
    7399 By specifying the name of another SMB server or Active Directory domain controller with this option, and using
    7400 security = [ads|domain|server]
     7903By specifying the name of a domain controller with this option, and using
     7904security = [ads|domain]
    74017905it is possible to get Samba to do all its username/password validation using a specific remote server\&.
    74027906.sp
    7403 If the
    7404 \fIsecurity\fR
    7405 parameter is set to
    7406 \fBdomain\fR
    7407 or
    7408 \fBads\fR, then this option
     7907Ideally, this option
    74097908\fIshould not\fR
    7410 be used, as the default \*(Aq*\*(Aq indicates to Samba to determine the best DC to contact dynamically, just as all other hosts in an AD domain do\&. This allows the domain to be maintained without modification to the smb\&.conf file\&. The cryptograpic protection on the authenticated RPC calls used to verify passwords ensures that this default is safe\&.
     7909be used, as the default \*(Aq*\*(Aq indicates to Samba to determine the best DC to contact dynamically, just as all other hosts in an AD domain do\&. This allows the domain to be maintained (addition and removal of domain controllers) without modification to the smb\&.conf file\&. The cryptographic protection on the authenticated RPC calls used to verify passwords ensures that this default is safe\&.
    74117910.sp
    74127911\fIIt is strongly recommended that you use the default of \*(Aq*\*(Aq\fR, however if in your particular environment you have reason to specify a particular DC list, then the list of machines in this option must be a list of names or IP addresses of Domain controllers for the Domain\&. If you use the default of \*(Aq*\*(Aq, or list several hosts in the
     
    74227921and so may resolved by any method and order described in that parameter\&.
    74237922.sp
    7424 If the
    7425 \fIsecurity\fR
    7426 parameter is set to
    7427 \fBserver\fR, these additional restrictions apply:
    7428 .sp
    7429 .RS 4
    7430 .ie n \{\
    7431 \h'-04'\(bu\h'+03'\c
    7432 .\}
    7433 .el \{\
    7434 .sp -1
    7435 .IP \(bu 2.3
    7436 .\}
    7437 You may list several password servers in the
    7438 \fIpassword server\fR
    7439 parameter, however if an
    7440 smbd
    7441 makes a connection to a password server, and then the password server fails, no more users will be able to be authenticated from this
    7442 smbd\&. This is a restriction of the SMB/CIFS protocol when in
    7443 security = server
    7444 mode and cannot be fixed in Samba\&.
    7445 .RE
    7446 .sp
    7447 .RS 4
    7448 .ie n \{\
    7449 \h'-04'\(bu\h'+03'\c
    7450 .\}
    7451 .el \{\
    7452 .sp -1
    7453 .IP \(bu 2.3
    7454 .\}
    7455 You will have to ensure that your users are able to login from the Samba server, as when in
    7456 security = server
    7457 mode the network logon will appear to come from the Samba server rather than from the users workstation\&.
    7458 .RE
    7459 .sp
    7460 .RS 4
    7461 .ie n \{\
    7462 \h'-04'\(bu\h'+03'\c
    7463 .\}
    7464 .el \{\
    7465 .sp -1
    7466 .IP \(bu 2.3
    7467 .\}
    7468 The client must not select NTLMv2 authentication\&.
    7469 .RE
    7470 .sp
    7471 .RS 4
    7472 .ie n \{\
    7473 \h'-04'\(bu\h'+03'\c
    7474 .\}
    7475 .el \{\
    7476 .sp -1
    7477 .IP \(bu 2.3
    7478 .\}
    7479 The password server must be a machine capable of using the "LM1\&.2X002" or the "NT LM 0\&.12" protocol, and it must be in user level security mode\&.
    7480 .RE
    7481 .sp
    7482 .RS 4
    7483 .ie n \{\
    7484 \h'-04'\(bu\h'+03'\c
    7485 .\}
    7486 .el \{\
    7487 .sp -1
    7488 .IP \(bu 2.3
    7489 .\}
    7490 Using a password server means your UNIX box (running Samba) is only as secure as (a host masqurading as) your password server\&.
    7491 \fIDO NOT CHOOSE A PASSWORD SERVER THAT YOU DON\*(AqT COMPLETELY TRUST\fR\&.
    7492 .RE
    7493 .sp
    7494 .RS 4
    7495 .ie n \{\
    7496 \h'-04'\(bu\h'+03'\c
    7497 .\}
    7498 .el \{\
    7499 .sp -1
    7500 .IP \(bu 2.3
    7501 .\}
    7502 Never point a Samba server at itself for password serving\&. This will cause a loop and could lock up your Samba server!
    7503 .RE
    7504 .sp
    7505 .RS 4
    7506 .ie n \{\
    7507 \h'-04'\(bu\h'+03'\c
    7508 .\}
    7509 .el \{\
    7510 .sp -1
    7511 .IP \(bu 2.3
    7512 .\}
    7513 The name of the password server takes the standard substitutions, but probably the only useful one is
    7514 \fI%m \fR, which means the Samba server will use the incoming client as the password server\&. If you use this then you better trust your clients, and you had better restrict them with hosts allow!
    7515 .RE
    7516 .sp
    7517 .RE
    75187923Default:
    75197924\fI\fIpassword server\fR\fR\fI = \fR\fI*\fR\fI \fR
     
    75757980.sp
    75767981Default:
    7577 \fI\fIpid directory\fR\fR\fI = \fR\fI${prefix}/var/locks\fR\fI \fR
    7578 .sp
    7579 Example:
    7580 \fI\fIpid directory\fR\fR\fI = \fR\fIpid directory = /var/run/\fR\fI \fR
     7982\fI\fIpid directory\fR\fR\fI = \fR\fI${prefix}/var/run\fR\fI \fR
     7983.sp
     7984Example:
     7985\fI\fIpid directory\fR\fR\fI = \fR\fI/var/run/\fR\fI \fR
    75817986.RE
    75827987
     
    76108015.RE
    76118016
    7612 preexec close (S)
    7613 .\" preexec close
    7614 .PP
    7615 .RS 4
    7616 This boolean option controls whether a non\-zero return code from
    7617 \m[blue]\fBpreexec\fR\m[]
    7618 should close the service being connected to\&.
    7619 .sp
    7620 Default:
    7621 \fI\fIpreexec close\fR\fR\fI = \fR\fIno\fR\fI \fR
    7622 .RE
    7623 
    76248017exec
    76258018.\" exec
     
    76388031An interesting example is to send the users a welcome message every time they log in\&. Maybe a message of the day? Here is an example:
    76398032.sp
    7640 
    76418033preexec = csh \-c \*(Aqecho \e"Welcome to %S!\e" | /usr/local/samba/bin/smbclient \-M %m \-I %I\*(Aq &
    76428034.sp
     
    76538045Example:
    76548046\fI\fIpreexec\fR\fR\fI = \fR\fIecho \e"%u connected to %S from %m (%I)\e" >> /tmp/log\fR\fI \fR
     8047.RE
     8048
     8049preexec close (S)
     8050.\" preexec close
     8051.PP
     8052.RS 4
     8053This boolean option controls whether a non\-zero return code from
     8054\m[blue]\fBpreexec\fR\m[]
     8055should close the service being connected to\&.
     8056.sp
     8057Default:
     8058\fI\fIpreexec close\fR\fR\fI = \fR\fIno\fR\fI \fR
    76558059.RE
    76568060
     
    76988102.RE
    76998103
    7700 auto services
    7701 .\" auto services
    7702 .PP
    7703 .RS 4
    7704 This parameter is a synonym for
    7705 preload\&.
    7706 .RE
    7707 
    7708 preload (G)
    7709 .\" preload
    7710 .PP
    7711 .RS 4
    7712 This is a list of services that you want to be automatically added to the browse lists\&. This is most useful for homes and printers services that would otherwise not be visible\&.
    7713 .sp
    7714 Note that if you just want all printers in your printcap file loaded then the
    7715 \m[blue]\fBload printers\fR\m[]
    7716 option is easier\&.
    7717 .sp
    7718 Default:
    7719 \fI\fIpreload\fR\fR\fI = \fR\fI\fR\fI \fR
    7720 .sp
    7721 Example:
    7722 \fI\fIpreload\fR\fR\fI = \fR\fIfred lp colorlp\fR\fI \fR
    7723 .RE
    7724 
    77258104preserve case (S)
    77268105.\" preserve case
     
    77948173.sp
    77958174To use the CUPS printing interface set
    7796 printcap name = cups\&. This should be supplemented by an addtional setting
     8175printcap name = cups\&. This should be supplemented by an additional setting
    77978176\m[blue]\fBprinting = cups\fR\m[]
    77988177in the [global] section\&.
     
    79338312.RE
    79348313
    7935 printer admin (S)
    7936 .\" printer admin
    7937 .PP
    7938 .RS 4
    7939 This lists users who can do anything to printers via the remote administration interfaces offered by MS\-RPC (usually using a NT workstation)\&. This parameter can be set per\-share or globally\&. Note: The root user always has admin rights\&. Use caution with use in the global stanza as this can cause side effects\&.
    7940 .sp
    7941 This parameter has been marked deprecated in favor of using the SePrintOperatorPrivilege and individual print security descriptors\&. It will be removed in a future release\&.
    7942 .sp
    7943 Default:
    7944 \fI\fIprinter admin\fR\fR\fI = \fR\fI\fR\fI \fR
    7945 .sp
    7946 Example:
    7947 \fI\fIprinter admin\fR\fR\fI = \fR\fIadmin, @staff\fR\fI \fR
    7948 .RE
    7949 
    79508314printer
    79518315.\" printer
     
    79718335.sp
    79728336Default:
    7973 \fI\fIprinter name\fR\fR\fI = \fR\fInone\fR\fI \fR
     8337\fI\fIprinter name\fR\fR\fI = \fR\fI\fR\fI \fR
    79748338.sp
    79758339Example:
     
    79978361\fBHPUX\fR,
    79988362\fBQNX\fR,
    7999 \fBSOFTQ\fR, and
    8000 \fBCUPS\fR\&.
     8363\fBSOFTQ\fR,
     8364\fBCUPS\fR
     8365and
     8366\fBIPRINT\fR\&.
     8367.sp
     8368Be aware that CUPS and IPRINT are only available if the CUPS development library was available at the time Samba was compiled or packaged\&.
    80018369.sp
    80028370To see what the defaults are for the other print commands when using the various options use the
     
    80128380section\&.
    80138381.sp
    8014 Default:
    8015 \fI\fIprinting\fR\fR\fI = \fR\fIDepends on the operating system, see testparm \-v\&.\fR\fI \fR
     8382See
     8383testparm \-v\&.
     8384for the default value on your system
     8385.sp
     8386Default:
     8387\fI\fIprinting\fR\fR\fI = \fR\fI # Depends on the operating system\fR\fI \fR
    80168388.RE
    80178389
     
    80338405.PP
    80348406.RS 4
    8035 Windows print clients can update print queue status by expecting the server to open a backchannel SMB connection to them\&. Due to client firewall settings this can cause considerable timeouts and will often fail, as there is no guarantee the client is even running an SMB server\&. By setting this parameter to
    8036 \fBno\fR
    8037 the Samba print server will not try to connect back to clients and treat corresponding requests as if the connection back to the client failed\&. The default setting of
    8038 \fByes\fR
    8039 causes smbd to attempt this connection\&.
    8040 .sp
    8041 Default:
    8042 \fI\fIprint notify backchannel\fR\fR\fI = \fR\fIyes\fR\fI \fR
     8407Windows print clients can update print queue status by expecting the server to open a backchannel SMB connection to them\&. Due to client firewall settings this can cause considerable timeouts and will often fail, as there is no guarantee the client is even running an SMB server\&. By default, the Samba print server will not try to connect back to clients, and will treat corresponding requests as if the connection back to the client failed\&.
     8408.sp
     8409Default:
     8410\fI\fIprint notify backchannel\fR\fR\fI = \fR\fIno\fR\fI \fR
     8411.RE
     8412
     8413private directory
     8414.\" private directory
     8415.PP
     8416.RS 4
     8417This parameter is a synonym for
     8418private dir\&.
    80438419.RE
    80448420
     
    80888464Note that it is good practice to include the absolute path in the command as the PATH may not be available to the server\&.
    80898465.sp
    8090 \fINo default\fR
     8466Default:
     8467\fI\fIqueuepause command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR
    80918468.sp
    80928469Example:
     
    81118488.sp
    81128489Default:
    8113 \fI\fIqueueresume command\fR\fR\fI = \fR\fI\fR\fI \fR
     8490\fI\fIqueueresume command\fR\fR\fI = \fR\fI # determined by printing parameter\fR\fI \fR
    81148491.sp
    81158492Example:
    81168493\fI\fIqueueresume command\fR\fR\fI = \fR\fIenable %p\fR\fI \fR
     8494.RE
     8495
     8496raw NTLMv2 auth (G)
     8497.\" raw NTLMv2 auth
     8498.PP
     8499.RS 4
     8500This parameter determines whether or not
     8501\fBsmbd\fR(8)
     8502will allow SMB1 clients without extended security (without SPNEGO) to use NTLMv2 authentication\&.
     8503.sp
     8504If this option,
     8505lanman auth
     8506and
     8507ntlm auth
     8508are all disabled, then only clients with SPNEGO support will be permitted\&. That means NTLMv2 is only supported within NTLMSSP\&.
     8509.sp
     8510Default:
     8511\fI\fIraw NTLMv2 auth\fR\fR\fI = \fR\fIno\fR\fI \fR
    81178512.RE
    81188513
     
    81278522parameter\&.
    81288523.sp
    8129 This parameter will not work with the
    8130 \m[blue]\fBsecurity = share\fR\m[]
    8131 in Samba 3\&.0\&. This is by design\&.
    8132 .sp
    81338524Default:
    81348525\fI\fIread list\fR\fR\fI = \fR\fI\fR\fI \fR
     
    81608551.PP
    81618552.RS 4
    8162 This parameter controls whether or not the server will support the raw read SMB requests when transferring data to clients\&.
    8163 .sp
    8164 If enabled, raw reads allow reads of 65535 bytes in one packet\&. This typically provides a major performance benefit\&.
     8553This is ignored if
     8554\m[blue]\fBasync smb echo handler\fR\m[]
     8555is set, because this feature is incompatible with raw read SMB requests
     8556.sp
     8557If enabled, raw reads allow reads of 65535 bytes in one packet\&. This typically provides a major performance benefit for some very, very old clients\&.
    81658558.sp
    81668559However, some clients either negotiate the allowable block size incorrectly or are incapable of supporting larger block sizes, and for these clients you may need to disable raw reads\&.
     
    82078600Example:
    82088601\fI\fIregistry shares\fR\fR\fI = \fR\fIyes\fR\fI \fR
     8602.RE
     8603
     8604reject md5 clients (G)
     8605.\" reject md5 clients
     8606.PP
     8607.RS 4
     8608This option controls whether the netlogon server (currently only in \*(Aqactive directory domain controller\*(Aq mode), will reject clients which does not support NETLOGON_NEG_SUPPORTS_AES\&.
     8609.sp
     8610You can set this to yes if all domain members support aes\&. This will prevent downgrade attacks\&.
     8611.sp
     8612This option takes precedence to the \*(Aqallow nt4 crypto\*(Aq option\&.
     8613.sp
     8614Default:
     8615\fI\fIreject md5 clients\fR\fR\fI = \fR\fIno\fR\fI \fR
     8616.RE
     8617
     8618reject md5 servers (G)
     8619.\" reject md5 servers
     8620.PP
     8621.RS 4
     8622This option controls whether winbindd requires support for aes support for the netlogon secure channel\&.
     8623.sp
     8624The following flags will be required NETLOGON_NEG_ARCFOUR, NETLOGON_NEG_SUPPORTS_AES, NETLOGON_NEG_PASSWORD_SET2 and NETLOGON_NEG_AUTHENTICATED_RPC\&.
     8625.sp
     8626You can set this to yes if all domain controllers support aes\&. This will prevent downgrade attacks\&.
     8627.sp
     8628The behavior can be controlled per netbios domain by using \*(Aqreject md5 servers:NETBIOSDOMAIN = yes\*(Aq as option\&.
     8629.sp
     8630This option takes precedence to the
     8631\m[blue]\fBrequire strong key\fR\m[]
     8632option\&.
     8633.sp
     8634Default:
     8635\fI\fIreject md5 servers\fR\fR\fI = \fR\fIno\fR\fI \fR
    82098636.RE
    82108637
     
    83098736.RE
    83108737Default:
    8311 \fI\fIrename user script\fR\fR\fI = \fR\fIno\fR\fI \fR
     8738\fI\fIrename user script\fR\fR\fI = \fR\fI\fR\fI \fR
     8739.RE
     8740
     8741require strong key (G)
     8742.\" require strong key
     8743.PP
     8744.RS 4
     8745This option controls whether winbindd requires support for md5 strong key support for the netlogon secure channel\&.
     8746.sp
     8747The following flags will be required NETLOGON_NEG_STRONG_KEYS, NETLOGON_NEG_ARCFOUR and NETLOGON_NEG_AUTHENTICATED_RPC\&.
     8748.sp
     8749You can set this to no if some domain controllers only support des\&. This might allows weak crypto to be negotiated, may via downgrade attacks\&.
     8750.sp
     8751The behavior can be controlled per netbios domain by using \*(Aqrequire strong key:NETBIOSDOMAIN = no\*(Aq as option\&.
     8752.sp
     8753Note for active directory domain this option is hardcoded to \*(Aqyes\*(Aq
     8754.sp
     8755This option yields precedence to the
     8756\m[blue]\fBreject md5 servers\fR\m[]
     8757option\&.
     8758.sp
     8759This option takes precedence to the
     8760\m[blue]\fBclient schannel\fR\m[]
     8761option\&.
     8762.sp
     8763Default:
     8764\fI\fIrequire strong key\fR\fR\fI = \fR\fIyes\fR\fI \fR
    83128765.RE
    83138766
     
    83398792.\}
    83408793.sp
    8341 registry key in Windows 2000 and Windows NT\&. When set to 0, user and group list information is returned to anyone who asks\&. When set to 1, only an authenticated user can retrive user and group list information\&. For the value 2, supported by Windows 2000/XP and Samba, no anonymous connections are allowed at all\&. This can break third party and Microsoft applications which expect to be allowed to perform operations anonymously\&.
     8794registry key in Windows 2000 and Windows NT\&. When set to 0, user and group list information is returned to anyone who asks\&. When set to 1, only an authenticated user can retrieve user and group list information\&. For the value 2, supported by Windows 2000/XP and Samba, no anonymous connections are allowed at all\&. This can break third party and Microsoft applications which expect to be allowed to perform operations anonymously\&.
    83428795.sp
    83438796The security advantage of using restrict anonymous = 1 is dubious, as user and group list information can be obtained using other means\&.
     
    83638816.RE
    83648817
     8818rndc command (G)
     8819.\" rndc command
     8820.PP
     8821.RS 4
     8822This option specifies the path to the name server control utility\&.
     8823.sp
     8824The
     8825rndc
     8826utility should be a part of the bind installation\&.
     8827.sp
     8828Default:
     8829\fI\fIrndc command\fR\fR\fI = \fR\fI/usr/sbin/rndc\fR\fI \fR
     8830.sp
     8831Example:
     8832\fI\fIrndc command\fR\fR\fI = \fR\fI/usr/local/bind9/sbin/rndc\fR\fI \fR
     8833.RE
     8834
    83658835root
    83668836.\" root
     
    84028872.sp
    84038873Default:
    8404 \fI\fIroot directory\fR\fR\fI = \fR\fI/\fR\fI \fR
     8874\fI\fIroot directory\fR\fR\fI = \fR\fI\fR\fI \fR
    84058875.sp
    84068876Example:
     
    84208890.RE
    84218891
     8892root preexec (S)
     8893.\" root preexec
     8894.PP
     8895.RS 4
     8896This is the same as the
     8897\fIpreexec\fR
     8898parameter except that the command is run as root\&. This is useful for mounting filesystems (such as CDROMs) when a connection is opened\&.
     8899.sp
     8900Default:
     8901\fI\fIroot preexec\fR\fR\fI = \fR\fI\fR\fI \fR
     8902.RE
     8903
    84228904root preexec close (S)
    84238905.\" root preexec close
     
    84328914.RE
    84338915
    8434 root preexec (S)
    8435 .\" root preexec
    8436 .PP
    8437 .RS 4
    8438 This is the same as the
    8439 \fIpreexec\fR
    8440 parameter except that the command is run as root\&. This is useful for mounting filesystems (such as CDROMs) when a connection is opened\&.
    8441 .sp
    8442 Default:
    8443 \fI\fIroot preexec\fR\fR\fI = \fR\fI\fR\fI \fR
    8444 .RE
    8445 
    8446 rpc_server (G)
    8447 .\" rpc_server
    8448 .PP
    8449 .RS 4
    8450 Defines what kind of rpc server to use for a named pipe\&. The rpc_server prefix must be followed by the pipe name, and a value\&.
    8451 .sp
    8452 Three possible values are currently supported:
    8453 embedded
    8454 daemon
    8455 external
    8456 .sp
    8457 The classic method is to run every pipe as an internal function
    8458 \fIembedded\fR
    8459 in smbd\&.
    8460 .sp
    8461 An alternative method is to fork a
    8462 \fIdaemon\fR
    8463 early on at smbd startup time\&. This is supported only for selected pipes\&.
    8464 .sp
    8465 Choosing the
    8466 \fIexternal\fR
    8467 option allows to run a completely independent (3rd party) server capable of interfacing with samba via the MS\-RPC interface over named pipes\&.
    8468 .sp
    8469 Currently only the spoolss pipe can be configured in
    8470 \fIdaemon\fR
    8471 mode like this:
     8916rpc big endian (G)
     8917.\" rpc big endian
     8918.PP
     8919.RS 4
     8920Setting this option will force the RPC client and server to transfer data in big endian\&.
     8921.sp
     8922If it is disabled, data will be transferred in little endian\&.
     8923.sp
     8924The behaviour is independent of the endianness of the host machine\&.
     8925.sp
     8926Default:
     8927\fI\fIrpc big endian\fR\fR\fI = \fR\fIno\fR\fI \fR
     8928.RE
     8929
     8930rpc_daemon:DAEMON (G)
     8931.\" rpc_daemon:DAEMON
     8932.PP
     8933.RS 4
     8934Defines whether to use the embedded code or start a separate daemon for the defined rpc services\&. The rpc_daemon prefix must be followed by the server name, and a value\&.
     8935.sp
     8936Two possible values are currently supported:
    84728937.sp
    84738938.if n \{\
     
    84758940.\}
    84768941.nf
    8477         rpc_server:spoolss = daemon
     8942                disabled
     8943                fork
    84788944       
    84798945.fi
     
    84828948.\}
    84838949.sp
    8484 Default:
    8485 \fI\fIrpc_server\fR\fR\fI = \fR\fInone\fR\fI \fR
    8486 .RE
    8487 
    8488 security mask (S)
    8489 .\" security mask
    8490 .PP
    8491 .RS 4
    8492 This parameter controls what UNIX permission bits will be set when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog box\&.
    8493 .sp
    8494 This parameter is applied as a mask (AND\*(Aqed with) to the incoming permission bits, thus resetting any bits not in this mask\&. Make sure not to mix up this parameter with
    8495 \m[blue]\fBforce security mode\fR\m[], which works in a manner similar to this one but uses a logical OR instead of an AND\&.
    8496 .sp
    8497 Essentially, all bits set to zero in this mask will result in setting to zero the corresponding bits on the file permissions regardless of the previous status of this bits on the file\&.
    8498 .sp
    8499 If not set explicitly this parameter is 0777, allowing a user to set all the user/group/world permissions on a file\&.
    8500 .sp
    8501 \fI Note\fR
    8502 that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems\&. Administrators of most normal systems will probably want to leave it set to
    8503 \fB0777\fR\&.
    8504 .sp
    8505 Default:
    8506 \fI\fIsecurity mask\fR\fR\fI = \fR\fI0777\fR\fI \fR
    8507 .sp
    8508 Example:
    8509 \fI\fIsecurity mask\fR\fR\fI = \fR\fI0770\fR\fI \fR
     8950The classic method is to run rpc services as internal daemons embedded in smbd, therefore the external daemons are
     8951\fIdisabled\fR
     8952by default\&.
     8953.sp
     8954Choosing the
     8955\fIfork\fR
     8956option will cause samba to fork a separate process for each daemon configured this way\&. Each daemon may in turn fork a number of children used to handle requests from multiple smbds and direct tcp/ip connections (if the Endpoint Mapper is enabled)\&. Communication with smbd happens over named pipes and require that said pipes are forward to the external daemon (see
     8957\m[blue]\fBrpc_server\fR\m[])\&.
     8958.sp
     8959Forked RPC Daemons support dynamically forking children to handle connections\&. The heuristics about how many children to keep around and how fast to allow them to fork and also how many clients each child is allowed to handle concurrently is defined by parametrical options named after the daemon\&. Five options are currently supported:
     8960.sp
     8961.if n \{\
     8962.RS 4
     8963.\}
     8964.nf
     8965                prefork_min_children
     8966                prefork_max_children
     8967                prefork_spawn_rate
     8968                prefork_max_allowed_clients
     8969                prefork_child_min_life
     8970       
     8971.fi
     8972.if n \{\
     8973.RE
     8974.\}
     8975.sp
     8976To set one of these options use the follwing syntax:
     8977.sp
     8978.if n \{\
     8979.RS 4
     8980.\}
     8981.nf
     8982        damonname:prefork_min_children = 5
     8983       
     8984.fi
     8985.if n \{\
     8986.RE
     8987.\}
     8988.sp
     8989Samba includes separate daemons for spoolss, lsarpc/lsass, netlogon, samr, FSRVP and mdssvc(Spotlight)\&. Currently five daemons are available and they are called:
     8990.sp
     8991.if n \{\
     8992.RS 4
     8993.\}
     8994.nf
     8995                epmd
     8996                lsasd
     8997                spoolssd
     8998                fssd
     8999                mdssd
     9000       
     9001.fi
     9002.if n \{\
     9003.RE
     9004.\}
     9005.sp
     9006Example:
     9007.sp
     9008.if n \{\
     9009.RS 4
     9010.\}
     9011.nf
     9012        rpc_daemon:spoolssd = fork
     9013       
     9014.fi
     9015.if n \{\
     9016.RE
     9017.\}
     9018.sp
     9019Default:
     9020\fI\fIrpc_daemon:DAEMON\fR\fR\fI = \fR\fIdisabled\fR\fI \fR
     9021.RE
     9022
     9023rpc_server:SERVER (G)
     9024.\" rpc_server:SERVER
     9025.PP
     9026.RS 4
     9027With this option you can define if a rpc service should be running internal/embedded in smbd or should be redirected to an external daemon like Samba4, the endpoint mapper daemon, the spoolss daemon or the new LSA service daemon\&. The rpc_server prefix must be followed by the pipe name, and a value\&.
     9028.sp
     9029This option can be set for each available rpc service in Samba\&. The following list shows all available pipe names services you can modify with this option\&.
     9030.sp
     9031.RS 4
     9032.ie n \{\
     9033\h'-04'\(bu\h'+03'\c
     9034.\}
     9035.el \{\
     9036.sp -1
     9037.IP \(bu 2.3
     9038.\}
     9039epmapper \- Endpoint Mapper
     9040.RE
     9041.sp
     9042.RS 4
     9043.ie n \{\
     9044\h'-04'\(bu\h'+03'\c
     9045.\}
     9046.el \{\
     9047.sp -1
     9048.IP \(bu 2.3
     9049.\}
     9050winreg \- Remote Registry Service
     9051.RE
     9052.sp
     9053.RS 4
     9054.ie n \{\
     9055\h'-04'\(bu\h'+03'\c
     9056.\}
     9057.el \{\
     9058.sp -1
     9059.IP \(bu 2.3
     9060.\}
     9061srvsvc \- Remote Server Services
     9062.RE
     9063.sp
     9064.RS 4
     9065.ie n \{\
     9066\h'-04'\(bu\h'+03'\c
     9067.\}
     9068.el \{\
     9069.sp -1
     9070.IP \(bu 2.3
     9071.\}
     9072lsarpc \- Local Security Authority
     9073.RE
     9074.sp
     9075.RS 4
     9076.ie n \{\
     9077\h'-04'\(bu\h'+03'\c
     9078.\}
     9079.el \{\
     9080.sp -1
     9081.IP \(bu 2.3
     9082.\}
     9083samr \- Security Account Management
     9084.RE
     9085.sp
     9086.RS 4
     9087.ie n \{\
     9088\h'-04'\(bu\h'+03'\c
     9089.\}
     9090.el \{\
     9091.sp -1
     9092.IP \(bu 2.3
     9093.\}
     9094netlogon \- Netlogon Remote Protocol
     9095.RE
     9096.sp
     9097.RS 4
     9098.ie n \{\
     9099\h'-04'\(bu\h'+03'\c
     9100.\}
     9101.el \{\
     9102.sp -1
     9103.IP \(bu 2.3
     9104.\}
     9105netdfs \- Settings for Distributed File System
     9106.RE
     9107.sp
     9108.RS 4
     9109.ie n \{\
     9110\h'-04'\(bu\h'+03'\c
     9111.\}
     9112.el \{\
     9113.sp -1
     9114.IP \(bu 2.3
     9115.\}
     9116dssetup \- Active Directory Setup
     9117.RE
     9118.sp
     9119.RS 4
     9120.ie n \{\
     9121\h'-04'\(bu\h'+03'\c
     9122.\}
     9123.el \{\
     9124.sp -1
     9125.IP \(bu 2.3
     9126.\}
     9127wkssvc \- Workstation Services
     9128.RE
     9129.sp
     9130.RS 4
     9131.ie n \{\
     9132\h'-04'\(bu\h'+03'\c
     9133.\}
     9134.el \{\
     9135.sp -1
     9136.IP \(bu 2.3
     9137.\}
     9138spoolss \- Network Printing Spooler
     9139.RE
     9140.sp
     9141.RS 4
     9142.ie n \{\
     9143\h'-04'\(bu\h'+03'\c
     9144.\}
     9145.el \{\
     9146.sp -1
     9147.IP \(bu 2.3
     9148.\}
     9149svcctl \- Service Control
     9150.RE
     9151.sp
     9152.RS 4
     9153.ie n \{\
     9154\h'-04'\(bu\h'+03'\c
     9155.\}
     9156.el \{\
     9157.sp -1
     9158.IP \(bu 2.3
     9159.\}
     9160ntsvcs \- Plug and Play Services
     9161.RE
     9162.sp
     9163.RS 4
     9164.ie n \{\
     9165\h'-04'\(bu\h'+03'\c
     9166.\}
     9167.el \{\
     9168.sp -1
     9169.IP \(bu 2.3
     9170.\}
     9171eventlog \- Event Logger
     9172.RE
     9173.sp
     9174.RS 4
     9175.ie n \{\
     9176\h'-04'\(bu\h'+03'\c
     9177.\}
     9178.el \{\
     9179.sp -1
     9180.IP \(bu 2.3
     9181.\}
     9182initshutdown \- Init Shutdown Service
     9183.RE
     9184.sp
     9185.RS 4
     9186.ie n \{\
     9187\h'-04'\(bu\h'+03'\c
     9188.\}
     9189.el \{\
     9190.sp -1
     9191.IP \(bu 2.3
     9192.\}
     9193mdssvc \- Spotlight
     9194.RE
     9195.sp
     9196.RE
     9197Three possible values currently supported are:
     9198embeddedexternaldisabled
     9199.sp
     9200The classic method is to run every pipe as an internal function
     9201\fIembedded\fR
     9202in smbd\&. The defaults may vary depending on the service\&.
     9203.sp
     9204Choosing the
     9205\fIexternal\fR
     9206option allows one to run a separate daemon or even a completely independent (3rd party) server capable of interfacing with samba via the MS\-RPC interface over named pipes\&.
     9207.sp
     9208Currently in Samba3 we support four daemons, spoolssd, epmd, lsasd and mdssd\&. These daemons can be enabled using the
     9209\fIrpc_daemon\fR
     9210option\&. For spoolssd you have to enable the daemon and proxy the named pipe with:
     9211.sp
     9212Examples:
     9213.sp
     9214.if n \{\
     9215.RS 4
     9216.\}
     9217.nf
     9218                        rpc_daemon:lsasd = fork
     9219                        rpc_server:lsarpc = external
     9220                        rpc_server:samr = external
     9221                        rpc_server:netlogon = external
     9222
     9223                        rpc_server:spoolss = external
     9224                        rpc_server:epmapper = disabled
     9225
     9226                        rpc_daemon:mdssd = fork
     9227                        rpc_server:mdssvc = external
     9228               
     9229.fi
     9230.if n \{\
     9231.RE
     9232.\}
     9233.sp
     9234There is one special option which allows you to enable rpc services to listen for ncacn_ip_tcp connections too\&. Currently this is only used for testing and doesn\*(Aqt scale!
     9235.sp
     9236.if n \{\
     9237.RS 4
     9238.\}
     9239.nf
     9240                        rpc_server:tcpip = yes
     9241               
     9242.fi
     9243.if n \{\
     9244.RE
     9245.\}
     9246.sp
     9247Default:
     9248\fI\fIrpc_server:SERVER\fR\fR\fI = \fR\fIembedded\fR\fI \fR
     9249.RE
     9250
     9251samba kcc command (G)
     9252.\" samba kcc command
     9253.PP
     9254.RS 4
     9255This option specifies the path to the Samba KCC command\&. This script is used for replication topology replication\&.
     9256.sp
     9257It should not be necessary to modify this option except for testing purposes or if the
     9258samba_kcc
     9259was installed in a non\-default location\&.
     9260.sp
     9261Default:
     9262\fI\fIsamba kcc command\fR\fR\fI = \fR\fI${prefix}/sbin/samba_kcc\fR\fI \fR
     9263.sp
     9264Example:
     9265\fI\fIsamba kcc command\fR\fR\fI = \fR\fI/usr/local/bin/kcc\fR\fI \fR
    85109266.RE
    85119267
     
    85189274file\&.
    85199275.sp
    8520 The option sets the "security mode bit" in replies to protocol negotiations with
    8521 \fBsmbd\fR(8)
    8522 to turn share level security on or off\&. Clients decide based on this bit whether (and how) to transfer user and password information to the server\&.
    8523 .sp
    85249276The default is
    8525 security = user, as this is the most common setting needed when talking to Windows 98 and Windows NT\&.
     9277security = user, as this is the most common setting, used for a standalone file server or a DC\&.
    85269278.sp
    85279279The alternatives are
    85289280security = ads
    85299281or
    8530 security = domain, which support joining Samba to a Windows domain, along with
    8531 security = share
    8532 and
    8533 security = server, both of which are deprecated\&.
    8534 .sp
    8535 In versions of Samba prior to 2\&.0\&.0, the default was
    8536 security = share
    8537 mainly because that was the only option at one stage\&.
     9282security = domain, which support joining Samba to a Windows domain
    85389283.sp
    85399284You should use
     
    85439288if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&.
    85449289.sp
    8545 It is possible to use
    8546 smbd
    8547 in a
    8548 \fI hybrid mode\fR
    8549 where it is offers both user and share level security under different
    8550 \m[blue]\fBNetBIOS aliases\fR\m[]\&.
    8551 .sp
    85529290The different settings will now be explained\&.
    85539291.sp
     9292\fISECURITY = AUTO\fR
     9293.sp
     9294This is the default security setting in Samba, and causes Samba to consult the
     9295\m[blue]\fBserver role\fR\m[]
     9296parameter (if set) to determine the security mode\&.
     9297.sp
    85549298\fISECURITY = USER\fR
    85559299.sp
    8556 This is the default security setting in Samba\&. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the
     9300If
     9301\m[blue]\fBserver role\fR\m[]
     9302is not specified, this is the default security setting in Samba\&. With user\-level security a client must first "log\-on" with a valid username and password (which can be mapped using the
    85579303\m[blue]\fBusername map\fR\m[]
    85589304parameter)\&. Encrypted passwords (see the
     
    85729318parameter for details on doing this\&.
    85739319.sp
    8574 See also the section
    8575 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.
    8576 .sp
    85779320\fISECURITY = DOMAIN\fR
    85789321.sp
     
    86019344parameter for details on doing this\&.
    86029345.sp
    8603 See also the section
    8604 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.
    8605 .sp
    86069346See also the
    86079347\m[blue]\fBpassword server\fR\m[]
     
    86109350parameter\&.
    86119351.sp
    8612 \fISECURITY = SHARE\fR
    8613 .if n \{\
    8614 .sp
    8615 .\}
    8616 .RS 4
    8617 .it 1 an-trap
    8618 .nr an-no-space-flag 1
    8619 .nr an-break-flag 1
    8620 .br
    8621 .ps +1
    8622 \fBNote\fR
    8623 .ps -1
    8624 .br
    8625 This option is deprecated as it is incompatible with SMB2
    8626 .sp .5v
    8627 .RE
    8628 When clients connect to a share level security server, they need not log onto the server with a valid username and password before attempting to connect to a shared resource (although modern clients such as Windows 95/98 and Windows NT will send a logon request with a username but no password when talking to a
    8629 security = share
    8630 server)\&. Instead, the clients send authentication information (passwords) on a per\-share basis, at the time they attempt to connect to that share\&.
    8631 .sp
    8632 Note that
    8633 smbd
    8634 \fIALWAYS\fR
    8635 uses a valid UNIX user to act on behalf of the client, even in
    8636 security = share
    8637 level security\&.
    8638 .sp
    8639 As clients are not required to send a username to the server in share level security,
    8640 smbd
    8641 uses several techniques to determine the correct UNIX user to use on behalf of the client\&.
    8642 .sp
    8643 A list of possible UNIX usernames to match with the given client password is constructed using the following methods :
    8644 .sp
    8645 .RS 4
    8646 .ie n \{\
    8647 \h'-04'\(bu\h'+03'\c
    8648 .\}
    8649 .el \{\
    8650 .sp -1
    8651 .IP \(bu 2.3
    8652 .\}
    8653 If the
    8654 \m[blue]\fBguest only\fR\m[]
    8655 parameter is set, then all the other stages are missed and only the
    8656 \m[blue]\fBguest account\fR\m[]
    8657 username is checked\&.
    8658 .RE
    8659 .sp
    8660 .RS 4
    8661 .ie n \{\
    8662 \h'-04'\(bu\h'+03'\c
    8663 .\}
    8664 .el \{\
    8665 .sp -1
    8666 .IP \(bu 2.3
    8667 .\}
    8668 Is a username is sent with the share connection request, then this username (after mapping \- see
    8669 \m[blue]\fBusername map\fR\m[]), is added as a potential username\&.
    8670 .RE
    8671 .sp
    8672 .RS 4
    8673 .ie n \{\
    8674 \h'-04'\(bu\h'+03'\c
    8675 .\}
    8676 .el \{\
    8677 .sp -1
    8678 .IP \(bu 2.3
    8679 .\}
    8680 If the client did a previous
    8681 \fIlogon \fR
    8682 request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username\&.
    8683 .RE
    8684 .sp
    8685 .RS 4
    8686 .ie n \{\
    8687 \h'-04'\(bu\h'+03'\c
    8688 .\}
    8689 .el \{\
    8690 .sp -1
    8691 .IP \(bu 2.3
    8692 .\}
    8693 The name of the service the client requested is added as a potential username\&.
    8694 .RE
    8695 .sp
    8696 .RS 4
    8697 .ie n \{\
    8698 \h'-04'\(bu\h'+03'\c
    8699 .\}
    8700 .el \{\
    8701 .sp -1
    8702 .IP \(bu 2.3
    8703 .\}
    8704 The NetBIOS name of the client is added to the list as a potential username\&.
    8705 .RE
    8706 .sp
    8707 .RS 4
    8708 .ie n \{\
    8709 \h'-04'\(bu\h'+03'\c
    8710 .\}
    8711 .el \{\
    8712 .sp -1
    8713 .IP \(bu 2.3
    8714 .\}
    8715 Any users on the
    8716 \m[blue]\fBuser\fR\m[]
    8717 list are added as potential usernames\&.
    8718 .RE
    8719 .sp
    8720 .RE
    8721 If the
    8722 \fIguest only\fR
    8723 parameter is not set, then this list is then tried with the supplied password\&. The first user for whom the password matches will be used as the UNIX user\&.
    8724 .sp
    8725 If the
    8726 \fIguest only\fR
    8727 parameter is set, or no username can be determined then if the share is marked as available to the
    8728 \fIguest account\fR, then this guest user will be used, otherwise access is denied\&.
    8729 .sp
    8730 Note that it can be
    8731 \fIvery\fR
    8732 confusing in share\-level security as to which UNIX username will eventually be used in granting access\&.
    8733 .sp
    8734 See also the section
    8735 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.
    8736 .sp
    8737 \fISECURITY = SERVER\fR
    8738 .sp
    8739 In this depicted mode Samba will try to validate the username/password by passing it to another SMB server, such as an NT box\&. If this fails it will revert to
    8740 security = user\&. It expects the
    8741 \m[blue]\fBencrypted passwords\fR\m[]
    8742 parameter to be set to
    8743 \fByes\fR, unless the remote server does not support them\&. However note that if encrypted passwords have been negotiated then Samba cannot revert back to checking the UNIX password file, it must have a valid
    8744 smbpasswd
    8745 file to check users against\&. See the chapter about the User Database in the Samba HOWTO Collection for details on how to set this up\&.
    8746 .if n \{\
    8747 .sp
    8748 .\}
    8749 .RS 4
    8750 .it 1 an-trap
    8751 .nr an-no-space-flag 1
    8752 .nr an-break-flag 1
    8753 .br
    8754 .ps +1
    8755 \fBNote\fR
    8756 .ps -1
    8757 .br
    8758 This mode of operation has significant pitfalls since it is more vulnerable to man\-in\-the\-middle attacks and server impersonation\&. In particular, this mode of operation can cause significant resource consumption on the PDC, as it must maintain an active connection for the duration of the user\*(Aqs session\&. Furthermore, if this connection is lost, there is no way to reestablish it, and further authentications to the Samba server may fail (from a single client, till it disconnects)\&.
    8759 .sp .5v
    8760 .RE
    8761 .if n \{\
    8762 .sp
    8763 .\}
    8764 .RS 4
    8765 .it 1 an-trap
    8766 .nr an-no-space-flag 1
    8767 .nr an-break-flag 1
    8768 .br
    8769 .ps +1
    8770 \fBNote\fR
    8771 .ps -1
    8772 .br
    8773 If the client selects NTLMv2 authentication, then this mode of operation
    8774 \fIwill fail\fR
    8775 .sp .5v
    8776 .RE
    8777 .if n \{\
    8778 .sp
    8779 .\}
    8780 .RS 4
    8781 .it 1 an-trap
    8782 .nr an-no-space-flag 1
    8783 .nr an-break-flag 1
    8784 .br
    8785 .ps +1
    8786 \fBNote\fR
    8787 .ps -1
    8788 .br
    8789 From the client\*(Aqs point of view,
    8790 security = server
    8791 is the same as
    8792 security = user\&. It only affects how the server deals with the authentication, it does not in any way affect what the client sees\&.
    8793 .sp .5v
    8794 .RE
    8795 .if n \{\
    8796 .sp
    8797 .\}
    8798 .RS 4
    8799 .it 1 an-trap
    8800 .nr an-no-space-flag 1
    8801 .nr an-break-flag 1
    8802 .br
    8803 .ps +1
    8804 \fBNote\fR
    8805 .ps -1
    8806 .br
    8807 This option is deprecated, and may be removed in future
    8808 .sp .5v
    8809 .RE
    88109352\fINote\fR
    88119353that the name of the resource being requested is
     
    88169358parameter for details on doing this\&.
    88179359.sp
    8818 See also the section
    8819 NOTE ABOUT USERNAME/PASSWORD VALIDATION\&.
    8820 .sp
    88219360See also the
    88229361\m[blue]\fBpassword server\fR\m[]
     
    88319370Note that this mode does NOT make Samba operate as a Active Directory Domain Controller\&.
    88329371.sp
     9372Note that this forces
     9373\m[blue]\fBrequire strong key = yes\fR\m[]
     9374and
     9375\m[blue]\fBclient schannel = yes\fR\m[]
     9376for the primary domain\&.
     9377.sp
    88339378Read the chapter about Domain Membership in the HOWTO for details\&.
    88349379.sp
    88359380Default:
    8836 \fI\fIsecurity\fR\fR\fI = \fR\fIUSER\fR\fI \fR
     9381\fI\fIsecurity\fR\fR\fI = \fR\fIAUTO\fR\fI \fR
    88379382.sp
    88389383Example:
     
    88409385.RE
    88419386
    8842 send spnego principal (G)
    8843 .\" send spnego principal
    8844 .PP
    8845 .RS 4
    8846 This parameter determines whether or not
     9387security mask (S)
     9388.\" security mask
     9389.PP
     9390.RS 4
     9391This parameter has been removed for Samba 4\&.0\&.0\&.
     9392.sp
     9393\fINo default\fR
     9394.RE
     9395
     9396max protocol
     9397.\" max protocol
     9398.PP
     9399.RS 4
     9400This parameter is a synonym for
     9401server max protocol\&.
     9402.RE
     9403
     9404protocol
     9405.\" protocol
     9406.PP
     9407.RS 4
     9408This parameter is a synonym for
     9409server max protocol\&.
     9410.RE
     9411
     9412server max protocol (G)
     9413.\" server max protocol
     9414.PP
     9415.RS 4
     9416The value of the parameter (a string) is the highest protocol level that will be supported by the server\&.
     9417.sp
     9418Possible values are :
     9419.sp
     9420.RS 4
     9421.ie n \{\
     9422\h'-04'\(bu\h'+03'\c
     9423.\}
     9424.el \{\
     9425.sp -1
     9426.IP \(bu 2.3
     9427.\}
     9428\fBLANMAN1\fR: First
     9429\fImodern\fR
     9430version of the protocol\&. Long filename support\&.
     9431.RE
     9432.sp
     9433.RS 4
     9434.ie n \{\
     9435\h'-04'\(bu\h'+03'\c
     9436.\}
     9437.el \{\
     9438.sp -1
     9439.IP \(bu 2.3
     9440.\}
     9441\fBLANMAN2\fR: Updates to Lanman1 protocol\&.
     9442.RE
     9443.sp
     9444.RS 4
     9445.ie n \{\
     9446\h'-04'\(bu\h'+03'\c
     9447.\}
     9448.el \{\
     9449.sp -1
     9450.IP \(bu 2.3
     9451.\}
     9452\fBNT1\fR: Current up to date version of the protocol\&. Used by Windows NT\&. Known as CIFS\&.
     9453.RE
     9454.sp
     9455.RS 4
     9456.ie n \{\
     9457\h'-04'\(bu\h'+03'\c
     9458.\}
     9459.el \{\
     9460.sp -1
     9461.IP \(bu 2.3
     9462.\}
     9463\fBSMB2\fR: Re\-implementation of the SMB protocol\&. Used by Windows Vista and later versions of Windows\&. SMB2 has sub protocols available\&.
     9464.sp
     9465.RS 4
     9466.ie n \{\
     9467\h'-04'\(bu\h'+03'\c
     9468.\}
     9469.el \{\
     9470.sp -1
     9471.IP \(bu 2.3
     9472.\}
     9473\fBSMB2_02\fR: The earliest SMB2 version\&.
     9474.RE
     9475.sp
     9476.RS 4
     9477.ie n \{\
     9478\h'-04'\(bu\h'+03'\c
     9479.\}
     9480.el \{\
     9481.sp -1
     9482.IP \(bu 2.3
     9483.\}
     9484\fBSMB2_10\fR: Windows 7 SMB2 version\&.
     9485.RE
     9486.sp
     9487.RS 4
     9488.ie n \{\
     9489\h'-04'\(bu\h'+03'\c
     9490.\}
     9491.el \{\
     9492.sp -1
     9493.IP \(bu 2.3
     9494.\}
     9495\fBSMB2_22\fR: Early Windows 8 SMB2 version\&.
     9496.RE
     9497.sp
     9498.RS 4
     9499.ie n \{\
     9500\h'-04'\(bu\h'+03'\c
     9501.\}
     9502.el \{\
     9503.sp -1
     9504.IP \(bu 2.3
     9505.\}
     9506\fBSMB2_24\fR: Windows 8 beta SMB2 version\&.
     9507.RE
     9508.sp
     9509.RE
     9510By default SMB2 selects the SMB2_10 variant\&.
     9511.RE
     9512.sp
     9513.RS 4
     9514.ie n \{\
     9515\h'-04'\(bu\h'+03'\c
     9516.\}
     9517.el \{\
     9518.sp -1
     9519.IP \(bu 2.3
     9520.\}
     9521\fBSMB3\fR: The same as SMB2\&. Used by Windows 8\&. SMB3 has sub protocols available\&.
     9522.sp
     9523.RS 4
     9524.ie n \{\
     9525\h'-04'\(bu\h'+03'\c
     9526.\}
     9527.el \{\
     9528.sp -1
     9529.IP \(bu 2.3
     9530.\}
     9531\fBSMB3_00\fR: Windows 8 SMB3 version\&. (mostly the same as SMB2_24)
     9532.RE
     9533.sp
     9534.RS 4
     9535.ie n \{\
     9536\h'-04'\(bu\h'+03'\c
     9537.\}
     9538.el \{\
     9539.sp -1
     9540.IP \(bu 2.3
     9541.\}
     9542\fBSMB3_02\fR: Windows 8\&.1 SMB3 version\&.
     9543.RE
     9544.sp
     9545.RS 4
     9546.ie n \{\
     9547\h'-04'\(bu\h'+03'\c
     9548.\}
     9549.el \{\
     9550.sp -1
     9551.IP \(bu 2.3
     9552.\}
     9553\fBSMB3_10\fR: early Windows 10 technical preview SMB3 version\&.
     9554.RE
     9555.sp
     9556.RS 4
     9557.ie n \{\
     9558\h'-04'\(bu\h'+03'\c
     9559.\}
     9560.el \{\
     9561.sp -1
     9562.IP \(bu 2.3
     9563.\}
     9564\fBSMB3_11\fR: Windows 10 technical preview SMB3 version (maybe final)\&.
     9565.RE
     9566.sp
     9567.RE
     9568By default SMB3 selects the SMB3_11 variant\&.
     9569.RE
     9570.sp
     9571.RE
     9572Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.
     9573.sp
     9574Default:
     9575\fI\fIserver max protocol\fR\fR\fI = \fR\fISMB3\fR\fI \fR
     9576.sp
     9577Example:
     9578\fI\fIserver max protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR
     9579.RE
     9580
     9581min protocol
     9582.\" min protocol
     9583.PP
     9584.RS 4
     9585This parameter is a synonym for
     9586server min protocol\&.
     9587.RE
     9588
     9589server min protocol (G)
     9590.\" server min protocol
     9591.PP
     9592.RS 4
     9593This setting controls the minimum protocol version that the server will allow the client to use\&.
     9594.sp
     9595Normally this option should not be set as the automatic negotiation phase in the SMB protocol takes care of choosing the appropriate protocol\&.
     9596.sp
     9597See
     9598Related command: \m[blue]\fBserver max protocol\fR\m[]
     9599for a full list of available protocols\&.
     9600.sp
     9601Default:
     9602\fI\fIserver min protocol\fR\fR\fI = \fR\fILANMAN1\fR\fI \fR
     9603.sp
     9604Example:
     9605\fI\fIserver min protocol\fR\fR\fI = \fR\fINT1\fR\fI \fR
     9606.RE
     9607
     9608server multi channel support (G)
     9609.\" server multi channel support
     9610.PP
     9611.RS 4
     9612This boolean parameter controls whether
    88479613\fBsmbd\fR(8)
    8848 will send the server\-supplied principal sometimes given in the SPNEGO exchange\&.
    8849 .sp
    8850 If enabled, Samba can attempt to help clients to use Kerberos to contact it, even when known only by IP address or a name not registered with our KDC as a service principal name\&. Kerberos relies on names, so ordinarily cannot function in this situation\&.
    8851 .sp
    8852 If disabled, Samba will send the string not_defined_in_RFC4178@please_ignore as the \*(Aqrfc4178 hint\*(Aq, following the updated RFC and Windows 2008 behaviour in this area\&.
    8853 .sp
    8854 Note that Windows XP SP2 and later versions already ignored this value in all circumstances\&.
    8855 .sp
    8856 Default:
    8857 \fI\fIsend spnego principal\fR\fR\fI = \fR\fIno\fR\fI \fR
     9614will support SMB3 multi\-channel\&.
     9615.sp
     9616This parameter has been added with version 4\&.4\&.
     9617.sp
     9618Warning: Note that this feature is considered experimental in Samba 4\&.4\&. Use it at your own risk: Even though it may seem to work well in testing, it may result in data corruption under some race conditions\&. Future 4\&.4\&.x release may improve this situation\&.
     9619.sp
     9620Default:
     9621\fI\fIserver multi channel support\fR\fR\fI = \fR\fIno\fR\fI \fR
     9622.RE
     9623
     9624server role (G)
     9625.\" server role
     9626.PP
     9627.RS 4
     9628This option determines the basic operating mode of a Samba server and is one of the most important settings in the
     9629smb\&.conf
     9630file\&.
     9631.sp
     9632The default is
     9633server role = auto, as causes Samba to operate according to the
     9634\m[blue]\fBsecurity\fR\m[]
     9635setting, or if not specified as a simple file server that is not connected to any domain\&.
     9636.sp
     9637The alternatives are
     9638server role = standalone
     9639or
     9640server role = member server, which support joining Samba to a Windows domain, along with
     9641server role = domain controller, which run Samba as a Windows domain controller\&.
     9642.sp
     9643You should use
     9644server role = standalone
     9645and
     9646\m[blue]\fBmap to guest\fR\m[]
     9647if you want to mainly setup shares without a password (guest shares)\&. This is commonly used for a shared printer server\&.
     9648.sp
     9649\fISERVER ROLE = AUTO\fR
     9650.sp
     9651This is the default server role in Samba, and causes Samba to consult the
     9652\m[blue]\fBsecurity\fR\m[]
     9653parameter (if set) to determine the server role, giving compatible behaviours to previous Samba versions\&.
     9654.sp
     9655\fISERVER ROLE = STANDALONE\fR
     9656.sp
     9657If
     9658\m[blue]\fBsecurity\fR\m[]
     9659is also not specified, this is the default security setting in Samba\&. In standalone operation, a client must first "log\-on" with a valid username and password (which can be mapped using the
     9660\m[blue]\fBusername map\fR\m[]
     9661parameter) stored on this machine\&. Encrypted passwords (see the
     9662\m[blue]\fBencrypted passwords\fR\m[]
     9663parameter) are by default used in this security mode\&. Parameters such as
     9664\m[blue]\fBuser\fR\m[]
     9665and
     9666\m[blue]\fBguest only\fR\m[]
     9667if set are then applied and may change the UNIX user to use on this connection, but only after the user has been successfully authenticated\&.
     9668.sp
     9669\fISERVER ROLE = MEMBER SERVER\fR
     9670.sp
     9671This mode will only work correctly if
     9672\fBnet\fR(8)
     9673has been used to add this machine into a Windows Domain\&. It expects the
     9674\m[blue]\fBencrypted passwords\fR\m[]
     9675parameter to be set to
     9676\fByes\fR\&. In this mode Samba will try to validate the username/password by passing it to a Windows or Samba Domain Controller, in exactly the same way that a Windows Server would do\&.
     9677.sp
     9678\fINote\fR
     9679that a valid UNIX user must still exist as well as the account on the Domain Controller to allow Samba to have a valid UNIX account to map file access to\&. Winbind can provide this\&.
     9680.sp
     9681\fISERVER ROLE = CLASSIC PRIMARY DOMAIN CONTROLLER\fR
     9682.sp
     9683This mode of operation runs a classic Samba primary domain controller, providing domain logon services to Windows and Samba clients of an NT4\-like domain\&. Clients must be joined to the domain to create a secure, trusted path across the network\&. There must be only one PDC per NetBIOS scope (typcially a broadcast network or clients served by a single WINS server)\&.
     9684.sp
     9685\fISERVER ROLE = CLASSIC BACKUP DOMAIN CONTROLLER\fR
     9686.sp
     9687This mode of operation runs a classic Samba backup domain controller, providing domain logon services to Windows and Samba clients of an NT4\-like domain\&. As a BDC, this allows multiple Samba servers to provide redundant logon services to a single NetBIOS scope\&.
     9688.sp
     9689\fISERVER ROLE = ACTIVE DIRECTORY DOMAIN CONTROLLER\fR
     9690.sp
     9691This mode of operation runs Samba as an active directory domain controller, providing domain logon services to Windows and Samba clients of the domain\&. This role requires special configuration, see the
     9692Samba4 HOWTO
     9693.sp
     9694Default:
     9695\fI\fIserver role\fR\fR\fI = \fR\fIAUTO\fR\fI \fR
     9696.sp
     9697Example:
     9698\fI\fIserver role\fR\fR\fI = \fR\fIACTIVE DIRECTORY DOMAIN CONTROLLER\fR\fI \fR
    88589699.RE
    88599700
     
    88829723.RE
    88839724
     9725server services (G)
     9726.\" server services
     9727.PP
     9728.RS 4
     9729This option contains the services that the Samba daemon will run\&.
     9730.sp
     9731An entry in the
     9732smb\&.conf
     9733file can either override the previous value completely or entries can be removed from or added to it by prefixing them with
     9734\fB+\fR
     9735or
     9736\fB\-\fR\&.
     9737.sp
     9738Default:
     9739\fI\fIserver services\fR\fR\fI = \fR\fIs3fs, rpc, nbt, wrepl, ldap, cldap, kdc, drepl, winbindd, ntp_signd, kcc, dnsupdate, dns\fR\fI \fR
     9740.sp
     9741Example:
     9742\fI\fIserver services\fR\fR\fI = \fR\fI\-s3fs, +smb\fR\fI \fR
     9743.RE
     9744
    88849745server signing (G)
    88859746.\" server signing
     
    88879748.RS 4
    88889749This controls whether the client is allowed or required to use SMB1 and SMB2 signing\&. Possible values are
     9750\fIdefault\fR,
    88899751\fIauto\fR,
    88909752\fImandatory\fR
    88919753and
    88929754\fIdisabled\fR\&.
     9755.sp
     9756By default, and when smb signing is set to
     9757\fIdefault\fR, smb signing is required when
     9758\m[blue]\fBserver role\fR\m[]
     9759is
     9760\fIactive directory domain controller\fR
     9761and disabled otherwise\&.
    88939762.sp
    88949763When set to auto, SMB1 signing is offered, but not enforced\&. When set to mandatory, SMB1 signing is required and if set to disabled, SMB signing is not offered either\&.
     
    89019770.sp
    89029771Default:
    8903 \fI\fIserver signing\fR\fR\fI = \fR\fIDisabled\fR\fI \fR
     9772\fI\fIserver signing\fR\fR\fI = \fR\fIdefault\fR\fI \fR
    89049773.RE
    89059774
     
    89289797.RE
    89299798
    8930 set directory (S)
    8931 .\" set directory
    8932 .PP
    8933 .RS 4
    8934 If
    8935 set directory = no, then users of the service may not use the setdir command to change directory\&.
    8936 .sp
    8937 The
    8938 setdir
    8939 command is only implemented in the Digital Pathworks client\&. See the Pathworks documentation for details\&.
    8940 .sp
    8941 Default:
    8942 \fI\fIset directory\fR\fR\fI = \fR\fIno\fR\fI \fR
    8943 .RE
    8944 
    89459799set primary group script (G)
    89469800.\" set primary group script
    89479801.PP
    89489802.RS 4
    8949 Thanks to the Posix subsystem in NT a Windows User has a primary group in addition to the auxiliary groups\&. This script sets the primary group in the unix userdatase when an administrator sets the primary group from the windows user manager or when fetching a SAM with
     9803Thanks to the Posix subsystem in NT a Windows User has a primary group in addition to the auxiliary groups\&. This script sets the primary group in the unix user database when an administrator sets the primary group from the windows user manager or when fetching a SAM with
    89509804net rpc vampire\&.
    89519805\fI%u\fR
     
    89699823should only be used whenever there is no operating system API available from the OS that samba can use\&.
    89709824.sp
    8971 This option is only available if Samba was configured with the argument
    8972 \-\-with\-sys\-quotas
    8973 or on linux when
    8974 \&./configure \-\-with\-quotas
    8975 was used and a working quota api was found in the system\&. Most packages are configured with these options already\&.
     9825This option is only available if Samba was compiled with quota support\&.
    89769826.sp
    89779827This parameter should specify the path to a script that can set quota for the specified arguments\&.
     
    89879837.IP \(bu 2.3
    89889838.\}
    8989 1 \- quota type
     98391 \- path to where the quota needs to be set\&. This needs to be interpreted relative to the current working directory that the script may also check for\&.
     9840.RE
     9841.sp
     9842.RS 4
     9843.ie n \{\
     9844\h'-04'\(bu\h'+03'\c
     9845.\}
     9846.el \{\
     9847.sp -1
     9848.IP \(bu 2.3
     9849.\}
     98502 \- quota type
    89909851.sp
    89919852.RS 4
     
    90449905.IP \(bu 2.3
    90459906.\}
    9046 2 \- id (uid for user, gid for group, \-1 if N/A)
    9047 .RE
    9048 .sp
    9049 .RS 4
    9050 .ie n \{\
    9051 \h'-04'\(bu\h'+03'\c
    9052 .\}
    9053 .el \{\
    9054 .sp -1
    9055 .IP \(bu 2.3
    9056 .\}
    9057 3 \- quota state (0 = disable, 1 = enable, 2 = enable and enforce)
    9058 .RE
    9059 .sp
    9060 .RS 4
    9061 .ie n \{\
    9062 \h'-04'\(bu\h'+03'\c
    9063 .\}
    9064 .el \{\
    9065 .sp -1
    9066 .IP \(bu 2.3
    9067 .\}
    9068 4 \- block softlimit
    9069 .RE
    9070 .sp
    9071 .RS 4
    9072 .ie n \{\
    9073 \h'-04'\(bu\h'+03'\c
    9074 .\}
    9075 .el \{\
    9076 .sp -1
    9077 .IP \(bu 2.3
    9078 .\}
    9079 5 \- block hardlimit
    9080 .RE
    9081 .sp
    9082 .RS 4
    9083 .ie n \{\
    9084 \h'-04'\(bu\h'+03'\c
    9085 .\}
    9086 .el \{\
    9087 .sp -1
    9088 .IP \(bu 2.3
    9089 .\}
    9090 6 \- inode softlimit
    9091 .RE
    9092 .sp
    9093 .RS 4
    9094 .ie n \{\
    9095 \h'-04'\(bu\h'+03'\c
    9096 .\}
    9097 .el \{\
    9098 .sp -1
    9099 .IP \(bu 2.3
    9100 .\}
    9101 7 \- inode hardlimit
    9102 .RE
    9103 .sp
    9104 .RS 4
    9105 .ie n \{\
    9106 \h'-04'\(bu\h'+03'\c
    9107 .\}
    9108 .el \{\
    9109 .sp -1
    9110 .IP \(bu 2.3
    9111 .\}
    9112 8(optional) \- block size, defaults to 1024
     99073 \- id (uid for user, gid for group, \-1 if N/A)
     9908.RE
     9909.sp
     9910.RS 4
     9911.ie n \{\
     9912\h'-04'\(bu\h'+03'\c
     9913.\}
     9914.el \{\
     9915.sp -1
     9916.IP \(bu 2.3
     9917.\}
     99184 \- quota state (0 = disable, 1 = enable, 2 = enable and enforce)
     9919.RE
     9920.sp
     9921.RS 4
     9922.ie n \{\
     9923\h'-04'\(bu\h'+03'\c
     9924.\}
     9925.el \{\
     9926.sp -1
     9927.IP \(bu 2.3
     9928.\}
     99295 \- block softlimit
     9930.RE
     9931.sp
     9932.RS 4
     9933.ie n \{\
     9934\h'-04'\(bu\h'+03'\c
     9935.\}
     9936.el \{\
     9937.sp -1
     9938.IP \(bu 2.3
     9939.\}
     99406 \- block hardlimit
     9941.RE
     9942.sp
     9943.RS 4
     9944.ie n \{\
     9945\h'-04'\(bu\h'+03'\c
     9946.\}
     9947.el \{\
     9948.sp -1
     9949.IP \(bu 2.3
     9950.\}
     99517 \- inode softlimit
     9952.RE
     9953.sp
     9954.RS 4
     9955.ie n \{\
     9956\h'-04'\(bu\h'+03'\c
     9957.\}
     9958.el \{\
     9959.sp -1
     9960.IP \(bu 2.3
     9961.\}
     99628 \- inode hardlimit
     9963.RE
     9964.sp
     9965.RS 4
     9966.ie n \{\
     9967\h'-04'\(bu\h'+03'\c
     9968.\}
     9969.el \{\
     9970.sp -1
     9971.IP \(bu 2.3
     9972.\}
     99739(optional) \- block size, defaults to 1024
    91139974.RE
    91149975.sp
     
    91219982Example:
    91229983\fI\fIset quota command\fR\fR\fI = \fR\fI/usr/local/sbin/set_quota\fR\fI \fR
     9984.RE
     9985
     9986share backend (G)
     9987.\" share backend
     9988.PP
     9989.RS 4
     9990This option specifies the backend that will be used to access the configuration of file shares\&.
     9991.sp
     9992Traditionally, Samba file shares have been configured in the
     9993\fBsmb\&.conf\fR
     9994file and this is still the default\&.
     9995.sp
     9996At the moment there are no other supported backends\&.
     9997.sp
     9998Default:
     9999\fI\fIshare backend\fR\fR\fI = \fR\fIclassic\fR\fI \fR
    912310000.RE
    912410001
     
    913310010Default:
    913410011\fI\fIshare:fake_fscaps\fR\fR\fI = \fR\fI0\fR\fI \fR
    9135 .RE
    9136 
    9137 share modes (S)
    9138 .\" share modes
    9139 .PP
    9140 .RS 4
    9141 This enables or disables the honoring of the
    9142 \fIshare modes\fR
    9143 during a file open\&. These modes are used by clients to gain exclusive read or write access to a file\&.
    9144 .sp
    9145 This is a deprecated option from old versions of Samba, and will be removed in the next major release\&.
    9146 .sp
    9147 These open modes are not directly supported by UNIX, so they are simulated using shared memory\&.
    9148 .sp
    9149 The share modes that are enabled by this option are the standard Windows share modes\&.
    9150 .sp
    9151 This option gives full share compatibility and is enabled by default\&.
    9152 .sp
    9153 You should
    9154 \fINEVER\fR
    9155 turn this parameter off as many Windows applications will break if you do so\&.
    9156 .sp
    9157 Default:
    9158 \fI\fIshare modes\fR\fR\fI = \fR\fIyes\fR\fI \fR
    915910012.RE
    916010013
     
    918110034With the introduction of MS\-RPC based printing support for Windows NT/2000 client in Samba 2\&.2, a "Printers\&.\&.\&." folder will appear on Samba hosts in the share listing\&. Normally this folder will contain an icon for the MS Add Printer Wizard (APW)\&. However, it is possible to disable this feature regardless of the level of privilege of the connected user\&.
    918210035.sp
    9183 Under normal circumstances, the Windows NT/2000 client will open a handle on the printer server with OpenPrinterEx() asking for Administrator privileges\&. If the user does not have administrative access on the print server (i\&.e is not root or a member of the
    9184 \fIprinter admin\fR
    9185 group), the OpenPrinterEx() call fails and the client makes another open call with a request for a lower privilege level\&. This should succeed, however the APW icon will not be displayed\&.
     10036Under normal circumstances, the Windows NT/2000 client will open a handle on the printer server with OpenPrinterEx() asking for Administrator privileges\&. If the user does not have administrative access on the print server (i\&.e is not root or has granted the SePrintOperatorPrivilege), the OpenPrinterEx() call fails and the client makes another open call with a request for a lower privilege level\&. This should succeed, however the APW icon will not be displayed\&.
    918610037.sp
    918710038Disabling the
     
    921510066that should start a shutdown procedure\&.
    921610067.sp
    9217 If the connected user posseses the
     10068If the connected user possesses the
    921810069\fBSeRemoteShutdownPrivilege\fR, right, this command will be run as root\&.
    921910070.sp
     
    929910150.RE
    930010151
     10152smb2 leases (G)
     10153.\" smb2 leases
     10154.PP
     10155.RS 4
     10156This boolean option tells
     10157smbd
     10158whether to globally negotiate SMB2 leases on file open requests\&. Leasing is an SMB2\-only feature which allows clients to aggressively cache files locally above and beyond the caching allowed by SMB1 oplocks\&. This (experimental) parameter is set to off by default until the SMB2 leasing code is declared fully stable\&.
     10159.sp
     10160This is only available with
     10161\m[blue]\fBoplocks = yes\fR\m[]
     10162and
     10163\m[blue]\fBkernel oplocks = no\fR\m[]\&.
     10164.sp
     10165Note that the write cache won\*(Aqt be used for file handles with a smb2 write lease\&.
     10166.sp
     10167The Samba implementation of leases is currently marked as experimental!
     10168.sp
     10169Default:
     10170\fI\fIsmb2 leases\fR\fR\fI = \fR\fIno\fR\fI \fR
     10171.RE
     10172
    930110173smb2 max credits (G)
    930210174.\" smb2 max credits
     
    932110193will return to a client, informing the client of the largest size that may be returned by a single SMB2 read call\&.
    932210194.sp
    9323 The maximum is 65536 bytes (64KB), which is the same as a Windows Vista SMB2 server\&.
    9324 .sp
    9325 Default:
    9326 \fI\fIsmb2 max read\fR\fR\fI = \fR\fI65536\fR\fI \fR
     10195The maximum is 8388608 bytes (8MiB), which is the same as a Windows Server 2012 r2\&.
     10196.sp
     10197Please note that the default is 8MiB, but it\*(Aqs limit is based on the smb2 dialect (64KiB for SMB == 2\&.0, 8MiB for SMB >= 2\&.1 with LargeMTU)\&. Large MTU is not supported over NBT (tcp port 139)\&.
     10198.sp
     10199Default:
     10200\fI\fIsmb2 max read\fR\fR\fI = \fR\fI8388608\fR\fI \fR
    932710201.RE
    932810202
     
    933510209will return to a client, informing the client of the largest size of buffer that may be used in querying file meta\-data via QUERY_INFO and related SMB2 calls\&.
    933610210.sp
    9337 The maximum is 65536 bytes (64KB), which is the same as a Windows Vista SMB2 server\&.
    9338 .sp
    9339 Default:
    9340 \fI\fIsmb2 max trans\fR\fR\fI = \fR\fI65536\fR\fI \fR
     10211The maximum is 8388608 bytes (8MiB), which is the same as a Windows Server 2012 r2\&.
     10212.sp
     10213Please note that the default is 8MiB, but it\*(Aqs limit is based on the smb2 dialect (64KiB for SMB == 2\&.0, 1MiB for SMB >= 2\&.1 with LargeMTU)\&. Large MTU is not supported over NBT (tcp port 139)\&.
     10214.sp
     10215Default:
     10216\fI\fIsmb2 max trans\fR\fR\fI = \fR\fI8388608\fR\fI \fR
    934110217.RE
    934210218
     
    934910225will return to a client, informing the client of the largest size that may be sent to the server by a single SMB2 write call\&.
    935010226.sp
    9351 The maximum is 65536 bytes (64KB), which is the same as a Windows Vista SMB2 server\&.
    9352 .sp
    9353 Default:
    9354 \fI\fIsmb2 max write\fR\fR\fI = \fR\fI65536\fR\fI \fR
     10227The maximum is 8388608 bytes (8MiB), which is the same as a Windows Server 2012 r2\&.
     10228.sp
     10229Please note that the default is 8MiB, but it\*(Aqs limit is based on the smb2 dialect (64KiB for SMB == 2\&.0, 8MiB for SMB => 2\&.1 with LargeMTU)\&. Large MTU is not supported over NBT (tcp port 139)\&.
     10230.sp
     10231Default:
     10232\fI\fIsmb2 max write\fR\fR\fI = \fR\fI8388608\fR\fI \fR
     10233.RE
     10234
     10235smbd profiling level (G)
     10236.\" smbd profiling level
     10237.PP
     10238.RS 4
     10239This parameter allows the administrator to enable profiling support\&.
     10240.sp
     10241Possible values are
     10242\fBoff\fR,
     10243\fBcount\fR
     10244and
     10245\fBon\fR\&.
     10246.sp
     10247Default:
     10248\fI\fIsmbd profiling level\fR\fR\fI = \fR\fIoff\fR\fI \fR
     10249.sp
     10250Example:
     10251\fI\fIsmbd profiling level\fR\fR\fI = \fR\fIon\fR\fI \fR
    935510252.RE
    935610253
     
    935910256.PP
    936010257.RS 4
    9361 This is a new feature introduced with Samba 3\&.2 and above\&. It is an extension to the SMB/CIFS protocol negotiated as part of the UNIX extensions\&. SMB encryption uses the GSSAPI (SSPI on Windows) ability to encrypt and sign every request/response in a SMB protocol stream\&. When enabled it provides a secure method of SMB/CIFS communication, similar to an ssh protected session, but using SMB/CIFS authentication to negotiate encryption and signing keys\&. Currently this is only supported by Samba 3\&.2 smbclient, and hopefully soon Linux CIFSFS and MacOS/X clients\&. Windows clients do not support this feature\&.
    9362 .sp
    9363 This controls whether the remote client is allowed or required to use SMB encryption\&. Possible values are
    9364 \fIauto\fR,
    9365 \fImandatory\fR
    9366 and
    9367 \fIdisabled\fR\&. This may be set on a per\-share basis, but clients may chose to encrypt the entire session, not just traffic to a specific share\&. If this is set to mandatory then all traffic to a share
     10258This parameter controls whether a remote client is allowed or required to use SMB encryption\&. It has different effects depending on whether the connection uses SMB1 or SMB2 and newer:
     10259.sp
     10260.RS 4
     10261.ie n \{\
     10262\h'-04'\(bu\h'+03'\c
     10263.\}
     10264.el \{\
     10265.sp -1
     10266.IP \(bu 2.3
     10267.\}
     10268If the connection uses SMB1, then this option controls the use of a Samba\-specific extension to the SMB protocol introduced in Samba 3\&.2 that makes use of the Unix extensions\&.
     10269.RE
     10270.sp
     10271.RS 4
     10272.ie n \{\
     10273\h'-04'\(bu\h'+03'\c
     10274.\}
     10275.el \{\
     10276.sp -1
     10277.IP \(bu 2.3
     10278.\}
     10279If the connection uses SMB2 or newer, then this option controls the use of the SMB\-level encryption that is supported in SMB version 3\&.0 and above and available in Windows 8 and newer\&.
     10280.RE
     10281.sp
     10282.RE
     10283This parameter can be set globally and on a per\-share bases\&. Possible values are
     10284\fIoff\fR
     10285(or
     10286\fIdisabled\fR),
     10287\fIenabled\fR
     10288(or
     10289\fIauto\fR, or
     10290\fIif_required\fR),
     10291\fIdesired\fR, and
     10292\fIrequired\fR
     10293(or
     10294\fImandatory\fR)\&. A special value is
     10295\fIdefault\fR
     10296which is the implicit default setting of
     10297\fIenabled\fR\&.
     10298.PP
     10299\fIEffects for SMB1\fR
     10300.RS 4
     10301The Samba\-specific encryption of SMB1 connections is an extension to the SMB protocol negotiated as part of the UNIX extensions\&. SMB encryption uses the GSSAPI (SSPI on Windows) ability to encrypt and sign every request/response in a SMB protocol stream\&. When enabled it provides a secure method of SMB/CIFS communication, similar to an ssh protected session, but using SMB/CIFS authentication to negotiate encryption and signing keys\&. Currently this is only supported smbclient of by Samba 3\&.2 and newer, and hopefully soon Linux CIFSFS and MacOS/X clients\&. Windows clients do not support this feature\&.
     10302.sp
     10303This may be set on a per\-share basis, but clients may chose to encrypt the entire session, not just traffic to a specific share\&. If this is set to mandatory then all traffic to a share
    936810304\fImust\fR
    9369 must be encrypted once the connection has been made to the share\&. The server would return "access denied" to all non\-encrypted requests on such a share\&. Selecting encrypted traffic reduces throughput as smaller packet sizes must be used (no huge UNIX style read/writes allowed) as well as the overhead of encrypting and signing all the data\&.
     10305be encrypted once the connection has been made to the share\&. The server would return "access denied" to all non\-encrypted requests on such a share\&. Selecting encrypted traffic reduces throughput as smaller packet sizes must be used (no huge UNIX style read/writes allowed) as well as the overhead of encrypting and signing all the data\&.
    937010306.sp
    937110307If SMB encryption is selected, Windows style SMB signing (see the
     
    937310309option) is no longer necessary, as the GSSAPI flags use select both signing and sealing of the data\&.
    937410310.sp
    9375 When set to auto, SMB encryption is offered, but not enforced\&. When set to mandatory, SMB encryption is required and if set to disabled, SMB encryption can not be negotiated\&.
    9376 .sp
    9377 Default:
    9378 \fI\fIsmb encrypt\fR\fR\fI = \fR\fIauto\fR\fI \fR
     10311When set to auto or default, SMB encryption is offered, but not enforced\&. When set to mandatory, SMB encryption is required and if set to disabled, SMB encryption can not be negotiated\&.
     10312.RE
     10313.PP
     10314\fIEffects for SMB2\fR
     10315.RS 4
     10316Native SMB transport encryption is available in SMB version 3\&.0 or newer\&. It is only offered by Samba if
     10317\fIserver max protocol\fR
     10318is set to
     10319\fISMB3\fR
     10320or newer\&. Clients supporting this type of encryption include Windows 8 and newer, Windows server 2012 and newer, and smbclient of Samba 4\&.1 and newer\&.
     10321.sp
     10322The protocol implementation offers various options:
     10323.sp
     10324.RS 4
     10325.ie n \{\
     10326\h'-04'\(bu\h'+03'\c
     10327.\}
     10328.el \{\
     10329.sp -1
     10330.IP \(bu 2.3
     10331.\}
     10332The capability to perform SMB encryption can be negotiated during protocol negotiation\&.
     10333.RE
     10334.sp
     10335.RS 4
     10336.ie n \{\
     10337\h'-04'\(bu\h'+03'\c
     10338.\}
     10339.el \{\
     10340.sp -1
     10341.IP \(bu 2.3
     10342.\}
     10343Data encryption can be enabled globally\&. In that case, an encryption\-capable connection will have all traffic in all its sessions encrypted\&. In particular all share connections will be encrypted\&.
     10344.RE
     10345.sp
     10346.RS 4
     10347.ie n \{\
     10348\h'-04'\(bu\h'+03'\c
     10349.\}
     10350.el \{\
     10351.sp -1
     10352.IP \(bu 2.3
     10353.\}
     10354Data encryption can also be enabled per share if not enabled globally\&. For an encryption\-capable connection, all connections to an encryption\-enabled share will be encrypted\&.
     10355.RE
     10356.sp
     10357.RS 4
     10358.ie n \{\
     10359\h'-04'\(bu\h'+03'\c
     10360.\}
     10361.el \{\
     10362.sp -1
     10363.IP \(bu 2.3
     10364.\}
     10365Encryption can be enforced\&. This means that session setups will be denied on non\-encryption\-capable connections if data encryption has been enabled globally\&. And tree connections will be denied for non\-encryption capable connections to shares with data encryption enabled\&.
     10366.RE
     10367.sp
     10368.RE
     10369These features can be controlled with settings of
     10370\fIsmb encrypt\fR
     10371as follows:
     10372.sp
     10373.RS 4
     10374.ie n \{\
     10375\h'-04'\(bu\h'+03'\c
     10376.\}
     10377.el \{\
     10378.sp -1
     10379.IP \(bu 2.3
     10380.\}
     10381Leaving it as default, explicitly setting
     10382\fIdefault\fR, or setting it to
     10383\fIenabled\fR
     10384globally will enable negotiation of encryption but will not turn on data encryption globally or per share\&.
     10385.RE
     10386.sp
     10387.RS 4
     10388.ie n \{\
     10389\h'-04'\(bu\h'+03'\c
     10390.\}
     10391.el \{\
     10392.sp -1
     10393.IP \(bu 2.3
     10394.\}
     10395Setting it to
     10396\fIdesired\fR
     10397globally will enable negotiation and will turn on data encryption on sessions and share connections for those clients that support it\&.
     10398.RE
     10399.sp
     10400.RS 4
     10401.ie n \{\
     10402\h'-04'\(bu\h'+03'\c
     10403.\}
     10404.el \{\
     10405.sp -1
     10406.IP \(bu 2.3
     10407.\}
     10408Setting it to
     10409\fIrequired\fR
     10410globally will enable negotiation and turn on data encryption on sessions and share connections\&. Clients that do not support encryption will be denied access to the server\&.
     10411.RE
     10412.sp
     10413.RS 4
     10414.ie n \{\
     10415\h'-04'\(bu\h'+03'\c
     10416.\}
     10417.el \{\
     10418.sp -1
     10419.IP \(bu 2.3
     10420.\}
     10421Setting it to
     10422\fIoff\fR
     10423globally will completely disable the encryption feature\&.
     10424.RE
     10425.sp
     10426.RS 4
     10427.ie n \{\
     10428\h'-04'\(bu\h'+03'\c
     10429.\}
     10430.el \{\
     10431.sp -1
     10432.IP \(bu 2.3
     10433.\}
     10434Setting it to
     10435\fIdesired\fR
     10436on a share will turn on data encryption for this share for clients that support encryption if negotiation has been enabled globally\&.
     10437.RE
     10438.sp
     10439.RS 4
     10440.ie n \{\
     10441\h'-04'\(bu\h'+03'\c
     10442.\}
     10443.el \{\
     10444.sp -1
     10445.IP \(bu 2.3
     10446.\}
     10447Setting it to
     10448\fIrequired\fR
     10449on a share will enforce data encryption for this share if negotiation has been enabled globally\&. I\&.e\&. clients that do not support encryption will be denied access to the share\&.
     10450.sp
     10451Note that this allows per\-share enforcing to be controlled in Samba differently from Windows: In Windows,
     10452\fIRejectUnencryptedAccess\fR
     10453is a global setting, and if it is set, all shares with data encryption turned on are automatically enforcing encryption\&. In order to achieve the same effect in Samba, one has to globally set
     10454\fIsmb encrypt\fR
     10455to
     10456\fIenabled\fR, and then set all shares that should be encrypted to
     10457\fIrequired\fR\&. Additionally, it is possible in Samba to have some shares with encryption
     10458\fIrequired\fR
     10459and some other shares with encryption only
     10460\fIdesired\fR, which is not possible in Windows\&.
     10461.RE
     10462.sp
     10463.RS 4
     10464.ie n \{\
     10465\h'-04'\(bu\h'+03'\c
     10466.\}
     10467.el \{\
     10468.sp -1
     10469.IP \(bu 2.3
     10470.\}
     10471Setting it to
     10472\fIoff\fR
     10473or
     10474\fIenabled\fR
     10475for a share has no effect\&.
     10476.RE
     10477.sp
     10478.RE
     10479.RE
     10480.sp
     10481Default:
     10482\fI\fIsmb encrypt\fR\fR\fI = \fR\fIdefault\fR\fI \fR
    937910483.RE
    938010484
     
    941110515.RE
    941210516
    9413 socket address (G)
    9414 .\" socket address
    9415 .PP
    9416 .RS 4
    9417 This option allows you to control what address Samba will listen for connections on\&. This is used to support multiple virtual interfaces on the one server, each with a different configuration\&.
    9418 .sp
    9419 Setting this option should never be necessary on usual Samba servers running only one nmbd\&.
    9420 .sp
    9421 By default Samba will accept connections on any address\&.
    9422 .sp
    9423 Default:
    9424 \fI\fIsocket address\fR\fR\fI = \fR\fI\fR\fI \fR
    9425 .sp
    9426 Example:
    9427 \fI\fIsocket address\fR\fR\fI = \fR\fI192\&.168\&.2\&.20\fR\fI \fR
    9428 .RE
    9429 
    943010517socket options (G)
    943110518.\" socket options
    943210519.PP
    943310520.RS 4
     10521.if n \{\
     10522.sp
     10523.\}
     10524.RS 4
     10525.it 1 an-trap
     10526.nr an-no-space-flag 1
     10527.nr an-break-flag 1
     10528.br
     10529.ps +1
     10530\fBWarning\fR
     10531.ps -1
     10532.br
     10533Modern server operating systems are tuned for high network performance in the majority of situations; when you set socket options you are overriding those settings\&. Linux in particular has an auto\-tuning mechanism for buffer sizes that will be disabled if you specify a socket buffer size\&. This can potentially cripple your TCP/IP stack\&.
     10534.sp
     10535Getting the socket options correct can make a big difference to your performance, but getting them wrong can degrade it by just as much\&. As with any other low level setting, if you must make changes to it, make small changes and
     10536\fItest\fR
     10537the effect before making any large changes\&.
     10538.sp .5v
     10539.RE
     10540.sp
    943410541This option allows you to set socket options to be used when talking with the client\&.
    943510542.sp
     
    944110548.sp
    944210549You may find that on some systems Samba will say "Unknown socket option" when you supply an option\&. This means you either incorrectly typed it or you need to add an include file to includes\&.h for your OS\&. If the latter is the case please send the patch to
    9443 samba\-technical@samba\&.org\&.
     10550samba\-technical@lists\&.samba\&.org\&.
    944410551.sp
    944510552Any of the supported socket options may be combined in any way you like, as long as your OS allows it\&.
     
    949910606.IP \(bu 2.3
    950010607.\}
     10608TCP_KEEPCNT *
     10609.RE
     10610.sp
     10611.RS 4
     10612.ie n \{\
     10613\h'-04'\(bu\h'+03'\c
     10614.\}
     10615.el \{\
     10616.sp -1
     10617.IP \(bu 2.3
     10618.\}
     10619TCP_KEEPIDLE *
     10620.RE
     10621.sp
     10622.RS 4
     10623.ie n \{\
     10624\h'-04'\(bu\h'+03'\c
     10625.\}
     10626.el \{\
     10627.sp -1
     10628.IP \(bu 2.3
     10629.\}
     10630TCP_KEEPINTVL *
     10631.RE
     10632.sp
     10633.RS 4
     10634.ie n \{\
     10635\h'-04'\(bu\h'+03'\c
     10636.\}
     10637.el \{\
     10638.sp -1
     10639.IP \(bu 2.3
     10640.\}
    950110641IPTOS_LOWDELAY
    950210642.RE
     
    952110661.IP \(bu 2.3
    952210662.\}
     10663SO_REUSEPORT
     10664.RE
     10665.sp
     10666.RS 4
     10667.ie n \{\
     10668\h'-04'\(bu\h'+03'\c
     10669.\}
     10670.el \{\
     10671.sp -1
     10672.IP \(bu 2.3
     10673.\}
    952310674SO_SNDBUF *
    952410675.RE
     
    955510706.\}
    955610707SO_RCVLOWAT *
     10708.RE
     10709.sp
     10710.RS 4
     10711.ie n \{\
     10712\h'-04'\(bu\h'+03'\c
     10713.\}
     10714.el \{\
     10715.sp -1
     10716.IP \(bu 2.3
     10717.\}
     10718SO_SNDTIMEO *
     10719.RE
     10720.sp
     10721.RS 4
     10722.ie n \{\
     10723\h'-04'\(bu\h'+03'\c
     10724.\}
     10725.el \{\
     10726.sp -1
     10727.IP \(bu 2.3
     10728.\}
     10729SO_RCVTIMEO *
     10730.RE
     10731.sp
     10732.RS 4
     10733.ie n \{\
     10734\h'-04'\(bu\h'+03'\c
     10735.\}
     10736.el \{\
     10737.sp -1
     10738.IP \(bu 2.3
     10739.\}
     10740TCP_FASTACK *
     10741.RE
     10742.sp
     10743.RS 4
     10744.ie n \{\
     10745\h'-04'\(bu\h'+03'\c
     10746.\}
     10747.el \{\
     10748.sp -1
     10749.IP \(bu 2.3
     10750.\}
     10751TCP_QUICKACK
     10752.RE
     10753.sp
     10754.RS 4
     10755.ie n \{\
     10756\h'-04'\(bu\h'+03'\c
     10757.\}
     10758.el \{\
     10759.sp -1
     10760.IP \(bu 2.3
     10761.\}
     10762TCP_NODELAYACK
     10763.RE
     10764.sp
     10765.RS 4
     10766.ie n \{\
     10767\h'-04'\(bu\h'+03'\c
     10768.\}
     10769.el \{\
     10770.sp -1
     10771.IP \(bu 2.3
     10772.\}
     10773TCP_KEEPALIVE_THRESHOLD *
     10774.RE
     10775.sp
     10776.RS 4
     10777.ie n \{\
     10778\h'-04'\(bu\h'+03'\c
     10779.\}
     10780.el \{\
     10781.sp -1
     10782.IP \(bu 2.3
     10783.\}
     10784TCP_KEEPALIVE_ABORT_THRESHOLD *
     10785.RE
     10786.sp
     10787.RS 4
     10788.ie n \{\
     10789\h'-04'\(bu\h'+03'\c
     10790.\}
     10791.el \{\
     10792.sp -1
     10793.IP \(bu 2.3
     10794.\}
     10795TCP_DEFER_ACCEPT *
    955710796.RE
    955810797.sp
     
    958210821Example:
    958310822\fI\fIsocket options\fR\fR\fI = \fR\fIIPTOS_LOWDELAY\fR\fI \fR
     10823.RE
     10824
     10825spn update command (G)
     10826.\" spn update command
     10827.PP
     10828.RS 4
     10829This option sets the command that for updating servicePrincipalName names from
     10830spn_update_list\&.
     10831.sp
     10832Default:
     10833\fI\fIspn update command\fR\fR\fI = \fR\fI${prefix}/sbin/samba_spnupdate\fR\fI \fR
     10834.sp
     10835Example:
     10836\fI\fIspn update command\fR\fR\fI = \fR\fI/usr/local/sbin/spnupdate\fR\fI \fR
     10837.RE
     10838
     10839spoolss: architecture (G)
     10840.\" spoolss: architecture
     10841.PP
     10842.RS 4
     10843Windows spoolss print clients only allow association of server\-side drivers with printers when the driver architecture matches the advertised print server architecture\&. Samba\*(Aqs spoolss print server architecture can be changed using this parameter\&.
     10844.sp
     10845Default:
     10846\fI\fIspoolss: architecture\fR\fR\fI = \fR\fIWindows NT x86\fR\fI \fR
     10847.sp
     10848Example:
     10849\fI\fIspoolss: architecture\fR\fR\fI = \fR\fIWindows x64\fR\fI \fR
     10850.RE
     10851
     10852spoolss: os_major (G)
     10853.\" spoolss: os_major
     10854.PP
     10855.RS 4
     10856Windows might require a new os version number\&. This option allows to modify the build number\&. The complete default version number is: 5\&.0\&.2195 (Windows 2000)\&. The example is 6\&.1\&.7601 (Windows 2008 R2)\&.
     10857.sp
     10858Default:
     10859\fI\fIspoolss: os_major\fR\fR\fI = \fR\fI5\fR\fI \fR
     10860.sp
     10861Example:
     10862\fI\fIspoolss: os_major\fR\fR\fI = \fR\fI6\fR\fI \fR
     10863.RE
     10864
     10865spoolss: os_minor (G)
     10866.\" spoolss: os_minor
     10867.PP
     10868.RS 4
     10869Windows might require a new os version number\&. This option allows to modify the build number\&. The complete default version number is: 5\&.0\&.2195 (Windows 2000)\&. The example is 6\&.1\&.7601 (Windows 2008 R2)\&.
     10870.sp
     10871Default:
     10872\fI\fIspoolss: os_minor\fR\fR\fI = \fR\fI0\fR\fI \fR
     10873.sp
     10874Example:
     10875\fI\fIspoolss: os_minor\fR\fR\fI = \fR\fI1\fR\fI \fR
     10876.RE
     10877
     10878spoolss: os_build (G)
     10879.\" spoolss: os_build
     10880.PP
     10881.RS 4
     10882Windows might require a new os version number\&. This option allows to modify the build number\&. The complete default version number is: 5\&.0\&.2195 (Windows 2000)\&. The example is 6\&.1\&.7601 (Windows 2008 R2)\&.
     10883.sp
     10884Default:
     10885\fI\fIspoolss: os_build\fR\fR\fI = \fR\fI2195\fR\fI \fR
     10886.sp
     10887Example:
     10888\fI\fIspoolss: os_build\fR\fR\fI = \fR\fI7601\fR\fI \fR
     10889.RE
     10890
     10891spotlight (S)
     10892.\" spotlight
     10893.PP
     10894.RS 4
     10895This parameter controls whether Samba allows Spotlight queries on a share\&. For controlling indexing of filesystems you also have to use Tracker\*(Aqs own configuration system\&.
     10896.sp
     10897Spotlight has several prerequisites:
     10898.sp
     10899.RS 4
     10900.ie n \{\
     10901\h'-04'\(bu\h'+03'\c
     10902.\}
     10903.el \{\
     10904.sp -1
     10905.IP \(bu 2.3
     10906.\}
     10907Samba must be configured and built with Spotlight support\&.
     10908.RE
     10909.sp
     10910.RS 4
     10911.ie n \{\
     10912\h'-04'\(bu\h'+03'\c
     10913.\}
     10914.el \{\
     10915.sp -1
     10916.IP \(bu 2.3
     10917.\}
     10918The
     10919\fImdssvc\fR
     10920RPC service must be enabled, see below\&.
     10921.RE
     10922.sp
     10923.RS 4
     10924.ie n \{\
     10925\h'-04'\(bu\h'+03'\c
     10926.\}
     10927.el \{\
     10928.sp -1
     10929.IP \(bu 2.3
     10930.\}
     10931Tracker intergration must be setup and the share must be indexed by Tracker\&.
     10932.RE
     10933.sp
     10934.RE
     10935For a detailed set of instructions please see
     10936https://wiki\&.samba\&.org/index\&.php/Spotlight\&.
     10937.sp
     10938The Spotlight RPC service can either be enabled as embedded RPC service:
     10939.sp
     10940.if n \{\
     10941.RS 4
     10942.\}
     10943.nf
     10944\fI[Global]\fR
     10945\m[blue]\fBrpc_server:mdsvc = embedded\fR\m[]
     10946.fi
     10947.if n \{\
     10948.RE
     10949.\}
     10950.sp
     10951Or it can be run in a seperate RPC service daemon:
     10952.sp
     10953.if n \{\
     10954.RS 4
     10955.\}
     10956.nf
     10957\fI[Global]\fR
     10958\m[blue]\fBrpc_server:mdssd = fork\fR\m[]
     10959\m[blue]\fBrpc_server:mdsvc = external\fR\m[]
     10960.fi
     10961.if n \{\
     10962.RE
     10963.\}
     10964.sp
     10965Default:
     10966\fI\fIspotlight\fR\fR\fI = \fR\fIno\fR\fI \fR
    958410967.RE
    958510968
     
    962311006\m[blue]\fBmap hidden\fR\m[]
    962411007and
    9625 \m[blue]\fBmap readonly\fR\m[])\&. When set, DOS attributes will be stored onto an extended attribute in the UNIX filesystem, associated with the file or directory\&. For no other mapping to occur as a fall\-back, the parameters
     11008\m[blue]\fBmap readonly\fR\m[])\&. When set, DOS attributes will be stored onto an extended attribute in the UNIX filesystem, associated with the file or directory\&. When this parameter is set it will override the parameters
    962611009\m[blue]\fBmap hidden\fR\m[],
    962711010\m[blue]\fBmap system\fR\m[],
     
    962911012and
    963011013\m[blue]\fBmap readonly\fR\m[]
    9631 must be set to off\&. This parameter writes the DOS attributes as a string into the extended attribute named "user\&.DOSATTRIB"\&. This extended attribute is explicitly hidden from smbd clients requesting an EA list\&. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel\&. In Samba 3\&.5\&.0 and above the "user\&.DOSATTRIB" extended attribute has been extended to store the create time for a file as well as the DOS attributes\&. This is done in a backwards compatible way so files created by Samba 3\&.5\&.0 and above can still have the DOS attribute read from this extended attribute by earlier versions of Samba, but they will not be able to read the create time stored there\&. Storing the create time separately from the normal filesystem meta\-data allows Samba to faithfully reproduce NTFS semantics on top of a POSIX filesystem\&.
     11014and they will behave as if they were set to off\&. This parameter writes the DOS attributes as a string into the extended attribute named "user\&.DOSATTRIB"\&. This extended attribute is explicitly hidden from smbd clients requesting an EA list\&. On Linux the filesystem must have been mounted with the mount option user_xattr in order for extended attributes to work, also extended attributes must be compiled into the Linux kernel\&. In Samba 3\&.5\&.0 and above the "user\&.DOSATTRIB" extended attribute has been extended to store the create time for a file as well as the DOS attributes\&. This is done in a backwards compatible way so files created by Samba 3\&.5\&.0 and above can still have the DOS attribute read from this extended attribute by earlier versions of Samba, but they will not be able to read the create time stored there\&. Storing the create time separately from the normal filesystem meta\-data allows Samba to faithfully reproduce NTFS semantics on top of a POSIX filesystem\&.
    963211015.sp
    963311016Default:
     
    964311026the server will change from UNIX behaviour of not committing real disk storage blocks when a file is extended to the Windows behaviour of actually forcing the disk system to allocate real storage blocks when a file is created or extended to be a given size\&. In UNIX terminology this means that Samba will stop creating sparse files\&.
    964411027.sp
    9645 This option is really desgined for file systems that support fast allocation of large numbers of blocks such as extent\-based file systems\&. On file systems that don\*(Aqt support extents (most notably ext3) this can make Samba slower\&. When you work with large files over >100MB on file systems without extents you may even run into problems with clients running into timeouts\&.
     11028This option is really designed for file systems that support fast allocation of large numbers of blocks such as extent\-based file systems\&. On file systems that don\*(Aqt support extents (most notably ext3) this can make Samba slower\&. When you work with large files over >100MB on file systems without extents you may even run into problems with clients running into timeouts\&.
    964611029.sp
    964711030When you have an extent based filesystem it\*(Aqs likely that we can make use of unwritten extents which allows Samba to allocate even large amounts of space very fast and you will not see any timeout problems caused by strict allocate\&. With strict allocate in use you will also get much better out of quota messages in case you use quotas\&. Another advantage of activating this setting is that it will help to reduce file fragmentation\&.
     
    967411057.RE
    967511058
     11059strict rename (S)
     11060.\" strict rename
     11061.PP
     11062.RS 4
     11063By default a Windows SMB server prevents directory renames when there are open file or directory handles below it in the filesystem hierarchy\&. Historically Samba has always allowed this as POSIX filesystem semantics require it\&.
     11064.sp
     11065This boolean parameter allows Samba to match the Windows behavior\&. Setting this to "yes" is a very expensive change, as it forces Samba to travers the entire open file handle database on every directory rename request\&. In a clustered Samba system the cost is even greater than the non\-clustered case\&.
     11066.sp
     11067When set to "no" smbd only checks the local process the client is attached to for open files below a directory being renamed, instead of checking for open files across all smbd processes\&.
     11068.sp
     11069Because of the expense in fully searching the database, the default is "no", and it is recommended to be left that way unless a specific Windows application requires it to be changed\&.
     11070.sp
     11071If the client has requested UNIX extensions (POSIX pathnames) then renames are always allowed and this parameter has no effect\&.
     11072.sp
     11073Default:
     11074\fI\fIstrict rename\fR\fR\fI = \fR\fIno\fR\fI \fR
     11075.RE
     11076
    967611077strict sync (S)
    967711078.\" strict sync
    967811079.PP
    967911080.RS 4
    9680 Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk\&. Under UNIX, a sync call forces the process to be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storage\&. This is very slow and should only be done rarely\&. Setting this parameter to
     11081Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk\&. Under UNIX, a sync call forces the thread to be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storage\&. This is very slow and should only be done rarely\&. Setting this parameter to
    968111082\fBno\fR
    968211083(the default) means that
    968311084\fBsmbd\fR(8)
    968411085ignores the Windows applications requests for a sync call\&. There is only a possibility of losing data if the operating system itself that Samba is running on crashes, so there is little danger in this default setting\&. In addition, this fixes many performance problems that people have reported with the new Windows98 explorer shell file copies\&.
     11086.sp
     11087The flush request from SMB2/3 clients is handled asynchronously, so for these clients setting the parameter to
     11088\fByes\fR
     11089does not block the processing of other requests in the smbd process\&.
    968511090.sp
    968611091Default:
     
    972711132.RE
    972811133
    9729 syslog only (G)
    9730 .\" syslog only
    9731 .PP
    9732 .RS 4
    9733 If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files\&. There still will be some logging to log\&.[sn]mbd even if
    9734 \fIsyslog only\fR
    9735 is enabled\&.
    9736 .sp
    9737 Default:
    9738 \fI\fIsyslog only\fR\fR\fI = \fR\fIno\fR\fI \fR
    9739 .RE
    9740 
    974111134syslog (G)
    974211135.\" syslog
     
    975311146is enabled\&.
    975411147.sp
     11148The
     11149\m[blue]\fBlogging\fR\m[]
     11150parameter should be used instead\&. When
     11151\m[blue]\fBlogging\fR\m[]
     11152is set, it overrides the
     11153\m[blue]\fBsyslog\fR\m[]
     11154parameter\&.
     11155.sp
    975511156Default:
    975611157\fI\fIsyslog\fR\fR\fI = \fR\fI1\fR\fI \fR
     11158.RE
     11159
     11160syslog only (G)
     11161.\" syslog only
     11162.PP
     11163.RS 4
     11164If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files\&. There still will be some logging to log\&.[sn]mbd even if
     11165\fIsyslog only\fR
     11166is enabled\&.
     11167.sp
     11168The
     11169\m[blue]\fBlogging\fR\m[]
     11170parameter should be used instead\&. When
     11171\m[blue]\fBlogging\fR\m[]
     11172is set, it overrides the
     11173\m[blue]\fBsyslog only\fR\m[]
     11174parameter\&.
     11175.sp
     11176Default:
     11177\fI\fIsyslog only\fR\fR\fI = \fR\fIno\fR\fI \fR
    975711178.RE
    975811179
     
    978111202daemon uses this parameter to fill in the login shell for that user\&.
    978211203.sp
    9783 \fINo default\fR
    9784 .RE
    9785 
    9786 time offset (G)
    9787 .\" time offset
    9788 .PP
    9789 .RS 4
    9790 This deprecated parameter is a setting in minutes to add to the normal GMT to local time conversion\&. This is useful if you are serving a lot of PCs that have incorrect daylight saving time handling\&.
    9791 .if n \{\
    9792 .sp
    9793 .\}
    9794 .RS 4
    9795 .it 1 an-trap
    9796 .nr an-no-space-flag 1
    9797 .nr an-break-flag 1
    9798 .br
    9799 .ps +1
    9800 \fBNote\fR
    9801 .ps -1
    9802 .br
    9803 This option is deprecated, and will be removed in the next major release
    9804 .sp .5v
    9805 .RE
    9806 Default:
    9807 \fI\fItime offset\fR\fR\fI = \fR\fI0\fR\fI \fR
    9808 .sp
    9809 Example:
    9810 \fI\fItime offset\fR\fR\fI = \fR\fI60\fR\fI \fR
     11204Default:
     11205\fI\fItemplate shell\fR\fR\fI = \fR\fI/bin/false\fR\fI \fR
    981111206.RE
    981211207
     
    982311218.RE
    982411219
     11220debug timestamp
     11221.\" debug timestamp
     11222.PP
     11223.RS 4
     11224This parameter is a synonym for
     11225timestamp logs\&.
     11226.RE
     11227
     11228timestamp logs (G)
     11229.\" timestamp logs
     11230.PP
     11231.RS 4
     11232Samba debug log messages are timestamped by default\&. If you are running at a high
     11233\m[blue]\fBdebug level\fR\m[]
     11234these timestamps can be distracting\&. This boolean parameter allows timestamping to be turned off\&.
     11235.sp
     11236Default:
     11237\fI\fItimestamp logs\fR\fR\fI = \fR\fIyes\fR\fI \fR
     11238.RE
     11239
     11240tls cafile (G)
     11241.\" tls cafile
     11242.PP
     11243.RS 4
     11244This option can be set to a file (PEM format) containing CA certificates of root CAs to trust to sign certificates or intermediate CA certificates\&.
     11245.sp
     11246This path is relative to
     11247\m[blue]\fBprivate dir\fR\m[]
     11248if the path does not start with a /\&.
     11249.sp
     11250Default:
     11251\fI\fItls cafile\fR\fR\fI = \fR\fItls/ca\&.pem\fR\fI \fR
     11252.RE
     11253
     11254tls certfile (G)
     11255.\" tls certfile
     11256.PP
     11257.RS 4
     11258This option can be set to a file (PEM format) containing the RSA certificate\&.
     11259.sp
     11260This path is relative to
     11261\m[blue]\fBprivate dir\fR\m[]
     11262if the path does not start with a /\&.
     11263.sp
     11264Default:
     11265\fI\fItls certfile\fR\fR\fI = \fR\fItls/cert\&.pem\fR\fI \fR
     11266.RE
     11267
     11268tls crlfile (G)
     11269.\" tls crlfile
     11270.PP
     11271.RS 4
     11272This option can be set to a file containing a certificate revocation list (CRL)\&.
     11273.sp
     11274This path is relative to
     11275\m[blue]\fBprivate dir\fR\m[]
     11276if the path does not start with a /\&.
     11277.sp
     11278Default:
     11279\fI\fItls crlfile\fR\fR\fI = \fR\fI\fR\fI \fR
     11280.RE
     11281
     11282tls dh params file (G)
     11283.\" tls dh params file
     11284.PP
     11285.RS 4
     11286This option can be set to a file with Diffie\-Hellman parameters which will be used with DH ciphers\&.
     11287.sp
     11288This path is relative to
     11289\m[blue]\fBprivate dir\fR\m[]
     11290if the path does not start with a /\&.
     11291.sp
     11292Default:
     11293\fI\fItls dh params file\fR\fR\fI = \fR\fI\fR\fI \fR
     11294.RE
     11295
     11296tls enabled (G)
     11297.\" tls enabled
     11298.PP
     11299.RS 4
     11300If this option is set to
     11301\fByes\fR, then Samba will use TLS when possible in communication\&.
     11302.sp
     11303Default:
     11304\fI\fItls enabled\fR\fR\fI = \fR\fIyes\fR\fI \fR
     11305.RE
     11306
     11307tls keyfile (G)
     11308.\" tls keyfile
     11309.PP
     11310.RS 4
     11311This option can be set to a file (PEM format) containing the RSA private key\&. This file must be accessible without a pass\-phrase, i\&.e\&. it must not be encrypted\&.
     11312.sp
     11313This path is relative to
     11314\m[blue]\fBprivate dir\fR\m[]
     11315if the path does not start with a /\&.
     11316.sp
     11317Default:
     11318\fI\fItls keyfile\fR\fR\fI = \fR\fItls/key\&.pem\fR\fI \fR
     11319.RE
     11320
     11321tls priority (G)
     11322.\" tls priority
     11323.PP
     11324.RS 4
     11325This option can be set to a string describing the TLS protocols to be supported in the parts of Samba that use GnuTLS, specifically the AD DC\&.
     11326.sp
     11327The default turns off SSLv3, as this protocol is no longer considered secure after CVE\-2014\-3566 (otherwise known as POODLE) impacted SSLv3 use in HTTPS applications\&.
     11328.sp
     11329The valid options are described in the
     11330GNUTLS Priority\-Strings documentation at http://gnutls\&.org/manual/html_node/Priority\-Strings\&.html
     11331.sp
     11332Default:
     11333\fI\fItls priority\fR\fR\fI = \fR\fINORMAL:\-VERS\-SSL3\&.0\fR\fI \fR
     11334.RE
     11335
     11336tls verify peer (G)
     11337.\" tls verify peer
     11338.PP
     11339.RS 4
     11340This controls if and how strict the client will verify the peer\*(Aqs certificate and name\&. Possible values are (in increasing order):
     11341\fBno_check\fR,
     11342\fBca_only\fR,
     11343\fBca_and_name_if_available\fR,
     11344\fBca_and_name\fR
     11345and
     11346\fBas_strict_as_possible\fR\&.
     11347.sp
     11348When set to
     11349\fBno_check\fR
     11350the certificate is not verified at all, which allows trivial man in the middle attacks\&.
     11351.sp
     11352When set to
     11353\fBca_only\fR
     11354the certificate is verified to be signed from a ca specified in the
     11355\m[blue]\fBtls ca file\fR\m[]
     11356option\&. Setting
     11357\m[blue]\fBtls ca file\fR\m[]
     11358to a valid file is required\&. The certificate lifetime is also verified\&. If the
     11359\m[blue]\fBtls crl file\fR\m[]
     11360option is configured, the certificate is also verified against the ca crl\&.
     11361.sp
     11362When set to
     11363\fBca_and_name_if_available\fR
     11364all checks from
     11365\fBca_only\fR
     11366are performed\&. In addition, the peer hostname is verified against the certificate\*(Aqs name, if it is provided by the application layer and not given as an ip address string\&.
     11367.sp
     11368When set to
     11369\fBca_and_name\fR
     11370all checks from
     11371\fBca_and_name_if_available\fR
     11372are performed\&. In addition the peer hostname needs to be provided and even an ip address is checked against the certificate\*(Aqs name\&.
     11373.sp
     11374When set to
     11375\fBas_strict_as_possible\fR
     11376all checks from
     11377\fBca_and_name\fR
     11378are performed\&. In addition the
     11379\m[blue]\fBtls crl file\fR\m[]
     11380needs to be configured\&. Future versions of Samba may implement additional checks\&.
     11381.sp
     11382Default:
     11383\fI\fItls verify peer\fR\fR\fI = \fR\fIas_strict_as_possible\fR\fI \fR
     11384.RE
     11385
     11386unicode (G)
     11387.\" unicode
     11388.PP
     11389.RS 4
     11390Specifies whether the server and client should support unicode\&.
     11391.sp
     11392If this option is set to false, the use of ASCII will be forced\&.
     11393.sp
     11394Default:
     11395\fI\fIunicode\fR\fR\fI = \fR\fIyes\fR\fI \fR
     11396.RE
     11397
    982511398unix charset (G)
    982611399.\" unix charset
     
    983211405.sp
    983311406Default:
    9834 \fI\fIunix charset\fR\fR\fI = \fR\fIUTF8\fR\fI \fR
     11407\fI\fIunix charset\fR\fR\fI = \fR\fIUTF\-8\fR\fI \fR
    983511408.sp
    983611409Example:
     
    987911452disable spoolss = yes\&.
    988011453.sp
    9881 The differentiating factor is that under normal circumstances, the NT/2000 client will attempt to open the network printer using MS\-RPC\&. The problem is that because the client considers the printer to be local, it will attempt to issue the OpenPrinterEx() call requesting access rights associated with the logged on user\&. If the user possesses local administator rights but not root privilege on the Samba host (often the case), the OpenPrinterEx() call will fail\&. The result is that the client will now display an "Access Denied; Unable to connect" message in the printer queue window (even though jobs may successfully be printed)\&.
     11454The differentiating factor is that under normal circumstances, the NT/2000 client will attempt to open the network printer using MS\-RPC\&. The problem is that because the client considers the printer to be local, it will attempt to issue the OpenPrinterEx() call requesting access rights associated with the logged on user\&. If the user possesses local administrator rights but not root privilege on the Samba host (often the case), the OpenPrinterEx() call will fail\&. The result is that the client will now display an "Access Denied; Unable to connect" message in the printer queue window (even though jobs may successfully be printed)\&.
    988211455.sp
    988311456If this parameter is enabled for a printer, then any attempt to open the printer with the PRINTER_ACCESS_ADMINISTER right is mapped to PRINTER_ACCESS_USE instead\&. Thus allowing the OpenPrinterEx() call to succeed\&.
     
    990011473.RE
    990111474
     11475user
     11476.\" user
     11477.PP
     11478.RS 4
     11479This parameter is a synonym for
     11480username\&.
     11481.RE
     11482
     11483users
     11484.\" users
     11485.PP
     11486.RS 4
     11487This parameter is a synonym for
     11488username\&.
     11489.RE
     11490
     11491username (S)
     11492.\" username
     11493.PP
     11494.RS 4
     11495To restrict a service to a particular set of users you can use the
     11496\m[blue]\fBvalid users\fR\m[]
     11497parameter\&.
     11498.sp
     11499This parameter is deprecated
     11500.sp
     11501However, it currently operates only in conjunction with
     11502\m[blue]\fBonly user\fR\m[]\&. The supported way to restrict a service to a particular set of users is the
     11503\m[blue]\fBvalid users\fR\m[]
     11504parameter\&.
     11505.sp
     11506Default:
     11507\fI\fIusername\fR\fR\fI = \fR\fI # The guest account if a guest service, else <empty string>\&.\fR\fI \fR
     11508.sp
     11509Example:
     11510\fI\fIusername\fR\fR\fI = \fR\fIfred, mary, jack, jane, @users, @pcgroup\fR\fI \fR
     11511.RE
     11512
    990211513username level (G)
    990311514.\" username level
     
    991611527Example:
    991711528\fI\fIusername level\fR\fR\fI = \fR\fI5\fR\fI \fR
     11529.RE
     11530
     11531username map (G)
     11532.\" username map
     11533.PP
     11534.RS 4
     11535This option allows you to specify a file containing a mapping of usernames from the clients to the server\&. This can be used for several purposes\&. The most common is to map usernames that users use on DOS or Windows machines to those that the UNIX box uses\&. The other is to map multiple users to a single username so that they can more easily share files\&.
     11536.sp
     11537Please note that for user mode security, the username map is applied prior to validating the user credentials\&. Domain member servers (domain or ads) apply the username map after the user has been successfully authenticated by the domain controller and require fully qualified entries in the map table (e\&.g\&. biddle =
     11538DOMAIN\efoo)\&.
     11539.sp
     11540The map file is parsed line by line\&. Each line should contain a single UNIX username on the left then a \*(Aq=\*(Aq followed by a list of usernames on the right\&. The list of usernames on the right may contain names of the form @group in which case they will match any UNIX username in that group\&. The special client name \*(Aq*\*(Aq is a wildcard and matches any name\&. Each line of the map file may be up to 1023 characters long\&.
     11541.sp
     11542The file is processed on each line by taking the supplied username and comparing it with each username on the right hand side of the \*(Aq=\*(Aq signs\&. If the supplied name matches any of the names on the right hand side then it is replaced with the name on the left\&. Processing then continues with the next line\&.
     11543.sp
     11544If any line begins with a \*(Aq#\*(Aq or a \*(Aq;\*(Aq then it is ignored\&.
     11545.sp
     11546If any line begins with an \*(Aq!\*(Aq then the processing will stop after that line if a mapping was done by the line\&. Otherwise mapping continues with every line being processed\&. Using \*(Aq!\*(Aq is most useful when you have a wildcard mapping line later in the file\&.
     11547.sp
     11548For example to map from the name
     11549\fBadmin\fR
     11550or
     11551\fBadministrator\fR
     11552to the UNIX name
     11553\fB root\fR
     11554you would use:
     11555.sp
     11556.if n \{\
     11557.RS 4
     11558.\}
     11559.nf
     11560root = admin administrator
     11561.fi
     11562.if n \{\
     11563.RE
     11564.\}
     11565.sp
     11566Or to map anyone in the UNIX group
     11567\fBsystem\fR
     11568to the UNIX name
     11569\fBsys\fR
     11570you would use:
     11571.sp
     11572.if n \{\
     11573.RS 4
     11574.\}
     11575.nf
     11576sys = @system
     11577.fi
     11578.if n \{\
     11579.RE
     11580.\}
     11581.sp
     11582You can have as many mappings as you like in a username map file\&.
     11583.sp
     11584If your system supports the NIS NETGROUP option then the netgroup database is checked before the
     11585/etc/group
     11586database for matching groups\&.
     11587.sp
     11588You can map Windows usernames that have spaces in them by using double quotes around the name\&. For example:
     11589.sp
     11590.if n \{\
     11591.RS 4
     11592.\}
     11593.nf
     11594tridge = "Andrew Tridgell"
     11595.fi
     11596.if n \{\
     11597.RE
     11598.\}
     11599.sp
     11600would map the windows username "Andrew Tridgell" to the unix username "tridge"\&.
     11601.sp
     11602The following example would map mary and fred to the unix user sys, and map the rest to guest\&. Note the use of the \*(Aq!\*(Aq to tell Samba to stop processing if it gets a match on that line:
     11603.sp
     11604.if n \{\
     11605.RS 4
     11606.\}
     11607.nf
     11608!sys = mary fred
     11609guest = *
     11610.fi
     11611.if n \{\
     11612.RE
     11613.\}
     11614.sp
     11615Note that the remapping is applied to all occurrences of usernames\&. Thus if you connect to \e\eserver\efred and
     11616\fBfred\fR
     11617is remapped to
     11618\fBmary\fR
     11619then you will actually be connecting to \e\eserver\emary and will need to supply a password suitable for
     11620\fBmary\fR
     11621not
     11622\fBfred\fR\&. The only exception to this is the username passed to a Domain Controller (if you have one)\&. The DC will receive whatever username the client supplies without modification\&.
     11623.sp
     11624Also note that no reverse mapping is done\&. The main effect this has is with printing\&. Users who have been mapped may have trouble deleting print jobs as PrintManager under WfWg will think they don\*(Aqt own the print job\&.
     11625.sp
     11626Samba versions prior to 3\&.0\&.8 would only support reading the fully qualified username (e\&.g\&.:
     11627DOMAIN\euser) from the username map when performing a kerberos login from a client\&. However, when looking up a map entry for a user authenticated by NTLM[SSP], only the login name would be used for matches\&. This resulted in inconsistent behavior sometimes even on the same server\&.
     11628.sp
     11629The following functionality is obeyed in version 3\&.0\&.8 and later:
     11630.sp
     11631When performing local authentication, the username map is applied to the login name before attempting to authenticate the connection\&.
     11632.sp
     11633When relying upon a external domain controller for validating authentication requests, smbd will apply the username map to the fully qualified username (i\&.e\&.
     11634DOMAIN\euser) only after the user has been successfully authenticated\&.
     11635.sp
     11636An example of use is:
     11637.sp
     11638.if n \{\
     11639.RS 4
     11640.\}
     11641.nf
     11642username map = /usr/local/samba/lib/users\&.map
     11643.fi
     11644.if n \{\
     11645.RE
     11646.\}
     11647.sp
     11648Default:
     11649\fI\fIusername map\fR\fR\fI = \fR\fI # no username map\fR\fI \fR
    991811650.RE
    991911651
     
    994711679This script is a mutually exclusive alternative to the
    994811680\m[blue]\fBusername map\fR\m[]
    9949 parameter\&. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line line on standard output (the name to which the account should mapped)\&. In this way, it is possible to store username map tables in an LDAP or NIS directory services\&.
     11681parameter\&. This parameter specifies and external program or script that must accept a single command line option (the username transmitted in the authentication request) and return a line on standard output (the name to which the account should mapped)\&. In this way, it is possible to store username map tables in an LDAP or NIS directory services\&.
    995011682.sp
    995111683Default:
     
    995411686Example:
    995511687\fI\fIusername map script\fR\fR\fI = \fR\fI/etc/samba/scripts/mapusers\&.sh\fR\fI \fR
    9956 .RE
    9957 
    9958 username map (G)
    9959 .\" username map
    9960 .PP
    9961 .RS 4
    9962 This option allows you to specify a file containing a mapping of usernames from the clients to the server\&. This can be used for several purposes\&. The most common is to map usernames that users use on DOS or Windows machines to those that the UNIX box uses\&. The other is to map multiple users to a single username so that they can more easily share files\&.
    9963 .sp
    9964 Please note that for user or share mode security, the username map is applied prior to validating the user credentials\&. Domain member servers (domain or ads) apply the username map after the user has been successfully authenticated by the domain controller and require fully qualified enties in the map table (e\&.g\&. biddle =
    9965 DOMAIN\efoo)\&.
    9966 .sp
    9967 The map file is parsed line by line\&. Each line should contain a single UNIX username on the left then a \*(Aq=\*(Aq followed by a list of usernames on the right\&. The list of usernames on the right may contain names of the form @group in which case they will match any UNIX username in that group\&. The special client name \*(Aq*\*(Aq is a wildcard and matches any name\&. Each line of the map file may be up to 1023 characters long\&.
    9968 .sp
    9969 The file is processed on each line by taking the supplied username and comparing it with each username on the right hand side of the \*(Aq=\*(Aq signs\&. If the supplied name matches any of the names on the right hand side then it is replaced with the name on the left\&. Processing then continues with the next line\&.
    9970 .sp
    9971 If any line begins with a \*(Aq#\*(Aq or a \*(Aq;\*(Aq then it is ignored\&.
    9972 .sp
    9973 If any line begins with an \*(Aq!\*(Aq then the processing will stop after that line if a mapping was done by the line\&. Otherwise mapping continues with every line being processed\&. Using \*(Aq!\*(Aq is most useful when you have a wildcard mapping line later in the file\&.
    9974 .sp
    9975 For example to map from the name
    9976 \fBadmin\fR
    9977 or
    9978 \fBadministrator\fR
    9979 to the UNIX name
    9980 \fB root\fR
    9981 you would use:
    9982 .sp
    9983 .if n \{\
    9984 .RS 4
    9985 .\}
    9986 .nf
    9987 root = admin administrator
    9988 .fi
    9989 .if n \{\
    9990 .RE
    9991 .\}
    9992 .sp
    9993 Or to map anyone in the UNIX group
    9994 \fBsystem\fR
    9995 to the UNIX name
    9996 \fBsys\fR
    9997 you would use:
    9998 .sp
    9999 .if n \{\
    10000 .RS 4
    10001 .\}
    10002 .nf
    10003 sys = @system
    10004 .fi
    10005 .if n \{\
    10006 .RE
    10007 .\}
    10008 .sp
    10009 You can have as many mappings as you like in a username map file\&.
    10010 .sp
    10011 If your system supports the NIS NETGROUP option then the netgroup database is checked before the
    10012 /etc/group
    10013 database for matching groups\&.
    10014 .sp
    10015 You can map Windows usernames that have spaces in them by using double quotes around the name\&. For example:
    10016 .sp
    10017 .if n \{\
    10018 .RS 4
    10019 .\}
    10020 .nf
    10021 tridge = "Andrew Tridgell"
    10022 .fi
    10023 .if n \{\
    10024 .RE
    10025 .\}
    10026 .sp
    10027 would map the windows username "Andrew Tridgell" to the unix username "tridge"\&.
    10028 .sp
    10029 The following example would map mary and fred to the unix user sys, and map the rest to guest\&. Note the use of the \*(Aq!\*(Aq to tell Samba to stop processing if it gets a match on that line:
    10030 .sp
    10031 .if n \{\
    10032 .RS 4
    10033 .\}
    10034 .nf
    10035 !sys = mary fred
    10036 guest = *
    10037 .fi
    10038 .if n \{\
    10039 .RE
    10040 .\}
    10041 .sp
    10042 Note that the remapping is applied to all occurrences of usernames\&. Thus if you connect to \e\eserver\efred and
    10043 \fBfred\fR
    10044 is remapped to
    10045 \fBmary\fR
    10046 then you will actually be connecting to \e\eserver\emary and will need to supply a password suitable for
    10047 \fBmary\fR
    10048 not
    10049 \fBfred\fR\&. The only exception to this is the username passed to the
    10050 \m[blue]\fBpassword server\fR\m[]
    10051 (if you have one)\&. The password server will receive whatever username the client supplies without modification\&.
    10052 .sp
    10053 Also note that no reverse mapping is done\&. The main effect this has is with printing\&. Users who have been mapped may have trouble deleting print jobs as PrintManager under WfWg will think they don\*(Aqt own the print job\&.
    10054 .sp
    10055 Samba versions prior to 3\&.0\&.8 would only support reading the fully qualified username (e\&.g\&.:
    10056 DOMAIN\euser) from the username map when performing a kerberos login from a client\&. However, when looking up a map entry for a user authenticated by NTLM[SSP], only the login name would be used for matches\&. This resulted in inconsistent behavior sometimes even on the same server\&.
    10057 .sp
    10058 The following functionality is obeyed in version 3\&.0\&.8 and later:
    10059 .sp
    10060 When performing local authentication, the username map is applied to the login name before attempting to authenticate the connection\&.
    10061 .sp
    10062 When relying upon a external domain controller for validating authentication requests, smbd will apply the username map to the fully qualified username (i\&.e\&.
    10063 DOMAIN\euser) only after the user has been successfully authenticated\&.
    10064 .sp
    10065 An example of use is:
    10066 .sp
    10067 .if n \{\
    10068 .RS 4
    10069 .\}
    10070 .nf
    10071 username map = /usr/local/samba/lib/users\&.map
    10072 .fi
    10073 .if n \{\
    10074 .RE
    10075 .\}
    10076 .sp
    10077 Default:
    10078 \fI\fIusername map\fR\fR\fI = \fR\fI # no username map\fR\fI \fR
    10079 .RE
    10080 
    10081 user
    10082 .\" user
    10083 .PP
    10084 .RS 4
    10085 This parameter is a synonym for
    10086 username\&.
    10087 .RE
    10088 
    10089 users
    10090 .\" users
    10091 .PP
    10092 .RS 4
    10093 This parameter is a synonym for
    10094 username\&.
    10095 .RE
    10096 
    10097 username (S)
    10098 .\" username
    10099 .PP
    10100 .RS 4
    10101 Multiple users may be specified in a comma\-delimited list, in which case the supplied password will be tested against each username in turn (left to right)\&.
    10102 .sp
    10103 The deprecated
    10104 \fIusername\fR
    10105 line is needed only when the PC is unable to supply its own username\&. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames\&. In both these cases you may also be better using the \e\eserver\eshare%user syntax instead\&.
    10106 .sp
    10107 The
    10108 \fIusername\fR
    10109 line is not a great solution in many cases as it means Samba will try to validate the supplied password against each of the usernames in the
    10110 \fIusername\fR
    10111 line in turn\&. This is slow and a bad idea for lots of users in case of duplicate passwords\&. You may get timeouts or security breaches using this parameter unwisely\&.
    10112 .sp
    10113 Samba relies on the underlying UNIX security\&. This parameter does not restrict who can login, it just offers hints to the Samba server as to what usernames might correspond to the supplied password\&. Users can login as whoever they please and they will be able to do no more damage than if they started a telnet session\&. The daemon runs as the user that they log in as, so they cannot do anything that user cannot do\&.
    10114 .sp
    10115 To restrict a service to a particular set of users you can use the
    10116 \m[blue]\fBvalid users\fR\m[]
    10117 parameter\&.
    10118 .sp
    10119 If any of the usernames begin with a \*(Aq@\*(Aq then the name will be looked up first in the NIS netgroups list (if Samba is compiled with netgroup support), followed by a lookup in the UNIX groups database and will expand to a list of all users in the group of that name\&.
    10120 .sp
    10121 If any of the usernames begin with a \*(Aq+\*(Aq then the name will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name\&.
    10122 .sp
    10123 If any of the usernames begin with a \*(Aq&\*(Aq then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name\&.
    10124 .sp
    10125 Note that searching though a groups database can take quite some time, and some clients may time out during the search\&.
    10126 .sp
    10127 See the section
    10128 NOTE ABOUT USERNAME/PASSWORD VALIDATION
    10129 for more information on how this parameter determines access to the services\&.
    10130 .sp
    10131 Default:
    10132 \fI\fIusername\fR\fR\fI = \fR\fI # The guest account if a guest service, else <empty string>\&.\fR\fI \fR
    10133 .sp
    10134 Example:
    10135 \fI\fIusername\fR\fR\fI = \fR\fIfred, mary, jack, jane, @users, @pcgroup\fR\fI \fR
    1013611688.RE
    1013711689
     
    1016511717.sp
    1016611718Default:
    10167 \fI\fIusershare owner only\fR\fR\fI = \fR\fITrue\fR\fI \fR
     11719\fI\fIusershare owner only\fR\fR\fI = \fR\fIyes\fR\fI \fR
    1016811720.RE
    1016911721
     
    1017211724.PP
    1017311725.RS 4
    10174 This parameter specifies the absolute path of the directory on the filesystem used to store the user defined share definition files\&. This directory must be owned by root, and have no access for other, and be writable only by the group owner\&. In addition the "sticky" bit must also be set, restricting rename and delete to owners of a file (in the same way the /tmp directory is usually configured)\&. Members of the group owner of this directory are the users allowed to create usershares\&. If this parameter is undefined then no user defined shares are allowed\&.
     11726This parameter specifies the absolute path of the directory on the filesystem used to store the user defined share definition files\&. This directory must be owned by root, and have no access for other, and be writable only by the group owner\&. In addition the "sticky" bit must also be set, restricting rename and delete to owners of a file (in the same way the /tmp directory is usually configured)\&. Members of the group owner of this directory are the users allowed to create usershares\&.
    1017511727.sp
    1017611728For example, a valid usershare directory might be /usr/local/samba/lib/usershares, set up as follows\&.
    10177 .sp
    10178 
    1017911729.sp
    1018011730.if n \{\
     
    1019311743.sp
    1019411744Default:
    10195 \fI\fIusershare path\fR\fR\fI = \fR\fINULL\fR\fI \fR
     11745\fI\fIusershare path\fR\fR\fI = \fR\fI${prefix}/var/locks/usershares\fR\fI \fR
    1019611746.RE
    1019711747
     
    1020511755.sp
    1020611756Default:
    10207 \fI\fIusershare prefix allow list\fR\fR\fI = \fR\fINULL\fR\fI \fR
     11757\fI\fIusershare prefix allow list\fR\fR\fI = \fR\fI\fR\fI \fR
    1020811758.sp
    1020911759Example:
     
    1022011770.sp
    1022111771Default:
    10222 \fI\fIusershare prefix deny list\fR\fR\fI = \fR\fINULL\fR\fI \fR
     11772\fI\fIusershare prefix deny list\fR\fR\fI = \fR\fI\fR\fI \fR
    1022311773.sp
    1022411774Example:
     
    1023511785.sp
    1023611786Default:
    10237 \fI\fIusershare template share\fR\fR\fI = \fR\fINULL\fR\fI \fR
     11787\fI\fIusershare template share\fR\fR\fI = \fR\fI\fR\fI \fR
    1023811788.sp
    1023911789Example:
     
    1025111801.sp
    1025211802Default:
    10253 \fI\fIuse sendfile\fR\fR\fI = \fR\fIfalse\fR\fI \fR
     11803\fI\fIuse sendfile\fR\fR\fI = \fR\fIno\fR\fI \fR
    1025411804.RE
    1025511805
     
    1025811808.PP
    1025911809.RS 4
    10260 This deprecated variable controls controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\&.
     11810This deprecated variable controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000 clients to agree upon an authentication mechanism\&.
    1026111811.sp
    1026211812Unless further issues are discovered with our SPNEGO implementation, there is no reason this should ever be disabled\&.
     
    1026411814Default:
    1026511815\fI\fIuse spnego\fR\fR\fI = \fR\fIyes\fR\fI \fR
     11816.RE
     11817
     11818utmp (G)
     11819.\" utmp
     11820.PP
     11821.RS 4
     11822This boolean parameter is only available if Samba has been configured and compiled with the option
     11823\-\-with\-utmp\&. If set to
     11824\fByes\fR
     11825then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server\&. Sites may use this to record the user connecting to a Samba share\&.
     11826.sp
     11827Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user\&. Enabling this option creates an n^2 algorithm to find this number\&. This may impede performance on large installations\&.
     11828.sp
     11829Default:
     11830\fI\fIutmp\fR\fR\fI = \fR\fIno\fR\fI \fR
    1026611831.RE
    1026711832
     
    1028211847.RE
    1028311848
    10284 utmp (G)
    10285 .\" utmp
    10286 .PP
    10287 .RS 4
    10288 This boolean parameter is only available if Samba has been configured and compiled with the option
    10289 \-\-with\-utmp\&. If set to
    10290 \fByes\fR
    10291 then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server\&. Sites may use this to record the user connecting to a Samba share\&.
    10292 .sp
    10293 Due to the requirements of the utmp record, we are required to create a unique identifier for the incoming user\&. Enabling this option creates an n^2 algorithm to find this number\&. This may impede performance on large installations\&.
    10294 .sp
    10295 Default:
    10296 \fI\fIutmp\fR\fR\fI = \fR\fIno\fR\fI \fR
     11849\-valid (S)
     11850.\" -valid
     11851.PP
     11852.RS 4
     11853This parameter indicates whether a share is valid and thus can be used\&. When this parameter is set to false, the share will be in no way visible nor accessible\&.
     11854.sp
     11855This option should not be used by regular users but might be of help to developers\&. Samba uses this option internally to mark shares as deleted\&.
     11856.sp
     11857Default:
     11858\fI\fI\-valid\fR\fR\fI = \fR\fIyes\fR\fI \fR
    1029711859.RE
    1029811860
     
    1031211874\fI%S\fR\&. This is useful in the [homes] section\&.
    1031311875.sp
     11876\fINote: \fRWhen used in the [global] section this parameter may have unwanted side effects\&. For example: If samba is configured as a MASTER BROWSER (see
     11877\fIlocal master\fR,
     11878\fIos level\fR,
     11879\fIdomain master\fR,
     11880\fIpreferred master\fR) this option will prevent workstations from being able to browse the network\&.
     11881.sp
    1031411882Default:
    1031511883\fI\fIvalid users\fR\fR\fI = \fR\fI # No valid users list (anyone can login) \fR\fI \fR
     
    1031711885Example:
    1031811886\fI\fIvalid users\fR\fR\fI = \fR\fIgreg, @pcusers\fR\fI \fR
    10319 .RE
    10320 
    10321 \-valid (S)
    10322 .\" -valid
    10323 .PP
    10324 .RS 4
    10325 This parameter indicates whether a share is valid and thus can be used\&. When this parameter is set to false, the share will be in no way visible nor accessible\&.
    10326 .sp
    10327 This option should not be used by regular users but might be of help to developers\&. Samba uses this option internally to mark shares as deleted\&.
    10328 .sp
    10329 Default:
    10330 \fI\fI\-valid\fR\fR\fI = \fR\fIyes\fR\fI \fR
    1033111887.RE
    1033211888
     
    1037411930.sp
    1037511931Default:
    10376 \fI\fIveto files\fR\fR\fI = \fR\fINo files or directories are vetoed\&.\fR\fI \fR
     11932\fI\fIveto files\fR\fR\fI = \fR\fI # No files or directories are vetoed\fR\fI \fR
    1037711933.RE
    1037811934
     
    1043711993.RE
    1043811994
     11995web port (G)
     11996.\" web port
     11997.PP
     11998.RS 4
     11999Specifies which port the Samba web server should listen on\&.
     12000.sp
     12001Default:
     12002\fI\fIweb port\fR\fR\fI = \fR\fI901\fR\fI \fR
     12003.sp
     12004Example:
     12005\fI\fIweb port\fR\fR\fI = \fR\fI80\fR\fI \fR
     12006.RE
     12007
    1043912008wide links (S)
    1044012009.\" wide links
     
    1046912038Default:
    1047012039\fI\fIwinbind cache time\fR\fR\fI = \fR\fI300\fR\fI \fR
     12040.RE
     12041
     12042winbindd privileged socket directory (G)
     12043.\" winbindd privileged socket directory
     12044.PP
     12045.RS 4
     12046This setting controls the location of the winbind daemon\*(Aqs privileged socket\&.
     12047.sp
     12048Default:
     12049\fI\fIwinbindd privileged socket directory\fR\fR\fI = \fR\fI${prefix}/var/lib/winbindd_privileged\fR\fI \fR
     12050.RE
     12051
     12052winbindd socket directory (G)
     12053.\" winbindd socket directory
     12054.PP
     12055.RS 4
     12056This setting controls the location of the winbind daemon\*(Aqs socket\&.
     12057.sp
     12058Except within automated test scripts, this should not be altered, as the client tools (nss_winbind etc) do not honour this parameter\&. Client tools must then be advised of the altered path with the WINBINDD_SOCKET_DIR environment varaible\&.
     12059.sp
     12060Default:
     12061\fI\fIwinbindd socket directory\fR\fR\fI = \fR\fI${prefix}/var/run/winbindd\fR\fI \fR
    1047112062.RE
    1047212063
     
    1055312144Be aware that a high value for this parameter can result in system slowdown as the main parent winbindd daemon must perform the group unrolling and will be unable to answer incoming NSS or authentication requests during this time\&.
    1055412145.sp
    10555 Default:
    10556 \fI\fIwinbind expand groups\fR\fR\fI = \fR\fI1\fR\fI \fR
     12146The default value was changed from 1 to 0 with Samba 4\&.2\&. Some broken applications calculate the group memberships of users by traversing groups, such applications will require "winbind expand groups = 1"\&. But the new default makes winbindd more reliable as it doesn\*(Aqt require SAMR access to domain controllers of trusted domains\&.
     12147.sp
     12148Default:
     12149\fI\fIwinbind expand groups\fR\fR\fI = \fR\fI0\fR\fI \fR
    1055712150.RE
    1055812151
     
    1056312156This parameter specifies the maximum number of clients the
    1056412157\fBwinbindd\fR(8)
    10565 daemon can connect with\&.
     12158daemon can connect with\&. The parameter is not a hard limit\&. The
     12159\fBwinbindd\fR(8)
     12160daemon configures itself to be able to accept at least that many connections, and if the limit is reached, an attempt is made to disconnect idle clients\&.
    1056612161.sp
    1056712162Default:
     
    1060512200This parameter controls whether winbindd will replace whitespace in user and group names with an underscore (_) character\&. For example, whether the name "Space Kadet" should be replaced with the string "space_kadet"\&. Frequently Unix shell scripts will have difficulty with usernames contains whitespace due to the default field separator in the shell\&. If your domain possesses names containing the underscore character, this option may cause problems unless the name aliasing feature is supported by your nss_info plugin\&.
    1060612201.sp
    10607 This feature also enables the name aliasing API which can be used to make domain user and group names to a non\-qualified version\&. Please refer to the manpage for the configured idmap and nss_info plugin for the specifics on how to configure name aliasing for a specific configuration\&. Name aliasing takes precedence (and is mutually exclusive) over the whitespace replacement mechanism discussed previsouly\&.
     12202This feature also enables the name aliasing API which can be used to make domain user and group names to a non\-qualified version\&. Please refer to the manpage for the configured idmap and nss_info plugin for the specifics on how to configure name aliasing for a specific configuration\&. Name aliasing takes precedence (and is mutually exclusive) over the whitespace replacement mechanism discussed previously\&.
    1060812203.sp
    1060912204Default:
     
    1064312238.IP \(bu 2.3
    1064412239.\}
    10645 \fI<sfu | rfc2307 >\fR
    10646 \- When Samba is running in security = ads and your Active Directory Domain Controller does support the Microsoft "Services for Unix" (SFU) LDAP schema, winbind can retrieve the login shell and the home directory attributes directly from your Directory Server\&. Note that retrieving UID and GID from your ADS\-Server requires to use
     12240\fI<sfu | sfu20 | rfc2307 >\fR
     12241\- When Samba is running in security = ads and your Active Directory Domain Controller does support the Microsoft "Services for Unix" (SFU) LDAP schema, winbind can retrieve the login shell and the home directory attributes directly from your Directory Server\&. For SFU 3\&.0 or 3\&.5 simply choose "sfu", if you use SFU 2\&.0 please choose "sfu20"\&. Note that retrieving UID and GID from your ADS\-Server requires to use
    1064712242\fIidmap config DOMAIN:backend\fR
    10648 = ad as well\&.
     12243= ad as well\&. The primary group membership is currently always calculated via the "primaryGroupID" LDAP attribute\&.
    1064912244.RE
    1065012245.sp
     
    1066212257.PP
    1066312258.RS 4
    10664 This parameter is designed to control whether Winbind should allow to login with the
     12259This parameter is designed to control whether Winbind should allow one to login with the
    1066512260\fIpam_winbind\fR
    1066612261module using Cached Credentials\&. If enabled, winbindd will store user credentials from successful logins encrypted in a local cache\&.
    1066712262.sp
    1066812263Default:
    10669 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fIfalse\fR\fI \fR
    10670 .sp
    10671 Example:
    10672 \fI\fIwinbind offline logon\fR\fR\fI = \fR\fItrue\fR\fI \fR
     12264\fI\fIwinbind offline logon\fR\fR\fI = \fR\fIno\fR\fI \fR
     12265.sp
     12266Example:
     12267\fI\fIwinbind offline logon\fR\fR\fI = \fR\fIyes\fR\fI \fR
    1067312268.RE
    1067412269
     
    1069412289.sp
    1069512290Default:
    10696 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fIfalse\fR\fI \fR
    10697 .sp
    10698 Example:
    10699 \fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fItrue\fR\fI \fR
     12291\fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fIno\fR\fI \fR
     12292.sp
     12293Example:
     12294\fI\fIwinbind refresh tickets\fR\fR\fI = \fR\fIyes\fR\fI \fR
     12295.RE
     12296
     12297winbind request timeout (G)
     12298.\" winbind request timeout
     12299.PP
     12300.RS 4
     12301This parameter specifies the number of seconds the
     12302\fBwinbindd\fR(8)
     12303daemon will wait before disconnecting either a client connection with no outstanding requests (idle) or a client connection with a request that has remained outstanding (hung) for longer than this number of seconds\&.
     12304.sp
     12305Default:
     12306\fI\fIwinbind request timeout\fR\fR\fI = \fR\fI60\fR\fI \fR
    1070012307.RE
    1070112308
     
    1071012317Default:
    1071112318\fI\fIwinbind rpc only\fR\fR\fI = \fR\fIno\fR\fI \fR
     12319.RE
     12320
     12321winbind sealed pipes (G)
     12322.\" winbind sealed pipes
     12323.PP
     12324.RS 4
     12325This option controls whether any requests from winbindd to domain controllers pipe will be sealed\&. Disabling sealing can be useful for debugging purposes\&.
     12326.sp
     12327The behavior can be controlled per netbios domain by using \*(Aqwinbind sealed pipes:NETBIOSDOMAIN = no\*(Aq as option\&.
     12328.sp
     12329Default:
     12330\fI\fIwinbind sealed pipes\fR\fR\fI = \fR\fIyes\fR\fI \fR
    1071212331.RE
    1071312332
     
    1072612345.sp
    1072712346Default:
    10728 \fI\fIwinbind separator\fR\fR\fI = \fR\fI\*(Aq\e\*(Aq\fR\fI \fR
     12347\fI\fIwinbind separator\fR\fR\fI = \fR\fI\e\fR\fI \fR
    1072912348.sp
    1073012349Example:
     
    1093312552.RE
    1093412553
     12554write ok
     12555.\" write ok
     12556.PP
     12557.RS 4
     12558This parameter is a synonym for
     12559writeable\&.
     12560.RE
     12561
    1093512562writeable (S)
    1093612563.\" writeable
     
    1095612583The integer parameter specifies the size of this cache (per oplocked file) in bytes\&.
    1095712584.sp
     12585Note that the write cache won\*(Aqt be used for file handles with a smb2 write lease\&.
     12586.sp
    1095812587Default:
    1095912588\fI\fIwrite cache size\fR\fR\fI = \fR\fI0\fR\fI \fR
     
    1097312602Note that if a user is in both the read list and the write list then they will be given write access\&.
    1097412603.sp
    10975 By design, this parameter will not work with the
    10976 \m[blue]\fBsecurity = share\fR\m[]
    10977 in Samba 3\&.0\&.
    10978 .sp
    1097912604Default:
    1098012605\fI\fIwrite list\fR\fR\fI = \fR\fI\fR\fI \fR
     
    1098812613.PP
    1098912614.RS 4
    10990 This parameter controls whether or not the server will support raw write SMB\*(Aqs when transferring data from clients\&. You should never need to change this parameter\&.
     12615This is ignored if
     12616\m[blue]\fBasync smb echo handler\fR\m[]
     12617is set, because this feature is incompatible with raw write SMB requests
     12618.sp
     12619If enabled, raw writes allow writes of 65535 bytes in one packet\&. This typically provides a major performance benefit for some very, very old clients\&.
     12620.sp
     12621However, some clients either negotiate the allowable block size incorrectly or are incapable of supporting larger block sizes, and for these clients you may need to disable raw writes\&.
     12622.sp
     12623In general this parameter should be viewed as a system tuning tool and left severely alone\&.
    1099112624.sp
    1099212625Default:
     
    1102612659.SH "VERSION"
    1102712660.PP
    11028 This man page is correct for version 3 of the Samba suite\&.
     12661This man page is correct for version 4 of the Samba suite\&.
    1102912662.SH "SEE ALSO"
    1103012663.PP
    11031 
    1103212664\fBsamba\fR(7),
    1103312665\fBsmbpasswd\fR(8),
    11034 \fBswat\fR(8),
    1103512666\fBsmbd\fR(8),
    1103612667\fBnmbd\fR(8),
     12668\fBwinbindd\fR(8),
     12669\fBsamba\fR(8),
     12670\fBsamba-tool\fR(8),
    1103712671\fBsmbclient\fR(1),
    1103812672\fBnmblookup\fR(1),
    11039 \fBtestparm\fR(1),
    11040 \fBtestprns\fR(1)\&.
     12673\fBtestparm\fR(1)\&.
    1104112674.SH "AUTHOR"
    1104212675.PP
  • vendor/current/docs/manpages/smbcacls.1

    r860 r988  
    22.\"     Title: smbcacls
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMBCACLS" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "SMBCACLS" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 smbcacls {//server/share} {/filename} [\-D|\-\-delete\ acls] [\-M|\-\-modify\ acls] [\-a|\-\-add\ acls] [\-S|\-\-set\ acls] [\-C|\-\-chown\ name] [\-G|\-\-chgrp\ name] [\-I\ allow|romove|copy] [\-\-numeric] [\-t] [\-U\ username] [\-h] [\-d]
     34smbcacls {//server/share} {/filename} [\-D|\-\-delete\ acl] [\-M|\-\-modify\ acl] [\-a|\-\-add\ acl] [\-S|\-\-set\ acl] [\-C|\-\-chown\ name] [\-G|\-\-chgrp\ name] [\-I\ allow|remove|copy] [\-\-numeric] [\-t] [\-U\ username] [\-d] [\-e] [\-m|\-\-max\-protocol\ LEVEL] [\-\-query\-security\-info\ FLAGS] [\-\-set\-security\-info\ FLAGS] [\-\-sddl] [\-\-domain\-sid\ SID]
    3535.SH "DESCRIPTION"
    3636.PP
     
    4141The
    4242smbcacls
    43 program manipulates NT Access Control Lists (ACLs) on SMB file shares\&.
     43program manipulates NT Access Control Lists (ACLs) on SMB file shares\&. An ACL is comprised zero or more Access Control Entries (ACEs), which define access restrictions for a specific user or group\&.
    4444.SH "OPTIONS"
    4545.PP
     
    4848program\&. The format of ACLs is described in the section ACL FORMAT
    4949.PP
    50 \-a|\-\-add acls
    51 .RS 4
    52 Add the ACLs specified to the ACL list\&. Existing access control entries are unchanged\&.
    53 .RE
    54 .PP
    55 \-M|\-\-modify acls
    56 .RS 4
    57 Modify the mask value (permissions) for the ACLs specified on the command line\&. An error will be printed for each ACL specified that was not already present in the ACL list
    58 .RE
    59 .PP
    60 \-D|\-\-delete acls
    61 .RS 4
    62 Delete any ACLs specified on the command line\&. An error will be printed for each ACL specified that was not already present in the ACL list\&.
    63 .RE
    64 .PP
    65 \-S|\-\-set acls
    66 .RS 4
    67 This command sets the ACLs on the file with only the ones specified on the command line\&. All other ACLs are erased\&. Note that the ACL specified must contain at least a revision, type, owner and group for the call to succeed\&.
     50\-a|\-\-add acl
     51.RS 4
     52Add the entries specified to the ACL\&. Existing access control entries are unchanged\&.
     53.RE
     54.PP
     55\-M|\-\-modify acl
     56.RS 4
     57Modify the mask value (permissions) for the ACEs specified on the command line\&. An error will be printed for each ACE specified that was not already present in the object\*(Aqs ACL\&.
     58.RE
     59.PP
     60\-D|\-\-delete acl
     61.RS 4
     62Delete any ACEs specified on the command line\&. An error will be printed for each ACE specified that was not already present in the object\*(Aqs ACL\&.
     63.RE
     64.PP
     65\-S|\-\-set acl
     66.RS 4
     67This command sets the ACL on the object with only what is specified on the command line\&. Any existing ACL is erased\&. Note that the ACL specified must contain at least a revision, type, owner and group for the call to succeed\&.
    6868.RE
    6969.PP
     
    9898.RE
    9999.PP
     100\-m|\-\-max\-protocol PROTOCOL_NAME
     101.RS 4
     102This allows the user to select the highest SMB protocol level that smbcacls will use to connect to the server\&. By default this is set to NT1, which is the highest available SMB1 protocol\&. To connect using SMB2 or SMB3 protocol, use the strings SMB2 or SMB3 respectively\&. Note that to connect to a Windows 2012 server with encrypted transport selecting a max\-protocol of SMB3 is required\&.
     103.RE
     104.PP
    100105\-t|\-\-test\-args
    101106.RS 4
     
    103108.RE
    104109.PP
    105 \-h|\-\-help
    106 .RS 4
    107 Print a summary of command line options\&.
    108 .RE
    109 .PP
    110 \-d|\-\-debuglevel=level
    111 .RS 4
    112 \fIlevel\fR
    113 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    114 .sp
    115 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    116 .sp
    117 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    118 .sp
    119 Note that specifying this parameter here will override the
    120 \m[blue]\fBlog level\fR\m[]
    121 parameter in the
    122 smb\&.conf
    123 file\&.
    124 .RE
    125 .PP
    126 \-V|\-\-version
    127 .RS 4
    128 Prints the program version number\&.
    129 .RE
    130 .PP
    131 \-s|\-\-configfile <configuration file>
    132 .RS 4
    133 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    134 smb\&.conf
    135 for more information\&. The default configuration file name is determined at compile time\&.
    136 .RE
    137 .PP
    138 \-l|\-\-log\-basename=logdirectory
    139 .RS 4
    140 Base directory name for log/debug files\&. The extension
    141 \fB"\&.progname"\fR
    142 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    143 .RE
    144 .PP
    145 \-N|\-\-no\-pass
    146 .RS 4
    147 If specified, this parameter suppresses the normal password prompt from the client to the user\&. This is useful when accessing a service that does not require a password\&.
    148 .sp
    149 Unless a password is specified on the command line or this parameter is specified, the client will request a password\&.
    150 .sp
    151 If a password is specified on the command line and this option is also defined the password on the command line will be silently ingnored and no password will be used\&.
    152 .RE
    153 .PP
    154 \-k|\-\-kerberos
    155 .RS 4
    156 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&.
    157 .RE
    158 .PP
    159 \-C|\-\-use\-ccache
    160 .RS 4
    161 Try to use the credentials cached by winbind\&.
    162 .RE
    163 .PP
    164 \-A|\-\-authentication\-file=filename
    165 .RS 4
    166 This option allows you to specify a file from which to read the username and password used in the connection\&. The format of the file is
    167 .sp
    168 .if n \{\
    169 .RS 4
    170 .\}
    171 .nf
    172 username = <value>
    173 password = <value>
    174 domain   = <value>
    175 .fi
    176 .if n \{\
    177 .RE
    178 .\}
    179 .sp
    180 Make certain that the permissions on the file restrict access from unwanted users\&.
    181 .RE
    182 .PP
    183 \-U|\-\-user=username[%password]
    184 .RS 4
    185 Sets the SMB username or username and password\&.
    186 .sp
    187 If %password is not specified, the user will be prompted\&. The client will first check the
    188 \fBUSER\fR
    189 environment variable, then the
    190 \fBLOGNAME\fR
    191 variable and if either exists, the string is uppercased\&. If these environmental variables are not found, the username
    192 \fBGUEST\fR
    193 is used\&.
    194 .sp
    195 A third option is to use a credentials file which contains the plaintext of the username and password\&. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables\&. If this method is used, make certain that the permissions on the file restrict access from unwanted users\&. See the
    196 \fI\-A\fR
    197 for more details\&.
    198 .sp
    199 Be cautious about including passwords in scripts\&. Also, on many systems the command line of a running process may be seen via the
    200 ps
    201 command\&. To be safe always allow
    202 rpcclient
    203 to prompt for a password and type it in directly\&.
     110\-\-query\-security\-info FLAGS
     111.RS 4
     112The security\-info flags for queries\&.
     113.RE
     114.PP
     115\-\-set\-security\-info FLAGS
     116.RS 4
     117The security\-info flags for queries\&.
     118.RE
     119.PP
     120\-\-sddl
     121.RS 4
     122Output and input acls in sddl format\&.
     123.RE
     124.PP
     125\-\-domain\-sid SID
     126.RS 4
     127SID used for sddl processing\&.
    204128.RE
    205129.SH "ACL FORMAT"
    206130.PP
    207 The format of an ACL is one or more ACL entries separated by either commas or newlines\&. An ACL entry is one of the following:
     131The format of an ACL is one or more entries separated by either commas or newlines\&. An ACL entry is one of the following:
    208132.PP
    209133.if n \{\
     
    225149The owner and group specify the owner and group sids for the object\&. If a SID in the format S\-1\-x\-y\-z is specified this is used, otherwise the name specified is resolved using the server on which the file or directory resides\&.
    226150.PP
    227 ACLs specify permissions granted to the SID\&. This SID again can be specified in S\-1\-x\-y\-z format or as a name in which case it is resolved against the server on which the file or directory resides\&. The type, flags and mask values determine the type of access granted to the SID\&.
    228 .PP
    229 The type can be either ALLOWED or DENIED to allow/deny access to the SID\&. The flags values are generally zero for file ACLs and either 9 or 2 for directory ACLs\&. Some common flags are:
     151ACEs are specified with an "ACL:" prefix, and define permissions granted to an SID\&. The SID again can be specified in S\-1\-x\-y\-z format or as a name in which case it is resolved against the server on which the file or directory resides\&. The type, flags and mask values determine the type of access granted to the SID\&.
     152.PP
     153The type can be either ALLOWED or DENIED to allow/deny access to the SID\&. The flags values are generally zero for file ACEs and either 9 or 2 for directory ACEs\&. Some common flags are:
    230154.sp
    231155.RS 4
     
    275199.RE
    276200.PP
    277 At present flags can only be specified as decimal or hexadecimal values\&.
     201At present, flags can only be specified as decimal or hexadecimal values\&.
    278202.PP
    279203The mask is a value which expresses the access right granted to the SID\&. It can be given as a decimal or hexadecimal value, or by using one of the following text strings which map to the NT file permissions of the same name\&.
     
    401325.SH "VERSION"
    402326.PP
    403 This man page is correct for version 3 of the Samba suite\&.
     327This man page is correct for version 4 of the Samba suite\&.
    404328.SH "AUTHOR"
    405329.PP
  • vendor/current/docs/manpages/smbclient.1

    r860 r988  
    22.\"     Title: smbclient
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMBCLIENT" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "SMBCLIENT" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 smbclient [\-b\ <buffer\ size>] [\-d\ debuglevel] [\-e] [\-L\ <netbios\ name>] [\-U\ username] [\-I\ destinationIP] [\-M\ <netbios\ name>] [\-m\ maxprotocol] [\-A\ authfile] [\-N] [\-C] [\-g] [\-i\ scope] [\-O\ <socket\ options>] [\-p\ port] [\-R\ <name\ resolve\ order>] [\-s\ <smb\ config\ file>] [\-k] [\-P] [\-c\ <command>]
     34smbclient [\-b\ <buffer\ size>] [\-d\ debuglevel] [\-e] [\-L\ <netbios\ name>] [\-U\ username] [\-I\ destinationIP] [\-M\ <netbios\ name>] [\-m\ maxprotocol] [\-A\ authfile] [\-N] [\-C] [\-g] [\-i\ scope] [\-O\ <socket\ options>] [\-p\ port] [\-R\ <name\ resolve\ order>] [\-s\ <smb\ config\ file>] [\-t\ <per\-operation\ timeout\ in\ seconds>] [\-k] [\-P] [\-c\ <command>]
    3535.HP \w'\ 'u
    36 smbclient {servicename} [password] [\-b\ <buffer\ size>] [\-d\ debuglevel] [\-e] [\-D\ Directory] [\-U\ username] [\-W\ workgroup] [\-M\ <netbios\ name>] [\-m\ maxprotocol] [\-A\ authfile] [\-N] [\-C] [\-g] [\-l\ log\-basename] [\-I\ destinationIP] [\-E] [\-c\ <command\ string>] [\-i\ scope] [\-O\ <socket\ options>] [\-p\ port] [\-R\ <name\ resolve\ order>] [\-s\ <smb\ config\ file>] [\-T<c|x>IXFqgbNan] [\-k]
     36smbclient {servicename} [password] [\-b\ <buffer\ size>] [\-d\ debuglevel] [\-e] [\-D\ Directory] [\-U\ username] [\-W\ workgroup] [\-M\ <netbios\ name>] [\-m\ maxprotocol] [\-A\ authfile] [\-N] [\-C] [\-g] [\-l\ log\-basename] [\-I\ destinationIP] [\-E] [\-c\ <command\ string>] [\-i\ scope] [\-O\ <socket\ options>] [\-p\ port] [\-R\ <name\ resolve\ order>] [\-s\ <smb\ config\ file>] [\-t\ <per\-operation\ timeout\ in\ seconds>] [\-T<c|x>IXFqgbNan] [\-k]
    3737.SH "DESCRIPTION"
    3838.PP
     
    198198\-m|\-\-max\-protocol protocol
    199199.RS 4
    200 This parameter sets the maximum protocol version announced by the client\&.
     200This allows the user to select the highest SMB protocol level that smbclient will use to connect to the server\&. By default this is set to NT1, which is the highest available SMB1 protocol\&. To connect using SMB2 or SMB3 protocol, use the strings SMB2 or SMB3 respectively\&. Note that to connect to a Windows 2012 server with encrypted transport selecting a max\-protocol of SMB3 is required\&.
    201201.RE
    202202.PP
     
    204204.RS 4
    205205Make queries to the external server using the machine account of the local server\&.
    206 .RE
    207 .PP
    208 \-h|\-\-help
    209 .RS 4
    210 Print a summary of command line options\&.
    211206.RE
    212207.PP
     
    241236\-b|\-\-send\-buffer buffersize
    242237.RS 4
    243 This option changes the transmit/send buffer size when getting or putting a file from/to the server\&. The default is 65520 bytes\&. Setting this value smaller (to 1200 bytes) has been observed to speed up file transfers to and from a Win9x server\&.
    244 .RE
    245 .PP
    246 \-e|\-\-encrypt
    247 .RS 4
    248 This command line parameter requires the remote server support the UNIX extensions\&. Request that the connection be encrypted\&. This is new for Samba 3\&.2 and will only work with Samba 3\&.2 or above servers\&. Negotiates SMB encryption using GSSAPI\&. Uses the given credentials for the encryption negotiation (either kerberos or NTLMv1/v2 if given domain/username/password triple\&. Fails the connection if encryption cannot be negotiated\&.
    249 .RE
    250 .PP
    251 \-d|\-\-debuglevel=level
    252 .RS 4
    253 \fIlevel\fR
    254 is an integer from 0 to 10\&. The default value if this parameter is not specified is 1\&.
    255 .sp
    256 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    257 .sp
    258 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    259 .sp
    260 Note that specifying this parameter here will override the
    261 \m[blue]\fBlog level\fR\m[]
    262 parameter in the
    263 smb\&.conf
    264 file\&.
    265 .RE
    266 .PP
    267 \-V|\-\-version
    268 .RS 4
    269 Prints the program version number\&.
    270 .RE
    271 .PP
    272 \-s|\-\-configfile <configuration file>
    273 .RS 4
    274 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    275 smb\&.conf
    276 for more information\&. The default configuration file name is determined at compile time\&.
    277 .RE
    278 .PP
    279 \-l|\-\-log\-basename=logdirectory
    280 .RS 4
    281 Base directory name for log/debug files\&. The extension
    282 \fB"\&.progname"\fR
    283 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    284 .RE
    285 .PP
    286 \-N|\-\-no\-pass
    287 .RS 4
    288 If specified, this parameter suppresses the normal password prompt from the client to the user\&. This is useful when accessing a service that does not require a password\&.
    289 .sp
    290 Unless a password is specified on the command line or this parameter is specified, the client will request a password\&.
    291 .sp
    292 If a password is specified on the command line and this option is also defined the password on the command line will be silently ingnored and no password will be used\&.
    293 .RE
    294 .PP
    295 \-k|\-\-kerberos
    296 .RS 4
    297 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&.
    298 .RE
    299 .PP
    300 \-C|\-\-use\-ccache
    301 .RS 4
    302 Try to use the credentials cached by winbind\&.
    303 .RE
    304 .PP
    305 \-A|\-\-authentication\-file=filename
    306 .RS 4
    307 This option allows you to specify a file from which to read the username and password used in the connection\&. The format of the file is
    308 .sp
    309 .if n \{\
    310 .RS 4
    311 .\}
    312 .nf
    313 username = <value>
    314 password = <value>
    315 domain   = <value>
    316 .fi
    317 .if n \{\
    318 .RE
    319 .\}
    320 .sp
    321 Make certain that the permissions on the file restrict access from unwanted users\&.
    322 .RE
    323 .PP
    324 \-U|\-\-user=username[%password]
    325 .RS 4
    326 Sets the SMB username or username and password\&.
    327 .sp
    328 If %password is not specified, the user will be prompted\&. The client will first check the
    329 \fBUSER\fR
    330 environment variable, then the
    331 \fBLOGNAME\fR
    332 variable and if either exists, the string is uppercased\&. If these environmental variables are not found, the username
    333 \fBGUEST\fR
    334 is used\&.
    335 .sp
    336 A third option is to use a credentials file which contains the plaintext of the username and password\&. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables\&. If this method is used, make certain that the permissions on the file restrict access from unwanted users\&. See the
    337 \fI\-A\fR
    338 for more details\&.
    339 .sp
    340 Be cautious about including passwords in scripts\&. Also, on many systems the command line of a running process may be seen via the
    341 ps
    342 command\&. To be safe always allow
    343 rpcclient
    344 to prompt for a password and type it in directly\&.
    345 .RE
    346 .PP
    347 \-n|\-\-netbiosname <primary NetBIOS name>
    348 .RS 4
    349 This option allows you to override the NetBIOS name that Samba uses for itself\&. This is identical to setting the
    350 \m[blue]\fBnetbios name\fR\m[]
    351 parameter in the
    352 smb\&.conf
    353 file\&. However, a command line setting will take precedence over settings in
    354 smb\&.conf\&.
    355 .RE
    356 .PP
    357 \-i|\-\-scope <scope>
    358 .RS 4
    359 This specifies a NetBIOS scope that
    360 nmblookup
    361 will use to communicate with when generating NetBIOS names\&. For details on the use of NetBIOS scopes, see rfc1001\&.txt and rfc1002\&.txt\&. NetBIOS scopes are
    362 \fIvery\fR
    363 rarely used, only set this parameter if you are the system administrator in charge of all the NetBIOS systems you communicate with\&.
    364 .RE
    365 .PP
    366 \-W|\-\-workgroup=domain
    367 .RS 4
    368 Set the SMB domain of the username\&. This overrides the default domain which is the domain defined in smb\&.conf\&. If the domain specified is the same as the servers NetBIOS name, it causes the client to log on using the servers local SAM (as opposed to the Domain SAM)\&.
    369 .RE
    370 .PP
    371 \-O|\-\-socket\-options socket options
    372 .RS 4
    373 TCP socket options to set on the client socket\&. See the socket options parameter in the
    374 smb\&.conf
    375 manual page for the list of valid options\&.
     238When sending or receiving files, smbclient uses an internal buffer sized by the maximum number of allowed requests to the connected server\&. This command allows this size to be set to any range between 0 (which means use the default server controlled size) bytes and 16776960 (0xFFFF00) bytes\&. Using the server controlled size is the most efficient as smbclient will pipeline as many simultaneous reads or writes needed to keep the server as busy as possible\&. Setting this to any other size will slow down the transfer\&. This can also be set using the
     239iosize
     240command inside smbclient\&.
     241.RE
     242.PP
     243\-B|\-\-browse
     244.RS 4
     245Browse SMB servers using DNS\&.
     246.RE
     247.PP
     248\-t|\-\-timeout <timeout\-seconds>
     249.RS 4
     250This allows the user to tune the default timeout used for each SMB request\&. The default setting is 20 seconds\&. Increase it if requests to the server sometimes time out\&. This can happen when SMB3 encryption is selected and smbclient is overwhelming the server with requests\&. This can also be set using the
     251timeout
     252command inside smbclient\&.
    376253.RE
    377254.PP
     
    380257smbclient may be used to create
    381258tar(1)
    382 compatible backups of all the files on an SMB/CIFS share\&. The secondary tar flags that can be given to this option are :
     259compatible backups of all the files on an SMB/CIFS share\&. The secondary tar flags that can be given to this option are:
    383260.sp
    384261.RS 4
     
    391268.\}
    392269\fIc\fR
    393 \- Create a tar file on UNIX\&. Must be followed by the name of a tar file, tape device or "\-" for standard output\&. If using standard output you must turn the log level to its lowest value \-d0 to avoid corrupting your tar file\&. This flag is mutually exclusive with the
     270\- Create a tar backup archive on the local system\&. Must be followed by the name of a tar file, tape device or "\-" for standard output\&. If using standard output you must turn the log level to its lowest value \-d0 to avoid corrupting your tar file\&. This flag is mutually exclusive with the
    394271\fIx\fR
    395272flag\&.
     
    433310.\}
    434311\fIX\fR
    435 \- Exclude files and directories\&. Causes files to be excluded from an extract or create\&. See example below\&. Filename globbing works in one of two ways now\&. See
     312\- Exclude files and directories\&. Causes files to be excluded from an extract or create\&. See example below\&. Filename globbing works in one of two ways\&. See
    436313\fIr\fR
    437314below\&.
     
    463340.\}
    464341\fIb\fR
    465 \- Blocksize\&. Must be followed by a valid (greater than zero) blocksize\&. Causes tar file to be written out in blocksize*TBLOCK (usually 512 byte) blocks\&.
     342\- Blocksize\&. Must be followed by a valid (greater than zero) blocksize\&. Causes tar file to be written out in blocksize*TBLOCK (512 byte) blocks\&.
    466343.RE
    467344.sp
     
    501378.\}
    502379\fIr\fR
    503 \- Regular expression include or exclude\&. Uses regular expression matching for excluding or excluding files if compiled with HAVE_REGEX_H\&. However this mode can be very slow\&. If not compiled with HAVE_REGEX_H, does a limited wildcard match on \*(Aq*\*(Aq and \*(Aq?\*(Aq\&.
     380\- Use wildcard matching to include or exclude\&. Deprecated\&.
    504381.RE
    505382.sp
     
    564441Create the same tar file as above, but now use a DOS path name\&.
    565442.sp
    566 smbclient //mypc/myshare "" \-N \-tc backup\&.tar users\eedocs
     443smbclient //mypc/myshare "" \-N \-Tc backup\&.tar users\eedocs
    567444.sp
    568445Create a tar file of the files listed in the file
     
    636513.RS 4
    637514Sets the archive level when operating on files\&. 0 means ignore the archive bit, 1 means only operate on files with this bit set, 2 means only operate on files with this bit set and reset it after operation, 3 means operate on all files and reset it after operation\&. The default is 0\&.
     515.RE
     516.PP
     517backup
     518.RS 4
     519Toggle the state of the "backup intent" flag sent to the server on directory listings and file opens\&. If the "backup intent" flag is true, the server will try and bypass some file system checks if the user has been granted SE_BACKUP or SE_RESTORE privileges\&. This state is useful when performing a backup or restore operation\&.
    638520.RE
    639521.PP
     
    736618iosize <bytes>
    737619.RS 4
    738 When sending or receiving files, smbclient uses an internal memory buffer by default of size 64512 bytes\&. This command allows this size to be set to any range between 16384 (0x4000) bytes and 16776960 (0xFFFF00) bytes\&. Larger sizes may mean more efficient data transfer as smbclient will try and use the most efficient read and write calls for the connected server\&.
     620When sending or receiving files, smbclient uses an internal buffer sized by the maximum number of allowed requests to the connected server\&. This command allows this size to be set to any range between 0 (which means use the default server controlled size) bytes and 16776960 (0xFFFF00) bytes\&. Using the server controlled size is the most efficient as smbclient will pipeline as many simultaneous reads or writes needed to keep the server as busy as possible\&. Setting this to any other size will slow down the transfer\&.
    739621.RE
    740622.PP
     
    766648.RS 4
    767649Establishes a new vuid for this session by logging on again\&. Replaces the current vuid\&. Prints out the new vuid\&. Used for internal Samba testing purposes\&.
     650.RE
     651.PP
     652logoff
     653.RS 4
     654Logs the user off the server, closing the session\&. Used for internal Samba testing purposes\&.
    768655.RE
    769656.PP
     
    830717smbclient
    831718are binary\&.
     719.RE
     720.PP
     721notify <dir name>
     722.RS 4
     723Query a directory for change notifications\&. This command issues a recursive filechangenotify call for all possible changes\&. As changes come in will print one line per change\&. See
     724https://msdn\&.microsoft\&.com/en\-us/library/dn392331\&.aspx
     725for a description of the action numbers that this command prints\&.
     726.sp
     727This command never ends, it waits for event indefinitely\&.
    832728.RE
    833729.PP
     
    933829.RE
    934830.PP
     831scopy <source filename> <destination filename>
     832.RS 4
     833Attempt to copy a file on the server using the most efficient server\-side copy calls\&. Falls back to using read then write if server doesn\*(Aqt support server\-side copy\&.
     834.RE
     835.PP
    935836setmode <filename> <perm=[+|\e\-]rsha>
    936837.RS 4
     
    960861.RS 4
    961862Performs a tar operation \- see the
    962 \fI\-T \fR
     863\fI\-T\fR
    963864command line option above\&. Behavior may be affected by the tarmode command (see below)\&. Using g (incremental) and N (newer) will affect tarmode settings\&. Note that using the "\-" option with tar x may not work \- use the command line option instead\&.
    964865.RE
     
    967868.RS 4
    968869Blocksize\&. Must be followed by a valid (greater than zero) blocksize\&. Causes tar file to be written out in
    969 \fIblocksize\fR*TBLOCK (usually 512 byte) blocks\&.
    970 .RE
    971 .PP
    972 tarmode <full|inc|reset|noreset>
    973 .RS 4
    974 Changes tar\*(Aqs behavior with regard to archive bits\&. In full mode, tar will back up everything regardless of the archive bit setting (this is the default mode)\&. In incremental mode, tar will only back up files with the archive bit set\&. In reset mode, tar will reset the archive bit on all files it backs up (implies read/write share)\&.
     870\fIblocksize\fR*TBLOCK (512 byte) blocks\&.
     871.RE
     872.PP
     873tarmode <full|inc|reset|noreset|system|nosystem|hidden|nohidden>
     874.RS 4
     875Changes tar\*(Aqs behavior with regard to DOS attributes\&. There are 4 modes which can be turned on or off\&.
     876.sp
     877Incremental mode (default off)\&. When off (using
     878full) tar will back up everything regardless of the
     879\fIarchive\fR
     880bit setting\&. When on (using
     881inc), tar will only back up files with the archive bit set\&.
     882.sp
     883Reset mode (default off)\&. When on (using
     884reset), tar will remove the archive bit on all files it backs up (implies read/write share)\&. Use
     885noreset
     886to turn off\&.
     887.sp
     888System mode (default on)\&. When off, tar will not backup system files\&. Use
     889nosystem
     890to turn off\&.
     891.sp
     892Hidden mode (default on)\&. When off, tar will not backup hidden files\&. Use
     893nohidden
     894to turn off\&.
     895.RE
     896.PP
     897timeout <per\-operation timeout in seconds>
     898.RS 4
     899This allows the user to tune the default timeout used for each SMB request\&. The default setting is 20 seconds\&. Increase it if requests to the server sometimes time out\&. This can happen when SMB3 encryption is selected and smbclient is overwhelming the server with requests\&.
    975900.RE
    976901.PP
     
    988913.RS 4
    989914Changes the currently used vuid in the protocol to the given arbitrary number\&. Without an argument prints out the current vuid being used\&. Used for internal Samba testing purposes\&.
     915.RE
     916.PP
     917tcon <sharename>
     918.RS 4
     919Establishes a new tree connect (connection to a share)\&. Replaces the current tree connect\&. Prints the new tid (tree id)\&. Used for internal Samba testing purposes\&.
     920.RE
     921.PP
     922tdis
     923.RS 4
     924Close the current share connection (tree disconnect)\&. Used for internal Samba testing purposes\&.
     925.RE
     926.PP
     927tid <number>
     928.RS 4
     929Changes the current tree id (tid) in the protocol to a new arbitrary number\&. Without an argument, it prints out the tid currently used\&. Used for internal Samba testing purposes\&.
    990930.RE
    991931.SH "NOTES"
  • vendor/current/docs/manpages/smbcontrol.1

    r860 r988  
    22.\"     Title: smbcontrol
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMBCONTROL" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "SMBCONTROL" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 smbcontrol [\-i] [\-s]
     34smbcontrol [\-s] [\-t|\-\-timeout]
    3535.HP \w'\ 'u
    3636smbcontrol [destination] [message\-type] [parameter]
     
    4949.SH "OPTIONS"
    5050.PP
    51 \-h|\-\-help
    52 .RS 4
    53 Print a summary of command line options\&.
    54 .RE
    55 .PP
    56 \-s|\-\-configfile <configuration file>
    57 .RS 4
    58 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    59 smb\&.conf
    60 for more information\&. The default configuration file name is determined at compile time\&.
    61 .RE
    62 .PP
    63 \-i
    64 .RS 4
    65 Run interactively\&. Individual commands of the form destination message\-type parameters can be entered on STDIN\&. An empty command line or a "q" will quit the program\&.
     51\-t|\-\-timeout
     52.RS 4
     53Set timeout to seconds\&.
    6654.RE
    6755.PP
     
    7058One of
    7159\fInmbd\fR,
    72 \fIsmbd\fR
     60\fIsmbd\fR,
     61\fIwinbindd\fR
    7362or a process ID\&.
    7463.sp
     
    124113.RE
    125114.PP
     115kill\-client\-ip
     116.RS 4
     117Order smbd to close the client connections from a given IP address\&. This message\-type takes an argument of the IP address from which client connections will be closed\&. This message can only be sent to
     118\fBsmbd\fR\&.
     119.RE
     120.PP
    126121force\-election
    127122.RS 4
     
    184179This message can only be sent to
    185180\fBsmbd\fR\&.
    186 .RE
    187 .PP
    188 samsync
    189 .RS 4
    190 Order smbd to synchronise sam database from PDC (being BDC)\&. Can only be sent to
    191 \fBsmbd\fR\&.
    192 .if n \{\
    193 .sp
    194 .\}
    195 .RS 4
    196 .it 1 an-trap
    197 .nr an-no-space-flag 1
    198 .nr an-break-flag 1
    199 .br
    200 .ps +1
    201 \fBNote\fR
    202 .ps -1
    203 .br
    204 Not working at the moment
    205 .sp .5v
    206 .RE
    207 .RE
    208 .PP
    209 samrepl
    210 .RS 4
    211 Send sam replication message, with specified serial\&. Can only be sent to
    212 \fBsmbd\fR\&. Should not be used manually\&.
    213181.RE
    214182.PP
     
    246214.RE
    247215.PP
     216reload\-printers
     217.RS 4
     218Force smbd to reload printers\&. Can only be sent to
     219\fBsmbd\fR\&.
     220.RE
     221.PP
    248222idmap
    249223.RS 4
     
    270244.RE
    271245.RE
     246.PP
     247num\-children
     248.RS 4
     249Query the number of smbd child processes\&. This message can only be sent to
     250\fBsmbd\fR\&.
     251.RE
    272252.SH "VERSION"
    273253.PP
  • vendor/current/docs/manpages/smbcquotas.1

    r860 r988  
    22.\"     Title: smbcquotas
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMBCQUOTAS" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "SMBCQUOTAS" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 smbcquotas {//server/share} [\-u\ user] [\-L] [\-F] [\-S\ QUOTA_SET_COMMAND] [\-n] [\-t] [\-v] [\-d\ debuglevel] [\-s\ configfile] [\-l\ logdir] [\-V] [\-U\ username] [\-N] [\-k] [\-A]
     34smbcquotas {//server/share} [\-u|\-\-user\ user] [\-L|\-\-list] [\-F|\-\-fs] [\-S|\-\-set\ QUOTA_SET_COMMAND] [\-n|\-\-numeric] [\-t|\-\-test\-args] [\-v|\-\-verbose] [\-d\ debuglevel] [\-s\ configfile] [\-l\ logdir] [\-V] [\-U\ username] [\-N] [\-k] [\-A]
    3535.SH "DESCRIPTION"
    3636.PP
     
    4848program\&.
    4949.PP
    50 \-u user
     50\-u|\-\-user user
    5151.RS 4
    5252Specifies the user of whom the quotas are get or set\&. By default the current user\*(Aqs username will be used\&.
    5353.RE
    5454.PP
    55 \-L
     55\-L|\-\-list
    5656.RS 4
    5757Lists all quota records of the share\&.
    5858.RE
    5959.PP
    60 \-F
     60\-F|\-\-fs
    6161.RS 4
    6262Show the share quota status and default limits\&.
    6363.RE
    6464.PP
    65 \-S QUOTA_SET_COMMAND
     65\-S|\-\-set QUOTA_SET_COMMAND
    6666.RS 4
    6767This command sets/modifies quotas for a user or on the share, depending on the QUOTA_SET_COMMAND parameter which is described later\&.
    6868.RE
    6969.PP
    70 \-n
     70\-n|\-\-numeric
    7171.RS 4
    7272This option displays all QUOTA information in numeric format\&. The default is to convert SIDs to names and QUOTA limits to a readable string format\&.
    7373.RE
    7474.PP
    75 \-t
     75\-t|\-\-test\-args
    7676.RS 4
    7777Don\*(Aqt actually do anything, only validate the correctness of the arguments\&.
    7878.RE
    7979.PP
    80 \-v
     80\-v|\-\-verbose
    8181.RS 4
    8282Be verbose\&.
    83 .RE
    84 .PP
    85 \-h|\-\-help
    86 .RS 4
    87 Print a summary of command line options\&.
    88 .RE
    89 .PP
    90 \-d|\-\-debuglevel=level
    91 .RS 4
    92 \fIlevel\fR
    93 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    94 .sp
    95 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    96 .sp
    97 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    98 .sp
    99 Note that specifying this parameter here will override the
    100 \m[blue]\fBlog level\fR\m[]
    101 parameter in the
    102 smb\&.conf
    103 file\&.
    104 .RE
    105 .PP
    106 \-V|\-\-version
    107 .RS 4
    108 Prints the program version number\&.
    109 .RE
    110 .PP
    111 \-s|\-\-configfile <configuration file>
    112 .RS 4
    113 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    114 smb\&.conf
    115 for more information\&. The default configuration file name is determined at compile time\&.
    116 .RE
    117 .PP
    118 \-l|\-\-log\-basename=logdirectory
    119 .RS 4
    120 Base directory name for log/debug files\&. The extension
    121 \fB"\&.progname"\fR
    122 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    123 .RE
    124 .PP
    125 \-N|\-\-no\-pass
    126 .RS 4
    127 If specified, this parameter suppresses the normal password prompt from the client to the user\&. This is useful when accessing a service that does not require a password\&.
    128 .sp
    129 Unless a password is specified on the command line or this parameter is specified, the client will request a password\&.
    130 .sp
    131 If a password is specified on the command line and this option is also defined the password on the command line will be silently ingnored and no password will be used\&.
    132 .RE
    133 .PP
    134 \-k|\-\-kerberos
    135 .RS 4
    136 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&.
    137 .RE
    138 .PP
    139 \-C|\-\-use\-ccache
    140 .RS 4
    141 Try to use the credentials cached by winbind\&.
    142 .RE
    143 .PP
    144 \-A|\-\-authentication\-file=filename
    145 .RS 4
    146 This option allows you to specify a file from which to read the username and password used in the connection\&. The format of the file is
    147 .sp
    148 .if n \{\
    149 .RS 4
    150 .\}
    151 .nf
    152 username = <value>
    153 password = <value>
    154 domain   = <value>
    155 .fi
    156 .if n \{\
    157 .RE
    158 .\}
    159 .sp
    160 Make certain that the permissions on the file restrict access from unwanted users\&.
    161 .RE
    162 .PP
    163 \-U|\-\-user=username[%password]
    164 .RS 4
    165 Sets the SMB username or username and password\&.
    166 .sp
    167 If %password is not specified, the user will be prompted\&. The client will first check the
    168 \fBUSER\fR
    169 environment variable, then the
    170 \fBLOGNAME\fR
    171 variable and if either exists, the string is uppercased\&. If these environmental variables are not found, the username
    172 \fBGUEST\fR
    173 is used\&.
    174 .sp
    175 A third option is to use a credentials file which contains the plaintext of the username and password\&. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables\&. If this method is used, make certain that the permissions on the file restrict access from unwanted users\&. See the
    176 \fI\-A\fR
    177 for more details\&.
    178 .sp
    179 Be cautious about including passwords in scripts\&. Also, on many systems the command line of a running process may be seen via the
    180 ps
    181 command\&. To be safe always allow
    182 rpcclient
    183 to prompt for a password and type it in directly\&.
    18483.RE
    18584.SH "QUOTA_SET_COMMAND"
  • vendor/current/docs/manpages/smbd.8

    r860 r988  
    22.\"     Title: smbd
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMBD" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "SMBD" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 smbd [\-D] [\-F] [\-S] [\-i] [\-h] [\-V] [\-b] [\-d\ <debug\ level>] [\-l\ <log\ directory>] [\-p\ <port\ number(s)>] [\-P\ <profiling\ level>] [\-O\ <socket\ option>] [\-s\ <configuration\ file>]
     34smbd [\-D|\-\-daemon] [\-F|\-\-foreground] [\-S|\-\-log\-stdout] [\-i|\-\-interactive] [\-V] [\-b|\-\-build\-options] [\-d\ <debug\ level>] [\-l|\-\-log\-basename\ <log\ directory>] [\-p\ <port\ number(s)>] [\-P\ <profiling\ level>] [\-s\ <configuration\ file>] [\-\-no\-process\-group]
    3535.SH "DESCRIPTION"
    3636.PP
     
    5656.SH "OPTIONS"
    5757.PP
    58 \-D
     58\-D|\-\-daemon
    5959.RS 4
    6060If specified, this parameter causes the server to operate as a daemon\&. That is, it detaches itself and runs in the background, fielding requests on the appropriate port\&. Operating the server as a daemon is the recommended way of running
     
    6565.RE
    6666.PP
    67 \-F
     67\-F|\-\-foreground
    6868.RS 4
    6969If specified, this parameter causes the main
     
    8080.RE
    8181.PP
    82 \-S
     82\-S|\-\-log\-stdout
    8383.RS 4
    8484If specified, this parameter causes
     
    8787.RE
    8888.PP
    89 \-i
     89\-i|\-\-interactive
    9090.RS 4
    9191If this parameter is specified it causes the server to run "interactively", not as a daemon, even if the server is executed on the command line of a shell\&. Setting this parameter negates the implicit daemon mode when run from the command line\&.
    9292smbd
    93 also logs to standard output, as if the
     93will only accept one connection and terminate\&. It will also log to standard output, as if the
    9494\-S
    9595parameter had been given\&.
    9696.RE
    9797.PP
    98 \-d|\-\-debuglevel=level
    99 .RS 4
    100 \fIlevel\fR
    101 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    102 .sp
    103 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    104 .sp
    105 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    106 .sp
    107 Note that specifying this parameter here will override the
    108 \m[blue]\fBlog level\fR\m[]
    109 parameter in the
    110 smb\&.conf
    111 file\&.
    112 .RE
    113 .PP
    114 \-V|\-\-version
    115 .RS 4
    116 Prints the program version number\&.
    117 .RE
    118 .PP
    119 \-s|\-\-configfile <configuration file>
    120 .RS 4
    121 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    122 smb\&.conf
    123 for more information\&. The default configuration file name is determined at compile time\&.
    124 .RE
    125 .PP
    126 \-l|\-\-log\-basename=logdirectory
    127 .RS 4
    128 Base directory name for log/debug files\&. The extension
    129 \fB"\&.progname"\fR
    130 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    131 .RE
    132 .PP
    133 \-h|\-\-help
    134 .RS 4
    135 Print a summary of command line options\&.
    136 .RE
    137 .PP
    138 \-b
     98\-\-no\-process\-group
     99.RS 4
     100Do not create a new process group for smbd\&.
     101.RE
     102.PP
     103\-b|\-\-build\-options
    139104.RS 4
    140105Prints information about how Samba was built\&.
     
    147112\m[blue]\fBports\fR\m[]
    148113parameter in
    149 smb\&.conf
    150114.sp
    151115The default ports are 139 (used for SMB over NetBIOS over TCP) and port 445 (used for plain SMB over TCP)\&.
     
    208172.PP
    209173Samba uses PAM for authentication (when presented with a plaintext password), for account checking (is this account disabled?) and for session management\&. The degree too which samba supports PAM is restricted by the limitations of the SMB protocol and the
    210 \m[blue]\fBobey pam restrictions\fR\m[]
    211 \fBsmb.conf\fR(5)
     174\m[blue]\fBobey pam restrictions\fR\m[]\fBsmb.conf\fR(5)
    212175parameter\&. When this is set, the following restrictions apply:
    213176.sp
     
    265228.RE
    266229.PP
    267 connections\&.tdb
     230gencache\&.tdb
     231.RS 4
     232generic caching db
     233.RE
     234.PP
     235group_mapping\&.tdb*
     236.RS 4
     237group mapping information
     238.RE
     239.PP
     240locking\&.tdb
     241.RS 4
     242share modes & oplocks
     243.RE
     244.PP
     245login_cache\&.tdb*
     246.RS 4
     247bad pw attempts
     248.RE
     249.PP
     250messages\&.tdb
     251.RS 4
     252Samba messaging system
     253.RE
     254.PP
     255netsamlogon_cache\&.tdb*
     256.RS 4
     257cache of user net_info_3 struct from net_samlogon() request (as a domain member)
     258.RE
     259.PP
     260ntdrivers\&.tdb*
     261.RS 4
     262installed printer drivers
     263.RE
     264.PP
     265ntforms\&.tdb*
     266.RS 4
     267installed printer forms
     268.RE
     269.PP
     270ntprinters\&.tdb*
     271.RS 4
     272installed printer information
     273.RE
     274.PP
     275printing/
     276.RS 4
     277directory containing tdb per print queue of cached lpq output
     278.RE
     279.PP
     280registry\&.tdb
     281.RS 4
     282Windows registry skeleton (connect via regedit\&.exe)
     283.RE
     284.PP
     285smbXsrv_session_global\&.tdb
     286.RS 4
     287session information (e\&.g\&. support for \*(Aqutmp = yes\*(Aq)
     288.RE
     289.PP
     290smbXsrv_tcon_global\&.tdb
    268291.RS 4
    269292share connections (used to enforce max connections, etc\&.\&.\&.)
    270293.RE
    271294.PP
    272 gencache\&.tdb
    273 .RS 4
    274 generic caching db
    275 .RE
    276 .PP
    277 group_mapping\&.tdb*
    278 .RS 4
    279 group mapping information
    280 .RE
    281 .PP
    282 locking\&.tdb
    283 .RS 4
    284 share modes & oplocks
    285 .RE
    286 .PP
    287 login_cache\&.tdb*
    288 .RS 4
    289 bad pw attempts
    290 .RE
    291 .PP
    292 messages\&.tdb
    293 .RS 4
    294 Samba messaging system
    295 .RE
    296 .PP
    297 netsamlogon_cache\&.tdb*
    298 .RS 4
    299 cache of user net_info_3 struct from net_samlogon() request (as a domain member)
    300 .RE
    301 .PP
    302 ntdrivers\&.tdb*
    303 .RS 4
    304 installed printer drivers
    305 .RE
    306 .PP
    307 ntforms\&.tdb*
    308 .RS 4
    309 installed printer forms
    310 .RE
    311 .PP
    312 ntprinters\&.tdb*
    313 .RS 4
    314 installed printer information
    315 .RE
    316 .PP
    317 printing/
    318 .RS 4
    319 directory containing tdb per print queue of cached lpq output
    320 .RE
    321 .PP
    322 registry\&.tdb
    323 .RS 4
    324 Windows registry skeleton (connect via regedit\&.exe)
    325 .RE
    326 .PP
    327 sessionid\&.tdb
    328 .RS 4
    329 session information (e\&.g\&. support for \*(Aqutmp = yes\*(Aq)
     295smbXsrv_open_global\&.tdb
     296.RS 4
     297open file handles (used durable handles, etc\&.\&.\&.)
    330298.RE
    331299.PP
     
    360328smbd
    361329process it is recommended that
    362 SIGKILL (\-9)
    363 \fINOT\fR
     330SIGKILL (\-9)\fINOT\fR
    364331be used, except as a last resort, as this may leave the shared memory area in an inconsistent state\&. The safe way to terminate an
    365332smbd
     
    383350\fBsmb.conf\fR(5),
    384351\fBsmbclient\fR(1),
    385 \fBtestparm\fR(1),
    386 \fBtestprns\fR(1), and the Internet RFC\*(Aqs
     352\fBtestparm\fR(1), and the Internet RFC\*(Aqs
    387353rfc1001\&.txt,
    388354rfc1002\&.txt\&. In addition the CIFS (formerly SMB) specification is available as a link from the Web page
  • vendor/current/docs/manpages/smbget.1

    r860 r988  
    22.\"     Title: smbget
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMBGET" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "SMBGET" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 smbget [\-a,\ \-\-guest] [\-r,\ \-\-resume] [\-R,\ \-\-recursive] [\-u,\ \-\-username=STRING] [\-p,\ \-\-password=STRING] [\-w,\ \-\-workgroup=STRING] [\-n,\ \-\-nonprompt] [\-d,\ \-\-debuglevel=INT] [\-D,\ \-\-dots] [\-P,\ \-\-keep\-permissions] [\-o,\ \-\-outputfile] [\-f,\ \-\-rcfile] [\-q,\ \-\-quiet] [\-v,\ \-\-verbose] [\-b,\ \-\-blocksize] [\-O,\ \-\-stdout] [\-?,\ \-\-help] [\-\-usage] {smb://host/share/path/to/file} [smb://url2/] [\&.\&.\&.]
     34smbget [\-a,\ \-\-guest] [\-r,\ \-\-resume] [\-R,\ \-\-recursive] [\-U,\ \-\-username=STRING] [\-w,\ \-\-workgroup=STRING] [\-n,\ \-\-nonprompt] [\-d,\ \-\-debuglevel=INT] [\-D,\ \-\-dots] [\-o,\ \-\-outputfile] [\-f,\ \-\-rcfile] [\-q,\ \-\-quiet] [\-v,\ \-\-verbose] [\-b,\ \-\-blocksize] [\-O,\ \-\-stdout] [\-u,\ \-\-update] [\-?,\ \-\-help] [\-\-usage] {smb://host/share/path/to/file} [smb://url2/] [\&.\&.\&.]
    3535.SH "DESCRIPTION"
    3636.PP
     
    6060.RE
    6161.PP
    62 \-u, \-\-username=STRING
     62\-U, \-\-username=\fIusername[%password]\fR
    6363.RS 4
    64 Username to use
    65 .RE
    66 .PP
    67 \-p, \-\-password=STRING
    68 .RS 4
    69 Password to use
     64Username (and password) to use
    7065.RE
    7166.PP
     
    8883.RS 4
    8984Show dots as progress indication
    90 .RE
    91 .PP
    92 \-P, \-\-keep\-permissions
    93 .RS 4
    94 Set same permissions on local file as are set on remote file\&.
    9585.RE
    9686.PP
     
    133123.RS 4
    134124Display brief usage message
     125.RE
     126.PP
     127\-u, \-\-update
     128.RS 4
     129Download only when remote file is newer than local file or local file is missing\&.
    135130.RE
    136131.SH "SMB URLS"
  • vendor/current/docs/manpages/smbgetrc.5

    r860 r988  
    22.\"     Title: smbgetrc
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: File Formats and Conventions
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMBGETRC" "5" "09/18/2013" "Samba 3\&.6" "File Formats and Conventions"
     10.TH "SMBGETRC" "5" "05/02/2016" "Samba 4\&.4" "File Formats and Conventions"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    5757.RE
    5858.PP
    59 username \fIname\fR
     59user \fIname[%password]\fR
    6060.RS 4
    61 Username to use when logging in to the remote server\&. Use an empty string for anonymous access\&.
    62 .RE
    63 .PP
    64 password \fIpass\fR
    65 .RS 4
    66 Password to use when logging in\&.
     61Username (and password) to use when logging in to the remote server\&. Use an empty string for anonymous access\&.
    6762.RE
    6863.PP
  • vendor/current/docs/manpages/smbpasswd.5

    r860 r988  
    22.\"     Title: smbpasswd
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: File Formats and Conventions
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMBPASSWD" "5" "09/18/2013" "Samba 3\&.6" "File Formats and Conventions"
     10.TH "SMBPASSWD" "5" "05/02/2016" "Samba 4\&.4" "File Formats and Conventions"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    4444The format of the smbpasswd file used by Samba 2\&.2 is very similar to the familiar Unix
    4545passwd(5)
    46 file\&. It is an ASCII file containing one line for each user\&. Each field ithin each line is separated from the next by a colon\&. Any entry beginning with \*(Aq#\*(Aq is ignored\&. The smbpasswd file contains the following information for each user:
     46file\&. It is an ASCII file containing one line for each user\&. Each field within each line is separated from the next by a colon\&. Any entry beginning with \*(Aq#\*(Aq is ignored\&. The smbpasswd file contains the following information for each user:
    4747.PP
    4848name
  • vendor/current/docs/manpages/smbpasswd.8

    r860 r988  
    22.\"     Title: smbpasswd
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMBPASSWD" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "SMBPASSWD" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    7575\-c
    7676.RS 4
    77 This option can be used to specify the path and file name of the
    78 smb\&.conf
    79 configuration file when it is important to use other than the default file and / or location\&.
     77This option can be used to specify the path and file name of the configuration file when it is important to use other than the default file and / or location\&.
    8078.RE
    8179.PP
  • vendor/current/docs/manpages/smbspool.8

    r860 r988  
    22.\"     Title: smbspool
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMBSPOOL" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "SMBSPOOL" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    8686.IP \(bu 2.3
    8787.\}
     88smb://domain\eusername:password@server[:port]/printer
     89.RE
     90.sp
     91.RS 4
     92.ie n \{\
     93\h'-04'\(bu\h'+03'\c
     94.\}
     95.el \{\
     96.sp -1
     97.IP \(bu 2.3
     98.\}
    8899smb://username:password@workgroup/server[:port]/printer
    89100.RE
     
    103114\fBDEVICE_URI\fR
    104115environment variable prior to running smbspool\&.
     116.PP
     117smbspool will accept URI escaped characters\&. This allows setting a domain in the username, or space in the printer name\&. For example smb://domain%5Cusername/printer%20name
    105118.SH "OPTIONS"
    106119.sp
  • vendor/current/docs/manpages/smbstatus.1

    r860 r988  
    22.\"     Title: smbstatus
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMBSTATUS" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "SMBSTATUS" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 smbstatus [\-P] [\-b] [\-d\ <debug\ level>] [\-v] [\-L] [\-B] [\-p] [\-S] [\-s\ <configuration\ file>] [\-u\ <username>]
     34smbstatus [\-P] [\-b] [\-d\ <debug\ level>] [\-v] [\-L] [\-B] [\-p] [\-S] [\-N] [\-f] [\-s\ <configuration\ file>] [\-u\ <username>] [\-n|\-\-numeric] [\-R|\-\-profile\-rates]
    3535.SH "DESCRIPTION"
    3636.PP
     
    4848.RE
    4949.PP
     50\-R|\-\-profile\-rates
     51.RS 4
     52If samba has been compiled with the profiling option, print the contents of the profiling shared memory area and the call rates\&.
     53.RE
     54.PP
    5055\-b|\-\-brief
    5156.RS 4
    5257gives brief output\&.
    53 .RE
    54 .PP
    55 \-d|\-\-debuglevel=level
    56 .RS 4
    57 \fIlevel\fR
    58 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    59 .sp
    60 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    61 .sp
    62 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    63 .sp
    64 Note that specifying this parameter here will override the
    65 \m[blue]\fBlog level\fR\m[]
    66 parameter in the
    67 smb\&.conf
    68 file\&.
    69 .RE
    70 .PP
    71 \-V|\-\-version
    72 .RS 4
    73 Prints the program version number\&.
    74 .RE
    75 .PP
    76 \-s|\-\-configfile <configuration file>
    77 .RS 4
    78 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    79 smb\&.conf
    80 for more information\&. The default configuration file name is determined at compile time\&.
    81 .RE
    82 .PP
    83 \-l|\-\-log\-basename=logdirectory
    84 .RS 4
    85 Base directory name for log/debug files\&. The extension
    86 \fB"\&.progname"\fR
    87 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    8858.RE
    8959.PP
     
    11585.RE
    11686.PP
    117 \-h|\-\-help
     87\-N|\-\-notify
    11888.RS 4
    119 Print a summary of command line options\&.
     89causes smbstatus to display registered file notifications
     90.RE
     91.PP
     92\-f|\-\-fast
     93.RS 4
     94causes smbstatus to not check if the status data is valid by checking if the processes that the status data refer to all still exist\&. This speeds up execution on busy systems and clusters but might display stale data of processes that died without cleaning up properly\&.
    12095.RE
    12196.PP
     
    125100\fIusername\fR
    126101only\&.
     102.RE
     103.PP
     104\-n|\-\-numeric
     105.RS 4
     106causes smbstatus to display numeric UIDs and GIDs instead of resolving them to names\&.
    127107.RE
    128108.SH "VERSION"
  • vendor/current/docs/manpages/smbtar.1

    r860 r988  
    22.\"     Title: smbtar
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMBTAR" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "SMBTAR" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/smbtree.1

    r860 r988  
    22.\"     Title: smbtree
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "SMBTREE" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "SMBTREE" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    5757Only print a list of all the domains and servers responding on broadcast or known by the master browser\&.
    5858.RE
    59 .PP
    60 \-d|\-\-debuglevel=level
    61 .RS 4
    62 \fIlevel\fR
    63 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    64 .sp
    65 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    66 .sp
    67 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    68 .sp
    69 Note that specifying this parameter here will override the
    70 \m[blue]\fBlog level\fR\m[]
    71 parameter in the
    72 smb\&.conf
    73 file\&.
    74 .RE
    75 .PP
    76 \-V|\-\-version
    77 .RS 4
    78 Prints the program version number\&.
    79 .RE
    80 .PP
    81 \-s|\-\-configfile <configuration file>
    82 .RS 4
    83 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    84 smb\&.conf
    85 for more information\&. The default configuration file name is determined at compile time\&.
    86 .RE
    87 .PP
    88 \-l|\-\-log\-basename=logdirectory
    89 .RS 4
    90 Base directory name for log/debug files\&. The extension
    91 \fB"\&.progname"\fR
    92 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    93 .RE
    94 .PP
    95 \-N|\-\-no\-pass
    96 .RS 4
    97 If specified, this parameter suppresses the normal password prompt from the client to the user\&. This is useful when accessing a service that does not require a password\&.
    98 .sp
    99 Unless a password is specified on the command line or this parameter is specified, the client will request a password\&.
    100 .sp
    101 If a password is specified on the command line and this option is also defined the password on the command line will be silently ingnored and no password will be used\&.
    102 .RE
    103 .PP
    104 \-k|\-\-kerberos
    105 .RS 4
    106 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&.
    107 .RE
    108 .PP
    109 \-C|\-\-use\-ccache
    110 .RS 4
    111 Try to use the credentials cached by winbind\&.
    112 .RE
    113 .PP
    114 \-A|\-\-authentication\-file=filename
    115 .RS 4
    116 This option allows you to specify a file from which to read the username and password used in the connection\&. The format of the file is
    117 .sp
    118 .if n \{\
    119 .RS 4
    120 .\}
    121 .nf
    122 username = <value>
    123 password = <value>
    124 domain   = <value>
    125 .fi
    126 .if n \{\
    127 .RE
    128 .\}
    129 .sp
    130 Make certain that the permissions on the file restrict access from unwanted users\&.
    131 .RE
    132 .PP
    133 \-U|\-\-user=username[%password]
    134 .RS 4
    135 Sets the SMB username or username and password\&.
    136 .sp
    137 If %password is not specified, the user will be prompted\&. The client will first check the
    138 \fBUSER\fR
    139 environment variable, then the
    140 \fBLOGNAME\fR
    141 variable and if either exists, the string is uppercased\&. If these environmental variables are not found, the username
    142 \fBGUEST\fR
    143 is used\&.
    144 .sp
    145 A third option is to use a credentials file which contains the plaintext of the username and password\&. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables\&. If this method is used, make certain that the permissions on the file restrict access from unwanted users\&. See the
    146 \fI\-A\fR
    147 for more details\&.
    148 .sp
    149 Be cautious about including passwords in scripts\&. Also, on many systems the command line of a running process may be seen via the
    150 ps
    151 command\&. To be safe always allow
    152 rpcclient
    153 to prompt for a password and type it in directly\&.
    154 .RE
    155 .PP
    156 \-h|\-\-help
    157 .RS 4
    158 Print a summary of command line options\&.
    159 .RE
    16059.SH "VERSION"
    16160.PP
  • vendor/current/docs/manpages/testparm.1

    r860 r988  
    22.\"     Title: testparm
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "TESTPARM" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "TESTPARM" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 testparm [\-s] [\-h] [\-v] [\-t\ <encoding>] {config\ filename} [hostname\ hostIP]
     34testparm [\-s|\-\-suppress\-prompt] [\-\-help] [\-v|\-\-verbose] {config\ filename} [hostname\ hostIP]
    3535.SH "DESCRIPTION"
    3636.PP
     
    6060.SH "OPTIONS"
    6161.PP
    62 \-s
     62\-s|\-\-suppress\-prompt
    6363.RS 4
    6464Without this option,
     
    6767.RE
    6868.PP
    69 \-h|\-\-help
    70 .RS 4
    71 Print a summary of command line options\&.
    72 .RE
    73 .PP
    74 \-V|\-\-version
    75 .RS 4
    76 Prints the program version number\&.
    77 .RE
    78 .PP
    79 \-v
     69\-v|\-\-verbose
    8070.RS 4
    8171If this option is specified, testparm will also output all options that were not used in
    8272\fBsmb.conf\fR(5)
    8373and are thus set to their defaults\&.
    84 .RE
    85 .PP
    86 \-t encoding
    87 .RS 4
    88 Output data in specified encoding\&.
    8974.RE
    9075.PP
     
    9782.RS 4
    9883Dumps the named section\&.
     84.RE
     85.PP
     86\-\-show\-all\-parameters
     87.RS 4
     88Show the parameters, type, possible values\&.
     89.RE
     90.PP
     91\-l|\-\-skip\-logic\-checks
     92.RS 4
     93Skip the global checks\&.
    9994.RE
    10095.PP
  • vendor/current/docs/manpages/vfs_acl_tdb.8

    r860 r988  
    22.\"     Title: vfs_acl_tdb
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_ACL_TDB" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_ACL_TDB" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_acl_xattr.8

    r860 r988  
    22.\"     Title: vfs_acl_xattr
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_ACL_XATTR" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_ACL_XATTR" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_aio_fork.8

    r860 r988  
    22.\"     Title: vfs_aio_fork
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_AIO_FORK" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_AIO_FORK" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    6363.SH "VERSION"
    6464.PP
    65 This man page is correct for version 3\&.6\&.0 of the Samba suite\&.
     65This man page is correct for version 4\&.0\&.0 of the Samba suite\&.
    6666.SH "AUTHOR"
    6767.PP
  • vendor/current/docs/manpages/vfs_aio_pthread.8

    r860 r988  
    22.\"     Title: vfs_aio_pthread
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_AIO_PTHREAD" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_AIO_PTHREAD" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    7979.SH "VERSION"
    8080.PP
    81 This man page is correct for version 3\&.6\&.3 of the Samba suite\&.
     81This man page is correct for version 4\&.0 of the Samba suite\&.
    8282.SH "AUTHOR"
    8383.PP
  • vendor/current/docs/manpages/vfs_audit.8

    r860 r988  
    22.\"     Title: vfs_audit
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_AUDIT" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_AUDIT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_cacheprime.8

    r860 r988  
    22.\"     Title: vfs_cacheprime
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_CACHEPRIME" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_CACHEPRIME" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    112112.PP
    113113cacheprime
    114 is not a a substitute for a general\-purpose readahead mechanism\&. It is intended for use only in very specific environments where disk operations must be aligned and sized to known values (as much as that is possible)\&.
     114is not a substitute for a general\-purpose readahead mechanism\&. It is intended for use only in very specific environments where disk operations must be aligned and sized to known values (as much as that is possible)\&.
    115115.SH "VERSION"
    116116.PP
  • vendor/current/docs/manpages/vfs_cap.8

    r860 r988  
    22.\"     Title: vfs_cap
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_CAP" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_CAP" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_catia.8

    r860 r988  
    22.\"     Title: vfs_catia
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_CATIA" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_CATIA" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    4545This module is stackable\&.
    4646.PP
    47 Up to samba version 3\&.4\&.x a fixed character mapping was used\&. The invalid windows characters \e / : * ? " < > | and the blank character were mapped in a hardcoded way\&.
     47The parameter "catia:mappings" specifies the mapping on a per\-character basis, see below\&.
     48.SH "OPTIONS"
    4849.PP
    49 Starting with samba\-3\&.5\&.0 a more flexible mapping was introduced\&. The new parameter "catia:mappings" now specifies the mapping on a char by char basis using the notation: unix hex char 0x\&.\&. : windows hex char 0x\&.\&. Multiple character mappings are separated by a comma\&.
     50catia:mappings = SERVER_HEX_CHAR:CLIENT_HEX_CHAR
     51.RS 4
     52SERVER_HEX_CHAR specifies a 0x prefixed hexedecimal character code that, when included in a Samba server\-side filename, will be mapped to CLIENT_HEX_CHAR for the CIFS client\&.
     53.sp
     54The same mapping occurs in the opposite direction\&. Multiple character mappings are separated by a comma\&.
     55.RE
    5056.SH "EXAMPLES"
    5157.PP
    52 Samba versions up to 3\&.4\&.x:
    53 .PP
    54 Map Catia filenames on the [CAD] share:
    55 .sp
    56 .if n \{\
    57 .RS 4
    58 .\}
    59 .nf
    60         \fI[CAD]\fR
    61         \m[blue]\fBpath = /data/cad\fR\m[]
    62         \m[blue]\fBvfs objects = catia\fR\m[]
    63 .fi
    64 .if n \{\
    65 .RE
    66 .\}
    67 .PP
    68 Samba versions 3\&.5\&.0 and later:
    69 .PP
    70 Map Catia filenames on the [CAD] share:
     58Map server\-side quotation\-marks (") to client\-side diaeresis (\(ad) on filenames in the [CAD] share:
    7159.sp
    7260.if n \{\
     
    8371.\}
    8472.PP
    85 To get the full formerly fixed mappings:
     73Perform comprehensive mapping of common Catia filename characters:
    8674.sp
    8775.if n \{\
     
    9280        \m[blue]\fBpath = /data/cad\fR\m[]
    9381        \m[blue]\fBvfs objects = catia\fR\m[]
    94         \m[blue]\fBcatia:mappings = 0x22:0xa8,0x2a:0xa4,0x2f:0xf8,0x3a:0xf7,0x3c:0xab,0x3e:0xbb,0x3f:0xbf,0x5c:0xff,0x7c:0xa6,0x20:0xb1\fR\m[]
     82        \m[blue]\fBcatia:mappings = 0x22:0xa8,0x2a:0xa4,0x2f:0xf8,0x3a:0xf7,0x3c:0xab,0x3e:0xbb,0x3f:0xbf,0x5c:0xff,0x7c:0xa6\fR\m[]
    9583.fi
    9684.if n \{\
     
    9886.\}
    9987.PP
    100 Unix filename to be translated (Note that the path delimiter "/" is not used here):
     88Server\-side filename to be translated (Note that the path delimiter "/" is not used here):
    10189.PP
    102 a\ea:a*a?a"a<a>a|a a
     90a\ea:a*a?a"a<a>a|a
    10391.PP
    104 Resulting windows filename:
     92Resulting filename, as seen by the client:
    10593.PP
    106 aÿa\(dia\(Csa\(r?a\(ada\(Foa\(Fca\(bba\(+-a
     94aÿa\(dia\(Csa\(r?a\(ada\(Foa\(Fca\(bba
     95.SH "CAVEATS"
    10796.PP
    108 Note that the character mapping must work in BOTH directions (unix \-> windows and windows \-> unix) to get unique and existing file names!
     97Character mapping must work in BOTH directions (server \-> client and client \-> server) to get unique and existing file names!
    10998.PP
    11099A NOT working example:
     
    125114Here the colon ":" is mapped to the underscore "_"\&.
    126115.PP
    127 Assuming a unix filename "a:should_work", which is well translated to windows as "a_should_work"\&.
     116Assuming a server\-side filename "a:should_work", which is translated to "a_should_work" for the client\&.
    128117.PP
    129 BUT the reverse mapping from windows "a_should_work" to unix will result in "a:should:work" \- something like "file not found" will be returned\&.
     118BUT the reverse mapping from client "a_should_work" to server will result in "a:should:work" \- something like "file not found" will be returned\&.
    130119.SH "VERSION"
    131120.PP
    132 This man page is correct for all versions up to 4\&.0\&.3 of the Samba suite\&.
     121This man page is correct for Samba versions from 3\&.5\&.0 to 4\&.0\&.6\&.
    133122.SH "AUTHOR"
    134123.PP
  • vendor/current/docs/manpages/vfs_commit.8

    r860 r988  
    22.\"     Title: vfs_commit
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_COMMIT" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_COMMIT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_crossrename.8

    r860 r988  
    22.\"     Title: vfs_crossrename
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_CROSSRENAME" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_CROSSRENAME" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    9090.SH "VERSION"
    9191.PP
    92 This man page is correct for version 3\&.6\&.0 of the Samba suite\&.
     92This man page is correct for version 4\&.0\&.0 of the Samba suite\&.
    9393.SH "AUTHOR"
    9494.PP
  • vendor/current/docs/manpages/vfs_default_quota.8

    r860 r988  
    22.\"     Title: vfs_default_quota
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_DEFAULT_QUOTA" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_DEFAULT_QUOTA" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_dirsort.8

    r860 r988  
    22.\"     Title: vfs_dirsort
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_DIRSORT" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_DIRSORT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_extd_audit.8

    r860 r988  
    22.\"     Title: vfs_extd_audit
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_EXTD_AUDIT" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_EXTD_AUDIT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_fake_perms.8

    r860 r988  
    22.\"     Title: vfs_fake_perms
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_FAKE_PERMS" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_FAKE_PERMS" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_fileid.8

    r860 r988  
    22.\"     Title: vfs_fileid
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_FILEID" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_FILEID" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_full_audit.8

    r860 r988  
    22.\"     Title: vfs_full_audit
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_FULL_AUDIT" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_FULL_AUDIT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    4747is able to record the complete set of Samba VFS operations:
    4848.RS 4
    49 aio_cancel
    50 .RE
    51 .RS 4
    52 aio_error
    53 .RE
    54 .RS 4
    55 aio_fsync
    56 .RE
    57 .RS 4
    58 aio_read
    59 .RE
    60 .RS 4
    61 aio_return
    62 .RE
    63 .RS 4
    64 aio_suspend
    65 .RE
    66 .RS 4
    67 aio_write
    68 .RE
    69 .RS 4
    7049chdir
    7150.RE
     
    9271.RE
    9372.RS 4
     73copy_chunk_send
     74.RE
     75.RS 4
     76copy_chunk_recv
     77.RE
     78.RS 4
    9479disconnect
    9580.RE
     
    134119.RE
    135120.RS 4
     121get_compression
     122.RE
     123.RS 4
    136124get_nt_acl
    137125.RE
     
    155143.RE
    156144.RS 4
    157 lgetxattr
    158 .RE
    159 .RS 4
    160145link
    161146.RE
     
    167152.RE
    168153.RS 4
    169 llistxattr
    170 .RE
    171 .RS 4
    172154lock
    173155.RE
    174156.RS 4
    175 lremovexattr
    176 .RE
    177 .RS 4
    178157lseek
    179158.RE
    180159.RS 4
    181 lsetxattr
    182 .RE
    183 .RS 4
    184160lstat
    185161.RE
     
    233209.RE
    234210.RS 4
     211set_compression
     212.RE
     213.RS 4
    235214set_nt_acl
    236215.RE
     
    242221.RE
    243222.RS 4
     223snap_check_path
     224.RE
     225.RS 4
     226snap_create
     227.RE
     228.RS 4
     229snap_delete
     230.RE
     231.RS 4
    244232stat
    245233.RE
     
    251239.RE
    252240.RS 4
    253 sys_acl_add_perm
    254 .RE
    255 .RS 4
    256 sys_acl_clear_perms
    257 .RE
    258 .RS 4
    259 sys_acl_create_entry
    260 .RE
    261 .RS 4
    262241sys_acl_delete_def_file
    263242.RE
    264243.RS 4
    265 sys_acl_free_acl
    266 .RE
    267 .RS 4
    268 sys_acl_free_qualifier
    269 .RE
    270 .RS 4
    271 sys_acl_free_text
    272 .RE
    273 .RS 4
    274 sys_acl_get_entry
    275 .RE
    276 .RS 4
    277244sys_acl_get_fd
    278245.RE
     
    281248.RE
    282249.RS 4
    283 sys_acl_get_perm
    284 .RE
    285 .RS 4
    286 sys_acl_get_permset
    287 .RE
    288 .RS 4
    289 sys_acl_get_qualifier
    290 .RE
    291 .RS 4
    292 sys_acl_get_tag_type
    293 .RE
    294 .RS 4
    295 sys_acl_init
    296 .RE
    297 .RS 4
    298250sys_acl_set_fd
    299251.RE
    300252.RS 4
    301253sys_acl_set_file
    302 .RE
    303 .RS 4
    304 sys_acl_set_permset
    305 .RE
    306 .RS 4
    307 sys_acl_set_qualifier
    308 .RE
    309 .RS 4
    310 sys_acl_set_tag_type
    311 .RE
    312 .RS 4
    313 sys_acl_to_text
    314 .RE
    315 .RS 4
    316 sys_acl_valid
    317254.RE
    318255.RS 4
     
    402339.SH "OPTIONS"
    403340.PP
    404 vfs_full_audit:prefix = STRING
     341full_audit:prefix = STRING
    405342.RS 4
    406343Prepend audit messages with STRING\&. STRING is processed for standard substitution variables listed in
     
    408345.RE
    409346.PP
    410 vfs_full_audit:success = LIST
    411 .RS 4
    412 LIST is a list of VFS operations that should be recorded if they succeed\&. Operations are specified using the names listed above\&. Operations can be unset by prefixing the names with "!"\&.
    413 .RE
    414 .PP
    415 vfs_full_audit:failure = LIST
    416 .RS 4
    417 LIST is a list of VFS operations that should be recorded if they failed\&. Operations are specified using the names listed above\&. Operations can be unset by prefixing the names with "!"\&.
     347full_audit:success = LIST
     348.RS 4
     349LIST is a list of VFS operations that should be recorded if they succeed\&. Operations are specified using the names listed above\&. Operations can be unset by prefixing the names with "!"\&. The default is all operations\&.
     350.RE
     351.PP
     352full_audit:failure = LIST
     353.RS 4
     354LIST is a list of VFS operations that should be recorded if they failed\&. Operations are specified using the names listed above\&. Operations can be unset by prefixing the names with "!"\&. The default is all operations\&.
    418355.RE
    419356.PP
     
    430367\fBsyslog\fR(3)
    431368priority\&.
     369.RE
     370.PP
     371full_audit:syslog = true/false
     372.RS 4
     373Log messages to syslog (default) or as a debug level 1 message\&.
     374.RE
     375.PP
     376full_audit:log_secdesc = true/false
     377.RS 4
     378Log an sddl form of the security descriptor coming in when a client sets an acl\&. Defaults to false\&.
    432379.RE
    433380.SH "EXAMPLES"
  • vendor/current/docs/manpages/vfs_gpfs.8

    r860 r988  
    22.\"     Title: vfs_gpfs
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_GPFS" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_GPFS" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    8080.RE
    8181.PP
    82 NOTE:This module follows the posix\-acl behaviour and hence allows permission stealing via chown\&. Samba might allow at a later point in time, to restrict the chown via this module as such restrictions are the responsibility of the underlying filesystem than of Samba\&.
     82NOTE:
     83This module follows the posix\-acl behaviour and hence allows permission stealing via chown\&. Samba might allow at a later point in time, to restrict the chown via this module as such restrictions are the responsibility of the underlying filesystem than of Samba\&.
     84.PP
     85This module makes use of the smb\&.conf parameter
     86\m[blue]\fBacl map full control\fR\m[]\&. When set to yes (the default), this parameter will add in the FILE_DELETE_CHILD bit on a returned ACE entry for a file (not a directory) that already contains all file permissions except for FILE_DELETE and FILE_DELETE_CHILD\&. This can prevent Windows applications that request GENERIC_ALL access from getting ACCESS_DENIED errors when running against a filesystem with NFSv4 compatible ACLs\&.
    8387.PP
    8488This module is stackable\&.
     89.PP
     90Since Samba 4\&.0 all options are per share options\&.
    8591.SH "OPTIONS"
    8692.PP
     
    97103.IP \(bu 2.3
    98104.\}
    99 
    100105yes(default)
    101106\- propagate sharemodes across all GPFS nodes\&.
     
    110115.IP \(bu 2.3
    111116.\}
    112 
    113117no
    114118\- do not propagate sharemodes across all GPFS nodes\&. This should only be used if the GPFS file system is exclusively exported by Samba\&. Access by local unix application or NFS exports could lead to corrupted files\&.
     
    134138.IP \(bu 2.3
    135139.\}
    136 
    137140yes(default)
    138141\- propagate leases across all GPFS nodes\&.
     
    147150.IP \(bu 2.3
    148151.\}
    149 
    150152no
    151153\- do not propagate leases across all GPFS nodes\&. This should only be used if the GPFS file system is exclusively exported by Samba\&. Access by local unix application or NFS exports could lead to corrupted files\&.
     
    167169.IP \(bu 2.3
    168170.\}
    169 
    170171no(default)
    171172\- Do not announce HSM\&.
     
    180181.IP \(bu 2.3
    181182.\}
    182 
    183 no
     183yes
    184184\- Announce HSM\&.
     185.RE
     186.sp
     187.RE
     188.RE
     189.PP
     190gpfs:recalls = [ yes | no ]
     191.RS 4
     192When this option is set to no, an attempt to open an offline file will be rejected with access denied\&. This helps preventing recall storms triggered by careless applications like Finder and Explorer\&.
     193.sp
     194.RS 4
     195.ie n \{\
     196\h'-04'\(bu\h'+03'\c
     197.\}
     198.el \{\
     199.sp -1
     200.IP \(bu 2.3
     201.\}
     202yes(default)
     203\- Open files that are offline\&. This will recall the files from HSM\&.
     204.RE
     205.sp
     206.RS 4
     207.ie n \{\
     208\h'-04'\(bu\h'+03'\c
     209.\}
     210.el \{\
     211.sp -1
     212.IP \(bu 2.3
     213.\}
     214no
     215\- Reject access to offline files with access denied\&. This will prevent recalls of files from HSM\&. Using this setting also requires gpfs:hsm to be set to yes\&.
    185216.RE
    186217.sp
     
    202233.IP \(bu 2.3
    203234.\}
    204 
    205235yes(default)
    206236\- use
     
    216246.IP \(bu 2.3
    217247.\}
    218 
    219248no
    220249\- do not use
     
    239268.IP \(bu 2.3
    240269.\}
    241 
    242270no(default)
    243271\- do not use GPFS windows attributes\&.
     
    252280.IP \(bu 2.3
    253281.\}
    254 
    255282yes
    256283\- use GPFS windows attributes\&.
     
    262289gpfs:merge_writeappend = [ yes | no ]
    263290.RS 4
    264 GPFS ACLs doesn\*(Aqt know about the \*(AqAPPEND\*(Aq right\&. This optionen lets Samba map the \*(AqAPPEND\*(Aq right to \*(AqWRITE\*(Aq\&.
    265 .sp
    266 .RS 4
    267 .ie n \{\
    268 \h'-04'\(bu\h'+03'\c
    269 .\}
    270 .el \{\
    271 .sp -1
    272 .IP \(bu 2.3
    273 .\}
    274 
     291GPFS ACLs doesn\*(Aqt know about the \*(AqAPPEND\*(Aq right\&. This option lets Samba map the \*(AqAPPEND\*(Aq right to \*(AqWRITE\*(Aq\&.
     292.sp
     293.RS 4
     294.ie n \{\
     295\h'-04'\(bu\h'+03'\c
     296.\}
     297.el \{\
     298.sp -1
     299.IP \(bu 2.3
     300.\}
    275301yes(default)
    276302\- map \*(AqAPPEND\*(Aq to \*(AqWRITE\*(Aq\&.
     
    285311.IP \(bu 2.3
    286312.\}
    287 
    288313no
    289314\- do not map \*(AqAPPEND\*(Aq to \*(AqWRITE\*(Aq\&.
     315.RE
     316.sp
     317.RE
     318.RE
     319.PP
     320gpfs:acl = [ yes | no ]
     321.RS 4
     322This option lets Samba use or ignore GPFS ACLs\&.
     323.sp
     324.RS 4
     325.ie n \{\
     326\h'-04'\(bu\h'+03'\c
     327.\}
     328.el \{\
     329.sp -1
     330.IP \(bu 2.3
     331.\}
     332yes(default)
     333\- use GPFS ACLs\&.
     334.RE
     335.sp
     336.RS 4
     337.ie n \{\
     338\h'-04'\(bu\h'+03'\c
     339.\}
     340.el \{\
     341.sp -1
     342.IP \(bu 2.3
     343.\}
     344no
     345\- do not use GPFS ACLs and pass everything to the next SMB_VFS module\&.
    290346.RE
    291347.sp
     
    309365.IP \(bu 2.3
    310366.\}
    311 
    312367no(default)
    313368\- ignore the DESC_DACL_PROTECTED flags\&.
     
    322377.IP \(bu 2.3
    323378.\}
    324 
    325379yes
    326380\- reject ACLs with DESC_DACL_PROTECTED\&.
     
    330384.RE
    331385.PP
     386gpfs:dfreequota = [ yes | no ]
     387.RS 4
     388Adjust reporting of the size and free space of a share according to quotas\&. If this setting is "yes", a request for size and free space will also evaluate the user quota of the user requesting the data and the group quota of the primary group of the user\&. Fileset quotas are not queried, since GPFS already provides the option \-\-dfreequota to reflect the fileset quota in the free space query\&. Please use that option to include fileset quotas in the reported disk space\&.
     389.sp
     390If any of the soft or hard quota limits has been reached, the free space will be reported as 0\&. If a quota is in place, but the limits have not been reached, the free space will be reported according to the space left in the quota\&. If more than one quota applies the free space will be reported as the smallest space left in those quotas\&. The size of the share will be reported according to the quota usage\&. If more than one quota applies, the smallest size will be reported for the share size according to these quotas\&.
     391.sp
     392.RS 4
     393.ie n \{\
     394\h'-04'\(bu\h'+03'\c
     395.\}
     396.el \{\
     397.sp -1
     398.IP \(bu 2.3
     399.\}
     400yes
     401\- include the quotas when reporting the share size and free space
     402.RE
     403.sp
     404.RS 4
     405.ie n \{\
     406\h'-04'\(bu\h'+03'\c
     407.\}
     408.el \{\
     409.sp -1
     410.IP \(bu 2.3
     411.\}
     412no(default)
     413\- do not include quotas, simply report the size and free space of the file system
     414.RE
     415.sp
     416.RE
     417.RE
     418.PP
     419gpfs:prealloc = [ yes | no ]
     420.RS 4
     421If set to yes the gpfs_prealloc function will be used in the fallocate callback when appropriate\&. If set to no gpfs_prealloc will not be used\&. In both cases the system and libc calls are avoided\&.
     422.sp
     423.RS 4
     424.ie n \{\
     425\h'-04'\(bu\h'+03'\c
     426.\}
     427.el \{\
     428.sp -1
     429.IP \(bu 2.3
     430.\}
     431yes (default)
     432\- Use gpfs_prealloc for the fallocate callback\&.
     433.RE
     434.sp
     435.RS 4
     436.ie n \{\
     437\h'-04'\(bu\h'+03'\c
     438.\}
     439.el \{\
     440.sp -1
     441.IP \(bu 2.3
     442.\}
     443no
     444\- Do not use gpfs_prealloc for the fallocate callback\&.
     445.RE
     446.sp
     447.RE
     448.RE
     449.PP
     450gpfs:settimes = [ yes | no ]
     451.RS 4
     452Use the gpfs_set_times API when changing the timestamps of a file or directory\&. If the GPFS API is not available the old method of using utime and the GPFS winattr call will be used instead\&.
     453.sp
     454.RS 4
     455.ie n \{\
     456\h'-04'\(bu\h'+03'\c
     457.\}
     458.el \{\
     459.sp -1
     460.IP \(bu 2.3
     461.\}
     462yes(default)
     463\- Use gpfs_set_times\&. Fall back to utime and winattr when it is not available\&.
     464.RE
     465.sp
     466.RS 4
     467.ie n \{\
     468\h'-04'\(bu\h'+03'\c
     469.\}
     470.el \{\
     471.sp -1
     472.IP \(bu 2.3
     473.\}
     474no
     475\- Do not use gpfs_set_times\&.
     476.RE
     477.sp
     478.RE
     479.RE
     480.PP
    332481nfs4:mode = [ simple | special ]
    333482.RS 4
    334 Enable/Disable substitution of special IDs on GPFS\&. This parameter should not affect the windows users in anyway\&. It only ensures that Samba sets the special IDs \- OWNER@ and GROUP@ ( mappings to simple uids ) that are relevant to GPFS\&.
     483Controls substitution of special IDs (OWNER@ and GROUP@) on GPFS\&. The use of mode simple is recommended\&. In this mode only non inheriting ACL entries for the file owner and group are mapped to special IDs\&.
    335484.sp
    336485The following MODEs are understood by the module:
     
    345494.\}
    346495simple(default)
    347 \- do not use special IDs in GPFS ACEs
    348 .RE
    349 .sp
    350 .RS 4
    351 .ie n \{\
    352 \h'-04'\(bu\h'+03'\c
    353 .\}
    354 .el \{\
    355 .sp -1
    356 .IP \(bu 2.3
    357 .\}
    358 special
    359 \- use special IDs in GPFS ACEs\&.
     496\- use OWNER@ and GROUP@ special IDs for non inheriting ACEs only\&.
     497.RE
     498.sp
     499.RS 4
     500.ie n \{\
     501\h'-04'\(bu\h'+03'\c
     502.\}
     503.el \{\
     504.sp -1
     505.IP \(bu 2.3
     506.\}
     507special(deprecated)
     508\- use OWNER@ and GROUP@ special IDs in ACEs for all file owner and group ACEs\&.
    360509.RE
    361510.sp
     
    469618.IP \(bu 2.3
    470619.\}
    471 yesOpen files with O_SYNC
    472 .RE
    473 .sp
    474 .RS 4
    475 .ie n \{\
    476 \h'-04'\(bu\h'+03'\c
    477 .\}
    478 .el \{\
    479 .sp -1
    480 .IP \(bu 2.3
    481 .\}
    482 no (default)Open files as normal Samba would do
     620yes
     621\- Open files with O_SYNC
     622.RE
     623.sp
     624.RS 4
     625.ie n \{\
     626\h'-04'\(bu\h'+03'\c
     627.\}
     628.el \{\
     629.sp -1
     630.IP \(bu 2.3
     631.\}
     632no (default)
     633\- Open files as normal Samba would do
    483634.RE
    484635.sp
     
    520671At build time, only the header file
    521672gpfs_gpl\&.h
    522 is required , which is a symlink to
     673is required, which is a symlink to
    523674gpfs\&.h
    524675in gpfs versions newer than 3\&.2\&.1 PTF8\&.
  • vendor/current/docs/manpages/vfs_netatalk.8

    r860 r988  
    22.\"     Title: vfs_netatalk
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_NETATALK" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_NETATALK" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_prealloc.8

    r860 r988  
    22.\"     Title: vfs_prealloc
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_PREALLOC" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_PREALLOC" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_preopen.8

    r860 r988  
    22.\"     Title: vfs_preopen
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_PREOPEN" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_PREOPEN" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_readahead.8

    r860 r988  
    22.\"     Title: vfs_readahead
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_READAHEAD" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_READAHEAD" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_readonly.8

    r860 r988  
    22.\"     Title: vfs_readonly
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_READONLY" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_READONLY" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_recycle.8

    r860 r988  
    22.\"     Title: vfs_recycle
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_RECYCLE" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_RECYCLE" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfs_shadow_copy.8

    r860 r988  
    22.\"     Title: vfs_shadow_copy
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_SHADOW_COPY" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_SHADOW_COPY" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    2929.\" -----------------------------------------------------------------
    3030.SH "NAME"
    31 vfs_shadow_copy \- Make a Samba share read only for a specified time period
     31vfs_shadow_copy \- Expose snapshots to Windows clients as shadow copies\&.
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
  • vendor/current/docs/manpages/vfs_shadow_copy2.8

    r860 r988  
    22.\"     Title: vfs_shadow_copy2
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_SHADOW_COPY2" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_SHADOW_COPY2" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    4141The
    4242vfs_shadow_copy2
    43 VFS module functionality that is similar to Microsoft Shadow Copy services\&. When setup properly, this module allows Microsoft Shadow Copy clients to browse "shadow copies" on Samba shares\&.
    44 .PP
    45 This is a 2nd implementation of a shadow copy module\&. This version has the following features:
     43VFS module offers a functionality similar to Microsoft Shadow Copy services\&. When set up properly, this module allows Microsoft Shadow Copy clients to browse through file system snapshots as "shadow copies" on Samba shares\&.
     44.PP
     45This is a second implementation of a shadow copy module which has the following additional features (compared to the original
     46\fBshadow_copy\fR(8)
     47module):
    4648.sp
    4749.RS 4
     
    5355.IP "  1." 4.2
    5456.\}
    55 You don\*(Aqt need to populate your shares with symlinks to the snapshots\&. This can be very important when you have thousands of shares, or use [homes]\&.
     57There is no need any more to populate your share\*(Aqs root directory with symlinks to the snapshots if the file system stores the snapshots elsewhere\&. Instead, you can flexibly configure the module where to look for the file system snapshots\&. This can be very important when you have thousands of shares, or use [homes]\&.
    5658.RE
    5759.sp
     
    6466.IP "  2." 4.2
    6567.\}
    66 The inode number of the files is altered so it is different from the original\&. This allows the \*(Aqrestore\*(Aq button to work without a sharing violation\&.
     68Snapshot directories need not be in one fixed central place but can be located anywhere in the directory tree\&. This mode helps to support file systems that offer snapshotting of particular subtrees, for example the GPFS independent file sets\&.
     69.RE
     70.sp
     71.RS 4
     72.ie n \{\
     73\h'-04' 3.\h'+01'\c
     74.\}
     75.el \{\
     76.sp -1
     77.IP "  3." 4.2
     78.\}
     79Vanity naming for snapshots: snapshots can be named in any format compatible with str[fp]time conversions\&.
     80.RE
     81.sp
     82.RS 4
     83.ie n \{\
     84\h'-04' 4.\h'+01'\c
     85.\}
     86.el \{\
     87.sp -1
     88.IP "  4." 4.2
     89.\}
     90Timestamps can be represented in localtime rather than UTC\&.
     91.RE
     92.sp
     93.RS 4
     94.ie n \{\
     95\h'-04' 5.\h'+01'\c
     96.\}
     97.el \{\
     98.sp -1
     99.IP "  5." 4.2
     100.\}
     101The inode number of the files can optionally be altered to be different from the original\&. This fixes the \*(Aqrestore\*(Aq button in the Windows GUI to work without a sharing violation when serving from file systems, like GPFS, that return the same device and inode number for the snapshot file and the original\&.
     102.RE
     103.sp
     104.RS 4
     105.ie n \{\
     106\h'-04' 6.\h'+01'\c
     107.\}
     108.el \{\
     109.sp -1
     110.IP "  6." 4.2
     111.\}
     112Shadow copy results are by default sorted before being sent to the client\&. This is beneficial for filesystems that don\*(Aqt read directories alphabetically (the default unix)\&. Sort ordering can be configured and sorting can be turned off completely if the file system sorts its directory listing\&.
    67113.RE
    68114.sp
     
    75121relies on a filesystem snapshot implementation\&. Many common filesystems have native support for this\&.
    76122.PP
    77 Filesystem snapshots must be mounted on specially named directories in order to be recognized by
    78 vfs_shadow_copy2\&. The snapshot mount points must be immediate children of a the directory being shared\&.
    79 .PP
    80 The snapshot naming convention is @GMT\-YYYY\&.MM\&.DD\-hh\&.mm\&.ss, where:
     123Filesystem snapshots must be available under specially named directories in order to be recognized by
     124vfs_shadow_copy2\&. These snapshot directory is typically a direct subdirectory of the share root\*(Aqs mountpoint but there are other modes that can be configured with the parameters described in detail below\&.
     125.PP
     126The snapshot at a given point in time is expected in a subdirectory of the snapshot directory where the snapshot\*(Aqs directory is expected to be a formatted version of the snapshot time\&. The default format which can be changed with the
     127shadow:format
     128option is @GMT\-YYYY\&.MM\&.DD\-hh\&.mm\&.ss, where:
    81129.sp
    82130.RS 4
     
    172220.SH "OPTIONS"
    173221.PP
     222shadow:mountpoint = MOUNTPOINT
     223.RS 4
     224With this parameter, one can specify the mount point of the filesystem that contains the share path\&. Usually this mount point is automatically detected\&. But for some constellations, in particular tests, it can be convenient to be able to specify it\&.
     225.sp
     226Example: shadow:mountpoint = /path/to/filesystem
     227.sp
     228Default: shadow:mountpoint = NOT SPECIFIED
     229.RE
     230.PP
    174231shadow:snapdir = SNAPDIR
    175232.RS 4
    176 Path to the directory where snapshots are kept\&.
     233Path to the directory where the file system of the share keeps its snapshots\&. If an absolute path is specified, it is used as\-is\&. If a relative path is specified, then it is taken relative to the mount point of the filesystem of the share root\&. (See
     234shadow:mountpoint\&.)
     235.sp
     236Note that
     237shadow:snapdirseverywhere
     238depends on this parameter and needs a relative path\&. Setting an absolute path disables
     239shadow:snapdirseverywhere\&.
     240.sp
     241Note that the
     242shadow:crossmountpoints
     243option also requires a relative snapdir\&. Setting an absolute path disables
     244shadow:crossmountpoints\&.
     245.sp
     246Example: shadow:snapdir = /some/absolute/path
     247.sp
     248Default: shadow:snapdir = \&.snapshots
    177249.RE
    178250.PP
    179251shadow:basedir = BASEDIR
    180252.RS 4
    181 Path to the base directory that snapshots are from\&.
    182 .RE
    183 .PP
    184 shadow:sort = asc/desc, or not specified for unsorted (default)
    185 .RS 4
    186 By this parameter one can specify that the shadow copy directories should be sorted before they are sent to the client\&. This can be beneficial as unix filesystems are usually not listed alphabetically sorted\&. If enabled, you typically want to specify descending order\&.
     253The basedir option allows one to specify a directory between the share\*(Aqs mount point and the share root, relative to which the file system\*(Aqs snapshots are taken\&.
     254.sp
     255For example, if
     256.sp
     257.RS 4
     258.ie n \{\
     259\h'-04'\(bu\h'+03'\c
     260.\}
     261.el \{\
     262.sp -1
     263.IP \(bu 2.3
     264.\}
     265basedir = mountpoint/rel_basedir
     266.RE
     267.sp
     268.RS 4
     269.ie n \{\
     270\h'-04'\(bu\h'+03'\c
     271.\}
     272.el \{\
     273.sp -1
     274.IP \(bu 2.3
     275.\}
     276share_root = basedir/rel_share_root
     277.RE
     278.sp
     279.RS 4
     280.ie n \{\
     281\h'-04'\(bu\h'+03'\c
     282.\}
     283.el \{\
     284.sp -1
     285.IP \(bu 2.3
     286.\}
     287snapshot_path = mountpoint/snapdir
     288.sp
     289or
     290snapshot_path = snapdir
     291if snapdir is absolute
     292.RE
     293.sp
     294.RE
     295then the snapshot of a
     296file = mountpoint/rel_basedir/rel_share_root/rel_file
     297at a time TIME will be found under
     298snapshot_path/FS_GMT_TOKEN(TIME)/rel_share_root/rel_file, where FS_GMT_TOKEN(TIME) is the timestamp string belonging to TIME in the format required by the file system\&. (See
     299shadow:format\&.)
     300.sp
     301The default for the basedir is the mount point of the file system of the share root (see
     302shadow:mountpoint)\&.
     303.sp
     304Note that the
     305shadow:snapdirseverywhere
     306and
     307shadow:crossmountpoints
     308options are incompatible with
     309shadow:basedir
     310and disable the basedir setting\&.
     311.RE
     312.PP
     313shadow:snapsharepath = SNAPSHAREPATH
     314.RS 4
     315With this parameter, one can specify the path of the share\*(Aqs root directory in snapshots, relative to the snapshot\*(Aqs root directory\&. It is an alternative method to
     316shadow:basedir, allowing greater control\&.
     317.sp
     318For example, if within each snapshot the files of the share have a
     319path/to/share/
     320prefix, then
     321shadow:snapsharepath
     322can be set to
     323path/to/share\&.
     324.sp
     325With this parameter, it is no longer assumed that a snapshot represents an image of the original file system or a portion of it\&. For example, a system could perform backups of only files contained in shares, and then expose the backup files in a logical structure:
     326.sp
     327.RS 4
     328.ie n \{\
     329\h'-04'\(bu\h'+03'\c
     330.\}
     331.el \{\
     332.sp -1
     333.IP \(bu 2.3
     334.\}
     335share1/
     336.RE
     337.sp
     338.RS 4
     339.ie n \{\
     340\h'-04'\(bu\h'+03'\c
     341.\}
     342.el \{\
     343.sp -1
     344.IP \(bu 2.3
     345.\}
     346share2/
     347.RE
     348.sp
     349.RS 4
     350.ie n \{\
     351\h'-04'\(bu\h'+03'\c
     352.\}
     353.el \{\
     354.sp -1
     355.IP \(bu 2.3
     356.\}
     357\&.\&.\&./
     358.RE
     359.sp
     360.RE
     361Note that the
     362shadow:snapdirseverywhere
     363and the
     364shadow:basedir
     365options are incompatible with
     366shadow:snapsharepath
     367and disable
     368shadow:snapsharepath
     369setting\&.
     370.sp
     371Example: shadow:snapsharepath = path/to/share
     372.sp
     373Default: shadow:snapsharepath = NOT SPECIFIED
     374.RE
     375.PP
     376shadow:sort = asc/desc
     377.RS 4
     378By default, this module sorts the shadow copy data alphabetically before sending it to the client\&. With this parameter, one can specify the sort order\&. Possible known values are desc (descending, the default) and asc (ascending)\&. If the file system lists directories alphabetically sorted, one can turn off sorting in this module by specifying any other value\&.
     379.sp
     380Example: shadow:sort = asc
     381.sp
     382Example: shadow:sort = none
     383.sp
     384Default: shadow:sort = desc
    187385.RE
    188386.PP
    189387shadow:localtime = yes/no
    190388.RS 4
    191 This is an optional parameter that indicates whether the snapshot names are in UTC/GMT or in local time\&. By default UTC is expected\&.
     389This is an optional parameter that indicates whether the snapshot names are in UTC/GMT or in local time\&. If it is disabled then UTC/GMT is expected\&.
     390.sp
     391shadow:localtime = no
    192392.RE
    193393.PP
    194394shadow:format = format specification for snapshot names
    195395.RS 4
    196 This is an optional parameter that specifies the format specification for the naming of snapshots\&. The format must be compatible with the conversion specifications recognized by str[fp]time\&. The default value is "@GMT\-%Y\&.%m\&.%d\-%H\&.%M\&.%S"\&.
     396This is an optional parameter that specifies the format specification for the naming of snapshots in the file system\&. The format must be compatible with the conversion specifications recognized by str[fp]time\&.
     397.sp
     398Default: shadow:format = "@GMT\-%Y\&.%m\&.%d\-%H\&.%M\&.%S"
     399.RE
     400.PP
     401shadow:sscanf = yes/no
     402.RS 4
     403This parameter can be used to specify that the time in format string is given as an unsigned long integer (%lu) rather than a time strptime() can parse\&. The result must be a unix time_t time\&.
     404.sp
     405Default: shadow:sscanf = no
    197406.RE
    198407.PP
     
    202411shadow:fixinodes
    203412then this module will modify the apparent inode number of files in the snapshot directories using a hash of the files path\&. This is needed for snapshot systems where the snapshots have the same device:inode number as the original files (such as happens with GPFS snapshots)\&. If you don\*(Aqt set this option then the \*(Aqrestore\*(Aq button in the shadow copy UI will fail with a sharing violation\&.
     413.sp
     414Default: shadow:fixinodes = no
     415.RE
     416.PP
     417shadow:snapdirseverywhere = yes/no
     418.RS 4
     419If you enable
     420shadow:snapdirseverywhere
     421then this module will look out for snapshot directories in the current working directory and all parent directories, stopping at the mount point by default\&. But see
     422shadow:crossmountpoints
     423how to change that behaviour\&.
     424.sp
     425An example where this is needed are independent filesets in IBM\*(Aqs GPFS, but other filesystems might support snapshotting only particular subtrees of the filesystem as well\&.
     426.sp
     427Note that
     428shadow:snapdirseverywhere
     429depends on
     430shadow:snapdir
     431and needs it to be a relative path\&. Setting an absolute snapdir path disables
     432shadow:snapdirseverywhere\&.
     433.sp
     434Note that this option is incompatible with the
     435shadow:basedir
     436option and removes the
     437shadow:basedir
     438setting by itself\&.
     439.sp
     440Example: shadow:snapdirseverywhere = yes
     441.sp
     442Default: shadow:snapdirseverywhere = no
     443.RE
     444.PP
     445shadow:crossmountpoints = yes/no
     446.RS 4
     447This option is effective in the case of
     448shadow:snapdirseverywhere = yes\&. Setting this option makes the module not stop at the first mount point encountered when looking for snapdirs, but lets it search potentially all through the path instead\&.
     449.sp
     450An example where this is needed are independent filesets in IBM\*(Aqs GPFS, but other filesystems might support snapshotting only particular subtrees of the filesystem as well\&.
     451.sp
     452Note that
     453shadow:crossmountpoints
     454depends on
     455shadow:snapdir
     456and needs it to be a relative path\&. Setting an absolute snapdir path disables
     457shadow:crossmountpoints\&.
     458.sp
     459Note that this option is incompatible with the
     460shadow:basedir
     461option and removes the
     462shadow:basedir
     463setting by itself\&.
     464.sp
     465Example: shadow:crossmountpoints = yes
     466.sp
     467Default: shadow:crossmountpoints = no
    204468.RE
    205469.SH "EXAMPLES"
     
    229493.SH "VERSION"
    230494.PP
    231 This man page is correct for version 3\&.2\&.7 of the Samba suite\&.
     495This man page is correct for version 4\&.0 of the Samba suite\&.
    232496.SH "AUTHOR"
    233497.PP
  • vendor/current/docs/manpages/vfs_streams_depot.8

    r860 r988  
    22.\"     Title: vfs_streams_depot
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_STREAMS_DEPOT" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_STREAMS_DEPOT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    5050Path of the directory where the alternate data streams should be stored\&. Defaults to the sharepath/\&.streams\&.
    5151.RE
     52.PP
     53streams_depot:delete_lost = [ yes | no ]
     54.RS 4
     55In the case of an already existing data streams directory for a newly created file the streams directory will be renamed to "lost\-%lu", random()\&. With this option lost stream directories will be removed instead of renamed\&.
     56.sp
     57.RS 4
     58.ie n \{\
     59\h'-04'\(bu\h'+03'\c
     60.\}
     61.el \{\
     62.sp -1
     63.IP \(bu 2.3
     64.\}
     65no(default)
     66\- rename lost streams to "lost\-%lu", random()\&.
     67.RE
     68.sp
     69.RS 4
     70.ie n \{\
     71\h'-04'\(bu\h'+03'\c
     72.\}
     73.el \{\
     74.sp -1
     75.IP \(bu 2.3
     76.\}
     77yes
     78\- remove lost streams\&.
     79.RE
     80.sp
     81.RE
     82.RE
    5283.SH "EXAMPLES"
    5384.sp
  • vendor/current/docs/manpages/vfs_streams_xattr.8

    r860 r988  
    22.\"     Title: vfs_streams_xattr
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_STREAMS_XATTR" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_STREAMS_XATTR" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    4141The
    4242vfs_streams_xattr
    43 enables storing of NTFS alternate data streams in the file system\&. As a normal posix file system does not support the concept of multiple data streams per file, the streams_xattr module stores the data in posix extended attributes (xattrs)\&. The name of these attributes is user\&.DosStream\&."ADS\-NAME"\&.
     43enables storing of NTFS alternate data streams in the file system\&. As a normal posix file system does not support the concept of multiple data streams per file, the streams_xattr module stores the data in posix extended attributes (xattrs)\&. The name of these attributes by default is user\&.DosStream\&."ADS\-NAME"\&. The prefix "user\&.DosStream\&." can be changed with the module option
     44streams_xattr:prefix, but be aware that this will also expose those ADS over the SMB extended attributes interface\&.
    4445.PP
    4546The file system that is shared with this module enabled must support xattrs\&.
    4647.PP
    4748Please note that most file systems have severe limitations on the size of xattrs\&. So this module might work for applications like IE that stores small zone information in streams but will fail for applications that store serious amounts of data in ADSs\&.
     49.PP
     50CAUTION: Make sure to set "kernel oplocks = no" in smb\&.conf if if you use this module because this combination is currently broken\&. See Bug 7537 for details\&.
     51.SH "OPTIONS"
     52.PP
     53streams_xattr:prefix = STRING
     54.RS 4
     55Name prefix used when storing an ADS in an xattr, defaults to
     56user\&.DosStream\&.\&. Changing this will also expose ADS over the SMB extended attributes interface\&.
     57.RE
     58.PP
     59streams_xattr:store_stream_type = [yes|no]
     60.RS 4
     61Whether the xattr names for Alternate Data Streams of type "$DATA" are suffixed by the stream type string ":$DATA"\&. The default is
     62yes\&.
     63.RE
    4864.SH "EXAMPLES"
    4965.sp
  • vendor/current/docs/manpages/vfs_time_audit.8

    r860 r988  
    22.\"     Title: vfs_time_audit
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_TIME_AUDIT" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_TIME_AUDIT" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    4242time_audit
    4343VFS module logs system calls that take longer than the number of milliseconds defined by the variable
    44 time_audit:audit_timeout\&. It will log the calls and the time spent in it\&.
     44time_audit:timeout\&. It will log the calls and the time spent in it\&.
    4545.PP
    4646It\*(Aqs kind of comparable with
     
    5151.SH "OPTIONS"
    5252.PP
    53 time_audit:audit_timeout = number of milliseconds
     53time_audit:timeout = number of milliseconds
    5454.RS 4
    5555VFS calls that take longer than the defined number of milliseconds that should be logged\&. The default is 10000 (10s)\&.
     
    6666        \m[blue]\fBpath = /test/sample_share\fR\m[]
    6767        \m[blue]\fBvfs objects = time_audit\fR\m[]
    68         \m[blue]\fBtime_audit: audit_timeout = 3000\fR\m[]
     68        \m[blue]\fBtime_audit:timeout = 3000\fR\m[]
    6969.fi
    7070.if n \{\
     
    7373.SH "VERSION"
    7474.PP
    75 This man page is correct for version 3\&.6\&.0 of the Samba suite\&.
     75This man page is correct for version 4\&.0\&.0 of the Samba suite\&.
    7676.SH "AUTHOR"
    7777.PP
  • vendor/current/docs/manpages/vfs_xattr_tdb.8

    r860 r988  
    22.\"     Title: vfs_xattr_tdb
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFS_XATTR_TDB" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "VFS_XATTR_TDB" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
  • vendor/current/docs/manpages/vfstest.1

    r860 r988  
    22.\"     Title: vfstest
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "VFSTEST" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "VFSTEST" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    4545\-c|\-\-command=command
    4646.RS 4
    47 Execute the specified (colon\-separated) commands\&. See below for the commands that are available\&.
    48 .RE
    49 .PP
    50 \-h|\-\-help
    51 .RS 4
    52 Print a summary of command line options\&.
     47Execute the specified (\fBsemicolon\fR\-separated) commands\&. See below for the commands that are available\&.
    5348.RE
    5449.PP
     
    5954will be appended\&. The log file is never removed by the client\&.
    6055.RE
    61 .PP
    62 \-d|\-\-debuglevel=level
    63 .RS 4
    64 \fIlevel\fR
    65 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    66 .sp
    67 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    68 .sp
    69 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    70 .sp
    71 Note that specifying this parameter here will override the
    72 \m[blue]\fBlog level\fR\m[]
    73 parameter in the
    74 smb\&.conf
    75 file\&.
    76 .RE
    77 .PP
    78 \-V|\-\-version
    79 .RS 4
    80 Prints the program version number\&.
    81 .RE
    82 .PP
    83 \-s|\-\-configfile <configuration file>
    84 .RS 4
    85 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    86 smb\&.conf
    87 for more information\&. The default configuration file name is determined at compile time\&.
    88 .RE
    89 .PP
    90 \-l|\-\-log\-basename=logdirectory
    91 .RS 4
    92 Base directory name for log/debug files\&. The extension
    93 \fB"\&.progname"\fR
    94 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    95 .RE
    9656.SH "COMMANDS"
    9757.PP
     
    530490.RE
    531491.sp
     492.RS 4
     493.ie n \{\
     494\h'-04'\(bu\h'+03'\c
     495.\}
     496.el \{\
     497.sp -1
     498.IP \(bu 2.3
     499.\}
     500getxattr
     501\- VFS getxattr()
     502.RE
     503.sp
     504.RS 4
     505.ie n \{\
     506\h'-04'\(bu\h'+03'\c
     507.\}
     508.el \{\
     509.sp -1
     510.IP \(bu 2.3
     511.\}
     512listxattr
     513\- VFS listxattr()
     514.RE
     515.sp
     516.RS 4
     517.ie n \{\
     518\h'-04'\(bu\h'+03'\c
     519.\}
     520.el \{\
     521.sp -1
     522.IP \(bu 2.3
     523.\}
     524setxattr
     525\- VFS setxattr()
     526.RE
     527.sp
     528.RS 4
     529.ie n \{\
     530\h'-04'\(bu\h'+03'\c
     531.\}
     532.el \{\
     533.sp -1
     534.IP \(bu 2.3
     535.\}
     536removexattr
     537\- VFS removexattr()
     538.RE
     539.sp
     540.RS 4
     541.ie n \{\
     542\h'-04'\(bu\h'+03'\c
     543.\}
     544.el \{\
     545.sp -1
     546.IP \(bu 2.3
     547.\}
     548fget_nt_acl
     549\- VFS fget_nt_acl()
     550.RE
     551.sp
     552.RS 4
     553.ie n \{\
     554\h'-04'\(bu\h'+03'\c
     555.\}
     556.el \{\
     557.sp -1
     558.IP \(bu 2.3
     559.\}
     560get_nt_acl
     561\- VFS get_nt_acl()
     562.RE
     563.sp
     564.RS 4
     565.ie n \{\
     566\h'-04'\(bu\h'+03'\c
     567.\}
     568.el \{\
     569.sp -1
     570.IP \(bu 2.3
     571.\}
     572fset_nt_acl
     573\- VFS fset_nt_acl()
     574.RE
     575.sp
     576.RS 4
     577.ie n \{\
     578\h'-04'\(bu\h'+03'\c
     579.\}
     580.el \{\
     581.sp -1
     582.IP \(bu 2.3
     583.\}
     584set_nt_acl
     585\- VFS open() and fset_nt_acl()
     586.RE
     587.sp
     588.RS 4
     589.ie n \{\
     590\h'-04'\(bu\h'+03'\c
     591.\}
     592.el \{\
     593.sp -1
     594.IP \(bu 2.3
     595.\}
     596fchmod_acl
     597\- VFS fchmod_acl()
     598.RE
     599.sp
     600.RS 4
     601.ie n \{\
     602\h'-04'\(bu\h'+03'\c
     603.\}
     604.el \{\
     605.sp -1
     606.IP \(bu 2.3
     607.\}
     608chmod_acl
     609\- VFS chmod_acl()
     610.RE
     611.sp
     612.RS 4
     613.ie n \{\
     614\h'-04'\(bu\h'+03'\c
     615.\}
     616.el \{\
     617.sp -1
     618.IP \(bu 2.3
     619.\}
     620sys_acl_get_file
     621\- VFS sys_acl_get_file()
     622.RE
     623.sp
     624.RS 4
     625.ie n \{\
     626\h'-04'\(bu\h'+03'\c
     627.\}
     628.el \{\
     629.sp -1
     630.IP \(bu 2.3
     631.\}
     632sys_acl_get_fd
     633\- VFS sys_acl_get_fd()
     634.RE
     635.sp
     636.RS 4
     637.ie n \{\
     638\h'-04'\(bu\h'+03'\c
     639.\}
     640.el \{\
     641.sp -1
     642.IP \(bu 2.3
     643.\}
     644sys_acl_blob_get_file
     645\- VFS sys_acl_blob_get_file()
     646.RE
     647.sp
     648.RS 4
     649.ie n \{\
     650\h'-04'\(bu\h'+03'\c
     651.\}
     652.el \{\
     653.sp -1
     654.IP \(bu 2.3
     655.\}
     656sys_acl_blob_get_fd
     657\- VFS sys_acl_blob_get_fd()
     658.RE
     659.sp
     660.RS 4
     661.ie n \{\
     662\h'-04'\(bu\h'+03'\c
     663.\}
     664.el \{\
     665.sp -1
     666.IP \(bu 2.3
     667.\}
     668sys_acl_delete_def_file
     669\- VFS sys_acl_delete_def_file()
     670.RE
     671.sp
     672.RS 4
     673.ie n \{\
     674\h'-04'\(bu\h'+03'\c
     675.\}
     676.el \{\
     677.sp -1
     678.IP \(bu 2.3
     679.\}
     680test_chain
     681\- test chain code
     682.RE
     683.sp
     684.RS 4
     685.ie n \{\
     686\h'-04'\(bu\h'+03'\c
     687.\}
     688.el \{\
     689.sp -1
     690.IP \(bu 2.3
     691.\}
     692translate_name
     693\- VFS translate_name()
     694.RE
     695.sp
    532696.RE
    533697.PP
     
    595759.SH "VERSION"
    596760.PP
    597 This man page is correct for version 3 of the Samba suite\&.
     761This man page is correct for version 3 and 4 of the Samba suite\&.
    598762.SH "AUTHOR"
    599763.PP
    600764The original Samba software and related utilities were created by Andrew Tridgell\&. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed\&.
    601765.PP
    602 The vfstest man page was written by Jelmer Vernooij\&.
     766The vfstest man page was written by Jelmer Vernooij\&. Updated version by Guenter Kukkukk\&.
  • vendor/current/docs/manpages/wbinfo.1

    r860 r988  
    22.\"     Title: wbinfo
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: User Commands
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "WBINFO" "1" "09/18/2013" "Samba 3\&.6" "User Commands"
     10.TH "WBINFO" "1" "05/02/2016" "Samba 4\&.4" "User Commands"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 wbinfo [\-a\ user%password] [\-\-all\-domains] [\-\-allocate\-gid] [\-\-allocate\-uid] [\-c] [\-\-ccache\-save] [\-\-change\-user\-password] [\-D\ domain] [\-\-domain\ domain] [\-\-dsgetdcname\ domain] [\-g] [\-\-getdcname\ domain] [\-\-get\-auth\-user] [\-G\ gid] [\-\-gid\-info] [\-\-group\-info] [\-\-help|\-?] [\-i\ user] [\-I\ ip] [\-K\ user%password] [\-\-lanman] [\-m] [\-n\ name] [\-N\ netbios\-name] [\-\-ntlmv2] [\-\-online\-status] [\-\-own\-domain] [\-p] [\-P|\-\-ping\-dc] [\-r\ user] [\-R|\-\-lookup\-rids] [\-s\ sid] [\-\-separator] [\-\-set\-auth\-user\ user%password] [\-S\ sid] [\-\-sid\-aliases] [\-\-sid\-to\-fullname] [\-t] [\-u] [\-\-uid\-info\ uid] [\-\-usage] [\-\-user\-domgroups\ sid] [\-\-user\-sids\ sid] [\-U\ uid] [\-V] [\-\-verbose] [\-Y\ sid]
     34wbinfo [\-a\ user%password] [\-\-all\-domains] [\-\-allocate\-gid] [\-\-allocate\-uid] [\-c] [\-\-ccache\-save] [\-\-change\-user\-password] [\-D\ domain] [\-\-dc\-info\ domain] [\-\-domain\ domain] [\-\-dsgetdcname\ domain] [\-g] [\-\-getdcname\ domain] [\-\-get\-auth\-user] [\-G\ gid] [\-\-gid\-info\ gid] [\-\-group\-info\ group] [\-\-help|\-?] [\-i\ user] [\-I\ ip] [\-K\ user%password] [\-\-krb5ccname\ cctype] [\-\-lanman] [\-\-logoff] [\-\-logoff\-uid\ uid] [\-\-logoff\-user\ username] [\-\-lookup\-sids] [\-m] [\-n\ name] [\-N\ netbios\-name] [\-\-ntlmv2] [\-\-online\-status] [\-\-own\-domain] [\-p] [\-P|\-\-ping\-dc] [\-\-pam\-logon\ user%password] [\-r\ user] [\-R|\-\-lookup\-rids] [\-\-remove\-gid\-mapping\ gid,sid] [\-\-remove\-uid\-mapping\ uid,sid] [\-s\ sid] [\-\-separator] [\-\-sequence] [\-\-set\-auth\-user\ user%password] [\-\-set\-gid\-mapping\ gid,sid] [\-\-set\-uid\-mapping\ uid,sid] [\-S\ sid] [\-\-sid\-aliases\ sid] [\-\-sid\-to\-fullname\ sid] [\-\-sids\-to\-unix\-ids\ sidlist] [\-t] [\-u] [\-\-uid\-info\ uid] [\-\-usage] [\-\-user\-domgroups\ sid] [\-\-user\-sidinfo\ sid] [\-\-user\-sids\ sid] [\-U\ uid] [\-V] [\-\-verbose] [\-Y\ sid]
    3535.SH "DESCRIPTION"
    3636.PP
     
    106106.RE
    107107.PP
     108\-\-dc\-info \fIdomain\fR
     109.RS 4
     110Displays information about the current domain controller for a domain\&.
     111.RE
     112.PP
    108113\-\-domain \fIname\fR
    109114.RS 4
    110115This parameter sets the domain on which any specified operations will performed\&. If special domain name \*(Aq\&.\*(Aq is used to represent the current domain to which
    111116\fBwinbindd\fR(8)
    112 belongs\&. Currently only the
    113 \fB\-u\fR, and
    114 \fB\-g\fR
    115 options honor this parameter\&.
     117belongs\&. A \*(Aq*\*(Aq as the domain name means to enumerate over all domains (NOTE: This can take a long time and use a lot of memory)\&.
    116118.RE
    117119.PP
     
    131133.RE
    132134.PP
    133 \-\-group\-info \fIuser\fR
    134 .RS 4
    135 Get group info for user\&.
     135\-\-group\-info \fIgroup\fR
     136.RS 4
     137Get group info from group name\&.
    136138.RE
    137139.PP
     
    140142This option will list all groups available in the Windows NT domain for which the
    141143\fBsamba\fR(7)
    142 daemon is operating in\&. Groups in all trusted domains will also be listed\&. Note that this operation does not assign group ids to any groups that have not already been seen by
     144daemon is operating in\&. Groups in all trusted domains can be listed with the \-\-domain=\*(Aq*\*(Aq option\&. Note that this operation does not assign group ids to any groups that have not already been seen by
    143145\fBwinbindd\fR(8)\&.
    144146.RE
     
    188190.RE
    189191.PP
     192\-\-krb5ccname \fIKRB5CCNAME\fR
     193.RS 4
     194Allows one to request a sepcific kerberos credential cache type used for authentication\&.
     195.RE
     196.PP
    190197\-\-lanman
    191198.RS 4
    192199Use lanman cryptography for user authentication\&.
     200.RE
     201.PP
     202\-\-logoff
     203.RS 4
     204Logoff a user\&.
     205.RE
     206.PP
     207\-\-logoff\-uid \fIUID\fR
     208.RS 4
     209Define user uid used during logoff request\&.
     210.RE
     211.PP
     212\-\-logoff\-user \fIUSERNAME\fR
     213.RS 4
     214Define username used during logoff request\&.
     215.RE
     216.PP
     217\-\-lookup\-sids \fISID1,SID2\&.\&.\&.\fR
     218.RS 4
     219Looks up SIDs\&. SIDs must be specified as ASCII strings in the traditional Microsoft format\&. For example, S\-1\-5\-21\-1455342024\-3071081365\-2475485837\-500\&.
    193220.RE
    194221.PP
     
    207234\fBwinbindd\fR(8)
    208235for the SID associated with the name specified\&. Domain names can be specified before the user name by using the winbind separator character\&. For example CWDOM1/Administrator refers to the Administrator user in the domain CWDOM1\&. If no domain is specified then the domain used is the one specified in the
    209 \fBsmb.conf\fR(5)
    210 \fIworkgroup \fR
     236\fBsmb.conf\fR(5)\fIworkgroup \fR
    211237parameter\&.
    212238.RE
     
    238264.RE
    239265.PP
     266\-\-pam\-logon \fIusername%password\fR
     267.RS 4
     268Attempt to authenticate a user in the same way pam_winbind would do\&.
     269.RE
     270.PP
    240271\-p|\-\-ping
    241272.RS 4
     
    258289.RS 4
    259290Converts RIDs to names\&. Uses a comma separated list of rids\&.
     291.RE
     292.PP
     293\-\-remove\-gid\-mapping \fIGID,SID\fR
     294.RS 4
     295Removes an existing GID to SID mapping from the database\&.
     296.RE
     297.PP
     298\-\-remove\-uid\-mapping \fIUID,SID\fR
     299.RS 4
     300Removes an existing UID to SID mapping from the database\&.
    260301.RE
    261302.PP
     
    274315.RE
    275316.PP
     317\-\-sequence
     318.RS 4
     319This command has been deprecated\&. Please use the \-\-online\-status option instead\&.
     320.RE
     321.PP
    276322\-\-set\-auth\-user \fIusername%password\fR
    277323.RS 4
     
    281327.RE
    282328.PP
     329\-\-set\-gid\-mapping \fIGID,SID\fR
     330.RS 4
     331Create a GID to SID mapping in the database\&.
     332.RE
     333.PP
     334\-\-set\-uid\-mapping \fIUID,SID\fR
     335.RS 4
     336Create a UID to SID mapping in the database\&.
     337.RE
     338.PP
    283339\-S|\-\-sid\-to\-uid \fIsid\fR
    284340.RS 4
     
    296352.RS 4
    297353Converts a SID to a full username (DOMAIN\eusername)\&.
     354.RE
     355.PP
     356\-\-sids\-to\-unix\-ids \fIsid1,sid2,sid3\&.\&.\&.\fR
     357.RS 4
     358Resolve SIDs to Unix IDs\&. SIDs must be specified as ASCII strings in the traditional Microsoft format\&. For example, S\-1\-5\-21\-1455342024\-3071081365\-2475485837\-500\&.
    298359.RE
    299360.PP
     
    309370This option will list all users available in the Windows NT domain for which the
    310371\fBwinbindd\fR(8)
    311 daemon is operating in\&. Users in all trusted domains will also be listed\&. Note that this operation does not assign user ids to any users that have not already been seen by
     372daemon is operating in\&. Users in all trusted domains can be listed with the \-\-domain=\*(Aq*\*(Aq option\&. Note that this operation does not assign user ids to any users that have not already been seen by
    312373\fBwinbindd\fR(8)
    313374\&.
     
    329390.RE
    330391.PP
     392\-\-user\-sidinfo \fIsid\fR
     393.RS 4
     394Get user info by sid\&.
     395.RE
     396.PP
    331397\-\-user\-sids \fIsid\fR
    332398.RS 4
     
    349415\fBwinbindd\fR(8)
    350416then the operation will fail\&.
    351 .RE
    352 .PP
    353 \-V|\-\-version
    354 .RS 4
    355 Prints the program version number\&.
    356 .RE
    357 .PP
    358 \-h|\-\-help
    359 .RS 4
    360 Print a summary of command line options\&.
    361417.RE
    362418.SH "EXIT STATUS"
  • vendor/current/docs/manpages/winbind_krb5_locator.7

    r860 r988  
    22.\"     Title: winbind_krb5_locator
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: 7
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "WINBIND_KRB5_LOCATOR" "7" "09/18/2013" "Samba 3\&.6" "7"
     10.TH "WINBIND_KRB5_LOCATOR" "7" "05/02/2016" "Samba 4\&.4" "7"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3636suite\&.
    3737.PP
    38 
    3938winbind_krb5_locator
    4039is a plugin that permits MIT and Heimdal Kerberos libraries to detect Kerberos Servers (for the KDC and kpasswd service) using the same semantics that other tools of the Samba suite use\&. This include site\-aware DNS service record lookups and caching of closest dc\&. The plugin uses the public locator API provided by most modern Kerberos implementations\&.
  • vendor/current/docs/manpages/winbindd.8

    r860 r988  
    22.\"     Title: winbindd
    33.\"    Author: [see the "AUTHOR" section]
    4 .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
    5 .\"      Date: 09/18/2013
     4.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
     5.\"      Date: 05/02/2016
    66.\"    Manual: System Administration tools
    7 .\"    Source: Samba 3.6
     7.\"    Source: Samba 4.4
    88.\"  Language: English
    99.\"
    10 .TH "WINBINDD" "8" "09/18/2013" "Samba 3\&.6" "System Administration tools"
     10.TH "WINBINDD" "8" "05/02/2016" "Samba 4\&.4" "System Administration tools"
    1111.\" -----------------------------------------------------------------
    1212.\" * Define some portability stuff
     
    3232.SH "SYNOPSIS"
    3333.HP \w'\ 'u
    34 winbindd [\-D] [\-F] [\-S] [\-i] [\-d\ <debug\ level>] [\-s\ <smb\ config\ file>] [\-n]
     34winbindd [\-D|\-\-daemon] [\-F|\-\-foreground] [\-S|\-\-stdout] [\-i|\-\-interactive] [\-d\ <debug\ level>] [\-s\ <smb\ config\ file>] [\-n|\-\-no\-caching] [\-\-no\-process\-group]
    3535.SH "DESCRIPTION"
    3636.PP
     
    144144.SH "OPTIONS"
    145145.PP
    146 \-D
     146\-D|\-\-daemon
    147147.RS 4
    148148If specified, this parameter causes the server to operate as a daemon\&. That is, it detaches itself and runs in the background on the appropriate port\&. This switch is assumed if
     
    151151.RE
    152152.PP
    153 \-F
     153\-F|\-\-foreground
    154154.RS 4
    155155If specified, this parameter causes the main
     
    166166.RE
    167167.PP
    168 \-S
     168\-S|\-\-stdout
    169169.RS 4
    170170If specified, this parameter causes
     
    173173.RE
    174174.PP
    175 \-d|\-\-debuglevel=level
    176 .RS 4
    177 \fIlevel\fR
    178 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.
    179 .sp
    180 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.
    181 .sp
    182 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.
    183 .sp
    184 Note that specifying this parameter here will override the
    185 \m[blue]\fBlog level\fR\m[]
    186 parameter in the
    187 smb\&.conf
    188 file\&.
    189 .RE
    190 .PP
    191 \-V|\-\-version
    192 .RS 4
    193 Prints the program version number\&.
    194 .RE
    195 .PP
    196 \-s|\-\-configfile <configuration file>
    197 .RS 4
    198 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See
    199 smb\&.conf
    200 for more information\&. The default configuration file name is determined at compile time\&.
    201 .RE
    202 .PP
    203 \-l|\-\-log\-basename=logdirectory
    204 .RS 4
    205 Base directory name for log/debug files\&. The extension
    206 \fB"\&.progname"\fR
    207 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.
    208 .RE
    209 .PP
    210 \-h|\-\-help
    211 .RS 4
    212 Print a summary of command line options\&.
    213 .RE
    214 .PP
    215 \-i
     175\-i|\-\-interactive
    216176.RS 4
    217177Tells
     
    226186.RE
    227187.PP
    228 \-n
    229 .RS 4
    230 Disable caching\&. This means winbindd will always have to wait for a response from the domain controller before it can respond to a client and this thus makes things slower\&. The results will however be more accurate, since results from the cache might not be up\-to\-date\&. This might also temporarily hang winbindd if the DC doesn\*(Aqt respond\&.
     188\-n|\-\-no\-caching
     189.RS 4
     190Disable some caching\&. This means winbindd will often have to wait for a response from the domain controller before it can respond to a client and this thus makes things slower\&. The results will however be more accurate, since results from the cache might not be up\-to\-date\&. This might also temporarily hang winbindd if the DC doesn\*(Aqt respond\&. This does not disable the samlogon cache, which is required for group membership tracking in trusted environments\&.
     191.RE
     192.PP
     193\-\-no\-process\-group
     194.RS 4
     195Do not create a new process group for winbindd\&.
    231196.RE
    232197.SH "NAME AND ID RESOLUTION"
     
    255220.IP \(bu 2.3
    256221.\}
    257 
    258222\m[blue]\fBwinbind separator\fR\m[]
    259223.RE
     
    267231.IP \(bu 2.3
    268232.\}
    269 
    270233\m[blue]\fBidmap config * : range\fR\m[]
    271234.RE
     
    279242.IP \(bu 2.3
    280243.\}
    281 
    282244\m[blue]\fBidmap config * : backend\fR\m[]
    283245.RE
     
    291253.IP \(bu 2.3
    292254.\}
    293 
    294255\m[blue]\fBwinbind cache time\fR\m[]
    295256.RE
     
    303264.IP \(bu 2.3
    304265.\}
    305 
    306266\m[blue]\fBwinbind enum users\fR\m[]
    307267.RE
     
    315275.IP \(bu 2.3
    316276.\}
    317 
    318277\m[blue]\fBwinbind enum groups\fR\m[]
    319278.RE
     
    327286.IP \(bu 2.3
    328287.\}
    329 
    330288\m[blue]\fBtemplate homedir\fR\m[]
    331289.RE
     
    339297.IP \(bu 2.3
    340298.\}
    341 
    342299\m[blue]\fBtemplate shell\fR\m[]
    343300.RE
     
    351308.IP \(bu 2.3
    352309.\}
    353 
    354310\m[blue]\fBwinbind use default domain\fR\m[]
    355311.RE
     
    363319.IP \(bu 2.3
    364320.\}
    365 
    366321\m[blue]\fBwinbind: rpc only\fR\m[]
    367322Setting this parameter forces winbindd to use RPC instead of LDAP to retrieve information from Domain Controllers\&.
     
    500455is configured\&.
    501456.PP
    502 If the the Windows NT SID to UNIX user and group id mapping file is damaged or destroyed then the mappings will be lost\&.
     457If the Windows NT SID to UNIX user and group id mapping file is damaged or destroyed then the mappings will be lost\&.
    503458.SH "SIGNALS"
    504459.PP
Note: See TracChangeset for help on using the changeset viewer.